Monday, April 13, 2009

Use Ubuntu Live CD to Backup Files from Your Dead Windows Computer

If you've ever asked for help with your Windows computer that won't boot anymore, you've probably been told to "Backup all your data and then reinstall"… but if you can't boot, how can you get to your data? That's the question we'll be answering today.

One of the easiest methods to access your data is to simply boot off an Ubuntu Live CD… and it's completely free (except for the cost of a blank cd).

Burn an Ubuntu Live CD


If you have another computer, you can download and burn the Ubuntu Live CD using a very simple application called ImgBurn. Otherwise, you can bug one of your friends to help you burn a copy.

Just open up ImgBurn, and click the icon to "Write image file to disc"


Then click on the icon next to "Source", pick the downloaded ISO file, stick a recordable CD into the drive, and click burn.


Now that you have the boot cd (which you should keep in a safe place, as it's very useful), just stick it in the drive of the computer and boot from it. You should see an option to "Try Ubuntu without any change to your computer".


Once the system has started up, the first thing you want to do is choose Places \ Computer from the menu.


This should show you all the drives available in the system, including your Windows drive. In my case, that is the 52.4 GB volume.


You can try and double-click on the drive to open it… and if it immediately works then lucky you! Most of the time it's going to give you an error saying "Unable to mount the volume", because Windows didn't shut it down cleanly.


Click the Details link so that you can see the full message, and leave this window open. You'll see a "Choice 2″ in the message, which includes the commands to force Ubuntu to use that drive even though there's something wrong.


What you'll want to do is open a new Terminal from Applications \ Accessories \ Terminal on the top menu. Once you've done that, then you'll want to type in a bunch of commands, which I'll walk you through.

First, we'll want to switch to "administrator" mode, which in Linux terms is known as "root". The simplest way to do it is with this command:

sudo /bin/bash

Now we'll need to create a directory that we'll mount the drive on. The full explanation of mounting drives is a little complex, so just run this command:

mkdir /media/disk

Now comes the tricky part. You'll need to type out a command very similar to this one, but you'll need to replace /dev/sda1 with what you see in that message box we showed you above. This command tells Ubuntu to use the ntfs-3g driver, and force mount even if there is a problem.

mount -t ntfs-3g /dev/sda1 /media/disk -o force

If your drive is FAT32 instead of NTFS, then you can use the following command instead:

mount -t vfat -o umask=000 /dev/sda1 /media/disk


If you are having problems figuring out whether you have NTFS or FAT32, and you can't figure out which /dev/whatever to use, then type in the following command at your prompt (make sure you already ran the command to run things as root)

fdisk -l

In the output you should see a lot more information about the available drives… you can see in this example that the filesystem type is NTFS and the device name is /dev/sda1.


At this point, you should be able to access your hard drive through the icon in Computer.


Note: If you have more than one drive in the computer, or more than one partition, they should show up separately in Computer. You should perform the same steps as above to open those drives up as well.

Backing Up to External USB

The absolute simplest thing to do at this point is to plug in an external USB drive, which should place an icon on the Ubuntu desktop, and most likely immediately pop up a nautilus window showing the contents of the drive.


Note: I plugged in a USB Flash drive for illustration… it would be better to plug in a full external USB drive so you'll have more space for backups.

What Should I Backup?

If you aren't extremely technical, you might be wondering what on earth you should be backing up… and that's a very good question.

1) Best Method

If you have loads of empty space on your external drive or network share, you should simply backup the entire contents of the drive, and sort through it later. It'll take a little longer, but at least that way you can be sure everything has been backed up.

2) Still Good

You should try and backup your entire user folder… on XP you'll go to "Documents and Settings", and on Vista you'll go to "Users", and you should see your username in the list:


You can simply copy this entire folder to your backup drive, which should contain your music, documents, bookmarks, and most of your important files.

Important Note: This will not backup your application files, and you should look around your drive and see if you've saved anything important somewhere else. This is especially true if you have more than one drive. Again, your best bet is to simply backup everything.

Backing Up to Network Share

If you would rather backup your drive to a network share on another computer, you can use the Places \ Connect to Server item on the menu.


Change the Service type menu to "Windows share"…


And then enter in the details for your network drive, with these being the required fields:
Server: Computer Name
Share: Shared Folder Name
User Name: your username


Once you click the Connect button, you'll be prompted to enter in your password. Typically you can leave Domain set to the default, but if you have a custom workgroup name you should enter that instead. I also chose the "Remember password until you logout" button just so I won't have to enter the password again.


Once you click the Connect button you should have an icon on the desktop for your network share.


Now you can open up the network share, and if everything is setup correctly on the shared folder side of things, you can copy all of your files across the network using the instructions above on which files to choose.


At this point you should have a backup of your data. If you backed up to an external hard drive, you might want to consider also copying those files to another computer just in case, and if you copied across the network you could consider backing that up elsewhere as well.

Now you can proceed with reinstalling or whatever else you'd like to do.
Read rest of entry

Solve Problem With Internet Navigation

We have seen a large number of computers coming in with problems navigation on the internet. Also unable to go to Windows update and viurs update sites. Here is a quick fix that also seems to speed navigation up some.

Just for safety create a copy of the file before making changes.

goto

  1. C:\windows\system32\drivers\etc\ (Windows XP)
  2. C:\I386 (Windows 2000)
  3. Open the host with notepad.
  4. remove all entries bellow
  5. 127.0.0.1 localhost
  6. then save and close
Read rest of entry

How to hide your drives?

If u r having any important docs and u r afraid abt it . dont wory windows XP provides (not officialy ) a utility by which u can hide urs one or more drives .

1. Go to Start > run > type "diskpart".
a dos window will appear with following discription: DISKPART>

2. then type "list volume" this will look like it

Volume### Ltr Label Fs Type Size Status Info
-------------- ---- ------ --- ----- ---- ------- -----

Volume 0 F DC-ROM
Volume 1 C NTFS Partition 7000MB Healthy
Volume 2 D soft NTFS Partition 8000MB Healthy
Volume 3 E Porn NTFS Partition 8000MB Healthy


3.if u wanna hide drive E then type "select volume 3" then a message will appear in same winwods { Volume 3 is the selected volume}

4.now type " remove letter E" . Now a message will come { Diskpart Removed the Drive letter } , sometime it requires the reboot the computer .

Diskpart will remove the letter .Windows XP is not having capabilty to identify the unkown volume.

Don't afraid ur Data will ramin same .
To Come backe the Drive repeat the process . but in 4th step whish is shown in this post replace " remove" to "assign"
i mean type " assign letter E"
Read rest of entry

Covering your tracks at shutdown

Instead of deleting reg files the manual way one can create reg files to do that job without having to get ones hands dirty digging through all those registry entries.

Warning
Deleting reg keys indescriminately can and often leads to an inoperable system. Use with caution

To delete a setting using a .reg file, set its value to a hyphen (-), as in this example:

Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Test]"BinarySetting"=-
To delete a key, add a hyphen to the start of the key name, as in this example:

Windows Registry Editor Version 5.00
[-HKEY_CURRENT_USER\Test]

Remember these commands are to be typed in a text file first and then saved as a .reg file.
Read rest of entry

Check your driver versions with these tips

How do you know whether a downloaded version is newer than the currently installed driver on your system? A good Readme file should provide this information and is the preferred option. In the absence of documentation, file dates offer some clues, but are not always reliable. A better indicator is to inspect the properties of the driver files themselves. After unzipping the downloaded driver files to a folder on a local or network drive, right-click any file with a .dll or .sys extension and choose Properties. On the Version tab, you should be able to find details about the specific driver version, which you can compare to the driver details shown in Device Manager.
Read rest of entry

Save Help Topics as Shortcuts

Because the Internet Explorer engine is at the heart of the Help And Support Center, each topic has its own URL. If you know how to manipulate these URLs, you can save a specific Help topic as an external shortcut. Using that shortcut, you can jump directly to a specific topic without having to go through the Help And Support Center first. Unfortunately, Windows XP does not let you create a shortcut to a Help topic directly. To do so, follow the process outlined below:

Open the topic for which you want to create a shortcut, right-click anywhere on the page (except on a link), and choose Properties.
Select the entire URL from the Address field (be sure to scroll down to select the full address).
Press Ctrl+C to copy it to the Clipboard.
Right-click the desktop (or in a folder where you want to save the shortcut) and choose New, Shortcut.
In the Create Shortcut dialog box, type %systemroot%\pchealth\helpctr\ binaries\helpctr /url followed by a space, and then paste the copied URL.
Click Next, give the shortcut a name, and click Finish.
Shortcuts you create in this fashion work with URLs in two common Help formats:

The Help Center Pluggable protocol (with the prefix hcp://) is less common and is typically used for Help topics that link to external applications and locations, such as Remote Assistance or Windows Newsgroups.
HTML Help protocol (with the prefix ms-its://) is used for access to information in Compiled Help (.chm) files. If you just want quick access and don't mind opening this type of URL in the Windows 2000-style HTML Help viewer, you can use the Hh.exe Help engine. Open the Create Shortcut wizard and type hh followed by a space and the Help topic's URL. The resulting shortcut opens the selected topic in a window that lists only topics from the same Help file.

Read rest of entry

Create hidden user accounts

You can prevent an account from appearing on the Welcome screen, thereby creating a "hidden" account. (It's not completely hidden, because the account is visible to administrators in Local Users And Groups and the account's profile in the Documents And Settings folder is visible to all users.) Use Registry Editor to open HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserLis t. Create a new DWORD value, setting its name to the user name of the account you want to hide and leaving its value set to 0.

But be careful with this trick: you won't be able to get to the account with Fast User Switching because the account doesn't appear on the Welcome screen. Pressing Ctrl+Alt+Delete two times at the Welcome screen to display the Log On To Windows dialog box works only when no other users are logged on. Therefore, if you want to use this type of hidden account, you should either disable Fast User Switching or resign yourself to using the account only when no one else is logged on.

Read rest of entry

Are computers male or female?

A language instructor was explaining to her class that French nouns, unlike their English counterparts, are grammatically designated as masculine or feminine.

Things like 'chalk' or 'pencil,' she described, would have a gender association although in English these words were neutral. Puzzled, one student raised his hand and asked, "What gender is a computer?"

The teacher wasn't certain which it was,and so divided the class into two groups and asked them to decide if a computer should be masculine or feminine. One group was comprised of the women in the class, and the other, of men. Both groups were asked to give four reasons for their recommendation.

The group of women concluded that computers should be referred to in masculine gender because:
1. In order to get their attention, you have to turn them on.
2. They have a lot of data but are still clueless.
3. They are supposed to help you solve your problems, but half the time they ARE the problem.
4. As soon as you commit to one, you realize that, if you had waited a little longer, you could have had a better model.

The men, on the other hand, decided that computers should definitely be referred to in the feminine gender because:
1. No one but their creator understands their internal logic.
2. The native language they use to communicate with other computers is incomprehensible to everyone else.
3. Even your smallest mistakes are stored in long-term memory for later retrieval...
4. As soon as you make a commitment to one, you find yourself spending half your paycheck on accessories.
Read rest of entry

Things to Never Say to a Woman During an Argument : xD

* Whoa, time out. Football is on.

* Sorry. I was just picturing you naked.

* Is there any way we can do this via e-mail?

* Don't you have some laundry to do or something?

* You are so cute when you get mad.

* You're just upset because your bottom is beginning to spread.

* Wait a minute - I get it. What time of the month is it?

* You sure you don't want to consult the great Oprah on this one?

* Looks like someone had an extra bowl of b**ch flakes this morning!

* Who are you kidding? We both know that thing ain't loaded
Read rest of entry

Top 10 Signs You Bought a Bad Computer

10. Lower corner of screen has the words "Etch-a-sketch" on it.

9. Its celebrity spokesman is Red Green.

8. You need jumper cables and a friend's car to start it.

7. Its slogan is "Pentium: Redefining Mathematics".

6. The Quick Reference Guide is written on a napkin.

5. Whenever you turn it on, all the dogs in your neighborhood start howling.

4. The screen frequently displays the message, "Is it time for a break yet?"

3. Tech support advises you to have a fire extinguisher ready before you power up.

2. The only chips inside are Doritos.

1. There is no manual, only a hand written note saying "Good Luck".
Read rest of entry

no wonder english is hard to learn

1. We polish the Polish furniture.
2. He could lead if he would get the lead out.
3. A farm can produce produce.
4. The dump was so full it had to refuse refuse.
5. The soldier decided to desert in the desert.
6. The present is a good time to present the present.
7. At the Army base, a bass was painted on the head of a bass drum.
8. The dove dove into the bushes.
9. I did not object to the object.
10. The insurance for the invalid was invalid.
11. The bandage was wound around the wound.
12. There was a row among the oarsmen about how to row.
13. They were too close to the door to close it.
14. The buck does funny things when the does are present.
15. They sent a sewer down to stitch the tear in the sewer line.
16. To help with planting, the farmer taught his sow to sow.
17. The wind was too strong to wind the sail.
18. After a number of Novocain injections, my jaw got number.
19. I shed a tear when I saw the tear in my clothes.
20. I had to subject the subject to a series of tests.
21. How can I intimate this to my most intimate friend?
22. I spent last evening evening out a pile of dirt
Read rest of entry

Math Lesson

A husband worte the following letter for his wife and left it on the dining room table:

"To My Dear Wife,
You will surely understand that I have certain needs that you, being 54 years old, can no longer satisfy. I am very happy with you and I value you as a good wife. Therefore, after reading this letter, I hope you will not wrongly interpret the fact that I will be spending the evening with my 18-year-old secretary at the Comfort Inn Hotel. Please don't be upset. I shall be back home before midnight"

When the man came home late that night he found the following letter on the dining room table:

"To My Dear Husband,
I received your letter and thank you for you honesty about my being 54 years old. I would like to take this opportunity to remind you that you are also 54 years old. As you know, I am a mathematics professor at our local college. I would like to inform you that while you read this, I will be at the Ritz Carlton with Michael, one of my students, who is also the assistant tennis coach. He is young, virile, and like your secretary is 18 years old. As a succesful businessman with an excellent knowledge of math, you will understand that we are in the same situation, although with one small difference; 18 goes into 54 a lot more times than 54 goes into 18. Therefore I will not be home until sometime tomorrow."
Read rest of entry

Do you know WHO I am?

It was the final examination for an introductory English course at the local university. Like many such freshman courses, it was designed to weed out new students, having over 700 students in the class! The examination was two hours long, and exam booklets were provided. The professor was very strict and told the class that any exam that was not on his desk in exactly two hours would not be accepted and the student would fail. A half hour into the exam, a student came rushing in and asked the professor for an exam booklet.
"You're not going to have time to finish this," the professor stated sarcastically as he handed the student a booklet.

"Yes I will," replied the student. He then took a seat and began writing.

After two hours, the professor called for the exams, and the students filed up and handed them in. All except the late student, who continued writing. A half hour later, the last student came up to the professor who was sitting at his desk preparing for his next class. He attempted to put his exam on the stack of exam booklets already there.

"No you don't, I'm not going to accept that. It's late."

The student looked incredulous and angry. "Do you know WHO I am?"

"No, as a matter of fact I don't," replied the professor with an air of sarcasm in his voice.

"DO YOU KNOW WHO I AM?" the student asked again.

"No, and I don't care." replied the professor with an air of superiority.

"Good," replied the student, who quickly lifted the stack of completed exams, stuffed his in the middle, and walked out of the room
Read rest of entry

Specimen Cup

There was an elderly man who wanted to make his younger wife pregnant. So, he went to the doctor to have a sperm count done. The doctor told him to take a specimen cup home, fill it, and bring it back the next day. The elderly man came back the next day and the specimen cup was empty and the lid was on it. Doctor: What was the problem? Elderly man: Well, you I tried with my right hand...nothing. So, I tried with my left hand...nothing. My wife tried with her right hand...nothing. Her left hand...nothing. Her mouth...nothing. Then my wife's friend tried. Right hand, left hand, mouth....still nothing. Doctor: Wait a minute. You mean your wife's friend too?! Elderly man: Yeah, and we still couldn't get the lid off of the specimen cup.
Read rest of entry

33 Reasons - Why It Is Good To Be A Man?

1. Your *arse* is never a factor in a job interview.
2. Your orgasms are real. Always.
3. Your last name stays put.
4. The garage is all yours.
5. Wedding plans take care of themselves.
6. You never feel compelled to stop a friend from getting laid.
7. Car mechanics tell you the truth.
8. You don't give a rat's *arse* if someone notices your new haircut.
9. Hot wax never comes near your pubic area.
10. Same work .. more pay.
11. Wrinkles-add character.
12. You don't have to leave the room to make emergency crotch adjustments.
13. Wedding Dress $2000; Tux rental $100.
14. If you retain water, it's in a canteen.
15. People never glance at your chest when you're talking to them.
16. New shoes don't cut, blister, or mangle your feet.
17. One mood, ALL the damn time.
18. Phone conversations are over in 30 seconds.
19. A five-day vacation requires only 1 suitcase.
20. You can open all your own jars.
26. You can quietly watch a game with your buddy for hours without ever thinking "He must be mad at me.".
27. No maxi-pads.
28. If another guy shows up at the party in the same outfit, you just might become lifelong friends.
29. You are not expected to know the names of more than five colors.
30. You don't have to stop and think of which way to turn a nut on a bolt.
31. You are unable to see wrinkles in clothes.
32. The same hairstyle lasts for years, maybe decades.
33. Your belly usually hides your big hips.
Read rest of entry

Hey, Hey ,Hey!

On December 24th at eleven o' clock p.m., a girl with a bathrobe on and a bikini underneath it comes downstairs to find Santa delivering presents to her and her family. Santa looks at her.

The Girl: "Santa, will you please stay?"

Santa: "Ho, ho, ho. Gotta go, gotta go. Gotta deliver all the presents before it snows."

The girl takes off her bathrobe.

The Girl: "Oh, Santa will you please stay?"

Santa: "Ho, ho, ho. Gotta go, gotta go. Gotta deliver all the presents before it snows."

The girl takes off the top part of the bikini.

The Girl: "Santa, please?"

Santa: "Ho, ho, ho. Gotta go, gotta go. Gotta deliver all the presents before it snows."

The girl takes off the bottom part of the bikini.

The Girl: Oh, Santa, please?"

Santa: Hey, hey, hey. Gotta stay, gotta stay. Can't get up the chimney with this pricker in the way!"
Read rest of entry

Read Real Slow....

A Blonde And A Brunette Are Running A Ranch Together In Louisiana. They decide they need a bull to mate with their cows to increase their herd. The brunette takes their life savings of $600 dollars and goes to Texas to buy a bull. She eventually meets with an old cowboy that will sell her a bull. "It's the only one I've got for $599, take it or leave it." She buys the bull and goes to the local telegram office and says, "I'd like to send a telegram to my friend in Louisiana that says: Have found the stud bull for our ranch, bring the trailer."

The man behind the counter tells her, "Telegrams to anywhere in the U.S. are $.75 per word."

She thinks about it for a moment and decides. "I'd like to send one word, please."

"And what word would that be?" inquires the man.

"Comfortable." replies the brunette.

The man asks, "I'm sorry miss, but how is your friend gonna understand this telegram?"

The brunette replies, "My friend is blonde and reads REAL slow..."
Read rest of entry

Rail-way girl...

A railway inspector and his friend in a bar chating...
Friend: Why have you got that big smile on your face.
Railway inspector: I just had the best sex of my life!
Friend:with who?
Railway inspector: With this girl I found on the railway tracks.
Friend: Oh yeah! What did she look like?
Railway inspector: She had the most amazing body!
Friend: Oh yeah! But what did she look like?
Railway inspector: She had the most amazing legs!
Friend: But what did she look like?
Railway inspector: She had perfect breasts!
Friend: Yeah but what did she look like!
Railway inspector: Don't know never found the head.
Read rest of entry

Signs Your Dog Is More Intelligent Than You

10. Neighbors complain about loud music and howling coming from your apartment in the middle of the day.

9. You find mysterious sculpture of a human (who looks strikingly like you) on a leash in your living room.

8. Ice floating in toilet water.

7. Neighborhood cats bring dog treats to your doorstep.

6. Friends swear they've seen your car at the local meat-processing plant.

5. You can never find the leftovers.

4. The remote is covered with slobber, and the TV was left on The Nature Channel.

3. The dog doesn't lick itself anymore... now it's the cat's job.

2. Mensa mailings addressed to "Rover."

1. Your apartment keys no longer work.
Read rest of entry

What's what??

A taxi driver was driving along when a nun stuck her thumb out, so he pulled over. The nun got into the car, and the driver started driving along.
As he was driving along, they got to chatting, and the driver said, "My names Patrick and I'm a Catholic".
Then the nun said, "My name's Sister Mary, and I work in the local nunery".
They carried on talking, and the driver suddenly said, "Forgive me, Sister. But I have always wondered what it's like to kiss a nun".
The nun thought long and hard, and was thinking, well, he is a nice lad. So she said, "Alright then, Patrick".
So he pulled over and they shared a long meaningful kiss.
Then the driver started driving along again, and all of a sudden, he burst out crying. The nun said, "Whatever is the matter??"
He replied, "I lied to you. My name is not Patrick, it's Samuel, and I'm not a Catholic, I'm Jewish".
Then the nun started crying too, and she said, "I have a confession too. My names not Sister Mary and I don't work in the local nunery, my name's Kevin, and I'm on my way to a fancy dress party".
Read rest of entry

IP AdressinG.....

Here you will learn about ip address network introduction and general overview of routing, subnet mask, subnetting, data communication. IP address is an identifier for a computer or device on a TCP/IP network and Internet. Networks that use the TCP/IP protocols route traffic based on the IP address of the destination computer or network device. The format of the IP address is 32 bits 4 octets 4 bytes such as 100.100.10.1, 210.100.22.30, 1.10.1.2 these are the examples of the IP address. The format is a 32-bit numeric value written as four numbers and separated by periods.

Each number in the IP address can be between 0 and 255. In your private network, you can assign unique IP address randomly. However, when you want to connect your private network to the Public network such as Internet then you must need a registered IP address to communicate on the internet and to avoid duplicate address. The four numbers in an IP address are used in different ways to identify a particular network. The general internet registries such as APNIC, RIP, NCC and LACNIC assigns internet or IP addresses from the following 3 classes.

1. Class A- IP address from 0-126. It supports 16 million hosts and 126 networks.
2. Class B- IP address from 128-191. It supports 65,000 hosts and 16,000 networks.
3. Class C-IP address from 192-223. It supports 254 hosts and 2 million networks.
The number of unassigned IP address is running out and a new classless scheme called CIDR is replacing the classes based system of the IP address. In this system the A, B and C class is tied to adoption of IPV6.


Every device connected to the Internet must need a unique identifier, which is called an IP address. An IP address is a numeric value separated by periods into four octets. These numbers are usually assigned to the ISPs (internet service providers) within region-based blocks. An IP address can be used to identify a region or a country. An internet user’s geographical location can be determined with the help of an IP address. The number system is generally difficult to remember so the IP address may also assign to a Host name.

The host names are usually easy to remember. In simple words, every website on the internet must bound or mapped with an IP address. At one time ISPs usually issue one IP address to each user. Within each ISP a DHCP (Dynamic host configuration protocol) server is configured, which dynamically assigns IP addresses from a given pool to each user who connects to the ISP. Dynamic IP addresses also limit the ability of a user to host websites, mail servers, ftp server, mail server and web portals.

Understanding IP Addresses Scheme

An IP address is an address that is used to uniquely identify a device or computer on an IP-based network. An IP address is an address used to uniquely identify a device on an IP network. An IP address can be divided into two parts network portion and a host portion. Each IP address is associated with a subnet mask. The 32 bit address is broken into 4 octets and 1 octet=8 bits. Each octet is converted to a decimal and is separated by periods.

For example 0000000000.11111111.00000000.11111111 this is a binary representation of an IP address. Each octet’s decimal value ranges between 0 and 255. The binary octets convert into decimal value. Here you can see that how a binary octet converts into decimal value. The right most bit or least significant bit of an octet will hold a value of 20.
The bit left to that bit will hold a value of 21. This process continues until the left most bit or the most significant bit holds the value of 27. If all the binary bits are one the decimal representation will be like this.

1 1 1 1 1 1 1 1
128 64 32 16 8 4 2 1 (128+64+32+16+8+4+2+1=255)

Now here is a sample conversion of the octet if not all the bits are set of 1.

0 0 1 0 0 0 0 1
0 0 32 0 0 0 0 1 (0+64+0+0+0+0+0+1=33)
In the following example you can see the IP address representation both in binary and decimal values.

64. 2. 135. 19 (decimal)64+2+135+19=220
01001010.00000010.1000111.00010011 (binary)

The octets are broken down to provide a large number of the addressing scheme that can accommodate small and very large networks. There are five different classes of the IP networks. Class A, B, C, D and E. The classes from A to C and mainly in use, D and E are experimental and reserved so they are not commonly in use. Due to the classless inter domain routing (CIDR) these addresses are not practically in use.

Network/Subnet Masks

A network mask helps you which portion of the address identifies the network portion and the host portion of an IP address. The three different classes of the IP addresses have their own default masks as shown below.
Class Subnet Mask

Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0

An IP address on a class A network that has not been subnetted would have an address and subnet mask pair such as 10.111.20.1 255.0.0.0. If you want to know in more detail that how a mask help you identify the network and host part of the address simply convert the IP address and subnet mask into the binary numbers.

4.16.15.1= 00000100. 00010000.00001111.00000001
255.0.0.0 = 11111111. 00000000.00000000.00000000
If you have the address and the subnet mask in the binary forms then identifying the network portion and the host portion is very easy. Any address value that has the corresponding subnet mask binary value set to 1 show the network ID. Any address bit that has corresponding subnet mask value to 0 represents the host ID.

4.16.15.1= 00000100.00010000.00001111.00000001
255.0.0.0 = 11111111.00000000.00000000.00000000

Network id | host id
If you know your IP address of a computer, you can access the services such as online games, FTP, Web and Mail servers, and remote access utilities such as Remotely Anywhere, PCToGo, PCAnywhere, Remote control etc.

How do I change my IP address?

There are a number of methods by which you can change the IP address of your computer.

What is a Proxy Server?

A proxy server is a computer that offers network and internet access services to the client computers in a network. A client computer connects to the proxy server, requests a connection, services, files and other resources on the other servers. In some cases, the proxy may alter the client’s request and the server’s response for various reasons. By using the proxy server you can hide, conceal and make your network id anonymous by hiding your IP address. To get the anonymous status on the network or Internet, strong intermediate methods are employed like cryptography etc. Examples are remailers, P2P systems etc.

There is a large number of the software available that allows you to hide your IP address with the help of the proxy servers. The well known software for this purpose is Hide IP, Stealth surf, Netconceal, Anonymous surfing, Proxify and Ghost surf.

An IP address is a unique identification number for communication between computer networks, network devices such as computers, fax machines, printers and servers. It is like the number of an apartment or a phone number. IP addresses are of two types Static and Dynamic. Internet service providers’ use dynamic IP addresses and servers usually use static IP address.
The class A of the IP address constitutes almost 50% of all the IP addresses. This class is meant for large networks like the big multinational companies. Class B networks are medium sized like used in the colleges, Universities and other educational and training institutes. Class C IP addresses are usually used for the small companies.

The Regional Internet Registry (RIP) provides the IP addresses based on the geographical distribution. RIP also offers protection against the hackers that try to access the confidential data. All the personal information recorded by the ISP is kept in confidentiality.
Read rest of entry

What is Subnetting?

Two network segments are restricted by distance limitations. Submetting or dividing the network into the segments is also required when localized network management is required for example accounting, sales, customer service departments. There is another reason for the subnetting, which is that the computers on the network, which use more bandwidth, needs to be separated from the rest of the computers. There are certain advantages and disadvantages of the subnetting. Before you start dividing your network into the different segments, you should assign the IP address to each computer in your network segment.

Subnetting makes the network management easier and it is also very helpful for the troubleshooting of a network segment. The internet is a collection of networks where users communication with each other. Each communication on the internet carries the source and the destination address of the computer. This address is called IP address. This 32 bit address has two parts: one part represents the network portion and the other part represents the host portion of the IP address. A company can use some of the bits in the machine or host portion of the address to identify a subnet. In this scenario, the IP address contains three parts: the network address, the subnet address and the machine address.

Subnet Mask Basics

The most recognizable part aspect of subnetting is the Subnet mask. A subnet mask contains 4 bytes, 32 bits and is divided into 4 period separated octets. Typically, a very common subnet mask in binary looks like this.

11111111 11111111 00000000 00000000
255 255 0 0

How to Apply a Subnet Mask

A subnet mask does not work like an IP address and it cannot exist separately without an IP address. An IP address and subnet mask work together to form a network. An IP address splits into two main parts when applying the subnet mask. The leftmost bits of a subnet mask must be set to 1. For example

11111111.00000000.00000000.00000000
11111111.11111111.00000000.00000000
11111111.11111111.11111111.00000000

The above example shows the valid representation of a subnet mask into the binary numbers.

00000000.00000000.00000000.00000000 is an invalid subnet mask.
11111111.11111111.11111111.11111111 is also invalid subnet mask.

All valid subnet masks contain two parts: the left side with all mask bits set to '1' (the extended network portion) and the right side with all bits set to '0' (the host portion), such as the first example above.

Subnetting an IP network can be performed for a variety of reasons such as using the different physical media in an organization, such as FDDI, WAN and Ethernet, preservation of the addresses and for the purpose of security, management and ease of troubleshooting. The most

common reason of the subnetting is to control the network traffic. In an Ethernet network, all computers in a segment see all the packets that are transmitted by all the other computers on the same segment.

In this situation, the network performance can be badly affected due to the heavy traffic loads, collisions and the retransmission of the packets. A router is used to connect the IP networks and it also helps to minimize the load of the traffic.

Subnet Masking

By applying the subnet mask to the IP address you can identify the network and host portion of the IP address. The decimal number 1 represents the network portion in the subnet mask and the node is represented the 0s. Performing a logical AND operation between the IP address and the subnet mask resulting in the network address.
For example, using our test IP address and the default Class B subnet mask, we get:
10001100.10110011.11110000.11001000 140.179.240.200 IP address of the class B
11111111.11111111.00000000.00000000 255.255.000.000 Default subnet mask of class B
--------------------------------------------------------
10001100.10110011.00000000.00000000 140.179.000.000 Network Address value

The following example shows the default subnet masks.
• Class A Subnet Mask- 255.0.0.0 - 11111111.00000000.00000000.00000000
• Class B Subnet Mask- 255.255.0.0 - 11111111.11111111.00000000.00000000
• Class C Subnet Mask- 255.255.255.0 - 11111111.11111111.11111111.00000000

Subnetting Review

Subnetting allows network and system administrators some flexibility in defining relationship among the hosts of a network. Hosts on the logically and physically different subnets can talk to each other through specialized devices called gateway or router. The ability to filter the traffic between

subnets can make the more bandwidth availability. Subnetting referred to as subdivision of a class based networks into subnetworks.

A router can exchange subnet routes with the other routers in the network. A subnetted network can’t be split into the isolated portion. All the subnets must be contiguous because the routing information cannot be passed to a non-network member. Router can exchange subnet routes with other routers within the network. Since the subnet masks are identical across the network, the routers will interpret these routes in the same manner. However, routers not attached to the subnetted network can't interpret these subnet routes, since they lack the subnet mask.

Therefore, subnet routes are not relayed to routers on other networks. This leads to our second

restriction. Subnetting allows you to create multiple logically different networks within the same class A, B or C. If you break a major network into smaller networks, it allows you to create a network of interconnecting subnetworks. Any device or gateway that is responsible for connecting the different subnetworks must have the distinct IP address one for each subnetwork.

To subnet a network use and extend the natural subnet mask using some of the bits from the host ID portion to create a subnetwork ID. In this example, given a Class C network of the IP address 4.15.5.0 which has a natural subnet mask of 255.255.255.0, you can create subnets in this manner:

11001100.00001111.00000101.00000000 204.15.5.0
11111111.11111111.11111111.11100000 255.255.255.224

---------------------------------|subnet|----

By extending the natural subnet mask to be 255.255.255.224, you have used three bits from the host portion of the mask and used them to make subnets. By using these 3 bits, it is possible to create 8 subnets. The remaining five ID bits of the host portion, each subnet can make 32 host addresses and the 30 addresses out of 32 are assigned to the devices or computers. The host IDs

of all zeros and all ones are not allowed.

204.15.5.0 255.255.255.224 host address range 1 to 30
204.15.5.32 255.255.255.224 host address range 33 to 62
204.15.5.64 255.255.255.224 host address range 65 to 94
204.15.5.96 255.255.255.224 host address range 97 to 126
204.15.5.128 255.255.255.224 host address range 129 to 158
204.15.5.160 255.255.255.224 host address range 161 to 190
204.15.5.192 255.255.255.224 host address range 193 to 222
204.15.5.224 255.255.255.224 host address range 225 to 254.
Read rest of entry

Ftp Error Codes What They Mean

FTP Error Messages
some nice info about ftp error codes so you know what they mean. i am sure you see them all the time and sometimes you dont know what they mean, so take a look here.

The most common codes:
421 - often means: too many users logged to the same account.

530 - wrong loginass, some servers auto-switch to 530 from
421 when they reach the max # of users. so notice the
error message attached to the code.

550 - common in Ratio site, If the file exsist it means you have no
access to the file or dir.
if you try changing dirs in an FTP and you`re getting a 550
message, it means you don`t have access to the dir, but,
It doesn`t mean you don`t have access to a dir
inside that dir. (meaning when getting a direct path, log into
the path directly, not 1 dir by 1).

All others:

110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm Where yyyy is User-process data stream marker, and mmmm server's equivalent marker (note the spaces between markers and "=").
120 Service ready in nnn minutes.
125 Data connection already open; transfer starting.
150 File status okay; about to open data connection.
200 Command okay.
202 Command not implemented, superfluous at this site.
211 System status, or system help reply.
212 Directory status.
213 File status.
214 Help message. On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.
215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.
220 Service ready for new user.
221 Service closing control connection. Logged out if appropriate.
225 Data connection open; no transfer in progress.
226 Closing data connection. Requested file action successful (for example, file transfer or file abort).
227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).
230 User logged in, proceed.
250 Requested file action okay, completed.
257 "PATHNAME" created.
331 User name okay, need password.
332 Need account for login.
350 Requested file action pending further information.
421 Too many users logged to the same account
425 Can't open data connection.
426 Connection closed; transfer aborted.
450 Requested file action not taken. File unavailable (e.g., file busy).
451 Requested action aborted: local error in processing.
452 Requested action not taken. Insufficient storage space in system.
500 Syntax error, command unrecognized. This may include errors such as command line too long.
501 Syntax error in parameters or arguments.
502 Command not implemented.
503 Bad sequence of commands.
504 Command not implemented for that parameter.
530 Not logged in.
532 Need account for storing files.
550 Requested action not taken. File unavailable (e.g., file not found, no access).
551 Requested action aborted: page type unknown.
552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).
553 Requested action not taken. File name not allowed.
Read rest of entry

Important Things to know about Vulnerability Assessment

This article intends to cover following topics about Vulnerability Assessment / Vulnerability analysis in brief.

1. Meaning of vulnerable

2. What is Vulnerability?

3. What is Vulnerability Assessment?

4. Who can exploit Vulnerabilities?

5. Use of Vulnerability Assessment

6. How Vulnerability Assessment is different from Threat analysis?

1. Meaning of vulnerable

Vulnerable means weak and liable to be attacked.

2. What is Vulnerability?

Vulnerability in relation to Information System / Networking is a problematic condition because of which the system can be attacked, exploited and /or compromised. These problematic condition could be:

1. Software /Programming bug
2. Backdoors
3. Unnecessary Open ports
4. Hardware Bugs
5. Improper configuration
6. Improper parameters
7. Improper patch/update management etc.

3. What is Vulnerability Assessment?

Vulnerability Assessment or Vulnerability Analysis is the process of identification, Classification, mapping and rating of vulnerabilities of Information System / Networking System.

4. Who can exploit Vulnerabilities?

Vulnerability can be exploited by Crackers, Some kind of hackers, script kiddies for malicious intent. Some times it is exploited by Penetration Tester/ IS Auditors / Good hackers for the benefit of the general public/group and strengthening / hardening the system.

5. Use of Vulnerability Assessment

Vulnerability Assessment is used for:

1. Risk Rating and Risk Analysis
2. potential Threat Measurement
3. Protect Information assets and their integrity.
4. Prevention and correction tool for Information System

6. How Vulnerability Assessment is different from Threat analysis?

One common question asked is whether Vulnerability Assessment or Vulnerability Analysis is same as Threat Analysis. Answer is "no". No because Threat analysis is generally done after Vulnerability Assessment. Threat analysis is evaluation/examination of threats against detected /known vulnerabilities.
Read rest of entry

About IP

Before you can change your IP you need some information. This information includes your IP range, subnet mask, default gateway, dhcp server, and dns servers.


1. Getting your IP range - Getting information about your IP range is not difficult, I recommend using Neo Trace on your own IP. But for my test just look at your IP address, say it's 24.193.110.13 you can definitely use the IP's found between 24.193.110.1 < [new IP] < style="font-weight: bold;">Subnet Mask, Default Gateway, DHCP Server - These are very easy to find, just open a dos/command prompt window and type 'ipconfig /all' without the ' '. You should see something like this:
Windows IP Configuration:

Host Name . . . . . . . . . . . . . . : My Computer Name Here
Primary Dns Suffix . . . . . . . . . :
Node Type . . . . . . . . . . . . . . .: Unknown
IP Routing Enabled. . . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix . . . . . . .: xxxx.xx.x
Description . . . . . . . . . . . . . . . . . . . . : NETGEAR FA310TX Fast Ethernet Adapter (NGRPCI)
Physical Address. . . . . . . . . . . . . . . . . : XX-XX-XX-XX-XX-XX
Dhcp Enabled. . . . . . . . . . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . . . . . . : Yes
IP Address. . . . . . . . . . . . . . . . . . . . . : 24.xxx.xxx.xx
Subnet Mask . . . . . . . . . . . . . . . . . . . .: 255.255.240.0
Default Gateway . . . . . . . . . . . . . . . . . : 24.xxx.xxx.x
DHCP Server . . . . . . . . . . . . . . . . . . . .: 24.xx.xxx.xx
DNS Servers . . . . . . . . . . . . . . . . . . . . : 24.xx.xxx.xxx
24.xx.xxx.xx
24.xx.xxx.xxx
Lease Obtained. . . . . . . . . . . . . . . . . . .:Monday, January 20, 2003 4:44:08 PM
Lease Expires . . . . . . . . . . . . . . . . . . . .:Tuesday, January 21, 2003 3:43:16 AM


This is all the information you will need for now, I suggest you either keep your dos/command prompt window open or copy & paste the information somewhere, to copy right click the window and select text and click once.



III. Changing your IP Address


To change your IP address first pick any IP you like out of your IP range and remember it or write it down. It is usualy a good idea to make sure the IP is dead (except for what we are going to do later on) so just ping it via "ping x.x.x.x" and if it times out then you can use it. Now go to My Computer, then Control Panel. In Control Panel select Network Connections and pick your active connection, probably Local Area Connection or your ISP name. Open that connection by double clicking on the icon in Network Connections, then select Properties under the General Tab. In the new window that pops up select Internet Protocol (TCP/IP) and click properties, it's under the general tab. In this new window select the General tab and choose "Use the following IP address" and for the IP address enter the IP you would like to use (the one you picked from your subnet earlier) and for the Subnet Mask enter the subnet mask you got when your ran ipconfig /all, same goes for the Default Gateway. Now select "Use the following DNS server addresses" and enter the information you got earlier. Now just click OK. Test that it worked, try to refresh a website and if it works you know everything is okay and you are connected. To make sure the change worked type ipconfig again and the IP address should have changed to your new one.



IV. DDoS & DoS Protection


If your firewall shows that you are being DDoSed, this is usually when you are constantly getting attempted UDP connections several times a second from either the same IP address or multiple IP addresses (DDoS), you can protect your self by changing your IP address via the method I described above.



V. Web servers & Other Services


If you know someone on your IP range is running a web server and he or she has pissed you off or you just like messing around you can "steal" their IP address so any DNS going to that IP will show your site instead because you would be running a web server yourself.

To "steal" an IP is to basically use the changing IP address method above and picking an IP that someone that is running a web server has in use. Often you will be able to keep that IP at least for some time, other times you wont be able to use it so just keep trying until it works. You your self will need to have a web server on the same port with your message. You can do this with other services too. You can also DoS or DDoS the IP address you are trying to steal to kick him off the net, but I don't recommend as its pretty illegal, an your ISP will get pissed
Read rest of entry

Find And Download Old Version Of Software Quickly

Did you upgrade your software and found that a feature is missing or you are having compatibility problem? Don’t fret yet, you can download the old version of the software from the company’s website. But sometimes they don’t link to old version of the software, in such cases you can try out OldVersion, it is a website dedicated to multiple versions of all software that are old.

Sometimes Old Is Gold.



It contains categories such as Communication, Graphics, Multimedia, Internet, File Sharing, Utilities, Security, Enterprise, and FTP. There is a build-in forum where you can request some old software or just talk about general topics.


According to them,

Sometimes upgrading to a newer version can be a good thing. Other times, your computer may not be compatible with the new version, the new version is bloated, or all the options you liked are no longer available.

And…

OldVersion.com assists computer users who are unable to continually upgrade their computer. Those who find that their machine is not able to run the latest version of a certain application have no choice but to use an old version of the program. Unfortunately, the vast majority of software companies do not offer this opportunity. We are doing our small part to help bridge the digital divide by allowing everyone to enjoy the same software titles regardless of their hardware.
Read rest of entry

LetMeGoogleThatForYou.com

LetMeGoogleThatForYou.com allows you to enter any search query, then grab the resulting permalink to share it with someone else. For instance, if someone in a forum would ask “What does ’AFAIK’ stand for?”, you could (somewhat impolitely) point them to this search, which would then interactively perform a Google search for “afaik” for the visitor. (Kind of the next version of this even more impolite site… and nope, neither site is an official Google site…)
Read rest of entry

What's a Digitally Signed Driver?

I'm trying to install the drivers for this new device, and all of a sudden, Windows warns me that the drivers are not digitally signed. Is this something to worry about?

Not even a little. A driver with a digital signature is one that has earned Microsoft's esteemed seal of approval, indicating that it has passed a series of rigorous compatibility tests administered by the Windows Hardware Quality Labs (WHQL). In theory, this warning is supposed to scare customers into rejecting any driver that does not come with Microsoft's digital signature, thereby coercing hardware manufacturers into submitting their drivers to the aforementioned WHQL tests.

In practice, however, digitally signed drivers are rarely any more stable, reliable, or safe than drivers lacking the signature. In other words, if you see this warning, just click the Install Anyway button and forget about it.

If the decision makers at Microsoft had thought about it, they might have applied this sort of warning to all software installations, not just hardware drivers. If Windows users were warned before installing software components that weren't digitally signed, we could probably say goodbye to spyware, viruses, Trojan horses, worms, and all the other forms of malware that can make their way onto your PC without so much as a peep from Windows!
Read rest of entry

Generate Colors Pallete Of Any Image Online

I covered a post on extracting colors from websites. But what if you want to extract colors from an image? CSS Drive’s Image to Colors Palette Generator is a free online service that lets you generate colors pallete instantly. You can either upload the image from your computer or enter an image link. Only png, .gif, .jpg and .jpeg images are supported and they must not be bigger than 1MB in size.

colors pallete generator upload

I uploaded a very unique multicolored art image, the end results were astonishing.

colors pallete of an imageJust move your mouse over any color and you will see it’s Hex number which you can use in art, web development or simply for inspiration. It’s great tool but unfortunately it only supports 1MB image maximum, perhaps the developer can increase the limit since most images these days are heavier in size. To use this tool you will have to compress the image first and then upload it.

It also generates Photoshop swatches and CSS stylesheet, just navigate all the way to bottom and you will find their links respectively.

generate css and aco

Read rest of entry

Generate Colors Pallete Of Any Image Online

I covered a post on extracting colors from websites. But what if you want to extract colors from an image? CSS Drive’s Image to Colors Palette Generator is a free online service that lets you generate colors pallete instantly. You can either upload the image from your computer or enter an image link. Only png, .gif, .jpg and .jpeg images are supported and they must not be bigger than 1MB in size.

colors pallete generator upload

I uploaded a very unique multicolored art image, the end results were astonishing.

colors pallete of an imageJust move your mouse over any color and you will see it’s Hex number which you can use in art, web development or simply for inspiration. It’s great tool but unfortunately it only supports 1MB image maximum, perhaps the developer can increase the limit since most images these days are heavier in size. To use this tool you will have to compress the image first and then upload it.

It also generates Photoshop swatches and CSS stylesheet, just navigate all the way to bottom and you will find their links respectively.

generate css and aco

Read rest of entry

What Is .DS_Store And How To Remove It?

What is .DS_Store?

.DS_Store, which stands for Desktop Services Store is a hidden file created in every local folder in Mac OS X. This file stores custom attributes such as position of folder icons and the choice of background colors. By default it will be created in every local folder accessed by Mac OS X.

Since it is hidden, it’s not a big problem through, it acts a bit similar to Thumb.db which is created automatically in every folder in Windows Operating System. Removing .DS_Store and Thumb.db is OK since they are not system files.

The question is why to remove .DS_Store when it is hidden in Mac OS X operating systems? When you copy any folder from Mac to your Windows OS, these files become visible and annoying.

Removing .DS_Store and Thumb.db

  • Copy Folder From Mac to Windows = .DB_Store will become visible and annoying
  • Copy Folder From Windows to Mac = Thumb.db will become visible and annoying

FolderWasher is a free tool for both Windows And Mac operating systems that removes .DB_Store and Thumb.db files from the folders instantly.

Jus drag and drop the folders that you want to clean in this tool and it will handle the rest itself.

folderwasher main

After you drag the folders, it will ask you for a few options, select the desired action and click Wash.

delete thumb.db fileListed below are are some features of this tool:

  • Deletes all files whose name begin with period of a given folder
  • Ability to Zip compress the washed folder
  • Ability to delete ‘Thumb.db’ files on Macintosh
  • Ability to create on the fly a list of files that should not be deleted, like “.htaccess” files
  • Very easy to use with its friendly interface
Read rest of entry

Best strategy for Page File Management

On systems with 512 MB or more of physical memory, the large initial size of the page file can consume excessive amounts of disk space. On a system with 1 GB of RAM, for instance, the starting page file size is 1.5 GB, and under normal circumstances it's likely that this file will never be used. The best strategy for page-file management in this configuration is to set Initial Size to be relatively small—say, 512 MB—while setting a large maximum size so that Windows can increase the page file size if necessary. This setting keeps disk space use in check but prevents the possibility of experiencing out-of-memory errors. If disk space is really tight, set the initial page-file size to its minimum of 2 MB and set the maximum size to a value that is at least as large as the amount of installed memory. Use your computer normally for a few weeks and allow Windows to create a page file of the proper size. Use Task Manager to monitor the size of the page file and make certain that it's below the maximum size you specified.

Read rest of entry

What Really Happens When a Computer Starts

So you want to know what really goes on when you turn on your computer.

Your computer follows a boot process that loads Windows XP, called the boot or startup sequence. This process loads all of the operating system files so you can actually use Windows XP. Here’s what happens:
1. When you first turn on your computer, a power-on self test (POST) process occurs. Your computer checks its hardware and memory and then begins to load your operating system.
2. Windows XP has a database of information called the Registry where information about your computer is kept. The Registry is loaded first so it can be read in order to boot Windows XP.
3. Next, Windows loads a file called System.ini. The System.ini file is used to load older system configuration information.
4. Next, Kernel32.dll is loaded. Kernel32.dll is the main operating system code used by Windows XP.
5. After Kernel32.dll is loaded, Gdi.exe and Gdi32.exe are loaded. These files give you the graphical Windows user interface.
6. Next, User.exe and User32.exe are loaded. These files provide code necessary to manage the user interface, including your windows.
7. Resources and Fonts load next.
8. Then, Win.ini is loaded, which provides older system programs and user support.
9. Next, the Windows shell loads, which is your basic graphical interface settings, and policies for your computer are loaded as well.
10. The desktop components are loaded next.
11. Next, a logon dialog box appears. Once you provide a valid username and password, the logon process begins. If you are connected to a network, any appropriate network policies are loaded.
12. Finally, all of the final information from any policies are loaded, and you see your desktop. The boot process is fast and efficient, and is more stable than ever before in Windows XP.
Read rest of entry

Find Out More About Your Hardware

I've read of a bug that affects a certain type of motherboard chipset, but this information isn't exactly laseretched on the front of my PC. How can I find out what's inside my PC without having to pop the hood?

Your PC is made up of dozens of separate components, most of which aren't made by your PC vendor. Although you can certainly open up your computer and look at the label on your hard disk or CPU, most of the "devices" are nothing more than chips soldered to your PC's motherboard. Rather than trying to read the microscopic text on each chip, you can use software to scan your system and produce reports in excruciating detail.

First, open up Windows's own Device Manager by going to Start --> Run and typing devmgmt.msc .

Here, you'll see a manifest of every device for which a driver is loaded. Unfortunately, the information can be spotty at best. For instance, your FireWire controller is probably called simply "1394 Net Adapter." If you're trying to find out whether or not it's a VIA VT6306, for instance, you'll have to look elsewhere.

One of the best tools for this, and a free one at that, is Everest Home Edition, available at http://www.lavalys.com . (Lavalys also offers commercial versions with more features.) Among other things, Everest displays copious details about your hardware, digs into your CPU (indicating, for example, whether or not it can be overclocked), and even performs system diagnostics and memory benchmark tests.

Another worthy tool is WCPUID/XCPUID, available for free at http://www.h-oda.com , which provides exhaustive details about your processor (CPU). This tool's output is useful for overclocking, as well as for finding a compatible CPU if you're interested in upgrading.
Read rest of entry

Best strategy for Page File Management

On systems with 512 MB or more of physical memory, the large initial size of the page file can consume excessive amounts of disk space. On a system with 1 GB of RAM, for instance, the starting page file size is 1.5 GB, and under normal circumstances it's likely that this file will never be used. The best strategy for page-file management in this configuration is to set Initial Size to be relatively small—say, 512 MB—while setting a large maximum size so that Windows can increase the page file size if necessary. This setting keeps disk space use in check but prevents the possibility of experiencing out-of-memory errors. If disk space is really tight, set the initial page-file size to its minimum of 2 MB and set the maximum size to a value that is at least as large as the amount of installed memory. Use your computer normally for a few weeks and allow Windows to create a page file of the proper size. Use Task Manager to monitor the size of the page file and make certain that it's below the maximum size you specified.

Read rest of entry

What Really Happens When a Computer Starts

So you want to know what really goes on when you turn on your computer.

Your computer follows a boot process that loads Windows XP, called the boot or startup sequence. This process loads all of the operating system files so you can actually use Windows XP. Here’s what happens:
1. When you first turn on your computer, a power-on self test (POST) process occurs. Your computer checks its hardware and memory and then begins to load your operating system.
2. Windows XP has a database of information called the Registry where information about your computer is kept. The Registry is loaded first so it can be read in order to boot Windows XP.
3. Next, Windows loads a file called System.ini. The System.ini file is used to load older system configuration information.
4. Next, Kernel32.dll is loaded. Kernel32.dll is the main operating system code used by Windows XP.
5. After Kernel32.dll is loaded, Gdi.exe and Gdi32.exe are loaded. These files give you the graphical Windows user interface.
6. Next, User.exe and User32.exe are loaded. These files provide code necessary to manage the user interface, including your windows.
7. Resources and Fonts load next.
8. Then, Win.ini is loaded, which provides older system programs and user support.
9. Next, the Windows shell loads, which is your basic graphical interface settings, and policies for your computer are loaded as well.
10. The desktop components are loaded next.
11. Next, a logon dialog box appears. Once you provide a valid username and password, the logon process begins. If you are connected to a network, any appropriate network policies are loaded.
12. Finally, all of the final information from any policies are loaded, and you see your desktop. The boot process is fast and efficient, and is more stable than ever before in Windows XP.
Read rest of entry

Find Out More About Your Hardware

I've read of a bug that affects a certain type of motherboard chipset, but this information isn't exactly laseretched on the front of my PC. How can I find out what's inside my PC without having to pop the hood?

Your PC is made up of dozens of separate components, most of which aren't made by your PC vendor. Although you can certainly open up your computer and look at the label on your hard disk or CPU, most of the "devices" are nothing more than chips soldered to your PC's motherboard. Rather than trying to read the microscopic text on each chip, you can use software to scan your system and produce reports in excruciating detail.

First, open up Windows's own Device Manager by going to Start --> Run and typing devmgmt.msc .

Here, you'll see a manifest of every device for which a driver is loaded. Unfortunately, the information can be spotty at best. For instance, your FireWire controller is probably called simply "1394 Net Adapter." If you're trying to find out whether or not it's a VIA VT6306, for instance, you'll have to look elsewhere.

One of the best tools for this, and a free one at that, is Everest Home Edition, available at http://www.lavalys.com . (Lavalys also offers commercial versions with more features.) Among other things, Everest displays copious details about your hardware, digs into your CPU (indicating, for example, whether or not it can be overclocked), and even performs system diagnostics and memory benchmark tests.

Another worthy tool is WCPUID/XCPUID, available for free at http://www.h-oda.com , which provides exhaustive details about your processor (CPU). This tool's output is useful for overclocking, as well as for finding a compatible CPU if you're interested in upgrading.
Read rest of entry

Controlling StartUp with Boot.ini switches (explained)

The ARC path syntax supports more than 30 different switches that enable you to control various aspects of the Windows XP startup (or another operating system, as long as it’s Windows XP, Windows 2000, or Windows NT 4). You can either enter these switches by hand when editing Boot.ini in Notepad, or use the check boxes on the BOOT.INI tab of the System Configuration Utility. Here’s a summary of the switches that are most useful:

/safeboot:minimal Boots Windows XP in safe mode, which uses only a minimal set of device drivers. Use this switch if Windows XP won’t start, if a device or program is causing Windows XP to crash, or if you can’t uninstall a program while Windows XP is running normally.

/safeboot:minimal(alternateshell) Boots Windows XP in safe mode but also bypasses the Windows XP GUI and boots to the command prompt instead. Use this switch if the programs you need in order to repair a problem can be run from the command prompt or if you can’t load the Windows XP GUI.

/safeboot:network Boots Windows XP in safe mode but also includes networking drivers. Use this switch if the drivers or programs you need to repair a problem exist on a shared network resource, if you need access to e mail or other network-based communications for technical support, or if your computer is running a shared Windows XP installation.

/safeboot:dsrepair Boots Windows XP in safe mode and also restores a backup of the Active Directory directory service (this option applies only to domain controllers).

/noguiboot Tells Windows XP not to load the display driver that normally is used to display the progress bar during startup. Use this switch if Windows XP hangs while switching video modes for the progress bar, or if the display of the progress bar is garbled.

/bootlog Boots Windows XP and logs the boot process to a text file named Ntbtlog.txt that resides in the %SystemRoot% folder. Open Ntbtlog.txt. in Notepad, move to the end of the file, and you may see a message telling you which device driver failed. You probably need to reinstall or roll back the driver. Use this switch if the Windows XP startup hangs, if you need a detailed record of the startup process, or if you suspect (after using one of the other Startup menu options) that a driver is causing Windows XP startup to fail.

/basevideo Boots Windows XP using the standard VGA mode: 640 × 480 with 256 colors. This is useful for troubleshooting video display driver problems. Use this switch if Windows XP fails to start using any of the safe mode options, if you recently installed a new video card device driver and the screen is garbled or the driver is balking at a resolution or color depth setting that’s too high, or if you can’t load the Windows XP GUI. Once Windows XP loads, you can either reinstall or roll back the driver, or you can adjust the display settings to values that the driver can handle.

/sos Displays the path and location of each device driver (using the ARC path syntax) as it is loaded, as well as the operating system version and build number and the number of processors.

/maxmem=MB Specifies the maximum amount of memory, in megabytes, that Windows XP can use. Use this value when you suspect a faulty memory chip might be causing problems.

/numproc=n In a multiprocessor system, specifies the maximum of processors that Windows XP can use. Use this switch if you suspect that using multiple processors is causing a program to hang.

/pcilock Tells Windows XP not to dynamically assign hardware resources for PCI devices during startup. The resources assigned by the BIOS during the POST are “locked” in place. Use this switch if installing a PCI device causes the system to hang during startup.

/debug Enables remote debugging of the Windows XP kernel. This sends debugging information to a remote computer via one of your computer’s serial ports. You can also add any of the following switches:

/debugport=port Specifies the serial port, where port is one of com1, com2, com3, com4, or 1394. Specifying 1394 will require that you also use the /channel switch.

/baudrate=speed If you use a COM port, use this switch to specify the transmission speed of the debugging information, where speed is one of the following: 300, 1200, 2400, 4800, 9600, 19200, 38400, 57600, or 115200.

/channel=number If you use an IEEE 1394 (FireWire) connection, use this switch to specify the channel, where number is a value between 1 and 64.

Read rest of entry

Quick troubleshooting tip using msconfig.exe

If you have a large number of check boxes to test (such as on the Services tab), selecting one check box at a time and rebooting can be tedious, to say the least. A faster method—called “troubleshooting by halves”—is to begin by selecting the first half of the check boxes and rebooting. One of two things will happen:

The problem doesn’t reoccur. This means that one of the items represented by the cleared check boxes is the culprit. Clear all the check boxes, select the other half of the check boxes, and then reboot.

The problem reoccurs. This means that one of the selected check boxes is the problem. Select only half of those check boxes and reboot.

Keep halving the number of selected check boxes until you isolate the offending item.
Read rest of entry

Keep track of your all your XP updates

If you have Windows XP set up to perform automatic updating, you can keep tabs on the changes made to your system by examining the Windows Update.log file, which you’ll find in the %SystemRoot% folder. You can also review your Windows Update changes by going to the Windows Update site (select Start, All Programs, Windows Update) and clicking the View Installation History link.
Read rest of entry
 

My Blog List

Term of Use

Empower Your Needs Copyright © 2009 Black Nero is Designed by Ipietoon