22 December 2009

What CAM/TS/TC/SCR means?

I hate answer question especially a question that you try nothing to answer before you ask. It's wasting my time.
I'm not the one who knows everything. The only one I know is I can find the answer by myself if it's on the internet or at least, try before ask.

Below is the answer of what CAM/TS/TC/SCR means so I hope anyone who askes me can read and understand by themselves. (I don't know why you can use internet to spend your time to search and download such a big file but don't have enough time to look for the meaning by yourself.)

So I hope no one askes me about this again. Whatever you want to know, try google first, if it doesn't work then I guess go to wikipedia.com before you ask someone.



Downloaded a movie and don't know what CAM/TS/TC/SCR means?

CAM - A cam is a theater rip usually done with a digital video camera. A mini tripod is sometimes used, but a lot of the time this wont be possible, so the camera make shake. Also seating placement isn't always idle, and it might be filmed from an angle. If cropped properly, this is hard to tell unless there's text on the screen, but a lot of times these are left with triangular borders on the top and bottom of the screen. Sound is taken from the onboard microphone of the camera, and especially in comedies, laughter can often be heard during the film. Due to these factors picture and sound quality are usually quite poor, but sometimes we're lucky, and the theater will be' fairly empty and a fairly clear signal will be heard.

TELESYNC (TS) - A telesync is the same spec as a CAM except it uses an external audio source (most likely an audio jack in the chair for hard of hearing people). A direct audio source does not ensure a good quality audio source, as a lot of background noise can interfere. A lot of the times a telesync is filmed in an empty cinema or from the projection booth with a professional camera, giving a better picture quality. Quality ranges drastically, check the sample before downloading the full release. A high percentage of Telesyncs are CAMs that have been mislabeled.

TELECINE (TC) - A telecine machine copies the film digitally from the reels. Sound and picture should be very good, but due to the equipment involved and cost telecines are fairly uncommon. Generally the film will be in correct aspect ratio, although 4:3 telecines have existed. A great example is the JURASSIC PARK 3 TC done last year. TC should not be confused with TimeCode , which is a visible counter on screen throughout the film.

SCREENER (SCR) - A pre VHS tape, sent to rental stores, and various other places for promotional use. A screener is supplied on a VHS tape, and is usually in a 4:3 (full screen) a/r, although letterboxed screeners are sometimes found. The main draw back is a "ticker" (a message that scrolls past at the bottom of the screen, with the copyright and anti-copy telephone number). Also, if the tape contains any serial numbers, or any other markings that could lead to the source of the tape, these will have to be blocked, usually with a black mark over the section. This is sometimes only for a few seconds, but unfortunately on some copies this will last for the entire film, and some can be quite big. Depending on the equipment used, screener quality can range from excellent if done from a MASTER copy, to very poor if done on an old VHS recorder thru poor capture equipment on a copied tape. Most screeners are transferred to VCD, but a few attempts at SVCD have occurred, some looking better than others.

DVD-SCREENER (DVDscr) - Same premise as a screener, but transferred off a DVD. Usually letterbox , but without the extras that a DVD retail would contain. The ticker is not usually in the black bars, and will disrupt the viewing. If the ripper has any skill, a DVDscr should be very good. Usually transferred to SVCD or DivX/XviD.

DVDRip - A copy of the final released DVD. If possible this is released PRE retail (for example, Star Wars episode 2) again, should be excellent quality. DVDrips are released in SVCD and DivX/XviD.

VHSRip - Transferred off a retail VHS, mainly skating/sports videos and XXX releases.

TVRip - TV episode that is either from Network (capped using digital cable/satellite boxes are preferable) or PRE-AIR from satellite feeds sending the program around to networks a few days earlier (do not contain "dogs" but sometimes have flickers etc) Some programs such as WWF Raw Is War contain extra parts, and the "dark matches" and camera/commentary tests are included on the rips. PDTV is capped from a digital TV PCI card, generally giving the best results, and groups tend to release in SVCD for these. VCD/SVCD/DivX/XviD rips are all supported by the TV scene.

WORKPRINT (WP) - A workprint is a copy of the film that has not been finished. It can be missing scenes, music, and quality can range from excellent to very poor. Some WPs are very different from the final print (Men In Black is missing all the aliens, and has actors in their places) and others can contain extra scenes (Jay and Silent Bob) . WPs can be nice additions to the collection once a good quality final has been obtained.

DivX Re-Enc - A DivX re-enc is a film that has been taken from its original VCD source, and re-encoded into a small DivX file. Most commonly found on file sharers, these are usually labeled something like Film.Name.Group(1of2) etc. Common groups are SMR and TND. These aren't really worth downloading, unless you're that unsure about a film u only want a 200mb copy of it. Generally avoid.

Watermarks - A lot of films come from Asian Silvers/PDVD (see below) and these are tagged by the people responsible. Usually with a letter/initials or a little logo, generally in one of the corners. Most famous are the "Z" "A" and "Globe" watermarks.

Asian Silvers / PDVD - These are films put out by eastern bootleggers, and these are usually bought by some groups to put out as their own. Silvers are very cheap and easily available in a lot of countries, and its easy to put out a release, which is why there are so many in the scene at the moment, mainly from smaller groups who don't last more than a few releases. PDVDs are the same thing pressed onto a DVD. They have removable subtitles, and the quality is usually better than the silvers. These are ripped like a normal DVD, but usually released as VCD.

Scene Tags...

PROPER - Due to scene rules, whoever releases the first Telesync has won that race (for example). But if the quality of that release is fairly poor, if another group has another telesync (or the same source in higher quality) then the tag PROPER is added to the folder to avoid being duped. PROPER is the most subjective tag in the scene, and a lot of people will generally argue whether the PROPER is better than the original release. A lot of groups release PROPERS just out of desperation due to losing the race. A reason for the PROPER should always be included in the NFO.

LIMITED - A limited movie means it has had a limited theater run, generally opening in less than 250 theaters, generally smaller films (such as art house films) are released as limited.

INTERNAL - An internal release is done for several reasons. Classic DVD groups do a lot of INTERNAL releases, as they wont be dupe'd on it. Also lower quality theater rips are done INTERNAL so not to lower the reputation of the group, or due to the amount of rips done already. An INTERNAL release is available as normal on the groups affiliate sites, but they can't be traded to other sites without request from the site ops. Some INTERNAL releases still trickle down to IRC/Newsgroups, it usually depends on the title and the popularity. Earlier in the year people referred to Centropy going "internal". This meant the group were only releasing the movies to their members and site ops. This is in a different context to the usual definition.

STV - Straight To Video. Was never released in theaters, and therefore a lot of sites do not allow these.

ASPECT RATIO TAGS - These are *WS* for widescreen (letterbox) and *FS* for Fullscreen.

REPACK - If a group releases a bad rip, they will release a Repack which will fix the problems.

NUKED - A film can be nuked for various reasons. Individual sites will nuke for breaking their rules (such as "No Telesyncs") but if the film has something extremely wrong with it (no soundtrack for 20mins, CD2 is incorrect film/game etc) then a global nuke will occur, and people trading it across sites will lose their credits. Nuked films can still reach other sources such as p2p/usenet, but its a good idea to check why it was nuked first in case. If a group realise there is something wrong, they can request a nuke.

NUKE REASONS...

this is a list of common reasons a film can be nuked for (generally DVDRip)

BAD A/R = bad aspect ratio, ie people appear too fat/thin
BAD IVTC = bad inverse telecine. process of converting framerates was incorrect.
INTERLACED = black lines on movement as the field order is incorrect.

DUPE - Dupe is quite simply, if something exists already, then theres no reason for it to exist again without proper reason.

03 December 2009

Howto view a remote ip address

How to find a remote IP

Method 1

To view someone's IP# when they send you hotmail email do this:
1) Click "Options" on the upper right side of the page.
2) On the left side of the page, Click "Mail"
3) Click "Mail Display Settings"
4) Under "Message Headers" select "Full" or "Advanced"
5) Click ok

Method 2
reg a dydns account and install the ip pointer, so each time you ping the host name you regestored

for example:
you regestor the host name myhost.dydns.com, then you keep a little software running on the target host. The little software will keep update your IP to dydns.com server.

so at your pc just start cmd, and ping myhost.dydns.com, it will give you the most updated ip address.

Method 3
neverender, what doesn't work for you? Simply type in nc -vvv -l -p 80 on your box, which will set it to listen in verbose mode on port 80. Then give them a link to your IP address (for example: 111.111.111.11) and tell them to type it in their browser. The browser should resolve the address as well as append port 80 automatically. Just make sure that your friend is not very computer literate.

Method 4
Just download a very simple server such as this one and install it on your comp. Then run it and give your ip to the person you want and tell them to connect to it through a browser. Your server will log their connection and you will get their IP.

link:http://www.download.com/Abyss-Web-Se...ml?tag=lst-0-6


Other Ways
-www.imchaos.com and make a "spy poll" to put in ur profile, this will tell u the IP of anybody who answers ur poll
-originalicons.com there is a page for doin it (i dont like it, but it works)
-or irc


Here is a more detailed tutorial about using NetCat.

http://www.onlamp.com/pub/a/onlamp/2...29/netcat.html

Windows users can download NetCat from here:

http://www.atstake.com/research/tool...ork_utilities/

Google Adsense ( Class 3 )




Reverse engineering (Software)

REVERSE CODING

----------------------
REVERSE CODING
----------------------


# Released by Cybnet Security Group
# legalz: modify and use at will, if you make any changes, improvements, updates or use the code
# in another project, please send us what you did and give credit
# if you have any questions, post them at forum.hackerthreads.net
# be sure to check out hackerthreads.org for updates and new tutorials/downloads

Copyrights reserved to k33t, 2002 from CYBNET Security Group
----------------------------------------------------------------------------------------------------

Index:
-------
1.Introduction
2.Disclaimer
3.Hexadecimal
4.RAM and ROM
5.ASM
6.Needed programs
7.Cracking
8.Conclusion
---------------------------
---Introduction----------

Welcome to my Reverse Coding tutorial! In this paper, you will
learn how to crack and modify your own software. I'll try to get
into as much detail as possible, yet also dumb it down a bit. =)
------------------------------------------------------------------------------------------------------
---Disclaimer------------

All information is purely for educational purposes only! The author
cannot be held responsible for any (ab)use of this information.
USE AT YOUR OWN RISK!!!
------------------------------------------------------------------------------------------------------
---Hexadecimal----------

To begin, I'm going to teach you about hexadecimal, so if you already
know it, then move on. Even if you do already know it, I suggest
sticking around for a refreshment of your memory.=)

Hexadecimal, or hex as it's more commonly known, is a base 16
numbering system. Base 16 meaning that it consists of 16 numbers:
0-9 and A-F. Each of these numbers (A-F=10-16) have a value of 4 bits
and are also called nibbles. In representing a hexadecimal number, one
would write an "0x" before the actual bit set. 0x is simply a tag put
before a hex number to let programmers know that it is in fact, hex.
When writing hex, you will not need to use this prefix.

If you haven't already noticed, the 0x prefix looks similar to that of exponential
notation. Actually this is where 0x has been derived, seeing as how
hex is simply a number that has been raised to a power of 16.
This means 10 in hexadecimal represents the value 16+0, or 16. So check
out this example:

0xB3 (hex)= 2*16(squared)+11*16(to the 1st power)+3*16(to the power of 0 )
=2*256+11*16+3=691 (decimal)

Yeah, you could do all of that, or you could be lazy and use an automated
program that does it all for you. Why do you need to know hex? Because
it's used by every piece of software and hardware. How? Memory based address
allocation. Here's an example:

When you clicked on your browsers icon to launch it, the click triggered a "call"
(an asm function that will be discussed more in depth in later chapters.) which
went back to the programs memory with the "click in it's hand." It finds the
address where the code is that makes the program launch and executes it. The
address is written in, you guessed it, hex. An example of an address would be
something like this:

101c5018

5108 would be the actual specific address and 101c would be the sector
of RAM were the address is located. Those are the basics of Hexadecimal
You should probley read this chapter againbecause getting a firm grasp on hex
is essential to cracking and moding programs.
----------------------------------------------------------------------------------------------------------
---RAM and ROM--------

In this section we are gonna learn about RAM and ROM. Many people kno about
the hardware part of RAM and ROM and that's gonna be very useful to you......
just not in this tutorial. =) We are about to learn about the "software" side. I use the
term software loosly in that software tends to have a GUI (Graphical User Interface)
and this does not. BUT, there are ways to access and modify the behavior of it that
I will talk about in this chapter, as well as in the next. To start off, I'll answer some
common questions:

What is RAM?

RAM (Random Access Memory) is basically memory and the process of accessing it.
The term "Random Access Memory" was approprietly given to this memory unit because
when executing a command, the CPU doesn't have to scroll through all the memory on
your PC until it finds the right address. It "randomly" whips out the addy from it's back
pocket and serves it up.This process is both quick and efficient. Learning this process
will help you understand the ASM functions in the next chapter.

How does RAM work?

When a command is issued and the memory is pulled from file, it must first go through
what is called a "vector". A vector is a "gateway" or a "sector" of RAM where the address
of the function is stored with others of it's own kind. An example of a vector would be
something like this:

8c0000b4-8c00ffff

This means that all "addressii" (hehe) that are between those values are stored in that
sector of RAM. A vector acts as a gateway in that, first, pass through a vector to get to
address. Your average program probley has about 30 to 40 main vectors, sectioning
off from boot until exit. Knowing the vector of an addy or a function will greatly reduce
your headache when you start searching for it.

ROM. ROM is a part of memory that doesn't change. (Although we can change it.=) )
Boot ROM for instance, follows the same plan of action it is called upon. ROM also has
vectors, just like RAM. ROM is not that important when it comes to cracking to we will
leave it alone for now.

Back to RAM. Believe it or not, but addressii (there I go again, I'm such a g33k.)
actually follow certain formats or syntax's for certain functions. Take hot keys for
example: In the under ground, we call them "Joker commands". By pressing a certain
combonation of keys, a program will run, close, be stupid, whatever. The syntax for a
Joker command is as follows:

0d-aaaaaf
000zvvvv

Let's examine this format a little closer.

0d= The proclemation of a specifyed format

aaaaa= The address of the function

f= The float or remainder; "Floating point number" ; decimal

000= "NOP" No operation

z= The "Booleon" as we the C++ programmers call it. A booleon is an "IF, THEN" statement.
"IF this is true, THEN do this." Value 0= equal; 1= different; 2=less than; 3=greater than.

vvvv= The combonation of hex values (The values of the keys pressed) used to execute the "CALL"

Say the "A" key had a vlaue of fffb and the "B" key has a vlaue of fffd. You would then add both
values using a hex calculator and get fff9 as the sum. The output on you calculator would
show 1fff8. Add the first value and the last value to find the fourth byte segment. So say
we've found the address of the Joker function (usually in the boot ROM sector) commonly
called the "Maple address" and we are ready to program in some hex code. Our code may
look like this:

0d7ae671
0000fff9

This means that IF the value of fff9 (A and B) is equal (0) to the address (aaaaf) of the function,
THEN execute it. See? Easy isn't it? You'll need to know things like this when modding programs
as a use of executing of your arbitrary code in certain parts of your program at a certain time.
Joker commands are also reversable in that if you enter the same code except with a 1,2, or 3,
in the z slot and by changing the button combonations. Reversable meaning terminating the
function or other functions that were started. A good use for this is for firewalls and babysitting
programs. Are you on a college machine and can't download stuff because of that pesky firewall?
Crack it open and program in some Joker commands so you can turn it on and off at will
WITHOUT the administrator's password!
--------------------------------------------------------------------------------------------------------------
---ASM-----------------------

To start off with our small and to the point ASM section, I'll warn you in advance, after reading this,
you'll need to go take a shower cause this is disgusting! Here we go!

To begin, I'm gonna define for you some functions that you'll be seeing alot of, and be using. Here they are:

.:Hex:. .:ASM:. .:MEANING:.

75,0f85 jne jump if not equal
74,0f84 je jump is equal
eb jmp jump directly to
90 nop no operation
77,0f87 ja jump if above
0f86 jna jump if not above
0f83 jae jump if above or equal to
0f82 jnae jump if not above or equal
0f82 jb jump if below
0f83 jnb jump is not below
of86 jbe jump if below or equal
0f87 jnbe jump if not below or equal
0f8f jg jump if greater
0f8e jng jump if not greater
0f8d jge jump if greater or equal
0f8c jnge jump if not greater or equal
0f8c jl jump if less
0f8d jnl jump if not less
0f8e jle jump if less or equal
0f8f jnle jump if not less or equal

The easy thing about most of the functions in ASM are that they sound like what they mean.
Jump, means of coarse, to Jump from one thing to another. Example:

"jmp 00401744" would mean to jump directly to the address 00401744 once the code
hits the function.

Let's look at "CALL". Call is a function that is used to "call" a certain task, string, address, whatever.
Take a look at this example:

"Call 0040ccc2" this would of coarse call the address 0040ccc2 and use it. Those are the functions
you'll be using.

The reason why I'm not going into loads of detail in this chapter is because when
cracking software, not an extensive amount of knowledge of ASM is needed. If you want
to know more or need help with something, e-mail me at the address provided at the end of
this tutorial. This chapter wasn't so nasty was it? Nah, it was easy =)
------------------------------------------------------------------------------------------------------------------------
---Needed Programs----------------

The programs you will need are as follows:

WDasm 8.9 or Higher
Hiew 6.1
Softice for win9x v3.24
SubmitWolf(demo)v4.01 (http://www.trellian.com/swolf)
Programming Language (C,C++,Pascal,ASM whatever you would like) Prefably C for this tutorial!
And a brain (no seriously)
--------------------------------------------------------------------------------------------------------------------------
---Cracking-----------------------------


Ok, here we go! The first thing you need to do is to open up SoftIce and then swolf32.exe which is the name given to our
target program. Go to the help menu and select register. Here's where your brain will come in, start to look
for how the protection is running by entering some random crap into the blank space. Don't press the OK button yet though.
Instead, press CTRL-D to bring up SoftIce. What we are gonna try to do is define a breakpoint, using BPX hmemcpy.
Hit CTRL-D again and it will bring you back to the program. Click OK on the box and SoftIce will again pop up. Now press F12
and it will bring you to the target program code. Scroll down a few lines and find:

:004167D9 8D4C2410 lea ecx, dword ptr {esp+10}--;ecx=the random crap you typed in.
:004167DD 8D94290000000 lea edx, dword ptr {esp+00000090}-;edx=name
:004167E4 51 push ecx
:004167E5 52 push edx
:004167E6 E8B5450100 call 0042ADA0----;this is the call which calculates the serial
:004167EB 83C410 add esp, 00000010--;
:004167EE 85C0 test eax, eax----;and return eax=1 if true (booleon =) )
:004167F0 0F8596000000 jne 0041688C----;jump to registered
:004167F6 8D442408 lea eax, dword ptr {esp+08}
:004167FA 8D8C2488000000 lea ecx, dword ptr {esp+00000088}
:00416801 50 push eax
:00416802 51 push ecx
:00416803 E868470100 call 0042AF70----;this call tests our serial
:00416808 83C408 add esp, 00000008---;
:0041680B 85C0 test eax, eax----;for v3.XX one.
:0041680D 7433 je 00416842;jump is equal

The call that we want to focas on is at 004167E6. This call tests wether our serial is for the correct version or not.
Let's trace the call 004ADA0:

*Referenced by a CALL at address:
:0042ABFC
:0042ADA 83EC30 sub esp, 00000030
:0042ADA3 55 push ebp
:0042ASA4 56 push esi
:004ADA5 57 push edi
:0042ADA6 8B7C24444 mov edi, dword ptr {esp+44}--;edi=our fake serial
:004ADAA 85FF test edi, edi
:004ADAC 0F4A7010000 je 0042AF59----;die if empty
:004ADB2 8B6C2440 mov ebp, dword ptr {esp+40}--ebp=our name
:0042ADB6 85ED test ebp, ebp
:004ADB8 0F849B010000 je 0042AF59---;die if empty
:004ADBE 8A07 mov al, byte ptr {edi}--;compare 1st byte of serial with 'p', die
:0042ADC0 3C50 cmp al, 50----;
:0042ADC2 0F8587010000 jne 0042AF4F----;if not equal
:0042ADC8 807F0134 cmp byte ptr {edi+01}, 34--:compare byte of serial with '4'
:004ADCC 750C jne 0042ADDA----;
:0042ADCE C70500C8430000000000 mov dword ptr {0043C800}, 00000000
:0042ADD8 EB1C jmp 0042ADF6

As we can see by the above, the code tells us that the first value of our serial will
be 'p' and a cycle of a four byte algorythm. I could go on and on about all of the internals
of all this stuff but that would be going beyond the scope of this tutorial. The idea was to show
how to crack this pro, and thats what I'm going to do. Based on the information I've given you, and the
information that you can deduce from reading the code, I've written a small key generator in C.
If you know C, then you'll be able to tell where i got the algorythms to write it. So here it is:

#include
#include

int main(void)
{
long code=555583,count1,count2;
char name[25],cod[5],type='0';
clrscr();
textcolor(14);
printf("This is a simple key-generator written by k33t of CYBNET Security Group");
printf("========================================== =======");
text color(10);
printf("SubmitWolf(demo)ver4.1 cracked by k33t");
textcolor(14);
printf("%c%c%c",0x10,0x10,0x10");
textcolor(12);
printf("Yup")
prinf("-November 2002");
prinf("'\n\nSelect Edition PRO(0) or Enterprise(1) (0/1)=");
scanf("%c",&type);
if(type=='1')code=557283;
getchar();
prinf("Enter Registration Name=");
scanf("%[^\n]",name);
for(count1=0;count1<=3;count1++
cod[count1]=name[count1];
for(count=1;count1=3;count1++){
for(count2=0;count2<=3;count2++)
cod[count2]=cod[count2]*(code%100);
code=code/100;
}
for(count1=0;name[count1]>0;count1++);
for(count2=0;count2<=3;count2++)
cod[count2]=cod[count2]^(name[count1]+3);
for=(count1-3;count1>=0;count1--){
code=code+(cod[count1]&0xFF);
if(count1>0)
code=code*0x100;
}
if(code<0)code=-code;
for(;code<10000;) code=code*10;
for(;code>999999;) code=code/10;
printf(Your Serial Number=P%c4-%ld",(type=='1')? 'E':'4'code);
return ;
}

Ok! So! An overall conclusion of this code is:

1.First two characters of the serial must be either 'PE' or 'P4'.
2.Multiply every first four characters or our name with every byte of our serial before '-'
3.XOR every four byte with every byte of our name.
4.Convert to positive number if<0.
5.Convert to number between 10000 and 1000000.

Forgive me if this code is buggy as I wrote it very quickly in the little spare time I had.

-----------------------------------------------------------------------------------------------------------
---Conclusion-------

Well how was your first cracking expierience? Not bad eh? Ok well if you have any questions,
problems,comments,.....criticsms.......you can e-mail them to me at:

Restrict Time allowed on the pc (Windows)

To restrict a users logon hours , use the net user command. These commands are used from the Command Prompt. (Start - RUN - and type cmd)

Below are some examples:

1 - net user Joanna /time:M-F,08:00-17:00

2 - net user Ninja /time:M-F,8am-5pm

3 - net user Echelon /time:M,4am-5pm;T,1pm-3pm;W-F,8:00-17:00

4 - net user Shine /time:all (this one means this user can always log on)


Note:You can only restrict when a user can log on to the system. On a stand alone computer, there is no way to force a user to log off when their hours expire, without a third party script or software.

Recover a corrupted filesystem

Recover a Corrupted System File


If an essential Windows file gets whacked by a virus or otherwise corrupted, restore it from the Windows CD. Search the CD for the filename, replacing the last character with an underscore; for example, Notepad.ex_. If it's found, open a command prompt and enter the command EXPAND, followed by the full pathname of the file and of the desired destination: EXPAND D:\SETUP\NOTEPAD.EX_ C:\Windows\NOTEPAD.EXE. If either pathname contains any spaces, surround it with double quotes.

If the file isn't found, search on the unmodified filename. It will probably be inside a CAB file, which Win XP treats as a folder. Simply right-drag and copy the file to the desired location. In other Windows platforms, search for a file matching *.cab that contains the filename. When the search is done, open a command prompt and enter EXTRACT /L followed by the desired location, the full pathname of the CAB file, and the desired filename; for example: EXTRACT /L C:\Windows D:\I386\Driver.cab Notepad.exe. Again, if the destination or CAB file pathname contains spaces, surround it with double quotes.

19 November 2009

China mobile secret codes

china mobile secret codes
CHINESE MODELS:
default user code: 1122, 3344, 1234, 5678
Engineer mode: *#110*01#
Factory mode: *#987#
Enable COM port: *#110*01# -> Device -> Set UART -> PS Config -> UART1/115200
Restore factory settings: *#987*99#
LCD contrast: *#369#
software version: *#800#
software version: *#900#
set default language: *#0000# Send
set English language: *#0044# Send
set English language (new firmware): *#001# Send

Service codes BenQ:
software version: *#300#
test mode: *#302*20040615#
Service codes Pantech:
software version: *01763*79837#
service menu: *01763*476#
reset defaults (phone/user code reset to default): *01763*737381#
Service codes 3xx, 5xx:
software version: *#79#
software version: *#837#
Service codes VK200, VK2000, VK2010, VK2020, VK4000:
software version: *#79#
service menu: *#9998*8336# (hold #)
reset defaults (phone/user code reset to default): *#9998*7328# (hold #)
Service codes LG:
software version: 2945#*#
Service codes Sony-Ericsson:
J100 software version: #82#
Service codes Fly:
2040(i) reset defaults: *#987*99# Send
MX200 reset defaults: *#987*99# Send
MX200 software version: *#900# Send
SL300m reset defaults: *#987*99# Send
SL300m software version: *#900# Send
SL500m reset defaults: *#987*99# Send
SL500m software version: *#900# Send
MP500 reset defaults: *#987*99# Send
MP500 software version: *#900# Send
Set language to English: *#0044#
Set language to Russian: *#0007#
Service codes Konka:
C926 software version: *320# Send
C926 set default language: *#0000# Send
C926 set English language: *#0044# Send
Service codes GStar:
GM208 (Chinese Nokea 6230+) engineering menu: *#66*#
Set language to English: *#0044#
Set language to Russian: *#0007#
Service codes Motorola:
Motofone F3 software version: **9999* Send
C113, C114, C115, C115i, C116, C117, C118 software version: #02#*
C138, C139, C140 software version: #02#*
C155, C156, C157 software version: #02#*
C257, C261 software version: #02#*
V171, V172, V173 software version: #02#*
V175, V176, V176 software version: #02#*
C168, W220 software version: *#**837#
W208, W375 software version: #02#*
ZTE Mobile1- *938*737381#
2- PHONE WILL DIPLAYED DONE
3- POWER OFF YOUR PHONE AND POWER ON AGAIN
alcatelE205
unlocking phone code,only press***847# without simcard

E900 software version: *#5002*8376263#
E900 full reset: *2767*3855#
Service codes Spice:
S404 enable COM port: *#42253646633# -> Device -> Set UART -> PS -> UART1/115200
S410 engineer mode: *#3646633#
S900 software version: *#8375#
S900 serial no: *#33778#
Service codes Philips:
S200 enable COM port: *#3338913# -> Device -> Set UART -> PS -> UART1/115200
Service codes “Chinese” models:
default user code: 1122, 3344, 1234, 5678
Engineer mode: *#110*01#
Factory mode: *#987#
Enable COM port: *#110*01# -> Device -> Set UART -> PS Config -> UART1/115200
Restore factory settings: *#987*99#
LCD contrast: *#369#
software version: *#800#
software version: *#900#
Service codes BenQ:
software version: *#300#
test mode: *#302*20040615#
Service codes Pantech:
software version: *01763*79837#
service menu: *01763*476#
reset defaults (phone/user code reset to default): *01763*737381#
Service codes VK-Mobile 3xx, 5xx:
software version: *#79#
software version: *#837#
service menu: *#85*364# (hold #)
Service codes VK200, VK2000, VK2010, VK2020, VK4000:
software version: *#79#
service menu: *#9998*8336# (hold #)
reset defaults (phone/user code reset to default): *#9998*7328# (hold #)
Service codes LG:
software version: 2945#*#
KG300 NVRAM format: 2945#*# -> menu 15
Service codes Sony-Ericsson:
J100 software version: #82#
Service codes Fly:
M100 software version: ####0000#
2040(i) reset defaults: *#987*99# Send
MX200 reset defaults: *#987*99# Send
MX200 software version: *#900# Send
SL300m reset defaults: *#987*99# Send
SL300m software version: *#900# Send
SL500m reset defaults: *#987*99# Send
SL500m software version: *#900# Send
MP500 reset defaults: *#987*99# Send
MP500 software version: *#900# Send
Set language to English: *#0044#
Set language to Russian: *#0007#
Service codes Konka:
C926 software version: *320# Send
C926 set default language: *#0000# Send
C926 set English language: *#0044# Send
Service codes GStar:
GM208 (Chinese Nokea 6230+) engineering menu: *#66*#
Set language to English: *#0044#
Set language to Russian: *#0007#
Service codes Motofone-F3:
Motofone F3 software version: **9999* Send
***300* Set SIM Pin
***310* / ***311* SIM Pin ON | OFF
***000* Reset Factory settings
***644* Set Voicemail number
***260* / ***261* Auto keypad lock ON | OFF
***510* / ***511* Voice Prompts ON | OFF
***160* / ***161* Restricted Calling (Phonebook only) ON | OFF
***200608* Send: software version
***200606* Send: software version
***200806* Send: flex version
***250* / ***251* Keypad tones ON | OFF
***470* Select time format
***500* /***501* Prepaid Balance Display ON | OFF
***520* Change language
Service codes Motorola:
C113, C114, C115, C115i, C116, C117, C118 software version: #02#*
C138, C139, C140 software version: #02#*
C155, C156, C157 software version: #02#*
C257, C261 software version: #02#*
V171, V172, V173 software version: #02#*
V175, V176, V176 software version: #02#*
C168, W220 software version: *#**837#
W208, W375 software version: #02#*
and “yes””

………………………………………….. ………………………….
N95Pda and N95S Pinout
2×5
4:Rx
5:TX
6:GND
………………………………………….. ………………………….
K1 Moto Pinout
4:Rx
5:Tx
6:Gnd
………………………………………….. ………………………….
PDA ZT6618
1……..8 pin mini Conector
3:Rx
4:TX
5:Gnd
………………………………………….. ………………………….
Cect 8380
1……….8 pin mini Conector
1:Gnd
2:Rx
3:Tx
………………………………………….. ………………………….
KG-200
4:Gnd
3:Tx
2:Rx
………………………………………….. ………………………….
N91I
1…………..12 pin Connector
.
5:Gnd . 12:Tx
6:Tx . 13:Rx
7:Rx .
==============================================
All Chinese Mobile Code And Pinouts
——————————————————
Service codes BenQ:
software version: *#300#
test mode: *#302*20040615#
Service codes Pantech:
software version: *01763*79837#
service menu: *01763*476#
reset defaults (phone/user code reset to default): *01763*737381#
Service codes 3xx, 5xx:
software version: *#79#
software version: *#837#
Service codes VK200, VK2000, VK2010, VK2020, VK4000:
software version: *#79#
service menu: *#9998*8336# (hold #)
reset defaults (phone/user code reset to default): *#9998*7328# (hold #)
Service codes LG:
software version: 2945#*#
Service codes Sony-Ericsson:
J100 software version: #82#
Service codes Fly:
2040(i) reset defaults: *#987*99# Send
MX200 reset defaults: *#987*99# Send
MX200 software version: *#900# Send
SL300m reset defaults: *#987*99# Send
SL300m software version: *#900# Send
SL500m reset defaults: *#987*99# Send
SL500m software version: *#900# Send
MP500 reset defaults: *#987*99# Send
MP500 software version: *#900# Send
Set language to English: *#0044#
Set language to Russian: *#0007#
Service codes Konka:
C926 software version: *320# Send
C926 set default language: *#0000# Send
C926 set English language: *#0044# Send
Service codes GStar:
GM208 (Chinese Nokea 6230+) engineering menu: *#66*#
Set language to English: *#0044#
Set language to Russian: *#0007#
Service codes Motorola:
Motofone F3 software version: **9999* Send
C113, C114, C115, C115i, C116, C117, C118 software version: #02#*
C138, C139, C140 software version: #02#*
C155, C156, C157 software version: #02#*
C257, C261 software version: #02#*
V171, V172, V173 software version: #02#*
V175, V176, V176 software version: #02#*
C168, W220 software version: *#**837#
W208, W375 software version: #02#*
ZTE Mobile1- *938*737381#
2- PHONE WILL DIPLAYED DONE
3- POWER OFF YOUR PHONE AND POWER ON AGAIN
alcatelE205
unlocking phone code,only press***847# without simcard

E900 software version: *#5002*8376263#
E900 full reset: *2767*3855#
Service codes Spice:
S404 enable COM port: *#42253646633# -> Device -> Set UART -> PS -> UART1/115200
S410 engineer mode: *#3646633#
S900 software version: *#8375#
S900 serial no: *#33778#
Service codes Philips:
S200 enable COM port: *#3338913# -> Device -> Set UART -> PS -> UART1/115200
Service codes “Chinese” models:
default user code: 1122, 3344, 1234, 5678
Engineer mode: *#110*01#
Factory mode: *#987#
Enable COM port: *#110*01# -> Device -> Set UART -> PS Config -> UART1/115200
Restore factory settings: *#987*99#
LCD contrast: *#369#
software version: *#800#
software version: *#900#
Service codes BenQ:
software version: *#300#
test mode: *#302*20040615#
Service codes Pantech:
software version: *01763*79837#
service menu: *01763*476#
reset defaults (phone/user code reset to default): *01763*737381#
Service codes VK-Mobile 3xx, 5xx:
software version: *#79#
software version: *#837#
service menu: *#85*364# (hold #)
Service codes VK200, VK2000, VK2010, VK2020, VK4000:
software version: *#79#
service menu: *#9998*8336# (hold #)
reset defaults (phone/user code reset to default): *#9998*7328# (hold #)
Service codes LG:
software version: 2945#*#
KG300 NVRAM format: 2945#*# -> menu 15
Service codes Sony-Ericsson:
J100 software version: #82#
Service codes Fly:
M100 software version: ####0000#
2040(i) reset defaults: *#987*99# Send
MX200 reset defaults: *#987*99# Send
MX200 software version: *#900# Send
SL300m reset defaults: *#987*99# Send
SL300m software version: *#900# Send
SL500m reset defaults: *#987*99# Send
SL500m software version: *#900# Send
MP500 reset defaults: *#987*99# Send
MP500 software version: *#900# Send
Set language to English: *#0044#
Set language to Russian: *#0007#
Service codes Konka:
C926 software version: *320# Send
C926 set default language: *#0000# Send
C926 set English language: *#0044# Send
Service codes GStar:
GM208 (Chinese Nokea 6230+) engineering menu: *#66*#
Set language to English: *#0044#
Set language to Russian: *#0007#
Service codes Motofone-F3:
Motofone F3 software version: **9999* Send
***300* Set SIM Pin
***310* / ***311* SIM Pin ON | OFF
***000* Reset Factory settings
***644* Set Voicemail number
***260* / ***261* Auto keypad lock ON | OFF
***510* / ***511* Voice Prompts ON | OFF
***160* / ***161* Restricted Calling (Phonebook only) ON | OFF
***200608* Send: software version
***200606* Send: software version
***200806* Send: flex version
***250* / ***251* Keypad tones ON | OFF
***470* Select time format
***500* /***501* Prepaid Balance Display ON | OFF
***520* Change language
Service codes Motorola:
C113, C114, C115, C115i, C116, C117, C118 software version: #02#*
C138, C139, C140 software version: #02#*
C155, C156, C157 software version: #02#*
C257, C261 software version: #02#*
V171, V172, V173 software version: #02#*
V175, V176, V176 software version: #02#*
C168, W220 software version: *#**837#
W208, W375 software version: #02#*
and “yes””

………………………………………….. ………………………….
N95Pda and N95S Pinout
2×5
4:Rx
5:TX
6:GND
………………………………………….. ………………………….
K1 Moto Pinout
4:Rx
5:Tx
6:Gnd
………………………………………….. ………………………….
PDA ZT6618
1……..8 pin mini Conector
3:Rx
4:TX
5:Gnd
………………………………………….. ………………………….
Cect 8380
1……….8 pin mini Conector
1:Gnd
2:Rx
3:Tx
………………………………………….. ………………………….
KG-200
4:Gnd
3:Tx
2:Rx
………………………………………….. ………………………….
N91I
1…………..12 pin Connector
.
5:Gnd . 12:Tx
6:Tx . 13:Rx
7:Rx .

source: http://www.symbiangalaxy.org/f99/china-mobile-secret-codes-26018.html

dp.SyntaxHighlighter.ClipboardSwf = ‘http://s.wordpress.com/wp-content/plugins/highlight/clipboard.swf’; dp.SyntaxHighlighter.HighlightAll(‘code’); if(typeof wpOnload==’function’)wpOnload();

18 November 2009

چا ئنا کے موبائل، کاپی موبائل یا ڈپلیکیٹ م

چا ئنا کے موبائل، کاپی موبائل یا ڈپلیکیٹ مو بائل کے سیکورٹی کوڈ

سوال:۔برانڈڈ موبائل کا تو سیکورٹی کوڈ تو 0000ہوتا ہے پرچا ئنا کے موبائل، کاپی موبائل یا ڈپلیکیٹ مو بائل کے سیکورٹی کوڈ کیا ہیں۔
جواب:۔چا ئنا کے موبائل، کاپی موبائل یا ڈپلیکیٹ مو بائل کے سیکورٹی کوڈ یہ ہیں۔آپ ان کوڈزکوباری باری ٹرائی کریں۔
0000
1234
1122
3344
2244
5678
اس میں سے کوئی ایک کوڈ آپکے موبائل کا ہو سکتا ہے۔
شکریہ۔ آپ مجھے اپنی رائے سے ضرور آگاہ کیجئے اور میر ی اگلی شئیرنگ کا انتظار کیجئے۔

Hide ur number from others, unknown no .. private no ?

00448700360413p00923122239222

and dail dear this is corect

test and post u r coments hear


haa yaro mai ye bhool gaya k aap ne sirf ufone sy ic no per call karna hy aap ko 2:40 rupees per minute parega.ic no ko milao jab computer bolega tab aap koi b number mila kar aakhir mai # milana zaroori .enjoy karo


jee dosto aaj mai aap logo ko ye batana chahtha hu k ab ufone say 00448700360413 per call karne ka charges 18 rupees per minut hogaye hy lihaza muhthaath rahiye. warna apne ballance sy haath dona parega.

17 November 2009

Image Script

img src=""/>

Install Windows XP using USB Flash Disk/ Flash Drive - Step by Step Guide

Someone in this post (Acer Aspire One Specifications and Windows XP Drivers) ask me to write a tutorial about how to install Windows XP using USB flash disk/flash drive.
If you want to install Windows XP, but your notebook (or PC) has no CDROM, you should install Windows XP using USB Flash disk/Flash Drive/Thumb drive...
just follow this guide :


step 1:
Buy an USB Flash Drive (at least 2GB).
When you do this tutorial, please make sure your computer/laptop/PC has a CD-ROM (or DVD).
so, now you have 2 computers, with CD-ROM support and without CD-ROM support (e.g Acer Aspire One, Asus EEE-PC).

step 2:
Download this software pack (Komku-SP-usb.exe - Download) 1.47MB
UPDATE 1 :
Anonymous said…
your download at mediafire keeps timing out, any other hosts available?
Rapidshare
Easy-Share
Megaupload


this software pack contains 3 application :

-BootSect.exe (Boot Sector Manipulation Tool)
-PeToUSB (http://GoCoding.Com)
-usb_prep8 (Prepares Windows XP Setup LocalSource for Copy to USB-Drive)

step 3:
Double click Komku-SP-usb.exe

a window will appear... and click Install



step 4:
Insert your USB Flash Drive.
When I made this tutorial, I was using 4GB Transcend USB FlashDrive...

Locate folder C:\Komku\PeToUSB\
double click PeToUSB.exe



a window will appear like this...



Destination Drive : select USB Removable
check on Enable Disk Format
check on Quick Format
check on Enable LBA (FAT 16x)
Drive Label : XP-KOMKU (or whatever you want)
then click Start


Click Yes to continue....


"You are about to repartition and format a disk. Disk: .... All existing volumes and data on that disk will be lost. Are You Sure You Want To Continue?"
click Yes

Wait a few seconds...


Click OK, and you can close PeToUSB window.

step 5:
Open Command Prompt ...
Click Start > Run > type cmd > click OK


On Command Prompt window, go to directory C:\Komku\bootsect\
how to do this?

first type this cd\ and press Enter


then type cd komku\bootsect and press Enter


the result...


Don't close Command Prompt window, and go to step 6...

step 6:
on command prompt window, type bootsect /nt52 H:


H: is drive letter for my USB Flash Drive, it may be different with yours...


and press Enter

the result... "Successfully updated filesystem bootcode. Bootcode was succesfully updated on all targeted volumes."


don't close Command Prompt window, and go to step 7...

step 7:
now type this cd.. and press Enter


then type cd usb_prep8 and press Enter

type usb_prep8 again... and pres Enter

step 8:


Your command prompt window will look like this


Press any key to continue...
usb_prep8 welcome screen will appear



Prepares Windows XP LocalSource for Copy to USB-Drive:

0) Change Type of USB-Drive, currently [USB-stick]
1) Change XP Setup Source Path, currently []
2) Change Virtual TempDrive, currently [T:]
3) Change Target USB-Drive Letter, currently []
4) Make New Tempimage with XP LocalSource and Copy to USB-Drive
5) Use Existing Tempimage with XP LocalSource and Copy to USB-Drive
F) Change Log File - Simple OR Extended, currently [Simple]
Q) Quit

Enter your choice:_

now, insert your original Windows XP CD, or Windows XP with sata ahci driver to your CD/DVD ROM and back to Command Prompt window

type 1 then press Enter...
"Browse For Folder" window will appear, select your CD/DVD drive and click OK


the result... "XP Setup Source Path" changed to G:\ (yours may be different)


now for point 2, if letter T is currently assigned to a drive in your computer, you must change it.... if not, leave it as it is
how to change it?
type 2 and press Enter...


"Enter Available Virtual DriveLetter"
for example you doesn't have drive S
so you type S and press Enter

back to usb_prep8 welcome screen...
now type 3 and press Enter...


"Please give Target USB-Drive Letter e.g type U" Enter Target USB-Drive Letter:

because my Flash drive letter is H


so, type H and press Enter...

after back to usb_prep8 welcome screen...
now type 4 and press Enter to make new temporary image with XP LocalSource and copy it to USB Flash Drive
please wait a few seconds..


"WARNING, ALL DATA ON NON-REMOVABLE DISK DRIVE T: WILL BE LOST! Proceed with Format (Y/N)?"
type Y and press Enter
please wait....
when format virtual disk complete, press any key to continue...


please wait... making of LocalSource folder is in progress...


when "Making of LocalSource folder $WIN_NT$.~LS Ready"
Press any key to continue...


"Copy TempDrive Files to USB-Drive in about 15 minutes = Yes OR STOP = End Program = No"
Click Yes, and wait...


"Would you like USB-stick to be preferred Boot Drive U: bla... bla..."
Click Yes


"Would you like to unmount the Virtual Drive ?"
Click Yes, wait a few seconds, and press any key....
press any key again to close usb_prep8...


Now, your USB Flash Drive is ready...

step 9:
Now, insert your USB Flash Drive/Flash Disk/Thumb Drive to your notebook (e.g Acer Aspire One) go to BIOS and make USB HDD (or USB ZIP in some other machine) as primary boot device....

then boot form your USB Flash Drive....
and select "TXT Mode Setup Windows XP, Never unplug USB-Drive Until After Logon"


After Hard Disk detected, delete all partition, create single partition... and install Windows XP on that partition...
and wait...


once text mode setup is complete, computer will restart....
this time select "GUI Mode setup Windows XP, Continue Setup + Start XP"


Continue Windows XP setup.... and Done!
Windows XP Installed....


Remember, you can use this tutorial to install Windows XP on all other computers.. not just Aspire One and Asus EEE-PC....

UPDATE 2 :
FAQ
Anonymous said…
what if i use a 1GB flash drive? will it still work?
Yes it is.. :)

Anonymous said…
hi all
can somebody tell me how to install xp with this method in SATA HD?
i finished the tutorial,but when boot up,the hdd is not showed.
help me plz
Follow this guide (Slipstreaming driver using nLite)
FYI, you can burn it as image, then use virtual drive as Daemon Tools (Download) to mount it

Anonymous said…
Trying to restore XPSP3 on Medion akoya MD96910 netbook. Worked fine until 99% of files copied then got: Setup cannot copy the file: iaahci.cat - giving 3 options (retry, skip, quit). Retry didn't work so skipped. Similar message for iaahci.inf iaStor.cat iaStor.inf iaStor.sys. Subsequent XP Boot then failed. I do not understand why the intelSATA drivers (these files) won't load. Will try again with Netbook Bios AHCI mode set to Disable but not confident that will make any difference. Help!
Ref: MD96910 netbook restore. With AHCI mode disabled it works without loading the intelSATA files. I assume these will have to be loaded, just got to figure how to do that now! Thanks for great install guide - brilliant. If you could put a comment about intelSATA it would be great, I cannot be the only person who doesn't understand it.

Allen said…
PeToUSB didn't find any removable flash drive. Please help me.
by the way, I'm using Windows Vista.
Try use XP... or
use another USB port... My friend tried it on his Lenovo... when he plug in his USB flashdrive on left side of his notebook... PeToUSB didn't find any removable flashdrive... he change it to the right side then it works (XP) :)
read this :

Anonymous said…
Easy and well written.. thanks for making our lives easier. Although I should mention that I've tried it inder Windows Vista at first and the USB Flash Driver wasn't readable at all. The whole process must be under Windows XP. Again thanks, and wish you all the best.

Anonymous said…
I was having the "No USB Disks" error with PeToUSB as well with by Samsung U3 (2G) and my microSD + Reader (4G) on 32-bit Vista. The USBs were all formatted to FAT.
Then I switched to XP, and the USB was detected

I want do this is Vista...
Ali Jaffer said…
If you're on Windows Vista, try using the "Run as Administrator" function for both formatting the drive and command prompt.

Anonymous said…
thanks for the instructions works like a charm everytime :D
got one question though, can you use partition manager to make partitions after XP has been installed successfully using this method?
Like Obama said... Yes We Can!

For more FAQ read comments.....

Anonymous said…
Hi Guys this is greate blog Guess what i sued the same instruction to install the Server 2003 sr2 and works well for my Home server
Thanks to you all the Contributor

12 November 2009

Acceptable CAD Formats

There are several types of files which ProtoCAM can accept as input data. We can accept files from any CAD package, provided the geometry is exported into an STL (stereolithography) file format. The STL file format is standard for the Rapid Prototyping industry. This format approximates the surface of a parametric solid model with a mesh of triangles. For detailed instructions, please consult our instructions for exporting STL files from various CAD packages.

In addition to STL files, we also accept these file formats:


Pro/ENGINEER (*.PRT.*)
SolidWorks (*.SLDPRT)
Rhino 3D (*.3DM)
STEP (*.STEP/*.STP)
IGES (*.IGES/*.IGS)
Parasolid (*.X_T)
ACIS (*.SAT)
Neutral (*.NEU)

Please visit the Instructions page for information on transferring files for quotation (or visit our Online Request for Quotation).

Exporting STL Files

AutoCAD               Autodesk Inventor           CADKEY               I-DEAS
IronCAD                Mechanical Desktop         ProE                      ProE 2001
Solid Designer       SolidEdge                           SolidWorks           Unigraphics

AutoCAD    

Your design must be a three-dimensional solid object to output an STL file.
Type these commands in AutoCAD's command line:
Set DISPSILH to 1
Set ISOLINES to 0
Set FACETRES to 10
Relocate the object to the positive X-Y-Z octant
Use the STLOUT command to export an STL file. (AMSTLOUT for AutoCAD Desktop files)

Autodesk Inventor 

The detail settings for STL Output are stored in the registry. Information on changing the detail level can be found at Autodesk's website, under the title "Set accuracy for exporting STL files from Autodesk Inventor software" and ID TS64378.
Go to the File menu, then select the Save Copy As... choice
Select STL from the Types drop-down
Click the Options button, and choose the High detail level
Click the Save Button.

CADKEY

Go to the File menu, then Export, then STL
Type in a filename and select OK
A new window will appear with options for the export
Change Format to Binary
Change Facet Tolerance if a higher resolution STL file is desired

Additional export tolerance options are in the Solids99 Configuration window accessed from the Tolerance section of Configuration.

I-DEAS

Select File then Export, next choose Rapid Prototype File then OK.
Select the Part to be prototyped
Select Prototype Device then, SLA500.dat then OK
Set absolute facet deviation to 0.000395
Select Binary, then OK

IronCAD

Select Part Properties then Rendering
Set Facet Surface Smoothing to 150
Select File then Export
Select .STL

Mechanical Desktop

Use the AMSTLOUT command to export the STL file.

Pro/ENGINEER (pre 2001)

Select File then Export, then Model
Select STL
Input 0 for the chord height
Leave Angle Control at default
Select OK

Pro/ENGINEER

We are able to accept native Pro/E files, so please consider sending us the .PRT file instead of an STL. 
Select File, then Save As
Pick .STL from the Save As Type dropdown menu
Input 0 for the chord height
Leave Angle Control at default
Select OK

SolidDesigner

Select the File menu, then External, then Save STL
Select Binary mode
Select Part
Type in your Filename
Enter 0.01 mm for the Max Deviation Distance
Select OK

SolidEdge

Select File, then Save As
Set Save As Type to STL
Select Options
Set Conversion Tolerance to 0.001 in or 0.0254 mm.
Set Surface Plane Angle to 45.00°
Select Save

SolidWorks

We are able to accept native SolidWorks files, so instead of creating a STL, please consider sending us the SLDPRT (and any appropriate drawings or assemblies)
Select File, then Save As...
Select STL (*.STL)"
Select Options
Set Resolution to Fine
Select OK
Select Save

Unigraphics

Select File, then Export, then Rapid Prototyping
Set Output Type to Binary
Set Triangle Tolerance to 0.0025
Set Adjacency Tolerance to 0.12
Set Auto Normal Gen to On
Set Normal Display to Off
Set Triangle Display to On

27 September 2009

Java Scripts

check Any Webpage Last Update
javascript:alert(document.lastModified);

16 July 2009

Three Things in Life

Once gone never come
1) Words
2) Opportunity
3) Time

Never Sure.....
1) Dream
2) Success
3) Fortune

Make a great person
1) Hard work
2) Sincerity
3) Success

Most valuable
1) Love
2) Self respect
3) Time

Must not be lost
1) Peace
2) Hope
3) Honesty

Destroy the person
1) Distrust
2) Jealousy
3) Anger

09 July 2009

How to hack Windows XP Admin Passwords

This hack will only work if the person that owns the machine has no intelligence. This is how it works: When you or anyone installs Windows XP for the first time, you are asked to put in your username and up to five others. Now, unknowns to many other people this is the only place in Windows XP that you can password the default Administrator Diagnostic Account. This means that to bypass most administrators account son Windows XP all you have to do is boot to safe mode by pressing F8during boot up and choosing it. Log into the Administrator Account and create your own or change the password on the current Account. This only works if the user on setup specified a password for the Administrator Account.

This has worked for me on both Windows XP Home and Pro.
-----------------------------------------------------------------------------
Now this one seems to be machine dependant, it works randomly(don't know why)

If you log into a limited account on your target machine and open up a dos prompt then enter this set of commands Exactly: (this appeared on www.astalavista.com a few days ago but i found that it wouldn't work on the welcome screen of a normal booted machine)

-----------------------------------------------------------------------------
cd\ *drops to root
cd\windows\system32

*directs to the system32 dir
mkdir temphack

*creates the folder temphack copy logon.scr temphack\logon.scr

*backsup logon.scr copy cmd.exe temphack\cmd.exe

*backsup cmd.exe del logon.scr

*deletes original logon.scr rename cmd.exe logon.scr

*renames cmd.exe to logon.scr exit

*quits dos
-----------------------------------------------------------------------------
Now what you have just done is told the computer to backup the command program and the screen saver file, then edits the settings so when the machine boots the screen saver you will get an unprotected dos prompt without logging into XP. Once this happens if you enter this command minus the quotes "net user <admin account name here> password" If the Administrator Account is called Frank and you want the password blah enter this "net user Frank blah" and this changes the password on franks machine to blah and you're in.

The Secret Language of Women

Fine

A woman uses this word at the end of any argument in which she feels she is right about but needs to shut you up. Never use "fine" to describe how a woman looks. This will cause you to have one of those arguments.

Five Minutes

This is half an hour. It is equivalent to the same "five minutes" that a football game is going to last before you take out the garbage.

Nothing

This really means, "You'd never understand." "Nothing" is usually accompanied by a woman's desire to turn you inside out, upside-down, and backwards. "Nothing" is often said prior to an argument that will last "Five Minutes" and will end with the word "Fine."

Go Ahead (with raised eyebrows)

This is not permission. This is a dare. One that will result in a woman getting upset over "Nothing" and will end with the word "Fine.

Go Ahead (with normal eyebrows)

This means, "I give up" or "do what you want because I don't care." You will get the "Go Ahead" with raised eyebrows in just a few minutes, followed by "Nothing" and "Fine" and she will talk to you in about "Five Minutes" when she cools off.

Loud Sigh

This is not actually a word, but is still a verbal statement often misunderstood by men. A "Loud Sigh" means she thinks you are an idiot at that moment and is wondering why she is wasting her time arguing over "Nothing."

Soft Sigh

Again, not a word, but a verbal statement. "Soft Sighs" are one of the few things that some men actually understand. This means a woman is content and your best bet is to not move or breathe and she will stay content.

That is Okay

This is one of the most dangerous statements a woman can say to a man. "That's Okay,” means that she wants to think long and hard before paying you retributions for whatever it is that you have done. "That's Okay" is often used with the word "Fine" and used in conjunction with the raised Eyebrow "Go Ahead." At some point in the near future when she has plotted and planned, you are going to be in some very big trouble.

Please Do

This is not a statement, it is an offer. A woman is giving you the chance to come up with whatever excuse or reason you have for doing whatever it is that you have done. You have a fair chance to tell the truth, so be careful and you shouldn't get a "That's Okay."

Thanks

A woman is thanking you. Do not faint; simply say, "You're welcome."

Thanks a lot

This is much different than "Thanks." A woman will say, "Thanks a lot" when she is really ticked off at you. It signifies that you have hurt her in some callous way, and will be followed by the "Loud Sigh." Be careful not to ask what is wrong after the "Loud Sigh," as she will only tell you "Nothing."

VISA - MasterCard Fraud

Just a heads up for everyone regarding the latest in Visa fraud. Royal Bank received this communication about the newest fraud. This is happening in southern Alberta right now and moving.

This one is slick since they provide YOU with all the information, except the one piece they want. Note, the callers do not ask for your card number; they already have it.

This information is worth reading. By understanding how the VISA & MasterCard telephone Credit Card Scam works, you will be better prepared to protect yourself. One of our employees was called on Wednesday from 'VISA', and I was called on Thursday from 'MasterCard'.

The Fraud works like this:

Person calling says - 'This is (name), and I'm calling from the Security and Fraud Department at VISA. My Badge number is 12460, your card has been flagged for an unusual purchase pattern, and I am calling to verify. This would be on your VISA card, which was issued by (name of bank). Did you purchase an Anti-Telemarketing Device for $497.99 from a marketing company based in Arizona?' When you say 'No', the caller continues with, 'Then we will be issuing a credit to your account. This is a company we have been watching and the charges range from $297 to $497, just under the $500 purchase Pattern that flags most cards. Before your next statement, the credit will be sent to (gives you your address), is that correct?' You say 'yes'.


The caller continues - 'I will be starting a Fraud Investigation. If you have any questions, you should call the 1- 800 number listed on the back of your card (1-800-VISA) and ask for Security. You will need to refer to this Control Number. The caller then gives you a 6-digit number. 'Do you need me to read it again?'

Here is the IMPORTANT part on how the fraud works - The caller then says, 'I need to verify you are in possession of your card'. He will ask you to 'turn your card over and look for some numbers'. There are seven numbers; the first 4 are part of your card number, the last 3 are the Security Numbers that verify you are the possessor of the card.
These are the numbers you sometimes use to make Internet purchases to prove you have the card. The caller will ask you to read the last 3 numbers to him. After you tell the caller the three numbers, he will say, 'That is correct, I just needed to verify that the card has not been lost or stolen, and that you still have your card. Do you have any other questions?'

After you say no, the caller then thanks you and states, 'Don't hesitate to call back if you do', and hangs up. You actually say very little, and they never ask for or tell you the card number. However, after we were called on Wednesday, we called back. Within 20 minutes to ask a question. Are we were glad we did! The REAL VISA Security Department told us it was a fraud and in the last 15 minutes, a new purchase of $497.99 was charged to our card. We made a real fraud report and closed the VISA account. VISA is reissuing us a new number. What the scammers want is the 3-digit PIN number on the back of the card. Do not give it to them. Instead, tell them you will call VISA or Master Card directly for verification of their conversation.

The real VISA told us that they would never ask for anything on the card as they already know the information since they issued the card! If you give the scammers your 3 Digit PIN Number, you think you're receiving a credit; however, by the time you get your statement you'll see charges for purchases you didn't make, and by then it's almost too late and/or more difficult to actually file a fraud report.

It appears that this is a very active fraud, and evidently quite successful.

Pass this on to all your family and friends.

08 July 2009

Shortcuts Keys of Microsoft Word

Command Name Shortcut Keys
------------------------------------------------------------------------

All Caps CTRL+SHIFT+A
Annotation ALT+CTRL+M
App Maximize ALT+F10
App Restore ALT+F5
Apply Heading1 ALT+CTRL+1
Apply Heading2 ALT+CTRL+2
Apply Heading3 ALT+CTRL+3
Apply List Bullet CTRL+SHIFT+L
Auto Format ALT+CTRL+K
Auto Text F3 or ALT+CTRL+V
Bold CTRL+B or CTRL+SHIFT+B
Bookmark CTRL+SHIFT+F5
Browse Next CTRL+PAGE DOWN
Browse Previous CTRL+PAGE UP
Browse Sel ALT+CTRL+HOME
Cancel ESC
Center Para CTRL+E
Change Case SHIFT+F3
Char Left LEFT
Char Left Extend SHIFT+LEFT
Char Right RIGHT
Char Right Extend SHIFT+RIGHT
Clear DELETE
Close or Exit ALT+F4
Close Pane ALT+SHIFT+C
Column Break CTRL+SHIFT+ENTER
Column Select CTRL+SHIFT+F8
Copy CTRL+C or CTRL+INSERT
Copy Format CTRL+SHIFT+C
Copy Text SHIFT+F2
Create Auto Text ALT+F3
Customize Add Menu ALT+CTRL+=
Customize Keyboard ALT+CTRL+NUM +
Customize Remove Menu ALT+CTRL+-
Cut CTRL+X or SHIFT+DELETE
Date Field ALT+SHIFT+D
Delete Back Word CTRL+BACKSPACE
Delete Word CTRL+DELETE
Dictionary ALT+SHIFT+F7
Do Field Click ALT+SHIFT+F9
Doc Close CTRL+W or CTRL+F4
Doc Maximize CTRL+F10
Doc Move CTRL+F7
Doc Restore CTRL+F5
Doc Size CTRL+F8
Doc Split ALT+CTRL+S
Double Underline CTRL+SHIFT+D
End of Column ALT+PAGE DOWN
End of Column ALT+SHIFT+PAGE DOWN
End of Doc Extend CTRL+SHIFT+END
End of Document CTRL+END
End of Line END
End of Line Extend SHIFT+END
End of Row ALT+END
End of Row ALT+SHIFT+END
End of Window ALT+CTRL+PAGE DOWN
End of Window Extend ALT+CTRL+SHIFT+PAGE DOWN
Endnote Now ALT+CTRL+D
Extend Selection F8
Field Chars CTRL+F9
Field Codes ALT+F9
Find CTRL+F
Font CTRL+D or CTRL+SHIFT+F
Font Size Select CTRL+SHIFT+P
Footnote Now ALT+CTRL+F
Go Back SHIFT+F5 or ALT+CTRL+Z
Go To CTRL+G or F5
Grow Font CTRL+SHIFT+.
Grow Font One Point CTRL+]
Hanging Indent CTRL+T
Header Footer Link ALT+SHIFT+R
Help F1
Hidden CTRL+SHIFT+H
Hyperlink CTRL+K
Indent CTRL+M
Italic CTRL+I or CTRL+SHIFT+I
Justify Para CTRL+J
Left Para CTRL+L
Line Down DOWN
Line Down Extend SHIFT+DOWN
Line Up UP
Line Up Extend SHIFT+UP
List Num Field ALT+CTRL+L
Lock Fields CTRL+3 or CTRL+F11
Macro ALT+F8
Mail Merge Check ALT+SHIFT+K
Mail Merge Edit Data Source ALT+SHIFT+E
Mail Merge to Doc ALT+SHIFT+N
Mail Merge to Printer ALT+SHIFT+M
Mark Citation ALT+SHIFT+I
Mark Index Entry ALT+SHIFT+X
Mark Table of Contents Entry ALT+SHIFT+O
Menu Mode F10
Merge Field ALT+SHIFT+F
Microsoft Script Editor ALT+SHIFT+F11
Microsoft System Info ALT+CTRL+F1
Move Text F2
New CTRL+N
Next Cell TAB
Next Field F11 or ALT+F1
Next Misspelling ALT+F7
Next Object ALT+DOWN
Next Window CTRL+F6 or ALT+F6
Normal ALT+CTRL+N
Normal Style CTRL+SHIFT+N or ALT+SHIFT+CLEAR (NUM 5)
Open CTRL+O or CTRL+F12 or ALT+CTRL+F2
Open or Close Up Para CTRL+0
Other Pane F6 or SHIFT+F6
Outline ALT+CTRL+O
Outline Collapse ALT+SHIFT+- or ALT+SHIFT+NUM -
Outline Demote ALT+SHIFT+RIGHT
Outline Expand ALT+SHIFT+=
Outline Expand ALT+SHIFT+NUM +
Outline Move Down ALT+SHIFT+DOWN
Outline Move Up ALT+SHIFT+UP
Outline Promote ALT+SHIFT+LEFT
Outline Show First Line ALT+SHIFT+L
Over type INSERT
Page ALT+CTRL+P
Page Break CTRL+ENTER
Page Down PAGE DOWN
Page Down Extend SHIFT+PAGE DOWN
Page Field ALT+SHIFT+P
Page Up PAGE UP
Page Up Extend SHIFT+PAGE UP
Para Down CTRL+DOWN
Para Down Extend CTRL+SHIFT+DOWN
Para Up CTRL+UP
Para Up Extend CTRL+SHIFT+UP
Paste CTRL+V or SHIFT+INSERT
Paste Format CTRL+SHIFT+V
Prev Cell SHIFT+TAB
Prev Field SHIFT+F11 or ALT+SHIFT+F1
Prev Object ALT+UP
Prev Window CTRL+SHIFT+F6 or ALT+SHIFT+F6
Print CTRL+P or CTRL+SHIFT+F12
Print Preview CTRL+F2 or ALT+CTRL+I
Proofing F7
Redo ALT+SHIFT+BACKSPACE
Redo or Repeat CTRL+Y or F4 or ALT+ENTER
Repeat Find SHIFT+F4 or ALT+CTRL+Y
Replace CTRL+H
Reset Char CTRL+SPACE or CTRL+SHIFT+Z
Reset Para CTRL+Q
Revision Marks Toggle CTRL+SHIFT+E
Right Para CTRL+R
Save CTRL+S or SHIFT+F12 or ALT+SHIFT+F2
Save As F12
Select All CTRL+A or CTRL+CLEAR (NUM 5) or CTRL+NUM 5
Select Table ALT+CLEAR (NUM 5)
Show All CTRL+SHIFT+8
Show All Headings ALT+SHIFT+A
Show Heading1 ALT+SHIFT+1
Show Heading2 ALT+SHIFT+2
Show Heading3 ALT+SHIFT+3
Show Heading4 ALT+SHIFT+4
Show Heading5 ALT+SHIFT+5
Show Heading6 ALT+SHIFT+6
Show Heading7 ALT+SHIFT+7
Show Heading8 ALT+SHIFT+8
Show Heading9 ALT+SHIFT+9
Shrink Font CTRL+SHIFT+,
Shrink Font One Point CTRL+[
Small Caps CTRL+SHIFT+K
Space Para1 CTRL+1
Space Para15 CTRL+5
Space Para2 CTRL+2
Spike CTRL+SHIFT+F3 or CTRL+F3
Start of Column ALT+PAGE UP
Start of Column ALT+SHIFT+PAGE UP
Start of Doc Extend CTRL+SHIFT+HOME
Start of Document CTRL+HOME
Start of Line HOME
Start of Line Extend SHIFT+HOME
Start of Row ALT+HOME
Start of Row ALT+SHIFT+HOME
Start of Window ALT+CTRL+PAGE UP
Start of Window Extend ALT+CTRL+SHIFT+PAGE UP
Style CTRL+SHIFT+S
Subscript CTRL+=
Superscript CTRL+SHIFT+=
Symbol Font CTRL+SHIFT+Q
Thesaurus SHIFT+F7
Time Field ALT+SHIFT+T
Toggle Field Display SHIFT+F9
Toggle Master Subdocs CTRL+\
Tool SHIFT+F1
Un Hang CTRL+SHIFT+T
Un Indent CTRL+SHIFT+M
Underline CTRL+U or CTRL+SHIFT+U
Undo CTRL+Z or ALT+BACKSPACE
Unlink Fields CTRL+6 or CTRL+SHIFT+F9
Unlock Fields CTRL+4 or CTRL+SHIFT+F11
Update Auto Format ALT+CTRL+U
Update Fields F9 or ALT+SHIFT+U
Update Source CTRL+SHIFT+F7
VBCode ALT+F11
Web Go Back ALT+LEFT
Web Go Forward ALT+RIGHT
Word Left CTRL+LEFT
Word Left Extend CTRL+SHIFT+LEFT
Word Right CTRL+RIGHT
Word Right Extend CTRL+SHIFT+RIGHT
Word Underline CTRL+SHIFT+W

Helpful Tips on Eye Care

With so many of us spending lots of time in front of the computer every day it comes to no surprise that research is showing a rise in visual problems. What can one do? First, it’s important to find out how you can protect your eyes through eye health exams and by making a few minor changes in your computer viewing habits.

 

Here are some helpful Eye Care Tips -

 

Positioning is everything

Correct positioning of your computer, keyboard and typing copy is essential. Your screen should be positioned about an arm’s length from your eyes and 20 degrees below eye level. Consider foot and wrist rests for added comfort.

Lighting can make all the difference

Room lighting should be diffuse, not direct, to reduce glare and reflections from your screen. Look into an internal or external glare screen and be sure to set your colour, contrast and brightness levels to suit you.

A little extra help for your glasses

Anti-reflective coatings on the lenses of your glasses can be applied by your optometrist to reduce discomfort and to ease reduced vision from bright and/or flickering light sources such as VDTs and fluorescent lights. And don’t forget, your doctor of optometry can talk to you about eyeglasses designed specifically for people who use computers a lot.

Take time out, our 20-20-20 rule

Step I :-
After every 20 minutes of looking into the computer screen, turn your head and try to look at any object placed at least 20 feet away. This changes the focal length of your eyes, a must-do for the tired eyes.
Step II :-
Try and blink your eyes for 20 times in succession, to moisten them.
Step III :-
Time permitting of course, one should walk 20 paces after every 20 minutes of sitting in one particular posture. Helps blood circulation for the entire body.

It’s all in the blinking

Did you know that on average we blink 12 times per minute? But wait, did you know that when we’re on the computer we only blink 5 times per minute? That can add up to dry eyes. Relieve the discomfort by using artificial tear drops or gels and remember to blink!

 

Palming
Sit straight at your workstation and rub your palms against each other till you feel them warm. The warmth of your palms helps soothe and relax tired eyes. Then, lightly cup your eyes with your palms and relax for 60 seconds. Count the seconds in your mind. Repeat this exercise two to three times whenever your eyes feel tired, or as often as you want. While palming, you can either rest your elbows on your desk or keep away from the desk and cup your eyes. Both ways are fine.

Splash water on your face
During breaks, splash water on your face while closing your eyes. This has an overall relaxing effect and helps you feel refreshed.

Use tea bags
Keep two used tea bags in the refrigerator before you leave for work. Once you are home, place the tea bags on your eyes for a few minutes as you relax. This not only soothes tired eyes, but also reduces puffiness.  

 

Eat healthy
Incorporate Vitamins A, C, and E on a daily basis; eat citrus fruits, green leafy veggies, tomatoes, spinach, poultry and dairy products. Pack a box of chopped carrots, cucumber and fresh fruits and munch in-between meals at the office.

 

Create Your Own Logon Message

You can create a message that will appear when you log on to your computer.

Click Start, click Run, type regedit, and then click OK.

In the Registry Editor, drill down to the following key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon

Right-click LegalNoticeCaption, click Modify, type My Windows XP Machine, and then click OK.

Right-click LegalNoticeText, click Modify, and then type your message.

Close the editor and your new message will appear at every log on.

This tip applies to computers that are part of a domain. For stand-alone or peer-to-peer networks, the custom screen appears just before the Welcome screen.

You may need to have an administrator account on your computer to make changes to the registry. Incorrectly editing the registry may severely damage your system. At the very least, you should back up any valued data on the computer before making changes to the registry.

google Tricks

This is to make your "Google" search much more easier...

For :

Songs/Entertainment

“parent directory ” MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

?intitle:index.of? mp3

?intitle:index.of? mp3 britney - Change britney with the artist you want.

Applications

“parent directory ” /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

“parent directory ” Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

Ebooks

+(”index of”) +(”/ebooks”|”/book”) +(chm|pdf|zip|rar) +apache

ebook intitle:”Title” filetypedf ~ Change the Title according to your Need.

Maintaining your Machine, What makes your machine slow?

I've heard a lot of comments from the malware staffs that there are a lot of people thinking that a slow computer is caused by malware. However, a slow PC might have several causes other than malware. In this thread I will be giving you a step by step guide on how to speed up your PC. The main thing that slows your PC down, if it's not malware, is clogged up Temp files.

Here's a list of common causes of slow machines:
  • Low amount of memory (RAM)
  • Multiple protection systems installed
  • Many programs on startup
  • Full temp folders
  • Fragmented hard drive
  • Forgotten programs
  • Multiple of the above

1. Low amounts of memory (RAM)
I have had a lot of people in my neighbourhood asking me why their PC was slow. One of the highest causes was the low amount of memory in their PCs. A lot of old PCs still have 256 MB RAM in their machine while Windows XP already has a recommended of 512 MB and Vista is even more demanding with a stunning 1024 MB (1GB). Having a low amount of memory can cause the PC to take ages in performing what we would think to be simple tasks. While this is usually true, the PC doesn't only have to run the simple task, but at the same time keep services up, your Protection software running and possibly more programs that are running in the background. Therefore it is a good idea to have at least the recommended amount of memory in your machine for the operating system that you are running. If you are going to be running a lot of programs at once, consider taking at least 512 MB above recommendation to keep everything running smoothly.

2. Multiple protection systems installed
As I'm not trained in Malware Removal and do not know a lot about how Protection Systems work I shall quote from a blog post by Miekiemoes found here. (Also worth reading!!)

QUOTE
This is a common mistake many users make. They think that having more than one Antivirus and Firewall installed will protect them in a better way. It won't.. On the contrary..
Rather than giving you extra protection, it will seriously decrease reliability and effectiveness ! The reason for this is that if both products have their automatic (Real-Time) protection switched on, your system may lock up due to both software products attempting to access the same file at the same time. Also, if more than one Antivirus and Firewall installed are not compatible with eachother, it can cause system performance problems and a serious system slowdown. It happens quite a lot that a system won't even boot properly because of more than one Antivirus and Firewall installed.
When having general computer problems and you have more than one AV/Firewall installed, this can be the main cause of your problems.

Concerning Antispywarescanners, it's ok for you to install more than one.However, it's not advised that you let them all start up with Windows, running as a Real Time scanner. Only keep one running in the background and disable the rest, because AntispywareScanners are also resource hogs. They are actually all doing the same, so it's really not needed to have more of them running in the background. After all, you do not use more than one different vacuum cleaner either to clean your carpet with.
Just let the Antispyware scanner(s) scan once in a while on demand.


3. Many programs on start-up
Having many programs in the startup will slow your computer down. Taking out programs that aren't necessary on startup will reduce the resource requirements on boot and will generally make the PC run faster. To remove programs from your startup list, follow the instructions below.

XP Users:
  • Open Start Menu and select "Run..."
  • In the run box type: msconfig and press enter.
  • A window will appear, go to the Startup tab.
  • In the startup tab, disable tick boxes on all the programs that don't necessarily need to be started at boot.
Vista Users:
  • Open Start Menu and in the white box type: msconfig
  • Click msconfig.exe that appeared in the list and confirm the UAC.
  • A window will appear, go to the Startup tab.
  • In the startup tab, disable tick boxes on all the programs that don't necessarily need to be started at boot.

4. Cleaning the Temporary Folders.
As a lot of you might know, the more Windows has to load the slower a PC will be.
The temp folders can fill up quite quickly and having a temp folder of 2 Gigabyte won't do windows any good.
The steps below are easy steps using a simple program to clean out your temp folders.

Please download ATF Cleaner by Atribune.
  • Double-click ATF-Cleaner.exe to run the program.
    Under Main choose: Select All
    Click the Empty Selected button.
If you use Firefox browser
  • Click Firefox at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browser
  • Click Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.
For Technical Support, double-click the e-mail address located at the bottom of each menu.

5. Defragging your Hard Drive.
While temp folders are one way to clog the speed of your system, fragmented files are another. The more fragmented your files are the slower the hard drive will be to run programs smoothly. A defrag is recommended to keep your hard drive clean and fast. It is recommended that you do not run any programs whatsoever when you are defragging your hard drive as running applications will make them unable to be moved.

Please download JkDefrag by Jeroen Kessels
  • Unzip the program to a folder.
  • Reboot to release most of the files in use.
  • Double Click JkDefrag.exe to run the program.
Note: Everything is done automatically the moment you run JkDefrag.exe

6. Keeping it clean!
Something that is highly underestimated is the simpleness of 'Keeping it clean!'. Installing a lot of programs will eventually use up your resources that you could use to keep your PC fast.Removing old programs that you never used, or those 'one-day-fly' programs that you try out but don't meet your criteria, will free up space and memory to be used elsewhere. Whenever you are done with a program, remove it from your system so the resources free up. Below are some steps to get rid of some unused programs.
  • Open Start and select Control Panel
  • Open Add/Remove Programs(XP) or Programs and Features(Vista)
  • Go through the list carefully and see if there are any useless programs that you can remove.
  • Remove all the programs that you don't need any more.

7. Little tweaks for speed.
There are a few tricks that you can use to speed up your computer if need be. Below I will make a list of tweaks for either XP or Vista (watch the title) that will help you speed up your PC. Some tweaks are for both XP and Vista, others are for a specific OS.

Disabling Indexing Service (XP)
Quoting from the Windows Help and Support:
QUOTE
By default, all of the most common files on your computer are indexed. Indexed locations include all of the files in your personal folder (such as Documents, Pictures, Music, and Videos), as well as e‑mail and offline files. Files that are not indexed include program files and system files. The locations that contain those files are not indexed because you rarely need to search those files, and so not including them in the index makes your searches perform faster.

Like many other people, I know where my files are located, so I never use the indexing service. Therefore, I turn it off.
The indexing service is a service that scans your personal files and folders and stores which files are there in an index (hence the name).
Then if you perform a search, the search will then first go through the index to see if it is there. This will speed up searches drastically.
Though if you never use the search function, you're better off turning it off. Below is how.
  • Open Start and select "Run..."
  • In the run box type services.msc and press enter
  • Scroll-down to Indexing Service and double-click it.
  • If the service status is "Running", then stop it by pressing theStop button.
  • To make sure this service doesn't run again, under Startup Type:, choose Disabled
Disabling Indexing Service (Vista)
Not much different from the XP Indexing service. Here is how to disable it.
  • Open Start Menu and type: services
  • Click the Services program that popped up in the list and confirm the UAC.
  • Scroll down to Windows Search and double click it.
  • If the service status is "Running", then stop it by pressing theStop button.
  • To make sure this service doesn't run again, under Startup Type:, choose Disabled


=========================

I hope this post is a good resource on how to keep your PC fast and smooth.
If you have any suggestions, please Message me on the boards.