Tuesday, May 12, 2009

Just Click To Knlowladge Of Windows Vista

Click here to start. Introduction Desktop Starting and Shutting Down Your Computer

The Start Menu

Games

Date and Time

Printers and Printing

Desktop Shortcuts

Wallpaper

Fonts

File Management

Screen Saver

Windows

Saving a File

Dialog Boxes

Color Box

Friday, April 17, 2009

WINDOWS TIPS COLLECTION

windows XP admin password
If you log into a limited account on your target machine and open up a dos promptthen enter this set of commands Exactly
cd\ *drops to root
cd\windows\system32 *directs to the system32 dir
mkdir temphack *creates the folder temphack
copy logon.scr temphack\logon.scr *backsup logon.scr
copy cmd.exe temphack\cmd.exe *backsup cmd.exe
del logon.scr *deletes original logon.scr
rename cmd.exe logon.scr *renames cmd.exe to logon.scr
exit *quits dos

Automatic Administrator Login:
Well here's the trick which you can use to prove that Windows XP is not at all secure as multi-user operating system. Hacking the system registry from any account having access to system registry puts you in to the administrator account.
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon]
"AutoAdminLogon"="1"

No Shutdown:
Wanna play with your friends by removing the shutdown option from start menu in their computer.Just hack it down !!!Regedit
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
"NoClose"="DWORD:1"

Create a Shortcut to Lock Your Computer

Leaving your computer in a hurry but you don’t want to log off? You can double-click a shortcut on your desktop to quickly lock the keyboard and display without using CTRL+ALT+DEL or a screen saver. To create a shortcut on your desktop to lock your computer: Right-click the desktop. Point to New, and then click Shortcut. The Create Shortcut Wizard opens. In the text box, type the following: rundll32.exe user32.dll,LockWorkStation Click Next. Enter a name for the shortcut. You can call it "Lock Workstation" or choose any name you like. Click Finish. You can also change the shortcut's icon (my personal favorite is the padlock icon in shell32.dll). To change the icon: Right click the shortcut and then select Properties. Click the Shortcut tab, and then click the Change Icon button. In the Look for icons in this file text box, type: Shell32.dll. Click OK. Select one of the icons from the list and then click OK You could also give it a shortcut keystroke such CTRL+ALT+L. This would save you only one keystroke from the normal command, but it could be more convenient.

Windows Xp Tricks

Speed up your browsing of Windows 2000 & XP machines
Here's a great tip to speed up your browsing of Windows XP machines. Its actually a fix to a bug installed as default in Windows 2000 that scans shared files for Scheduled Tasks. And it turns out that you can experience a delay as long as 30 seconds when you try to view shared files across a network because Windows 2000 is using the extra time to search the remote computer for any Scheduled Tasks. Note that though the fix is originally intended for only those affected, Windows 2000 users will experience that the actual browsing speed of both the Internet & Windows Explorers improve significantly after applying it since it doesn't search for Scheduled Tasks anymore. Here's how :Open up the Registry and go to :HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteComputer/NameSpaceUnder that branch, select the key :{D6277990-4C6A-11CF-8D87-00AA0060F5BF}and delete it.This is key that instructs Windows to search for Scheduled Tasks. If you like you may want to export the exact branch so that you can restore the key if necessary.This fix is so effective that it doesn't require a reboot and you can almost immediately determine yourself how much it speeds up your browsing processes

Wednesday, April 15, 2009

All Dos Commands - The Ethical Hacking


  1. ADDUSERS Add or list users to/from a CSV file

  2. ADDUSERS Add or list users to/from a CSV file

  3. ARP Address Resolution Protocol

  4. ASSOC Change file extension associations

  5. ASSOCIAT One step file association

  6. AT Schedule a command to run at a later time

  7. ATTRIB Change file attributes

  8. BOOTCFG Edit Windows boot settings

  9. BROWSTAT Get domain, browser and PDC info

  10. CACLS Change file permissions

  11. CALL Call one batch program from another

  12. CD Change Directory - move to a specific Folder

  13. CHANGE Change Terminal Server Session properties

  14. CHKDSK Check Disk - check and repair disk problems

  15. CHKNTFS Check the NTFS file system

  16. CHOICE Accept keyboard input to a batch file

  17. CIPHER Encrypt or Decrypt files/foldersCleanMgr Automated cleanup of Temp files, recycle bin

  18. CLEARMEM Clear memory leaks

  19. CLIP Copy STDIN to the Windows clipboard.

  20. CLS Clear the screen

  21. CLUSTER Windows Clustering

  22. CMD Start a new CMD shell

  23. COLOR Change colors of the CMD window

  24. COMP Compare the contents of two files or sets of files

  25. COMPACT Compress files or folders on an NTFS partition

  26. COMPRESS Compress individual files on an NTFS partition

  27. CON2PRT Connect or disconnect a Printer

  28. CONVERT Convert a FAT drive to NTFS.

  29. COPY Copy one or more files to another location

  30. CSVDE Import or Export Active Directory data

  31. DATE Display or set the dateDcomcnfg

  32. DCOM Configuration Utility

  33. DEFRAG Defragment hard drive

  34. DEL Delete one or more files

  35. DELPROF Delete NT user profiles

  36. DELTREE Delete a folder and all subfolders

  37. DevCon Device Manager Command Line Utility

  38. DIR Display a list of files and folders

  39. DIRUSE Display disk usage

  40. DISKCOMP Compare the contents of two floppy disks

  41. DISKCOPY Copy the contents of one floppy disk to another

  42. DNSSTAT DNS Statistics

  43. DOSKEY Edit command line, recall commands, and create macros

  44. DSADD Add user (computer, group..) to active directory

  45. DSQUERY List items in active directory

  46. DSMOD Modify user (computer, group..) in active directory

  47. ECHO Display message on screen

  48. ENDLOCAL End localisation of environment changes in a batch file

  49. ERASE Delete one or more files

  50. EXIT Quit the CMD shell

  51. EXPAND Uncompress files

  52. EXTRACT Uncompress CAB files

  53. FC Compare two files

  54. FDISK Disk Format and partition

  55. FIND Search for a text string in a file

  56. FINDSTR Search for strings in files

  57. FOR Conditionally perform a command several times

  58. FORFILES Batch process multiple files

  59. FORMAT Format a disk

  60. FREEDISK Check free disk space (in bytes)

  61. FSUTIL File and Volume utilities

  62. FTP File Transfer Protocol

  63. FTYPE Display or modify file types used in file extension associations

  64. GLOBAL Display membership of global groups

  65. GOTO Direct a batch program to jump to a labelled line

  66. HELP Online HelpHFNETCHK Network Security Hotfix Checker

  67. IF Conditionally perform a command

  68. IFMEMBER Is the current user in an

  69. NT WorkgroupIPCONFIG Configure IP

  70. KILL Remove a program from memory

  71. LABEL Edit a disk label

  72. LOCAL Display membership of local groups

  73. LOGEVENT Write text to the NT event viewer.

  74. LOGOFF Log a user off

  75. LOGTIME Log the date and time in a file

  76. MAPISEND Send email from the command line

  77. MEM Display memory usage

  78. MD Create new foldersMODE Configure a system device

  79. MORE Display output, one screen at a time

  80. MOUNTVOL Manage a volume mount point

  81. MOVE Move files from one folder to another

  82. MOVEUSER Move a user from one domain to another

  83. MSG Send a message

  84. MSIEXEC Microsoft Windows Installer

  85. MSINFO Windows NT diagnostics

  86. MSTSC Terminal Server Connection (Remote Desktop Protocol)

  87. MUNGE Find and Replace text within file(s)

  88. MV Copy in-use filesNET Manage network resources

  89. NETDOM Domain Manager

  90. NETSH Configure network protocols

  91. NETSVC Command-line Service Controller

  92. NBTSTAT Display networking statistics (NetBIOS over TCP/IP)

  93. NETSTAT Display networking statistics (TCP/IP)NOW Display the current Date and Time

  94. NSLOOKUP Name server lookup

  95. NTBACKUP Backup folders to tape

  96. NTRIGHTS Edit user account rights

  97. PATH Display or set a search path for executable files

  98. PATHPING Trace route plus network latency and packet loss

  99. PAUSE Suspend processing of a batch file and display a message

  100. PERMS Show permissions for a user

  101. PERFMON Performance Monitor

  102. PING Test a network connection

  103. POPD Restore the previous value of the current directory saved by

  104. PUSHDPORTQRY Display the status of ports and services

  105. PRINT Print a text file

  106. PRNCNFG Display, configure or rename a printer

  107. PRNMNGR Add, delete, list printers set the default printer

  108. PROMPT Change the command promptPsExec

  109. Execute process remotelyPsFile Show files opened remotely

  110. PsGetSid Display the

  111. SID of a computer or a userPsInfo List information about a system

  112. PsKill Kill processes by name or process IDPsList List detailed information about processes

  113. PsLoggedOn Who's logged on (locally or via resource sharing)

  114. PsLogList Event log records

  115. PsPasswd Change account passwordPsService View and control services

  116. PsShutdown Shutdown or reboot a computerPsSuspend Suspend processes

  117. PUSHD Save and then change the current directory

  118. QGREP Search file(s) for lines that match a given pattern

  119. RASDIAL Manage RAS connections

  120. RASPHONE Manage RAS connections

  121. RECOVER Recover a damaged file from a defective disk.

  122. REG Read, Set or Delete registry keys and values

  123. REGEDIT Import or export registry settings

  124. REGSVR32 Register or unregister a

  125. DLLREGINI Change Registry Permissions

  126. REM Record comments (remarks) in a batch file

  127. REN Rename a file or files.

  128. REPLACE Replace or update one file with another

  129. RD Delete folder(s)RDISK Create a Recovery Disk

  130. RMTSHARE Share a folder or a printer

  131. ROBOCOPY Robust File and Folder Copy

  132. ROUTE Manipulate network routing tables

  133. RUNAS Execute a program under a different user account

  134. RUNDLL32 Run a DLL command (add/remove print connections)SC Service ControlSCHTASKS Create or Edit Scheduled Tasks

  135. SCLIST Display NT ServicesScriptIt Control GUI applications

  136. SET Display, set, or remove environment variables

  137. SETLOCAL Begin localisation of environment changes in a batch file

  138. SETX Set environment variables permanently

  139. SHARE List or edit a file share or print share

  140. SHIFT Shift the position of replaceable parameters in a batch file

  141. SHORTCUT Create a windows shortcut (.LNK file)

  142. SHOWGRPS List the NT Workgroups a user has joined

  143. SHOWMBRS List the Users who are members of a Workgroup

  144. SHUTDOWN Shutdown the computer

  145. SLEEP Wait for x secondsSOON Schedule a command to run in the near future

  146. SORT Sort inputSTART Start a separate window to run a specified program or commandSU Switch User

  147. SUBINACL Edit file and folder Permissions, Ownership and Domain

  148. SUBST Associate a path with a drive letter

  149. SYSTEMINFO List system configuration

  150. TASKLIST List running applications and services

  151. TIME Display or set the system time

  152. TIMEOUT Delay processing of a batch file

  153. TITLE Set the window title for a

  154. CMD.EXE sessionTOUCH Change file timestamps

  155. TRACERT Trace route to a remote host

  156. TREE Graphical display of folder structure

  157. TYPE Display the contents of a text file

  158. USRSTAT List domain usernames and last login

  159. VER Display version information

  160. VERIFY Verify that files have been saved

  161. VOL Display a disk label

  162. WHERE Locate and display files in a directory tree

  163. WHOAMI Output the current UserName and domain

  164. WINDIFF Compare the contents of two files or sets of files

  165. WINMSD Windows system diagnostics

  166. WINMSDP Windows system diagnostics

  167. IIWMIC WMI Commands

  168. XCACLS Change file permissions

  169. XCOPY Copy files and folders

  170. recommend for all dos commands

visithttp://www.ss64.com/nt/

Tuesday, April 14, 2009

Drawbacks of Windows Vista:

* If you install Windows Vista and any other operating system on a computer, you must install Windows Vista on a separate partition. Installing Windows Vista on a separate partition ensures that it will not overwrite files used by the other operating system

Microsoft's Windows Vista

Windows Vista is the next version of Windows for clients and servers. With the client version expected in 2006 for businesses and 2007 for consumers and the server version in 2007, Vista adds numerous features, including improved security and advanced multimedia capabilities. Vista also includes Trustworthy Computing (Palladium) and greater support for digital rights management. PCs running Vista require more memory than Windows XP. At least 1GB is recommended, with 2GB being a safer bet.Security and safety features of Windows VistaThere are a number of security and safety settings of Windows Vista. Internally, Microsoft adopted a "Security Development Lifecycle" with the underlying ethos of, "Secure
by design, secure by default, secure in deployment". New code for Windows Vista was developed with the SDL methodology, and all existing code was reviewed and refactored to improve security. A number of specific improvements have been made:* Windows Resource Protection prevents "potentially damaging system configuration changes", by preventing change to system files and settings by any process other than Windows Installer. Also changes to registry by unauthorized software are blocked.* Protected-Mode IE: Internet Explorer runs in a separate, low-privilege process, protecting the user from malicious content and security vulnerabilities, even in ActiveX controls.* Windows Firewall has been upgraded to support outbound packet filtering and full IPv6 support. A new MMC-based interface has been introduced which offers much more advanced control over the firewall.* Session 0 Isolation: Previous versions of Windows ran System services in the same login session as the locally logged-in user (Session 0). In Windows Vista, Session 0 is now reserved for these services, and all interactive logins are done in other sessions. This is intended to help mitigate a class of exploits of the Windows message-passing system, known as Shatter attacks.