Monday, May 24, 2010

Shake Your Head Or Shake Your Browser


This is small script to make your browser start shaking just for little fun.
try to past this code into your browser address bar.


javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)

I run this in Firefox and it work for me i don't will work for your browser too.


Thursday, May 13, 2010

Anonymous IP Address while you are on World Wide Web

    When you’re on the Internet, your activity can be traced using your IP address. An IP address is a number that identifies your router or network device on the Internet or in your network. The only problem is that a lot of personal information is attached to your IP address because of your Internet Service Provider (ISP). If you’re doing something you’re not supposed to be doing, someone can grab your IP address and track you down. Most websites keep a record of the IP addresses of people coming to their website. A lot of them do nothing with these addresses unless someone does something that deserves permanent banishment from their site. Who knows what other suspicious things other sites are doing with your IP address.

    You can hide your IP address one of three ways. 1st, proxy servers are tools that have their own IP address you can use while going about your business on the Internet. Instead of your IP address showing up when you go to a website, their IP address will appear. If they try to trace you, the proxy server’s address will come up instead of your own. However, this isn’t a fool proof method for staying anonymous on the Internet. If you commit illegal or immoral acts surfing the World Wide Web, the proxy server is going to surrender your real IP address in the blink of an eye and you will go to prison. Therefore, no matter what measures you take, the authorities are still going to get you if you commit criminal acts.

    Second, programs exist for the sole purpose of blocking other IP addresses from accessing your computer. This isn’t going to keep your IP address anonymous per say, but it will keep people from trying to trace you through looking into your internet activities. There are disadvantages to this approach through. If you block IP addresses from ISPs that share them for a wide range of computers, you’re going to limit the syndication of content to a specific region. You have to be careful which IP addresses you do block to keep your ability to access the Internet wide open.

    Finally, firewall programs are the best option for hiding your personal information and keeping intruders from attacking your electronic fortress. Experienced hackers have ways of getting around firewalls, so you have to have another line of defense in case they break through. Your defensive approach shouldn’t consist of just one method of keeping electronic bandits and hooligans at bay. Use as many protection methods as you possibly can. You can never be too safe. Plus, if your wall is high enough, it will be impenetrable and your privacy can stay maintained.

    You can combine privacy software with one or more of these methods to ensure your experience on the Internet is a safe one. This software does whatever it can to ensure you don’t leave a trace while you’re on the World Wide Web and your data remains secure. Staying on the offensive is essential to prevailing in the battle against electronic bandits and hooligans. You can’t let them win.

Wednesday, May 5, 2010

15 Popular Command Prompt Tricks & Hacks

Sharing with you some useful tricks & hacks regarding Command Prompt.

* Save A List of Files to a Text File by Extension

>dir *.ext /s /b > files.txt

This command line will create a file called files.txt. When you open this file, there will be a complete list of all the files in that directory and all subdirectories with the .ext extension. You can then open up this text file in any text editor and work this the information.By changing the ext part, you can select different files. For example, if you wanted to list all of the PDF documents, you would type:

>dir *.pdf /s /b > files.txt

* Get Your IP Address Information

>ipconfig /all

This will retrieve a pile of information about your network connection and IP information. From this command, you can get:
Host Name
Primary DNS Suffix
Node Type
IP Routing Enabled
WINS Proxy Enabled
DNS Suffix Search List
Connection-specific DNS Suffix
Network Adapter Description
Physical (MAC) Address
DHCP Enabled
IP Address
Subnet Mask
Default Gateway
DNS Servers

*Get Installed Driver Information

>driverquery


It can be very useful when troubleshooting to know what drivers are installed on a system. This command will give you a complete listing of the drivers and when they were installed.
*Copy Files Via Infrared Port

>irftp filename.ext

This will fire up the Wireless Link dialog so that you can copy the specified file via an infrared port.

*Find Files Opened By Network Users

>openfiles /query

If you are running a system and you want to know who has files open on your computer, this command will provide you a list of those users and the files that they have open.
Note: If you get an error saying The system global flag ‘maintain objects list’ needs to be enabled to see local opened files, you can fix this issue by typing

>openfiles /local on
. You will have to reboot the system but it will resolve the issue.

*Monitor Port Activity

>netstat -a 30

This will show you all of the TCP/IP ports that are being used on your system and what they are connecting to (or being connected from). It will continue to monitor these ports and refresh the information every 30 seconds. You can change the refresh rate by changing the number at the end of the command.
Tip : Best Tips to Make Firefox 3+ Faster

*Recover Information From A Corrupt File

>recover filename.ext

If you have a disk with damaged sectors, you can attempt to recover as much information as possible from the damaged file. Data that is not damaged can be retrieved but data in damaged sectors will be lost.

*Defragment Remote Computer


>rexec remotePC defrag C: /F

This command used the rexec command to force a defragment of the C: drive on the computer named remotePC. You can use whatever you want to for the command (I just used defrag C: /F as an example). This is very useful for remote maintenance.

*Retrieve Detailed System Information


>systeminfo

With this command, you can retrieve the following information:
Host Name
OS Name
OS Version
OS Manufacturer
OS Configuration
OS Build Type
Registered Owner
Registered Organization
Product ID
Original Install Date
System Up Time
System Manufacturer
System Model
System type
Processor(s)
BIOS Version
Windows Directory
System Directory
Boot Device
System Locale
Input Locale
Time Zone
Total Physical Memory
Available Physical Memory
Virtual Memory Max Size
Virtual Memory Available
Virtual Memory In Use
Page File Location(s)
Domain
Logon Server
Hotfix(s)
NetWork Card(s)

*Automatically Defragment C: Daily

>schtasks /create /tn "Defrag C" /tr "defrag c: /f" /sc daily /st 23:00:00 /ru "System"

This will set your computer to automatically perform a complete defrag of the C: drive each day at 11:00:00 PM (23:00:00). It does this by creating a scheduled task called Defrag C. It will run this command under the computer’s system account.

*Map A Drive Letter to a Folder

>subst W: C:\windows

Sometimes, your directory structure can get pretty deep and complicated. You can simplify this a bit by mapping a drive letter to commonly used folders. In the example that I have given, this will create a drive letter W: and map it to the C:\windows directory. Then, whenever you go into My Computer, you will see a W: drive and when you browse to it, it will automatically take you to the contents of the C:\windows folder.
You can do this with any unused drive letter and any folder that exists on your system.

*List All Tasks Running On The Computer

>tasklist

It’s always good to know what is running on your system. This is the command line version of the processes tab in Taks Manager.

>Kill A Program

>taskkill /im programname.exe /f

If, when using the tasklist command, you discover that there is something running you just want killed. This is the way to do it! Just note the program name and use it in place of programname.exe.

*Reboot a Remote Computer


>shutdown -r -f -m \\remotePC -c "System will be rebooted in 20 seconds"

Sometimes, you just need to reboot a system. This will do it remotely and give the user a 20 second warning.
Tip : To open Command Prompt, click Start, click Run, type cmd, and then click OK.