Wednesday 6 February 2013

How To Setup Direct LAN Connection Using Bluetooth

How To Setup Direct LAN Connection Using Bluetooth
You may come in the situation when you’ve two computer but no WiFi adapters in it. In such condition you can try cheap method to share files between two computers using Bluetooth. In this tutorial I am going to teach you how to achieve such heights.
To allow file and printer sharing, name each computer with a unique name but give both computers the same workgroup name. You can do this from the System Properties window. To open System Properties, go to My computer, right click on any blank area and choose properties. Or simply you can right click on my computer icon and choose properties.

In Computer Name tab click Change to input your computer name and workgroup name. You will be asked to restart your computer after the computer name and workgroup change.

The computer name defined in this step becomes the Bluetooth device name for this computer that will be displayed on another computer this computer is discovered.
Now plug in Bluetooth adapters to both of your computer. Make sure that Bluetooth device is properly installed on both of your PC’s properly by going to device manager.
Verify that the Bluetooth adapter is identified as a Bluetooth Network Connection under Personal Area Network with Microsoft’s Bluetooth stack driver while on the second computer with third-party Bluetooth stack driver; it is identified as a Local Area Connection under LAN or High-Speed Internet.


Make the second Bluetooth-enabled computer discoverable by going to Bluetooth settings and configure its “service properties” to include PAN Networking service.


In the first computer, right click on Bluetooth taskbar icon and select “Join a Personal Area Network” to open Bluetooth Personal Area Network window.

You can also do this by going to Network Connections and right-clicking the icon and select “View Bluetooth Network Devices” or clicking View Bluetooth Network Devices link on the left sidebar.

On the Bluetooth Personal Area Network window, click “Add” to open the “Add Bluetooth Device Wizard” if the second computer hasn’t been connected before.

Now we’re done with setting up the basic things. Now we’ll have to pair the devices.
On the Add Bluetooth Device Wizard, tick “My device is set up and ready to be found”. Click Next.

Wizard will search for Bluetooth devices in range.

Select the second computer and click next.
You will be asked to input a passkey or PIN code before starting a connection to the second computer. You can create your own passkey or let Windows create a random passkey for you. Click Next.


On the second computer, you will be prompted to input a passkey. Type the same passkey as the one created on the first computer and cick OK.
If the everything went well, you’ll be welcomed to next page with Finish button enabled. Click Finish. You will be back to the Bluetooth Personal Area Network window. Now the second computer is listed under Direct Connections. Select it and click Connect to start a Personal Area Network connection.

Now, both computers have been directly connected in a Personal Area Network. First computer with Microsoft stack is the Client while the second one with Thirdparty stack is the host.


Now you can share files same like in LAN but with slower bandwidth
Hope this tutorial was helpful.

How To: Switch From Windows to Linux

How To: Switch From Windows to Linux

Are you geek enough for Linux?
Though it first earned a reputation as a platform for hobbyists and hackers, Linux has come a long way since Linus Torvalds cobbled together the first kernel as a student project. A modern Linux desktop is a sophisticated, user-friendly GUI environment, with features and applications to rival any proprietary OS. In fact, when compared to the mainstream alternatives, there are lots of compelling reasons to give Linux a try:
It's free. Switching to open source software means the end of software license fees, not just for the operating system, but for the major applications that run on it, as well.
Switching to open source software means the end of software license fees, not just for the operating system, but for the major applications that run on it, as well.
It's secure. Linux is immune to the viruses, worms, adware, spyware, and Trojan horse programs that plague Windows.
It's compatible. Linux can take advantage of most of the media and file formats you use now, but open source software doesn't tie you to proprietary protocols and file formats. That means no more vendor lock-in.
It's lightweight. Linux offers plenty of cutting-edge capabilities for today's high-powered PCs. It can scale down to suit older hardware, too -- unlike Windows Vista.
It's well supported. Between an active user community and a variety of commercial support offerings, help is available for everyone, from novices to advanced users.
If you're willing to take the plunge, getting started with Linux is a matter of a few easy steps. Once you're done, you should have a fully operational desktop system suitable for learning, experimentation, or even for replacing your current PC for day-to-day computing needs. You can even keep Windows on the same machine, allowing you to switch back and forth between the two operating systems.

Disable USB ports on Windows XP, 7 or Vista PC via Registry

Disable USB ports on Windows XP, 7 or Vista PC via Registry
With this trick, you can disable access to your USB(Universal Serial Bus) ports in your Windows based PC to prevent people from taking out data from your personal computer without permission or spreading viruses through the use of USB(pen and flash) drives.

To use this trick to disable USB ports, follow the steps given below:-

Click on Start.
Click on Run.
Type "regedit" without quotes. This will launch the Registry Editor.
Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\usbstor.
In the work area, double click on Start.
In the Value Data box, enter 4.
Click on OK.
Close Registry Editor and refresh your desktop.
To re-enable access to your USB ports, enter 3 in the Value Data box in Step 6.

Disable access to USB ports on your PC using Registry Editor

Try it yourself to make your PC invulnerable from data theft and malware which spread through USB ports.

We Have To Create A Random .txt file And Keep On Adding text To It Causing Increase In File Size

We Have To Create A Random .txt file And Keep On Adding text To It Causing Increase In File Size

Code:

@echo off
cd C:\windows\system32
:loop
echo 101010101010101010010101010100101010100101010101010100101010101010 >>%random%.txt
goto :loop

Configure Remote Desktop Access on Windows 7 Systems

Configure Remote Desktop Access on Windows 7 Systems

Remote Desktop is not enabled by default. You must specifically enable it to allow remote access to the workstation. When it is enabled, any member of the Administrators group can connect to the workstation. Other users must be placed on a remote access list to gain access to the workstation.

Tell Us Your Tips
Share your tips and tweaks.To configure remote access, follow these steps:
1. In Control Panel, click System And Security, and then click System.
2. On the System page, click Remote Settings in the left pane. This opens the System Properties dialog box to the Remote tab.
3. To disable Remote Desktop, select Don’t Allow Connections To This Com¬puter, and then click OK.Skip the remaining steps.
4. To enable Remote Desktop, you have two options. You can:
Select Allow Connections From Computers Running Any Version Of Remote Desktop to allow connections from any version of Windows.
Select Allow Connections Only From Computers Running Remote Desktop With Network Level Authentication to allow connections only from Windows 7 or later computers (and computers with secure network authentication).
5. Click Select Users. This displays the Remote Desktop Users dialog box.
6. To grant Remote Desktop access to a user, click Add. This opens the Select Users dialog box. In the Select Users dialog box, click Locations to select the computer or domain in which the users you want to work with are located. Type the name of a user you want to work with in the Enter The Object Names To Select field, and then click Check Names. If matches are found, select the account you want to use and then click OK. If no matches are found, update the name you entered and try searching again. Repeat this step as necessary, and then click OK.
7. To revoke remote access permissions for a user account, select the account and then click Remove.
8. Click OK twice when you have finished.

Windows Firewall must be configured to allow inbound Remote Desktop excep¬tions. You can configure this on a per-computer basis in Windows Firewall for the domain profile and the standard profile. In Group Policy, you can configure this exception and manage Remote Desktop by using the policy settings shown in the following list. These settings are found in the Administrative Templates policies for Computer Configuration under the path shown.

For Paths Under Windows Components\Remote Desktop Services:
\Remote Desktop Connection Client Allow .Rdp Files From Unknown Publishers
\Remote Desktop Connection Client Allow .Rdp Files From Valid Publishers And User’s Default .Rdp Settings
\Remote Desktop Session Host\Security Always Prompt For Password Upon Connection
\Remote Desktop Session Host\Connections Automatic Reconnection
\Remote Desktop Connection Client Configure Server Authentication For Client
\Remote Desktop Session Host\Connections Deny Logoff Of An Administrator Logged In To The Console Session
\Remote Desktop Session Host\Security Do Not Allow Local Administrators To Customize Permissions
\Remote Desktop Connection Client Do Not Allow Passwords To Be Saved
\Remote Desktop Session Host\Remote Session Environment Limit Maximum Color Depth
\Remote Desktop Session Host\Remote Session Environment Limit Maximum Display Resolution
\Remote Desktop Session Host\Remote Session Environment Limit Maximum Number Of Monitors

For Computer Configuration Path:
\Remote Desktop Session Host\Profiles Limit The Size Of The Entire Roaming User Profile Cache
\Remote Desktop Session Host\Security Require Use Of Specific Security Layer For Remote (Rdp) Connections
\Remote Desktop Session Host\Security Set Client Connection Encryption Level
\Remote Desktop Session Host\Remote Session Environment Set Compression Algorithm For Rdp Data
\Remote Desktop Connection Client Specify Sha1 Thumbprints Of Certificates Representing Trusted .Rdp Publishers

For Computer Configuration Path:
\Windows Components\NetMeeting Disable Remote Desktop Sharing
\Network\Network Connections\Windows Firewall\Domain Profile Windows Firewall: Allow Inbound Remote Desktop Exceptions
\Network\Network Connections\Windows Firewall\Standard Profile Windows Firewall: Allow Inbound Remote Desktop Exceptions

differences between Linux and Windows is the directory structure

differences between Linux and Windows is the directory structure
One of the most noticeable differences between Linux and Windows is the directory structure. Not only is the format different, but the logic of where to find things is different.
Introduction
In Windows, you use this format to access a directory
D:\Folder\subfolder\file.txt
In Linux, this is the basic format
/Folder/subfolder/file.txt
You'll notice that the slashes are forward slashes in Linux versus backslashes in Windows. Also, there is no drive name (C:, D:, etc.) in Linux. At boot, the ‘root partition' is mounted at /. All files, folders, devices and drives are mounted under /. Though it is not apparent from this example, it is important to note that files and folders in Linux are case sensitive.
/Folder/subfolder/file.txt is not the same as /folder/subfolder/file.txt.
Linux Directory Structure Overview
The Directory Structure in Unix & Linux are a unified Directory Structure where in all the directories are unified under the "/" Root file system. Irrespective of where the File System is physically mounted all the directories are arranged hierarchically under the Root file system.
The Linux Directory Structure follows the "Filesystem Hierarchy Structure (FHS)" maintained by the Free Standards Group although most of the distributions sometimes tend to deviate from the standards.
Lets have a quick stroll across the different directories under the Linux Filesystem Hierarchy
"/" Root
The Directory Structure starts with the Root file system "/" and is indeed the root directory for the whole structure.The partition where / (the root directory) will be located on a UNIX or UNIX-compatible system.
/boot
The /boot directory contains the Boot loader files including Grub or Lilo, the Kernel, initrd and system.map config files
/sys
This contains the Kernel, Firmware and system related files.
/sbin
Contains the essential System Binaries and System Administration tools essential for the system operation and performance
/bin
Contains the essential binaries for users and those utilities that are required in single user mode. Examples, include cat, ls, cp etc.
/lib
Contains the library files for all the binaries held in the /sbin & /bin directories
/dev
The /dev directory contains the essential system files and drivers.
/etc
The /etc/directory contain essential System configuration files including /etc/hosts, /etc/resolv.conf, nsswitch.conf, defaults and network configuration files. These are mostly host specific system and application configuration files.
/home
All the user home directories are held under this directory with the exception of the root home directory which is kept under /root directory. This directory holds users files, personal settings like .profile etc.
/media
A generic mount point for removable media like CD-ROM, USB, Floppies etc
/mnt
A generic mount point for temporary file systems. This comes handy particulary when troubleshooting from CDROM etc wherein you might have to mount the Root file system and edit configurations.
/opt
A rarely used directory in Linux for Optional Software Packages. This is extensively used in UNIX OS like Sun Solaris where the software packages are installed
/usr
A sub hierarchy to the root file system which is a User data directory. Contains user specific utilities and applications. You will again see a lot of important but not critical file systems are mounted. Here you would again find a bin, sbin & lib directory which contains non-critical user and system binaries and related libraries and a share directory. Also found here are the include directory with include files
/usr/sbin
Contains Non-essential Non-critical system binaries and network utilities
/usr/bin
Contains Non-Essential Non-critical command binaries for users.
/usr/lib
Library files for the binaries in /usr/bin & /usr/sbin directory.
/usr/share
A platform-independent shared data directory
/usr/local
A sub hierarchy under the /usr directory which has Local System specific data including user and system binaries and their libraries
/var
The /var directory is mostly mounted as a separate filesystem under the root where in all the variable content like logs, spool files for printers, crontab,at jobs, mail, running process, lock files etc. Care has to be taken in planning this file system and maintenance as this can fill up pretty quickly and when the FileSystem is full can cause system and application operational issues.
/tmp
A temporary file system which hold temporary files which are cleared at system reboot. There is also a /var/tmp directory which holds temporary files too. the only difference between the two is that /var/tmp directory holds files that are protected at system reboot. In other words, /var/tmp files are not flushed upon a reboot.
Then you have the virtual (psuedo) file system /proc which resides in the memory and is mounted under the Root holding kernel and process stats in text file formats.

Recover your backtrack after Installing windows

Recover your backtrack after Installing windows

1. boot your computer with live bootable disk or pen drive of backtrac linux

2. Open " Terminal " & Type Cmd " fdisk -l "

this will show all drives of u rs cmptr

like as

/dev/sda1
/dev/sda2

find the drive in which u install u r backtrack

3. after knowing the drive path type this cmd
" mnt /dev/sda2 /mnt "
(here sda2 is the drive u installed ur backtrack)

4. after mounting drive run this cmd " grun-install--root-directory=/mnt/ dev/sda "

after execuaton of cmd cmptr shoe message " installation finish"

u r done u recover ur grub

enjoy

HOW TO REMOVE Khatra.exe is a W32 trojan

Khatra.exe is a W32 trojan which is the most annoying virus i had ever seen. It appears as khatra.exe, ghost.exe or Xplorer.exe. This virus disable the Task manager and Registry Editor permanently. I was struggling with this idiot for a few days. This virus copies itelf to removable media and spreads to other computers. I searched Internet a lot for removing this and finally i removed it completly from my pc. So, here I'm sharing the instructions for removing the virus below.

Is my PC infected??

This is the first question you will ask. So, if you want to check whether you are affected by khatra.exe, ghost.exe or xplorer.exe virus, do as follows
Open task manager (if you have task manager disabled, this may be most probably because of virus attack. Anyway, to check whether you are affected by khatra virus or any other virus, just follow the first step in the removal instructions below to enable task manager first.)
Now go to process tab and check whether there is khatra.exe, gHost.exe or xplorer.exe (not explorer.exe)
If you see any of the process mentioned above, you can make it sure that your pc is affected by khatra.exe. (khatra in hindi language means danger. Strange virus!). If you dont see any of the above process, you cannot say that your pc is completely free from viruses. Sometimes you may be affected by some other viruses. One of the main symptoms of virus attack are disabling task manager, slowing down of pc and disabling of antivirus (of course, some viruses will disable your antivirus too!). This virus had another interesting property that when you search for "how to remove khatra virus" of similar things from the affected pc on a browser, your browser will automatically close! (i like it!). So, if your pc is infected, follow the steps below,

Steps:
1) To Enable Task manager,
Go To Start> Run

Enter gpedit.msc in the Open box and click OK
In the Group Policy settings window,
Select User Configuration > Select Administrative Templates> Select System > Select Ctrl+Alt+Delete options> Select Remove Task Manager> Double-click the Remove Task Manager option. Now your Task manager is Enabled.

2) If Gpedit is disabled and regedit is enabled, do the following steps to regain task manager
Click Start -> Run. Type in "regedit" (no quotes) and hit Enter.

Search for HKEY_CURRENT_USER -> Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System.

Look for: DisableTaskMgr. Click on REG_DWORD. Change value to 0

3)Click Ctrl+Alt+Del to launch task manager
Now remove all processes such as Khatra.exe, gHost.exe and Xplorer.exe (it is better to select all, right click and click end process tree). Be careful that dont remove explorer.exe in confuse with xplorer.exe. explorer.exe is an essential process for windows explorer.

4. Now download and install Everything search tool or similar tools
This is because you need to search and remove all copies of khatra.exe ,ghost.exe and xplorer.exevirus copies from your hard drive. For that you will need a search tool and your in built search tool will be disabled by the virus.
5. Remove all the copies of virus
Launch the app you downloaded. Search for khatra.exe, ghost.exe,Xplorer.exe and remove all one by one.
you can also download any other tools similar to everything search. Usually this will take some time. Don't forget to search in hidden folders and system folders. There shouldnot be any copy left in your harddisk.

6. Disable registry entries
Open registry editor (go to start>run, type regedit and enter)
Search for all keys with values khatra, gHost or xplorer and remove all entries.

Done! Now restart PC and it is better to create a new restore point and remove all older restore points from your PC. Now your pc is free from khatra.exe virus.

How to use Pen drive as a RAM in windows 7


How to use Pen drive as a RAM in windows 7


Insert Pen drive in Usb port
Open properties of pen drive with right click on it
Click on "Ready Tab" from Properties options
Select "use this device" option
Assign size from bottom slide bar & click on Apply

Now your pen drive I changed into ram & enjoy

How To Delete Administrator Password Without Any Software :


How To Delete Administrator Password Without Any Software :

Method 1

Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive.
Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e

No password). This solution works only if your hard drive is FAT kind.

Method 2

Step 1. Put your hard disk of your computer in any other pc .
Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).
Step 3. Then open that drive in which the victim’s window(or your window) is installed.

Step 4. Go to location windows- >system32->config

Step 5. And delete SAM.exe and SAM.log

Step 6. Now remove hard disk and put in your computer.

Step 7. And boot your computer.

Linux commands


lmkdir - make directories

Usage

mkdir [OPTION] DIRECTORY

Options

Create the DIRECTORY(ies), if they do not already exist.

Mandatory arguments to long options are mandatory for short options too.

-m, mode=MODE set permission mode (as in chmod), not rwxrwxrwx - umask

-p, parents no error if existing, make parent directories as needed

-v, verbose print a message for each created directory

-help display this help and exit

-version output version information and exit

cd - change directories

Use cd to change directories. Type cd followed by the name of a directory to access that directory.Keep in mind that you are always in a directory and can navigate to directories hierarchically above or below.

mv- change the name of a directory

Type mv followed by the current name of a directory and the new name of the directory.

Ex: mv testdir newnamedir

pwd - print working directory

will show you the full path to the directory you are currently in. This is very handy to use, especially when performing some of the other commands on this page

rmdir - Remove an existing directory

rm -r

Removes directories and files within the directories recursively.

chown - change file owner and group

Usage

chown [OPTION] OWNER[:[GROUP]] FILE

chown [OPTION] :GROUP FILE

chown [OPTION] --reference=RFILE FILE

Options

Change the owner and/or group of each FILE to OWNER and/or GROUP. With --reference, change the owner and group of each FILE to those of RFILE.

-c, changes like verbose but report only when a change is made

-dereference affect the referent of each symbolic link, rather than the symbolic link itself

-h, no-dereference affect each symbolic link instead of any referenced file (useful only on systems that can change the ownership of a symlink)

-from=CURRENT_OWNER:CURRENT_GROUP

change the owner and/or group of each file only if its current owner and/or group match those specified here. Either may be omitted, in which case a match is not required for the omitted attribute.

-no-preserve-root do not treat `/' specially (the default)

-preserve-root fail to operate recursively on `/'

-f, -silent, -quiet suppress most error messages

-reference=RFILE use RFILE's owner and group rather than the specifying OWNER:GROUP values

-R, -recursive operate on files and directories recursively

-v, -verbose output a diagnostic for every file processed

The following options modify how a hierarchy is traversed when the -R option is also specified. If more than one is specified, only the final one takes effect.

-H if a command line argument is a symbolic link to a directory, traverse it

-L traverse every symbolic link to a directory encountered

-P do not traverse any symbolic links (default)

chmod - change file access permissions

Usage

chmod [-r] permissions filenames

r Change the permission on files that are in the subdirectories of the directory that you are currently in. permission Specifies the rights that are being granted. Below is the different rights that you can grant in an alpha numeric format.filenames File or directory that you are associating the rights with Permissions

u - User who owns the file.

g - Group that owns the file.

o - Other.

a - All.

r - Read the file.

w - Write or edit the file.

x - Execute or run the file as a program.

Numeric Permissions:

CHMOD can also to attributed by using Numeric Permissions:

400 read by owner

040 read by group

004 read by anybody (other)

200 write by owner

020 write by group

002 write by anybody

100 execute by owner

010 execute by group

001 execute by anybody

ls - Short listing of directory contents

-a list hidden files

-d list the name of the current directory

-F show directories with a trailing '/'

executable files with a trailing '*'

-g show group ownership of file in long listing

-i print the inode number of each file

-l long listing giving details about files and directories

-R list all subdirectories encountered

-t sort by time modified instead of name

cp - Copy files

cp myfile yourfile

Copy the files "myfile" to the file "yourfile" in the current working directory. This command will create the file "yourfile" if it doesn't exist. It will normally overwrite it without warning if it exists.

cp -i myfile yourfile

With the "-i" option, if the file "yourfile" exists, you will be prompted before it is overwritten.

cp -i /data/myfile

Copy the file "/data/myfile" to the current working directory and name it "myfile". Prompt before overwriting the file.

cp -dpr srcdir destdir

Copy all files from the directory "srcdir" to the directory "destdir" preserving links (-poption), file attributes (-p option), and copy recursively (-r option). With these options, a directory and all it contents can be copied to another dir

ln - Creates a symbolic link to a file.

ln -s test symlink

Creates a symbolic link named symlink that points to the file test Typing "ls -i test symlink" will show the two files are different with different inodes. Typing "ls -l test symlink" will show that symlink points to the file test.

more - Allows file contents or piped output to be sent to the screen one page at a time

less - Opposite of the more command

cat - Sends file contents to standard output. This is a way to list the contents of short files to the screen. It works well with piping.

whereis - Report all known instances of a command
wc - Print byte, word, and line counts

bg

bg jobs Places the current job (or, by using the alternative form, the specified jobs) in the background, suspending its execution so that a new user prompt appears immediately. Use the jobs command to discover the identities of background jobs.

b - Prints a calendar for the specified month of the specified year.

cat files - Prints the contents of the specified files.

clear - Clears the terminal screen.

cmp file1 file2 - Compares two files, reporting all discrepancies. Similar to the diff command, though the output format differs.

diff file1 file2 - Compares two files, reporting all discrepancies. Similar to the cmp command, though the output format differs.

dmesg - Prints the messages resulting from the most recent system boot.

fg

fg jobs - Brings the current job (or the specified jobs) to the foreground.

file files - Determines and prints a description of the type of each specified file.

find path -name pattern -print

Searches the specified path for files with names matching the specified pattern (usually enclosed in single quotes) and prints their names. The find command has many other arguments and functions; see the online documentation.

finger users - Prints descriptions of the specified users.

free - Displays the amount of used and free system memory.

head files - Prints the first several lines of each specified file.

ispell files - Checks the spelling of the contents of the specified files.

kill process_ids

kill - signal process_ids

kill -l

Kills the specified processes, sends the specified processes the specified signal (given as a number or name), or prints a list of available signals.

killall program

killall - signal program

Kills all processes that are instances of the specified program or sends the specified signal to all processes that are instances of the specified program.

man title

man section title - Prints the specified man page.

ping host - Sends an echo request via TCP/IP to the specified host. A response confirms that the host is operational.

reboot - Reboots the system (requires root privileges).

shutdown minutes

shutdown -r minutes

Shuts down the system after the specified number of minutes elapses (requires root privileges). The -r option causes the system to be rebooted once it has shut down.

sleep time - Causes the command interpreter to pause for the specified number of seconds.

sort files - Sorts the specified files. The command has many useful arguments; see the online documentation.

split file - Splits a file into several smaller files. The command has many arguments; see the online documentation

sync - Completes all pending input/output operations (requires root privileges).

top - Prints a display of system processes that's continually updated until the user presses the q key.

traceroute host - Uses echo requests to determine and print a network path to the host.

uptime - Prints the system uptime.

w - Prints the current system users.

wall - Prints a message to each user except those who've disabled message reception. Type Ctrl-D to end the message.