Sunday, May 29, 2011

What your name says

Does your name begin with: A -
You are not particularly romantic, but you are interested in action. You mean business. With you, what you see is what you get. You have no patience for flirting and can't be bothered with someone who is trying to be coy, cute, demure, and subtly enticing. You are an up-front person. You often don't get hints & you ever pass any. Your mate's physical attractiveness is important your physical needs are your primary concern. You tend to be very selfish, & not very emotional. You and your needs matter most. Others & their feelings come second. Your choices aren't very good & can only lead to trouble. You are very self satisfied & egoistic.

Does your name begin with: B -
You give off vibes of lazy sensuality. You enjoy being romanced, wined, and dined. You are very happy to receive gifts as an expression of the affection of your lover. You want to be pampered and know how to pamper your mate. You are private in your expression of endearments, and particular when it comes to love. You will hold off until everything meets with your approval. You can control your appetite & feelings. You require new sensations and experiences. You are willing to experiment.

Does your name begin with: C -
You are a very social individual, and it is important to you to have a relationship. You require closeness and togetherness. You want the object of your affection to be socially acceptable and good-looking. You see your lover as a friend and companion. You are very sensual, needing someone to appreciate and almost worship you. When this cannot be achieved, you have the ability to hold out on affection until you receive this. You are an expert at controlling your Desires and doing without.

Does your name begin with: D -
Once you get it into your head that you want someone, you move full steam ahead in yoursuit. You do not give up your quest easily. You are nurturing and caring. If someone has a problem, this turns you on. You are highly passionate, loyal, and intense in your involvements, sometimes possessive and jealous. You are very sharp & talented often with a sense of humor. When people bother to look deep inside they cannot resist what they see. The eccentric and unusual, having a free and open attitude stimulates you. You get jealous of other people and lose you temper.

Does your name begin with: E -
Your greatest need is to talk. If your date is not a good listener, you have trouble relating. A person must be intellectually stimulating or you are not interested sexually. You need a friend for A lover and a companion. You hate disharmony and disruption, but you do enjoy a good argument once in a while-it seems to stir things up. You flirt a lot, for the challenge is more important. But once you give your heart away, you are uncompromisingly loyal. You will fall asleep with a good book. sometimes, in fact, you prefer a good book to a lover.

Does your name begin with: F -
You are idealistic and romantic, putting your lover on a pedestal. You look for the very best mate you can find. You are a flirt, yet once committed, you are very loyal. You are sensuous and privately passionate. Publicly, you can be showy, extravagant, and gallant. You are a born romantic. Dramatic love scenes are a favorite fantasy past time. You can be a very generous lover.

Does your name begin with: G -
You are fastidious, seeking perfection within yourself and your lover. You respond to a lover who is your intellectual equal or superior, and one who can enhance your status. You are sensuous and know how to reach the peak of stimulation, because you work at it meticulously. You can be extremely active-never tiring out. Your duties and responsibilities take precedence over everything else. You may have difficulty getting emotionally close to people.

Does your name begin with: H -
You seek a mate who can enhance your zest for life, fun & everything you seek for. You will be very generous to your lover once you have attained a commitment. You are very affectionate & very strong. Your gifts are actually an investment in your partner. Before the commitment, though, you tend to be very careful with your every move and equally cautious in your involvement's often as you believe that you have to look out for yourself. You are a sensual and patient lover. You will hold off till everything meets your full approval. You are a perfectionist, hard to satisfy and strong in your beliefs. Not influentuable, you always stand your ground. People can always count on you to stand by them in a crisis. You are a dreamer w/ a passion for life.

Does your name begin with: I -
You have a great need to be loved, appreciated... even worshipped. You enjoy luxury, sensuality, and pleasures of the flesh. You like necking spend hours just touching, feeling & exploring. You look for lovers who know what they are doing. You are not interested in an amateur, unless that amateur wants a tutor. You are fussy and exacting about having your desires satisfied. You are Willing to experiment and try new modes of expression. You bore easily and thus require adventure and change. Your commitments don't last very long & you often tend to stray. Loyalty is not one of your strong points. You are more sensual than sexual, but you are sometimes downright lustful.

Does your name begin with: J -
You are blessed with a great deal of physical energy. When used for a good cause there is nothing to stop you, except maybe that they aren't always used for the good. (You could dance all night.) You respond to the thrill of the chase and the challenge of the mating game. You can carry on great romances in your head. At heart you are a roamer and need to set out on your own Every so often. You will carry on long-distance relationships with ease. You are idealistic and need to believe in love. You have a need to be nurtured deep within.

Does your name begin with: K -
You are secretive, self-contained, and shy. You are very sexy, sensual, and passionate, but you do not let on to this. Only in intimate privacy will this part of your nature reveal itself. When it gets down to the nitty-gritty, you are an expert. You know all the little tricks of the trade, can play any role or any game, and take your love life very seriously. You don't fool around. You have the patience to wait for the right person to come along. You are very generous & giving, often selfless. You are kind nature & sweet, which is found to be attractive by many. You are a good friend.

Does your name begin with: L -
You can be very romantic, attached to the glamour of love. Having a partner is of paramount importance to you. You are free in your expression of love and are willing to take chances, try new sexual experiences and partners, provided it's all in good taste. Brains turn you on. You must feel that your partner is intellectually stimulating, otherwise you will find it difficult to sustain the relationship. You require loving, cuddling, wining and dining to know that you're being appreciated.

Does your name begin with: M -
You are emotional and intense. When involved in a relationship, you throw your entire being into it. Nothing stops you; there are no holds barred. You are all consuming and rave someone who is equally passionate and intense. You believe in total freedom. You are willing to try anything and everything. Your supply of energy is inexhaustible. You also enjoy mothering your mate. You often have the greatest love affairs all by yourself, in your head. You are very imaginative.

Does your name begin with: N -
You may appear innocent, unassuming and shy; but we know that appearances can lie. When it comes to sex, you are no novice but something of a skilled technician. You can easily go to extremes, though, running the gamut from insatiability to boredom with the whole idea of love. You can be highly critical of you mate, seeking perfection in both of you. It is not easy to find someone who can meet your standards. You have difficulty expressing emotions and drawing close to lovers. You are often selfish, thinking you are always right no matter what. You never give in. Winning is your prime desire- at any cost. You often forget friends and family and you live for the moment.

Does your name begin with: O -
You are very interested in fun activities yet secretive and shy about your desires. You can re-channel much of your energy into making money and/or seeking we. You can easily have extended periods of celibacy. You are a passionate, compassionate lover, requiring the same qualities from your mate. Love is serious business; thus you demand intensity, diversity, and are willing to try anything or anyone. Sometimes your passions turn to possessiveness, which must be kept in check.

Does your name begin with: P -
You are very conscious of social proprieties. You wouldn't think of doing anything that might harm your image or reputation. Appearances count. Therefore, you require a good-looking partner. You also require an intelligent partner.. Oddly enough, you may view your partner as your enemy...a good fight stimulates those vibes. You are relatively free of hang-ups. You are willing to experiment and try new ways of doing things. You are very social and sensual; you enjoy flirting and need a good deal of physical gratification.

Does your name begin with: Q -
You require constant activity and stimulation. You have tremendous physical energy. It is not easy for a partner to keep up with you. You are an enthusiastic lover and tend to be attracted to people because of their ethnic groups. You need romance, hearts and flowers, and lots of conversation to turn you on and keep you going.

Does your name begin with: R -
You are a no-nonsense, action-oriented individual. You need someone who can keep pace with you and who is your intellectual equal-the smarter the better. You are turned on more Quickly by a great mind than by a great body. However, physical attractiveness is very important to you. You have to be proved to be worthy for a partner. You are privately very sexy, but you do not show this outwardly. If your new lover is not all that great in *** games, you are willing to serve as a teacher. *** Is important; you can be a very demanding playmate.

Does your name begin with: S -
For you, it is pleasure before business. You can be romantically idealistic to a fault and is capable of much sensuality. But you never loose control of your emotions. Once you make the commitment you stick like glue. You could get jealous and possessive. You tend to be very selfish often regarding yourself as the only human being on the planet. You like being the center of attention. You are very caring sensitive, private & sometimes very passive. Turned on by soft lights, romantic thoughts. When it gets down to the nitty-gritty, you are an expert. You know all the little tricks of the trade, can play any role, or any game, and take your love life very seriously. You don't fool around. You have the patience to wait for the right person to come along. You are very generous & giving, often selfless. You are kind nature & sweet, which is found to be attractive by many. You are a good friend.

Does your name begin with: T -
You are very sensitive, private & sometimes very passive. You like someone who takes the lead. You get turned on by music, soft lights & romantic thoughts. You fantasize & tend to fall in & out of lovesoon. When in love you are romantic, idealistic, mushy & extremely. You enjoy having your senses & your feelings stimulated, titillated & teased. You are a great flirt. You can Make your relationships fit your dreams, all in your own head. Once you put your mind to something you manage to stand by it and see your dreams through. You aren't very good at expressing your feelings. You like things your own way. You do not like change; you like to hold on to things. This may not always be good because if given opportunity things may develop into great things. You work your way to the top. Attention must be given to what others say because even though you don't want to hear it their advice may turn out to save your life.

Does your name begin with: U -
You are enthusiastic & at your happiest when in love. When not in love you're in love w/ love a/ways looking for someone to adore. You see romance as challenge. You are a roamer & Needs adventure excitement & freedom. You enjoy giving gifts & looking good. You are willing to put others feelings above yours.

Does your name begin with: V -
You are individualistic & you need freedom, space & excitement. You wait till you know someone well before committing yourself. Knowing someone means psyching her/him out. You feel a need to get into his/her head to see what makes him tick. You are attracted to eccentric types. You believe that age is no barrier. You are good at responding to danger, fear & suspense.

Does your name begin with: W -
You are very proud, determined & refuse to take no for an answer when it comes to love. Your ego is at stake all the time. You are romantic, idealistic, often in love with love itself, not seeing Your partner for who she or he really is. You feel deeply about love & tends to throw all of yourself into a relationship. Nothing is too good for your lover. You like playing love games.

Does your name begin with: X -
You need constant stimulation because you get bored quickly. You can handle more than 1 relationship at a time with ease. You can't shut off your mind. You can do 2 things at once. You are very talented.

Does your name begin with: Y -
You are sensual & very independent. If you can't have it your way, you will forget the whole thing. You want to control your relationships, which doesn't work out too well. You respond to physical stimulation. However if you can make money you will give up the pleasures of the flesh for the moment. You have a need to prove yourself the best. You want feedback on your performance. You are open, stimulating & romantic.

Does your name begin with: Z -
You are very romantic but show feels that to love means to suffer. You wind up serving your mate & attracting people who have unusual trouble. You see yourself as a lover's saviour.

Where did I come from ?

One day, Little Johnny asked his father, "Where did I come from?"

His father knew this question would be coming someday and was prepared. He gave Little Johnny all the facts about mommies and daddies making babies. He told it very carefully and honestly, so Little Johnny would understand.

Instead, Little Johnny just frowned in puzzlement.

Finally, his father asked, "Johnny, what are you so puzzled about?"

Little Johnny remarked, "That's sure strange... Billy said he came from California!"

Who wants to be a CEO?

The new CEO of a large high tech corporation was meeting the CEO who was stepping down.The ex-CEO handed his successor three envelopes, with this advice...
"Open these if you run up against a problem you don't think you can solve," he said.

Things went along pretty smoothly, but six months later, sales took a nose-dive and he was really catching a lot of heat. At his wit's end, he remembered the envelopes. He went to his drawer and took out the firs envelope and read, "Blame your predecessor."

Calling a press conference immediately, he tactfully but decisively laid he blame at the feet of the previous CEO.  Satisfied with his comments, Wall Street and the press responded positively, sales began an uptick and the crisis was soon behind him.

However, about 18 months later, the company was again experiencing a noticible dip in sales, combined with significant production delays... With some trepidation, the CEO quickly opened the second envelope. This time the message read simply: "Reorganize."

This he did, and the company quickly rebounded. After several profitable quarters, alas, the company once again fell on difficult times...

Now, calm and confident, the experienced CEO went to his office, closed the door and opened the third envelope. This message said, "Prepare three envelopes."

The Whole Truth. Roflmao !

At school, a boy was told by a classmate that most adults are hiding
at least one dark secret, and that this makes it very easy to blackmail them
by saying, "I know the whole truth". The boy decides to go home
and try it out. He goes home, and as he is greeted by his mother he says, "I
know the whole truth."

His mother quickly hands him $20 and says, "Just don't tell your father."
Quite pleased, the boy waits for his father to get home from work, and
greets him with, "I know the whole truth." The father promptly hands him $40
and says, "Please don't say a word to your mother." Very pleased, the boy is
on his way to school the next day, when he sees the mailman at his front
door.
The boy greets him by saying, "I know the whole truth." The mailman drops
the mail, opens his arms, and says, "Then come give your FATHER a big hug."

Are you fluent in English ?

If you think you are fluent in speaking English ... Try this without a stutter! . . . .

Mr. See and Mr. Soar were old friends. See owned a saw and Soar owned a seesaw. Now See's saw sawed Soar's seesaw before Soar saw See, which made Soar sore. Had Soar seen See's saw before See saw Soar's seesaw, then See's saw would not have sawed Soar's seesaw. But See saw Soar and Soar's seesaw before Soar saw See's saw, so See's saw sawed Soar's seesaw. It was a shame to let See see Soar so sore just because See's saw sawed Soar's seesaw.

Advice for software engineers. :)

Software Engineers are advised not to spend too much time sitting before computers because the following things may happen in their future.

1. When asked about a bus schedule, you wonder if it is 16 or 32 bits.

2. When counting objects, you count 0,1,2,3,4,5,6,7,8,9,A,B,C,D..

3. At the superstore, you check to see if a kilogram is 1024 grams, a litre is 1024 mls.

4. When you dream, you are going to dream in 256 palettes of 256 colors.

5. When your wife says "If you don't turn off that damn machine and come to sleep, then I am going to divorce you!", you are going to scream at her for omitting the "else" clause.

6. You try to sleep , and think : sleep(8 * 60 * 60); /* sleep for 8 hours */

7. When you are reading a book, you would look for the scroll bar to get to the next page.

8. If you want to call somebody you pick up the phone and start dialing an IP number.

9. You are going to look for an icon to double-click, to open your bedroom window.

10. When you go to balance your check book, you would discover that you'll be doing the math in octal.

11.You would look for a trash can icon to throw garbage.

12.When you get in the elevator you would double-click the button for the floor you want to go.

A lesson for all

One day in a poor town thousands of miles away from the nearest city, a rat looked through a crack in the wall to see a farmer and his wife opening a package.

What food might it contain? The rat was shocked to discover that it was a rat trap.

Retreating to the farmyard the rat announced the imminent risk;

"There is a rat trap in the house, a rat trap in the house!"

The chicken clucked and scratched, raised her head and said, "Excuse me, Mr.Rat, I can tell this is a grave concern to you, but it is of no consequence to me. I cannot be bothered by it. Not my problem"

The rat turned to the pig and told him, "There is a rat trap in the house, a rat trap in the house!"

"I am so very sorry Mr. Rat", sympathized the pig, "but there is nothing I can do about it but pray. Be assured that you are in my prayers."

The rat then turned to the cow. She said, "Like wow, Mr. Rat. A rat trap. I am in grave danger. Duh? I am the biggest here, do I look like I'll be trapped in one?"

So the rat returned to the house feeling rejected as he'll need to face the farmer's rat trap alone.

That very night a sound was heard throughout the house, like the sound of a rat trap catching its prey. The farmer's wife rushed to see what was caught. In the darkness, she did not see that it was a venomous snake whose tail the trap had caught.

The snake bit the farmer's wife. The farmer couldn't rush her to the hospital as the town had no transportation & that the nearest hospital is a few days travel.

She returned home with a fever. Now, everyone knows you treat a fever with fresh chicken soup, so the farmer took his hatchet to the farmyard for the soup's main ingredient .

His wife's sickness continued therefore friends and neighbors came to sit with her around the clock. To feed them the farmer butchered the pig.

The farmer's wife still did not get well.

She died eventually & villagers came to her funeral & now the farmer had the cow slaughtered to provide meat for all who came.



Moral of the story - The next time you hear that someone is facing a problem and think that it does not concern you, remember that when there is a rat trap in the house, the whole farmyard is at risk.

Moral for us in business - If you're not part of a problem, You're part of a solution.

Mirrors on Moon to light up Earth

Japanese scientists have unveiled plans to turn the moon into a gigantic mirror-ball manned by robots to provide all the Earth's energy needs. The ambitious project would result in 13,000 terawatts of continuous solar energy being transmitted back to receiving stations on Earth, either by laser or microwave. The plans were unveiled by Japanese construction giant Shimizu Corporation's research division, and would result in a 11,000 km long band stretching around the light side of the moon's equator. "A shift from the economical use of limited resources to the unlimited use of clean energy is the ultimate dream of all mankind," the Daily Mail quoted Shimizu Corporation as saying on its website.

"The Luna Ring, our lunar solar power generation concept, translates this dream into reality through ingenious ideas coupled with advanced space technologies. Virtually inexhaustible, non-polluting solar energy is the ultimate source of green energy that brings prosperity to nature as well as to our live. Shimizu Corporation proposes the Luna Ring for the infinite coexistence of mankind and the Earth," added Shimizu Corporation.

They are set to announce the move at the G8 summit in France, where green energy generation will be high on the agenda.




Friday, May 27, 2011

Milky Way facing a mid-life crisis

Our Milky Way is suffering from a mid-life crisis and will slow down its production of stars over the next billion years, say planetary scientists. Galaxies typically fall into one of the two categories - energetic blue galaxies that form new stars at an impressive rate, or lethargic red galaxies which are slowly dying. But, a team at Swineburne University of Technology has shown our own Milky Way galaxy is neither of these. Rather it is a rare "green valley" galaxy that is half way between a youthful blue galaxy and a geriatric red one. This is the first time that the scientists have compared both the colour and the star formation rate of the Milky Way to that of other galaxies in the Universe, the 'Astrophysical Journal' reported.



Samsung Galaxy S2

This Android 2.0 phone features a 4.2-inch Super AMOLED screen, 1.2 Ghz dual core processor, 8MP rear camera and a 2MP front camera. It comes built-in with a 16GB memory expandable via MicroSD up to 32GB. The device retails at Rs 32,890. For more details, visit samsung.com


Thursday, May 26, 2011

Read and Think

Read Each One Carefully and Think About It a Second or Two . Some people should read more carefully than others!!

1. I love you not because of who you are, but because of who I am when I am with you.

2. No man or woman is worth your tears, and the one who is, won't make you cry.

3. Just because someone doesn't love you the way you want them to, doesn't mean they don't love you with all they have.

4. A true friend is someone who reaches for your hand and touches your heart.!

5. The worst way to miss someone is to be sitting right beside them knowing you can't have them.

6. Never frown, even when you are sad, because you never know who is falling in love with your smile.

7. To the world you may be one person, but to one person you may be the world.

8. Don't waste your time on a man/woman, who isn't willing to waste their time on you.

9. Maybe God wants us to meet a few wrong people before meeting the right one, so that when we finally meet the person, we will know how to be grateful.

10. Don't cry because it is over, smile because it happened.

11. There's always going to be people that hurt you so what you have to do is keep on trusting and just be more careful about who you trust next time around.

12. Make yourself a better person and know who you are before you try and know someone else and expect them to know you.

13. Don't try so hard, the best things come when you least expect them to.


REMEMBER: WHATEVER HAPPENS, HAPPENS FOR A REASON.

Pull the trigger

A Mafia Godfather, accompanied by his attorney, walks into a room to meet with his accountant.

The Godfather asks the accountant, "Where is the 3 million bucks you embezzled from me? " The accountant does not answer.

The Godfather asks again, "Where is the 3 million bucks you embezzled from me?"

The attorney interrupts, "Sir, the man is a deaf mute and cannot understand you, but I can interpret for you."

The Godfather says, "Well...ask him where the damn money is"

The attorney, using sign language, asks the accountant where the 3 million dollars is.

The accountant signs back, "I don't know what you are talking about."

The attorney interprets to the Godfather, "He doesn't know what you are talking about."

The Godfather pulls out a 9 millimeter pistol, puts it to the temple of the accountant, cocks the trigger and says, "Ask him again where the damn money is!"

The attorney signs to the accountant, "He wants to know where it is!"

The accountant signs back, "OK! OK! OK!, the money is hidden in a suitcase behind the shed in my backyard!"

The Godfather says, "Well....what did he say?"

The attorney interprets to the Godfather, "He says that you don't have the guts to pull the trigger."

They call it the "Quarter-life Crisis."

It is when you stop going along with the crowd and start realizing that there are many things about yourself that you didn't know and may not like. You start feeling insecure and wonder where you will be in a year or two, but then get scared because you barely know where you are now. You start realizing that people are selfish and that, maybe, those friends that you thought you were so close to aren't exactly the greatest people you have ever met, and the people you have lost touch with are some of the most important ones. What you don't recognize is that they are realizing that too, and aren't really cold, catty, mean or insincere, but that they are as confused as you.

You look at your job... and it is not even close to what you thought you would be doing, or maybe you are looking for a job and realizing that you are going to have to start at the bottom and that scares you. Your opinions have gotten stronger. You see what others are doing and find yourself judging more than usual because suddenly you realize that you have certain boundaries in your life and are constantly adding things to your list of what is acceptable and what isn't. 

One minute you are insecure and then the next secure. You laugh and cry with the greatest force of your life. You feel alone and scared and confused. Suddenly, change is the enemy and you try and cling on to the past with dear life, but soon realize that the past is drifting further and further away, and there is nothing to do but stay where you are or move forward.

You get your heart broken and wonder how someone you loved could do such damage to you. Or you lie in bed and wonder why you can't meet anyone decent enough that you want to get to know better. Or maybe you love someone but love someone else too and cannot figure out why you're doing this because you know that you aren't a bad person. One night stands and random hook ups start to look cheap. Getting wasted and acting like an idiot starts to look pathetic.

You go through the same emotions and questions over and over,and talk with your friends about the same topics because you cannot seem to make a decision. You worry about loans, money, the future and making a life for yourself... and while winning the race would be great, right now you'd just like to be a contender!

What you may not realize is that everyone reading this relates to it. We are in our best of times and our worst of times, trying as hard as we can to figure this whole thing out.




Four Things You Never Knew Your Mobile Phone Could Do

There are a few things that can be done in times of grave emergencies. Your mobile phone can actually be a life saver or an emergency tool for survival. Check out the things that you can do with it:

1. Emergency
The Emergency Number worldwide for Mobile is 112. If you find yourself out of the coverage area of your mobile; network and there is an emergency, dial 112 and the mobile will search any existing network to establish the emergency number for you, and interestingly this number 112 can be dialed even if the keypad is locked. Try it out.
Also in Australia , the Australian emergency number 000 can be dialed whilst your mobile phone keyboard is locked. This is another reason why 000 receives so many false emergency calls!


2. Have you locked your keys in the car?
Does your car have remote key-less entry? This may come in handy someday. Good reason to own a cell phone: If you lock your keys in the car and the spare keys are at home, call someone at home on their mobile phone from your cell phone.
Hold your cell phone about a foot from your car door and have the person at your home press the unlock button, holding it near the mobile phone on their end. Your car will unlock. Saves someone from having to drive your keys to you. Distance is no object. You could be hundreds of miles away, and if you can reach someone who has the other "remote" for your car, you can unlock the doors (or the trunk).


3.  Hidden Battery Power
Imagine your mobile battery is very low. To activate, press the keys *3370# Your mobile will restart with this reserve and the instrument will show a 50% increase in battery. This reserve will get charged when you charge your mobile next time.


4. How to disable a STOLEN mobile phone?
To check your Mobile phone's serial number key, enter the following code
star-hash-zero-six-hash
* # 0 6 #
A 15 digit code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere safe. When your phone get stolen, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless. You probably won't get your phone back, but at least you know that whoever stole it can't use/sell it either. If everybody does this, there would be no point in people stealing mobile phones.
Not only the above, but also in Australia your stolen phone is added to a "Stolen Mobile Phone" database, so if your phone is found later on it can be returned to you.










 

 

Disable XP Boot Logo

It is possible to disable XP splash screen, which will slightly speed up the overall boot process. Be aware that removing the splash screen will also cause you not to see any boot-up messages that might come up (chkdsk, convert ... ), but if your system runs without any problems then it should not matter.

1. Edit boot.ini
2. Add " /noguiboot" right after "/fastdetect".

(or check the /noguiboot switch in msconfig on the boot.ini tab)

Upon restarting, the splash screen will be gone. It can be re-enabled by removing the new switch.

Saturday, May 21, 2011

Gravity defying plan: Mine moon



A Silicon Valley startup, founded by an Indian-American entrepreneur, plans to mine the moon and is in the process of building robotic rovers that will search the lunar surface for precious metals and rare metallic elements. Moon Express Inc or MoonEx, co-founded by Naveen Jain, is building the robotic rovers alongside scientists at Nasa's Ames Research Centre near San Jose, a report in the 'Los Angeles Times' said. While there is no guaranty that the moon is "flush" with these materials, MoonEx thinks it "may be a gold mine of so called rare earth metals."

"From an entrepreneur's perspective, the moon has never truly been explored," the report quoted Jain, the chairman and company co-founder, as saying. "We think it could hold resources that benefit Earth and all humanity." MoonEx's machines are designed to look for materials that are scarce on Earth but found in everything from a Toyota Prius car  battery to guidance systems on cruise missiles, the report added. "MoonEx should be ready to land on the lunar surface by 2013," Jain said, "It's our goal to be the first company there and stay there."

Sunday, May 15, 2011

Recover a corrupted system file


If an essential Windows file gets whacked by a virus or otherwise corrupted, restore it from the Windows CD. Search the CD for the filename, replacing the last character with an underscore; for example, Notepad.ex_. If it's found, open a command prompt and enter the command EXPAND, followed by the full pathname of the file and of the desired destination: EXPAND D:\SETUP\NOTEPAD.EX_ C:\Windows\NOTEPAD.EXE. If either pathname contains any spaces, surround it with double quotes.

If the file isn't found, search on the unmodified filename. It will probably be inside a CAB file, which Win XP treats as a folder. Simply right-drag and copy the file to the desired location. In other Windows platforms, search for a file matching *.cab that contains the filename. When the search is done, open a command prompt and enter EXTRACT /L followed by the desired location, the full pathname of the CAB file, and the desired filename; for example: EXTRACT /L C:\Windows D:\I386\Driver.cab Notepad.exe. Again, if the destination or CAB file pathname contains spaces, surround it with double quotes.

Rename 'Recycle bin' to whatever you want


1. Start, Run, 'Regedit'.
2. Press 'Ctrl'+'F' to open find box and type 'Recycle Bin' to search.
3. Change any value data with 'Recycle Bin' to whatever name you want to give it ( ie, like 'Trash Can' or 'Dump' etc).
4. Press F3 to continue searching for 'Recycle Bin' and change wherever you come across 'Recycle Bin' to new its new name.
5. Repeat step 4 until you have finished with searching and changed all values to its new name.
6. Close regedit and hit F5 on desktop to see the new name on screen.

Note: As a good practice, always backup your registry before changing anything although changing 'Recycle Bin' name is a simple tweak and doesnt affect anything else.

Reset your lost BIOS password


Here's a DOS trick for Windows 9x, that will reset (delete) your motherboard's BIOS password (aka CMOS password) without any need to open up your computer to remove the battery or mess with jumpers.

This method can come in very handy in the event you ever lose and forget your BIOS password or if you acquire used computers where the unknown previous owners had BIOS passwords set (in fact, this happened to me long ago—I was given a used computer, but there was no way I could enter the CMOS to make changes). It's important to note here that the password we are talking about is only the one that prevents a user from entering the BIOS setup at bootup, not the one that stops you from getting past the boot.

Normally, at bootup you can press a key (usually the DEL key) to access your BIOS allowing you to view it or make changes. With a password set, there is no way to enter setup. Though a password can provide a basic and very effective level of PC security, losing it can be a real headache if you don't know how to fix the problem.

The MS-DOS command that will makes this trick possible is the DEBUG command (debug itself is a utility—debug.exe—which is located in your Windows Command folder). This is not a command to be taken lightly—in other words, it's not a command to play with! You can cause serious corruption with this command and can end up not being able to even boot your computer! Debug is used to work with binary and executable files and allows you to alter (hex edit) the contents of a file or CPU register right down to the binary and byte level.

To begin debug mode, type debug at a MS-DOS prompt or you can specify a file, i.e., DEBUG FILE.EXE. There is a difference in screen output between the two methods. When you type DEBUG alone, debug responds with a hyphen (-) prompt waiting for you to enter commands. The second method, with a file specified, loads the file into memory and you type all the commands on the line used to start debug. In this tip, we will be writing to the BIOS, so the first method is the one that would be used. All debug commands can be aborted at any time by pressing CTRL/C.

Accessing BIOS with DEBUG
The basic trick will be to fool the BIOS into thinking there is a checksum error, in which case it resets itself, including the password. This is done by invalidating the CMOS and to do that we must know how to access the BIOS and where the checksum value of the CMOS is located so that we can change it. Access to the the BIOS content is via what are known as CMOS Ports and it's Port 70 and 71 that will give us the needed access. On almost all AT motherboards, the checksum is located at hexadecimal address 2e and 2f and filling the address 2e with ff is all you should have to do to invalidate the checksum.

Here's what to do if you ever need to reset the password and have no other method, and you don't want to open up your computer to remove the battery or jumpers.

Note! Do this at your own risk. I can only tell you that it has worked for me more than once and has worked for others as well. But I cannot make any guarantees. When I did this, I took a willing risk. The BIOS was Award Modular BIOS v4.51PG

Restart your computer in MS-DOS mode.


When you get to the C:\> or C:\WINDOWS> prompt, type DEBUG and press Enter.


A hyphen (-) prompt will appear waiting for you to enter commands.


Enter the following commands, pressing Enter after each one. Note: the o is the letter o and stands for OUTPUT.


o 70 2e


o 71 ff


q


After the q command (which stands for QUIT), enter Exit.


Then try to enter your BIOS at bootup. The password prompt should now be gone and you should now have full access to it again. However, you will now be at the default BIOS setttings and may want to change them to your preference. You may also want to have your drives autodetected again.
In closing, I should state that in the case of a lost BIOS password, your first step should always be to contact your manufacturer to see if a backdoor password is available that will allow you to bypass the forgotten password.

There are many sites on the net that list backdoor passwords you can try, but beware that some BIOS that are set up to lock up if you enter the wrong password more than a certain number of times, usually only 3 times!

The difference between DVD-R, DVD+R, DVD+RW and DVD-RW explained


There's DVD+R, DVD+RW, DVD-R, DVD-RW, and even DVD-ROM! So what's the difference between all of these different names, aren't all DVDs the same? Well, it's not quite that simple.

Let's first start with the most obvious difference: some have R and some have RW. The "R" stands for readable, while the "W" stands for writeable.

The main difference between DVD-R and DVD-RW, or DVD+R and DVD+RW is that the R disc formats can only be written to once, and then it is only readable and can’t be erased for the rest of its digital life. While RW discs are can be written to and erased many times, they are both readable and writeable.

"R" discs are perfect if they are only needed to be written to once, such as giving some files to a friend or transferring them between PCs. "RW" discs have their strength in the ability to be used many times over, which is great for routine system backups, etc. And naturally, the RW discs are slightly more expensive than the R discs, but you'll have to decide if the trade offs are worth the money.

Now, onto the difference between DVD-R and DVD+R. As I just described above, DVD-R & DVD-RW are sister discs, the difference being one is writeable once, while the other is writeable multiple times. The same thing is true for DVD+R & DVD+RW. So the question is, what's the difference between the plus and minus?

In order to explain this we must take a trip back in time. When DVDs were first being developed, there was no industry standard. Multiple companies were competing to develop what they hoped would be the dominant form of the future.

The DVD-R DVD+R difference can easily be summarized by the following:

    * The DVD-R/RW standard was developed by Pioneer, and is used primarily by Apple and Pioneer. These "minus" discs can only be written to in one layer on the discs surface. In addition, this format is supported by the DVD forum, but is in no way an industry standard. DVD-R/RW discs are cheaper than the "plus" format.
    * The DVD+R/RW format is supported by Philips, Dell, Sony, HP, and Mcft. These discs can be written to in multiple layers, giving them slightly better and more disc storage than the "minus" format. Because of this additional capacity, they are slightly more expensive than "minus" discs.

A couple final things to clear up is the difference between DVD-ROM and DVD+RW, or the other DVD formats I mentioned above. The DVD-ROM drive can only read DVDs, while the other DVD drives can read and write data to DVDs.

And naturally the DVD+RW CD+RW difference can be explained by the "DVD" or "CD" prefix. DVDs, on average, can store up to 4.7 GB of data, while a CD can only store about 700 MB of data, or about 15% of a DVD's capacity. While CDs are slightly cheaper, in my opinion, the benefits of DVDs are much greater.

So now that you've learned about the difference between DVD-R, DVD+R, DVD-RW, DVD+RW, and even DVD-ROM, which one is right for you? The easiest way to determine which is more beneficial is to watch the industry trends. A few years ago all pre-built computers were shipping with DVD-ROM drives. Today, most PCs have a burnable DVD drive.

I feel that the benefits of having a burnable DVD drive far outweigh any additional costs. They store much more data, and they are ideal for storing your home movies to watch on your DVD player.

My advice is to look at DVD burners that support all of the major formats I've mentioned above, DVD-R, DVD+R, DVD-RW, and DVD+RW. While a DVD drive that supports all of these formats may be slightly more expensive, it will allow you to use any type of DVD disc to burn to, and you'll be protected from any industry shifts to one format or the other.

WAREZ DEFINITION


ISO:
A file that is created from an image of a CD. You can make an iso yourself with a program such as Adaptec Easy CD Creator, or you can burn an ISO file to a CD-R to create a copy of a CD.

Bin/cue files:
These are also used to create an image of a CD. Most people burn these with CdrWin or Fireburner. The .bin file contains all the data for the cd, the .cue file is just a small file in text format telling the software exactly how to burn the data onto the CD.

MP3:
Don't know what these are? What cave have you been you living in? This is a format used to compress music files. You can create your own by encoding .wav files ripped from audio CDs. There are many free players that will play mp3s for you (see the Winamp tutorial)

Ace files:
These are used to compress/archive data. Use WinAce to decompress them, or to make your own. The normal format for ace files is to have .ace, .c01, .c01, etc.

Rar files:
Another compression/archive format. This is most commonly used on iso or bin files in order to split them up into smaller files (15 MB is the norm). Winrar and many other utilities can decompress these. Rar files are usually in the format .rar, .r01, .r02, etc. But don't be surprised if you don't see a .rar file. Just open up winrar and point it to .r01. You also may see them packed as .001, .002, etc. (maybe with a .rar, maybe not)

Pub:
This is an FTP that has left on anonymous access. Many are owned by large companies, so they have a lot of bandwidth. This makes it possible for one person to send files there and many people can download them at once =) These are found by scanning ranges of ips (see the FTP tutorial). Just remember, like the name says, these are public. Just because you upload something there or make directories with your name does not make it 'your pub'. At the same time, realize that if you come across a pub with another person/groups stuff on it that it may be in use to build other pubs from - so don't ruin it for many people by deleting stuff you find there. For more on this, go read some posts on our Bulletin Board.

Proxy:
A system that is set up to forward packets... There are many different kinds, check out the proxy tutorial for more info. Basically, a proxy server helps cover up your tracks because you connect to remote computers through the proxy. Think of it as the condom of the Internet

SFV Files/ CRC Checks:
SFV files contain information about files that they accompany. You can preform a CRC check on the files using a program such as WinSFV. This compares the information in the SFV file to the file itself. If the information doesn't match, then the file was probably messed up in transfer somehow.. try downloading it again, from a different source if possible.

0-Day:
Latest software releases.

0-Sec:
Same as above, although the period of time between ripping a game or application and it appearing on a warez site is even shorter.

Ace File:
The first file in a series of compressed archives (the one you double click on to decompress all the files at once).

Active List:
Similar to a mailing list, but uses ICQ to send instant messages to subscribers.

Alpha:
Software receives this label when it is in the very early stages of development. Usually full of bugs, so don't touch it with a barge pole.

Anti-Leech:
A system which uses cgi scripts to prevent people stealing links and then taking the credit for uploading the files.

Appz:
Short for applications. For example Flash 5 or GoLie 5.5.

ASF File:
The worst quality movie file format (still pretty good though), much smaller in size than dat or mpg.

Banner Site:
Password and username restricted FTP site. To get the correct login details you must click on several banners.

Beta:
An acronym for Business Software Alliance, an organisation who are responsible for enforcing anti-piracy litigation. Similar groups in charge of controlling software "theft" include the SIIA, SPA and ELSPA.

BSOD:
Many people read about BSODs on bulletin boards and think that they're being insulted, but there is no need to get paranoid. It is actually an acronym for "Blue Screen Of Death". These can occur for a multitude of reasons (old Bill likes to keep us guessing!) and are the bane of PC user's lives.

Bulletin Board:
A virtual meeting place on the web similar to a chat room except that it isn't in real time. One person leaves a message then others come along, read it and add a reply. Each new discussion is called a new topic or thread and has it's own link. Whenever a new topic is created the older topics are pushed one place downwards in the list. When someone replies to an older topic it is brought back to the top of the list.

C?? File:
File extension that indicates that a file is part of an .ace or .rar series of compressed files.

Cgi Scripts:
These are referrers which are used in url’s. When you click on a link with a ?cgi reference you are directed to a sponsor’s website or an anti-leech protected file.

Cookie:
A tiny text file (usually less than 1kb), which is stored on your hard drive when you visit a web site. These are used to remember who you are so that you can access members only areas on the site without having to type in a password every time or to retain your personalised settings so that they are available the next time you visit.

Courier:
Someone who is involved in the logistics of delivering new releases directly from the release groups themselves to FTP sites.

Crack:
A tiny executable file that is used to transform a shareware program into the full version. Also used to remove any copy protection from the main executable of games (this will already have been done in "ripped" warez games).

CRC Error:
These can occur when you try to decompress a file that has become corrupt during the downloading process, usually as a result of too much resuming.

Credits:
The amount of data you are permitted to download from a ratio site. The more credits you have the more software you are allowed to download.

DAP:
A quick way of referring to "Download Accelerator Plus", a free download manager that claims to speed up file transfers by up to three hundred per cent. It works by making multiple connections to the same file and is paid for by revolving advertising banners.Also supports resume. **EDITOR'S PICK**

DAT File:
File format used for movies, identical in quality and size to mpg as far as I can tell.

DC:
The lazy way of referring to the Dreamcast, Sega's latest console incarnation.

Decompression:
Unpacking many files that have been stored in a single archive.

Distro:
A concise means of referring to a distribution FTP site. These are huge storage areas which act as a springboard for the transfer of new releases. Their whereabouts are never public disclosed to aid their survival rate. You can think of them as the initial source from which warez emanates.

Direct Downloads
Links to actual files rather than other warez sites or pages. These are usually gathered together from many different sites and put on one page for your convenience.

DivX:
Movies ripped from a DVD using the DivX video codecs. Can be played back using Media Player.

DIZ File:
Short for description. Very brief text file found in warez archives stating the title of the software, the number of files that makes up the set and the group who released it.

Download (or DL):
Copying files from a web server or FTP site to your computer using a modem.

Emulator:
An application that simulates another computer system or console using your PC.

FAQ:
Stands for Frequently Asked Questions.

FAW:
Abbreviation for "Files Anywhere", a popular, free web storage service.

File Transfer Protocol (FTP):
The method used to transfer files from one computer to another using a modem.

Flaming:
A general net term for "verbally" attacking someone. This can be done via email, bulletin board, chat room or any medium which involves communication across the web.

Freedrive:
Virtual hard drive storage area on the web. Free to join and anything and everything can be uploaded or downloaded.

Freeware:
Unrestricted software that is downloaded from the net and is completely free to use. Often paid for using advertising.

FTP Client / Browser:
A program used to access, upload and download data from FTP sites.

Fxp:
The art of transferring data from one Ftp site to another using the connection speed of the slower of the two computers.

Gamez:
Pretty self-explanatory this one.

Getright:
One of the best download managers available.

Gold:
A piece of software is said to have gone gold when the final version is complete and it is ready to ship to the public.

Gozilla:
Another excellent download manager.

Hacking:
Gaining access to a remote computer without the authorisation to do so. Usually for the purposes of stealing confidential information or the malicious destruction of data.

Hammering:
Repeatedly trying to access an FTP site using an FTP client or download manager.

HTTP:
Stands for "Hypertext Transfer Protocol". The method you use to view a web page. Always comes before the address of a website in your Url bar.

ICQ:
Derives from the term "I Seek You" and is used for real time chat and transferring files over the internet.

IP Address:
A series of numbers separated by dots used to identify your computer on the Internet.

IRC:
Stands for "Instant Relay Chat". Used for real time chat and transferring files over the Internet.

ISO:
An exact copy of an original CD, all the multimedia bits and pieces are uncut and therefore they are extremely large and awkward to download.

Java:
Html scripts used to add functionality to or bring web pages alive. These include animation (such as the title graphic on my main page), menus, chat rooms, buttons, pop ups and so on.

Key Generator:
A tiny executable program that is capable of creating a serial number from a specified username. These are specific to particular applications or utilities, so a serial number created with one key generator will only work for the program for which the key generator was developed.

Lamer:
An annoying and overused general derogatory term used to insult/put down anyone and everything.

Leeching:
Downloading files without giving anything back in return or copying other people’s links.

Mirror:
An exact copy of a web site that is stored on a different server. Using multiple locations for warez sites allows the site to be accessed using a different address if the main site is deleted.

Modchip:
Very common website sponsor found on warez sites. They don’t mind their banners being used on illegal software sites because their products are one of the “grey areas” of the law. Modchips are small pieces of electronic circuitry which allow copied games to be played on your Playstation. If a Playstation has been fitted with a Modchip it is said to have been "chipped".

MP3 File:
Compressed music file format. Average track size is between 3 and 4 meg compared to 40-ish meg in wav format.

MPG File:
The best quality and largest movie file format.

Multi Web Space Faker:
A tool used to create lots of free web space accounts simultaneously.

Name Zero:
An organisation that offers free website domain names. The main drawbacks are that you have to put up with a very bulky banner residing at the bottom of your page and the fact that you never actually own your chosen address.

NFO File:
Short for info or information. Basic text file containing all the important details relating to a particular release, such as number of files, release date, copy protection system, installation instructions etc.

Nuked:
A release is said to be nuked if it is completely unplayable. Usually when this happens another group re-releases the particular game, although fixes do sometimes follow on to rescue the game from trash can.

OEM:
An acronym for Original Equipment Manufacturer. OEM software products are repackaged versions of the full retail product. They are often re-branded to suit the needs of the particular vender and are much more reasonable priced because they lack excessive packaging and a hard copy of the manual.

OST:
Not strictly a warez term this one, but one that you are likely to come across while searching for MP3 music. It stands for original soundtrack (movie music).

Patch:
We all know games and applications aren't perfect. When they are released we would hope that they have been thoroughly tested for bugs and incompatibility problems, but you can guarantee that many of these will still slip through the quality control net. Once the program is released to the general public, the bug reports start to flood in. A patch is a downloadable executive file which takes these reports into account and attempts to incorporate all the fixes for these known problems. A patch can resolve incompatibility problems, prevent crashes or improve the performance of a piece of software.

Piracy:
The replication and distribution of videos or computer software.

Pop-ups:
Irritating browser windows that open automatically when you visit a warez site. Usually contain voting portals or porn sites.

Port:
A port is a term used when referring to FTP sites and is an essential extension of the address used to access them. If the port number of an FTP site isn't specified the default setting of 21 will automatically be used.

Pron:
A long time ago in a galaxy far, far away someone posted a request for porn on a bulletin board, only, because of a typing error what he ended up asking for was "pron". Since then this has become a bit of a running joke and so it is now deliberately misspelled.

Proxy:
A third party server which acts as an anonymous go between whenever you request a web page or contact a remote server. The message from your computer is first sent through the proxy server before being relayed to the final destination so that it appears as though the request has come from the IP address of the proxy server rather than you. Used when you wish to maintain your privacy on the net or speed up your connection (much more detailed info on this subject in the "more tips" section).

Psx:
A quick way of referring to the Sony Playstation.

Pub:
A free for all FTP site where anonymous access is permitted.

Pub Scanner:
Someone who scours the net for anonymous access FTP sites which permit the creation and deletion of files. These are then exploited by uploading software for others to share.

Pub Stealer:
Someone who posts the IP address of a public FTP site which they themselves have not built. Some pub stealers justify this by claiming that the elitism of private FXP groups discriminates against those people who do not have access, yet others simply post other people's work to try to claim the credit for themselves. Either way though, pub stealers are despised by the FXP groups and praised by those who would otherwise not have access to them.

Rar File:
The first file in a series of compressed archives (the one you double click on to decompress all the files at once). Usually decompressed using a program called Winrar.

Release Groups:
A group of people who are involved in cracking and / or ripping software and then repackaging it into easily downloadable segments.

Ratio:
Two numbers separated by a semi-colon. Indicates how much data you must upload to an FTP site before you are permitted to download anything.

Reg File:
Tiny file that adds essential configuration details into the registry.

Resume:
The ability to stop and start downloading / uploading a file whenever you choose without having to start from the beginning again.

Rip:
Software that has had all the non-essential gubbins removed to reduce its size. Videos and music are always the first casualties.

Raped:
A release is branded with this term if it has been damaged beyond repair during the ripping process.

RM File:
Shorthand for Real Media, a file format used to encode video sequences, which can only be played back using the "Real Player". Video clips produced using this format are not of the highest quality, but do have the advantage of a small file size.

ROM:
Games which are designed for other platforms, but are played on the PC using an emulator.

Serial:
A valid username and password that is saved as a basic text file and is used to register a shareware program and therefore remove all the restrictions.

Shareware:
Try before you buy software downloaded from the net.

Spam:
Unsolicited junk e-mail. Supposedly stands for "Stupid Person's Annoying Message".

Sponsor:
To make some money webmasters can place adverts on their sites. Each time you click on these adverts or banners they get paid a few cents for bringing potential customers to the sponsors website.

Surfer Friendly (SF):
Surfer friendly sites supposedly have no blind links, pop-ups or porn banners. Don't be fooled by this label though as some sites will tell you fibs to get you to visit them.

Sys Op:
The person who has the responsibility for running the computer from which an FTP site has been established. When warez is uploaded to public FTP sites and then suddenly goes "Missing In Action" you can often lay the blame at the door of the Sys Op who has an obligation to make sure his/her server stays within the boundaries of the law (i.e. warez free).

Top List:
Chart which lists in rank order the best warez sites. Worked out on the basis of votes.

Trading:
Swapping warez, file for file via FTP, ICQ etc. Not usually approved of by the real warez community who believe that warez should be freely distributed. To put it simply, it is not the "warez way".

Trainer:
A small, executable program which sits in your taskbar while you play a game. Hotkeys are associated with cheat commands so that when they are pressed you are given extra ammo, weapons, lives or the ability to toggle between invincible/mortal modes etc etc.

Trojans:
Nasty virus like attachments which can be merged with executable files. These are tiny so are unlikely to arouse suspicion. When run they allow a hacker to access your computer and wreak havoc. Can occasionally be found in warez files.

UBB:
Shorthand for Ultimate Bulletin Board, currently the most popular script used for creating warez bulletin boards.

UBB Hacks:
This term falsely gives the impression that something destructive or malicious is involved, but when you hear people talking about a hack in the context of bulletin boards they are simply referring to code which helps to improve the functionality of a board. For example a "thread hack" would effect the way in which individual threads look and operate.

Undeletable Pub:
An anonymous access, public FTP site where the permission attributes are set to allow uploads and downloads, but do not permit deletion.

Unzip:
Unpacking or decompressing many files that have been stored in a single archive. Technically only used when talking about zip files.

Upload:
Copying files from your computer to a web server or FTP site using a modem.

URL:
Stands for "Uniform Resource Locator". The web site address you type into your browser.

Voting:
Members of the warez scene are very keen to reach the number one slot of top lists such as Voodoo, Top 60 etc. and will therefore encourage you to vote for their site to improve their position and get the credit they deserve (or not as the case may be!).
Warez:
Full version software that is uploaded to the internet and is available for free download.

Warez Board:
Bulletin board used by the warez community to share links and discuss anything related to warez.

Winace:
Another utility used for decompressing all the common archive formats. Not great in my opinion. See below for a better one.

Winrar:
Utility used for decompressing .rar files and much more.

Winzip:
An essential tool used to decompress warez files.

Zip:
A common compression format used to store warez .

Windows Shortcuts


Run Commands:

Quote:
compmgmt.msc - Computer management
devmgmt.msc - Device manager
diskmgmt.msc - Disk management
dfrg.msc - Disk defrag
eventvwr.msc - Event viewer
fsmgmt.msc - Shared folders
gpedit.msc - Group policies
lusrmgr.msc - Local users and groups
perfmon.msc - Performance monitor
rsop.msc - Resultant set of policies
secpol.msc - Local security settings
services.msc - Various Services
msconfig - System Configuration Utility
regedit - Registry Editor
msinfo32 _ System Information
sysedit _ System Edit
win.ini _ windows loading information(also system.ini)
winver _ Shows current version of windows
mailto: _ Opens default email client
command _ Opens command prompt


Run Commands to access the control panel:

Quote:
Add/Remove Programs control appwiz.cpl
Date/Time Properties control timedate.cpl
Display Properties control desk.cpl
FindFast control findfast.cpl
Fonts Folder control fonts
Internet Properties control inetcpl.cpl
Keyboard Properties control main.cpl keyboard
Mouse Properties control main.cpl
Multimedia Properties control mmsys.cpl
Network Properties control netcpl.cpl
Password Properties control password.cpl
Printers Folder control printers
Sound Properties control mmsys.cpl sounds
System Properties control sysdm.cpl



Command Prompt:

Quote:
ANSI.SYS Defines functions that change display graphics, control cursor movement, and reassign keys.
APPEND Causes MS-DOS to look in other directories when editing a file or running a command.
ARP Displays, adds, and removes arp information from network devices.
ASSIGN Assign a drive letter to an alternate letter.
ASSOC View the file associations.
AT Schedule a time to execute commands or programs.
ATMADM Lists connections and addresses seen by Windows ATM call manager.
ATTRIB Display and change file attributes.
BATCH Recovery console command that executes a series of commands in a file.
BOOTCFG Recovery console command that allows a user to view, modify, and rebuild the boot.ini
BREAK Enable / disable CTRL + C feature.
CACLS View and modify file ACL's.
CALL Calls a batch file from another batch file.
CD Changes directories.
CHCP Supplement the International keyboard and character set information.
CHDIR Changes directories.
CHKDSK Check the hard disk drive running FAT for errors.
CHKNTFS Check the hard disk drive running NTFS for errors.
CHOICE Specify a listing of multiple options within a batch file.
CLS Clears the screen.
CMD Opens the command interpreter.
COLOR Easily change the foreground and background color of the MS-DOS window.
COMP Compares files.
COMPACT Compresses and uncompress files.
CONTROL Open control panel icons from the MS-DOS prompt.
CONVERT Convert FAT to NTFS.
COPY Copy one or more files to an alternate location.
CTTY Change the computers input/output devices.
DATE View or change the systems date.
DEBUG Debug utility to create assembly programs to modify hardware settings.
DEFRAG Re-arrange the hard disk drive to help with loading programs.
DEL Deletes one or more files.
DELETE Recovery console command that deletes a file.
DELTREE Deletes one or more files and/or directories.
DIR List the contents of one or more directory.
DISABLE Recovery console command that disables Windows system services or drivers.
DISKCOMP Compare a disk with another disk.
DISKCOPY Copy the contents of one disk and place them on another disk.
DOSKEY Command to view and execute commands that have been run in the past.
DOSSHELL A GUI to help with early MS-DOS users.
DRIVPARM Enables overwrite of original device drivers.
ECHO Displays messages and enables and disables echo.
EDIT View and edit files.
EDLIN View and edit files.
EMM386 Load extended Memory Manager.
ENABLE Recovery console command to enable a disable service or driver.
ENDLOCAL Stops the localization of the environment changes enabled by the setlocal command.
ERASE Erase files from computer.
EXIT Exit from the command interpreter.
EXPAND Expand a M*cros*ft Windows file back to it's original format.
EXTRACT Extract files from the M*cros*ft Windows cabinets.
FASTHELP Displays a listing of MS-DOS commands and information about them.
FC Compare files.
FDISK Utility used to create partitions on the hard disk drive.
FIND Search for text within a file.
FINDSTR Searches for a string of text within a file.
FIXBOOT Writes a new boot sector.
FIXMBR Writes a new boot record to a disk drive.
FOR Boolean used in batch files.
FORMAT Command to erase and prepare a disk drive.
FTP Command to connect and operate on a FTP server.
FTYPE Displays or modifies file types used in file extension associations.
GOTO Moves a batch file to a specific label or location.
GRAFTABL Show extended characters in graphics mode.
HELP Display a listing of commands and brief explanation.
IF Allows for batch files to perform conditional processing.
IFSHLP.SYS 32-bit file manager.
IPCONFIG Network command to view network adapter settings and assigned values.
KEYB Change layout of keyboard.
LABEL Change the label of a disk drive.
LH Load a device driver in to high memory.
LISTSVC Recovery console command that displays the services and drivers.
LOADFIX Load a program above the first 64k.
LOADHIGH Load a device driver in to high memory.
LOCK Lock the hard disk drive.
LOGON Recovery console command to list installations and enable administrator login.
MAP Displays the device name of a drive.
MD Command to create a new directory.
MEM Display memory on system.
MKDIR Command to create a new directory.
MODE Modify the port or display settings.
MORE Display one page at a time.
MOVE Move one or more files from one directory to another directory.
MSAV Early M*cros*ft Virus scanner.
MSD Diagnostics utility.
MSCDEX Utility used to load and provide access to the CD-ROM.
NBTSTAT Displays protocol statistics and current TCP/IP connections using NBT
NET Update, fix, or view the network or network settings
NETSH Configure dynamic and static network information from MS-DOS.
NETSTAT Display the TCP/IP network protocol statistics and information.
NLSFUNC Load country specific information.
NSLOOKUP Look up an IP address of a domain or host on a network.
PATH View and modify the computers path location.
PATHPING View and locate locations of network latency.
PAUSE Command used in batch files to stop the processing of a command.
PING Test / send information to another network computer or network device.
POPD Changes to the directory or network path stored by the pushd command.
POWER Conserve power with computer portables.
PRINT Prints data to a printer port.
PROMPT View and change the MS-DOS prompt.
PUSHD Stores a directory or network path in memory so it can be returned to at any time.
QBASIC Open the QBasic.
RD Removes an empty directory.
REN Renames a file or directory.
RENAME Renames a file or directory.
RMDIR Removes an empty directory.
ROUTE View and configure windows network route tables.
RUNAS Enables a user to execute a program on another computer.
SCANDISK Run the scandisk utility.
SCANREG Scan registry and recover registry from errors.
SET Change one variable or string to another.
SETLOCAL Enables local environments to be changed without affecting anything else.
SETVER Change MS-DOS version to trick older MS-DOS programs.
SHARE Installs support for file sharing and locking capabilities.
SHIFT Changes the position of replaceable parameters in a batch program.
SHUTDOWN Shutdown the computer from the MS-DOS prompt.
SMARTDRV Create a disk cache in conventional memory or extended memory.
SORT Sorts the input and displays the output to the screen.
START Start a separate window in Windows from the MS-DOS prompt.
SUBST Substitute a folder on your computer for another drive letter.
SWITCHES Remove add functions from MS-DOS.
SYS Transfer system files to disk drive.
TELNET Telnet to another computer / device from the prompt.
TIME View or modify the system time.
TITLE Change the title of their MS-DOS window.
TRACERT Visually view a network packets route across a network.
TREE View a visual tree of the hard disk drive.
TYPE Display the contents of a file.
UNDELETE Undelete a file that has been deleted.
UNFORMAT Unformat a hard disk drive.
UNLOCK Unlock a disk drive.
VER Display the version information.
VERIFY Enables or disables the feature to determine if files have been written properly.
VOL Displays the volume information about the designated drive.
XCOPY Copy multiple files, directories, and/or drives from one location to another.
TRUENAME When placed before a file, will display the whole directory in which it exists
TASKKILL It allows you to kill those unneeded or locked up applications




Windows XP Shortcuts:

Quote:
ALT+- (ALT+hyphen) Displays the Multiple Document Interface (MDI) child window's System menu
ALT+ENTER View properties for the selected item
ALT+ESC Cycle through items in the order they were opened
ALT+F4 Close the active item, or quit the active program
ALT+SPACEBAR Display the System menu for the active window
ALT+TAB Switch between open items
ALT+Underlined letter Display the corresponding menu
BACKSPACE View the folder one level up in My Computer or Windows Explorer
CTRL+A Select all
CTRL+B Bold
CTRL+C Copy
CTRL+I Italics
CTRL+O Open an item
CTRL+U Underline
CTRL+V Paste
CTRL+X Cut
CTRL+Z Undo
CTRL+F4 Close the active document
CTRL while dragging Copy selected item
CTRL+SHIFT while dragging Create shortcut to selected iteM
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word
CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word
CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph
CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph
SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin
ESC Cancel the current task
F1 Displays Help
F2 Rename selected item
F3 Search for a file or folder
F4 Display the Address bar list in My Computer or Windows Explorer
F5 Refresh the active window
F6 Cycle through screen elements in a window or on the desktop
F10 Activate the menu bar in the active program
SHIFT+F10 Display the shortcut menu for the selected item
CTRL+ESC Display the Start menu
SHIFT+CTRL+ESC Launches Task Manager
SHIFT when you insert a CD Prevent the CD from automatically playing
WIN Display or hide the Start menu
WIN+BREAK Display the System Properties dialog box
WIN+D Minimizes all Windows and shows the Desktop
WIN+E Open Windows Explorer
WIN+F Search for a file or folder
WIN+F+CTRL Search for computers
WIN+L Locks the desktop
WIN+M Minimize or restore all windows
WIN+R Open the Run dialog box
WIN+TAB Switch between open items




Windows Explorer Shortcuts:

Quote:
ALT+SPACEBAR - Display the current window’s system menu
SHIFT+F10 - Display the item's context menu
CTRL+ESC - Display the Start menu
ALT+TAB - Switch to the window you last used
ALT+F4 - Close the current window or quit
CTRL+A - Select all items
CTRL+X - Cut selected item(s)
CTRL+C - Copy selected item(s)
CTRL+V - Paste item(s)
CTRL+Z - Undo last action
CTRL+(+) - Automatically resize the columns in the right hand pane
TAB - Move forward through options
ALT+RIGHT ARROW - Move forward to a previous view
ALT+LEFT ARROW - Move backward to a previous view
SHIFT+DELETE - Delete an item immediately
BACKSPACE - View the folder one level up
ALT+ENTER - View an item’s properties
F10 - Activate the menu bar in programs
F6 - Switch between left and right panes
F5 - Refresh window contents
F3 - Display Find application
F2 - Rename selected item




Internet Explorer Shortcuts:

Quote:
CTRL+A - Select all items on the current page
CTRL+D - Add the current page to your Favorites
CTRL+E - Open the Search bar
CTRL+F - Find on this page
CTRL+H - Open the History bar
CTRL+I - Open the Favorites bar
CTRL+N - Open a new window
CTRL+O - Go to a new location
CTRL+P - Print the current page or active frame
CTRL+S - Save the current page
CTRL+W - Close current browser window
CTRL+ENTER - Adds the http://www. (url) .com
SHIFT+CLICK - Open link in new window
BACKSPACE - Go to the previous page
ALT+HOME - Go to your Home page
HOME - Move to the beginning of a document
TAB - Move forward through items on a page
END - Move to the end of a document
ESC - Stop downloading a page
F11 - Toggle full-screen view
F5 - Refresh the current page
F4 - Display list of typed addresses
F6 - Change Address bar and page focus
ALT+RIGHT ARROW - Go to the next page
SHIFT+CTRL+TAB - Move back between frames
SHIFT+F10 - Display a shortcut menu for a link
SHIFT+TAB - Move back through the items on a page
CTRL+TAB - Move forward between frames
CTRL+C - Copy selected items to the clipboard
CTRL+V - Insert contents of the clipboard
ENTER - Activate a selected link
HOME - Move to the beginning of a document
END - Move to the end of a document
F1 - Display Internet Explorer Help

What is the Registry?


The Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.

The physical files that make up the registry are stored differently depending on your version of Windows; under Windows 95 & 98 it is contained in two hidden files in your Windows directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the %SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a tool commonly known as a "Registry Editor" to make any changes (using registry editors will be discussed later in the article).

The Structure of The Registry
The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer.

Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context.

There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:


* HKEY_CLASSES_ROOT - This branch contains all of your file association mappings to support the drag-and-drop feature, OLE information, Windows shortcuts, and core aspects of the Windows user interface.
* HKEY_CURRENT_USER - This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the PC and contains information such as logon names, desktop settings, and Start menu settings.
* HKEY_LOCAL_MACHINE - This branch contains computer specific information about the type of hardware, software, and other preferences on a given PC, this information is used for all users who log onto this computer.
* HKEY_USERS - This branch contains individual preferences for each user of the computer, each user is represented by a SID sub-key located under the main branch.
* HKEY_CURRENT_CONFIG - This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration.
* HKEY_DYN_DATA - This branch points to the part of HKEY_LOCAL_MACHINE, for use with the Plug-&-Play features of Windows, this section is dymanic and will change as devices are added and removed from the system.



Each registry value is stored as one of five main data types:


* REG_BINARY - This type stores the value as raw binary data. Most hardware component information is stored as binary data, and can be displayed in an editor in hexadecimal format.
* REG_DWORD - This type represents the data by a four byte number and is commonly used for boolean values, such as "0" is disabled and "1" is enabled. Additionally many parameters for device driver and services are this type, and can be displayed in REGEDT32 in binary, hexadecimal and decimal format, or in REGEDIT in hexadecimal and decimal format.
* REG_EXPAND_SZ - This type is an expandable data string that is string containing a variable to be replaced when called by an application. For example, for the following value, the string "%SystemRoot%" will replaced by the actual location of the directory containing the Windows NT system files. (This type is only available using an advanced registry editor such as REGEDT32)
* REG_MULTI_SZ - This type is a multiple string used to represent values that contain lists or multiple values, each entry is separated by a NULL character. (This type is only available using an advanced registry editor such as REGEDT32)
* REG_SZ - This type is a standard string, used to represent human readable text values.



Other data types not available through the standard registry editors include:


* REG_DWORD_LITTLE_ENDIAN - A 32-bit number in little-endian format.
* REG_DWORD_BIG_ENDIAN - A 32-bit number in big-endian format.
* REG_LINK - A Unicode symbolic link. Used internally; applications should not use this type.
* REG_NONE - No defined value type.
* REG_QWORD - A 64-bit number.
* REG_QWORD_LITTLE_ENDIAN - A 64-bit number in little-endian format.
* REG_RESOURCE_LIST - A device-driver resource list.



Editing The Registry

The Registry Editor (REGEDIT.EXE) is included with most version of Windows (although you won't find it on the Start Menu) it enables you to view, search and edit the data within the Registry. There are several methods for starting the Registry Editor, the simplest is to click on the Start button, then select Run, and in the Open box type "regedit", and if the Registry Editor is installed it should now open and look like the image below.

An alternative Registry Editor (REGEDT32.EXE) is available for use with Windows NT/2000, it includes some additional features not found in the standard version, including; the ability to view and modify security permissions, and being able to create and modify the extended string values REG_EXPAND_SZ & REG_MULTI_SZ.

Create a Shortcut to Regedit
This can be done by simply right-clicking on a blank area of your desktop, selecting New, then Shortcut, then in the Command line box enter "regedit.exe" and click Next, enter a friendly name (e.g. 'Registry Editor') then click Finish and now you can double click on the new icon to launch the Registry Editor.

Using Regedit to modify your Registry
Once you have started the Regedit you will notice that on the left side there is a tree with folders, and on the right the contents (values) of the currently selected folder.

Like Windows explorer, to expand a certain branch (see the structure of the registry section), click on the plus sign [+] to the left of any folder, or just double-click on the folder. To display the contents of a key (folder), just click the desired key, and look at the values listed on the right side. You can add a new key or value by selecting New from the Edit menu, or by right-clicking your mouse. And you can rename any value and almost any key with the same method used to rename files; right-click on an object and click rename, or click on it twice (slowly), or just press F2 on the keyboard. Lastly, you can delete a key or value by clicking on it, and pressing Delete on the keyboard, or by right-clicking on it, and choosing Delete.

Note: it is always a good idea to backup your registry before making any changes to it. It can be intimidating to a new user, and there is always the possibility of changing or deleting a critical setting causing you to have to reinstall the whole operating system. It's much better to be safe than sorry!

Importing and Exporting Registry Settings

A great feature of the Registry Editor is it's ability to import and export registry settings to a text file, this text file, identified by the .REG extension, can then be saved or shared with other people to easily modify local registry settings. You can see the layout of these text files by simply exporting a key to a file and opening it in Notepad, to do this using the Registry Editor select a key, then from the "Registry" menu choose "Export Registry File...", choose a filename and save. If you open this file in notepad you will see a file similar to the example below:

Quote:

REGEDIT4

[HKEY_LOCAL_MACHINE\SYSTEM\Setup]
"SetupType"=dword:00000000
"CmdLine"="setup -newsetup"
"SystemPrefix"=hex:c5,0b,00,00,00,40,36,02


The layout is quite simple, REGEDIT4 indicated the file type and version, [HKEY_LOCAL_MACHINE\SYSTEM\Setup] indicated the key the values are from, "SetupType"=dword:00000000 are the values themselves the portion after the "=" will vary depending on the type of value they are; DWORD, String or Binary.

So by simply editing this file to make the changes you want, it can then be easily distributed and all that need to be done is to double-click, or choose "Import" from the Registry menu, for the settings to be added to the system Registry.

Deleting keys or values using a REG file
It is also possible to delete keys and values using REG files. To delete a key start by using the same format as the the REG file above, but place a "-" symbol in front of the key name you want to delete. For example to delete the [HKEY_LOCAL_MACHINE\SYSTEM\Setup] key the reg file would look like this:

Quote:

REGEDIT4

[-HKEY_LOCAL_MACHINE\SYSTEM\Setup]


The format used to delete individual values is similar, but instead of a minus sign in front of the whole key, place it after the equal sign of the value. For example, to delete the value "SetupType" the file would look like:

Quote:

REGEDIT4

[HKEY_LOCAL_MACHINE\SYSTEM\Setup]
"SetupType"=-


Use this feature with care, as deleting the wrong key or value could cause major problems within the registry, so remember to always make a backup first.

Regedit Command Line Options
Regedit has a number of command line options to help automate it's use in either batch files or from the command prompt. Listed below are some of the options, please note the some of the functions are operating system specific.


* regedit.exe [options] [filename] [regpath]
* [filename] Import .reg file into the registry
* /s [filename] Silent import, i.e. hide confirmation box when importing files
* /e [filename] [regpath] Export the registry to [filename] starting at [regpath]
e.g. regedit /e file.reg HKEY_USERS\.DEFAULT
* /L:system Specify the location of the system.dat to use
* /R:user Specify the location of the user.dat to use
* /C [filename] Compress (Windows 98)
* /D [regpath] Delete the specified key (Windows 98)

Maintaining the Registry

How can you backup and restore the Registry?

Windows 95
Microsoft included a utility on the Windows 95 CD-ROM that lets you create backups of the Registry on your computer. The Microsoft Configuration Backup program, CFGBACK.EXE, can be found in the \Other\Misc\Cfgback directory on the Windows 95 CD-ROM. This utility lets you create up to nine different backup copies of the Registry, which it stores, with the extension RBK, in your \Windows directory. If your system is set up for multiple users, CFGBACK.EXE won't back up the USER.DAT file.

After you have backed up your Registry, you can copy the RBK file onto a floppy disk for safekeeping. However, to restore from a backup, the RBK file must reside in the \Windows directory. Windows 95 stores the backups in compressed form, which you can then restore only by using the CFGBACK.EXE utility.

Windows 98
Microsoft Windows 98 automatically creates a backup copy of the registry every time Windows starts, in addition to this you can manually create a backup using the Registry Checker utility by running SCANREGW.EXE from Start | Run menu.

What to do if you get a Corrupted Registry
Windows 95, 98 and NT all have a simple registry backup mechanism that is quite reliable, although you should never simply rely on it, remember to always make a backup first!

Windows 95
In the Windows directory there are several hidden files, four of these will be SYSTEM.DAT & USER.DAT, your current registry, and SYSTEM.DA0 & USER.DA0, a backup of your registry. Windows 9x has a nice reature in that every time it appears to start successfully it will copy the registry over these backup files, so just in case something goes wrong can can restore it to a known good state. To restore the registry follow these instruction:
[list=1]
* Click the Start button, and then click Shut Down.

* Click Restart The Computer In MS-DOS Mode, then click Yes.

* Change to your Windows directory. For example, if your Windows directory is c:\windows, you would type the following:

cd c:\windows

* Type the following commands, pressing ENTER after each one. (Note that SYSTEM.DA0 and USER.DA0 contain the number zero.)

attrib -h -r -s system.dat
attrib -h -r -s system.da0
copy system.da0 system.dat
attrib -h -r -s user.dat
attrib -h -r -s user.da0
copy user.da0 user.dat

* Restart your computer.



Following this procedure will restore your registry to its state when you last successfully started your computer.

If all else fails, there is a file on your hard disk named SYSTEM.1ST that was created when Windows 95 was first successfully installed. If necessary you could also change the file attributes of this file from read-only and hidden to archive to copy the file to C:\WINDOWS\SYSTEM.DAT.

Windows NT
On Windows NT you can use either the "Last Known Good" option or RDISK to restore to registry to a stable working configuration.

How can I clean out old data from the Registry?
Although it's possible to manually go through the Registry and delete unwanted entries, Microsoft provides a tool to automate the process, the program is called RegClean. RegClean analyzes Windows Registry keys stored in a common location in the Windows Registry. It finds keys that contain erroneous values, it removes them from the Windows Registry after having recording those entries in the Undo.Reg file.