The Unfound Treasure

Copyright © 2009 - FGARTCLICKER - All rights reserved. No part of
this blog be republished or written without prior permission
of the author

Blood : The last vampire [2009] 300MB



Download Link - http://www.amaderforum.com/showthread.php?t=423623

Please signup for getting access to the links

The Hangover [2009] 450MB



Download Link - http://www.amaderforum.com/showthread.php?t=423595

Please signup for getting access to the links

Dog House [2009] 300MB


Download Link - http://www.amaderforum.com/showthread.php?t=423621

Please signup for getting access to the links


I Love you Beth Cooper [2009] 400MB



Download Link - http://www.amaderforum.com/showthread.php?t=423605

Please signup for getting access to the links

Tormented [2009] 300MB



Download Link - http://www.amaderforum.com/showthread.php?t=423611

Please signup for getting access to the links

The Steam Experiment [2009] 300MB



Download Link - http://www.amaderforum.com/showthread.php?t=423058

Please signup for getting access to the links

The Canyon [2009] 350MB



Download Link - http://www.amaderforum.com/showthread.php?t=423822

Please signup for getting access to the links

American Pie 7 Book of Love [2009] 300MB




Download Link - http://www.amaderforum.com/showthread.php?t=423714

Please signup for getting access to the links

Astro Boy [2009] 300MB




Download Link - http://www.amaderforum.com/showthread.php?t=422907

Please signup for getting access to the links

DE DANA DAN [2009]

De Dana Dan Review, De Dana Dan Images, De Dana Dan Wallpapers

DE DANA DAN promises laughter and entertainment and sticks to its promise. Nitin is a butler, cook, driver, watchman, gardener to a wealthy female industrialist in Singapore. Like any young man, Nitin too dreams of a better life. He desperately wants to become rich and marry the love of his life, Anjali, who supports him financially. Ram, Nitin's best friend, also came to Singapore with the dream of striking it rich, but ended up a courier delivery man. He falls for Manpreet, but her high society parents will never approve of marriage, not unless Ram has lots and lots of money. In the midst of all this is Harbans, a shrewd businessman, who's looking for ways to multiply his income and avoid his debtors. He decides the best way would be to marry his son off to a girl whose parents can give him a large dowry.

He is introduced to Manpreet's parents at a function and is impressed by their social status. He introduces himself as a well-established businessman, impresses them and they decide to get Manpreet and Harbans' son married. With several factors working against them, Nitin and Ram soon reach a dead end in their relationships. When both receive ultimatums from their girlfriends, they realize that only a life of vice can help them out of their misery. They come up with an audacious plan to kidnap someone important and demand a ransom. The kidnapping goes awry and both hide at a local hotel while waiting for the ransom money. But misfortune is never far and the kidnapping spirals out of control.

Meanwhile, Manpreet's wedding reception is being held at the same hotel that Nitin and Ram are hiding in. Soon, they are joined by a motley set of characters including a Chinese Don [Asrani], a hired assassin [Johny Lever], a ACB police inspector [Sharat Saxena], a club dancer [Neha Dhupia], an ambassador [Vikram Gokhale], a young frustrated double crossing wife [Aditi Govitrikar], a letch [Shakti Kapoor], a drunken waiter [Rajpal Yadav] and a dead body nobody wants to check into the hotel.

Going by its casting, do not expect "De Dana Dan" to be a sequel, tribute or extension of the "Hera Pheri" series. Forget the threesome chemistry, there is hardly a single frame in the film where the trio of Akshay Kumar, Sunil Shetty and Paresh Rawal share screen space. On the positive side, the movie is fun to watch, and does not deviate from the formula. Each actor, each character, and there are at least 20 characters in the movie, play their part well. Of all actors, Johny Lever, and Asrani are probably the best in their parts. Paresh Rawal has done well too. Akshay is now a regular at this theme, dont expect anything new from him, but he does excellently well in his role.

Pritam is consistently delivering hit after hit, though his last release All The Best was not up to the mark. Nevertheless, the Bong musician continues to create stirring tunes for music buffs. Here is ‘De Dana Dan’, the album features six originals and six remixes. Rishte Naate in the voice of Rahat Fatah Ali Khan is a must-hear number and this is because of the innocence that runs through the song that is not high on bass and is lucid. Pritam and Rahat know how to mesmerize the listeners. But the mandatory remix version crooned by Kunal Ganjawala fails to lure us like the original. RDB ft Pritam’s Paisa Paisa sounds so much like an Akshay Kumar song. In fact, the little inspiration from Usher’s song ‘Yeah’ makes it no different.

"De Dana Dan" is targeted at the masses and it delivers laughter in abundance. Leave your brains behind to enjoy this Priyadarshan Entertainer!

The Final Destination 4 [2009] 300MB




Download Link - http://www.amaderforum.com/showthread.php?t=421226

Please signup for getting access to the links

Volkswagen Touareg

Volkswagen Touareg TDi Review and Images

Colors

Volkswagen Touareg TDi
Colors Images Colors Images

Dashboard

Volkswagen Touareg TDi
Dashboard Images Dashboard Images

Exterior

Volkswagen Touareg TDi
Exterior Images Exterior Images

Interior

Volkswagen Touareg TDi
Interior Images Interior Images

Volkswagen Touareg Is Coming To India This December

Volkswagen launched its mid-size luxury sport utility vehicle Touareg in 2002. Touareg was the third SUV from the automaker Volkswagen and shares its platform with the Porsche's Cayenne. Now, Volkswagen India is all set to launch Touareg in India this december in a price range of 45-55 lakhs. The Touareg is Volkswagon's radical new sports utility vehicle which represents an attempt to attract a more upscale group of buyers to the Volkswagen brand – buyers who might otherwise be tempted by Mercedes Benz. Accordingly, the company calls the Touareg “one of the most important new vehicle launches in VW history.”

Promotions & Advertisements

Volkswagen India has also started a advertisement which is presently being aired on all leading TV channels in India. In the ad a kid enters Volkswagen showroom and asks: Can we book a car in advance....?? And books a New Beetle for his 18th birthday, a Jetta for his 21st birthday and a Passat when he will become CEO of his dad's company. The ad ends with sneak peek of Touareg SUV with big VW logo & slogan "Das Auto" which means “The Car” in german launguage. In my opinion this is one of the best ads in which they have shown all the models avaialble in India. Great move by Voklkwagen guys to improve the brand image of the company. Waiting for the launch of New Beetle & Touareg in Indian Market.

More About Volkswagen Touareg

Volkwagen Touareg has the New Phaeton’s athletic stance, which is accentuated by big front fender flares and muscular haunches. Combined with exceptionally short front and rear overhang, it looks like it will go anywhere. While new design trails weren't blazed, from most angles, the Touareg offers generic SUV looks with familiar VW markings. However, it’s loaded with engineering features almost unimaginable in a passenger car even a few years ago, including a completely new self-supporting body. The frame is distinct, the supporting framework and the body structure form an inseparable unit. This provides superior static rigidity, which lends not only high speed stability but also severely limits the amount of twisting or flex experienced in extreme off-road situations. Volkswagen Touareg is one of the most popular high end sports utility vehicles that carry 5-star ratings from IIHS (Insurance Institute for Highway Safety) in terms of safety features.

Main Features Of Volkswagen Touareg

- Powerful 3.0 litre TDi diesel engine
- Impeccable interior & comfort features
- Innovative side headlights that light up when the car is in a turn
- Adjustable ride suspension
- Auto sensing rain wipers
- The electronic parking assist system
- Driver and passenger both have powered seats
- 17" alloy wheels with all-season tires
- Silver roof rails
- Premium VI AM/FM stereo with CD player and SIRIUS® Satellite Radio
- 4XMOTION® permanent all-wheel drive system
- Six airbags, driver and passenger front, side, and Side
- Multi-function trip computer with compass and exterior temperature display
- Dual-zone Climatronic® climate control
- Remote power open, power close rear hatch

The interiors of Touareg are as nice as any Audi, Lexus or Mercedes. It looks flawless and the controls are well-positioned and intuitive. Each of the four occupants are pampered with their own climate control and heated seats. The keyless entry system is the best ones available. Just leave the key in your pocket when entering the car and the proximity sensor will recognize it and unlock the car. Start and stop the car with a button in the traditional place where the ignition key is usually placed. To lock the car when you leave, simply press a rubber button on the door handle.

More details, photos, available variants and price of Volkwagen Touareg after the official launch. Watch this space......

Volkswagen New Beetle


Volkswagen New Beetle  Review and Images

Colors

Volkswagen New Beetle
Colors Images Colors Images

Dashboard

Volkswagen New Beetle
Dashboard Images Dashboard Images

Exterior

Volkswagen New Beetle
Exterior Images Exterior Images

Interior

Volkswagen New Beetle
Interior Images Interior Images

Volkswagen New Beetle Is Coming - Launch On 4th December

Volkswagen India is going to launch the Beetle in Indian on 4th December, 2009. It is going to compete with the likes of Fiat 500 and it will be imported as a completely built unit in India which will make it pricier due to high import duty. It is expect to be priced around Rs. 20 lakh for the base variant and can go upto 24 lakh for the convertible variant. The company has planned a complete advertising campaign including internet, print, electronic and digital media to generate a furor about its upcoming high cost model. The main aim of launching New Beetle in India is to build a brand image in the country. Along with New Beetle Volkswagen India is also going to launch the much awaited SUV - The Touareg.

Promotions & Advertisements

Volkswagen India has also started a advertisement which is presently being aired on all leading TV channels in India. In the ad a kid enters Volkswagen showroom and asks: Can we book a car in advance....?? And books a New Beetle for his 18th birthday, a Jetta for his 21st birthday and a Passat when he will become CEO of his dad's company. The ad ends with sneak peek of Touareg SUV with big VW logo & slogan "Das Auto" which means “The Car” in german launguage. In my opinion this is one of the best ads in which they have shown all the models avaialble in India. Great move by Voklkwagen guys to improve the brand image of the company. Waiting for the launch of New Beetle & Touareg in Indian Market.

Deisgn & Style Of New Beetle

Volkswagen New Beetle is the cute car that started the retro-futurist design craze, which is still going strong. It is a modernized version of the legendary VW Beetle and struck a chord with consumers who had grown tired of standard conservative car designs and had fond memories of the "Bugs" from their youth. On sale in the North American market for more than a decade, the Volkswagen New Beetle hasn't really changed. It is a very smart, stylish, and refined hatchback. Though in India the only rival for New Beetle is Fiat 500.

New Beetle combines the German engineering and performance with exceptional fit and finish. With styling straight out of yesteryear and a fun driving experience, the New Beetle is perfect for drivers who like to exert their personality. But its tight cabin limits its appeal. The modern version of the ”Love Bug,” the New Beetle distinguishes itself primarily on its exterior body shape, comfortable road handling, and plenty of standard features common with the entire Volkswagen line.

Interiors & Comfort Features In New Beetle

It is a front-wheel drive car based off of the MK4 generation Golf/Jetta platform. Four passengers can be seated in this unmistakably classic vehicle. The New Beetle may not seem to have the roomy interior cabin of other competitors, but most passengers will feel relatively comfortable up front and cargo space will handle everyday driving and loads. Feature list is long with 16-inch alloy wheels, remote keyless entry, full power accessories, heated front seats, cruise control, a tilt/telescoping steering wheel and a premium audio system with a CD/MP3 player are added amenities.

Engine & Safety Features Of New Beetle

Volkswagen New Beetle is powered by a 150 Bhp 2500cc inline-five cylinder engine. It is expected that it will be availabe in a five-speed manual and six-speed automatic with manual gear selection. Safety features includes front and side-impact airbags, anti-lock brakes, tire pressure monitoring system, and daytime running lights. All New Beetle coupes come fully-equipped with antilock disc brakes, stability control, front-seat side-impact airbags and active front head restraints.

More details, photos, available variants and price of Volkwagen New Beetle after the official launch. Watch this space......

"Planet 51"-2009

If there was ever an animated film that needed a clever punch-up team, it’s this one. Planet 51 lacks both style and substance, which is surprising given the wealth of opportunities you’d think would be presented here. Perhaps first-time Spanish director Jorge Blanco and new Madrid-based studio Ilion Animation were overconfident about making a children’s film.

Sony's entry in the crowded animation field this holiday season is "Planet 51," a perky though not terribly imaginative feature aimed primarily at youngsters. The twist in this movie is that it has an alien planet terrified of - a human astronaut.
Kids will enjoy the swift action and slapstick gags, and adult minders can chuckle at a few more suggestive jokes.
Created by a Spanish company, Ilion Animation Studios, this digital cartoon is a jokey reimagining of 1950s science fiction flicks where Earth faced extinction by alien space invaders seemingly on a monthly basis.
A high concept gets low execution in Planet 51, a lame-brained toon that even kids will recognize as an insipid goof on sci-fi conventions. Any number of things have and could still be done with the idea of picturing a space-voyaging Earthling as a scary alien from the point of view of another planet’s inhabitants, but there’s nothing funny, provocative or involving about what 'Shrek' co-writer Joe Stillman and the team from Madrid-based Ilion Animation Studios do with the notion here.
The problem doesn’t lie in the reversal of the cliche, but in the fact that the picture trades in nothing but them.
Planet 51 devotes itself to tiresomely repetitive scenes of frenzied jeopardy, accompanied by music that shifts gears every 15 seconds to underline whatever response is desired and larded with refs to famous antecedents (The Day the Earth Stood Still, 2001, Star Wars, E.T., Alien, et al.) and an innocuous putative romance between Lem and neighbor Neera.
Chuck (voiced by Dwayne Johnson) isn't particularly bright -- his spacecraft is run by autopilot -- but he certainly is friendly. Yet the green people see an "ugly" monster in a space suit, so they flee in terror. Only Lem (Justin Long), a model student and aspiring astronomer, can see his friendly side. Soon he, his pal Skiff (Seann William Scott) and his not-quite-girlfriend Neera (Jessica Biel) must hide Chuck from the likes of gruff General Grawl (Gary Oldman) and crackpot Professor Kipple (John Cleese), a scientist who wants to perform a brain extraction on every strange creature he encounters.
There are chases and comical misunderstandings that extend this single-note idea for 90 minutes. When in doubt, the film cuts to Chuck's robot companion, "Rover," a doglike machine that collects every rock it finds.
The movie quickly grows aggravating because it’s clear there’s no imagination in play, only the recycling of familiar motifs and the attempted generation of Pavlovian responses based on expected character behavior and generic action. But it might have been worse: Its defects could have been magnified by 3D.
"Planet 51" is Sci-Fi Lite, running through the cliches - let's make that the memories -- of old sci-fi classics with gentle jokes and cornball battles. It doesn't measure up to what's best in current animation -- say, Coraline, Up, Fantastic Mr. Fox or A Town Called Panic, to name a few other films the Academy recently announced as eligible for this year's animation nomination. Those films demonstrate you can make animation that entertains the entire family.
"Planet 51" is not that ambitious. Planet 51 deserves to be packed up in a dusty crate in a corner of the Area 51 warehouse, never to be seen again.

Red Cliff-2009

Red Cliff is hands down highly recommended, not only for those familiar with the story (and who're likely to find fault with some minor tweaks to supporting characters in involvement and names), but makes a great entry point to the rich stories of brotherhood, valor, bravery which sits snugly in any John Woo movie, and I guess to reintroduce a whole new generation to the era of the warring states.
Red Cliff is the most expensive Chinese movie made to date, a two-part film depicting the famous battle at Red Cliff, when the Han Dynasty general from North China, Cao Cao, sails a massive fleet down the Yangtze River to invade the lands of Liu Bei and Sun Quan in the South.
Red Cliff, the highly anticipated epic period flick marks the return of "bullets and guns" maestro John Woo back to making movies in the Asia region. Taking on a section of the well-loved novel, Romance of the Three Kingdom, this grand tale is being told in not one but two movies.
Red Cliff blazes across the screen with a sweep that most movies can only dream of. It's nice to see a master like Woo at the height of his powers, after slipping Hollywood's shackle.
Fine moments of humanity and heroism remain, particularly as the film builds to a colossal climax of hellish bloodshed. But at times, "Red Cliff" is a bit of a forced march, drama and context excised to keep the audience trudging along.
The film is at its clunkiest early on as terribly dry narration and some hasty action — sort of a Cliff's Notes beginning to "Red Cliff" — explain how power-mad Gen. Cao Cao (Zhang Fengyi) bullies the emperor into letting him mount a massive assault on a couple of pesky kingdoms that stand in his way.
The heart of the film is the relationship between master strategist Zhou Yu and scientific sage Zhuge Liang. Perfectly cast as man of action and crafty savant, Leung and Kaneshiro build a rich spirit of warmth and respect around these two very different men.
Writer-director Woo adds a nice feminine touch to this manly tale, giving Zhou Yu's beautiful wife, Xiao Qiao (Chiling Lin), a pivotal role in delaying Cao Cao's final barrage with a wonderfully orchestrated delaying tactic over a simple cup of tea.
Combat, romance and historical details aside, "Red Cliff" is one of those movies that begs to be experienced more than simply deciphered. It is poetry in martial motion, a vivid recreation of a place and time and a battle that shaped Chinese history for generations to come. Flaws and all, you can't watch a frame of it without feeling that it has been generations since Hollywood tackled anything on this scale.
An excellent movie for fans of war and strategy films, like the Chinese equivalent of the battle scenes in "The Lord of the Rings". This movie will be remembered for its showcase of its classic battle of the two kingdoms at sea. What sets it apart from other scenes is that the final battle was done at night. This is probably the first time we have seen a battle like this without the sunlight and yet, the movie was able to show this very effectively. The actors were all good and the fight scenes and stunts will leave you satisfied and yet at the same time, wanting more.
Watch it for great cinematography and artistry.

Trivias

Red Cliff
  • Yun-Fat Chow dropped out of the film the day principal photography began. Tony Leung Chiu Wai replaced him.
  • John Woo's first Chinese film since 1992.
  • Red Cliff makers received help from the Chinese Army who lent them approximately 100,000 soldiers to play extras.
  • Red Cliff had been divided in two parts for the theatrical release in the Asian market. The American release will be the condensed version of these two parts. The reason given was that the Asian viewers are more familiar with the characters and their exploits while the western viewers might be confused with the numerous characters and their similar names (therefore keeping it simple for the US market).
  • During post-production of red cliff a 23-year-old stuntman was killed when fire broke out after a small boat rammed into a larger warship, while filming miniatures.
  • Movie makers received help from the Chinese Army who lent them approximately 100,000 soldiers to play extras.

Kurbaan-2009

Kurbaan Review, Kurbaan Images, Kurbaan Wallpapers
Kurbaan starts as a love story, swiftly changes identity to a social film and keeps the viewer engaged throughout with its thriller treatment. Sensibly the romance is kept short and succinct without losing out on the chemistry of the characters. Once the terrorist activity comes to forefront, the love story is fittingly given a backseat as the story intends to highlight and discuss serious issues related to global terrorism. And while dealing with dignified social concerns, the film doesn't compromise on entertainment by adapting a thrilling story-telling technique.

Ehsaan Khan (Saif Ali Khan ) is a smooth-talking, handsome professor who walks into fellow professor Avantika Ahuja's (Kareena Kapoor ) life and takes over her world. He seems to be in a tearing hurry to bed her and father her children, but she is too much in love to notice or analyse, and they are soon busy building their love nest in an Asian neighbourhood in New York. Avantika's world comes crashing down when she accidentally runs into her neighbour's dead body and eavesdrops into a terror conspiracy. What happens after that is what the film is all about.

Saif Ali Khan has always been very good whenever he has gone wicked and here as well he comes up triumphs in a grey role. The way he changes his body language and facial expressions from a charming romantic to a cold blooded terrorist is just superb. Kareena Kapoor proves yet again why she is considered a top rated actress today. However, in many emotional sequences she appears very similar in her act to her elder sister, Karisma. After a really very long time Vivek Oberoi leaves you extremely impressed. His mature act is bound to win him many accolades and awards for sure. Om Puri as the terrorist sleeper cell head is very good. Kirron Kher after a long time gets a non-Punjabi mom role and she is has delivered one of her career best performance in this one. Dia Mirza and Nauheed Cyrusi leave you impressed despite their short roles.

Technically the film is proficient in all departments. Salim-Sulaiman's background score with Arabic overtones to it enhances each scene. The soundtrack is soulful with justifiably no lip-sync songs, which work efficiently in the background. Hemant Chaturvedi's cinematography is competent and at no point overpowers the story. The plane crash sequence is credibly executed while the bombing action sequence in the climax has intensity. It seems like there is nothing new to the movie where a nice educated person eventually is the terrorist in the film, parts of which we all have seen in Fanaa, Aamir, New York.
Taglines
Kurbaan

* Some Love Stories have Blood on them

View all Taglines
for Kurbaan
Trivias
Kurbaan

* Minisha Lamba refused to do a kissing scene with Vivek Oberoi for the movie Jehaad. This didn't go down well with the director and he spoke to the production house to have her replaced. Dia Mirza stepped in subsequently in kurbaan.
* While the news of the swine flu in and around US broke out, it caused panic in the minds of residents in the States. While many people travelled away from affected pockets, people travelling to America cancelled their plans. However, the shooting of Karan Johar's Jeehad directed by debutant Rensil D'Silva continued uninterrupted. The cast and crew of kubaan also finished a major sequence at the Brooklyn Bridge, for which traffic was halted for a few hours to complete the shoot of kurbaan.

Reset Your Bios Password

Here's a DOS trick for Windows 9x, that will reset (delete) your motherboard's BIOS password (aka CMOS password) without any need to open up your computer to remove the battery or mess with jumpers.

This method can come in very handy in the event you ever lose and forget your BIOS password or if you acquire used computers where the unknown previous owners had BIOS passwords set (in fact, this happened to me long ago—I was given a used computer, but there was no way I could enter the CMOS to make changes). It's important to note here that the password we are talking about is only the one that prevents a user from entering the BIOS setup at bootup, not the one that stops you from getting past the boot.

Normally, at bootup you can press a key (usually the DEL key) to access your BIOS allowing you to view it or make changes. With a password set, there is no way to enter setup. Though a password can provide a basic and very effective level of PC security, losing it can be a real headache if you don't know how to fix the problem.

The MS-DOS command that will makes this trick possible is the DEBUG command (debug itself is a utility—debug.exe—which is located in your Windows Command folder). This is not a command to be taken lightly—in other words, it's not a command to play with! You can cause serious corruption with this command and can end up not being able to even boot your computer! Debug is used to work with binary and executable files and allows you to alter (hex edit) the contents of a file or CPU register right down to the binary and byte level.

To begin debug mode, type debug at a MS-DOS prompt or you can specify a file, i.e., DEBUG FILE.EXE. There is a difference in screen output between the two methods. When you type DEBUG alone, debug responds with a hyphen (-) prompt waiting for you to enter commands. The second method, with a file specified, loads the file into memory and you type all the commands on the line used to start debug. In this tip, we will be writing to the BIOS, so the first method is the one that would be used. All debug commands can be aborted at any time by pressing CTRL/C.

Accessing BIOS with DEBUG
The basic trick will be to fool the BIOS into thinking there is a checksum error, in which case it resets itself, including the password. This is done by invalidating the CMOS and to do that we must know how to access the BIOS and where the checksum value of the CMOS is located so that we can change it. Access to the the BIOS content is via what are known as CMOS Ports and it's Port 70 and 71 that will give us the needed access. On almost all AT motherboards, the checksum is located at hexadecimal address 2e and 2f and filling the address 2e with ff is all you should have to do to invalidate the checksum.

Here's what to do if you ever need to reset the password and have no other method, and you don't want to open up your computer to remove the battery or jumpers.

Note! Do this at your own risk. I can only tell you that it has worked for me more than once and has worked for others as well. But I cannot make any guarantees. When I did this, I took a willing risk. The BIOS was Award Modular BIOS v4.51PG

Restart your computer in MS-DOS mode.


When you get to the C:\> or C:\WINDOWS> prompt, type DEBUG and press Enter.


A hyphen (-) prompt will appear waiting for you to enter commands.


Enter the following commands, pressing Enter after each one. Note: the o is the letter o and stands for OUTPUT.


o 70 2e
o 71 ff
q


After the q command (which stands for QUIT), enter Exit.


Then try to enter your BIOS at bootup. The password prompt should now be gone and you should now have full access to it again. However, you will now be at the default BIOS setttings and may want to change them to your preference. You may also want to have your drives autodetected again.
In closing, I should state that in the case of a lost BIOS password, your first step should always be to contact your manufacturer to see if a backdoor password is available that will allow you to bypass the forgotten password.

There are many sites on the net that list backdoor passwords you can try, but beware that some BIOS that are set up to lock up if you enter the wrong password more than a certain number of times, usually only 3 times!

Greta [2009] 300MB




Download Link - http://www.amaderforum.com/showthread.php?t=416184

Please signup for getting access to the links

Lots Of Windows Xp Tips, Take A Look !

Lots Of Windows Xp Tips, Take A Look !

Lock XP Workstation (#1)

You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll, LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.

Remove Windows XP system software (#2)

XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

New commands (#3)

For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options -- they're all far too baroque to go into here.

Windows XP supports IPv6 (#4)

XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother.

Kill tasks from the command line (#5)

You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.

Enable ClearType by default (#6)

XP has ClearType -- Microsoft's anti-aliasing font display technology-- but doesn't have it enabled by default. It's well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry

HKEY_USERS/.DEFAULT/ControlPanel/Desktop/FontSmoothingType to 2.

Run program as different user (#7)

You can run a program as a different user without logging out and back in again. Right click the icon, select Run As... and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.

Speed up the Start Menu (#8)

The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.

Rename multiple files at once (#9)

You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetized groups by View, Arrange Icon By... Show In-Groups.

Show cover art in Media Player (#10)

Windows Media Player will display the cover art for albums as it plays the tracks -- if it found the picture on the Internet when you copied the tracks from the CD. If it didn't, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.

Display Hibernate Option on the Shut Down dialog (#11)

For some reason, Hibernate isn't available from the default Shut Down dialog. But you can enable it simply enough, by holding down the SHIFT key while the dialog is visible. Now you see it, now you don't!

Enable ClearType on the Welcome Screen! (#12)

As laptop users and other LCD owners are quickly realizing, Microsoft's ClearType technology in Windows XP really makes a big difference for readability. But the this feature is enabled on a per-user basis in Windows XP, so you can't see the effect on the Welcome screen; it only appears after you logon.

But you can fix that. Fire up the Registry Editor and look for the following keys:

(default user) HKEY_USERS \ .Default \ Control Panel \ Desktop \
FontSmoothing (String Value)
HKEY_USERS \ .Default \ Control Panel \ Desktop \
FontSmoothingType (Hexadecimal DWORD Value)

Make sure both of these values are set to 2 and you'll have ClearType enabled on the Welcome screen and on each new user by default.

Change User Picture (#13)

Click on the Icon at the top of the start menu. Select desired picture from resulting screen Windows 2000 style logon. To revert back to the Win2k style logon so you can log on as the administrator and other options, press ctrl+alt+delete twice at the logon screen. Change the location of the My Music or My Pictures folders:

In Windows 2000, Microsoft added the ability to right-click the My Documents folder and choose a new location for that folder in the shell. With Windows XP, Microsoft has elevated the My Music and My Pictures folders to the same "special shell folder" status of My Documents, but they never added a similar (and simple) method for changing those folder's locations. However, it is actually pretty easy to change the location of these folders, using the following method.

Open a My Computer window and navigate to the location where you'd like My Music (or My Pictures) to reside. Then, open the My Documents folder in a different window. Drag the My Music (or My Pictures) folder to the other window, and Windows XP will update all of the references to that folder to the new location, including the Start menu.

Protect Your Files From Unauthorized Users (#14)

Other users with permission to delete a file (users with Modify or Full Control permission) can't use your encrypted files-but they can make them difficult for you to use. Any such user can rename your files, which can make them difficult to find, and can also delete your files. (Even if the user merely deletes them to the Recycle Bin and doesn't remove them altogether, the deleted files are unavailable to you because you don't have access to any other user's Recycle Bin.) Therefore, if you're concerned about protecting your files from other authorized users as well as from a thief who steals your computer, you should modify the NTFS permissions to prevent any type of modification by other users.

Shutdown Your System in a Hurry (#15)

If you need to shut down in a hurry-or if a frozen application prevents you from shutting down in the normal ways-you can use the following procedure. Be aware, however, that you won't get an opportunity to save open documents. To perform an emergency shutdown, press Ctrl+Alt+Del to display Task Manager. Open the Shut down menu and hold down the Ctrl key as you click the Turn Off command. Poof! If your computer is part of a domain, the procedure is similar. Press Ctrl+Alt+Del and then hold down Ctrl when you click Shut Down. In this situation, you'll get a warning message pointing out-quite correctly-that this should be used only as a last resort.

Provide Personal Support (#16)

It never fails: when friends, co-workers, or family members discover that you're a Windows expert, you get pressed into service as an unpaid support technician. If the party asking for help is running any edition of Windows XP and has an active Internet connection, your job is much easier. Have the other person send you a Remote Assistance request; when you accept the request, you connect directly to their computer and can edit Registry settings, fix file associations, set System options, and perform just about any other troubleshooting or repair task, just as if you were sitting at the other person's desk.

Quickly Fix Connectivity Problems (#17)

Are you having trouble connecting to other computers on your local area network? If your network uses a hardware firewall that assigns IP addresses to each machine and you're certain you've configured all other components correctly, check to see whether the Internet Connection Firewall is enabled. That component can effectively block communication between PCs on the network.

Hack IE Title Bar (#18)

This can be an impressive bit of personalization. Use your name or moniker to brand Internet Explorer. Go to HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\ and left-click on Main to change the string "Window Title" to whatever you wish.

Unload DLLs (#19)

To prevent Windows from caching DLLs after the program using them has closed, follow this procedure: Navigate to
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ then left-click on Explorer. Right-click (as above) and create the DWORD

AlwaysUnloadDLL with a value of 1. This requires a reboot to take effect. This will allow memory to be used more efficiently.

Registry Hacks (#20)

Editing the Windows Registry, while much more common now than in years past, is still not to be entered into lightly. You can break Windows, cause boot failure. I know you're gonna do it anyway; why else would you be reading this. Just be careful, OK?

These are few because, for the most part WinXP can be customized through the interlace or with third-party freeware (as above).

All of the tips below require running regedit. To do so, hit 'Start/Run' then type 'regedit' and follow the instructions.

Naturally, I take no responsibility for any damage or loss of data incurred in the remote possibility that something goes terribly wrong.

The Ultimate Appearance Tweak (#21)

Microsoft said: "You can connect up to 10 monitors to your Windows XP-based computer and display numerous programs or windows at one time. You can use your mouse to move items from one monitor to another. You can open a different file on each monitor. Or several. Or you can stretch one item across several monitors; so for example, you can see more columns in a Microsoft Excel spreadsheet, or the entire layout of a Web page, without scrolling." Consider it. Monitors and PCI video cards are pretty cheap now. Windows recognizes the addition & allows easy adjustments on the 'Display Properties/Settings' menu.

Save Streaming Media (#22)

It's cool to listen to MP3s (or watch movies) over the Internet. Often, saving this media, however, seems impossible. Hey, if it plays on your computer, it's on your hard drive. Once the file is fully loaded and with folder view set to show hidden and systems folders, searches for the media (.mp3 or .mpg). There it is!

Securing the Paging File (#23)

If you're truly concerned about the possibility of your computer falling into the wrong hands, you should be sure that you don't leave any tracks in the paging file. By default, when you shut down your system, the paging file remains intact. People who've access to your computer could conceivably look through the unencrypted paging file to find information they shouldn't have.

Assign a Keyboard Shortcut (#24)

Click in the Shortcut Key field and press a keyboard combination that you want to use for launching or switching to this program. The shortcut key you assign must consist of one character key (a letter, number, or symbol) plus at least two of the following three keys: Ctrl, Alt, and Shift. (If you press a character key only, Windows automatically adds Ctrl+Alt.)

Shortcut keys work only when assigned to a program shortcut on the Start menu, the Programs menu, or the Desktop. The shortcuts you define will not work if it conflicts with a combination used in the program whose window has the focus.

Please remember, we cannot accept responsibility with what you decide to do with these tips. These tips act as a guide to tweaking and changing Windows XP from the default settings. If you are unsure about how to make these changes then don't meddle !

How To Increase Download Speeds By 100-200 Kbsec

First of all download this wonderful program:

h@@p://www.speedguide.net/files/TCPOptimizer.exe

Then when u start trhe program goto settings goto cable modem or dsl whatevcer u have.

Go to MaxMTU and set it to 1500 this is optimal anything above this will not work as well.

Thats bout it!! Enjoy the speed!!

How To Get Top Ranking, Search Engines

The tutorial is all about getting your site listed on top in Search Engines i.e Search Engine Optimization

First thing you need to do is find the keywords you want to optimize for.

There is great tool by Overture (/http://inventory.overture.com/d/sea...ory/suggestion/)

But I would suggest using this free tool called GoodKeywords (/http://www.goodkeywords.com/products/gkw/)

This one does the same job as Overture does but it also supports other Search Engines (Lycos and Teoma etc..)

For example if you want to optimize for the keyword "tech news", just search for the keyword in any of the tools specified above... It would show you keywords related to that and not of the searches..

Pick the keywords which are related to your site.

For example when you search for "Tech News" you'll see the following results:

Count Search Term
11770 tech news
351 itt news tech
191 high tech news
60 news tech texas
49 computer tech news
42 bio news tech
34 in itt news tech
30 news tech virginia
29 asia news tech
25 hi tech news
25 sci tech news

Now see what other terms are related to your keyword technology news

Do couple of searches like that and note down around 15-20 keywords.
Then, keep the keywords which are searched most on the top.

Now you need Title Tag for the page.

Title tag should include top 3 keywords, like for "tech news" it can be like :

"Latest Tech News, Information Technology News and Other computer raleted news here."

Remember that characters should not be more than 95 and should not have more than 3 "," commas - some search engines might cosider more than 3 commas as spam

Now move on to Meta Tags

You need following Meta Tags in web page







No need to have other meta tags like abstract, re-visit and all, most people dont read it.

Now...



This tag is tells content type is html and character set used it iso-8859-1 there are other character sets also but this is the one mosty used..



This one should have all your keywords inside starting from keyword with most counts...

keyword tag for our example would be something like :



Remember to put around 15-20 keywords max not more than that. Dont repeat keywords or dont put keywords like, "tech news", "info tech news", "latest tech news" and so on...



Provide short decription about your site and include all the keywords mentioned in the title tag.

Decription tag should be:



It can be upto 255 characters and avoid using more than 3 "," commas



This is used for search robots..following explanation will help you :

index,follow = index the page as well as follow the links
noindex,follow = dont index the page but follow the links
index,nofollow = index the page but dont follow the links
noindex,nofollow = dont index page, dont follow the links
all = same as index,follow
none = same as noindex,nofollow

Now move on to body part of the page

Include all top 3 keywords here,
I would suggest to break the keyword and use it...

For example

YourSiteName.com one stop for all kind of Latest Tech News and Computer Related information and reviews.................

Include main keywords in tags

etc..
and start with

and then move to

etc..

tag will be too big but CSS can help you there, define small font size in css for H1,H2,... tags

When done with page copy, then you need to provide title and alt tags for images and links.

Use some keywords in the tags but dont add all the keywords and if not neccessary then dont use keywords in it, basically it should explain what is image all about.

Remember to add Top keyword atleast 4 times in the body and other 2 keywords thrice and twice respectively.

Now move on to Footer Part
Try to include top keywords here and see the effect, use site keywords as links i.e.

Tech News Software News etc..

Now finally, you need to read some more stuff..may be you can all it as bottom lines...

Site Map - This is page where you need to put all the links present in your site, this is will help Search Engines to find the links easily and also provide link for site map in footer, as search engines start scanning the page from bottom.

Robots.txt - This file contains address of directories which should not be scanned by search engines.. more info can be found here : /http://www.robotstxt.org/wc/exclusion.html search engines line google, yahoo ask for robots.txt file.

Valid HTML - Your code should have valid html and doc type, Its kind of diffucult to follow all the standards but you can atleast open and close all the tags properly, you can check your page's html online here : /http://validator.w3.org/ or you can use this free software called HTML Tidy : /http://tidy.sourceforge.net/

All done now, you just need to check your site with this script, its called SEO Doctor : /http://www.instantposition.com/seo_doctor.cfm

It'll show you the report of your site with solution.

Now, correct the errors and start submitting the site :

Start with google : /http://google.com/addurl.html
then yahoo : /http://submit.search.yahoo.com/free/request
then move to altavista,alltheweb and other search engies..

Also submit your site to direcories like /http://dmoz.org , /http://jayde.com etc...
Dmoz is must, as google, yahoo and may more search engines uses same directory

And remember, dont try to SPAM with keywords in these directories, dmoz is handled by Human Editors

Submitted the sites, but still i cant see you site on top?

Wait for sometime may be a month or so but keep an eye on your search term, use /http://GoogleAlert.com - this will show whenever google updates for your keywords, it will mail you the new results.

And also check whether your site is listed on google..
use this tool called Google Monitor, it can be downloaded for free from : /http://www.cleverstat.com/google-monitor.htm

How to bypass web filters

There are several occasions where you will be at a public te How to bypass web filters
rminal, and require access to a particular website that is blocked for some reason or another. How to bypass these restrictions is a very common question, and will be covered here.

Lets pretend for a moment that the Internet is made up of 26 websites, A-Z. The web filter blocks your browser from accessing sites X-Z, but not sites A-W. Simply make the browser think you’re going to A-
W. There are a variety of ways to do this:


Proxy Servers:
This is a list of http proxies. These sites may not be up forever, so you may need to search for “free http proxy” or “public proxy servers” or other similar terms.

Proxy server lists:
• http://www.aliveproxy.com
• http://www.multiproxy.org
• http://www.publicproxyservers.com/index.html
• http://www.tehbox.com/proxy
• http://www.proxz.com
• http://www.proxy4free.com/index.html
• http://free-proxies.com

Now that you have a list of proxies, you would open IE (internet explorer) and click on Tools > Internet Options > Connections > LAN Settings > Advanced. Enter the address and port of one of the servers from the list in the proper area (http) and make sure the “use a proxy server for your LAN” option is selected. Remember to replace the proxy and port at your terminal to the original when you're done.

*Note: Some proxies listed may not work, and this method may decrease your surfing speed. By trying various entries, you’ll find one that works, or works faster.

The infamous translation trick:
Go to a web page translation site and use their services to “translate a page to English” thus accessing the blocked page through their trusted site.

You’ll notice that several translation sites are blocked, but by using less popular ones, this method can still be effective. Here is a list of some translation services. Again, these sites may not be up forever, so you may need to search for them.

• http://babelfish.altavista.com
• http://world.altavista.com
• http://translation.langenberg.com
• http://freetranslation.com/web.thm

Url Scripting:



Url scripting is the easiest method. It works on a select few web filters and is based on the same principal as the translation trick. By typing and address like “www.yahoo.com@www.restricted_site.com the filter will not go into effect as it recognizes the trusted site (in this case yahoo.com)

Other tricks:
Simply open the command prompt and type:
Ping restricted.com ? restricted.com obviously being the restricted site
At this point you can take down the IP address (ex. 216.109.124.73) and enter it into the browser. If access to the command prompt is also restricted, see “How to bypass restrictions to get to the command prompt.” If this article has been taken from information leak, then know that it involves anything from opening the browser, selecting view > source, then saving it as X.bat and opening it to opening a folder or browser and typing in the location of cmd.exe depending on the OS. I will not go into further, as this a completely different topic.

Use https://restrictedsite.com as referring to it as a secured site may confuse the filter.

Note: These are ancient methods that many new filters defend against, but still may be applicable in your situation. If not, a little history never hurt anyone.

Web based Proxies:
Another one of the easier, yet effective methods include web based proxies. These are simple in the fact that you just enter the restricted address and surf! Some of these have some restrictions, like daily usage limits, etc but you can also use another proxy (perhaps one that sucks, like a text only) to bypass their restrictions as well. Here is a list of some:

• http://proxify.com]http://proxify.com
• http://www.anonymizer.com/index.cgi]http://www.anonymizer.com/index.cgi
• http://www.guardster.com/]http://www.guardster.com/
• http://anonymouse.ws/anonwww.html]http://anonymouse.ws/anonwww.html
• http://www.the-cloak.com/login.html]http://www.the-cloak.com/login.html
• https://www.megaproxy.com/freesurf]https://www.megaproxy.com/freesurf
• http://www.anonymizer.ru]http://www.anonymizer.ru
• https://nadaily.com/cgi-bin/nph-proxyb.cgi]https://nadaily.com/cgi-bin/nph-proxyb.cgi
• http://www.userbeam.de/cgi-bin/nph-userbeam.cgi]http://www.userbeam.de/cgi-bin/nph-userbeam.cgi
• http://www.free2.surffreedom.com/nph-free.cgi]http://www.free2.surffreedom.com/nph-free.cgi

Proxy Programs:
There are many proxy programs that allow you to surf anonymously that are more or less based on the same topics we’ve covered here. I’ve added them just to cover the topic thoroughly:

• http://www.hotscripts.com/Detailed/28480.html]http://www.hotscripts.com/Detailed/28480.html
• http://www.inetprivacy.com/a4proxy/anonymous-grc.htm]http://www.inetprivacy.com/a4proxy/anonymous-grc.htm
• http://www.orangatango.com/home/index.ie.html]http://www.orangatango.com/home/index.ie.html
• http://www.steganos.com]http://www.steganos.com
• http://www.anonymization.net]http://www.anonymization.net ? toolbar that requires admin rights to install

Making your own CGI proxy server:

Making your own proxy server may come in handy, but I personally find that simply uploading a txt file/w a list of proxies to a free host makes for a much easier and headache free solution. If you don’t know PERL, there is code out there to help you set it up. Check out these sites for more info:

• http://httpbridge.sourceforge.net]http://httpbridge.sourceforge.net
• http://www.jmarshall.com/tools/cgiproxy]http://www.jmarshall.com/tools/cgiproxy
• http://www.manageability.org/blog/stuff/open-source-personal-proxy-servers-written-in-java/view]http://www.manageability.org/blog/stuff/op...en-in-java/view



Admin Access:
When all else fails, you can simply take over the PC and alter or delete the damn filter. This method varies according to the OS (operating system) you are dealing with. Please see “Hacking Windows NT” for more information. If this tutorial has been taken from information leak, then I will go as far as to say it involves booting the PC in another OS, copying the SAM file and cracking it using a program like saminside or LC5 rather than start a whole new topic within one.

How 2 Find EVERYTHING uploaded on Rapidshare

How 2 Find EVERYTHING uploaded on Rapidshare

All rapidshare.de Downloads:
/http://www.google.com/search?hl=en&lr=&as_qdr=all&q=+.*+site%3Arapidshare.de

Apps Rapidshare.de Downloads:
/http://www.google.com/search?hl=en&lr=&as_qdr=all&q=.cab+OR+.exe+OR+.rar+OR+.zip+site%3Arapidshare.de&btnG=Search

Movies rapidshare.de Downloads:
/http://www.google.com/search?hl=en&lr=&as_qdr=all&q=+.Avi+OR+.mpg+OR+.mpeg+site%3Arapidshare.de&btnG=Search

BIOS Update Procedure

BIOS Update Procedure

All latest Motherboards today, 486/ Pentium / Pentium Pro etc.,ensure that upgrades are easily obtained by incorporating the system BIOS in a FLASH Memory component. With FLASH BIOS, there is no need to replace an EPROM component. Once downloaded, the upgrade utility fits on a floppy disc allowing the user to save, verify and update the system BIOS. A hard drive or a network drive can also be used to run the newer upgrade utilities. However, memory managers can not be installed while upgrading.

Most pre-Pentium motherboards do not have a Flash BIOS. The following instructions therefore do not apply to these boards. If your motherboard does not have a Flash BIOS (EEPROM) you will need to use an EPROM programmer to re-program the BIOS chip. See your dealer for more information about this.

Please read the following instructions in full before starting a Flash BIOS upgrade:
A. Create a Bootable Floppy (in DOS)

•With a non-formatted disk, type the following:

format a:/s

•If using a formatted disk, type:

sys a:

This procedure will ensure a clean boot when you are flashing the new BIOS.

B. Download the BIOS file

•Download the correct BIOS file by clicking on the file name of the BIOS file you wish to download.

•Save the BIOS file and the Flash Utility file in the boot disk you have created. Unzip the BIOS file and the flash utility file. If you don't have an "unzip" utility, download the WinZip for Windows 95 shareware/ evaluation copy for that one time use from _www.winzip.com or _www.pkware.com. Most CD ROMs found in computer magazines, have a shareware version of WinZip on them.

•You should have extracted two files:

Flash BIOS utility eg: flash7265.exe (for example)

BIOS eg: 6152J900.bin (example)

Use the latest flash utility available unless otherwise specified (either on the BIOS update page or in the archive file). This information is usually provided.

C. Upgrade the System BIOS

During boot up, write down the old BIOS version because you will need to use it for the BIOS backup file name.

Place the bootable floppy disk containing the BIOS file and the Flash Utility in drive a, and reboot the system in MS-DOS, preferably Version 6.22

•At the A:> prompt, type the corresponding Flash BIOS utility and the BIOS file with its extension.

For example:

flash625 615j900.bin

•From the Flash Memory Writer menu, select "Y" to "Do you want to save BIOS?" if you want to save (back up) your current BIOS (strongly recommended), then type the name of your current BIOS and its extension after FILE NAME TO SAVE: eg: a:\613J900.bin

Alternatively select "N" if you don't want to save your current BIOS. Beware, though, that you won't be able to recover from a possible failure.

•Select "Y" to "Are you sure to program?"

•Wait until it displays "Message: Power Off or Reset the system"

Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system. If you write to BIOS but cannot complete the procedure, do not switch off, because the computer will not be able to boo, and you will not be given another chance to flash. In this case leave your system on until you resolve the problem (flashing BIOS with old file is a possible solution, provided you've made a backup before)

Make sure the new BIOS version has been loaded properly by taking note of the BIOS identifier as the system is rebooting.

For AMI BIOS
Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system holding the "END" key prior to power on until you enter CMOS setup. If you do not do this the first time booting up after upgrading the BIOS, the system will hang.

BIOS Update Tips
note:
1.Make sure never to turn off or reset your computer during the flash process. This will corrupt the BIOS data. We also recommend that you make a copy of your current BIOS on the bootable floppy so you can reflash it if you need to. (This option is not available when flashing an AMI BIOS).

2. If you have problems installing your new BIOS please check the following:

Have you done a clean boot?
In other words, did you follow the above procedure for making a bootable floppy? This ensures that when booting from "A" there are no device drivers on the diskette. Failing to do a clean boot is the most common cause for getting a "Memory Insufficient" error message when attempting to flash a BIOS.

If you have not used a bootable floppy, insure a clean boot either by

a) pressing F5 during bootup

b) by removing all device drivers on the CONFIG.SYS including the HIMEM.SYS. Do this by using the EDIT command.

Have you booted up under DOS?
Booting in Windows is another common cause for getting a "Memory Insufficient" error message when attempting to flash a BIOS. Make sure to boot up to DOS with a minimum set of drivers. Important: Booting in DOS does not mean selecting "Restart computer in MS-DOS Mode" from Windows98/95 shutdown menu or going to Prompt mode in WindowsNT, but rather following the above procedure (format a: /s and rebooting from a:\).

Have you entered the full file name of the flash utility and the BIOS plus its extension?
Do not forget that often you will need to add a drive letter (a:\) before flashing the BIOS. Example: when asked for file name of new BIOS file which is on your floppy disk, in case you're working from c:\ your will need to type a:\615j900.bin, rather than 615j900.bin only.

Bit Torrent Tutorials

Bit Torrent Tutorials

The first things you need to know about using Bit Torrent:
-- Bit Torrent is aimed at broadband users (or any connection better than dialup).
-- Sharing is highly appreciated, and sharing is what keeps bit torrent alive.
-- A bit torrent file (*.torrent) contains information about the piece structure of the download (more on this later)
-- The method of downloading is not your conventional type of download. Since downloads do not come in as one
big chunk, you are able to download from many people at once, increasing your download speeds. There may be
100 "pieces" to a file, or 20,000+ pieces, all depending on what you're downloading. Pieces are usually small (under 200kb)
-- The speeds are based upon people sharing as they download, and seeders. Seeders are people who constantly
share in order to keep torrents alive. Usually seeders are on fast connections (10mb or higher).

In this tutorial, I will be describing it all using a bit torrent client called Azureus. This client is used to decode the .torrent files into a useable format to download from other peers. From here on out, I will refer to Bit Torrent as BT.

Which BT client you use, is purely up to you. I have tried them all, and my personal favorite is Azureus for many reasons. A big problem with most BT clients out there, is that they are extremely CPU intensive, usually using 100% of your cpu power during the whole process. This is the number one reason I use Azureus. Another, is a recently released plug-in that enables you to browse all current files listed on suprnova.org (the #1 source for torrent downloads).

Before you use the plug-in, take a look at /http://www.suprnova.org, and browse the files. Hold your mouse over the links, and you'll notice every file ends in .torrent. This is the BT file extension. Usually, .torrent files are very small, under 200kb. They contain a wealth of information about the file you want to download. A .torrent file can contain just 1 single file, or a a directory full of files and more directories. But regardless, every download is split up into hundreds or thousands of pieces. The pieces make it much easier to download at higher speeds. Back to suprnova.org. Look at the columns:

Added | Name | Filesize | Seeds | DLs (and a few more which aren't very useful.)

I'll break this down.
Added: Self explanitory, its the date the torrent was added.
Name: Also self explanitory.
Filesize: Duh
Seeds: This is how many people are strictly UPLOADING, or sharing. These people are the ones that keep .torrent files alive. By "alive", I mean, if there's no one sharing the .torrent file, no one can download.
DLs: This is how many people currently downloading that particular torrent. They also help keep the torrent alive as they share while they download.

It's always best to download using a torrent that has a decent amount of seeders and downloaders, this way you can be assured there's a good chance your download will finish. The more the better.

Now that you should understand how torrent files work, and how to use them, on to Azureus!
First, get JAVA! You need this to run Azureus, as java is what powers it. Get Java here: /http://java.sun.com/j2se/1.4.2/download.html
Next, get Azureus at: /http://azureus.sourceforge.net
Next, get the Suprnovalister plugin from /http://s93732957.onlinehome.us/storage/suprnovalister.jar

Install Java JRE before you do ANYTHING.

Install Azureus, and then in the installation folder, create 2 more folders. ./Plugins/suprnovalister (For example, if you installed Azureus to C:\PROGRAM FILES\AZUREUS, create C:\PROGRAM FILES\AZUREUS\PLUGINS\SUPRNOVALISTER). Next, put the suprnovalister.jar file that you downloaded, in that folder.

Load up Azureus, and if you want, go through the settings and personalize it.

The tab labeled "My Torrents" is the section of Azureus you need the most often. That lists all your transfers, uploads and downloads. It shows every bit of information you could possibly want to know about torrents you download.

In the menu bar, go to View > Plugins > Suprnova Lister. This will open up a new tab in Azureus. Click on "Update Mirror". This will get a mirror site of suprnova.org containing all current torrent files available. Once a mirror is grabbed, choose a category from the drop-down box to the left and click "Update". Wah-lah, all the available downloads appear in the main chart above. Just double click a download you want, and bang its starting to download. Open the "My Torrents" tab again to view and make sure your download started.

After your download has finished, be nice, and leave the torrent transferring. So people can get pieces of the file from you, just as you got pieces from other people.

Alternatively, if you don't want to use the plugin... you can just head to suprnova.org and download files to any folder. Then go to File > Open > .torrent File in Azureus.

This should about wrap it up for the Bit Torrent Tutorial. If you guys think of anything I should add, or whatnot, just let me know and I'll check into it.

10 Fast and Free Security Enhancements

10 Fast and Free Security Enhancements
PC magazine.

Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.

1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.


3. Install a free spyware blocker. Our Editors' Choice ("Spyware," April 22) was SpyBot Search & Destroy (_http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.

4. Block pop-up spam messages in Windows NT, 2000, or XP by disabling the Windows Messenger service (this is unrelated to the instant messaging program). Open Control Panel | Administrative Tools | Services and you'll see Messenger. Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.

5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro@l. This will make it much harder for anyone to gain access to your accounts.

6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.

7. Buy antivirus software and keep it up to date. If you're not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., w*w.grisoft.com). And doublecheck your AV with the free, online-only scanners available at w*w.pandasoftware.com/activescan and _http://housecall.trendmicro.com.

8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get. For more, check out our wireless section or see the expanded coverage in Your Unwired World in our next issue.

9. Join a respectable e-mail security list, such as the one found at our own Security Supersite at _http://security.ziffdavis.com, so that you learn about emerging threats quickly and can take proper precautions.

10. Be skeptical of things on the Internet. Don't assume that e-mail "From:" a particular person is actually from that person until you have further reason to believe it's that person. Don't assume that an attachment is what it says it is. Don't give out your password to anyone, even if that person claims to be from "support."

BandWidth Explained

This is well written explanation about bandwidth, very useful info.



BandWidth Explained

Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.


Network Connectivity

The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location. It is the size of each network connection that determines how much bandwidth is available. For example, if you use a DSL connection to connect to the internet, you have 1.54 Mega bits (Mb) of bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are grouped in bytes which form words, text, and other information that is transferred between your computer and the internet.

If you have a DSL connection to the internet, you have dedicated bandwidth between your computer and your internet provider. But your internet provider may have thousands of DSL connections to their location. All of these connection aggregate at your internet provider who then has their own dedicated connection to the internet (or multiple connections) which is much larger than your single connection. They must have enough bandwidth to serve your computing needs as well as all of their other customers. So while you have a 1.54Mb connection to your internet provider, your internet provider may have a 255Mb connection to the internet so it can accommodate your needs and up to 166 other users (255/1.54).


Traffic

A very simple analogy to use to understand bandwidth and traffic is to think of highways and cars. Bandwidth is the number of lanes on the highway and traffic is the number of cars on the highway. If you are the only car on a highway, you can travel very quickly. If you are stuck in the middle of rush hour, you may travel very slowly since all of the lanes are being used up.

Traffic is simply the number of bits that are transferred on network connections. It is easiest to understand traffic using examples. One Gigabyte is 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024 megabytes. To put this in perspective, it takes one byte to store one character. Imagine 100 file cabinets in a building, each of these cabinets holds 1000 folders. Each folder has 100 papers. Each paper contains 100 characters - A GB is all the characters in the building. An MP3 song is about 4MB, the same song in wav format is about 40MB, a full length movie can be 800MB to 1000MB (1000MB = 1GB).

If you were to transfer this MP3 song from a web site to your computer, you would create 4MB of traffic between the web site you are downloading from and your computer. Depending upon the network connection between the web site and the internet, the transfer may occur very quickly, or it could take time if other people are also downloading files at the same time. If, for example, the web site you download from has a 10MB connection to the internet, and you are the only person accessing that web site to download your MP3, your 4MB file will be the only traffic on that web site. However, if three people are all downloading that same MP at the same time, 12MB (3 x 4MB) of traffic has been created. Because in this example, the host only has 10MB of bandwidth, someone will have to wait. The network equipment at the hosting company will cycle through each person downloading the file and transfer a small portion at a time so each person's file transfer can take place, but the transfer for everyone downloading the file will be slower. If 100 people all came to the site and downloaded the MP3 at the same time, the transfers would be extremely slow. If the host wanted to decrease the time it took to download files simultaneously, it could increase the bandwidth of their internet connection (at a cost due to upgrading equipment).


Hosting Bandwidth

In the example above, we discussed traffic in terms of downloading an MP3 file. However, each time you visit a web site, you are creating traffic, because in order to view that web page on your computer, the web page is first downloaded to your computer (between the web site and you) which is then displayed using your browser software (Internet Explorer, Netscape, etc.) . The page itself is simply a file that creates traffic just like the MP3 file in the example above (however, a web page is usually much smaller than a music file).

A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for CNN.com is about 200KB (200 Kilobytes = 200,000 bytes = 1,600,000 bits). This is typically large for a web page. In comparison, Yahoo's home page is about 70KB.


How Much Bandwidth Is Enough?

It depends (don't you hate that answer). But in truth, it does. Since bandwidth is a significant determinant of hosting plan prices, you should take time to determine just how much is right for you. Almost all hosting plans have bandwidth requirements measured in months, so you need to estimate the amount of bandwidth that will be required by your site on a monthly basis

If you do not intend to provide file download capability from your site, the formula for calculating bandwidth is fairly straightforward:

Average Daily Visitors x Average Page Views x Average Page Size x 31 x Fudge Factor

If you intend to allow people to download files from your site, your bandwidth calculation should be:

[(Average Daily Visitors x Average Page Views x Average Page Size) +
(Average Daily File Downloads x Average File Size)] x 31 x Fudge Factor

Let us examine each item in the formula:

Average Daily Visitors - The number of people you expect to visit your site, on average, each day. Depending upon how you market your site, this number could be from 1 to 1,000,000.

Average Page Views - On average, the number of web pages you expect a person to view. If you have 50 web pages in your web site, an average person may only view 5 of those pages each time they visit.

Average Page Size - The average size of your web pages, in Kilobytes (KB). If you have already designed your site, you can calculate this directly.

Average Daily File Downloads - The number of downloads you expect to occur on your site. This is a function of the numbers of visitors and how many times a visitor downloads a file, on average, each day.

Average File Size - Average file size of files that are downloadable from your site. Similar to your web pages, if you already know which files can be downloaded, you can calculate this directly.

Fudge Factor - A number greater than 1. Using 1.5 would be safe, which assumes that your estimate is off by 50%. However, if you were very unsure, you could use 2 or 3 to ensure that your bandwidth requirements are more than met.

Usually, hosting plans offer bandwidth in terms of Gigabytes (GB) per month. This is why our formula takes daily averages and multiplies them by 31.


Summary

Most personal or small business sites will not need more than 1GB of bandwidth per month. If you have a web site that is composed of static web pages and you expect little traffic to your site on a daily basis, go with a low bandwidth plan. If you go over the amount of bandwidth allocated in your plan, your hosting company could charge you over usage fees, so if you think the traffic to your site will be significant, you may want to go through the calculations above to estimate the amount of bandwidth required in a hosting plan.

Backtracking EMAIL Messages

Backtracking EMAIL Messages

Tracking email back to its source: Twisted Evil
cause i hate spammers... Evil or Very Mad

Ask most people how they determine who sent them an email message and the response is almost universally, "By the From line." Unfortunately this symptomatic of the current confusion among internet users as to where particular messages come from and who is spreading spam and viruses. The "From" header is little more than a courtesy to the person receiving the message. People spreading spam and viruses are rarely courteous. In short, if there is any question about where a particular email message came from the safe bet is to assume the "From" header is forged.

So how do you determine where a message actually came from? You have to understand how email messages are put together in order to backtrack an email message. SMTP is a text based protocol for transferring messages across the internet. A series of headers are placed in front of the data portion of the message. By examining the headers you can usually backtrack a message to the source network, sometimes the source host. A more detailed essay on reading email headers can be found .

If you are using Outlook or Outlook Express you can view the headers by right clicking on the message and selecting properties or options.

Below are listed the headers of an actual spam message I received. I've changed my email address and the name of my server for obvious reasons. I've also double spaced the headers to make them more readable.


Return-Path:

X-Original-To: davar@example.com

Delivered-To: davar@example.com

Received: from 12-218-172-108.client.mchsi.com (12-218-172-108.client.mchsi.com [12.218.172.108])
by mailhost.example.com (Postfix) with SMTP id 1F9B8511C7
for ; Sun, 16 Nov 2003 09:50:37 -0800 (PST)

Received: from (HELO 0udjou) [193.12.169.0] by 12-218-172-108.client.mchsi.com with ESMTP id <536806-74276>; Sun, 16 Nov 2003 19:42:31 +0200

Message-ID:

From: "Maricela Paulson"

Reply-To: "Maricela Paulson"

To: davar@example.com

Subject: STOP-PAYING For Your PAY-PER-VIEW, Movie Channels, Mature Channels...isha

Date: Sun, 16 Nov 2003 19:42:31 +0200

X-Mailer: Internet Mail Service (5.5.2650.21)

X-Priority: 3

MIME-Version: 1.0

Content-Type: multipart/alternative; boundary="MIMEStream=_0+211404_90873633350646_4032088448"

Advanced Shellcoding Techniques - by Darawk

Introduction

This paper assumes a working knowledge of basic shellcoding techniques, and x86 assembly, I will not rehash these in this paper. I hope to teach you some of the lesser known shellcoding techniques that I have picked up, which will allow you to write smaller and better shellcodes. I do not claim to have invented any of these techniques, except for the one that uses the div instruction.



The multiplicity of mul

This technique was originally developed by Sorbo of darkircop.net. The mul instruction may, on the surface, seem mundane, and it's purpose obvious. However, when faced with the difficult challenge of shrinking your shellcode, it proves to be quite useful. First some background information on the mul instruction itself.

mul performs an unsigned multiply of two integers. It takes only one operand, the other is implicitly specified by the %eax register. So, a common mul instruction might look something like this:

movl $0x0a,%eax
mul $0x0a

This would multiply the value stored in %eax by the operand of mul, which in this case would be 10*10. The result is then implicitly stored in EDX:EAX. The result is stored over a span of two registers because it has the potential to be considerably larger than the previous value, possibly exceeding the capacity of a single register(this is also how floating points are stored in some cases, as an interesting sidenote).

So, now comes the ever-important question. How can we use these attributes to our advantage when writing shellcode? Well, let's think for a second, the instruction takes only one operand, therefore, since it is a very common instruction, it will generate only two bytes in our final shellcode. It multiplies whatever is passed to it by the value stored in %eax, and stores the value in both %edx and %eax, completely overwriting the contents of both registers, regardless of whether it is necessary to do so, in order to store the result of the multiplication. Let's put on our mathematician hats for a second, and consider this, what is the only possible result of a multiplication by 0? The answer, as you may have guessed, is 0. I think it's about time for some example code, so here it is:

xorl %ecx,%ecx
mul %ecx

What is this shellcode doing? Well, it 0's out the %ecx register using the xor instruction, so we now know that %ecx is 0. Then it does a mul %ecx, which as we just learned, multiplies it's operand by the value in %eax, and then proceeds to store the result of this multiplication in EDX:EAX. So, regardless of %eax's previous contents, %eax must now be 0. However that's not all, %edx is 0'd now too, because, even though no overflow occurs, it still overwrites the %edx register with the sign bit(left-most bit) of %eax. Using this technique we can zero out three registers in only three bytes, whereas by any other method(that I know of) it would have taken at least six.


The div instruction

Div is very similar to mul, in that it takes only one operand and implicitly divides the operand by the value in %eax. Also like, mul it stores the result of the divide in %eax. Again, we will require the mathematical side of our brains to figure out how we can take advantage of this instruction. But first, let's think about what is normally stored in the %eax register. The %eax register holds the return value of functions and/or syscalls. Most syscalls that are used in shellcoding will return -1(on failure) or a positive value of some kind, only rarely will they return 0(though it does occur). So, if we know that after a syscall is performed, %eax will have a non-zero value, and that the instruction divl %eax will divide %eax by itself, and then store the result in %eax, we can say that executing the divl %eax instruction after a syscall will put the value 1 into %eax. So...how is this applicable to shellcoding? Well, their is another important thing that %eax is used for, and that is to pass the specific syscall that you would like to call to int $0x80. It just so happens that the syscall that corresponds to the value 1 is exit(). Now for an example:


xorl %ebx,%ebx
mul %ebx
push %edx
pushl $0x3268732f
pushl $0x6e69622f
mov %esp, %ebx
push %edx
push %ebx
mov %esp,%ecx
movb $0xb, %al #execve() syscall, doesn't return at all unless it fails, in which case it returns -1
int $0x80

divl %eax # -1 / -1 = 1
int $0x80

Now, we have a 3 byte exit function, where as before it was 5 bytes. However, there is a catch, what if a syscall does return 0? Well in the odd situation in which that could happen, you could do many different things, like inc %eax, dec %eax, not %eax anything that will make %eax non-zero. Some people say that exit's are not important in shellcode, because your code gets executed regardless of whether or not it exits cleanly. They are right too, if you really need to save 3 bytes to fit your shellcode in somewhere, the exit() isn't worth keeping. However, when your code does finish, it will try to execute whatever was after your last instruction, which will most likely produce a SIG ILL(illegal instruction) which is a rather odd error, and will be logged by the system. So, an exit() simply adds an extra layer of stealth to your exploit, so that even if it fails or you can't wipe all the logs, at least this part of your presence will be clear.



Unlocking the power of leal

The leal instruction is an often neglected instruction in shellcode, even though it is quite useful. Consider this short piece of shellcode.

xorl %ecx,%ecx
leal 0x10(%ecx),%eax

This will load the value 17 into eax, and clear all of the extraneous bits of eax. This occurs because the leal instruction loads a variable of the type long into it's desitination operand. In it's normal usage, this would load the address of a variable into a register, thus creating a pointer of sorts. However, since ecx is 0'd and 0+17=17, we load the value 17 into eax instead of any kind of actual address. In a normal shellcode we would do something like this, to accomplish the same thing:

xorl %eax,%eax
movb $0x10,%eax

I can hear you saying, but that shellcode is a byte shorter than the leal one, and you're quite right. However, in a real shellcode you may already have to 0 out a register like ecx(or any other register), so the xorl instruction in the leal shellcode isn't counted. Here's an example:

xorl %eax,%eax
xorl %ebx,%ebx
movb $0x17,%al
int $0x80

xorl %ebx,%ebx
leal 0x17(%ebx),%al
int $0x80

Both of these shellcodes call setuid(0), but one does it in 7 bytes while the other does it in 8. Again, I hear you saying but that's only one byte it doesn't make that much of a difference, and you're right, here it doesn't make much of a difference(except for in shellcode-size pissing contests =p), but when applied to much larger shellcodes, which have many function calls and need to do things like this frequently, it can save quite a bit of space.



Conclusion

I hope you all learned something, and will go out and apply your knowledge to create smaller and better shellcodes. If you know who invented the leal technique, please tell me and I will credit him/her.