How to create Shutdown/Restart shortcut

Posted by tech master  |  at  2:36 AM

Windows has a program called SHUTDOWN.EXE which allows you to easily create icons to shutdown or restart your computer.

To create a shutdown shortcut on the desktop follow next steps:

1. Right click on an open area of the desktop
2. Select New / Shortcut
3. Enter in "shutdown -s -t 00" - no quotes
4. Press the Next button
5. For the name, enter anything you like - ex. shutdown.
6. Click on the Finish button.

For a reboot shortcut, at (3) enter "shutdown -r -t 00"

Shutdown command and parameters:

Shutdown [{-l|-s|-r|-a}] [-f] [-m [\\ComputerName]] [-t xx] [-c "message"] [-d[u][p]:xx:yy]

-l - Logs off the current user, this is also the default. -m ComputerName takes precedence.
-s - Shuts down the local computer.
-r - Reboots after shutdown.
-a - Aborts shutdown. Ignores other parameters, except -l and ComputerName. You can only use -a during the time-out period.
-f - Forces running applications to close.
-m [\\ComputerName] - Specifies the computer that you want to shut down.
-t xx - Sets the timer for system shutdown in xx seconds. The default is 20 seconds.
-c "message" - Specifies a message to be displayed in the Message area of the System Shutdown window. You can use a maximum of 127 characters. You must enclose the message in quotation marks


Solution:Having problem in submitting tax information in Adsense?

Posted by tech master  |  at  7:44 PM

From past few days i am having a problem in submitting tax information in adsense.
When i click on submit tax information button the page just refreshes.
My friend also has a account on adsense.I said him to login into his account
He has already submitted the tax information.I clicked on tax information
on his account then i clicked on change tax information and there it is i found out the solution,i copied that URL and then login to my account paste that url and it worked.

So what to do

Just login into your adsense account


on url bar

press ENTER

Now you can see tax information page

This Problem finally solved by google today
what is the problem see here


How To Recover Windows Password With Knowing The Current Password

Posted by tech master  |  at  3:24 PM

This method can be used 2 change the password of an xp pc without knowing the current password...follow the steps

Start >> Run >> [type]cmd // this will open your command prompt
[type] net(space)user(press enter)
[type] net(space)user(space)[windowsloginid](space)*(press enter)

// for e.g. : net user HOME *(press enter)

[type] new password (press enter) and retype it (press enter).. it will show u confirmation... // caution it wont show u the password u type.. but it still types.. the blinking pointer will b there at the same place.. but it still works..
// for e.g. : password changed successfully.


50 Cool Computer Pranks

Posted by tech master  |  at  11:06 AM

Products listed here are not designed in any way to damage the end user's machine, and have been written Just for fun!!! So plz use them only fr FUN

1- AddRemove v1.00
2- Avoid v1.01
3- Back Pack Prank
4- Blue Screen of Death Prank
5- Bomb v1.02
6- Buttons Prank
7- Click Me v1.01
8- ClickStart v1.00
9- Clippy v1.00
10- Copy Cursor v1.00
11- Crazy Num Caps Scroll v1.04
12- Cursor Fun v1.01
13- Dirty Mouse v1.00
14- DownHoax v1.02
15- Email Fun v1.00
16- Enhance Your Mouse Prank
17- Exit P Prank
18- Fake Delete v3.05
19- Fake Format v1.05
20- Fake Shutdown v1.00
21- Fake Start Menu 95 v1.00
22- Flasher v1.00
23- Flip It v1.00
24- Floppy Madness v1.00
25- Follow Me v1.00
26- Gas Gripe v1.00
27- HeadAche v1.01
28- Image Capture Prank
29- IQ Test Prank
30- Message Manager Lite v1.06
31- Mouse Droppings v1.00
32- Mouse Move v1.00
33- MouseClicks v1.00
34- Password Prank v1.00
35- Pirated Software v1.00
36- Popup Prank v1.00
37- Print Me v1.00
38- Program - WAV Launcher v1.07
39- Random Burper v1.00
40- Relationship Test Prank
41- ReplaceKeys v1.00
42- Rotate v1.00
43- Screen Screw v1.00
44- Shakedown v1.00
45- Show - Hide Desktop v1.00
46- Swap Mouse Buttons Prank
47- The Finger v1.01
48- Time Traveler v1.00
49- Windows Wordpad Prank
50- Y2K Joke v2.00




Techsense is No. 1 on google

Posted by tech master  |  at  12:40 AM

Today when I looked at my blog traffic, most the the visitors arrived on my post Steps to perform after your site is hacked,and how to prevent it by getting hacked
I checked Google and found my blog is ranking at 1st position on Google for long-tail keyword "Steps to perform after your site is hacked"

You can see the image below for proof :-


How to Rename Multiple Files at once

Posted by tech master  |  at  12:11 AM

When you download photos from your digital camera, they often have unrecognizable names. You can rename several similar files at once with the following procedure. This also works for renaming other types of files.

1.Open the My Pictures folder. (Click Start, and then click My Pictures.) Or open another folder containing files that you want to rename.

2.Select the files you want to rename. If the files you want are not adjacent in the file list, press and hold CTRL, and then click each item to select it.

3.On the File menu, click Rename.

4.Type the new name, and then press ENTER All of the files in the series will be named in sequence using the new name you type. For example, if you type Birthday, the first will be named Birthday and subsequent files in the series will be named Birthday (1), Birthday (2), and so on. To specify the starting number for the series, type the starting number in parentheses after the new file name. The files in the series will be numbered in sequence starting with the number you type. For example, if you type Birthday (10), the other files will be named Birthday (11), Birthday (12), and so on.


Free Rapidshare Premium Account

Posted by tech master  |  at  8:11 PM


How to Add Emoticons to Blogger’s posts

Posted by tech master  |  at  1:47 PM

Everyone knows that emoticons add more value to your blog posts by making the communication between you and your readers more personal. They allow you to express your emotions to your visitors.

For quite sometime, I was looking for a way to add emoticons to Tech Bold as well. By using GreaseMonkey extension for Firefox, it is now possible to use emotions with your blogger blog

GreaseMonkey is a specific extension for Firefox which enable you to add hundreds of other scripts to your Firefox, another good reason to use Firefox instead of Internet Explorer.

What you’ll need to use emoticons in your blogger blog:

* Latest Firefox Web Browser.

* Next you need GreaseMonkey Extension for Firefox. After installing Firefox, install GreeseMonkey Extension from here.

* And the emoticons GreeseMonkey script. Finally install the script by left clicking here.

Now when you’ll be writing your blog post, you should be able to add emoticons by simply clicking on them. This only works in compose mode, not in text/html mode.


View Deleted/Removed YouTube Videos

Posted by tech master  |  at  12:34 AM

How is thispossible? Well when a video has been removed from YouTube, it is not immediately deleted from their servers. Just like our hard drive. When we delete a file and empty the recycle bin, is it not really deleted. It is only marked as deleted and is ready to be overwritten. So if it is not being overwritten, we can still view the videos but of course not from

Viewing removed YouTube videos is easy. Here's how to do it.

First of all, you need to know the Video ID which is at the end of the YouTube link. An example of a YouTube video link is

The video ID for the link above is UzeV1Ux5YlI

Just copy and paste it in the ID text box and click view video. Here are a few sites that is able to play deleted YouTube videos. Surprisingly, they are all not the same. I've tested a deleted video ID on all 3 sites but one of it reported that it could not find deleted video. So if you desperately need to watch a deleted video, try on all of the sites and you might get to watch it.

1. UndeleTube

- A normal deleted youtube video viewer. Works well.

2. DeletedYoutubeViewer

- This is a bit special compared to the other two because you are able to search for deleted YouTube video through the VideoID or YouTube User. If you know the user that uploaded the deleted video, you can search the user name.

3. Delutube

I did not like this site so much because there are full of advertisements. Before get to watch a video, I need to wait 4 seconds. Not only that, this is the site that couldn't find the deleted youtube video that I am looking for.


Make Your Internet Speed As Fast as Possible

Posted by tech master  |  at  2:16 AM

Here are Registry Tweaks and Scroll down to see Patches

1.Increase bandwidth by tweaking QoS in Windows XP Pro

The following tweak applies only to Windows XP Professional edition.

The default system behavior is that all 100% bandwidth is available, however, if there is a running application that indicates to the OS it needs to send high priority/real time data, then as long as it has the socket open, Windows XP will restrict “best effort” traffic to 80% of the bandwidth so that high priority traffic can be accommodated. Basically, applications can make this request to the operating system for QoS support using the QoS application programming interfaces (APIs) in Windows and this only applies if a specific app is requesting QoS.

If you'd like to change how much bandwidth is reserved for QoS (the default is 20% of the total bandwidth), do the following:

1. Make sure you're logged in as "Administrator" (not just any account with admin privileges).
2. Navigate to START>Run and type: gpedit.msc
3. Navigate to Local Computer Policy > Administrative Templates > Network > QOS Packet Scheduler
4. In the right window, double-click the limit reservable bandwidth setting
5. On the setting tab, check the enabled setting.
6. Where it says "Bandwidth limit %", change it to read 0 (or whatever percentage you want to reserve for high priority QoS data)
7. Click OK, close gpedit.msc

Under START > My Computer > My Network Connections > View Network Connections, right-click on your connection and under Properties (where it lists your protocols), make sure QOS Packet Scheduler is enabled.

The tweak desribed below helps boost priority for DNS & hostname resolution in general. What this means is, it helps web pages load faster, and has negligible effect on downloads (not counting the couple of ms gain with the host resolution at connect-time).

Applying this tweak assumes some proficiency in editing the Windows Registry using Regedit (Start > Run > type: regedit). As always, backup your Registry before making any changes so you can revert to the previous state if you don't like the results.

2.Host Resolution Priority Tweak
host name resolution priority
Windows 2k/XP

First, open the Windows Registry using Regedit, and (after backing up) navigate to:

Note the following lines (all hex dwords):
Class = 008 (8) - indicates that TCP/IP is a name service provider, don't change.

LocalPriority = 1f3 (499) - local names cache
HostsPriority = 1f4 (500) - the HOSTS file
DnsPriority = 7d0 (2000) - DNS
NetbtPriority = 7d1 (2001) - NetBT name-resolution, including WINS

What we're aiming to do is increase the priority of the last 4 settings, while keeping their order. The valid range is from -32768 to +32767 and lower numbers mean higher priority compared to other services. What we're aiming at is lower numbers without going to extremes, something like what's shown below should work well:

Change the "Priority" lines to:
LocalPriority = 005 (5) - local names cache
HostsPriority = 006 (6) - the HOSTS file
DnsPriority = 007 (7) - DNS
NetbtPriority = 008 (8) - NetBT name-resolution, including WINS

Windows 9x/ME

The tweak is essentialy the same as in Windows 2000/XP, just the location in the Registry is slightly different. For a more detailed description see the Windows 2000/XP section above.

Open the Windows Registry using Regedit, and (after backing up) navigate to:

You should see the following settings:


The "priority" lines should be changed to:

Reboot for changes to take effect.

In addition to the tweaks already covered in Win 2k/XP Registry Tweaks and More Win 2k/XP Tweaks, the Windows XP Service Pack 2 introduces a few new issues covered in the article below. Please make sure you understand what you are doing before making any changes to your Operating System. Note the information below only applies to Windows XP Service Pack 2.

3.Remove the limit on TCP connection attempts

Windws XP SP2 introduces a few new twists to TCP/IP in order to babysit users and "reduce the threat" of worms spreading fast without control. In one such attempt, the devs seem to have limited the number of possible TCP connection attempts per second to 10 (from unlimited in SP1). This argumentative feature can possibly affect server and P2P programs that need to open many outbound connections at the same time.

Rant: The forward thinking of Microsoft developers here is that you can only infect 10 new systems per second via TCP/IP ?!?... If you also consider that each of those infected computers will infect 10 others at the same rate:
second 1: 1+10 computers
second 2: 10+10*10 computers (110 new ones)
second 3: 10+100*10 computers ( 1110 new ones)
second 4: 10+1000*10 computers (11110 new ones)
all the way to 10*60 + 10^60 computers in a single minute (that's a number with 60 digits, or it would far exceed Earth's population). Even if we consider that 90% of those computers are unreachable/protected, one would still reach ALL of them within a minute.

In other words, even though it is not going to stop worm spreading, it's going to delay it a few seconds, limit possible network congestion a bit, and limit the use of your PC to 10 connection attempts per second in the process ! I have no problem with the new default setting limiting outbound connection attempts. Still, users should have the option to easily disable or change this setting. I might be going out on a limb here, but ever since the introduction of Windows XP I can't help thinking that I dislike all the bult-in Windows "wisardry" in a sense that the system also limits user access. That irritating trend to ease the mental load on end users is somewhat insulting, considering that Windows is to make the more "intelligent" choice instead of the end user, as well as limit their access to tuning such settings...
End of rant.

With the new implementation, if a P2P or some other network program attempts to connect to 100 sites at once, it would only be able to connect to 10 per second, so it would take it 10 seconds to reach all 100. In addition, even though the setting was registry editable in XP SP1, it is now only possible to edit by changing it directly in the system file tcpip.sys. To make matters worse, that file is in use, so you also need to be in Safe mode in order to edit it.

You only need to worry about the number of connection attempts per second if you have noticed a slowdown in network programs requiring a number of connections opened at once. You can check if you're hitting this limit from the Event Viewer, under System - look for TCP/IP Warnings saying: "TCP/IP has reached the security limit imposed on the number of concurrent TCP connect attempts". Keep in mind this is a cap only on incomplete outbound connect attempts per second, not total connections. Still, running servers and P2P programs can definitely be affected by this new limitation. Use the fix as you see fit.

To change or remove the limit, you can use the following program:

Event ID 4226 Patcher v2.11

- A patching program for removing or changing the limit imposed on connection attempts in SP2. The patcher has the ability to restore tcpip.sys back to the original... Still, you might want to back up tcpip.sys, use it at your own risk. The author of this patch can be reached @

4. Recommended settings for Windows 2000 / XP
Windows 2000 & XP, unlike NT supports large windows as described in RFC1323 ( the 'RcvWindow' has a maximum value of 2**30 rather than 64K), and includes some other improvements over its predecessors you can use to speed up any TCP/IP transfers. , the descriptions and other options are added to provide you with better understanding and enable you to customize your settings.

All the following entries, unless otherwise noted should be placed in the Windows 2000/XP Registry under the key



The value of TCP Window in the Windows 2000 Registry is DWORD, representing number of bytes, with range from 0 to 2^30. The recommended values (in red) optimize TCP for any high speed Internet connection and work best in most cases, however if you'd like to use a custom value follow these guidelines:

For best results, the TCPWindow should be a multiple of MSS (Maximum Segment Size). MSS is generally MTU - 40, where MTU (Maximum Transmission Unit) is the largest packet size that can be transmitted. MTU is usually 1500 (1492 for PPPoE connections). To determine the MTU value of your ISP, check out the Advanced Registry Editing section of our site.

There are three places in the Windows 2000 Registry where you can add the TCP Window parameter.

GlobalMaxTcpWindowSize="256960" (DWORD, number of bytes) Valid range is from MSS to 2^30. Add the value as a decimal. Note: For best results RWIN has to be a multiple of MSS lower than 65535 times a scale factor that's a power of 2, i.e. 44 x 1460 = 64240 x 2^2 = 256960. If you choose to use a RWIN lower than 65535, you can simply make it multiple of MSS and turn scaling off (Tcp1323Opts=0)

TcpWindowSize="256960" (DWORD, number of bytes) Valid range is from MSS to 2^30. Add the value as a decimal. TcpWindowSize can also exist under TcpipParametersInterface - if added at this location, it overrides the global setting for this particular . Note (10/20/00): Seems MS has found another bug in Windows 2000, the TCPWindowSize should be configured with the global setting (GlobalMaxTcpWindowsSize) rather than this one - Q263088

Note: For best results RWIN has to be a multiple of MSS lower than 65535 times a scale factor that's a power of 2, i.e. 44 x 1460 = 64240 x 2^2 = 256960. If you choose to use a RWIN lower than 65535, you can simply make it multiple of MSS and turn scaling off (Tcp1323Opts=0)


Tcp1323Opts is a necessary setting in order to enable Large TCPWindow support as described in RFC 1323. Without this parameter, the TCPWindow is limited to 64K.

Tcp1323Opts="1" (DWORD, recommended setting is 1. The possible settings are 0 - Disable RFC 1323 options, 1 - Window scaling but no Timestamp options, 3 - Window scaling and Time stamp options.)

Note: Tcp1323Opts="3" might help in some cases where there is increased packet loss, however generally you'll achieve better throughput with Tcp1323Opts="1", since Timestamps add 12 bytes to the header of each packet.


DefaultTTL determines the time in seconds and the number of hops a packet lives. While it does not directly affect speed, a larger value increases the amount of time it takes for a packet to be considered lost, discarded and retransmitted. A value that's too small can cause packets to be unable to reach distant servers at all.

DefaultTTL="64" (DWORD, recommended setting is 64. Other settings that are widely used are 128 and 32)


When set to 1 (True), TCP attempts to discover MTU automatically over the path to a remote host. Setting this parameter to 0 causes MTU to default to 576 which reduces overall performance over high speed connections. Note that this setting is different than our Windows 9x recommendation.

EnablePMTUDiscovery="1" (DWORD - boolean, valid settings are 0-->False and 1-->True. Many connections perform better with this entry at 1, however, if you prefer to set your upstream to send fixed 1500 packets, you might want to use 0 instead). When set at 1, establishing connections and initial transfer speed might slow down a bit, however you will get better throughput if somewhere in the path large packets need to be fragmented.


Setting this parameter to 1 (True) enables "black hole" routers to be detected, however it also increases the maximum number of retransmissions for a given segment. In most cases you'd want to keep BHDetect to 0 (False).

EnablePMTUBHDetect="0" (DWORD - boolean, valid settings are 0-->False and 1-->True. Recommended setting is 0)


This parameter controls whether or not SACK (Selective Acknowledgement) support is enabled, as specified in RFC 2018. SACK is especially important for connections using large TCP Window sizes.

SackOpts="1" (DWORD - boolean, recommended setting is 1. Possible settings are 0 - No Sack options or 1 - Sack Option enabled).


This parameter determines the number of duplicate ACKs that must be received for the same sequence number of sent data before "fast retransmit" is triggered to resend the segment that has been dropped in transit.

TcpMaxDupAcks="2" (DWORD - range 1-3, recommended setting is 2).


This Includes

Description: Generic patch for Windows XP and Windows 2000 (all versions). This patch will optimize your TCP/IP Registry settings for high speed Internet connections. To install, extract the .inf file first, then double-click (or right-click on filename and choose install from the pull-down menu) and reboot for changes to take effect.

Description: Generic patch for Windows XP/2000 and DSL connections using PPPoE. This patch will optimize your TCP/IP Registry settings for high speed Internet connections. It is specifically designed for PPPoE DSL connections. To install, extract the .inf file first, then double-click (or right-click on filename and choose install from the pull-down menu) and reboot for changes to take effect.


Description: Patch Windows 2k/XP not to cache failed DNS entries. By default, when a DNS lookup fails (due to temporary DNS problems), Windows still caches the unsuccessful DNS query, and in turn fails to connect to a host regardless of the fact that the DNS server might be able to handle your lookup seconds later. This patch fixes the problem by configuring the DNS client to continue sending queries to an unresponsive network. To install, save to your HD, unzip the .reg file, then double-click the filename.

Web Patches - faster loading of Web Pages

The following patch increases Web page loading speed, by doubling the number of possible concurrent open connections. For example, imagine a web page has 20 images and some text - in order for your browser to get all these files, it opens 2 or 4 concurrent connections, depending on the Web server. Increasing the number of open connections allows for faster retrieving of the data. Please note that the patch sets some values outside of the HTML specs. If you decide to install it, backup your Registry first. Changes will take effect after you reboot. Download the patch appropriate for your OS:

OS: Windows 9x/ME

OS: Windows 2K/XP/2k3



Description: The TCP Optimizer is a free, easy Windows program that provides an intuitive interface for tuning and optimizing your Internet connection. Just download and run, there is no installaion required. The program makes it easy to find the best MTU and RWIN values, test latency and tweak all the important broadband related registry parameters. The Optimizer can be helpful with tuning any Internet connection type, from dialup to Gigabit+



Steps to perform after your site is hacked,and how to prevent it by getting hacked

Posted by tech master  |  at  3:52 PM

The server configuration discussed here is Linux/Apache with cPanel.The general steps will be the same on any server, but the specifics will differ.
There's a good chance you came to this page because your website was hacked and you want to know how to clean it up.
Step-by-step repair after a website hack

This will probably take several days. Don't think it's going to be easy.
1) Log into cPanel

If the line at the top that says, "Last login from: IP address" is not your IP address from the last time you logged in, write it down. It is probably the hacker.
2) Change passwords for cPanel and for publishing

Use strong passwords. A password MUST NOT BE a single word that is in any human language dictionary, and it SHOULD NOT CONTAIN any real word. It should be random characters.
a) If you publish with FrontPage, change your FrontPage password first:

1. Open your local copy of your site in FrontPage
2. Click the Remote Web Site tab and log in
3. Click Open your Remote Web site in FrontPage (this will open a new copy of FrontPage with your remote site in it)
4. Click Tools > Server > Change Password. Whenever you get a password prompt during this procedure, it wants the old one. It doesn't want the new one until it asks for it.

After changing the FrontPage password...
b) Log in to your webhosting account and change the password there

Some webhosts might use cPanel for this. Others might have a separate login for password changes. Consider changing the passwords for your email accounts, too.
3) If it is a dire emergency, take your website offline

If the hacker inserted extremely offensive pages or installed a virus, protect your visitors and your reputation by taking your site offline.
While it's closed, you likely won't be able to access your site through FrontPage. That's why you changed your FrontPage password before taking the site offline.
4) Enable log archiving in cPanel

1. Go to cPanel > Raw Log Manager.
2. Check the "Archive Logs..." box.
3. Uncheck the "Remove the previous month's archived logs..." box.
4. Click Save

If log archiving was off at the time of the hack, it may be too late to see the original hack. However, if the hackers come back, their activity might now be logged, allowing you to identify their IP address.
5) Find and remove all files installed by the hack

This describes an ideal cleanup operation. Will you be able to fully complete every step? Probably not.
If your site isn't huge, you might save a lot of trouble by deleting everything inside your public_html folder and republishing your entire site from a backup copy. You'll still need to inspect your root directory (above public_html) and its other subdirectories for damage.
5a) Get a complete list of all the files in your website

There are three methods (Sections 5a, 5b, 5c). For most purposes, this first cron job method will be easier to review in detail than the other two methods.
You probably don't have direct access to Linux on your server to create a directory listing, but you can create a cron job that will do it. It is the equivalent of the DOS command dir /s.

1. Go to cPanel > Cron jobs > Standard.
2. Enter the email address where you want the output sent,
3. Enter the command line to run. The switches are case-sensitive, so use exactly this capitalization:
ls -1aFlqR
Here it is in upper case to make the letters distinct, but this command is NOT the same as the one above. Don't use it: LS -1AFLQR.
The switches for the ls command are described at and
4. Make selections in all the other fields to specify a time several minutes in the future.
5. Click "Save Crontab".
6. After it runs, go back to Cron Jobs > Standard and delete this job.

The email will contain a listing with lines that look like the following examples for one directory and one file:

drwxr-x--- 33 user user 4096 Feb 5 20:51 public_html/
-rw-r--r-- 1 user user 16669 Feb 5 20:51 index.htm

A brief explanation:

d indicates a directory
The 3 groups of 3 (rwxrwxrwx) are permissions for User, Group, World.
r, w, x stand for Read, Write, Execute a program or Enter a directory.

Walkthrough of the above:

public_html above is a directory.
The User (owner, me) can read, write, or Enter that folder.
The Group (that I am member of) cannot Write to that folder (thus the "-" where the w would be)
The World (everyone else) has no permissions here ("---"). (I know that seems odd for public_html, but the reasons why are not useful here.)
index.htm, the home page:
User can Read or Write.
To everyone else (Group and World), the file is Read-only.
The user fields should show only your hosting account userID or some other ones that are obvious system names.
The numbers are file sizes.
The timestamps are timestamps.
There is further explanation in this post at Lunarforums.

How to use the listing:

7. If you have a file list like this that you made before the hack, compare the two lists to identify files in the new listing that don't belong.
8. If you don't have a prior list to compare against, review the new list for files that seem out of place. See What To Look For, below.

5b) Examine your site's files in cPanel > File Manager

If you can't use the cron job method, this is an alternative, but navigating up and down the directory tree will get very tedious very fast.

In File Manager, file and folder permissions are shown numerically. R=4, W=2, X=1. The permission level for a user is the sum, so the maximum a user can have is 7. If, for example, the User has RW, but Group and World only have R, then the permissions will be: 644.
5c) Examine your site's files using FTP

With an FTP view of your website, the folders and files look like what you are used to in Windows Explorer. FTP view is available using Internet Explorer 6 or 7 and Windows Explorer. FTP view is easy to navigate, but it doesn't show file and folder permissions.

a) FTP by IE6

In the IE6 address bar, type the FTP address for your site. It is probably something like: or If you don't get a login prompt, click File > Login As...

b) FTP by IE7

Help for this is available in IE7 Help (F1) > Contents > FTP.

1. Open Tools > Internet Options > Advanced
2. Make sure "Enable FTP folder view (outside IE)" is checked.
3. Click OK.
4. In the IE7 address bar, type the FTP address for your site.
5. Ignore the error page.
6. Click Page > Open FTP site in Windows Explorer...
7. At the FTP Folder Error dialog box, click OK.
8. Click File > Login As... to obtain the login prompt.

c) FTP by Windows Explorer

1. Enable the address bar (View > Toolbars > Address bar). You may need to unlock the toolbars, relocate, and resize it.
2. In the address bar, type the FTP address for your site.
3. At the FTP Folder Error dialog box, click OK.
4. Click File > Login As... to obtain the login prompt.

5d) What to look for

Regardless of the method you used to get your file list, look for and repair the following. If hacked pages contain clues such as URLs that will help identify the hacker, copy and save the useful text somewhere before you repair the page:

* Files you know don't belong there. Some hacks install files with ridiculously obvious names like hacked.html or vulnerable.php, etc. Other files might have nonsensical names or names consisting of random character strings. Some files might be in locations that make them suspicious, like a .php file in your /images folder.

Be watchful for any files you don't recognize, but be careful because some of them are probably required for your site to function properly and you just never noticed them before. You cannot just delete all the files you didn't put on the site. Determine whether each one is malicious or not. When in doubt, try a web search on the filename or post a question in a forum where other people can tell you if that file is normal.
* Check your root directory ("/") and its subdirectories for malicious or altered files. Inspect everything carefully. Even if you delete the contents of your public_html and republish the site from scratch, this doesn't overwrite your folders above public_html, so you must check those manually.
* Find and remove malicious scripts. Look especially for PHP and CGI scripts that you didn't create. Inspect existing PHP and other plain text scripts for signs of tampering. Backdoor scripts left in place can allow the hackers back in even after you've changed your password.

When in doubt, it is safest to stop using scripts you suspect might have been weak, especially ones you wrote yourself, until you can examine them and determine that they're safe. Rename or delete them so the hacker can't continue to access them by their previous names.
* Pages with modified dates more recent than you last saved the page yourself. Inspect the text and replace the file with a backup copy, if necessary.
* If you publish with FrontPage HTTP, it appears that whenever you publish any files, the timestamp of every .htm file on the site is set to the time of the publish. So in this case your timestamps may all be identical, except for hacked pages.

6) Check all file and folder permissions

Using the complete file list you made, or File Manager, make sure all file and folder permissions are what they should be. When in doubt, you can compare the permissions of similar or neighboring files and folders. A hacker is unlikely to bother with changing all permissions. Review the brief "RWX" explanation above and apply common sense. Your site visitors are "World", so World needs Read access to files they are supposed to see. World should almost never have Write access to anything. Although different hosts might have different rules, common permissions for world-accessible folders are 755, and common permissions for world-accessible files are 644. It is left to you to figure out why. If you start running across what look like permissions hacks, you will need to do some studying and some detailed investigation of each file and folder.
A hacker can modify file or folder permissions to allow them to get back in even after you clean up everything else in your site. If they can get Write permission to one folder, they can upload exploit scripts to it and run them.
7) Change your passwords again

In case someone was "watching" inside your site while you did it the first time, do it again now that you know the site is clean.
8) Try to identify the hacker's IP address

Stats programs like Analog, Webalizer, or AWStats are not going to be helpful here because they generate aggregated statistics. You need detail.
cPanel > Web/FTP Stats > Latest Visitors is useful and easy. It is a good place to go when you first notice the hack, but it is only a start. You really need the full raw logs.
a) If you have never used your site's raw access logs before:

You website's raw access logs are stored and sent to you as gzipped files. If you don't have a program that will extract *.gz files, get the 7-Zip program from It is a command line utility that you run from a "DOS box" (aka "Command Prompt").
b) Get your logs from cPanel > Raw Log Manager

1. Go to cPanel > Raw Log Manager
2. Click the name of the file you want to download.
3. At the Open or Save prompt, click Save. Use a descriptive filename. Save the file to a folder that will be easy to navigate to in a Command Prompt. C:\TEMP works well.
4. Open a Command Prompt:
Start > All Programs > Accessories > Command Prompt, or
Start > Run > cmd.exe
5. Go to the folder where you saved the .gz file: cd \temp
6. Type the command line to extract the .gz file:
7za.exe x filename.gz
7. You should get a report that says "Everything is Ok".
8. I usually delete the .gz file and rename the output file to .log.
9. WordPad is best for viewing these log files as text. Set the font to a monospaced font, with word wrap Off.
10. You can import your HTTP (regular) log file into the Webstats.mdb Access database. It won't import your FTP log.
11. The HTTP log will also import into Excel, but you will need to tweak the text import wizard settings to get the fields into their columns properly.
12. The FTP log is probably best viewed as text.

Go through the logs carefully. If log archiving was on at the time of the hack, look for suspicious activity in the days prior to the hack. Keep watching the logs in case the hackers come back.
Your regular log will show HTTP accesses, your normal site visitors. Mixed in with all the visitors and legitimate robots, you could find a person or robot GETting pages in an abnormal browse sequence (not following links on your site) or trying to GET pages that don't exist on your site. They might be seeing if your site has particular pages that are part of widely used scripts that are known to have vulnerabilities. Look for HTTP POST activity. Not all POSTs are suspicious, though. If you use PHP, look for requests that attempt to inject code or variables into the page:
GET /index.php?inc=

Your FTP log will show FTP accesses, one way that hackers can download your pages, modify them, and upload them back to your website. The only IP addresses in the FTP log should be yours and other authorized FTP users.
In both logs, check the field called REMOTE_USER, User, or UserID. In the HTTP log, this field is blank ("-") most of the time. Where it does have a value, make sure it's your UserID and that the IP address is yours. Make sure the timestamps on the accesses match the times you were logged in.
c) Use .htaccess or cPanel > Deny IP to block the hacker's HTTP access to your site

If you identified the hacker's IP address, one site where you can look it up to get more information about it is
You can ban the hacker's IP address from your site using your public_html/.htaccess file. Apache documentation for this is at:
Review the instructions in a prior article for how to open .htaccess for editing. As described there, insert the following line in a part of the file that is not enclosed in HTML-like tags.

deny from nnn.nnn.nnn.nnn

The nnn's are the IP address to block.
If the hacker returns with a different IP that is in the same IP range (i.e. using the same ISP), you can block the whole range for a while, although that carries the risk of banning legitimate visitors, too.

The Apache documentation has instructions for banning a range. Some IP ranges are easily specified using a simple wildcard notation. Others ranges can only be successfully defined using "CIDR/netmask" notation. Although it looks intimidating, it's easy after the first time you do it. I have a separate article describing how to calculate and use the CIDR/netmask.

d) If the hacker has obtained access to your cPanel or FTP, banning their IP address in .htaccess will NOT keep them out of cPanel and FTP.

If they have scripts that they call by HTTP, it will prevent them from doing that, but only until they log into cPanel and un-ban themselves in .htaccess.
9) Investigate what made the hack possible

It might be obvious or it might require detective work. The section below on hack prevention describes some common avenues of attack. It is important to identify how they got in so you can prevent the next attack. For example, if they got in through a vulnerable script, and you don't rewrite or update the script, all the work you've done to this point is useless because they can come right back and wreck your site again.

Three common avenues:

1. Old versions of third party scripts with known vulnerabilities. Make sure you are using the latest versions of software for forums, image galleries, blogs, and everything else.

If you do all your installations through Fantastico, you can check your versions at cPanel > Fantastico > Installations overview.

Otherwise, the version is usually shown on the pages generated by the script, so go to your gallery, blog, or forum, and look around. Then compare the version to the latest one being distributed at the website for that software.
2. The site password was easy to crack.
3. Homebrew PHP or CGI scripts were flawed and had security holes. Make sure the settings in your php.ini file are as secure as possible.

10) Report or go after the hacker legally?

You can try, but your chances of getting anywhere with it might not be great.
Hacking is a violation of the terms of service for any legitimate web host or ISP. If you can prove that someone is using a particular IP address for hacking, you could report the incident to the web host or ISP in hopes that they might shut the perpetrator down. The contact email is often abuse@ the company.
What to do BEFORE your website is hacked, so it doesn't get hacked
What is a hack?

A hack occurs when someone gets write access to your server so they are able to modify, add, or delete pages.
Many people ask, "How could my site have been hacked? The hacked page was 100% pure HTML."
The answer is that the modification of the page wasn't the hack. The hack was when they got write access to the server. Modifying the page was simply the thing they chose to do after they got in. Once they get in, they can do ANYTHING with your site that you can do, including alter static pages.
Why do they do it?

The goal of most site hacks is to use vulnerable sites to make money. It is a business enterprise. They can:

* Use your site's mail server to send spam.
* Insert links to their own sites, visible or invisible. The links from your site to theirs bring traffic and also boost their site's rankings in search engines.
* Insert their AdSense code onto your site's pages so clicks are credited to them.
* Put phishing pages on your site to try to obtain confidential information from your visitors.
* Use your server to host illegal content.
* Add viruses, adware, or spyware to your site so it's downloaded onto your visitors' computers to try to obtain their confidential information.

Fun, challenge, prestige, or malice

There are hackers who deface sites individually, but it's time-intensive to hack sites one by one. Occasionally a site is hacked by someone who dislikes the site or its owner. These are not the major threats.
How do they do it?
Some examples:

* Automated web crawlers cast a wide net, identifying websites with a specific security weakness. For example, if a popular script is found to have a vulnerable page called forminfo.php, the crawler will visit every website it knows about, issuing a request to GET forminfo.php. If the request returns a code 404 (Page Not Found), then it moves on. If the page returns a code 200 (Success), the website becomes a target, either by a human hacker or by a computer program that executes the steps to exploit the weakness and install the hacker's files onto the site.
* Crawl the web searching the source code of web pages for PHP or CGI scripts with names commonly used by email forms handlers. When one is found, an automated procedure starts sending it input to test whether the script can be tricked into sending spam to third parties.
* Automated password cracking programs hammer at cPanel logins until the correct user ID and password combinations are found. People who create their own passwords are remarkably predictable, and the algorithms used for password cracking are remarkably sophisticated.

Steps to prevent hacking
1) Always use strong passwords

If you don't know what a strong password looks like, go to The third row on that page ("63 random alpha-numeric characters") contains the types of characters to use for cPanel passwords. Pick the first, or any, 8 chars from that row. Any password that does not look like the ones you see on that page are bad.

* In cPanel, only 8 characters are significant, so use all 8. Use a mixture of upper and lower case letters and digits. Special characters (punctuation, etc.) do not seem to be allowed by cPanel.

The #1 threat to your website is internet attackers. There are thousands of them, and they will definitely try to damage your website if they get in. That is why you MUST use strong passwords that are difficult to crack. This must be the FIRST consideration.

Write down your strong password so you don't forget it. People sometimes avoid strong passwords because they've heard passwords should never be written down. That rule was for Defense Department workers who had to worry about Soviet spies. You don't. You have to worry about internet hackers. Writing down your strong password is only a trivial security risk. Using a weak password because that's the only kind you can remember is a huge security risk.

Keep your written passwords appropriately safe for your situation. Do you have mischievous children? Don't leave passwords lying around where they can find them. Malevolent coworkers? Don't leave passwords in your desk drawers. Do you habitually lose your wallet or purse? Well then, don't keep them there, either. Take whatever precautions are necessary for YOUR situation.
If you have a userID associated with your hosting account, keep that as secret as possible, too, because a hacker needs it to log in as you. Don't post it in forum messages.
About strong passwords:
2) Don't weaken your server's file and folder permissions

* Do not modify the file and folder permissions on your server until you know what you're doing. Study the permission settings carefully. Don't guess.

Each folder and file on your Linux server has a set of permissions that determine who can read or write that file, execute that program, or enter that folder.
One mistake in a file or folder permission can allow a hacker to get into your site, and they won't even need your password to do it.
3) Keep third party scripts up to date

If you use popular third party scripts like Coppermine, WordPress, SMF, vBulletin, phpBB, or any others, get on a mailing list or visit forums where updates are announced. When a security update is released, install it without delay.
When a vulnerability is found in a commonly used script, it is likely to be exploited soon by a lot of hackers because it gives them access to a large number of sites.
4) Write your own scripts securely

* Be aware of the potential security risks of each language you use.
* For PHP, use a php.ini file to block some common avenues of attack.
* Don't use potentially insecure features of any language until you've studied and understand them. There are lots of online resources for learning how to code securely.

A vulnerable script can give hackers access to your user database and financial or other confidential or data.

* All data that comes into your script from the outside world poses a potential security risk. If your script takes input from a user or from passed parameters in a URL string or from a cookie, the input needs to be checked for validity, tested to determine if it contains injection exploit code, and cleaned ("escaped") before you use it to include a file or access a database.

5) Block suspicious accesses with .htaccess

If you detect especially suspicious activity in your logs, you can block the IP addresses by using cPanel > Deny IP or with the appropriate code in your .htaccess file. Don't be overzealous, though. It takes experience to learn what's really suspicious and what's just unfamiliar, and accidentally blocking legitimate visitors is bad public relations. Besides, if your site is otherwise secure, the probes to find security holes will fail, anyway.
6) Keep spyware off your computer. Prevent password interception.

* If you use a wireless network, make sure it is not open to eavesdroppers.
* Keep your computer free of spyware such as keyloggers.
* If you're worried about your password being intercepted between you and your server, use encrypted https to log in to your server.

Preparations that will make hack diagnosis easier

1) Turn on log archiving in cPanel

Periodically delete the accumulated logs so they don't consume all your hard drive space.

2) Get a complete list of your site files while they are known-good

This will be a baseline list of all the files that are supposed to be in your website. After a hack, it will help you decide whether a file you don't recognize is related to the hack or is a required system file that you just never noticed before.

3) Explore your website and become familiar with what is there

Not just your pages, but the whole site, using FTP or File Manager. Get used to what is normal so things that aren't will catch your attention.
How to know if you've been hacked

1) Whenever you log into cPanel,

Make sure "Last login from:" at the top of the screen shows your IP address from the last time you logged in.

2) Be alert for anything unusual when reviewing your

* Access logs,
* Usage reports in Webalizer, AWStats, Google Analytics, ...
* Site data at Google Webmaster Central, (Google account and login required)
* Site data at Yahoo! Site Explorer. (Yahoo! account and login required)

Watch for occurrences of

* Unusual page names that you know you didn't put on your site,
* Referrals or backlinks coming from weird sites or bad neighborhoods,
* Any indications that your site has pages it shouldn't have, or connections to other sites that it shouldn't have any connection with.

3) If your position in Google falls suddenly or if you drop out of the index,

one possible cause is that an exploit made modifications to your pages. Google sometimes notifies webmasters when they suspect a site has been hacked: They'll try to contact you by any email address they can discover in their files or on your site. If Google discovers that your hacked site is now trying to distribute viruses or other badware, they sometimes also warn visitors about it when they try to go to your site from a search results page.

4) On search engine result pages (SERPs), make sure the text snippets for pages from your site consist of text you know is on those pages.

5) Use your browser's View Source feature occasionally to look for invisible links in the HTML of your pages.

6) Check your site's safety report and outlinks at


How to convert a Folder into a Drive

Posted by tech master  |  at  10:25 PM

Here's a trick which allows you to use any folder as a drive in Windows. This trick comes very handy when you use a particular folder often, and want to quickly access it like in Command Prompt. It actually adds a new drive in My Computer with your specified drive letter(whatever you specify) and that drive actually points to your designated folder. Once you open the drive, you can access the folder.

The DOS command SUBST is used to create a virtual drive allowing you to add any file path and used as a drive.

SUBST [drive1: [drive2:]path]

drive1: Specifies a virtual drive to which you want to assign a path.
drive2: Specifies a physical drive and path you want to assign to a virtual drive.

For example, to create a virtual drive with a specified path:

* Find a folder you want to use as a drive and remember its path. For demonstration i will be using ‘H:\sid’ as the path.
* Open Command Prompt and type “subst drive-letter path”
* For example, type “subst z: H:\sid” and press Enter.

Now you can easily access that folder by just typing z:

Removing the Virtual Drive:

To remove the virtual drive, go to Command Prompt, and type subst z: /D.

/D Deletes a substituted virtual drive.


Prevent your blog posts from being copied

Posted by tech master  |  at  2:07 PM

Just download the script from below and then
Sign into Your blogger account
Go to Layout>add gadget>HTML/javascript
paste the code there
now your blog posts are safe.

Download script


How data can be stored in bacteria ?

Posted by tech master  |  at  9:47 PM

Normally whenever you think of data storage, the choices that would come to your mind are Hard Disks, flash drives, CD/DVD etc . However the researchers in Japan don’t think that way . The see something that is very much smaller and much more durable – Bacteria , yeah I am talking about those microscopic organisms which you studied about in your Biology class.

The concept behind

Japanese researchers are developing methods to store the data in Bacteria . According to Keio University professor Masaru Tomita who heads the team of researchers , the four characters - T , C , A , G that represents the genetic coding in DNA works much like digital data . Character combinations can stand for specific letters and symbols — so codes in genomes can be translated, or read, to produce music, text, video and other content.

What can be the advantage

And the good think is that information will be available as long the species stays alive – possible a million years . The team has successfully inserted into a common bacterium Albert Einstein’s Famous ‘E equals MC square’ equation . But mutation could distort stored data, Tomita says data are stored in four places in the bacteria so the data stay intact .

So imagine if this thing becomes possible , data storage will become so cheap as bacteria are all around us , you just need to catch one . And if you are lucky you might catch a bacteria which was lost by someone else and could contain movies etc.


How to make stunning fractal images

Posted by tech master  |  at  2:04 AM

While browsing through wallpapers at interfacelift, I stumbled across a simple but very powerful program - Apophysis 2.0, a free factal based image generator. Get it from here You can also dowload these extra flames and gradients to spice up your images

Ok, install and fire up apophysis . First of all, we'll go through the options.

I don't understand most of the stuff here, but JPEG Quality is pretty self explanatory.

The next tag, display, deals with the onscreen preview. You can explore the other tags if you want.

After this, we have to load some scripts which tell Apophysis how to generate its images. Click on Scripts > Open, and load any of the provided script. There are various methods for generation, such as spiral, symmetrical, etc. Play around with a few. Once you've selected a script, click the "Play" button to process it.

The various different flames in that script will appear in the left pane. Double click on any to see the preview. The timers in the lower left corner will show the time elapsed and time remaining to generate the preview.

Now comes the fun part These four buttons let you tweak the bejezus out of your flame

The Editor is the least fun of them, as we have no clue to whats happening. Just drag the triangles around to check out the real-time changes. The timer at the bottom will show time left for the main preview. You can also move the corners of the triangles to change their shapes. Right clicking on triangles gives options like Flip.

Gradient controls the colors of the flame. There are a number of presets for you to play with. If you want to add your own, click on the "Smooth gradient" button.

It lets you select any image, and picks up colors from that. Pretty cool

You would not notice that the word "rotate" is actually a button. Aprt from the shiftingthe gradient, you can also play with the HSV and contrast, as well as blur and frequency. Its the awesomeness

Adjust lets you play with overall gamma and brightness. You can also move around and zoom in orout with the camera controls.

The best of them all, Mutate The center image is your current flame, while the surrounding 8 are variations, based on the type you select from the "trend" dropdown. Clicking any of the variation moves it to the center, and the new mutations are based from this one.
Lowering the speed makes the mutations stay similar to the original, while increasing it would cause a man who just become a father to call on his divorce lawyer.

Finally, after you've had enough, click on File>Export Flame to render the image.


Type in hindi without learning it

Posted by tech master  |  at  12:23 AM

Before this day I have never typed in hindi. Even though my mother tongue is Hindi and Hindi is the one spoken language that I am comfortable with , I still have never typed in it. English being the only language which I can type fast!

But Not anymore

Introducing Google's transliteration tool - Using which anyone can type in Hindi, without learning anything. Follow the step-by-step instructions to get this thing working in your computer


1. First click here to see the tool in action . type like you talking in hindi. Something like - aur bhai kaisa hai?. The tool will then show its magic ;) , automatically changing the text to और भाई कैसा है?

2. Now comes the 'making-this -useful' part.

3. Open firefox. If you haven't downloaded it yet, do so. Remember that Internet explorer is a piece of garbage and more importantly right now we require Firefox for english-to-hindi. So get it from here.

4. make sure to open firefox now..

5. After you have downloaded and installed firefox) -Click here. Click Install . This will install the english to hindi addon.

6. restart firefox

7. Now whenever you want to type in hindi, Open firefox , Ctrl+g and start typing . Google's nifty tool will automatically translate the english input to hindi! You can now email, or blog in hindi with ease!

अगर यह पोस्ट अच्छी लगी हो तोह प्लेअसे कमेन्ट करना(if you like this post then please comment)


What they says

Copyright © 2013 Techsense. WP Theme-junkie converted by BloggerTheme9
Blogger template. Proudly Powered by Blogger.| Distributed by Rocking Templates
back to top