Friday, October 17, 2008
Monday, August 18, 2008
Saturday, July 12, 2008
C programming
- http://www.acm.uiuc.edu/webmonkeys/book/c_guide/
- http://www.cs.cf.ac.uk/Dave/C/
- http://www.utas.edu.au/infosys/info/documentation/C/CStdLib.html
Friday, July 11, 2008
Monday, July 7, 2008
Thursday, June 26, 2008
Movie Download
http://www.egydown.com
GraboidVideoSetup -- download the software
http://www.alivedownload.com/blogsection/video
http://www.fullandfree.info/category/movies
GraboidVideoSetup -- download the software
http://www.alivedownload.com/blogsection/video
http://www.fullandfree.info/category/movies
Sunday, June 8, 2008
Watch movies Online
http://www.watch-movies.net
www.onlinecinema.org
www.tv-links.co.uk
www.joox.net
www.movinflicks.com
www.powerflv.com
www.onlinecinema.org
www.tv-links.co.uk
www.joox.net
www.movinflicks.com
www.powerflv.com
Wednesday, May 28, 2008
rapidshare download
Open the notepad and type this without quotes
"echo ipconfig/flushdns
ipconfig/flushdns
echo ipconfig/release
ipconfig/release
echo ipconfig/renew
ipconfig/renew
exit"
Save it as .bat and run the application
"echo ipconfig/flushdns
ipconfig/flushdns
echo ipconfig/release
ipconfig/release
echo ipconfig/renew
ipconfig/renew
exit"
Save it as .bat and run the application
Thursday, May 22, 2008
Tuesday, May 20, 2008
Wednesday, May 14, 2008
Hide your disc drives Trick
Open Registry (go to run command, type "regedit" and press enter)
then go to this key
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
now right click in right side pane and create DWORD Value (blue color)
Rename it as "NoViewOnDrive" (for locking drive)
or
Rename it as "NoDrives" (for Hiding drive)
double click on it and put some numbers to lock ur desired Drive and click ok.
DRIVE NOS.
FOR A : 1
FOR C : 4
FOR D : 8
FOR E : 16
FOR F : 32
FOR G : 64
FOR H : 128
finally restart or log-off the computer to take effect.
Keep in mind that "0" is Default Value to Disable or remove this setting..
After locking the drive when u try to open it, u will see a msgbox like this
"This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator"
for more detail visit this link
http://freesms.blog-2008.com/Free-SMS-b1/Hide-your-disc-drives-Trick-b1-p29.htm
then go to this key
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
now right click in right side pane and create DWORD Value (blue color)
Rename it as "NoViewOnDrive" (for locking drive)
or
Rename it as "NoDrives" (for Hiding drive)
double click on it and put some numbers to lock ur desired Drive and click ok.
DRIVE NOS.
FOR A : 1
FOR C : 4
FOR D : 8
FOR E : 16
FOR F : 32
FOR G : 64
FOR H : 128
finally restart or log-off the computer to take effect.
Keep in mind that "0" is Default Value to Disable or remove this setting..
After locking the drive when u try to open it, u will see a msgbox like this
"This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator"
for more detail visit this link
http://freesms.blog-2008.com/Free-SMS-b1/Hide-your-disc-drives-Trick-b1-p29.htm
Monday, May 12, 2008
How to remove new folder exe or regsvr exe or autorun inf virus
So let’s start the process off reclaiming the turf that virus took over from us.
- Cut The Supply Line
- Search for autorun.inf file. It is a read only file so you will have to change it to normal by right clicking the file , selecting the properties and un-check the read only option
- Open the file in notepad and delete everything and save the file.
- Now change the file status back to read only mode so that the virus could not get access again.
- Click start->run and type msconfig and click ok
- Go to startup tab look for regs
- vr and uncheck the option click OK.
- Click on Exit without Restart, cause there are still few things we need to do before we can restart the PC.
- Now go to control panel -> scheduled tasks, and delete the At1 task listed their.
- Open The Gates Of Castle
- Click on start -> run and type gpedit.msc and click Ok.
- If you are Windows XP Home Edition user you might not have gpedit.msc in that case download and install it from Windows XP Home Edition: gpedit.msc and then follow these steps.
- Go to users configuration->Administrative templates->system
- Find “prevent access to registry editing tools” and change the option to disable.
- Once you do this you have registry access back.
- Launch The Attack At Heart Of Castle
- Click on start->run and type regedit and click ok
- Go to edit->find and start the search for regsvr.exe,
- Delete all the occurrence of regsvr.exe; remember to take a backup before deleting. KEEP IN MIND regsvr32.exe is not to be deleted. Delete regsvr.exe occurrences only.
- At one ore two places you will find it after explorer.exe in theses cases only delete the regsvr.exe part and not the whole part. E.g. Shell = “Explorer.exe regsvr.exe” the just delete the regsvr.exe and leave the explorer.exe
- Seek And Destroy the enemy soldiers, no one should be left behind
- Click on start->search->for files and folders.
- Their click all files and folders
- Type “*.exe” as filename to search for
- Click on ‘when was it modified ‘ option and select the specify date option
- Type from date as 1/31/2008 and also type To date as 1/31/2008
- Now hit search and wait for all the exe’s to show up.
- Once search is over select all the exe files and shift+delete the files, caution must be taken so that you don’t delete the legitimate exe file that you have installed on 31st January.
- Also selecting lot of files together might make your computer unresponsive so delete them in small bunches.
- Also find and delete regsvr.exe, svchost .exe( notice an extra space between the svchost and .exe)
Saturday, May 3, 2008
Tuesday, April 15, 2008
Diskpart
DISKPART Utility
Windows XP provides a utility by which u can hide your one or more drives.Using DISKPART Utility, We can do many things, but now explain how to hide the drives but the data in the drive will be remaining same.
Steps:
1. Go to Start > Run > type “DISKPART "(Without Quotes).
DOS Window will appear with following description.DISKPART>
2. Then type "list volume", that will look like this
Volume ### Ltr Label Fs Type Size Status Info
---------------------------------------------------------------------------------
Volume 0 G DVD-ROM 0 B
Volume 1 C FAT32 Partition 5005MB Healthy System
Volume 2 D FAT32 Partition 10000MB Healthy
Volume 3 E FAT32 Partition 10000MB Healthy
Volume 4 F FAT32 Partition 14900MB Healthy
3. If U want to hide drive D then type "select volume 2"Then a message will appear in same window [Volume 2 is the selected volume]
4. Now type "remove letter D"
Now a message will display that [DISKPART Removed the Drive letter]sometime it requires the reboot the computer.
5. Now open the “My Computer” and check that the Drive D is removed from the list of drives displayed in that window.
DISKPART will remove the letter .Windows XP is not having that capability to identify the unknown volume.Don’t afraid your Data will remain same.
DISKPART will remove the Drive letter only not the Data, so the data will remain same.
To display the Drive Letter Repeat the same process.
But in the 4th step instead of typing “remove” type “assign”,
It means type “assign letter D".
Sunday, April 13, 2008
Data Structure
Source Code for Data Structures and Problem Solving Using Java, Third Edition
http://www.cs.fiu.edu/~weiss/dsj3/code/code.html
Virus
http://bleuken.i.ph/blogs/bleuken/2007/06/29/viruses-that-uses-autoruninf/
Disable AUTORUN from Registry
Now you can disable the AUTORUN for all drives by configuring the registry.
Open the registry by typing regedit.exe to the command prompt
(if your still at the command prompt) or execute it in Run.
Look for the HKEY_CURRENT_USER\Software\ Microsoft\Windows\CurrentVersion\Policies\Explorer as shown below:
Double-click the NoDriveAutorun DWORD entry and type the value HEX: FF (255 in Decimal).
(If the NoDriveAutorun does not exists,
you can creat it by right-clicking the right side area of the regedit window,
then click New->DWord Value -> type NoDriveAutorun)
Close the registry and restart the computer.
This procedure will disable all the autorun for all drives of your computer and
at least will prevent the autorun function of infected USB drives or CDs and
avoid the infection of viruses like the Bacalid and RavMon.exe.
======================================
http://www.bloggingindia.net/2007/09/29/enabling-regedit-registry-editor-and-task-manager-taskmgrexe-when-banned-by-administrator/
Enabling regedit and task manager...
Hi all,
How would a person feel when there’s a virus on a system, when he cant access Task manager to end the virus process or access regedit to zoom it to hell? Well, thats exactly what happened to me. All my college computers were inflicted with so many viruses, that even a trio of Norton, Avast and NOD32 couldn’t come to the rescue. And Task Manager was blocked. So was regedit. Apparently, “Task Manager has been disabled by your Administrator” and “Registry editing has been blocked by your Administrator“. My first reaction was to call up the admin and use a few well chosen swear words.
But thankfully, it didn’t come to that, since Windows was Windows, and everything had a back door or two :P . So what do you do to re enable task manager and/or regedit when your admin has blocked them? Follow the few simple steps below -
* Hit Windows+R to bring up Run (Start>Run)
* Type in gpedit.msc and click OK
* For regedit : In the Group Policy window, browse to User Configuration>System and voila, you should have a small entry named “Prevent access to registry editing tools“. Double click that entry. Check the Disabled option, and click OK. Your regedit.exe has just been enabled :) .
* For Task Manager : In the Group Policy window, browse to User Configuration>System>Ctrl+Alt+Del Options and you’ll have an entry titled “Remove Task Manager“. Double click that entry. Check the Disabled option, and click OK. Your Task Manager has just been enabled :) . Go ahead, hit Ctrl+Alt+Del and rejoice :) .
Thats it guys, I hope this has been useful. Oh by the way, this post was intended for purely educational uses. Any damage you create by fiddling with these options are your own fault! Toodles!
UPDATE
gpedit.msc (Group Policy Editor) is not available on Windows XP Home. But it can be installed, by copying the files from a Windows XP Professional system. I’ve included a file which contains the 2 files required to install gpedit.msc on a Windows XP Home PC. Download the file, unzip it, and read the howto.txt file, which contains the instructions. Click here to download the file. Big thanks to Atar for this!
=============================
http://edzzy.i.ph/blogs/edzzy/2008/01/30/how-to-remove-autoruninf-virus/
Autorun.inf virus removal
Autorun.INF is usually used by CD Installers to
autoplay their installations but Hard disks by default should not have AUTORUN.INF
in the drive.
Now, it is possible that your computer is infected by those viruses
if you try to display the content of the your computer through command prompt,
using the dir /ah command.
The said virus hides itself inside a folder named Recycled.
The folder has a hidden/system/read-only attribute,
that’s why you can’t see it if you will use the Search window.
When your system is infected by the said virus,
it infects every drive connected to your PC by dropping VCAB.DLL to the internet
temporary folder and creating the CTFMON.EXE to folder Recyled & AUTORUN.INF
to the root directory of every drive. That’s why when you connect your USB sticks
to the infected PC it will be infected immediately, the USB disks will be the new
carrier for the virus. The program runs every time you start your computer because
it copy itself in the Startup folder of the Start Menu. It also run every time your
insert the infected USB disk and it triggers every time you Double-Click the infected
drive (bcoz of the AUTORUN.INF). The virus infects .EXEs and .DLLs.
To check if your system is infected by the said virus without using an antivirus, do the following steps:
1. Go to command prompt.
2. Type CD\ in drive C to go the root directory
3. Type DIR /AH and press ENTER key. This will display all hidden files in your drive C
4. If you see a file AUTORUN.INF and a folder Recycled, then your system is infected.
5. Try doing this to your USB drive and check if your USB stick contains the same folder and AUTORUN.INF, if it does then your system is really infected..
To remove it download and install a trial version of Trendmicro and scan your system.
To manually remove it (but i’m not recommending it especially if the
infections of Bacalid is very high try using an anti-virus such as McAfee or
TrendMicro’s PCCillin) follow the following steps (This is the step I take when
i repair my computer without an internet connection. Note you should understand
what you’re about to do, you try it at your own risk!)
Boot your system in Safemode
1. Go to command prompt, in Drive C do the following commands.
2. Type -> ATTRIB -H -R -S AUTORUN.INF then press enter
3. Type -> DEL AUTORUN.INF then press enter
4. Type -> ATTRIB -H -R -S Recycled then press enter
5. In Windows Explorer in Safemode, remove the folder Recycled in drive C use Shift-Delete to delete the folder.
6. Repeat Step 3 to 6 for all drives of your system including the USB drive.
7. Search for CTFMON.EXE in your system using the Search of Windows found in Start Menu. If you find a file that is not located in C:\WINDOWS\SYSTEM32, delete it immediately. Dont forget to empty the recycle bin afterwards (Usually the virus will copy itself in the Startup folder of the Startmenu. Check if the file is present there and delete it then.)
To disable autorun of drives (i.e. everytime you double-click a drive or cd or usb, it is auto open) follow the following step:
Click Start->Run->type REGEDIT.EXE
1. Go to this key from the register HKEY_CURRENT_USER\Software\ Microsoft\Windows\CurrentVersion\Policies\Explorer
2. Look for the entry NoDriveTypeAutoRun, double click the entry
3. Type a new value : 0FF (Hex) for the NoDriveTypeAutoRun, this will turn off the AutoRun for all drives, and press ENTER
4. Reboot the system.
Viruses that uses Autorun.INF
There are several viruses that uses the autorun.inf to spread itself such as
the Bacalid (hides itself in ctfmon.exe) and the RavMon.EXE.
These viruses set its file attributes to System+Hidden+Read-Only attributes
so some anti-viruses will have a hard time detecting or finding them.
These viruses save itself in the root directory of every available drives
of the current infected computer and runs itself every time you Double-Click the drive.
In USB Sticks and CDs that are infected by the virus runs automatically especially if drive
autorun is enabled for the current drives (which is usually by default, autorun for drives are enabled).
Disable AUTORUN from Registry
Now you can disable the AUTORUN for all drives by configuring the registry.
Open the registry by typing regedit.exe to the command prompt
(if your still at the command prompt) or execute it in Run.
Look for the HKEY_CURRENT_USER\Software\ Microsoft\Windows\CurrentVersion\Policies\Explorer as shown below:
Double-click the NoDriveAutorun DWORD entry and type the value HEX: FF (255 in Decimal). (If the NoDriveAutorun does not exists, you can creat it by right-clicking the right side area of the regedit window, then click New->DWord Value -> type NoDriveAutorun) Close the registry and restart the computer. This procedure will disable all the autorun for all drives of your computer and at least will prevent the autorun function of infected USB drives or CDs and avoid the infection of viruses like the Bacalid and RavMon.exe
If you want to prevent viruses that uses autorun.inf to infect your USB flash drive, try to do this:
1. Open your flash drive via Command Prompt (do this via Start->Run->cmd.exe)
2. Change your logged drive to your USB flash drive (e.g. if your drive is at drive E: then type E: on the command prompt then press enter)
3. Create a folder named: AUTORUN.INF on the root directory of your flash drive. (to do this type the command: MD\AUTORUN.INF). If an error: a subdirectory already exists… shows, try to follow the instruction above to remove existing autorun.inf before doing this instruction.
The reason why this will avoid future infection is that autorun.inf viruses
usually generates a file autorun.inf. Having an AUTORUN.INF folder on the root
directory of your drives will make virus programs unable to create their own autorun.inf
file, virus can’t even overwrite it because it’s a folder and not a file…
Disable AUTORUN from Registry
Now you can disable the AUTORUN for all drives by configuring the registry.
Open the registry by typing regedit.exe to the command prompt
(if your still at the command prompt) or execute it in Run.
Look for the HKEY_CURRENT_USER\Software\ Microsoft\Windows\CurrentVersion\Policies\Explorer as shown below:
Double-click the NoDriveAutorun DWORD entry and type the value HEX: FF (255 in Decimal).
(If the NoDriveAutorun does not exists,
you can creat it by right-clicking the right side area of the regedit window,
then click New->DWord Value -> type NoDriveAutorun)
Close the registry and restart the computer.
This procedure will disable all the autorun for all drives of your computer and
at least will prevent the autorun function of infected USB drives or CDs and
avoid the infection of viruses like the Bacalid and RavMon.exe.
======================================
http://www.bloggingindia.net/2007/09/29/enabling-regedit-registry-editor-and-task-manager-taskmgrexe-when-banned-by-administrator/
Enabling regedit and task manager...
Hi all,
How would a person feel when there’s a virus on a system, when he cant access Task manager to end the virus process or access regedit to zoom it to hell? Well, thats exactly what happened to me. All my college computers were inflicted with so many viruses, that even a trio of Norton, Avast and NOD32 couldn’t come to the rescue. And Task Manager was blocked. So was regedit. Apparently, “Task Manager has been disabled by your Administrator” and “Registry editing has been blocked by your Administrator“. My first reaction was to call up the admin and use a few well chosen swear words.
But thankfully, it didn’t come to that, since Windows was Windows, and everything had a back door or two :P . So what do you do to re enable task manager and/or regedit when your admin has blocked them? Follow the few simple steps below -
* Hit Windows+R to bring up Run (Start>Run)
* Type in gpedit.msc and click OK
* For regedit : In the Group Policy window, browse to User Configuration>System and voila, you should have a small entry named “Prevent access to registry editing tools“. Double click that entry. Check the Disabled option, and click OK. Your regedit.exe has just been enabled :) .
* For Task Manager : In the Group Policy window, browse to User Configuration>System>Ctrl+Alt+Del Options and you’ll have an entry titled “Remove Task Manager“. Double click that entry. Check the Disabled option, and click OK. Your Task Manager has just been enabled :) . Go ahead, hit Ctrl+Alt+Del and rejoice :) .
Thats it guys, I hope this has been useful. Oh by the way, this post was intended for purely educational uses. Any damage you create by fiddling with these options are your own fault! Toodles!
UPDATE
gpedit.msc (Group Policy Editor) is not available on Windows XP Home. But it can be installed, by copying the files from a Windows XP Professional system. I’ve included a file which contains the 2 files required to install gpedit.msc on a Windows XP Home PC. Download the file, unzip it, and read the howto.txt file, which contains the instructions. Click here to download the file. Big thanks to Atar for this!
=============================
http://edzzy.i.ph/blogs/edzzy/2008/01/30/how-to-remove-autoruninf-virus/
Autorun.inf virus removal
Autorun.INF is usually used by CD Installers to
autoplay their installations but Hard disks by default should not have AUTORUN.INF
in the drive.
Now, it is possible that your computer is infected by those viruses
if you try to display the content of the your computer through command prompt,
using the dir /ah command.
The said virus hides itself inside a folder named Recycled.
The folder has a hidden/system/read-only attribute,
that’s why you can’t see it if you will use the Search window.
When your system is infected by the said virus,
it infects every drive connected to your PC by dropping VCAB.DLL to the internet
temporary folder and creating the CTFMON.EXE to folder Recyled & AUTORUN.INF
to the root directory of every drive. That’s why when you connect your USB sticks
to the infected PC it will be infected immediately, the USB disks will be the new
carrier for the virus. The program runs every time you start your computer because
it copy itself in the Startup folder of the Start Menu. It also run every time your
insert the infected USB disk and it triggers every time you Double-Click the infected
drive (bcoz of the AUTORUN.INF). The virus infects .EXEs and .DLLs.
To check if your system is infected by the said virus without using an antivirus, do the following steps:
1. Go to command prompt.
2. Type CD\ in drive C to go the root directory
3. Type DIR /AH and press ENTER key. This will display all hidden files in your drive C
4. If you see a file AUTORUN.INF and a folder Recycled, then your system is infected.
5. Try doing this to your USB drive and check if your USB stick contains the same folder and AUTORUN.INF, if it does then your system is really infected..
To remove it download and install a trial version of Trendmicro and scan your system.
To manually remove it (but i’m not recommending it especially if the
infections of Bacalid is very high try using an anti-virus such as McAfee or
TrendMicro’s PCCillin) follow the following steps (This is the step I take when
i repair my computer without an internet connection. Note you should understand
what you’re about to do, you try it at your own risk!)
Boot your system in Safemode
1. Go to command prompt, in Drive C do the following commands.
2. Type -> ATTRIB -H -R -S AUTORUN.INF then press enter
3. Type -> DEL AUTORUN.INF then press enter
4. Type -> ATTRIB -H -R -S Recycled then press enter
5. In Windows Explorer in Safemode, remove the folder Recycled in drive C use Shift-Delete to delete the folder.
6. Repeat Step 3 to 6 for all drives of your system including the USB drive.
7. Search for CTFMON.EXE in your system using the Search of Windows found in Start Menu. If you find a file that is not located in C:\WINDOWS\SYSTEM32, delete it immediately. Dont forget to empty the recycle bin afterwards (Usually the virus will copy itself in the Startup folder of the Startmenu. Check if the file is present there and delete it then.)
To disable autorun of drives (i.e. everytime you double-click a drive or cd or usb, it is auto open) follow the following step:
Click Start->Run->type REGEDIT.EXE
1. Go to this key from the register HKEY_CURRENT_USER\Software\ Microsoft\Windows\CurrentVersion\Policies\Explorer
2. Look for the entry NoDriveTypeAutoRun, double click the entry
3. Type a new value : 0FF (Hex) for the NoDriveTypeAutoRun, this will turn off the AutoRun for all drives, and press ENTER
4. Reboot the system.
Viruses that uses Autorun.INF
There are several viruses that uses the autorun.inf to spread itself such as
the Bacalid (hides itself in ctfmon.exe) and the RavMon.EXE.
These viruses set its file attributes to System+Hidden+Read-Only attributes
so some anti-viruses will have a hard time detecting or finding them.
These viruses save itself in the root directory of every available drives
of the current infected computer and runs itself every time you Double-Click the drive.
In USB Sticks and CDs that are infected by the virus runs automatically especially if drive
autorun is enabled for the current drives (which is usually by default, autorun for drives are enabled).
Disable AUTORUN from Registry
Now you can disable the AUTORUN for all drives by configuring the registry.
Open the registry by typing regedit.exe to the command prompt
(if your still at the command prompt) or execute it in Run.
Look for the HKEY_CURRENT_USER\Software\ Microsoft\Windows\CurrentVersion\Policies\Explorer as shown below:
Double-click the NoDriveAutorun DWORD entry and type the value HEX: FF (255 in Decimal). (If the NoDriveAutorun does not exists, you can creat it by right-clicking the right side area of the regedit window, then click New->DWord Value -> type NoDriveAutorun) Close the registry and restart the computer. This procedure will disable all the autorun for all drives of your computer and at least will prevent the autorun function of infected USB drives or CDs and avoid the infection of viruses like the Bacalid and RavMon.exe
If you want to prevent viruses that uses autorun.inf to infect your USB flash drive, try to do this:
1. Open your flash drive via Command Prompt (do this via Start->Run->cmd.exe)
2. Change your logged drive to your USB flash drive (e.g. if your drive is at drive E: then type E: on the command prompt then press enter)
3. Create a folder named: AUTORUN.INF on the root directory of your flash drive. (to do this type the command: MD\AUTORUN.INF). If an error: a subdirectory already exists… shows, try to follow the instruction above to remove existing autorun.inf before doing this instruction.
The reason why this will avoid future infection is that autorun.inf viruses
usually generates a file autorun.inf. Having an AUTORUN.INF folder on the root
directory of your drives will make virus programs unable to create their own autorun.inf
file, virus can’t even overwrite it because it’s a folder and not a file…
Sunday, January 13, 2008
Subscribe to:
Posts (Atom)