Sunday, December 25, 2011

Windows XP Boot Sequence How a Computer Starts Its Day

Windows XP Boot Sequence  How a Computer Starts Its Day  
 
Ever wonder what happens from the time you turn your computer on until you see the Windows login screen? Let me tell you about it.
When you hit the power button on your computer a whole lot of stuff happens. We call this the boot process. In the days when I first started using computers there was literally a "boot disk", a floppy (5.25" not a 3.5") disk that told the system where to go and what to do so that the operating system would start up. Since then the boot sequence has become somewhat more complicated. So let me take you thru the steps the computer takes to get started. For my example I'm going to use a Windows XP system.
  1. First is the POST, this stands for Power On Self Test, for the computer. This process tests memory as well as a number of other subsystems. You can usually monitor this as it runs each test. After that is complete the system will run POST for any device that has a BIOS (Basic Input-Output System). An AGP has its own BIOS, as do some network cards and various other devices.
  2. Once the POST is complete and the BIOS is sure that everything is working properly, the BIOS will then attempt to read the MBR (Master Boot Record). This is the first sector of the first hard drive (called the Master or HD0). When the MBR takes over it means that Windows is now in control.
  3. The MBR looks at the BOOT SECTOR (the first sector of the active partition). That is where NTLDR is located, NTLDR is the BOOT LOADER for Windows XP. NTLDR will allow memory addressing, initiate the file system, read the boot.ini and load the boot menu. NTLDR has to be in the root of the active partition as do NTDETECT.COM, BOOT.INI, BOOTSECT.DOS (for multi-OS booting) and NTBOOTDD.SYS (if you have SCSI adapters)
  4. Once XP is selected from the Boot Menu, NTLDR will run NTDETECT.COM, BOOT.INI and BOOTSECT.DOS to get the proper OS selected and loaded. The system starts in 16-bit real mode and then moves into 32-bit protected mode.
  5. NTLDR will then load NTOSKRNL.EXE and HAL.DLL. Effectively, these two files are windows XP. They must be located in %SystemRoot%System32.
  6. NTLDR reads the registry, chooses a hardware profile and authorizes device drivers, in that exact order.
  7. At this point NTOSKRNL.EXE takes over. It starts WINLOGON.EXE that in turn starts LSASS.EXE, this is the program that display the Logon screen so that you can logon.

Monday, October 31, 2011

*** Edit PDF files directly - download pdfpen ***

Edit PDF files directly - download pdfpen





Pdf files are read only files and editing those is not an easy task. You have to covert it in some other form to edit. PDF is Portable Document Format which is a non editable document format.

If you want to edit PDF files and do not want to waste your time in converting this in some editable format and then edit and then convert to PDF, you need to download pdfpen which is a nice tool for pdf editing.

First of all, it lets you easily edit PDF files, which is great, when you have to frequently work with this type of files and you don't want to spend too much time with converting them all the time.

In addition to the fact that it lets you edit PDF files in different ways, PDFpen also provides you a lot of fancy features, such as Evernote integration or AppleScript support. Not to mention the fact that it uses the OCR technology beautifully.

Download Here:

http://mac.softpedia.com/progDownload/PDFpen-Download-981.html

Thursday, October 13, 2011

How to hack with Trojan | Prorat tutorial



How to hack with Trojan | Prorat tutorial


Prorat a famous trojan for hacking system, facebook, gmail, yahoo, twitter and other accounts. Today i wil show you step by step guide to hack with Prorat.


First of download Prorat from the given link
http://www.prorat.net/downloads.php


Then disable your antivirus. It is necessary other wise your downloaded trojan will be detected and deleted. Don't worry, it will not harm your system at this stage.


Now run Prorat.exe
You will see the prorat window. There are so many options but you have to create a server first. 


So click on create server.
There will be 3 options

  1. Create Prorat server
  2. Create Downloader Server
  3. Create Cgi Victim List & usage



now click on create prorat server


A new window will popup. which will have a lots of options in side bar.

  • Notifications
  • General settings
  • Bind with Files
  • Server extnsions
  • Server Icons



You have to use all options one by one to create a server.
Now in Notofication. Mark on Use Mail Notification and enter your email id. there will be a default id. Erase it and enter your. Then Test. It will send a testing mail to your email. Check your spam too.


Then Go to general settings and select all the options which you want to have in your trojan.


Then go to Bind with file and select file to bind your trojan with.
At last select your server extension and icon. Then click on Create server.
Now you have created a server.


Send this server file to the victim you want to hack, but before sending this file to victim make it FUD (Fully UnDetectable) with FUD cryptors. Search for this website for FUD articles. 
after creating server FUD, it is ready to send to the victim.


Send this file to the victim. If the victim will run the server in the system, Trojan server will send you the notification email with the IP address of the victim. Use this ip and run your prorat.


At the top there is an option for IP and port. Enter thr IP and port and click on connect.
wait to connect.
After getting connected to the victim's system.. you can use any of the options available on the prorat to hack the user's system

***Cryptography***

Cryptography

If you are familiar with hacking, you know the name of MD5 or Digital signature. These are parts of cryptography. I am writing this post because today i have my semester exam of cryptography, and i think as a hacker you must know about cryptography. Cryptography is a science and art of securing data by changing it in a coded form by some encoding method.
ex-

When Julius Caesar sent messages to his generals, he didn’t trust his messengers. So he replaced every A in his messages with a D, every B with an E, and so on through the alphabet. Only someone who knew the “shift by 3” rule could decode his messages.



 this was an practical example of cryptography. This is also use in securing data on the network. Cryptography is the science of information security.



Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient.


Plain text: Message in it's original form 
Cipher Text: Encoded message
Key: a sequence of bit used in encryption and decryption
Encryption: Algorithm of encoding Plain text to cipher text using key.
Decryption: Algorithm of decoding Cipher text to Plain text using key.

A cryptographic algorithm works in combination with a keyr to encrypt the plaintext. The same plaintext encrypts to different ciphertext with different keys. The security of encrypted data is entirely dependent on two things: the strength of the cryptographic algorithm and the secrecy of the key.

Types of Cryptography:

Symmetric key cryptography or Secret key Cryptography: In a symmetric cipher, both parties must use the same key for encryption and decryption.  This means that the encryption key must be shared between the two parties before any messages can be decrypted. Symmetric systems are also known as shared secret systems or private key systems.


Asymmetric key cryptography or public key Cryptography: In an asymmetric cipher, the encryption key and the decryption keys are separate. In an asymmetric system, each person has two keys. One key, the public key, is shared publicly. The second key, the private key, should never be shared with anyone. When you send a message using asymmetric cryptography, you encrypt the message using the recipients public key. The recipient then decrypts the message using his private key. That is why the system is called asymmetric.

This was the simple introduction of cryptography. I will write more on various cryptographic algorithms and hash functions used in cryptography.

Hash algorithms:  Hash algorithms are based upon one way hash function.
y=f(x) is said to be one way if for every x it is easy to find y but for a given y it is computationally infeasible to get x.
Cryptographic hash function is a mathematical transformation that takes a message m of any length and produce a corresponding message digest (a number of fixed length) of fixed length.
for any two messages m1 and m2:
h(m1) != h(m2) NOT EQUAL

Friday, October 7, 2011

****Download Torrents using IDM****

•Go to Torrific.com
•Sign UP with your Email there and you will have a free access to that site.
•Just grab that torrent that you want to download with IDM or any of your installed download Accelerator
... ...
When you have selected the torrent that you want to download that is grabbed the torrent that you want to download with IDM or any of your installed Download Accelerator, reach to the last step where the option comes to download. Yes, come to that torrent’s page where the Download button Occurs. Right click on that download button and copy link location.

Create Download Torrents link for IDM
•Now you have the download link of that torrent. Now you have to copy/paste that download link on the torrific site.

•After pasting the link,click on GET.

•After clicking on GET, you will be redirected to a page saying initiate bittorent transmission.

Click that button and that torrent will start Caching and it will take time to complete caching. When this procedure gets over that means your torrent is ready to download, it will turn it into blue colour and then just after that click on that download link and your Download will start with IDM or any of the installed Download Accelerators.

Wednesday, October 5, 2011

How to Update Your Computer's BIOS


A computer's Basic Input-Output System (BIOS) is embedded software on a motherboard that will control attached hardware. It provides an operating system with information about hardware, and is designed to support a specific range of components. The BIOS itself is typically an EEPROM, or Electronically Erasable Programmable Read-Only Memory, that is programmed with "firmware" and has the ability to save small amounts of information specific to user configurations. BIOS components are often soldered to the motherboard and therefore not serviceable by the user. Still some of these can be inserted into a socket, allowing its replacement.


All BIOS components are serviceable via a firmware upgrade that is known as "flashing" this process is called "updating the BIOS". The process itself is fragile since any power fluctuation during a flash may irrevocably corrupt a BIOS' firmware. Great care will need to be taken in order to safely accomplish this.

This guide will help you flash your BIOS by taking precautions and walking you through each step. Not all computers will have the same BIOS manufacturer, let alone the same process, but many have similar steps and precautions.

Steps :

1 :Determine your needs. Did someone help you update the BIOS last month? Maybe the BIOS has never been updated since you purchased your PC years ago. Will an updated version fix a problem you are experiencing? Answers to these questions will help determine if you need to verify version numbers and whether an update is necessary. Not all BIOS updates are necessary, but for the hardware enthusiast, obtaining the latest BIOS may equate to better performance.

 
2:  Determine your system's origins. This is an important first step to determine where to locate and download the correct BIOS update version.

 
For Desktops, did you purchase this computer as a bundled, pre-built system, or was it assembled from purchased components? The larger, more popular manufacturers and builders include companies such as Dell/Alienware, HP/Compaq, IBM, Lenovo, Sun, Gateway,Acer, etc. For these, visit the manufacturer's site. For a custom system built from purchased components, visit the motherboard manufacturer's website.
For laptops, visit the laptop manufacturer's site, such as Dell/Alienware, HP/Compaq, Acer, Toshiba, etc.

3:  Discover what update methods are available.Discover what update methods are available. Not all BIOS updates are performed in the same manner. The desktop or laptop system or motherboard manufacturer determined in the steps above provide support information about BIOS update methods they offer. Some motherboards can be updated by executing a program from the operating system level after booting from the hard disk. In other cases the system must be booted from a floppy disk; CD or USB thumb drive (using software supplied by the system or motherboard vendor). Some manufacturers will use their own custom application to update the BIOS, others will use a third party utility to update the BIOS while booted from the legacy DOS operating system. The latter may be split into two different files, or bundled together as a CD or floppy image with an extracting application. Download the appropriate updating software and BIOS from your manufacturer's website.

4 : Backup your existing BIOS first! If using BIOS update software executed from Windows or another operating system, backup the existing BIOS image first. Some BIOS update software versions have this functionality built-in (e.g., "Save" or "Backup"), and will advise you to perform a backup first.

5 : Perform the update. Run the downloaded installer or application executable for the BIOS updating software. If the software prompts you for a floppy, use a formatted 1.44MB 3.5" floppy disk. It doesn't matter if the floppy is blank or not because the data will be overwritten if you don't mind wiping the disk.

  • a.) .If using a floppy, insert it into the drive and restart the system to boot from it. Some floppy images contain an "autoexec.bat" file to automatically run the BIOS update. Others will just have the update software, the updated BIOS image, and possibly a 'readme' text file containing directions. If there are no directions, but there are at least two files (ie: "A06_123.bin" and "awflash.exe"), follow this example: Enter a command such as "awflash A06_123.bin" and press enter. This will execute the update software and specify the A06_123.bin file to flash the BIOS.
  • b).Compare the two versions. Most BIOS update software will read the existing BIOS image and determine its version, then compare this to the downloaded BIOS image. If the system's existing BIOS version is older, perform the update. The user interface of BIOS software may vary greatly, yet typically menu buttons or selections such as "Write", "Update", or "Confirm" will perform the BIOS update.

6 Power cycle the computer after the update is completed. Many update programs will automatically power cycle the computer. Some will request your permission to do so while others will warn about this before starting the update. A few will prompt you to power cycle the system yourself. If you're forced to handle this yourself:
  • 1.Completely power down the PC by either pressing the power button or initiating the power off sequence from the operating system.
  • 2.Flip the master power switch on the back of your PC to the off position, if applicable.
  • 3.Wait a minute.
  • 4.Flip the master power switch back into the on position, if applicable.
  • 5.Power up the PC.

7 : Clear the existing BIOS settings.Clear the existing BIOS settings. Only clear the BIOS if recommended. This is not always necessary, depending on what features have changed between the existing version and the updated version. When the PC is powering up, immediately initiate execution of the BIOS utility. For most systems, this is done by pressing DEL

 
on the keyboard within the first 2 - 10 seconds of turning the computer on. Other systems might use other keys such as

 F2
 
F10
 
CTRL
 
ENTER
 
, etc. If you don't know the keystroke sequence for entering the BIOS utility, watch the monitor to see if the computer displays it. To clear the BIOS settings, look for an option to "Restore Defaults" or "Load Fail-Safe Defaults". This may be on the main page of the BIOS utility or on the last page of a tabbed menu. Use the arrow keys to navigate, and follow the on-screen instructions. When complete, save the settings and exit the BIOS utility.

8 : Configure the BIOS. If you know the settings you want, change them now. If you have never changed BIOS settings before, it is not required to do so. Most PCs will function just fine using the default BIOS settings.


TIPS :

Edit TipsBIOS updates may be released to fix existing bugs, add support for new hardware and standards or add functionality. Read the release notes or other documentation for the BIOS update you're considering to see if the update will benefit your PC.

 
If your system is currently working well, perform a BIOS update only if you're willing to part with it (for an extended period of time) in the event of a critical failure. System builders and motherboard manufacturers will often repair systems and motherboards that failed to take a BIOS update, provided they are still under warranty. Yet, this process is a lengthy one, often involving the following steps:
  • Contact technical support and verify the problem is related to the BIOS update.
  • Obtain a Return Merchandise Authorization (RMA) or similar tracking number.
  • Ship the product back to the builder or manufacturer
  • Wait for approval (testing) and repair or replacement. 
  • Wait to receive the product shipped back to you.

 
If the BIOS firmware has become corrupted and you have a similar motherboard with the same CPU socket and a BIOS chip of the same type, you may be able to recover your corrupt BIOS if you are willing to risk the other BIOS chip. See How to Repair Corrupted BIOS Firmware

 

 

Warnings:
 
  • Make sure to obtain the BIOS upgrade software from a reliable source. Downloading a BIOS from sources other than the manufacturer's web site is risky. For example, versions from the same BIOS software developer for one manufacturer's motherboard may not work on a different manufacturer's motherboard. Using the wrong BIOS or version might "brick" the board, thereby requiring either a BIOS replacement or reprogramming of the BIOS by the manufacturer and rendering the computer unable to boot until that is done.
  • Make sure the electrical power source is reliable when flashing a BIOS. Any sizable fluctuation or loss of power during a flash process can corrupt the BIOS. Therefore, never power down or reset a PC when flashing the BIOS. If flashing the BIOS from a booted OS, first disable all unnecessary applications and background processes.
Avoid updating the BIOS unless you know exactly what you are doing. Failure to follow a manufacturer's directions and precautions may corrupt the BIOS as well.

How To Repair the Master Boot Record In Windows XP

Repairing the master boot record on your Windows XP system is accomplished using the fixmbr command, available in Recovery Console. This is necessary when the master boot record has become corrupt due to a virus or some kind of damage.
Follow these easy steps to repair a damaged master boot record in Windows XP.

Time Required: Repairing the master boot record on a Windows XP system takes less than 15 minutes

Here's How:


1.Enter Windows XP Recovery Console.
2.When you reach the command prompt (detailed in Step 6 in the link above), type the following and then press Enter.
fixmbr

3.The fixmbr utility will write a master boot record to the hard drive that you're currently using to boot into Windows XP. This will repair any corruption or damage that the master boot record may have.

4.Take out the Windows XP CD, type exit and then press Enter to restart your PC.
Assuming that a corrupt master boot record was your only issue, Windows XP should now start


How To Restore NTLDR and Ntdetect.com From the Windows XP CD

The NTLDR and Ntdetect.com files are important system files that are used by your computer to start the Windows XP operating system. These files can become damaged, corrupted or deleted for a number of reasons and are usually brought to your attention by the "NTLDR is Missing" error message.

Follow these easy steps to restore the damaged/corrupted or missing NTLDR and Ntdetect.com files from the Windows XP CD using the Recovery Console.

Time Required: Restoring the NTLDR and Ntdetect.com files from the Windows XP CD usually takes less than 15 minutes


Here's How:

1.Enter Windows XP Recovery Console.
2.When you reach the command prompt (detailed in Step 6 in the link above), type the following two commands, pressing Enter after each one:
copy d:\i386\ntldr c:\copy d:\i386\ntdetect.com c:\In the command listed above, d represents the drive letter assigned to the optical drive that your Windows XP CD is currently in. While this is most often d, your system could assign a different letter. Also, c:\ represents the root folder of the partition that Windows XP is currently installed on. Again, this is most often the case but your system could be different.
3.If you're prompted to overwrite either of the two files, press Y.

4.Take out the Windows XP CD, type exit and then press Enter to restart your PC.

Assuming that missing or corrupt versions of the NTLDR and/or Ntdetect.com files were your only issues, Windows XP should now start normally.

How To Repair or Replace Boot.ini in Windows XP

The boot.ini file is a hidden file that is used to identify in what folder on which partition and on which hard drive Windows XP is located. Boot.ini can become damaged, corrupted or deleted for a number of reasons and is usually brought to your attention by an error message.


Follow these easy steps to repair the damaged/corrupted boot.ini file or replace it if it has been deleted.


Time Required: Repairing or replacing the boot.ini file usually takes less than 10 minutes


Here's How:

1.Enter Windows XP Recovery Console. The Recovery Console is an advanced diagnostic mode of Windows XP with special tools that will allow you to restore the boot.ini file.

2.When you reach the command line (detailed in Step 6 in the link above), type the following command and then press Enter.

bootcfg /rebuild

3.The bootcfg utility will scan your hard drives for any Windows XP installations and then display the results. Follow the remaining steps to add your Windows XP installation to the boot.ini file.

4.The first prompt asks Add installation to boot list? (Yes/No/All).

Type Y in response to this question and press Enter.

5.The next prompt asks you to Enter Load Identifier:.

This is the name of the operating system. For example, type Windows XP Professional or Windows XP Home Edition and press Enter.

6.The final prompt asks you to Enter OS Load options:.

Type /Fastdetect here and press Enter.

7.Take out the Windows XP CD, type exit and then press Enter to restart your PC.


Assuming that a missing or corrupt boot.ini file was your only issue, Windows XP should now start normally.

How To Restore Hal.dll From the Windows XP CD

The hal.dll file is a hidden file that is used by Windows XP to communicate with your computer's hardware. Hal.dll can become damaged, corrupted or deleted for a number of reasons and is usually brought to your attention by the "missing or corrupt hal.dll" error message.

Follow these easy steps to restore the damaged/corrupted or missing hal.dll file from the Windows XP CD using the Recovery Console.

Time Required: Restoring hal.dll from the Windows XP CD usually takes less than 15 minutes


Here's How:

1.Enter Windows XP Recovery Console.

2.When you reach the command line prompt (detailed in Step 6 in the link above), type the following and then press Enter:

expand d:\i386\hal.dl_ c:\windows\system32

Using the expand command as shown above, d represents the drive letter assigned to the optical drive that your Windows XP CD is currently in. While this is most often d, your system could assign a different letter. Also, c:\windows represents the drive and folder that Windows XP is currently installed on. Again, this is most often the case but your system could be different.

3.If you're prompted to overwrite the file, press Y.

4.Take out the Windows XP CD, type exit and then press Enter to restart your PC.

Assuming that a missing or corrupt hal.dll file was your only issue, Windows XP should now start normally.



Tuesday, September 27, 2011

email spoofer

Send Email from any email ID

email spoofer which can cross spam filter











There are many email spoofing websites. You can also host your own fake email sender script too. But this one is something different. You are able to send email from any email id and that will surely be in the sender's inbox not in the spam. I got this spoofing website from one of my friend.





Features:







1.Email Doesn't go in spam folder

2.Instant delivery of emails

3.With Attachment Support

4.With HTML Editor

5.And Many Other Features







Go and send fake mails

http://emkei.cz/





warning: Please do not use this website for any type of cyber crimes. don't use it in illegal works.

call spoofing

If you want to fool your friends or want to see the demo of call spoofing, i have a better call spoofing service. It has many services. You can do prank calls, spoof caller id, change your voice during call. When you call someone he will see the number which you want him to see. This service is easy to use.


follow these steps:

1.Select the country you are calling from, choose the CallerID you want to display and enter the number you want to call.

2.Press "Get me a code" and we will provide you with number to call and a code.

3.Call the number

4.Enter the code and we will connect your call to your friend with the CallerID and voice you have selected.







Warning: Do not use this for any crime.





click to use this service here:

http://www.crazycall.net/

Monday, September 26, 2011

Windows 8

Windows 8 as you all know is yet to be released in the public but its developer preview version is released and being downloaded by many geeks around the world to test the new ultimate windows.

So you can download the official developer preview versions for Windows 8 from Microsoft's servers, so click on the link according for 32-bit version and your download will start automatically.

http://wdp.dlws.microsoft.com/WDPDL/9B8DFDFF736C5B1DBF956B89D8A9D4FD925DACD2/WindowsDeveloperPreview-32bit-English.iso

Saturday, September 24, 2011

How to configure a VPN connection to your corporate network in Windows XP Professional

This step-by-step article describes how to configure a virtual private network (VPN) connection to your corporate network in Microsoft Windows XP Professional. A VPN connection is a connection that uses both private and public networks to create a network connection.

Both Point-to-Point Tunneling protocol (PPTP) or Layer Two Tunneling Protocol (L2TP) are automatically installed on your Windows XP-based computer. These protocols help provide security when you access resources on a network by connecting to a remote access server through the Internet or other network. This kind of connection is known as a VPN connection.

How to create a new VPN connection

  1. Click Start, click Control Panel, click Network and Internet Connections, and then click Network Connections.
  2. Click Create a new connection, and then click Next.
  3. Click Connect to the network at my workplace, and then click Next.
  4. Click Virtual Private Network connection, and then click Next.
  5. Type a descriptive name for your company, and then click Next.
  6. Click Do not dial the initial connection, and then click Next.
  7. Type the host name or IP address of the computer where you are connecting, and then click Next.
  8. Use one of the following methods:
    • Click Anyone's use if you want to share the connection with all users.
    • Click My use only if you do not want to share the connection.
  9. Click Next, and then click Finish.
Note This method works when you are connected to the Internet only.

How to modify an existing dial-up connection

You may have to modify some of the parameters in your dial-up connection to successfully connect to the Internet. To make these modifications, follow these steps:
  1. To open an existing connection, click Start, click Control Panel, click Network and Internet Connections, and then click Network Connections.
  2. Click the connection, and then click Change settings of this connection.
    • On the General tab, you can change the server name or IP address.
    • On the Networking tab, you can change the type of secure protocol.
    • On the Advanced tab, you can enable Internet Connection Firewall protection to prevent access to your computer from the Internet.

      To do this, select the Protect my computer and network by limiting and preventing access to this computer from the Internet check box.

      Note When you enable Internet Connection Firewall protection to prevent access to your computer from the Internet, you may also create problems with the connection to your server. After you enable Internet Connection Firewall protection, verify that the connection to your server is still working.

      A firewall is designed to help protect your computer from attack by malicious users or by malicious software such as viruses that use unsolicited incoming network traffic to attack your computer. If the connection to your server is working and you decide to disable your firewall, you must disconnect your computer from all networks including the Internet. 

5 steps: How to set up your home wireless network


5 steps: How to set up your home wireless network

You can use a wireless network (WLAN) to share Internet access, files, printers, game consoles, and other devices among all the computers in your home. After you’ve completed the initial wireless router setup and added your computers and devices to the network, you can use your home network to surf the web or to play online games—whether you're sitting in your living room or relaxing in your backyard.
It's easier than ever to set up a wireless network, especially now that Internet access and routers (like Linksys wireless routers and D-link wireless routers) have become widely available.

What you’ll need to set up your wireless network

  • An operating system that supports wireless networking
    The Windows 7 operating system fully supports wireless networking. For Windows Vista users, we recommend installing Windows Vista Service Pack 2 before setting up your wireless network. For Windows XP users, we recommend installing Windows XP Service Pack 3. Use Windows Update to check whether you need the service pack and to install it. Click the Start button, click All Programs, click Windows Update, and then click Check for updates. Although the service packs for Windows Vista and Windows XP are not required for wireless networking, they can make things much easier and can help protect you against hackers, worms, and other Internet intruders.
  • A broadband (DSL or cable) Internet connection
    To set up a wireless network, you need a broadband or high-speed Internet connection (not a dial-up connection) provided by an Internet service provider (ISP), usually for a monthly fee. Two common broadband technologies are Digital Subscriber Line (DSL) and cable technology. These require a DSL modem or a cable modem (often provided by your ISP). After you have an ISP and a modem, you're ready to connect to the Internet.

    Set up a new connection to the Internet:
  • Windows 7 and Windows Vista
  • Windows XP
  • A wireless router, a DSL modem, or a cable modem with built-in wireless networking support
    The router converts the signals coming across your Internet connection into a wireless broadcast, sort of like a cordless phone base station. Newer DSL and cable modems come with integrated wireless networking capability and are called modem routers. If the modem router you received or purchased from your ISP already has wireless capability built in, you do not need to purchase a separate wireless router. Just follow the instructions provided by your ISP for activating your wireless connection.

    If you do need to purchase a wireless router, be sure that you buy a wireless router and not a wireless access point. The Linksys router is a popular router for wireless networks because it’s simple to set up. There are many routers to choose from, for example:
  • Linksys wireless routersD-Link wireless routersCisco wireless routersASUS wireless routersWhile you're looking for a wireless router or other wireless equipment in stores or on the Internet, you might notice that you can choose equipment that supports four different wireless networking technologies: 802.11a, 802.11b, 802.11g, and 802.11n. We recommend 802.11g (Wireless-G) or 802.11n (Wireless-N) because they offer excellent performance and are compatible with almost everything.

    NOTE: If you do not want to buy a wireless router or if you want to connect computers or devices temporarily for a specific purpose, like sharing devices or games, you can set up a temporary wireless network without a router. This is called an ad hoc network.

    Set up an ad hoc network:
  • Windows 7
  • Windows Vista
  • Windows XP
  • A computer with built-in wireless networking support or a wireless network adapter
    If you have a newer computer, you may already have built-in wireless capabilities. If this is the case, you don’t need a wireless network adapter. Here’s how to check whether your computer has wireless support installed:
  • Windows 7 and Windows Vista

  • Click Start, click Control Panel, and then click Network and Internet. If you see any of these words listed, “Wireless,” “WLAN,” “Wi-Fi,” “802.11a,” “802.11b,” “802.11g,” or “802.11n,” your computer has wireless capability installed.
  • Windows XP

  • Click Start, right-click My Computer, and then click Properties
  • In the System Properties window, click the Hardware tab.
  • Near the top of this window, click the Device Manager button.
  • In the Device Manager window, there is a list of hardware components which are installed on the computer. Press the Plus sign (+) to the left of the icon to open the Network adapters item in the list. The Network adapters section of the window expands to reveal a list of all network adapters installed on the computer.
  • If you see any of these words in the list of installed network adapters, “Wireless,” “WLAN,” “Wi-Fi,” “802.11a,” “802.11b,” “802.11g,” or “802.11n,” your computer has wireless network support installed.

  • If your desktop or laptop computer does not have built-in wireless support, you need to purchase a network adapter to wirelessly connect your computer to your wireless router. If you need an adapter for a desktop computer, buy a USB wireless network adapter. If you have a laptop, buy a PC card-based network adapter. Make sure that you have one adapter for every computer on your network.

    NOTE: To make setup easy, choose a network adapter made by the same vendor that made your wireless router. For example, if you find a good price on a Linksys router, choose a Linksys network adapter to go with it. To make shopping even easier, buy a bundle, such as those available from Linksys, Actiontec, D-Link, Netgear, Microsoft, and Buffalo. If you have a desktop computer, make sure that you have an available USB port where you can plug in the wireless network adapter. If you don't have any open USB ports, buy a USB hub to add additional ports.
  • A copy of your router setup instructions
    Before you begin setting up your wireless network, it’s a good idea to make sure that you have the copy of the setup instructions provided by the router manufacturer or your ISP. If you do not have a copy, visit the manufacturer’s website for get instructions on how to set up your router. All routers vary, and you may need to consult the instructions to set up your wireless network using your specific router.
Shopping list
  • Shop for a wireless router
  • Shop for a computer with built-in wireless networking support
  • Shop for a wireless network adapter
After you have everything you need, follow these five steps to set up your wireless network.

1. Connect to the Internet

Make sure that your Internet connection and your DSL or cable modem are working. Your wireless network depends on this connection.

2. Connect your wireless router

These are the steps for connecting a stand-alone wireless router to your DSL modem or cable modem. If you have a modem router, follow your ISP’s instructions for connecting your network.
Since you'll be temporarily disconnected from the Internet, print these instructions before you go any further.
First, locate your cable modem or DSL modem and unplug it to turn it off.
Next, connect your wireless router to your modem. Your modem should stay connected directly to the Internet. Later, after you've hooked everything up, your computer will wirelessly connect to your router, and the router will send communications through your modem to the Internet.

Next, connect your router to your modem:
Note: The instructions below apply to a Linksys wireless router. The ports on your router may be labeled differently, and the images may look different on your router. Check the documentation that came with your equipment for additional assistance. Or do a Bing search on “[your manufacturer/model] wireless router setup” to find images and instructions.
  • If you currently have your computer connected directly to your modem: Unplug the network cable from the back of your computer, and plug it into the port labeled Internet, WAN, or WLAN on the back of your router.
  • If you do not currently have a computer connected to the Internet: Plug one end of a network cable (included with your router) into your modem, and plug the other end of the network cable into the Internet, WAN, or WLAN port on your wireless router.
  • If you currently have your computer connected to a router: Unplug the network cable connected to the Internet, WAN, or WLAN port from your current router, and plug this end of the cable into the Internet, WAN, or WLAN port on your wireless router. Then, unplug any other network cables, and plug them into the available ports on your wireless router. You no longer need your original router, because your new wireless router replaces it.

Next, plug in and turn on your cable or DSL modem. Wait a few minutes to give it time to connect to the Internet, and then plug in and turn on your wireless router. After a minute, the Internet, WAN, or WLAN light on your wireless router should light up, indicating that it has successfully connected to your modem.

3. Configure your wireless router


Using the network cable that came with your wireless router, you should temporarily connect your computer to one of the open network ports on your wireless router (any port that isn't labeled Internet, WAN, or WLAN). If you need to, turn your computer on. It should automatically connect to your router.
Next, open Internet Explorer and type in the URL or address to configure your router.
NOTE: Do this on the computer that you are using to set up your wireless network. The computer automatically links you to the router’s page. If you type the router’s URL on a different computer, typing the address in the navigation bar will not take you to your router’s configuration page.
On the router configuration page, you might be prompted for a password. The address and password you use varies depending on what type of router you have, so refer to the instructions included with your router or on the manufacturer’s website.
For quick reference, this table shows the default addresses, user names, and passwords for some common router manufacturers. If the address is not listed here, you can read the documentation that came with your router or go to the manufacturer's webpage to find it. There may be multiple website addresses you can use.
RouterAddressUsernamePassword3Comhttp://192.168.1.1adminadminD-Linkhttp://192.168.0.1adminadminLinksyshttp://192.168.1.1adminadminMicrosoft Broadbandhttp://192.168.2.1adminadminNetgearhttp://192.168.0.1adminpasswordActiontechttp://192.168.0.1usernamepasswordInternet Explorer shows your router's configuration page, along with the modem IP address and other information. Most of the default settings should be fine, but you need to configure three things:
  • Your wireless network name, known as the SSID. This name identifies your network, and it appears in a list of available wireless networks. You should change the default SSID that your ISP provided and give your network a unique name that none of your neighbors are using. This helps you identify your network, and it can help keep your wireless network secure by preventing it from overlapping with other wireless networks that might be using the default SSID.
  • Wi-Fi Protected Access (WPA or WPA2), which can help protect your wireless network. It’s important to help secure your wireless network by setting up a network security key, which turns on encryption. With encryption, people can't connect to your network without the security key, and all information sent across your network is encrypted so that only computers with the key to decrypt the information can read it. This can help prevent attempts to access your network and files without your permission. Wi Fi Protected Access (WPA or WPA2) is the recommended wireless network encryption method. Wireless encryption (WEP) is not as secure. Windows 7, Windows Vista Service Pack 2, and Windows XP Service Pack 3 support WPA2.

    When you set up most routers (stand-alone routers and modem routers), you are asked to provide a pass phrase that the router uses to generate several keys. Make sure that your pass phrase is unique and long (you don't need to memorize it). Some routers and modem routers now come with a function called Quick Security Setup (or QSS) that automatically issues you a key when you press a button on the router.

    Be sure to keep a hard copy and a digital copy of your network security key and pass phrase, in case you lose or misplace them. You can recover a lost network key or reset it on your router, but these are complicated processes that are different for every router and they sometimes entail setting up your network again.
  • Your administrative password, which controls your wireless network. Just like any other password, it should not be a word that you can find in the dictionary, and it should be a combination of letters, numbers, and symbols. Be sure to save a hard copy and a digital copy of this password, too, because you'll need it if you ever have to change your router's settings.
The exact steps you follow to configure these settings will vary depending on the type of router you have. After each configuration setting, be sure to click Save Settings, Apply, or OK to save your changes.
Get more help making your network secure.
Now, before connecting your computers and devices to the network, you should disconnect the wireless network cable from your computer.

4. Connect your computers, printers, and other devices to the wireless network

You can connect multiple computers, printers, and many other peripheral devices, such as an Xbox, Xbox 360, TV, cell phone, iTouch, or iPad, to your network. Before you connect them to your network, make sure that the computer or device you want to add has built-in wireless networking or a network adapter. Many newer devices have built-in wireless capability. If the computer or device you want to add does not have built-in wireless network support, plug the network adapter into your USB port and place the antenna on top of your computer (in the case of a desktop computer) or insert the network adapter into an empty PC card slot (in the case of a laptop). Windows automatically detects the new adapter and may prompt you to insert the CD that came with your adapter. The on-screen instructions guide you through the configuration process.
Use the following links to find step-by-step instructions for adding your specific computer or device to your network using your operating system. There are instructions for each operating system, and they show you how to automatically or manually add wired (Ethernet) or wireless computers and how to add computers running Windows 7, Windows Vista, or Windows XP. There are also instructions for adding printers and both wired and wireless devices.
  • Windows 7
  • Windows Vista
  • Windows XP
  • Use Windows XP to join a network
  • Add a Windows XP-based computer to your network
  • Windows XP: Add an Xbox or Xbox360 to your network

5. Share files, printers, and more

Now that your computers and devices are connected, you can begin sharing files, printers, games, and much more. One of the top reasons for setting up a home network is to share a printer. Another is to share files. The steps for doing this, however, aren’t always obvious, so here are instructions to get you started:


Start Windows Installer in Safe Mode

  Windows Installer will not work under Safe Mode, this means that programs cannot be installed or uninstalled in safe mode without giving a specific command using msiexec in command prompt.

To make Windows Installer work under safe mode, you need to create a registry entry for every type of safe mode you are logged in to.

1.Safe Mode.
Type this in a command prompt:
REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MSIServer" /VE /T REG_SZ /F /D "Service"

and then

net start msiserver

This will start the Windows Installer Service.

2.Safe Mode with Network

REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\MSIServer" /VE /T REG_SZ /F /D "Service"

and followed by

net start msiserver

This will start the Windows Installer Service.

Add a program in a startup list of windows

startup list of programs in windows is the list of those programs which would start automatically whenever you start your computer.
There are two methods of adding any program to startup list..

  1. add shortcut to startup folder
  2. edit windows registry
add shortcut to startup folder: 


1- go to the start up folder of windows. don't know where it is..
C:\Documents and Settings\All Users\Start Menu\Programs\Startup
here drive c is in my system change it if your windows is in another drive.
or
go to start --> all programs --> start up (double click on this)


2- create a shortcut of your desired program.
right click--> new --> shortcut


3- now open the properties of new created shortcut
right click on shortcut --> properties


4- here you will find an option Run. change it's value to minimize from normal window


5- you have done it. Restart your windows and check it.




edit windows registry


1- open registry editor
 Start--> run and type as "regedit"


2- Navigate to "HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENT VERSION\RUN"


3- Right click on the Run folder


4- Select New ,then select "String value"
then Double click and change the value to your program path.


5- save and exit registry edit


6- Restart the windows.

NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows



NetworkMiner v.1.1 Released


NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis and to regenerate/reassemble transmitted files and certificates from PCAP files. 


The new version supports features such as:

  •  Extraction of Google Analytics data
  •  Better parsing of SMB data
  •  Support for PPP frames
  •  Even more stable than the 1.0 release 
Download Here: