Notepad Cool tricks.

Notepad Hack For Fun with friends. Our
notepad is a best text editor we can write
code here and can save it in any
format as we want. In notepad tricks we 
just type the batch or VB Scripts and save 
then into there Format to execute them by
simply clicking.







1. Opening Notepad or Other software automatically?

I am giving you some of batch file code to use them for have fun with notepad.


@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top


type the given codes as they are in notepad
and now save the file but remember to give it a name ending with .Bat
as i save it notepad.bat


2. Want to Play With CD Drive?

The following methods is to play with the CD drive. If you have more then one drive then you must be enjoy this cool trick. Just copy the codes i am giving you.



Set oWMP = CreateObject(WMPlayer.OCX.7)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count -1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count -1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop


Now Delete the " and type them again at there place.
Then name the file having last name with .VBS
Eg. CDdrive.vbs
Enjoy it.


3. Automatically Blinking Of Caps Lock & Num lock lights.

Very interesting and different trick you ever used or heard.
It will start your Caps lock and Num lock blinking it self. Just try the following codes and Make a VBS file.


Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
loop


Save it as a VBS file. Eg Blink.vbs 

Enjoy tricks and keep Vesting ma blog

Passwod Reset Disk

Cant you remember Your Password?
                        or
Want to reset Windows Password?

Then this post is really for you only. In this post i am going to tel about creating password reset disk for your Windows OS. A password reset disk have ability to change the password without Login your system, no need to format you system, no need to get tensed. Just Follow the simple links.



Step 1: Open your Control panel.

Step 2: Click on User Account

Step 3: Now click on Create a Password reset disk left Side of the Open Window. It Will open the Password reset Wizard.

Step 4: now click on next then select the Disk you want to Use(it could be your pen drive Also)

Step 5: Now Verify Your Current password and click next.

it will store a file there and store its id in memory.

How To Use Password Reset Disk?

Its very simple whenever you forget you admin password simply insert you password reset disk and it will open a wizard where it will ask for a new password with asking the old one. Now reset the password and Enjoy your system.

Change Text Of Start Button in XP


If you are using windows XP you are familiar with the xp start button. We are Using the default XP button and many of you want to change it. But Don't know how???

Here i am giving the simplest way to change it. We have a tool by which we can change it in seconds.We don't have to do much more, no need of change the codes of any where in your system, no need of hacking you registry. Just Type the name you want to change and Click on OK.


First of all you have to download the xp start button renamer.

Download

Now Run it and it will appear like this.












Now type the new Lable what ever you wanted to change. then press ok and it will change.
enjoy your new trick. have a great day.

Increase Internet Speed of Your PC.

Hi every one.

Are you Working on a slow internet? Want to increase the speed?


Okay i am going to tel you the way. There are to methods to boost it up.


1. Using Speed Booster.
2. Manual way.


By using software we can do that because it manages the traffic and increase the speed but it will use our RAM and CPU also and your money too because a free booster will never do that for.
So its better to use the manual way.



Step 1.

Click on start button>>Then click on Run >> now type gpedit.msc >> then click on Ok.


it will a new window.


















Step 2.

In Computer Configuration click on Administrative template it will open a new list.
in the list click on network then click on Qos Packet scheduler.











Step 3.
Now we have a new list where we can change the limitation of network speed

Double click on the Limit Outstanding Packets. it will open a window now select the enable option and set it to 0.




















Step 4.
Double now click on the Limit Reservable Bandwidth. Now click on enable and set to 0.





















That's it. Now use the trick and enjoy. Have a great Day.

Coach Outlet Store Online

Increase speed of Videos on the Fire-Fox...

Hi dear Friends in this post i am going to teach you how to increase the speed of your Video Through Fire-Fox.

In some of software's We have functions to Restore the Data in case of Crash (Power failure).

Our Firefox have Function to Take a snapshot after every 10 - 20 Seconds. Which make our system slower. But you can change this timing. HOW....?

Here We Go..

Step1.
Type About:Config in your address bar.

Step2.
It Will open a Configuration window here we can change the time of snapshot.
To change the snapshot timing search for the browser.sessionstore.interval in the list
Step3.
Now you have to change the timing as you want. But remember that timing should be entered in the million seconds.

That's it. Now you can enjoy your Online videos faster then last time.

What are Key Loggers? How They Work..?

What is key logger?

It is a type of software by which any one can know your password or other information. This software is basically works for all the keys you hit on your keyboard. Generally when we enter our password in password box it will never show you what you entered there. but the keyboard have function to know the hidden data. and the key logger can save it in an .txt or other files.

Keyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data.
Below are some methods through which you can protect your computer from keyloggers:

Use a Good Antivirus

This is the first and basic step that you need to take in order to protect your computer from keyloggers. Use a Good antivirus such as Kaspersky, Norton or Mcafee and update it regularly.

Use a Good Antispyware

Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware.

Antilogger can be Handy

Antiloggers are programs that detect the presence of keyloggers on a given computer. Over past few years, I have tested a lot of anti-logging programs and have found as the best antilogger.
Zemana
Normally a keylogger can be easily detected by a Good Antivirus program, but hackers use some methods such as hexing, binding, crypting and similar techniques to make it harder to be detected by antivirus programs. In this case Zemana Antilogger comes handy as the program is specially developed to protect your system against harmful keyloggers.

Online Scanning

When ever you receive a suspicious file, you scan it with online scanners such as Multi Engine antivirus scanner which scans your file with 24 antivirus engines and reports it back to you if the file is recognized as a virus or spyware. This ensures that none of the malicious programs can escape from being detected as there are 24 different antivirus engines are involved in the scanning process.

Sandboxie

Sandboxi is another great program to help you protect your computer against harmful keyloggers and spywares. Sandboxie runs your computer in an isolated space which prevents your program from making permanent changes to other programs in your computer.
When ever you receive a file that looks suspicious, just run the program with Sandboxie so even if it is a keylogger or any other virus it will not make permanent changes to your computer system.
To run a program in Sandboxie follow the steps as mentioned below:
1. Open sandboxie and click on sandbox menu on the top
2. Now goto Default sandbox
3. Then click on run any program
4. Now select the file you wish to run in sandboxie and click open

Keyscrambler

Keyscammer is one of the best protection against keyloggers that you can have, Keyscrambler is a small program which encrypts your typed keystrokes so even if the victim has installed a key logger on your system, he or she will get encrypted keys. Keyscrambler currently supports Firefox, Internet explorer and other applications, however its premium version supports more than 160 applications.

How Firewalls Work

If you have been using Internet on a regular basis or working in a large company and surf the Internet while you are at work, you must have surely come across the term firewall. You might have also heard of people saying “firewalls protect their computer from web attacks and hackers” or “a certain website has been blocked by firewall in their work place”. If you have ever wondered to know what exactly is this firewall and how it works, here we go. In this post I will try to explain “How firewalls work” in a layman’s terms.

Firewalls are basically a barrier between your computer (or a network) and the Internet (outside world). A firewall can be simply compared to a security guard who stands at the entrance of your house and filters the visitors coming to your place. He may allow some visitors to enter while denying others whom he suspects of being intruders. Similarly a firewall is a software program or a hardware device that filters the information (packets) coming through the Internet to your personal computer or a computer network. Firewalls may decide to allow or block network traffic between devices based on the rules that are pre-configured or set by the firewall administrator.



PERSONAL FIREWALLS
Personal firewalls are easy to install and use and hence preferred by end-users for use on their personal computers. However large networks and companies prefer those firewalls that have plenty of options to configure so as to meet their customized needs. For example, a company may set up different firewall rules for FTP servers, Telnet servers and Web servers. In addition the company can even control how the employees connect to the Internet by blocking access to certain websites or restricting the transfer of files to other networks.

Firewalls use one or more of the following methods to control the incoming and outgoing traffic in a network:
1. Packet Filtering: In this method packets (small chunks of data) are analyzed against a set of filters. Packet filters has a set of rules that come with accept and deny actions which are pre-configured or can be configured manually by the firewall administrator. If the packet manages to make it through these filters then it is allowed to reach the destination; otherwise it is discarded.
2. Stateful Inspection: This is a newer method that doesn’t analyze the contents of the packets. Instead it compares certain key aspects of each packet to a database of trusted source. Both incoming and outgoing packets are compared against this database and if the comparison yields a reasonable match, then the packets are allowed to travel further. Otherwise they are discarded.

Firewall Configuration

Firewalls can be configured by adding one or more filters based on several conditions as mentioned below:
1. IP addresses: In any case if an IP address outside the network is said to be unfavorable, then it is possible to set filter to block all the traffic to and from that IP address. For example, if a cetain IP address is found to be making too many connections to a server, the administrator may decide to block traffic from this IP using the firewall.
2. Domain names: Since it is difficult to remember the IP addresses, it is an easier and smarter way to configure the firewalls by adding filters based on domain names. By setting up a domain filter, a company may decide to block all access to certain domain names, or may provide access only to a list of selected domain names.
3. Ports/Protocols: Every service running on a server is made available to the Internet using numbered ports, one for each service. In simple words, ports can be compared to virtual doors of the server through which services are made available. For example, if a server is running a Web (HTTP) service then it will be typically available on port 80. In order to avail this service, the client needs to connect to the server via port 80. Similarly different services such as Telnet (Port 23), FTP (port 21) and SMTP (port 25) services may be running on the server. If the services are intended for the public, they are usually kept open. Otherwise they are blocked using the firewall so as to prevent intruders from using the open ports for making unauthorized connections.
4. Specific words or phrases: A firewall can be configured to filter one or more specific words or phrases so that, both the incoming and outgoing packets are scanned for the words in the filter. For example, you may set up a firewall rule to filter any packet that contains an offensive term or a phrase that you may decide to block from entering or leaving your network.

Hardware vs Software Firewall

Hardware firewalls provide higher level of security and hence preferred for servers where security has the top most priority whereas, the software firewalls are less expensive and are most preferred in home computers and laptops. Hardware firewalls usually come as an in-built unit of a router and provide maximum security as it filters each packet in the hardware level itself even before it manages to enter your computer. A good example is the Linksys Cable/DSL router.

Why Firewall?

Firewalls provide security over a number of online threats such as Remote login, Trojan backdoors, Session hijacking, DOS & DDOS attacks, viruses, cookie stealing and many more. The effectiveness of the security depends on the way you configure the firewall and how you set up the filter rules. However major threats such as DOS and DDOS attacks may sometimes manage to bypass the firewalls and do the damage to the server. Even though firewall is not a complete answer to online threats, it can most effectively handle the attacks and provide security to the computer up to the maximum possible extent.

Tips for safe Net-Banking


Now it's time for moving our all work online. But as you know internet is not totally safe.
Cheating and hacking is increasing day by day after a lot of security.
One of my friend got cheat by a net cheater if you are going to use Net Banking Them its my request to read this.


1. Never use your Bank account at any public place such as cyber cafe or any other places. Because there may be some of key logger installed by which any one can get the user id and password of your bank account so that he/she can use you money.
2. If you got the mail from you bank then please first check the URL of the given links. It may some of hacker trying to make you fool so that can gain your personal information to reset you password.
3. If you are requested for resubmitting your information for net banking then be safe and not give your all information any where.
4. Before Online Shopping check the web site registration and before paying the money just check the bank of gateway you are paying your money.
5. All update you new mobile number to your bank and if you get any message that your account is using from another place the go to near of your branch or can contact to customer care to know the the name of that place or other information.
By using these simple steps you are safe form the hackers, waiting to use you hard work.
Regards:
Prem Singh