Pages

January 5, 2011

How to Create a CON folder in Windows?


If You try to create folder named “con”, “prn”, “nul” “com1″ “com2″ “lpt1″ etc. in windows ?

NO its Not Possible....

NOTE :- [If You Are Think About We Can Also Type By Using "ALTR+0160" But Its giving space and also its Invalid]

NO because when create a new folder and try to rename it to any  specified names, you know what happens! In Windows XP the folder name automatically changes back to “New Folder” no matter you try any number of times. Where as in Windows Vista/7 when you try to rename the file you get an error message “The specified device name is invalid”.
What is the reason for this? Simple, these names represent the internal devices and hence we cannot create folders with the above names.
YES because it is still possible to create these folders using the command prompt. Here’s the instructions to create it.

Step To Creat con Folder

Step 1:- Go to command prompt

 Type in prompt (FOR EG. TO CREATE CON FOLDER IN E: DRIVE)

C:\>md \\.\e:\con
  
 NOTE: “con” can be replaced by any other names such as “prn”, “nul” “com1″ “com2″ “lpt1″ etc.

Step 2 :- To delete the folder use the following command

C:\>rd \\.\e:\con
NOTE: The folder can only be deleted from the command prompt.You cannot remove it by right-click delete.

Please give the comment for this valuable Information......

January 3, 2011

How to make simple calculation in dos prompt & make mini calculator

I am going to show how to make simple calculation in Dos prompt

Go to start > run > type cmd hit enter
Now type c:\>set /a 10+10 hit enter
You got answer 20.
Use all arithmetic operators and expressions for calculation.
See below calculation.












If you want more details type c;\>set /? hit enter.
If you want mini calculator in batch file, simply copy below code and paste to the notepad.

@echo off
:A
cls
echo Simple Calculator
set /p B=Enter the value and hit enter:
set /a C=%B%
echo %B% = %C%
pause
goto A

Save Calculator.bat
.bat is extension for batch file

Now double click that bat file, your mini calculator Is ready like below.


Freeup or clean RAM using Notepad


RAM - Random Access Memory is one of the main component of computer that is responsible for the process of the operating system. Since all the Operating systems support Multiprocessing, hence require a good RAM speed.
Since all the current running processes are stored onto the RAM, it slows the system speed. Sometimes the process which have executed but are not required by the OS are stored on the RAM. So, we can remove or freeup the RAM with unused junk data to Speedup the System or processing speed.
We can clean the RAM just by using a Notepad application. This donot require any advanced software. 
The process to do so is as follows.

Open Notepad
Type
FreeMem=Space(64000000)
save it as “CleanRAM.vbs” on desktop

Note: Type the name of file along with inverted commas
Run the file and your RAM may be free.
Of course you can edit the code in the file for a greater “cleaning-progress”.
 
For example:
FreeMem=Space(1280000000)
FreeMem=Space(2560000000)
FreeMem=Space(5120000000)
FreeMem=Space(10240000000)

Chat with Friends through ms dos Command Prompt (CMD).

1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see something like this:

 

7) Now, type the IP Address of the computer you want to contact and press enter You will see something like this: 

 
8) Now all you need to do is type your message and press Enter.
Start Chatting.......!  

 

January 2, 2011

Top 5 Most Famous Hackers of All Time

 

. . .Top 5 Most Famous Hackers of All Time. . .

 
1. Jonathan James : James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at the age of 16 . In an anonymous PBS interview, he professes, "I was just looking around, playing around. What was fun for me was a challenge to see what I could pull off." James also cracked into NASA computers, stealing software worth approximately $1.7 million.



2. Adrian Lamo : Lamo's claim to fame is his break-ins at major organizations like The New York Times and Microsoft. Dubbed the "homeless hacker," he used Internet connections at Kinko's, coffee shops and libraries to make his intrusions. In a profile article, "He Hacks by Day, Squats by Night," Lamo reflects, "I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional."



3. Kevin Mitnick : A self-proclaimed "hacker poster boy," Mitnick went through a highly publicized pursuit by authorities. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as "the most wanted computer criminal in United States history." His exploits were detailed in two movies: Freedom Downtime and Takedown.



4. Kevin Poulsen : Also known as Dark Dante, he gained recognition for his hack of LA radio's KIIS-FM phone lines, which earned him a brand new Porsche, among other items. His hacking specialty, however, revolved around telephones.



5. Robert Tappan Morris : Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act.

Defining Hacker..........


Hacker is a word that has two meanings:

Traditionally, a hacker is someone who likes to tinker with software or electronic systems.
Hackers enjoy exploring and learning how computer systems operate.

Recently, hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gains. Technically, these criminals are crackers (criminal hackers). Crackers break into (crack) systems with malicious intent. They are out for personal gain: fame, profit, and even revenge. They modify, delete, and steal critical information, often making other people miserable.

 


The good-guy (white-hat) hackers don’t like being in the same category as the bad-guy (blackhat) hackers. (These terms come from Western movies where the good guys wore white cowboy hats and the bad guys wore black cowboy hats.) Whatever the case, most people give hacker a negative connotation. Many malicious hackers claim that they don’t cause damage but instead are altruistically helping others. Yeah, right. Many malicious hackers are electronic thieves.

Hackers (or bad guys) try to compromise computers.
Ethical hackers (or good guys) protect computers against illicit entry.

What is Computer Hacking ?


Computer hacking is a process to bypass the security mechanisms of an information system or network.

OR

In common usage, hacker is a generic term for a computer criminal, often with a specific specialty
in computer intrusion. While other definitions peculiar to the computer enthusiast community
exist, they are rarely used in mainstream context...

OR

Computer hacking is an unauthorized use of computer and network resources. (The term "hacker" originally
meant a very gifted programmer. In recent years though, with easier access to multiple systems,
it now has negative implications.)