Friday, June 12, 2009

Wednesday, June 3, 2009

How to Disable USB & CD Rom Through Group Policy

By default, Group Policy does not offer a facility to easily disable drives containing removable media, such as USB ports, CD-ROM drives, Floppy Disk drives and high capacity LS-120 floppy drives. However, Group Policy can be extended to use customised settings by applying an ADM template. The ADM template in this article allows an Administrator to disable the respective drivers of these devices, ensuring that they cannot be used.



Import this administrative template into Group Policy as a .adm file. See the link in the More Information section if you are unsure how to do this.

CLASS MACHINE
CATEGORY !!category
CATEGORY !!categoryname
POLICY !!policynameusb
KEYNAME "SYSTEM\CurrentControlSet\Services\USBSTOR"
EXPLAIN !!explaintextusb
PART !!labeltextusb DROPDOWNLIST REQUIRED

VALUENAME "Start"
ITEMLIST
NAME !!Disabled VALUE NUMERIC 3 DEFAULT
NAME !!Enabled VALUE NUMERIC 4
END ITEMLIST
END PART
END POLICY
POLICY !!policynamecd
KEYNAME "SYSTEM\CurrentControlSet\Services\Cdrom"
EXPLAIN !!explaintextcd
PART !!labeltextcd DROPDOWNLIST REQUIRED

VALUENAME "Start"
ITEMLIST
NAME !!Disabled VALUE NUMERIC 1 DEFAULT
NAME !!Enabled VALUE NUMERIC 4
END ITEMLIST
END PART
END POLICY
POLICY !!policynameflpy
KEYNAME "SYSTEM\CurrentControlSet\Services\Flpydisk"
EXPLAIN !!explaintextflpy
PART !!labeltextflpy DROPDOWNLIST REQUIRED

VALUENAME "Start"
ITEMLIST
NAME !!Disabled VALUE NUMERIC 3 DEFAULT
NAME !!Enabled VALUE NUMERIC 4
END ITEMLIST
END PART
END POLICY
POLICY !!policynamels120
KEYNAME "SYSTEM\CurrentControlSet\Services\Sfloppy"
EXPLAIN !!explaintextls120
PART !!labeltextls120 DROPDOWNLIST REQUIRED

VALUENAME "Start"
ITEMLIST
NAME !!Disabled VALUE NUMERIC 3 DEFAULT
NAME !!Enabled VALUE NUMERIC 4
END ITEMLIST
END PART
END POLICY
END CATEGORY
END CATEGORY

[strings]
category="Custom Policy Settings"
categoryname="Restrict Drives"
policynameusb="Disable USB"
policynamecd="Disable CD-ROM"
policynameflpy="Disable Floppy"
policynamels120="Disable High Capacity Floppy"
explaintextusb="Disables the computers USB ports by disabling the usbstor.sys driver"
explaintextcd="Disables the computers CD-ROM Drive by disabling the cdrom.sys driver"
explaintextflpy="Disables the computers Floppy Drive by disabling the flpydisk.sys driver"
explaintextls120="Disables the computers High Capacity Floppy Drive by disabling the sfloppy.sys driver"
labeltextusb="Disable USB Ports"
labeltextcd="Disable CD-ROM Drive"
labeltextflpy="Disable Floppy Drive"
labeltextls120="Disable High Capacity Floppy Drive"
Enabled="Enabled"
Disabled="Disabled"




MORE INFORMATION
For more information about applying Administrative Template files, including ins...

For more information about applying Administrative Template files, including instructions on how to use the above template, download the Microsoft White Paper 'Using Administrative Template Files with Registry-Based Group Policy' from here.

http://www.microsoft.com/downloads/details.aspx?FamilyID=e7d72fa1-62fe-4358-8360-8774ea8db847&displaylang=en

This template is considered a preference rather than a true policy and will tattoo the registry of client computers with its settings. If this template is moved out of scope of the Group Policy which applies it, the registry changes it makes will remain. If you wish to reverse the settings made by this template, simply reverse the options to re-enable the drivers.

Preference settings are hidden by default in the Group Policy template editor. When applying this template, follow these instructions to change the view settings that allow preferences to be viewed.

http://www.microsoft.com/technet/prodtechnol/windowsserver2003/library/ServerHelp/e50f1e64-d7e5-4b6d-87ff-adb3cf874365.mspx

APPLIES TO
  • Microsoft Windows Server 2003, Standard Edition
  • Microsoft Windows Server 2003, Enterprise Edition
  • Microsoft Windows Server 2003, Datacenter Edition
  • Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems




Windows XP Professional Corporate SP3 Final (Nov- 2008)







- This version is Corporate so it won't require a Serial Number Wink
- It is Genuine , it passes all WPA tests and you can update through Windows Update.
- It included all known updates until NOV 2008

More details:

This is Windows XP Professional SP3 which includes all critical updates till October 2008.
It does not requires any cracks or tools to pass the validation.
This is an untouched version of Windows XP Professional SP3

Code:
-No Password.
-Extract .rar files to .iso using Winrar
-Proceed to burn this .iso file to a blank CD using Poweriso, Alcohol 120 at medium speed.
-Then You have a Bootable CD.
-Install fresh copy of Windows XP by formatting your hard drive C:\.
-Register with the key provided.
-Use and enjoy a lifetime genuine Windows XP SP3


New features :





Code:
http://rapidshare.com/files/164709324/WXPCorSP3_Offl_Ed.part1.rar
http://rapidshare.com/files/164709700/WXPCorSP3_Offl_Ed.part2.rar
http://rapidshare.com/files/164709414/WXPCorSP3_Offl_Ed.part3.rar
http://rapidshare.com/files/164709809/WXPCorSP3_Offl_Ed.part4.rar
http://rapidshare.com/files/164709819/WXPCorSP3_Offl_Ed.part5.rar
http://rapidshare.com/files/164709810/WXPCorSP3_Offl_Ed.part6.rar
http://rapidshare.com/files/164708122/WXPCorSP3_Offl_Ed.part7.rar

Wi-fi Without Routers

sharing your existing ethernet internet connection

1. go to control panel -> network connection.
2. right click on your ethernet connection and click on “properties”.
3. go to “advanced” tab.
4. check “allow other network….. internet connection”
5. in the drop down below select the wifi connection of your pc. if it is disabled, it will be showing your wifi connection already.
6. click on “settings”
7. check the protocols you need to share.i normally use only http and https.
8. click on “ok”.you reach the network connection page. the sharing part is now over.

finding dns server ip address.

1. click on start -> run
2. type in cmd in the run prompt
3. in the new window type “ipconfig /all” and press enter.
4. note down your dns server ip address from the screen.

configuring the wifi

1. go again to control panel -> network connections.
2. right click on your wifi connection and click “properties”.
3. go to”wireless network” tab.
4. the “use windows to configure my wireless network connection” should be checked.
5. in the preferred network connection section click on add button
6. enter a name of your wish to the network name.
7. network authentication is “open”
8. change data encryption to “disabled”
9. check the “this is a computer to computer …. not used” connection.
10. click “ok”.
11. click on general tab. select “internet protocol(tcp/ip) and click on properties button.
12. now type 192.168.0.1 in ip address, 255.255.255.0 in subnet mask, leave default gateway empty.
13. fill in the dns server entry which you had noted down earlier.
14. click on “ok” and your network is set.

your network should appear on the wifi network list now. search for wlan on your phone. connect and enjoy browsing on your phone.

Trace E-mail sender from e-mail header

Here I shall discuss, how to trace an email sender from the email header. I shall take my MSN account as an example. But before I go into depth I shall split the email header and explain each one of them for better understanding.
Viewing Email Header
Every e-mail comes with information attached to it that tells the recipient of its history. This information called a header. The above is the Full header of email .All this information comes with the email. The header contains the information essential to tracing an e-mail. The main components to look for in the header are the lines beginning with "From:" and "Received:" However, it might be instructive to look at what various different lines in the header mean.



MIME-Version: 1.0
Received: from rwcrmhc11.comcast.net ([204.127.198.35]) by mc7-f12.hotmail.com with Microsoft SMTPSVC(5.0.2195.6713); Tue, 25 Nov 2003 19:56:18 -0800
Received: from pavilion (pcp03530790pcs.mnhwkn01.nj.comcast.net[68.37.24.150]) by comcast.net (rwcrmhc11) with SMTP id <20031126034457013001nk6pe>; Wed, 26 Nov 2003 03:44:57 +0000
X-Message-Info: JGTYoYF78jGkTvdOiviUvHyY85nt7iLD
Message-ID: <000801c3b3cf$a92237a0$96182544@mnhwkn01.nj.comcas>
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1106
Disposition-Notification-To: "Leona"
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Return-Path: leona6256@comcast.net
X-OriginalArrivalTime: 26 Nov 2003 03:56:18.0897 (UTC) FILETIME=[3F5AFC10:01C3B3D1]



Some e-mail programs, like Yahoo or Hotmail, have their full headers hidden by default In order to view the full header, you must specifically turn on that option. Some ways of doing this in different e-mail programs follow here:


Viewing full Header in Yahoo and Hotmail
Yahoo

Click Options -> Click Mail Preferences -> Click Show Headers -> Click "All" -> Click "Save"

Hotmail

Click Options -> Click Mail Display Headings (under "Additional Options") -> Click Message Headers -> Click "Full" ->

Click "OK"



Viewing full Header in Email Clients like (Outlook and Eudora etc)
Outlook Express
If you use OE, at least the version I have (5.5), you may not have much luck; it sometimes gives little more information than what you can see in the main window. But here's the application path anyway:
Click File/Properties/Details to find the header information.

Outlook
First, highlight the email in your Incoming window, right-click on it, and select Options. The window that comes up will have the headers at the bottom.

Eudora
Be sure the message is open, then Click the 'Blah, Blah, Blah' button from the Tool Bar, and the headers will appear.

Pegasus
Select Reader/Show All Headers/

Netscape Mail
Select Options/Headers/Show All Headers

Netscape Messenger 4.0 and 4.5
Select View/Headers/All



Now I will discuss the full header in detail:



Message ID:
It is used to identify the system from which the the message has originated (i.e. from the system the sender has logged in). However, this is too easy to forge, and is consequently not reliable.



X-Headers:

X- headers are user defined headers. They are inserted by email client programs or applications that use email. Here from the X- headers inserted into the email by the email client it is clear that the sender has used Microsoft Outlook Express 6.00.2800.1106 to send this email.

X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1106



MIME-Version:
MIME stands for Multipurpose Internet Mail Extension. It tells the recipient what types of attachments are included in email. It is a format that allows people to send attachments that do not contain Standard English Words, but rather graphics, sounds, and e-mails written with other characters. The Mime-Version field merely confirms that the version of MIME used corresponds to the standard version (which is currently 1.0).



From:
Form is useless in tracing an e-mail. It consists of the email of the sender but this can be obviously be a fake. One can use any fake-mailer to fake the sender's name.


Content-Type:
This line tells the receiving e-mail client exactly what MIME type or types are included in the e-mail message. If the Content–Type is text/plain; charset="us-ascii" just tells us that the message contains a regular text message that uses English characters. ASCII is the American Standard Code for Information Interchange and is the system used to convert numbers to English characters.


Return-Path:
It is the address to which your return e-mail will be sent. Different e-mail programs use other variations of Return-Path:. These might include Return-Errors-To: or Reply-To etc.



Received:

This field is the key to find out the source of any e-mail. Like a regular letter, e-mails gets postmarked with information that tells where it has been. However, unlike a regular letter, an e-mail might get "postmarked" any number of times as it makes its way from its source through a number of mail transfer agents (MTAs). The MTAs are responsible for properly routing messages to their destination.



Let me strip-off the above email header to make the understanding easy. The header is splitted and the two received headers are given below.

Received Header 1: 204.127.198.35 - Tue, 25 Nov 2003 19:56:18 -0800
from rwcrmhc11.comcast.net ([204.127.198.35])
by mc7-f12.hotmail.com
with Microsoft SMTPSVC(5.0.2195.6713)


Received Header 2: 68.37.24.150 - Wed, 26 Nov 2003 03:44:57 +0000
from pavilion (pcp03530790pcs.mnhwkn01.nj.comcast.net[68.37.24.150])
by comcast.net (rwcrmhc11)
with SMTP
id <20031126034457013001nk6pe>



The MTAs are "stamped" on the e-mail's header so that the most recent MTA is listed on the top of the header and the first MTA through which the e-mail has passed in listed on the bottom of the header. In the above sample e-mail header, e-mail first passed through 68.37.24.150 (pcp03530790pcs.mnhwkn01.nj.comcast.net), and at last made its way through 204.127.198.35 (rwcrmhc11.comcast.net).



In the Received Header 2, the one marked with red colour "pavilion" is either the domain name of the server from which the email has originated or the name of the computer from which the email has been sent. By doing a DNS query for "pavilion", it is confirmed that it is not a know host name hence, must be the name of the computer from which the mail has originated. "68.37.24.150" is the IP address from which the mail might have originated or it is the IP address of the ISP (Internet Service Provider) to which the user was logged on while sending the mail.



Note: Correct me if I am wrong, most of the time "HELO" is prefixed to the system name from which the mail has originated, but its accuracy is not reliable.



Trace who owns the IP address
Every computers hooked on to internet is assigned with an IP address. Individual users possess a dynamic IP address when they logged on to any ISP to access internet. These IP addresses are assigned by the ISP itself. Organization usually possess static/public IP address which is stored in a database of registries.



There are three major registries covering different parts of the world. They are

www.arin.net => American Registry of Internet Numbers (ARIN) : It assigns IP addresses for the Americas and for sub Saharan Africa.

www.apnic.net => Asia Pacific Network Information Centre (APNIC) : It covers Asia

www.ripe.net => Réseaux IP Européens (RIPE NCC) : It covers Europe



Thus, to find out which organization owns a particular IP address, you can make a "WHOIS" query in the database at any of these registries. You do this by typing the IP address into the "WHOIS" box that appears on each of these websites.



"Received Header" will have the IP address of the ISP in case the users has dialed up to the ISP while sending the email. But if the user has send the email from within the corporate then the corporate public/static IP address is logged.



By giving a "WHOIS" query for 68.37.24.150 at www.arin.net, the following result has been displayed:



Comcast Cable Communications, Inc. JUMPSTART-1 (NET-68-32-0-0-1)
68.32.0.0 - 68.63.255.255
Comcast Cable Communications, Inc. NJ-NORTH-14 (NET-68-37-16-0-1)
68.37.16.0 - 68.37.31.255

# ARIN WHOIS database, last updated 2004-02-04 19:15
# Enter ? for additional hints on searching ARIN's WHOIS database.



From above queries it is found that the IP address (68.37.24.150) is owned "Comcast". By making further queries on "Comcast" it is found that it is the name of the ISP located in NJ, US - 08002. The result of further query is given below:



OrgName: Comcast Cable Communications, Inc.
OrgID: CMCS
Address: 3 Executive Campus
Address: 5th Floor
City: Cherry Hill
StateProv: NJ
PostalCode:08002
Country: US

NetRange: 68.32.0.0 - 68.63.255.255
CIDR: 68.32.0.0/11
NetName: JUMPSTART-1
NetHandle: NET-68-32-0-0-1
Parent: NET-68-0-0-0-0
NetType: Direct Allocation
NameServer: DNS01.JDC01.PA.COMCAST.NET
NameServer: DNS02.JDC01.PA.COMCAST.NET
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
RegDate: 2001-11-29
Updated: 2003-11-05

TechHandle: IC161-ARIN
TechName: Comcast Cable Communications Inc
TechPhone: +1-856-317-7200
TechEmail: cips_ip-registration@cable.comcast.com

OrgAbuseHandle: NAPO-ARIN
OrgAbuseName: Network Abuse and Policy Observance
OrgAbusePhone: +1-856-317-7272
OrgAbuseEmail: abuse@comcast.net

OrgTechHandle: IC161-ARIN
OrgTechName: Comcast Cable Communications Inc
OrgTechPhone: +1-856-317-7200
OrgTechEmail: cips_ip-registration@cable.comcast.com

# ARIN WHOIS database, last updated 2004-02-04 19:15
# Enter ? for additional hints on searching ARIN's WHOIS database.



Now since the IP address found belongs to an ISP, it is clear that the sender has dialed up to this ISP while sending the email. For further enquiry we can then request the ISP to provide us with details of the user who has dialed up to them at that given point of time (Wed, 26 Nov 2003 03:44:57 +0000). If the ISP cooperates, they will check their user and message logs to see who was logged into that particular IP address at that time and date. This will reveals the sender's telephone number from which he/she has dialed to the ISP. Now once we have the telephone number we can easily retrieve the name and address of the sender.



Now the above case is solved but there are also other cases where the IP address found on the email header may be owned by an organisation or a cyber cafe. Below I have discussed how you can trace the sender in both of these cases.



Cases1: THE IP ADDRESS OWNED BY AN ORGANISATION

But in case the IP address found belongs to an organisation then you have to request them to provide information about the user who has send the mail from within the organisation network. They must have user and message logs on their firewall / proxy and can trace each of their computers connected at the given point of time. By supplying the organisation with the e-mail header of the offending e-mail, they can check these logs and hopefully produce information of the user of that machine.



Cases2: THE IP ADDRESS OWNED BY A CYBER-CAFE

In case it is found that the sender has sent the email from a cyber-cafe then it becomes a difficult task to trace him/her. The user may not be a frequent visitor to that cyber-cafe. But let's assume that you receive such mails frequently from that particular cyber-cafe then you can install "key-loggers" in the computers at the cafe. These programs records user's keystrokes, thus creating a record of everything that was typed at a particular terminal. By reviewing the key-logger logs you may be able to trace the sender in this case.



Note: These methods would aid greatly in identifying an e-mail sender, they also would impinge on the rights of others using the computers to conduct their personal business. Such a conflict defines the ongoing struggle between the fight against terrorism over the Internet and the right to privacy, which will continue to evolve in the years ahead.
__________________

How to Set Up a Home Server

If you have multiple computers that share files, you may wish to set up a home server. You'll be able to access files from any of the computers, and you can store and back up files in a common location. Find out how to set up a home server.

step1
Make a list of what you'll need to buy. You might have some older equipment around the house to use. You will need a computer, a hard drive, RAM and a reliable networking device.

Step2
Set up a router with enough ports to connect to your server and to all of the computers in your home. You may use a wireless router, an Ethernet router or a combo router.

Step3
Decide which operating system you will use. Redhat Linux and Microsoft Windows XP are popular choices.

Step4
Configure the networking connection on your server with a domain name. This will enable you, or others you allow, to connect to your home server from outside of your home network.

Step5
Install an FTP server program such as Serv-U FTP. Set up as many user accounts as you like.

Step6
Using your FTP server program, configure the rights for each account. Determine what drives, folders and rights users have access to on your server.

Step7
Configure your router’s firewall by opening port 21 to your home server.

Step8
Test your new server using a secure FTP program such as WS-FTP Pro. You may also use a Web browser.

Basic BIOS password crack

This is a password crack but it clears the BIOS such that the next time you start the PC, the CMOS does not ask for any password. Now if you are able to bring the DOS prompt up, then you will be able to change the BIOS setting to the default. To clear the CMOS do the following:

Get DOS prompt and type:

DEBUG hit enter
-o 70 2e hit enter
-o 71 ff hit enter
-q hit enter

exit hit enter

Restart the computer.
It works on most versions of the AWARD BIOS.

Hide Ur Files & Folder

Do You Guys Ever Wanted To Hide Something In Your PC From Your Parents,Friends,Brother,Sister Etc ?¿



But U Cant And Ending Up On Installing Some Software Like Password Lock Which Is Very Complicated And Time Wasting !!



Today I Will Teach You How To Hide Folders Without Using Software !!



There Are 2 Processes 2 Hide A Folder !!

First Of All The Easy Process.



>Create A Folder

>Then Left Click And Then Click Rename.

>Delete The Full Name Of The Folder And Press..

>Alt+999999999 (9 Times Nine No. On Your Numpad)

>Click Outside The Folder Name Area.

>You Will See That The Folder Will Have No Name

>Then Click That Folder And Go To Properties,Customisation And Change The Folder Icon.

>Note : In "Folder Icon" Folder You Will See Some Blank Spaces,Select One Of The Blank Spaces And Click Ok..

>Now You Hidden Folder Is Ready Open It And Store Your Secret Files !! [br]

3,001 Business and Sales Letters

3,001 Business & Sales Letters works with all Windows XP, 2000, 98, 95, Me, and NT word processors and installs on the Tools Menu of M'zoft Word 2003, 2002, 2000, 97, and Word 7.0!
* An easy way to save time and effort writing
* 2,100+ award-winning business, sales, and personal letters
* 901 additional sales letters; helpful phrases; choice sentences
* Attention-getting messages and persuasive sales copy
* 3,000 ready-to-use letters; tips and step-by-step instructions

Includes 4,001 letters from these categories:
• Acceptances
• Acknowledgments
• Advice
• Announcements
• Apologies
• Applications
• Appointments
• Appreciation
• Approvals
• Authorizations
• Cancellations
• Claims
• Collections
• Complaints
• Complaints--
• Responding to
• Compliments • Confirmations
• Congratulations
• Cover Letters
• Credit
• Delegation
• Directives
• Disagreements
• Discipline
• Dismissals
• Encouragement
• Endorsements
• Errors
• Farewells
• Follow-Up
• Fundraising
• Get-Well • Gifts
• Goodwill
• Government
• Holidays
• Inform/Notify
• Inquiries
• Introductions
• Invitations
• Job Offers
• Love
• Orders
• Persuasion
• Recommendations
• References
• Referrals
• Refusals
• Reprimands
• Requests
• Reservations
• Resignations
• Responses
• Sales
• Social Events
• Suggestions
• Sympathy
• Terminations
• Thank You
• Transmittals
• Welcome

Code:
http://www.ziddu.com/download/5021213/Business_and_Sales_Letters.rar.html

Monday, June 1, 2009

Not Using Google Chrome? You Are Missing Something

Not Using Google Chrome? You Are Missing Something


Chrome is the worlds best browser. Its super fast and simple. Its JavaScript engine can do magic, just run this demo in your favorite browser and then in chrome. You'll see the difference. Tabbed browsing has never been so easy. There is incognito for your dirty works(Get full feature list). I feel relaxed when i use chrome and always wonder why its market share has not gone up as expected. Its a product of Google for gods sake and yet fails to inspire people. Microsoft Internet explorer still in top with 69% Firefox 21% and Chrome barely past 1%. Its sad to see a good product in the other side of the scale. May be people really don't care about performance or security. They just go after the brand name. Or is it because they likes to stay with the thing that they are used to.Or its just because that they don't know about the altrenative. Perhaps its because Microsoft Internet explorer is good in copying stuff. They copied every good thing from every browser. But i don't feel like using IE any more. The only good thing i noticed about IE is that it's font rendering, may be you have already noticed. Fonts are beautifully rendered in IE7, Thumbs up for that. Google chrome deserves more attention from the public. Firefox emerged when IE was pestering its users with virus and malicious softwares. But still it could only grab 20% of the market share. Firefox contribution in curbing out the Internet violence can't be forgotten. It was an innovative browser at that time. Will chrome be able to do that, Only time can tell. My money is on chrome side. Help to evolve a Google product by downloading Chrome here.