Tuesday, December 23, 2008

DOS / Windows IP Command Lines

Display Connection Configuration: ipconfig /all

Display DNS Cache Info Configuration: ipconfig /displaydns

Clear DNS Cache: ipconfig /flushdns

Release All IP Address Connections: ipconfig /release

Renew All IP Address Connections: ipconfig /renew

Re-Register the DNS connections: ipconfig /registerdns

Change/Modify DHCP Class ID: ipconfig /setclassid

Network Connections: control netconnections

Network Setup Wizard: netsetup.cpl

Test Connectivity: ping www.rajeshworld.co.cc

Trace IP address Route: tracert

Displays the TCP/IP protocol sessions: netstat

Display Local Route: route

Display Resolved MAC Addresses: arp

Display Name of Computer Currently on: hostname

Display DHCP Class Information: ipconfig /showclassid

UNIX IP Command Lines

Display Current Config for all NIC's: ifconfig

Display Current Config for dc0: ifconfig dc0

Assign IP/Subnet: ifconfig dc0 inet 192.168.1.2 netmask 255.255.255.0

Assign Gateway: route delete default && route add default 192.168.1.1

Assign multiple IP's: ifconfig dc0:0 192.168.1.2

Assign second IP: ifconfig dc0:1 192.168.1.3

Disable network card: ifconfig dc0 down

Enable network card: ifconfig dc0 up

Linux IP Command Lines

Display Current Config for all NIC's: ifconfig

Display Current Config for eth0: ifconfig eth0

Assign IP: ifconfig eth0 192.168.1.2

Assign IP/Subnet: ifconfig eth0 192.168.1.2 netmask 255.255.255.0

Assign Default Gateway: route add default gw 192.168.1.1

Assign multiple IP's: ifconfig eth0:0 192.168.1.2

Assign second IP: ifconfig eth0:1 192.168.1.3

Disable network card: ifconfig eth0 down

Enable network card: ifconfig eth0 up
View current routing table: route "or" route -n

View arp cache: arp "or" arp -n

Ping: ping -c 3 192.168.1.1

Trace Route: traceroute www.rajeshworld.co.cc

Trace Path: tracepath www.rajeshworld.co.cc

DNS Test: host www.whatismyip.com

Advanced DNS Test: dig www.rajeshworld.co.cc

Reverse Lookup: host 66.11.119.69

Advanced Reverse Lookup: dig -x 66.11.119.69

Windows XP registry tweaks

Most settings can be done easily within Windows. However, for some setting you need to dive into the registry or use one of the many registry tweak utilities (like the Windows XP powertool TWEAKUI). On this page (and other pages), I have described some interesting registry tweaks which you can do yourself, using the registry editor.

NOTE: Be careful editing the registry. Worst case scenario: Windows won't boot anymore. If you are not sure, leave things unchanged! My advise: create a system image before making major changes!

Speed up browsing AVI files (audio/video)

By default, opening folders containing AVI files (audio/video) can be very slow because Windows is trying to extract non important information. This can be solved, by deleting the following key:
HKCR\CLSID\{87D62D94-71B3-4b9a-9489-5FE6850DC73E}

Automatically expanding folder trees

The folder view on the left in Windows Explorer automatically expands if you click on a folder containing sub-folders. You can disable this function with a registry tweak: change the DWORD-value FriendlyTree to 0 (in stead of 1) in the following key:
HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\Advanced
Automatically expanding folders will be disabled, expanding a folder is now done by double clicking the folder.

Windows search optimization

Within Windows XP you are able to search your computer for files (Start, Search), but takes some clicking to get what you want! To optimize the search function, you have to make some registry changes. To make changes, navigate to the following key:
HKEY_CURRENT_USER\Software\ Microsoft\Windows\CurrentVersion\Explorer
where you will find some important DWORD-values. Change these values to optimize your Windows search:
SearchSystemDirs=1
SearchHidden=1
IncludeSubFolders=1

CaseSensitive=0
SearchSlowFiles
=1 (if you have a tape drive, else: 0)

Remove shared folders My Computer

To remove the shared folders in the My Computer view, delete the value {59031a47-3f72-44a7-89c5-5595fe6b30ee} in the following key (export to a reg-file first, to have a backup):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\My Computer\NameSpace\DelegateFolders

Saving Notepad settings

If you are a heavy user of Notepad, you probably like saving the Notepad settings on exit. To make sure your settings are saved, add/Change the DWORD-value fSavePageSettings=1 and fSaveWindowsPositions=1 in the following key:
HKEY_CURRENT_USER\Software\Microsoft\Notepad

Disable the balloon tips

Already irritated by the information balloons, covering the important buttons in the Start Menu? Start the registry editor and navigate to the following key:
HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\Advanced
change or add the DWORD-values EnableBalloonTips and ShowInfoTip, both with value 0.

Disable the useless Security Center warnings

If your Windows is not provided with one of the well known virus scan and/or firewall software, the Security Center will come with useless repeating reminders. The reminders can be disabled by changing the values AntiVirusDisableNotify and FirewallDisableNotify to the DWORD-value 1 in the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center

Remove the low disk space warning

Probably you have seen the irritating 'low on disk space'-warning before, if your hard disk reaches full capacity. This warning message can be turned off by adding the DWORD-value NoLowDiskSpaceChecks with value 1 in the following key:
HKEY_CURRENT_USER\Software\MicroSoft\ Windows\CurrentVersion\Policies\Explorer

Disabling wrapping icon/shortcut labels

Probably your desktop contains icons (shortcuts) with long names, which aren't shown completely (the are wrapped......). With a registry tweak you can disable the title wrapping, create a String value IconTitleWrap with value 0 in the following registry key:
HKEY_CURRENT_USER\Control Panel\Desktop\WindowMetrics

Disabling the blocking of pop-ups from secured sites

By default Internet Explorer blocks the pop-ups because they are mostly used for irritating advertising purposes. For secured pages (e.g. the login to a bankaccount), this behavior is not wished. The URL of a secured page is preceded by HTTPS in stead of HTTP. The blocking of pop-ups for these HTTPS-pages can be disabled by changing the DWORD-value Allow HTTPS to 1 in the following registerkey:
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\New Windows

Command Console tweak

If you are a frequent user of the Command Console (the MS-DOS screen, Start, Run, command CMD), the following tweak will be valuable. To change folders is difficult, using the Command Console. By changing the DWORD-value CompletionChar to 9 in the following registry key
HKEY_CURRENT_USER\Software\Microsoft\Command Processor
With the command CD followed with the first letters of the folder name, you are able to select the folder with the TAB-key (also works with other commands).

Activated NUM-LOCK

To automatically switch on the NUM-LOCK, change the value InitialKeyboardIndicators to 2 in the following key:
HKEY_CURRENT_USER\Control Panel\Keyboard

Automatically defrag system files

To defrag the system files automatically at every boot (to optimize you system), change the value Enable to Y in the following registry key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Dfrg\BootOptimizeFunction

A faster Windows shutdown

Shutting down Windows can take a long time. You can speed this up (at your own risk) with the following tweaks in the registry key:
HKEY_CURRENT_USER\Control Panel\Desktop
Change the following String values:
AutoEndTasks=1
HungAppTimeout=4000
WaitToKillAppTimeout=4000
WaitToKillServiceTimeout=4000

Fix for shutting down your computer automatically

In most cases, automatically shutting down can be fixed by installing the motherboard drivers (if not done already). If your computer still doesn't shut down correctly, try this registry tweak. Change the value PowerdownAfterShutdown to 1 in the following key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon

Fix for shutting down Windows slowly (or not at all)

If shutting down Windows takes a long time (or doesn't shut down at all), change the value PowerOffActive to 1 in the following registry key:
HKEY_CURRENT_USER\Control Panel\Desktop

Finding out the reason of a Windows crash

If you would like to know the reason why there was a sudden crash of Windows, change the DWORD-value ShutdownReasonUI temporarily to 1 in the following key:
HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows\CurrentVersion\Reliability
After a reboot you will find the reason why your Windows shuts down suddenly in the log files (Control Panel, Administrative Tools, Logfiles). If you are finished analyzing, change the value ShutdownReasonUI back to 0.

A faster NTFS file system

You probably use the NTFS file system (see the properties of your C: partition). You can improve performance by making some changes in the following registry key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Filesystem
Change the following registry values, as you wish:
DisableNTFSLastAccessUpdate = 1 (last file access is no longer registered).
NtfsDisable8dot3NameCreation = 1 (no more double filenames: long names and the old 8.3 variant (the 8.3 file notation is used for the older Windows versions).
NtfsMftZoneReservation = 2 (if there are many files on a partition, the master file table (MFT) can get fragmented, with this tweak there will be no more fragmenting of the file master file table (default value = 1, range 1-4).

Virus Solution

* AUTOPLAY VIRUS SOLUTION

autoplay virus solution- if u have problem with ur drives that they are not opening when u double click on then, then apply this trick

u must have winrar
if d:\ doesnt opens,,,,,open winrar and goto d:\ in tht.....u ll be seeing file name "autoplay.inf"....delete tht file..
now refrsh ur drives...
the virus is gone
--------------------------

* NEW FOLDER.EXE Virus Solution

Virus Infections

This virus affects your system by
  • Disabling Task Manager
  • Disabling Registry Editor
  • Creates a startup entry to start upon system start and
  • Creates its own exe files in Shared Documents folder which appear like ordinary folders.
  • Disables Folder Options
  • Uses your 50% or more processor
TO REMOVE THIS VIRUS DOWNLOAD THE BELOW TOOL
LINK : http://www.technize.com/?dl_id=6

--------------------------


Orkut is banned you fool,The administrator dint write this program guess who did ? MUHAHA THREAD REMOVAL

you took a cool breath when you searched this on google, right ? well yeah.. lotsa of my friends have been poking me lately cause they think i infected their Laptops/PC when they were not around .. hahahah.. that adds devil smile on my face, cause i did not do it but they are so sure that i did it .. Cant make them understand, so the only way to make them realize is that i took the infected pen drive of my friend to my place and started discovering what happened basically..

So googled about the symptoms i found that this is a worm known as

w32.USB Worm

As the name specifies it spreads from USB drives to and fro :D

now how do you tackle it.. A quick way for orkut addicted those who want a quick access to orkut is as follows..

1) Press alt+ctrl+del and goto processes tab

2) There you will see a list of processes under the different username, arrange the processes according to your username and search for the process svchost.exe

3) Right click and end process or end process tree.. Make sure you end the imagename or process which are under your username and not that which are under LOCAL SERVICE OR NETWORK SERVICE.

4)This gives you instant access to orkut..

A Similar of this variant gives you error on opening firefox.

“I DNT HATE MOZILLA BUT USE IE OR ELSE…”, “USE INTERNET EXPLORER U DOPE”,

The above 4 Steps solution works for the same..

Now a fix to permanently get rid of this nuisance, this pulls the interest of my friends who called me up and took help to access their orkut accounts instantly..

Follow as :-

REPEAT THE ABOVE 4 STEPS AND THEN CONTINUE.

5) Click start->run type c:\heap41a and press Enter. You cannot find this folder by looking through windows explores i.e. My Computer, as this is a hidden folder.

6) Delete all the files under this folder by pressing ctrl+a followed by shift+del key

7) Now again goto Start->Run and write regedit, this opens registry editor for you.

Press ctrl+f , a find dialog box opens, type heap41a and let it show you some results

9) You should see “[winlogon] C:\heap41a\svchost.exe C:\heap(some number)\std.txt

10) Now delete whatever you see there cause you love orkut .. hahahah

Well your PC/LP is cleaned up and now you can open your orkut account without that nuisance.

Make sure you delete all the .exe files which are present at the root of ur pendrive which got created automatically(which you never created) . Rather scan your pen drive with a good antivirus.. That should allow you stealth your PC from the attack of MUHAHA

SIDE EFFECTs

Well this worm/virus removes hidden folder options or you are unable to see hidden folders. so enable the hidden folder option follow the steps as :-

1. Goto Start->run type regedit again to open registry editor

2.traverse as HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer3.

4)There you will see a DWORD key as “NoFolderOptions” . Set its value to 0 or simply delete it

vola !! there you go charmy.. you are a geek now.

FOLDER CREATION TRICK

Try to create a folder in Windows with either of these names--
"con" or "nul" or "Aux" or "Lpt1".
Windows will not let u create ....

This s coz these refer 2 some well known ports....
-con corresponds to the console
-Lpt1 corresponds to printer and so on....

well dat was common but hw bt this ? Try these more

CON, PRN, AUX, CLOCK$, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5, LPT6, LPT7, LPT8, and LPT9.

HIDDEN MICROSOFT SONG

Do you know the hidden Microsoft song? I hear this song while im installing windows, where its almost at the end where have to register your windows, enter your username.......etc.
Some people might not hear it because, your sound card driver isn't installed. If you want to know and hear that song, here it:
Go to Start > Run > Copy and then Paste, or press and hold the Start + r .

C:\windows\system32\oobe\images\title.wma

and hit Enter, of course ... Your media player should load the song, and now you can hear it.

automated-malware-profile-analysis

AUTOMATED MALWARE PROFILE, ANALYSIS, REMOVAL AND SIGNATURE INFORMATION:
DEFINITION OF: COMBO FIX.EXE

* Safety Rating: Known malware, do not run
* Protection: Prevx provides powerful security products that you can use to detect, remove and protect you from COMBO FIX.EXE and safeguard your PC against viruses, trojans, worms, spyware, rootkits and adware
* IT RESOLVE THE DOUBLE CLICK PROBLEM, OPENWITH PROBLEM, ALL FLASH DRIVE OPENING PROBLEMS.

DOWNLOAD LINK : http://info.prevx.com/download.asp?grab=prevxcsi
SIZE : 603 KB
VERY VERY LOW SIZE BUT IT A VERY EFFECTIVE TOOL

Some Of The Useful Links Here

USEFULL SITES HERE:

Free sms to India :

SEND FREE SMS
CLICK HERE


Free Games Site 4u :
CLICK HERE1
CLICK HERE2
CLICK HERE3


FOR Free Webhosting :
CLICK HERE

FOR ONLINE TIPS :
CLICK HERE

Hackers' Black Book :
DOWNLOAD HERE

FOR ALL EBOOK :
CLICK HERE

FOR PC SOFTWARE :
CLICK HERE1
CLICK HERE2

FOR WALLPAPER :
CLICK HERE

List of e-Papers in India (English) :



The New Indian Express

http://epaper.newindpress.com/

The Telegraph

http://epaper.telegraphindia.com/default.aspx?xb=true

Times Ascent

http://timesascent.in/

Times Of India / The Economic Times

http://epaper.timesofindia.com/

The Pioneer

http://70.86.150.130/pioneer/login.aspx

MINT
http://epaper.livemint.com/

Mid-Day (a Mumbai Daily)
http://epapers2.mid-day.com/midday/index.htm

Mail Today
http://mailtoday.in/

Hindustan Times
http://epaper.hindustantimes.com/login.aspx

DNA (Daily News & Analysis)
http://digital.dnaindia.com/

Deccan Herald
http://deccanheraldepaper.com/

Deccan Chronicle
http://www.dc-epaper.com/deccanchronicle/Login.aspx


IP Address Tracking Program

http://aruljohn.com/track.pl

Some websites for mobile phones...

www.phonearena.com

www.mobiledia.com

Related to Computer Security:

http://staysafeonline.org/basics/resources.html
http://www.onguardonline.gov/socialnetworking.html

Mobile Phones Comparison & Expert Comments

http://www.gsmarena.com/

Some Of The Use ful Info About JAVA &J2EE

  • What is JAVA ?
Java is a pure object oriented programming language, which has derived C syntax and C++ object oriented
programming features. Is a compiled and interpreted language and is platform independent and Can do graphics,
netw orking, multithreading. It was initially called as OAK.

  • Encapsulation : Nothing but data hiding, like the variables declared under private of a particular class are accessed
only in that class and cannot access in any other the class.

  • Inheritance : Is the process in which one object acquires the properties of another object, ie., derived object.

  • Polymorphism: One method different forms, ie., method overriding and interfaces are the examples of polymorphism.
  • What are Java Buzzwords ?
Simple : Easy to learn.
Secure : Provided by firew alls between networked applications.
Portable : Can be dynamically downloaded at various platforms in internet.
OOP : Four Corner stones.
Multithread : Can perform more than one task concurrently in a single program.
Robust : overcomes problems of de-allocation of memory and exceptions.
Interpreted : Convert into byte code and the executes by JVM.
Distributed : Concept of RMI.
Dynamic : Verifying and accessing objects at run time.

  • Scope and lifetime of variables ?
scope of variables is only to that particular block
lifetime will be till the block ends.

  • Explain about Static ?
When a member is declared as static it can be accessed before any objects of its class are created and without
any reference to any object. these are global variables, no copy of these variables can be made.
static can also be declared for methods. and cannot refer to this or super.

  • method overloading : same method name with different arguments.
  • method overriding : same method name and same number of arguments

  • How Exception handling is done in Java ?
Is managed via 5 keywords :
try : statements that you want to monitor the exceptions contain in try block.
catch : the exception thrown by try is catched by this.
throw : to manually throw exception we go for this.
throws : Exception that is thrown out of a method must be specified by throws after the method declaration.
finally : this block is executed whether or not an exception is thrown. and also it is executed just before the method
returns. and this is optional block.

  • What is the use of bin and lib in JDK?
Bin contains all tools such as javac, appletviewer, awt tool, etc., whereas lib contains API and all packages.

  • What is the difference between superclass and subclass?
A super class is a class that is inherited whereas sub class is a class that does the inheriting.

  • What is the difference between exception and error?
The exception class defines mild error conditions that your program encounters.
Ex: Arithmetic Exception, FilenotFound exception
Exceptions can occur when
- try to open the file, which does not exist
- the network connection is disrupted
- operands being manipulated are out of prescribed ranges
- the class file you are interested in loading is missing
The error class defines serious error conditions that you should not attempt to recover from.
In most cases it is advisable to let the program terminate when such an error is encountered.
Ex: Running out of memory error, Stack overflow error.

  • What is adapter class?
An adapter class provides an empty implementation of all methods in an event listener interface. Adapter classes are
useful when you want to receive and process only some of the events that are handled by a particular event listener
interface. You can define a new class to act listener by extending one of the adapter classes and implementing only
those events in which you are interested.

  • What is meant by controls and what are different types of controls in AWT?
Controls are components that allow a user to interact with your application and the AWT supports the following types
of controls:
Labels, Push Buttons, Check Boxes, Choice Lists, Lists, Scrollbars, Text Components.
These controls are subclasses of Component.

  • What is Bootstrapping in RMI?
Dynamic loading of stubs and skeletons is known as Boot Strapping.

  • What is servlet tunnelling?
Used in applet to servlet communications, a layer over http is built so as to enable object serialization.

  • What is the frontend in Java?.Also what is Backend?.
Frontend: Applet
Backend : Oracle, Ms-Access(Using JDBC).

  • What are theTools provided by JDK
(i) javac - compiler
(ii) java - interpretor
(iii) jdb - debugger
(iv) javap - Disassembles
(v) appletviewer - Applets
(vi) javadoc - documentation generator
(vii) javah - ' C' header file generator

  • What are the Java Primitive Data Types ?
Byte-8-bit, short-16-bit, int-32-bit, Long-64-bit, Float-32-bit floating point, Double-64-bit floating point,
Char-16-bit Unicode

  • What are the packages in JDK?
There are 8 packages
(i) java.lang
(ii) java.util
(iii) java.io
(iv) java.applet
(v) java.awt
(vi) java.awt.image
(vii) java.awt.peer
(viii) java.awt.net

  • What is runnable?
Its an Interface through which Java implements Threads.The class can extend from any class but if it
implements Runnable,Threads can be used in that particular application.

  • What is synchronization?.
Two or more threads trying to access the same method at the same point of time leads to synchronization.If
that particular method is declared as synchronized only one thread can access it at a time. Another thread can access it
only if the first thread' s task is complete.

  • What is a Skeleton ?
Skeletons are server side proxies and stubs are client side proxies. True

  • Who introduced Jscript ?
Netscape introduced JScript language

  • What is MIME ?
MIME(Multipurpose Internet Mail Extension) is a general method by which the content of different types of
Internet objects can be identified.

  • What are different ways of Session-Tracking?.
(i) User-Authorization
(ii) Hidden Files
(iii) Persistant Cookies
(iv) URL Rewriting.

  • What are the four components in URL ?
http:// www. yahoo .com : 8080 / index.html
http: --- > is protocol
www. yahoo .com --- is IP address
8080 -- port number and is a pointer to memory location.
index.html -- file path to be loaded

  • What is a StringTokenizer ?
String Tokenizer provide parsing process in which it identifies the delimiters provided by the user , by default
delimiters are spaces, tab, newline etc. and separates them from the tokens. Tokens are those which are separated by
delimiters.

  • What are macros and Inline functions ? Which is best and Difference ?
Inline functions do Parameter passing, where as Macros do Text Substitution.
Its better to go for Inline functions than macros, else you may get different results.

  • What is Serialization ?
The process of writing the state of an object to a byte stream. and can restore these objects by using
deserialization.Is also need to implement RMI, which allows a java object of one machine to invoke java object of
another machine.ie., the object is passed as an argument by serializing it and the receiving machine deserializes it.

  • What is the difference between CGI and Servlet ?
CGI suffered serious performance problems. servlets performance is better.
CGI create separate process to handle client request. and Servlets do not.
CGI is platform dependent, whereas Servlet is platform-independent b’cauz written in java.
Servlets can communicate with applets, databases and RMI mechanisms.

  • What are Vector, Hashtable, LinkedList and Enumeration?
Vector : The Vector class provides the capability to implement a growable array of objects.
Hashtable : The Hashtable class implements a Hashtable data structure. A Hashtable indexes and stores
objects in a dictionary using hash codes as the object' s keys. Hash codes are integer values that identify objects.
LinkedList : Removing or inserting elements in the middle of an array can be done using LinkedList. A
LinkedList stores each object in a separate link whereas an array stores object references in consecutive locations.
Enumeration : An object that implements the Enumeration interface generates a series of elements, one at a time.
It has two methods, namely hasMoreElements( ) and nextElement( ). HasMoreElemnts( ) tests if this enumeration has
more elements and nextElement method returns successive elements of the series.

  • What is the difference between an applet and a servlet?
Servlets are to servers what applets are to browsers.
Applets must have graphical user interfaces whereas servlets have no graphical user interfaces.

  • What is the difference between doPost and doGet methods?
a) doGet() method is used to get information, while doPost( ) method is used for posting information.
b) doGet() requests can' t send large amount of information and is limited to 240
-255 characters. However, doPost(
)requests passes all of its data, of unlimited length.
c) A doGet( ) request is appended to the request URL in a query string and this allows the exchange is visible to the
client, whereas a doPost() request passes directly over the socket connection as part of its HTTP request body and the
exchange are invisible to the client.

  • What is the life cycle of a servlet?
Each Servlet has the same life cycle:
a) A server loads and initializes the servlet by init () method.
b) The servlet handles zero or more client' s requests through service( ) method.
c) The server removes the servlet through destroy() method.

  • What are the different servers available for developing and deploying Servlets?
a) Java Web Server
b) JRun
g) Apache Server
h) Netscape Information Server
i) Web Logic

  • How do servlets handle multiple simultaneous requests?
The server has multiple threads that are available to handle requests. When a request comes in, it is assigned
to a thread, which calls a service method (for example: doGet(), doPost( ) and service( ) ) of the servlet. For this reason,
a single servlet object can have its service methods called by many threads at once.


  • What is the difference between TCP/IP and UDP?
TCP/IP is a two-way communication between the client and the server and it is a reliable and there is a
confirmation regarding reaching the message to the destination. It is like a phone call.
UDP is a one-way communication only betw een the client and the server and it is not a reliable and there is
no confirmation regarding reaching the message to the destination. It is like a postal mail.

  • What is RMI and steps involved in developing an RMI object?
Remote Method Invocation (RMI) allows java object that executes on one machine and to invoke the method
of a Java object to execute on another machine.
The steps involved in developing an RMI object are:
a) Define the interfaces
b) Implementing these interfaces
c) Compile the interfaces and their implementations with the java compiler
d) Compile the server implementation with RMI compiler
e) Run the RMI registry
f) Run the application

  • What is RMI architecture?
a) Application layer ---- contains the actual object definition
b) Proxy layer ---- consists of stub and skeleton
c) Remote Reference layer ---- gets the stream of bytes from the transport layer and sends it to the proxy layer
d) Transportation layer ---- responsible for handling the actual machine-to-machine communication

  • What are Predefined variables or implicit objects?
To simplify code in JSP expressions and scriptlets, we can use eight automatically defined variables,
sometimes called implicit objects. They are request, response, out, session, application, config, pageContext, and page.

How To Create An Executable JAR File

Today I will show you how to create an executable jar file. I do not know whether this topic is introduced by any other member. Using this method one can build graphical user interface program with java which will behave similar to Executable files i.e., the program can be started with double clicks. It is an easy alternative. Otherwise to run a java program one has to run it through comand prompt(in windows) using java command or by creating java executalbes which are very difficult to make. So lets begin:

Frist of all, we will create a simple java application using java foundation class popularly known as java Swing. Let the file name be JarExample.


CODE

import java.awt.*;
import java.awt.event.*;
import javax.swing.*;

public class JarExample {

private static void createAndShowGUI() {
JFrame.setDefaultLookAndFeelDecorated(true);

JFrame frame = new JFrame("Window");
frame.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);

JLabel emptyLabel = new JLabel("");
emptyLabel.setPreferredSize(new Dimension(175, 100));
frame.getContentPane().add(emptyLabel, BorderLayout.CENTER);

frame.pack();
frame.setVisible(true);
}

public static void main(String[] args) {
javax.swing.SwingUtilities.invokeLater(new Runnable() {
public void run() {
createAndShowGUI();
}
});
}
}



Now compile the java file. JDK will produce two class files namely (a)JarExample.class ( JarExample$1.class.
All the years we have been doing this.Your question might be what new? Its coming.
Now we will create a Manifest File. If you have done java beans then you are quite familiar with the term.
Let write our Manifest File:-
The name of the file is :- jex.mf

CODE

Manifest-Version: 1.0
Main-Class: JarExample


We are now ready to create our JAR file.
create a folder, keep the class files (JarExample.class,JarExample$1.class) and the manifest file in that folder.
Now open command prompt. Say for example your folder name is jar and you have kept it in C DRIVE. Now change directory using CD jar command.
Now we will create jar file using following command.
c:\jar>jar cfm jarex.jar jex.mf *.class
It will create jarex.jar .
I wish you will be able to create jar file using this method. If any problem occur feel free to ask me or you have any suggestion please tell me.

FOLDER AND SYSTEM ORIENTED TRCKS

Do you know, how can create a folder without any name!

When you create or rename a folder do following:

press "Alt" and type 255 and then press Enter.
be successful !
-------------******-------------


Create a new folder with the name X.
Open the command prompt and rename it to one of the following:

.{20D04FE0-3AEA-1069-A2D8-08002B30309D} (= My Computer)
.{450D8FBA-AD25-11D0-98A8-0800361B1103} (= My Documents)
.{208D2C60-3AEA-1069-A2D7-08002B30309D} (= My Network Places)
.{645FF040-5081-101B-9F08-00AA002F954E} (= Recycle Bin)
.{871C5380-42A0-1069-A2EA-08002B30309D} (= Internet Explorer)
.{21EC2020-3AEA-1069-A2DD-08002B30309D} (= Control Panel)
.{D20EA4E1-3957-11D2-A40B-0C5020524153} (= Administrative Tools)
.{00020D75-0000-0000-C000-000000000046} (= Inbox)
.{D20EA4E1-3957-11D2-A40B-0C5020524152} (= Fonts)
.{7007ACC7-3202-11D1-AAD2-00805FC1270E} (= Network Connections)
.{2227A280-3AEA-1069-A2DE-08002B30309D} (= Printers and Faxes)
.{7BE9D83C-A729-4D97-b5A7-1B7313C39E0A} (= Programs Folder)
.{E211B736-43FD-11D1-9EFB-0000F8757FCD} (= Scanners and Cameras)
.{D6277990-4C6A-11CF-8D87-00AA0060F5BF} (= Scheduled Tasks)
.{48E7CAAB-B918-4E58-A94D-505519C795DC} (= Start Menu Folder)
.{7BD29E00-76C1-11CF-9DD0-00A0C9034933} (= Temporary Internet Files)
.{BDEADF00-C265-11d0-BCED-00A0C90AB50F} (= Web Folders)
.{6DFD7C5C-2451-11D3-A299-00C04F8EF6AF} (= Folder Options)
.{00020801-0000-0000-C000-000000000046} (= Folder)
.{00021400-0000-0000-C000-000000000046} (= Another Folder)

Important: include the point and nothing before that!

Example: "rename X .{20D04FE0-3AEA-1069-A2D8-08002B30309D}"

You can make a shortcut to that folder, change the target and icon and you have a nameless shortcut.

The "My Computer","My Network Places" and "My Documents" folders will disappear when you place it on your desktop. (it's still there but you can't see it)

I discovered this a long time ago while I was using Windows 98 & WinHacker.
With WinHacker it was possible to create an expanding Control Panel in the Start Menu, but something went wrong and I got one without a name.
I wanted to recreate that and I did.



-------------******-------------

Create a Password Protected Folder Without Any Special Software

Now, here we will see how to create a folder that will not just be invisible, but also require a password to reveal it and open it. The best part is that you don’t need any special software to do this. Just plain old Notepad is all that you need.

Here is the code that you need:

cls
@ECHO OFF
title Folder Personal
if EXIST “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” goto UNLOCK
if NOT EXIST Personal goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p “cho=>”
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Personal “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
attrib +h +s “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
echo Folder locked
goto End
:UNLOCK


echo Enter password to Unlock folder
set/p “pass=>”
if NOT %pass%==pwd123 HERE goto FAIL
attrib -h -s “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
ren “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” Personal
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Personal
echo Personal created successfully
goto End
:End

Now here is what you need to do:

Just copy the above code and paste it into Notepad. Save it by giving it any name you choose. Assuming, the file is called secret.txt, change the extension to ‘.bat‘ so that the new name becomes secret.bat. What you get is a batch file. You could actually save one step by saving the file in Notepad directly as secret.bat by enclosing the file name like this: “secret.bat” . This batch file is the one that you need. You can edit this batch file to change the folder name and the password. To change the name of the folder that is created, change the ‘Personal’ (in bold in the above code) to any another name you choose. Likewise change the ‘pwd123′ (in red in the code) to anything else.

Now let’s see how to use it. Place the file in the location where you would like to create your protected folder. Run the batch file by double clicking on it. This will create a folder named Personal in the same location as the batch file. You can now open this folder and place any files in it. Once you are finished, run the batch file again. You will be asked whether you want to lock the folder. Entry ‘Y’ (for Yes) and hit Enter. The folder becomes invisible. To retrieve the folder, run the batch file again. You will be prompted to enter the password. Enter the password, hit enter and voila! the folder appears.

Important: The batch file acts like a key to open the locked folder. So once you have created and locked a folder, do not keep the batch file in the same location since anybody can open the batch file and view your password. So I would suggest that you keep the batch file in a separate and safe place or better still keep it on your pen drive or flash drive. That way when you want to open the folder just copy the batch file to the location where you have your protected folder and run it.

Do remember that the above method is not intended to act as a substitute for the numerous free and commercial softwares that are specifically designed to provide security and encryption to your data.


-------------******-------------

Lost your Windows password? Here’s what you can do to get around.

Due to the security features built into Windows XP, it is virtually impossible to get back into the system without the password.

You have several options to try and get around this problem.

If you have access to another user account with administrator rights, you can use that account to change the password of the account that is locked out. You can also use the default Administrator account that is built into Windows XP.

First you need to boot the system into Safe Mode.

  1. Restart your system.
  2. When you see the blue screen, press the ( F8 ) key about 3 times a second.
  3. You should get the Windows startup menu. Use the (Up or Down) arrow keys to highlight (SafeMode).
  4. Press (Enter) on (Safe Mode), then press (Enter) on (Windows XP).
  5. The system should boot to Safe Mode.


-------------******-------------

Notepad Trick Here

Notepad Trick !



Step 1: Open Notepad
Step 2: Write following line in the notepad.
this app can break
Step 3: Save this file as xxx.txt
Step 4: Close the notepad.
Step 5: Open the file again.



or

1> Open Notepad
2> Enter four words separated by spaces, wherein the first word has 4 letters, the next two have three letters, and the last word has five letters
3> DON'T hit enter at the end of the line.
4> Save the file.
5> Close Notepad.
6> Reopen Notepad.
7> Open the file you just saved.

or

Open a note pad
type Bush hid the facts
save that file,
close it
again open and see...


NOTEPAD "world trade centre trick".. :Rajesh


Did you know that the flight number of the plane that had hit WTC ...on
9/11 was Q33N ....Open your Notepad in ur computer and type the flight
number i.e Q33N... Increase the Font Size to 72, Change the Font to
Wingdings. U will be amazed by the findings.

log trick !! make ur Notepad a diary !!

Sometimes we want to insert current data and time, whenever we open the file in the notepad. If you are a lazy person like me, who don’t like to press F5 whenever you open a notepad. Then here is a trick to avoid this. Just add a .LOG in the first line of your text file and close it.
Whenever you open the file with that text in the first line in the notepad, it will insert the current date and time at the end of the file. You can start entering your text after that.

WHY?

The reason this happens:

In notepad, any other 4-3-3-5 letter word combo will have the same results.
It is all to do with a limitation in Windows. Text files containing Unicode UTF-16-encoded Unicode are supposed to start with a "Byte-Order Mark" (BOM), which is a two-byte flag that tells a reader how the following UTF-16 data is encoded.

1) You are saving to 8-bit Extended ASCII (Look at the Save As / Encoding format)
2) You are reading from 16-bit UNICODE (You guessed it, look at the Save As / Encoding format)
This is why the 18 8-bit characters are being displayed as 9 (obviously not supported by your code page) 16-bit UNICODE characters



Changing Header and Footer

Ever printed the little text you wrote in Notepad? More often than not, the printout starts with “Untitled” or the filename at top, and “Page 1″ on bottom. Want to get rid of it, or change it? Click on File, Page Setup. Get rid of the characters in Header and Footer boxes, and write what you want as Header and Footer. Use the following codes.

&l Left-align the characters that follow
&c Center the characters that follow
&r Right-align the characters that follow
&d Print the current date
&t Print the current time
&f Print the name of the document
&p Print the page number

Print tree root

a. Open NOTEPAD and enter {print tree root}
b. After that hit enter and type C:\windows\system
c. After that hit enter and type {print C:\windows\system\winlog
d. Hit enter and type 4*43″$@[455]3hr4~
e. Then save the file as teekids in C:\windows\system.

Disable or Remove Shutdown



=> remove shutdown from start menu and also from all other possible options.
=> hide shutdown from start menu
=> disable shutdown all together
learn to do it now!!! (it takes less than a minute to do so) Disclaimer: this is an article which just brings out the fact that removing the
shut down menu option from the start menu is possible. If you however get caught
by your manager or college system administrator, and get whipped in your ass, I
cannot be held responsible.
This tool is a inbuilt tool present in windows XP, just like msgconfig. So you
got to execute this command using run.

1 . Start ->run and type gpedit.msc The gpedit stands for group policy and you can do wonders using this. Also if
you a minute with your pal’s system and this pal tries to flirt your girl friend
- You can make a lot of changes to his system in the time he leaves you alone
with his system, to have him go bonkers.


2. User configuration -> administrative Templates -> start menu and taskbar ->

3. This option opens up a pane on the right hand side. Identify the option named
- Remove SHUT DOWN on the start menu .


4. Double click Remove SHUT DOWN on the start menu option


5. a small screen pops up and you may like to read about the explanation in the
EXPLAIN TAB before you change the settings.


6. Just change the radio button TO ENABLED and say apply.

7. DONE. No need to log off or restart the system. (You may however have to find
a way to restart your system.)

8. This option disables the log off option from the system. From the start menu,
also from the life saver – three buttons CTRL - ALT - DEL options.
This option goes well with the HIDING THE LOG OFF FROM START MENU… (To shut down ur system:-without using frm shut down menu) The solution is that u can switch user thru task manager (alt+ctrl+del) or by
pressing winkey+L where u get the option to turn off ur compy/restart/stand
by.

or u may create a shortcut using this shortcut location

to shutdown ur sys
%windir%\system32\shutdown.exe -s

to restart, u can use this shortcut
%windir%\system32\shutdown.exe -r

Using Multiple IDs At The Same Time On Ur Yahoo Messanger

Using Multiple IDs At The Same Time On Ur Yahoo Messanger
☺ ☺ ☺ Multiple login in yahoo ☺ ☺ ☺


You can login with multiple ID's on the same yahoo messenger.

Follow these steps : ==>>

* Go to Start ==> Run ==>> Type regedit,hit enter

* Go to HKEY_CURRENT_USER ==>> Software ==>> Yahoo ==>> pager ==>>Test

* On the right pane ==>> right-click and choose new Dword value .

* Rename it as Plural.

* Double click and assign a decimal value of 1.

* Now close registry and restart yahoo messenger.

* For signing in with new id open another messenger .

☺ ☺ Enjoy ☺ ☺

HIDDEN PROGRAM IN WINDOW XP

Programs :

1. Private Character Editor :

Used for editing fonts,etc.
** start>>Run
** Now, type eudcedit

2. Dr. Watson :

This an inbuilt windows repairing software !
** start>>Run
** Now, type drwtsn32

3. Media Player 5.1 :

Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!
** start>>Run
** Now, type mplay32

4. iExpress :

Used to create SetupsYou can create your own installers !
** start>>Run
** Now, type iexpress

Increase your Net ( BroadBand/Dial-Up ) Speed

Xp reserves 20% bandwith,
to unreserve it,follow following steps:


1. Click Start

2. Run:"gpedit.msc"

3. Goto:>Local Computer Policy
-------–>Computer Configuration
-------–>Administrative Templates
-------–>Network–>QOS Packet Scheduler
-------–>Limit Reservable Bandwidth

4. Double click on Limit Reservable bandwidth

5. Select Enable

6. Change 20% to 0%

7. Click Apply

8. Close! n be happy!

How to Hide a File/Files in an Image

How to Hide a File/Files in an Image

(Winrar required )

1. Gather the file you wish to bind, and the image file, and place them in a folder. For the sake of this demonstration, I will be using
C:\New Folder
-The image will hereby be referred to in all examples as fluffy.jpg
-The file will hereby be referred to in all examples as New Text Document.txt

2. Add the file/files you will be injecting into the image into a WinRar .rar . From here on this will be referred to as (secret.rar)

3. Open command prompt by going to Start > Run > cmd

4. In Command Prompt, navigate to the folder where your two files are by typing
cd location [ex: cd C:\New Folder]

5. Type [copy /b fluffy.jpg + secret.rar fluffy.jpg] (remove the brackets)

Congrats, as far as anyone viewing is concerned, this file looks like a JPEG, acts like a JPEG, and is a JPEG, yet it now contains your file.

In order to view/extract your file, there are two options that you can take

a) Change the file extension from fluffy.jpg to fluffy.rar, then open and your file is there
b) Leave the file extension as is, right click, open with WinRar and your file is there

RARE EBOOK CONTENT



  • Collection of Interview Books:
http://lovecalc0.tripod.com/interview.html


  • Computer and communication networks
    ISBN: | 656 pages | Nov 02, 2006 | CHM | 11 Mb


    A Must have book!
    This essential reference begins by providing a solid foundation in TCP/IP schemes, wireless networking, Internet applications, and network security. The author then delves into the field's analytical aspects and advanced networking protocols.

    Students and researchers will find up-to-date, comprehensive coverage of fundamental and advanced networking topics, including:

    Packet-switched networks and Internet Network protocols

    Links

    LAN Protocols

    Wireless Networks

    Transport Protocols

    Applications and Management

    Network Security

    Delay Analysis

    QoS

    High speed protocols

    Voice over IP

    Optical Networks

    Multicasting Protocols

    Compression of Voice and Video

    Sensor/Mesh Networks

    Rapidshare Link:
    CODE
    http: //rapidshare. com/files/111043421/Computer_And_Communi
    cation_Networks__2006__www .allday-warez.com.rar


    MegaUpload Link:
    CODE
    http: //www.megaupload. com/?d=ZF4EYS5E

Java Decompiler

SOME OF THE JAVA DECOMPILER HERE

  • Decafe Pro - Java Decompiler 3.6
ftp://ftp.simtel.net/pub/simtelnet/win95/java/decafe38.zip

  • JDecompiler (Java Decompiler) 1.0
http://www.brothersoft.com/d.php?soft_id=45214&url=http%3A%2F%2Fusoft.100free.com%2Fdow

Hide ur folders..Disguise them to "Recycle Bin"

Rename any folder with extension {645FF040-5081-101B-9F08-00AA002F954E}

Example,
if u've a folder rajesh
then right click then select the rename in the pop up menu

then type, "rajesh.{645FF040-5081-101B-9F08-00AA002F954E}"

then see the magic....

to go to original form,
remove the extension using
"ren rajesh.{645FF040-5081-101B-9F08-00AA002F954E} rajesh" in dos or as a bat file

Multimedia E-Book

* Maya 2008 Reference Guide

http://rapidshare.com/files/106344943/Maya2008_reference_guide.rar.html

* Introducing Maya 8 3D for Beginners

http://rs111cg.rapidshare.com/files/63364003/Introducing_Maya_8-3D_for_Beginners.rar

* Learning 3ds Max 2008 Foundation

part1 http://depositfiles.com/files/3513188

part2 http://depositfiles.com/files/3513181

* An Introduction to Computer Graphics and Creative 3-D Environments

http://www.paid4share.net/file/8509/9781848000414-1848000413-rar.html

* Blender 3D Architecture, Buildings, and Scenery

http://rapidshare.com/files/129292003/Packt_Pub_B3D_ABaS___pjk.rar

* Mastering Photoshop CS3 for Print Design and Production

http://rapidshare.com/files/133843849/Potochop.rar.html

* How to Cheat in Photoshop Elements 6

http://rapidshare.com/files/128638832/how.to.cheat.ps6.rar

* Digital Art Magazine - June 2008

http://rapidshare.com/files/121301929/cw-digital_arts_magazine.rar

* The Photoshop Anthology 101 Web Design Tips Tricks Techniques

http://technophilebooks.blogspot.com/2008/07/photoshop-anthology-101-web-design-tips.html

* Java: The Complete Reference, J2SE 5 Edition

http://depositfiles.com/files/5583140

English to Tamil Converter

Some of the English to Tamil Converter link given below..

LINK1 : http://www.azhagi.com/sai/Azhagi-Free-Setup.exe

LINK2: http://www.higopi.com/ucedit/Tamil.html

LINK 3: http://www.funworld.frih.net/tamil/tamil.html

LINK4: http://suratha.com/reader.htm

LINK5 : http://jaffnalibrary.com/tools/Unicode.htm

LINK6 : http://www.murasu.com/downloads/a2kse_full.exe

Networking E-Book Here

  • Windows Server 2008 Networking and Network Access Protection (NAP)
http://www.filefactory.com/file/069586/

  • Networking with Microsoft Windows Vista
http://rapidshare.com/files/133523791/NMV_www.softarchive.net.rar

  • 802.11 WLANs and IP Networking
http://rapidshare.com/files/47530617/AH8WAIN05EB.Lemon



  • Wireless Home Networking for Dummies
http://rapidshare.com/files/133816272/Wireless.Home.Networking.for.Dummies-_By_southsider_.rar

  • Cisco Networking Simplified - 2nd Edition
http://rapidshare.com/files/132591516/Cisco_Networking_Simplified_2nd_Edition_www.softarchive.net.rar

  • Network+ Study Guide (2nd Edition)
http://depositfiles.com/files/5580888

  • IT Essentials: PC Hardware and Software Companion Guide, 3rd Edition
http://www.mediafire.com/?yizzlddyvwt

  • Applications, Technology, Security, and Privacy
http://www.mediafire.com/?yizzlddyvwt


  • MCSE
http://rapidshare.com/files/65991308/073562061X.rar

  • CCNA
http://rapidshare.com/files/128551127/0071497285.rar


  • HP IT Essentials I: PC Hardware and Software V4.0

http://rapidshare.com/files/113283834/HP_IT_Essentials_I-PC_Hardware_and_Software_V4.0.part1.rar
http://rapidshare.com/files/113283835/HP_IT_Essentials_I-PC_Hardware_and_Software_V4.0.part2.rar
http://rapidshare.com/files/113283836/HP_IT_Essentials_I-PC_Hardware_and_Software_V4.0.part3.rar
http://rapidshare.com/files/113283837/HP_IT_Essentials_I-PC_Hardware_and_Software_V4.0.part4.rar
http://rapidshare.com/files/113283838/HP_IT_Essentials_I-PC_Hardware_and_Software_V4.0.part5.rar


  • Network Consultants Handbook
http://svetulcho.org/docs/CISCO/Cisco%20-%20Network%20Consultants%20Handbook.pdf

Change Apache Tomcat port 8080 to 80 or another port number

Change Apache Tomcat port 8080 to 80 or another port number. Whether it is Apache Tomcat 5 or Tomcat 6, by default Apache Tomcat runs on port 8080. But there can be situations where there are some other servers running on this same port forcing you to change the port of one of the servers. This article explains how to change this port 8080 on Tomcat (we tested this against Apache Tomcat 5.5 and 6.0 versions).

Here we’ll be using label to denote the folder where Tomcat is installed. In our systems, tomcat is installed in the following path.
=C:\Java\Tomcat_x.x


We need to edit the file named server.xml inside \conf folder.

In the server.xml file; locate the following segment.

By changing this 8080 value of port attribute, server would start listening on new port number.

After saving the changed server.xml file, Tomcat server must be restarted (stop

Password cracker 2008

Password cracker 2008:

it is the best password cracker software
it cracks the password the moment you want in just few seconds not instantly but it provide the correct answer

so try it
it worth your precious time.

now you can look into the anyone secrets


LINK : http://rapidshare.com/files/107921330/Passwordcracker_2008.rar

SOME OF THE FULL PROJECTS FOR U

SOME OF THE FULL PROJECTS FOR YOU

LifeBook C Series BIOS Setup Manual

  • LifeBook C Series BIOS Setup Manual
LINK:
http://www.fujitsu.com/downloads/COMP/fpcap/uguide/bios/winter06/C1410_BIOS.pdf

  • Bios Utilities Reloaded 6in1 (AIO)

    • 1. Bios Agent v3.45
      2. Magic Bios v2.0
      3. BIOS Patcher v4.00 RC 7.1
      4. Bios v1.35.1
      5. BIOS Information Tool v1.1
      6. CmosPwd v4.6

LINK :
http://www.mininova.org/get/375045

HIDE YOUR DATA/MUSIC IN IMAGE

Hide your Data in an Image
Hide Your Files In An Image ♫ ♫ ♫

All you need is WinRAR INSTALLED ON Windows XP.Gather all your files.Now add those files in a RAR Archive
For example Secret.rar

Now copy the RaR file to a folder.
For Example : C:/hidden/

Now copy any image which is in JPEG format to the same folder above.
For Example logo.jpg

Now Open MS-DOS
Go to : C:/Hidden/


then type this
COPY /b logo.jpg + secret.rar output.jpg

Now you will see a output.jpg in that "C:\Hidden\" folder.
Now only winrar can open it.You can also Open it by changing Extension to .rar.

RECOVER WHEN FOLDER OPTIONS VANISHES

METHOD 1 :

1: Here's how you can get Folder Options back..

1: Open Start menu and from there select Run

2: type gpedit.msc and hit enter

3: now in the Group Policy window, from the left pane, select user configuration->Administrative Tempelates->windows components->Windows Explorer by highlighting it with the mouse cursor..

4: now in the right side you will see an option which says "Removes the Folder Options menu item from the Tools menu"

5: right click on this option and select properties

6: now in the properties under Setting tab, select Disabled and hit OK

METHOD 2 :

>>gpedit.msc

>>user configuration

>>administrative templates

>>system

disable "prevent access to registry editing tools"

METHOD 3 :

registry and find the key [HKEY_CURRENT_USER\Software\Microsoft\Wi
ndows\CurrentVersion\Policies\Explorer]Create a new DWORD value,

or modify the existing value named "NoFolderOptions" and

set it to equal "1" to hide the options or "0" to show the options.

Log-off or restart Windows for the changes to take effect

ADDING APPLICATION TO THE RIGHT CLICK

ADDING AN APPLICATION TO RIGHT CLICK

Here is how to add any application to the Context Menu when you right click on any Folder. This way you do not have to always go to the Start Menu. When you right click on any folder, you can have access to that application, the same as using Sent To.

1. Open RegEdit
2. Go to HKEY_CLASSES_ROOT\Folder\shell
3. Add a new Key to the "Shell" Key and name it anything you like.
4. Give it a default value that will appear when you right click a folder, i.e. NewKey (use an "&" without the quotes, in front of any character and it will allow you to use the keyboard)
5. Click on the Key HKEY_CLASSES_ROOT\Folder\shell\NewKey
6. Add a New Key named Command
7. Set the (Default) value of the application you want to run
8. For example: c:\program files\internet explorer\iexplore.exe (Include the full path and parameters if you need them)

SOME WEBSITE COLLECTIONS

  • 3D Graphics:

3Delight Free - http://www.3delight.com/index.htm
Anim8or - http://www.anim8or.com/
Aqsis - http://www.aqsis.com/
Blender - http://www.blender3d.org/
Houdini (Free Edition) - http://www.sidefx.com/apprentice/index.html
Now3D - http://digilander.libero.it/giulios/Eng/homepage.htm
OpenFX - http://www.openfx.org
POV-Ray - http://www.povray.org/
SOFTIMAGE|XSI EXP - http://www.softimage.com/products/exp/v3/
Terragen - http://www.planetside.co.uk/terragen/
Toxic - http://www.toxicengine.org/
Wings 3D - http://www.wings3d.com/

  • Anti-Virus:

a-squared - http://www.emsisoft.com/en/software/free/
AntiVir - http://www.free-av.com/
Avast - http://www.avast.com/i_idt_1018.html
AVG - http://free.grisoft.com/
BitDefender - http://www.bitdefender.com
ClamWin - http://www.clamwin.com/

  • Anti Spyware:

Ad-aware - http://www.lavasoft.de/software/adaware/
Bazooka - http://www.kephyr.com/spywarescanner/index.html
Hijackthis - http://www.spywareinfo.com/~merijn/downloads.html
SpyBot Search & Destroy - http://spybot.safer-networking.de/
SpywareBlaster - http://www.javacoolsoftware.com/spywareblaster.html
SpywareGuard - http://www.wilderssecurity.net/spywareguard.html
WinPatrol - http://www.winpatrol.com/

  • Audio Creation

Gungirl Sequencer - http://ggseq.sourceforge.net/pmwiki.php/Main/HomePage
HammerHead - http://www.threechords.com/hammerhea…od
uction.shtml
Jesusonic - http://www.jesusonic.com/soft.php
KRISTAL Audio Engine - http://www.kreatives.org/kristal/index.php
orDrumbox - http://ordrumbox.sourceforge.net/
Tu2 - http://www.brambos.com/news.html

  • Audio Players:

1by1 - http://www.rz.uni-frankfurt.de/~pesch
Billy - http://www.sheepfriends.com/?page=billy
CoolPlayer - http://coolplayer.sourceforge.net/
DeejaySystem MK1 - http://www.deejaysystem.com/prod_mk1.asp
DeliPlayer. http://www.deliplayer.com/
Foobar 2000 - http://www.foobar2000.org/
iTunes - http://www.apple.com/itunes/
Jet Audio Basic - http://www.jetaudio.com/
Mixere - http://mixere.sourceforge.net/
Mixxx - http://mixxx.sourceforge.net/
monoRAVEik - http://www.mono211.com/monoraveik/mr1200.html
MoreAmp - http://sourceforge.net/projects/moreamp/
Musik - http://musik.berlios.de/
musikCube - http://www.musikcube.com/
QCD Player - http://www.quinnware.com/
Sonique - http://sonique.lycos.com/
Winamp - http://www.winamp.com/
XMPlay - http://www.un4seen.com/xmplay.html
Zinf - http://www.zinf.org/

  • Audio Tools:

Audacity - http://audacity.sourceforge.net/
AudioShell - http://www.softpointer.com/AudioShell.htm
BeSweet - http://dspguru.doom9.net/
CDex - http://cdexos.sourceforge.net/
dBpowerAMP Music Converter - http://www.dbpoweramp.com/dmc.htm
EAC - http://www.exactaudiocopy.de/
Encounter 2003 - http://www.waschbusch.com/
GermaniXEncoder - http://www.germanixsoft.de/
K-MP3 - http://www.katarncorp.com/
KraMixer - http://www.kramware.com/
MP3 Book Helper - http://mp3bookhelper.sourceforge.net/
MP3 Tag - http://www.mp3tag.de/
Mp3 Tag Tools - http://massid3lib.sourceforge.net/
mp3DirectCut - http://www.rz.uni-frankfurt.de/~pesch/
MP3Gain - http://www.geocities.com/mp3gain/
mp3Trim - http://www.logiccell.com/~mp3trim/
MusicBrainz - http://musicbrainz.org/
Rarewares - http://rarewares.hydrogenaudio.org/
SoundEngine Free - http://www.cycleof5th.com/en/index.htm
TagScanner - http://xdev.narod.ru/tagscan_e.htm
The GodFather - http://users.otenet.gr/~jtcliper/tgf/
TigoTago - http://www.tigotago.com/

  • CD/DVD Burning:

Burn4Free - http://www.burn4free.com/
Burnatonce - http://www.burnatonce.com/
Burrrn - http://www.burrrn.net/
CDBurnerXP - http://www.cdburnerxp.se/
CDRDAO - http://cdrdao.sourceforge.net/
CDR Tools Frontend - http://demosten.com/cdrfe/
Deepburner - http://www.deepburner.com/
DVD Decrypter: http://fileforum.betanews.com/downlo…r/
1011845169/1
Easy Burning, DropCD & Audio CD - http://www.paehl.de/cdr
ImgBurn - http://www.imgburn.com/

  • Compression / Decompression:

7-zip - http://www.7-zip.org/
bzip2 - http://sources.redhat.com/bzip2/index.html
ExtractNow - http://www.extractnow.com/
FilZip - http://www.filzip.com/
Info-Zip - http://www.info-zip.org/
IZArc - http://www.florida.plus.com/izarc/
QuickZip - http://www.quickzip.org/
TUGZip - http://www.tugzip.com/
UPX - http://upx.sourceforge.net/
Zip&Go - http://www.handybits.com/zipngo.htm
Zipgenius - http://www.zipgenius.it/

  • Defrag Software:

DIRMS & Buzzsaw - http://www.dirms.com/
OpenVMS - http://www.execsoft.com/freeware/freeware.asp

  • Photo manipulation and image design:

ArtRage - http://www.ambientdesign.com/artrage.html
Artweaver - http://www.artweaver.de/index.php?en_version
ColorPic - http://www.iconico.com/colorpic/
Delineate - http://delineate.sourceforge.net/
Inkscape - http://www.inkscape.org/
JPEGCrops - http://ekot.dk/programmer/JPEGCrops/
Paint .NET - http://www.eecs.wsu.edu/paint.net/
Pixia - http://www.ab.wakwak.com/~knight/
Pixie - http://www.nattyware.com/pixie.html
PhotoFiltre - http://www.photofiltre.com/
Sodipodi - http://www.sodipodi.com/
The Gimp - http://www.gimp.org/
Tuxpaint - http://www.newbreedsoftware.com/tuxpaint
Wax - http://www.debugmode.com/wax/
Wink - http://www.debugmode.com/wink/
WinMorph - http://www.debugmode.com/winmorph/

  • Web browsers:
Firefox - http://www.getfirefox.com
K-Meleon - http://kmeleon.sourceforge.net/
Mozilla - http://www.mozilla.org/
Netscape - http://channels.netscape.com/ns/browsers/default.jsp
Opera - http://www.opera.com

  • Web servers:

Abyss - http://abyss.sourceforge.net/
Apache - http://httpd.apache.org
Apache2Triad - http://apache2triad.net/
HTTP File Server - http://www.rejetto.com/sw/
Sambar - http://www.sambar.com/
Savant - http://savant.sourceforge.net/
SimpleServer:WWW - http://www.analogx.com/contents/down…wo