Here is a list of Windows XP system files, which can be edited using Resource Hacker to change the look-n-feel of Windows:
%windir%\System32\NToskrnl.exe : To change Windows Boot screen
%windir%\System32\Logonui.exe : To change Windows Login Screen
%windir%\System32\MSgina.dll : To change the text & background of Shutdown dialog box
%windir%\System32\Shell32.dll : To change a lot of things, like Progress dialog box (copying, deleting, etc.), Run dialog box, Context menu items, and many other things
%windir%\System32\Netshell.dll : To change flashing internet icon in system tray
%windir%\System32\Comdlg32.dll : To change the look of Open/Save dialog box, color box, print box, find & replace box, etc.
%windir%\System32\Comctl32.dll : To change the icons appearing in upper-right side of Open/Save dialog box.
%windir%\System32\Stobject.dll : To change volume icon & some other icons in system tray
%windir%\System32\mydocs.dll : To change My Documents icon%windir%\System32\shdocvw.dll : To change Internet Explorer 6 icons and graphics
%windir%\System32\IEFrame.dll : To change Internet Explorer 7 icons and graphics
%windir%\System32\shimgvw.dll : To change image file icons, i.e., BMP, JPG, JPEG, GIF, etc%windir%\System32\Sysdm.cpl : To change the System Properties window look
%windir%\System32\Winlogon.exe : To change the text, which you see in Login Screen, like applying user settings, logging off, shutting down, etc.
%windir%\Explorer.exe : To change Start button text, Programs Menu text (like Programs, Favorites, Documents, etc.)%windir%\System32\browselc.dll : To change the Menu names in Windows Explorer as well as Internet Explorer
Windows XP Setup folder\I386\Winntbbu.dll : To change XP Setup look and text entries
What do you when you accidentally delete a very important file or you come to know that someone has deleted your file?
I cant say about you people, but i used to pull my hair out…
But that was past, Recuva is a software which is very easy to use and it will recover the deleted files for you, instantly.
Download the software from here
1 .Once you come to know that you have deleted something important, don’t panic.
2. Open the folder where you downloaded Recuva.
3. Once you open the folder, run the Recuva.exe file a window will open
4. Choose the type of file you want to recover, click next.
5. Now choose the appropriate file location, and that’s it within seconds your files will recovered.
Note: This software is 100% free, so enjoy
He plans to give the talk, entitled "Jackpotting Automated Teller Machines," at the Black Hat Las Vegas conference, held July 28 and 29.
Jack will demonstrate several ways of attacking ATM machines, including remote, network-based attacks. He will also reveal a "multi-platform ATM rootkit," and will discuss things that the ATM industry can do to protect itself from such attacks, he writes in his description of the talk, posted this week to the Black Hat Web site.
Jack was set to discuss ATM security problems at last year's conference, but his employer, Juniper Networks, made him pull the presentation after getting complaints from an ATM maker that was worried that the information he had discovered could be misused.
The security researcher found a straightforward way of getting around Juniper's objections, however. Last month, he took a new job as director of security research with IOActive.
ATM machines do get compromised, but in a roundabout way. Thieves often hit them by installing card skimmers on them to extract magnetic stripe data from the cards. Then, using a hidden video camera, they steal login numbers. Using all of this information, the crooks can build their own duplicate cards and empty bank accounts.
But Jack's talk looks at a new area: bugs in the software used to run the machines.
He's taken advantage of the extra year provided by Juniper's ban to do more research. "Last year, there was one ATM; this year, I'm doubling down and bringing two new model ATMs from two major vendors," Jack says in his talk description. The security researcher couldn't immediately be reached for comment.
Jack doesn't say which ATMs he plans to discuss, but it could be any major vendor, according to Black Hat Director Jeff Moss. "He's got a living room full of a lot of different brands of ATMs, and they all seem to suffer from one or the other problem," he said.
ATMs haven't received a lot of serious scrutiny by security researchers, so Jack's talk will break new ground, Moss said. "Apparently you can make all the money come out," he said.
Some time we need to work with some files which located in a particular folder from command prompt. But it’s too complicated to work with long folder ( which even carry spaces ) names or a folder located deep inside other folders. So it’s very convenient if we can launch command prompt from the folder which we want to work with. Vista has this feature. If you hold down the shift key while right clicking on a folder vista gives a option to Open Command Window Here.
But Windows xp does not comes with such option. In this tutorial we will add vista like command prompt option to folder context menu. So when you right click on a folder you can directly open command prompt without changing the path from dos manually.
Follow these steps :
1. Start regedit from run dialogue box.
2. Go to HKEY_CLASSES_ROOT\Directory\shell
3. Create a new key by right clicking on shell & select New > Key
4. Name it command
5. Now select command. On the right pane double click the value Default
6. Now on the Value Data field type Open Command Window Here
7. Now select the command key on the left pane again. Right click on it.
8. Select New > Key & give it’s name command.
9. Now select the command sub key. On right pan double click on the value Default & type cmd.exe /k “cd %L”
Close regedit ( Registry Editor ). Log off & Log in again.
Now you should see Open Command Window Here whenever you right click on a folder.
This Tutorial should be also called as :
Add command prompt to folder right click menu
Launch command prompt by right clicking on a folder
In order for this to happen, we need to flip the Removable Media Bit (RMB) on the USB Device. This will tell Windows that the flash drive is a fixed disk and not removable media. After successfully flipping the bit, you'll be able to multi partition the flash drive and Windows will display all partitions.
How to Flip the Flash Drive Removable Media Bit:
Warning: This tool will not work on all flash drives and it could potentially mess up your drive. No warranty is being offered, USE AT YOUR OWN RISK! backup all information from your USB device before proceeding.
- Download the Lexar tool and extract to you
- Plugin your flash drive and run the executable
- Select the option to Flip Removable Bit:
- Then, remove and reinsert your flash drive. Your flash drive should now be detected by Windows as a fixed disk (not a removable disk). You can check this by right clicking the device and checking the device properties.
How to setup multiple flash drive partitions in Windows:
The following assumes that you have already Flipped the Removable Media Bit
- Navigate to Start -> Run and type diskmgmt.msc in the dialog box then click Ok
- From the window, right click your flash drive and select the option to Delete Partition:
- Right Click your flash drive again and select the New Partition option:
- Follow the New Partition Wizard and create a "Primary Partition". Once you get to the dialog box to set the Partition Size, be sure to set the Size to be smaller than the drives capacity to leave free space for the next partition:
- Continue through the Wizard, giving your device a drive letter and formating the partition. I recommend a Fat32 partition.
- After you have created the first partition, you can create additional partitions using step 3-5 on the unallocated empty space that remains on the drive:
- Once finished, you should have multiple partitions on your USB flash drive that are detected and usable in Windows as separate drives.
In this post you will find out a few of the cool things a hacker can do with telnet.
Telenet is a system by which one canaccess almost every data-base and mainframe on the continantal U.S.
Most of these codes do not have passwords with them.
But be careful, more than one group of hackers have gotten busted for using this system for hacking into mainfraimes. An example is the 414's.
If you have read about them in newsweek, it's very scary.
(please dont misuse it, this is just for educational purpose)
What to do - The first thing you have to do if you want to hack with Telenet, is find your local Telenet phone number.
This can be done many ways. One way that always works, is to call up your local computer store, tel them that you recently purchased The Source or something like that, but that you lost the sheet that has the phone no. writen on it.
They'll tell it to you. (People who work in computer stores usualy aren't very smart
about that sort of thing.)
Call the number with your computer. Once the connection is established,
press twice. the computer will display "TERMINAL=" Type again. The computer will then display an at sign: "" Type in the access code here.
below are some access codes listed
(But please dont missuse it)
To use the Telemail feature of Telenet, type mail at the "" prompt.
User id's are usually the first initial of the user's first name, plus
the last name.
eg- William gates= Wgates
C 20120 - VM 370 ONLINE
C 20124N- NEW YORK TIME INFORMATION SERVICE
C 20125 - NJIT ELECTRONIC INFORMATION
C 20167 - WARNER COMPUTER SYSTEMS
C 20168 - WARNER COMPUTER SYSTEMS
C 20182 - BANKERS TRUST CUSTOMER SERVICE
C 20225 - COMSHARE "COMMANDER II"
C 20247 - GSD TIMESHARING
C 20270 - GSD TIMESHARING
C 202124- GENERAL MOTORS WARREN
C 202138- (TYPE .HELP *)
C 202139- (TYPE .HELP *)
C 202140- (TYPE .HELP *)
C 202144- (TYPE .HELP *)
C 202175 - HONEYWELL
C 202222 - GM PARTS
C 202229 - PRIMENET
C 20321 - WYLBUR
C 21221 - PRIMENET
C 21224 - PRIMENET
C 21225 - INTERACTIVE MARKET SYSTEMS
C 21226 - INTERACTIVE MARKET SYSTEMS
C 21228 - BURROUGHS NYC DATA CENTER
C 21229 - LANDART SYSTEMS
C 21231 - E.F.HUTTON
C 21233 - UNIVAC 1100
C 21253 - VM/370 ONLINE
C 21256 - CITIBANK CASH MANAGER
C 21264 - CITICASH MANAGER INTERNATIONAL
C 21265 - CITICASH MANAGER INTERNATIONAL
C 21281 - BANKERS TRUST CUSTOMER SERVICE
C 21284 - DATAMOR TIME SHARING
C 21288 - S-K WDC SYSTEM 1/ONLINE
C 212136 - (TYPE NEW/TSC)
C 212151 - CITICASH MANAGER INTERNATIONAL
C 21255 - PRIMENET
C 21256 - PRIMENET
C 212160 - TELSTAT SIGMA 6
C 212167 - RSTS V.7.0-07
C 212168 - RSTS V.7.0-07
C 21284 - DATAMOR TIME SHARING
C 21325 - PRIMENET
C 21335 - MARKETRON RESEARCH AND SALES
C 21336 - MARKETRON RESEARCH AND SALES
C 213170 - DIALOG
C 21370 - XCC-WEST SYSTEM X2
C 21371 - XCC-WEST SYSTEM X3
C 21372 - XCC-WEST SYSTEM X3
C 21373 - XCC-WEST SYSTEM X1
C 21375 - XCC-WEST SYSTEM X2
C 21379 - INTERACTIVE SYSTEM/ONE
C 21386 - IAS PROGRAM DEVELOPMENT SYSTEM
C 21520 - TPF&C ONLINE
C 21534 - PRIMENET
C 21726 - U OF I COMPUTING SERVICES
C 30121 - NASA RECON
C 30124 - SOURCE SYSTEM 10
C 30126 - DISTRIBUTIVE NETWORK
C 30128 - SOURCE SYSTEM 13
C 30134 - INTERACTIVE(GAITHERSBURG)
C 30138 - SOURCE SYSTEM 11
C 30147 - SOURCE SYSTEM 12
C 30148 - SOURCE SYSTEM 15
C 30149 - SOURCE SYSTEM 14
C 30320 - COMPUTER SHARING SERVICES
C 30330 - COMPUTER SHARING SERVICES
C 30337 - PRIMENET
C 30339 - PRIMENET
C 30340 - PRIMENET
C 30532 - C.S.I. TIMESHARING SERVICE
C 30523 - C.S.I. TIMESHARING SERVICE
C 31231 - C.I.C. TIMESHARING
C 31340 - ADP NETWORK
C 31341 - ADP NETWORK
C 31345 - PRIMENET
C 31359 - GENERAL MOTORS WARREN
C 31360 - GENERAL MOTORS WARREN
C 31361 - GM PARTS
C 31363 - VM/370 ONLINE
C 31370 - GM DECSYSTEM-20 TIMESHARING
C 31424 - MCAUTO VM/370 ONLINE
C 31425 - MCAUTO VM/370 ONLINE
C 31435 - PRIMENET
C 31726 - RSTS V06C-04
C 41520 - DIALOG
C 41527 - STANFORD IBM-3033A
C 41548 - DIALOG
C 41580 - HARPER GROUP INFORMATION NETWORK
C 41587 - BUSSIPLEXER
C 51647 - VM/370 ONLINE
C 60320 - DARTMOUTH COLLEGE COMPUTING
C 61735 - (TYPE D FOR SYSTEM) APPLIED LOGIC NETWORK CONTROL
C 61748 - PRIMENET
C 61750 - PRIMENET
C 61760 - (TYPE D FOR SYSTEM) APPLIED LOGIC NETWORK CONTROL
C 61766 - PRIMENET
C 61767 - PRIMENET
C 61770 - NDC-SYSTEM#
C 61776 - NDC-SYSTEM#
C 61777 - NDC-SYSTEM#
C 61778 - PRIMENET
C 617135 - VM/370 ONLINE
C 61737 - VM/370 ONLINE
C 617138 - MASSACHUSETTS INSTITUE OF
C 617139 - MASSACHUSETTS INSTITUE OF
C 617140 - VM/370 ONLINE
C 61769 - (TYPE D FOR SYSTEM) APPLIED LOGIC NETWORK
C 61770 - BPL-INFORONICS
C 617171 - INTERACT LINE
C 617177 - ERT ENVIRONET
C 617179 - ERT ENVIRONET
C 61780 - (TYPE HELP)
C 71424 - GLOBAL DATA TIMESHARING
C 71431 - (TYPE HELP)
C 71620 - UNION CARBIDE
C 80423 - CONTROL DATA INTERCOM
C 80424 - CONTROL DATA INTERCOM
C 80426 - BABCOCK AND WILCOX
C 81625 - UNINET
C 81626 - UNINET
C 90995D - TELENET NEWS SERVICE
- How to Convert I-Doser DRG Files to SBG & then to WAV, MP3 - An easy step by step tutorial
- View Deleted/Removed YouTube Videos
- Validate your copy of Windows XP for free - No download necessary
- HOWTO - Protecting your Windows system
- Fix Broken Downloads
- Multi Partition a USB Flash Drive in Windows
- How to Add XP and Vista/Windows7 on One Computer
- How to call free in any country through yahoo messenger
- How to Add Emoticons to Blogger’s posts
- Color a folder with a single click in Windows
- December (1)
- November (1)
- October (4)
- September (2)
- August (5)
- July (16)
- June (14)
- May (16)
- April (6)
- adsense (5)
- affiliate (4)
- blogging (2)
- e-books (3)
- emails (1)
- free stuff (19)
- freestuff (3)
- funstuff (22)
- gadgets (11)
- gaming (11)
- Gmail (2)
- hacking (1)
- internet (4)
- make money online (11)
- megaupload (1)
- mobile (4)
- Notepad (1)
- Oddstuff (2)
- photoshop (3)
- security (7)
- Tech news (20)
- tips and tricks (112)
- twitter (1)
- video tutorials (4)
- winamp (1)
- windows (1)
- Youtube (2)