সোমবার, ২০ ডিসেম্বর, ২০১০

RANAHAMID



RANA HAMID














WelcomtMDreamWorld

Welcome To Rana Hamid Dream World. Hi! My name is Rana Hamid. I am 19 years old and a Student.. My hobbies are reading, Computer and Friendship.

MDRANHAMID Department of Computer Science & Engineering, University of Rajshahi, Bangladesh.

MPostaaddress:

Md. Rana Hamid Madhail bazar Naogaon-6561

Tcontaccalme..

My contact number +880-1717-623876 +880-1725-620123

MMobilWapsite

http://ranahamid.peperonity.com/
http://ranahamid007.peperonity.com/
http://mainhoonna.peperonity.com/
http://shaktimaan.rana.peperonity.com/
http://rana.hamid.peperonity.com/


WWLinks

http://www.facebook.com/pages/Naogaon-Bangladesh/RANAHAMID/108203975868553?ref=mf/
http://ranahamid.eblogus.com/
http://ranahamid.bloguni.com/ http://www.mocospace.com/RANAHAMID/
http://www.flipkart.com/wishlist/ranahamid
http://hoverspot.com/ranahamid/
http://ranahamid007.blogspot.com/
http://ranahamid.amarblog.com/
http://ranahamid.blog.com/
http://en.wikibooks.org/wiki/User_talk:RANAHAMID/
http://ranahamid.net16.net/
http://ranahamid.eu5.org/
http://forum.projanmo.com/user4940.html/
http://blogs.cjb.net/ranahamid/
https://twitter.com/ranahamid/
http://ranahamid.yolasite.com/
http://www.rana7.webs.com/
http://www.tagged.com/ranahamid/
http://ranahamid.wordpress.com/
http://www.youtube.com/ranahamid007/
http://www.rana.blog.com/
http://ranahamid.co.cc/
http://ranahamid.page.tl/
http://www.ranahamid.webs.com/
http://www.comjagat.com/RANAHAMID/
http://en.wikibooks.org/wiki/User:RANAHAMID/
http://forums.bizhat.com/members/ranahamid.html/

ME-MaiId..

ranahamid@ovi.com
ranahamid007@gmail.com
ranahamid007@yahoo.com

rana_01725620123@yahoo.com
hamid_01717623876@yahoo.com
ranahamid007@ovi.com
ranahamid007@hotmail.com
ranahamid007@live.com
ranahamid007@banglalive.com
ranahamid007@usa.net
ranahamid007@ymail.com
ranahamid007@masti4india.com
ranahamid007@funmaza.com

Myself

I am a writer of various magazines. Such as Fatafati, Durbin, Aalpin, Sovournosova, Vimrul, Obokash, Therapy, Ajker Kagoj, MirzaGonj Barta, Science World, Professor’s Current affairs, Bichoo, Signal And so on...

How To Speed Up A Slow Computer

 


first off in the bottom right hand corner of your computer if you see alot of icons start up there when you first start your computer then this is for you if you dont know already how to get rid of em.

Press your Start Button (bottom left) and go to "run"
now type in: msconfig
now you will get a box that pops up and will tell you bunch of stuff dont mess with anything else other than what I tell you otherwise you could do something really bad (possible) go to your "startup" tab on the top right of the screen where it usually is and click it.

Now you will have a closed in box with bunch of filenames n addresses and more boxes with checks in them. Now if your like me you dont want anything startin up when you start you computer up or while your even doing anything cause it slows you down. Now unless your like me right now 1 have 1 thing starting up when my computer starts up and thats my settin for my overclocked vid card. But other than that uncheck every box and then hit apply and ok. Then window you were jus in will now close and ask you if you want to restart or wait till later to restart.

Either way when you shut it off and then turn it back on the settins will kick in

হইতে মো. রানা হামিদ রাজশাহী বিশ্ববিদ্যালয় কম্পিউটার সায়েন্স এন্ড ইঞ্জিনিয়ারিং বিভাগ।

How To Unload Cached Dll Files To Free Memory

 
Windows Explorer caches DLLs (Dynamic-Link Libraries) in memory for a period of time after the application an using them has been closed. Which in some cases can be an waste of memory. To stop WinXP from always caching these DLL files, create the new registry key below.

Open up the Registry and navigate to :

HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Explorer

Create a new sub-key named 'AlwaysUnloadDLL' and set the default value to equal '1' to disable Windows caching the DLL in memory.

Restart Windows for the change to take effect

হইতে মো. রানা হামিদ রাজশাহী বিশ্ববিদ্যালয় কম্পিউটার সায়েন্স এন্ড ইঞ্জিনিয়ারিং বিভাগ।

Keyboard Shortcuts, Microsoft Word

 
Keyboard Shortcuts, Microsoft Word

 Keyboard Shortcuts Result in Microsoft Word

CTRL and A Selects all in the current document.
CTRL and B Bold text.
CTRL and C Copies the item or text to the Clipboard and can be pasted using CTRL and V.
CTRL and D Displays the Font dialogue box.
CTRL and E Centre Alignment.
CTRL and F Displays the Find dialog box, to search the current document.
CTRL and G Displays the Go to dialog box, to go to a specific location in the current document.
CTRL and H Displays the Replace dialogue box.
CTRL and I Italic text.
CTRL and J Full Justification.
CTRL and K Create Hyperlink
CTRL and L Left Alignment
CTRL and M Tab
CTRL and N Creates a new document.
CTRL and O Displays the Open File dialogue box.
CTRL and P Displays the Print dialog box.
CTRL and R Right Alignment.
CTRL and S Displays the Save dialog box.
CTRL and U Underline text
CTRL and V Pastes the copied item or text from the Clipboard into the current position in the document.
CTRL and X Cuts the item or text selected to the Clipboard.
CTRL and Y Redo the last undone action.
CTRL and Z Undoes the last action.
CTRL and ENTER Insert Page Break.
CTRL and F2 Show Print preview.
CTRL and F4 Closes the active document window.
CTRL and F6 Opens the next document window.

Keyboard Shortcuts Result in Microsoft Word
F1 key Get help or use the Office assistant.
SHIFT and F1 Key Context sensitive help.
F2 Key Move text or image.
SHIFT and F2 Key Copy Text.
F3 Key Insert an autotext entry.
SHIFT and F3 Key Change the case of the selected text.
F4 Key Perform last action again.
SHIFT and F4 Key Perform a Find or Go to action again.
F5 Key Displays the Go to dialogue box, from here you can also Find and Replace.
SHIFT and F5 Key Move to a previous revision.
F6 Key Go to the next frame or pane.
SHIFT and F6 Key Go to the previous frame or pane.
F7 Key Launch the Spell checker.
SHIFT and F7 Key Launch the Thesaurus.
F8 Key Extend the current selection.
SHIFT and F8 Key Shrink the current selection.
F9 Key Update the selected fields.
SHIFT and F9 Key Switch between a field code and it's result.
F10 Key Activate the menu bar.
SHIFT and F10 Key Display a Shortcut Menu. Same as right clicking.
F11 Key Go to the next field.
SHIFT and F11 Key Go to the previous field.
F12 Key Save file As, equivalent to tools menu.
SHIFT and F12 Key Save document, equivalent to tools menu

হইতে মো. রানা হামিদ রাজশাহী বিশ্ববিদ্যালয় কম্পিউটার সায়েন্স এন্ড ইঞ্জিনিয়ারিং বিভাগ।

Important Faqs For Sp2

Questions like:

Should I slipstream SP1 into Windows XP before SP2? Nope!


View them here:

hXXXp://www.ntu.edu.sg/CITS/getting+help/faqs/windows+xp+sp2.htm#q4

Windows XP SP2 (Service Pack 2) Frequently Asked Questions

What is the size of this Windows XP SP2?
What is the minimum requirement for the system to run Windows XP SP2?
Can I upgrade my system with Windows XP SP2?
Do I have to install an earlier Service Pack 1 before installing Windows XP SP2?
Is there any patch that is required to install prior to SP2 installation?
Where can I download (and install) a copy of Windows XP SP2?
Is there any application that has compatibility issues with Windows XP SP2?
What are the patches found in this Windows XP SP2?
What is new in Windows XP SP2?
How do I install Windows XP SP2?
What is this so called Windows Firewall?
How do I know that the Windows Firewall is enabled in my system?
Can I disable the Windows Firewall?
With Windows Firewall turn on, do I still need to have an anti-virus software installed on my computer?
My computer stops responding when I restart to complete the installation of Windows XP Service Pack 2. What should I do?
I receive a "Stop: c0000135" and "winsrv was not found" error message after I install Windows XP Service Pack 2?
After installing SP2 and reboot my system, I receive this message "Your network administrator can unblock this program for you". Why is this so and what should I do?
When I am surfing to some websites using Internet Explorer, I notice that Internet Explorer does not display some of the pop-up windows? Why is this so and what should I do to display these pop-up windows?


What is the size of this Windows XP SP2?
The size of Windows XP SP2 (Service Pack 2) is about 270MB (back to top)


What is the minimum requirement for the system to run Windows XP SP2?
You need a PC running Microsoft Windows XP with at least 233-MHz processor, 64 MB of RAM and 1.6GB of available hard-disk space during installation. (back to top)


Can I upgrade my system with Windows XP SP2?
If you are using any application/software provided by your School, do a quick check with your School IT Support whether that application/software can run on Win XP SP2. Thereafter, proceed to the next question below.

Note: Before installing Windows XP SP2, it is strongly recommended to back up or make a copy of your data files. (back to top)

Do I have to install an earlier Service Pack 1 before installing Windows XP SP2?
No. (back to top)

Is there any patch that is required to install prior to SP2 installation?
Microsoft has issue a critical patch (KB885523) that will resolve compatibility issue with a non-Microsoft software application installed on your computer. Download and install this patch prior the installation of SP2. This download can be found
CODE
http://www.microsoft.com/downloads/details.aspx?amp;displaylang=en.&familyid=65875203-CF1B-4D32-8F32-E00D004659F6&displaylang=en


** NO ACTIVE LINKS - Ninja **

Microsoft has issue a non-security critical update (KB885626) that will help to resolve an issue where a limited number of systems running a BIOS without production support for Intel Pentium 4 and Intel Celeron D processors based on Prescott C-0 stepping that can potentially hang on Windows XP Service Pack 2 installation.
This download can be found at
CODE
http://support.microsoft.com/default.aspx?scid=kb
;[LN];885626 (back to top)
** NO ACTIVE LINKS - Ninja **

Where can I download (and install) a copy of Windows XP SP2?
You can download a copy of Windows XP SP2 from one of the following methods:
a. Microsoft Download Site
b. Windows Update
c. Automatic Update
d. CD Order Process from Microsoft
e. CITS Software Directory (back to top)

Is there any application that has compatibility issues with Windows XP SP2?
Microsoft has list out a list of programs that are known to have experience a loss of
functionality when running on Windows XP SP2. Click here for more details.

There is also a list of programs that may stop working after installing Win XP SP2.
Click here for the details. (back to top)

What are the patches found in this Windows XP SP2?
Please refer to the following Microsoft sites for the updates:
a. Security patches
b. Fixes (back to top)

What is new in Windows XP SP2?
This SP2 has improved security technologies that will withstand malicious viruses and worms attacks. These technologies include:
a. Network protection (protection against malicious attacks)
b. Memory protection (prevent buffer overruns)
c. E-mail handling (improved attachment control using AES API)
d. Browsing security (lock down Local Machine zone and turn on pop-up blocker)
e. Computer maintenance (keep computer with the latest security updated)

For greater details, please refer to Microsoft site here (back to top)

How do I install Win XP SP2?
After you have downloaded the Win XP SP2, the Setup Wizard will appear.
a. Note: Remember to protect or back up all data files
b. In the 'Welcome to Windows XP Service Pack 2 Setup Wizard', click Next.
c. In the 'License Agreement', select 'I Agree' and click Next.
d. In the next screen for 'Uninstalled Folders', click Next to proceed.
e. The system will proceed to do the inspection of your current configuration, archive your current files and update your files. This will take quite a while, so please wait patiently.
f. At the end of the installation, click Finish and this will reboot your system.
g. After rebooting, a firewall option screen may appear. Select the 'ON' radio button to proceed with the turning on the Windows Firewall.
h. Ensure that the security essentials are all turn ON (by clicking Start -> Control Panel -> Security Center) (back to top)

What is this so called Windows Firewall?
Windows Firewall (previously known as Internet Connection Firewall or ICF in Win XP) is a software-based, stateful filtering firewall for Microsoft Windows XP.

After the Win XP SP2 installation, this Windows Firewall is turned on by default.

Windows Firewall provides protection for computers that are connected to a network by preventing unsolicited inbound connections through TCP/IP. The Configuration options include:
a. Enabling static exceptions for ports
b. Enabling exceptions for applications
c. Configuring basic ICMP options
d. Logging dropped packets and successful connections (back to top)

How do I know that the Windows Firewall is enabled in my system?
Go to the Control Panel and click Security Center and check that the Firewall is ON

Alternatively, if you open up the LAN connection icon, you will notice a lock symbol being shown.

Can I disable the Windows Firewall?
You can manually turn it off, if you have the administrator rights. However, it is advisable to leave it on in order to minimize any virus, worms or trogons attacks.

With Windows Firewall turn on, do I still need to have an anti-virus software installed on my computer?
Even with Windows Firewall turn on, it is still necessary to have an anti-virus software installed in the computer. Windows Firewall is NOT a replacement for anti-virus software but acts as a compliment to anti-virus software. (back to top)

My computer stops responding when I restart to complete the installation of Windows XP Service Pack 2. What should I do?
This issue may occur if either (1) your computer uses an Intel Pentium 4 or Intel Celeron D processor that is based on Prescott C-0 processor stepping or (2) Your computer has a BIOS version that is out of specification.

Contact your computer manufacturer for an updated version of BIOS that provides production support for the processor that is installed in your computer or refer to Microsoft article
CODE
http://support.microsoft.com/default.aspx?scid=kb
;[LN];885626 for resolution.
(back to top)
** NO ACTIVE LINKS - Ninja **

I receive a "Stop: c0000135" and "winsrv was not found" error message after I install Windows XP Service Pack 2?
This problem may occur if either you have (1) T.V. Media (TvMedia.tvmbho) from Total Velocity Corporation is installed on your computer or (2) not installed Critical Update 885523 or (3) tried to install Windows XP SP2.

Refer to Microsoft article
CODE
http://support.microsoft.com/?kbid=885523
for resolution
(back to top)
** NO ACTIVE LINKS - Ninja **

After installing SP2 and reboot my system, I receive this message "Your network administrator can unblock this program for you". Why is this so and what should I do?
This is because you are not the administrator of this system. You should use an administrator account to log in to unblock this program.
After logging in as an administrator, you can either choose to 'Keep Blocking' this program or 'Unblock' this program or 'Ask Me Later' when I run that program again as shown below.

When I am surfing to some websites using Internet Explorer, I notice that Internet Explorer does not display some of the pop-up windows? Why is this so and what should I do to display these pop-up windows?
When you install SP2, the pop-up blocker is turned on in Internet Explorer. It will block most automcatic pop-ups but it will play a sound and show the Information Bar when a pop-up is blocked as shown below.

To temporarily or always allow pop-ups from that website, click the Information Bar when it notifies a pop-up has been blocked. Choose the correct setting as shown below.

If you choose to 'Always Allow Pop-ups from This Site', it will prompt you to confirm again to permanently trust this website to allow pop-ups. Click 'Yes' if you are sure.

হইতে মো. রানা হামিদ রাজশাহী বিশ্ববিদ্যালয় কম্পিউটার সায়েন্স এন্ড ইঞ্জিনিয়ারিং বিভাগ।

Lots Of Windows Xp Tips, Take A Look !



Lock XP Workstation (#1)

You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll, LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.

Remove Windows XP system software (#2)

XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

New commands (#3)

For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options -- they're all far too baroque to go into here.

Windows XP supports IPv6 (#4)

XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother.

Kill tasks from the command line (#5)

You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.

Enable ClearType by default (#6)

XP has ClearType -- Microsoft's anti-aliasing font display technology-- but doesn't have it enabled by default. It's well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry

HKEY_USERS/.DEFAULT/ControlPanel/Desktop/FontSmoothingType to 2.

Run program as different user (#7)

You can run a program as a different user without logging out and back in again. Right click the icon, select Run As... and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.

Speed up the Start Menu (#8)

The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.

Rename multiple files at once (#9)

You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetized groups by View, Arrange Icon By... Show In-Groups.

Show cover art in Media Player (#10)

Windows Media Player will display the cover art for albums as it plays the tracks -- if it found the picture on the Internet when you copied the tracks from the CD. If it didn't, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.

Display Hibernate Option on the Shut Down dialog (#11)

For some reason, Hibernate isn't available from the default Shut Down dialog. But you can enable it simply enough, by holding down the SHIFT key while the dialog is visible. Now you see it, now you don't!

Enable ClearType on the Welcome Screen! (#12)

As laptop users and other LCD owners are quickly realizing, Microsoft's ClearType technology in Windows XP really makes a big difference for readability. But the this feature is enabled on a per-user basis in Windows XP, so you can't see the effect on the Welcome screen; it only appears after you logon.

But you can fix that. Fire up the Registry Editor and look for the following keys:

(default user) HKEY_USERS \ .Default \ Control Panel \ Desktop \
FontSmoothing (String Value)
HKEY_USERS \ .Default \ Control Panel \ Desktop \
FontSmoothingType (Hexadecimal DWORD Value)

Make sure both of these values are set to 2 and you'll have ClearType enabled on the Welcome screen and on each new user by default.

Change User Picture (#13)

Click on the Icon at the top of the start menu. Select desired picture from resulting screen Windows 2000 style logon. To revert back to the Win2k style logon so you can log on as the administrator and other options, press ctrl+alt+delete twice at the logon screen. Change the location of the My Music or My Pictures folders:

In Windows 2000, Microsoft added the ability to right-click the My Documents folder and choose a new location for that folder in the shell. With Windows XP, Microsoft has elevated the My Music and My Pictures folders to the same "special shell folder" status of My Documents, but they never added a similar (and simple) method for changing those folder's locations. However, it is actually pretty easy to change the location of these folders, using the following method.

Open a My Computer window and navigate to the location where you'd like My Music (or My Pictures) to reside. Then, open the My Documents folder in a different window. Drag the My Music (or My Pictures) folder to the other window, and Windows XP will update all of the references to that folder to the new location, including the Start menu.

Protect Your Files From Unauthorized Users (#14)

Other users with permission to delete a file (users with Modify or Full Control permission) can't use your encrypted files-but they can make them difficult for you to use. Any such user can rename your files, which can make them difficult to find, and can also delete your files. (Even if the user merely deletes them to the Recycle Bin and doesn't remove them altogether, the deleted files are unavailable to you because you don't have access to any other user's Recycle Bin.) Therefore, if you're concerned about protecting your files from other authorized users as well as from a thief who steals your computer, you should modify the NTFS permissions to prevent any type of modification by other users.

Shutdown Your System in a Hurry (#15)

If you need to shut down in a hurry-or if a frozen application prevents you from shutting down in the normal ways-you can use the following procedure. Be aware, however, that you won't get an opportunity to save open documents. To perform an emergency shutdown, press Ctrl+Alt+Del to display Task Manager. Open the Shut down menu and hold down the Ctrl key as you click the Turn Off command. Poof! If your computer is part of a domain, the procedure is similar. Press Ctrl+Alt+Del and then hold down Ctrl when you click Shut Down. In this situation, you'll get a warning message pointing out-quite correctly-that this should be used only as a last resort.

Provide Personal Support (#16)

It never fails: when friends, co-workers, or family members discover that you're a Windows expert, you get pressed into service as an unpaid support technician. If the party asking for help is running any edition of Windows XP and has an active Internet connection, your job is much easier. Have the other person send you a Remote Assistance request; when you accept the request, you connect directly to their computer and can edit Registry settings, fix file associations, set System options, and perform just about any other troubleshooting or repair task, just as if you were sitting at the other person's desk.

Quickly Fix Connectivity Problems (#17)

Are you having trouble connecting to other computers on your local area network? If your network uses a hardware firewall that assigns IP addresses to each machine and you're certain you've configured all other components correctly, check to see whether the Internet Connection Firewall is enabled. That component can effectively block communication between PCs on the network.

Hack IE Title Bar (#18)

This can be an impressive bit of personalization. Use your name or moniker to brand Internet Explorer. Go to HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\ and left-click on Main to change the string "Window Title" to whatever you wish.

Unload DLLs (#19)

To prevent Windows from caching DLLs after the program using them has closed, follow this procedure: Navigate to
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ then left-click on Explorer. Right-click (as above) and create the DWORD

AlwaysUnloadDLL with a value of 1. This requires a reboot to take effect. This will allow memory to be used more efficiently.

Registry Hacks (#20)

Editing the Windows Registry, while much more common now than in years past, is still not to be entered into lightly. You can break Windows, cause boot failure. I know you're gonna do it anyway; why else would you be reading this. Just be careful, OK?

These are few because, for the most part WinXP can be customized through the interlace or with third-party freeware (as above).

All of the tips below require running regedit. To do so, hit 'Start/Run' then type 'regedit' and follow the instructions.

Naturally, I take no responsibility for any damage or loss of data incurred in the remote possibility that something goes terribly wrong.

The Ultimate Appearance Tweak (#21)

Microsoft said: "You can connect up to 10 monitors to your Windows XP-based computer and display numerous programs or windows at one time. You can use your mouse to move items from one monitor to another. You can open a different file on each monitor. Or several. Or you can stretch one item across several monitors; so for example, you can see more columns in a Microsoft Excel spreadsheet, or the entire layout of a Web page, without scrolling." Consider it. Monitors and PCI video cards are pretty cheap now. Windows recognizes the addition & allows easy adjustments on the 'Display Properties/Settings' menu.

Save Streaming Media (#22)

It's cool to listen to MP3s (or watch movies) over the Internet. Often, saving this media, however, seems impossible. Hey, if it plays on your computer, it's on your hard drive. Once the file is fully loaded and with folder view set to show hidden and systems folders, searches for the media (.mp3 or .mpg). There it is!

Securing the Paging File (#23)

If you're truly concerned about the possibility of your computer falling into the wrong hands, you should be sure that you don't leave any tracks in the paging file. By default, when you shut down your system, the paging file remains intact. People who've access to your computer could conceivably look through the unencrypted paging file to find information they shouldn't have.

Assign a Keyboard Shortcut (#24)

Click in the Shortcut Key field and press a keyboard combination that you want to use for launching or switching to this program. The shortcut key you assign must consist of one character key (a letter, number, or symbol) plus at least two of the following three keys: Ctrl, Alt, and Shift. (If you press a character key only, Windows automatically adds Ctrl+Alt.)

Shortcut keys work only when assigned to a program shortcut on the Start menu, the Programs menu, or the Desktop. The shortcuts you define will not work if it conflicts with a combination used in the program whose window has the focus.

Please remember, we cannot accept responsibility with what you decide to do with these tips. These tips act as a guide to tweaking and changing Windows XP from the default settings. If you are unsure about how to make these changes then don't meddle !

হইতে মো. রানা হামিদ রাজশাহী বিশ্ববিদ্যালয় কম্পিউটার সায়েন্স এন্ড ইঞ্জিনিয়ারিং বিভাগ।

How Did They All Get My Address?



While  your  mother  may have told you that a  person's  mail  is

private, in this day of computerized mailing lists, your name and

address   certainly  aren't.  Chances  are,   your   mailbox   is

overflowing with catalogs, sale notices, prize offers  and  other

"deals" which you never requested and may not want.


If  you  do not want others to have access to your name,  address

and  buying habits, or if you are tired of throwing away unwanted

mail,  there  are several steps you can take to get  off  mailing

lists.  You must be persistent, and you won't get rid of it  all.

But  you  can  substantially reduce the amount of junk  mail  you

receive.


How  did I get on these lists in the first place? How can  I  get

off?


Every time you provide your name and address to receive a product

or  service, there's a good chance you are being added to one  or

more  mailing  lists. When you buy a car, have  a  baby,  make  a

purchase  from a catalog, give money to a charity or fill  out  a

product registration card, your name is likely to be entered into

a computer data base.


Public  records.  When  you make virtually  any  major  lifestyle

change,  a  government agency records the event. Many such  files

are  open  to the public, including: birth certificates, marriage

licenses,  home  sales records, and the Post Office's  change  of

address  form. Public records are one way companies selling  baby

items,  for example, can mail advertisements to new parents  just

days after the birth of a child.


      Mail-reduction  tips.  You usually cannot  have  government

records about you kept confidential. Therefore, contact companies

individually  when they put you on a mailing list  compiled  from

public records. For example, if you buy a house and receive  home

improve-ment and insurance solicitations you do not want, you can

do three things: (1) Write to the company and ask to be taken off

its   mailing  list.  (2)  Envelopes  with  "Address   Correction

Requested"  or  "Return  Postage  Guaranteed"  can  be   returned

unopened  by writing "Refused--Return to Sender" on the envelope.

The company will have to pay the return postage. (3) If there  is

a postage-paid return envelope, put all of the information in the

return  envelope  with a note that you wish  to  have  your  name

removed from the mailing list.


The  Post  Office makes its change of address file  available  to

major  mailing  list companies. To avoid receiving  solicitations

aimed at "new movers," contact friends, family and companies with

whom  you  do  business directly and do not  fill  out  the  Post

Office's change of address form.

Mail order, credit cards and magazines. If you are on the mailing

list  of one mail order company, you are likely to be on the list

of  several. Most mail order firms "rent" their mailing  list  to

other  businesses.  Many credit card companies  also  rent  their

mailing lists, as do magazines. Therefore, if you subscribe to  a

cooking  magazine,  you may find yourself  receiving  mail  order

catalogs for kitchen supplies and food specialties.


       Mail-reduction   tips.  Write  to  the  Direct   Marketing

Association's  (DMA)  Mail Preference  Service,  P.O.  Box  9008,

Farmingdale,  NY 11735. Tell the DMA you do not want  to  receive

catalogs  and other promotional material through the  mail.  They

will  put  you into the "delete" file which is sent to the  DMA's

member organizations four times a year.


Companies  that  do  not  participate  in  the  Direct  Marketing

Association  program  must  be  contacted  directly.  Notify  the

company's customer service department and request that your  name

and  address  not  be  provided to other companies.  Be  sure  to

contact  magazines to which you subscribe as well  as  charities,

nonprofit  organizations and community groups to which  you  have

either donated money or joined.


Many  credit card companies will delete your name from the  lists

they rent and sometimes even from the list they use to send their

own   promotional  materials  to  their  customers.  (They  will,

however,  continue to send you your bill.) Write to the  customer

service  department  and request your name be  removed  from  the

lists they rent to others and from their "in-house" mailing list.


Credit  bureaus.  Companies with whom  you  do  business  provide

information  to credit bureaus on how much you owe, how  promptly

you  pay  your bills and the types of purchases you  make.  While

many  credit  bureaus rent lists, they do not  disclose  specific

information such as what you owe or to whom. Rather, they compile

lists  based on consumer characteristics. An example would  be  a

list  of  people who have an income of over $30,000 a  year,  use

credit  cards  and pay their bills on time. If you  fall  into  a

category such as this, you may receive "pre-approved" credit card

offers in the mail.


      Mail-reduction tips. The three major credit reporting firms

are:  Equifax, Trans Union and TRW. Write to each and ask  to  be

removed from their marketing mailing lists.


     o    Equifax  Options,  Equifax Marketing Decision  Systems,

          Inc., P.O. Box 740123, Atlanta, GA 30374-0123.

     o    Trans  Union - 555 West Adams St., 8th Floor,  Chicago,

          IL 60661.

     o    TRW,  Target  Marketing Services Division,  Attn:  Mail

          Preference Service,

          901 N. International Parkway, Suite 191, Richardson, TX

75081.


Registration   cards.   Be  aware  that  warranty   or   "product

registration" cards have less to do with warranties than they  do

with  mailing  lists. These cards may ask you  what  hobbies  you

have,  how  many people are in your household and your  household

income--information  the company obviously does  not  require  to

guarantee the product.


Such  registration cards are generally not mailed to the  company

that  manufactured the product, but to a post office box  of  the

National Demographics and Lifestyles Company in Denver, Colorado.

This company compiles buyer profiles and sells the information to

other companies for marketing purposes.


      Mail-reduction tips. When you buy a product, don't fill out

the product registration card. In most cases your receipt ensures

that you are covered by the warranty if the product is defective.

If you decide to send the registration card, include only minimal

information--name, address, date of purchase and  product  serial

number.  (For some products you may want the company  to  have  a

record of your purchase in case there is a safety recall.)


Also, write to National Demographics and Lifestyles and ask  them

to delete you from their mailing lists: National Demographics and

Lifestyles,  List Order Department, 1621 18th Street,  Suite  300

Denver, Colorado 80202.


Price  scanners. A new way of compiling mailing lists  and  buyer

profiles is through price scanners. Scanners help businesses keep

track  of  their  inventory and speed service  at  the  check-out

counter.  They  can  also  be used to  link  your  name  to  your

purchases, especially if you are using the store's "buyers  club"

card.


When  this card is "swiped" through the card reader at the check-

out  stand, your name and address, stored in the card's  magnetic

strip,  are matched against a record of the scanned items. Stores

generally  offer  product discounts as an incentive  to  use  the

card.


The  store  may  use this information to mail coupons  and  other

special  offers  to  you and share the information  with  product

manufacturers. So, for example, if you buy one type  of  soda  at

the  grocery  store you might receive coupons from a  rival  soft

drink company to induce you to switch brands.


     Mail-reduction tips. If you do not want information compiled

about  your  personal  buying habits through  the  use  of  price

scanners, don't participate in the store's "buyers club." You may

also  want  to  pay cash at businesses which use scanners,  since

technology  may allow the company to store your name and  address

if you pay by check or credit card.


Phone  books.  If  you  are listed in  the  White  Pages  of  the

telephone book, your name, address and phone number are, for  all

practical purposes, public record. Mailing list companies collect

this  information  and  sell  it  to  mail  order  companies  and

marketing  firms.  In  addition to the  White  Pages,  the  phone

company  and  other  companies compile directories  organized  by

address  and phone number rather than by name. If you are  listed

in  the White Pages, you are also in one or more of these "street

address directories."


     Mail-reduction tips. If you are concerned about keeping your

name and address private, consider having an unlisted number.  Or

request  that the local phone company publish just your name  and

phone  number and omit your address. In addition, ask  the  phone

company   to  remove  your  listing  from  its  "street   address

directory."  Also,  write  to the major directory  companies  and

request that your listing be removed:


     o    Haines  & Co., Criss-Cross Directory, 2382 East  Walnut

          Ave., Fullerton,

          CA 92631.

     o    R.  L. Polk & Co., List Compilation & Development, 6400

          Monroe Blvd., Taylor, MI 48180-1814.

     o    Rueben  H.  Donnelley Corp., 287 Bowman Ave., Purchase,

          NY 10577.


Mailing  list  companies. There are a number of  companies  which

purchase   and  collect  information  from  government   records,

telephone   books,  association  membership  rosters  and   other

sources.  They compile mailing lists and sell them for  marketing

purposes.


      Mail-reduction tips. To be removed from the  lists  of  the

major companies that sell mailing lists, write to these firms:


     o    R.L.  Polk  &  Company, List Compilation & Development,

          6400 Monroe Blvd., Taylor, MI 48180-1814.

     o    Donnelley  Marketing, Inc., Data Base Operations,  1235

          "N" Ave., Nevada, IA 50201-1419.

     o    Metromail  Corp.,  List  Maintenance,  901  West  Bond,

          Lincoln, NE 68521.

     o    Database   America,  Comp.  Dept.,  100  Paragon   Dr.,

          Montvale, NJ 07645-0419.

     o    Dunn  &  Bradstreet,  Customer Svc.,  899  Eaton  Ave.,

          Bethleham, PA 18025.


What if I only want to stop part of my junk mail?


Junk mail is only junk when you don't want to receive it. You may

want to be on some mailing lists.


If  you  want  to receive some of this mail, do not  contact  the

Direct  Marketing Association and ask to be taken off all mailing

lists.  Rather, notify companies individually and tell  them  you

want your name removed from their lists. Also, tell the companies

you  do  business with to keep your name and address  private.  A

growing  number of businesses which rent their mailing lists  are

including statements in their catalogs to let you know  you  have

this option.


হইতে মো. রানা হামিদ রাজশাহী বিশ্ববিদ্যালয় কম্পিউটার সায়েন্স এন্ড ইঞ্জিনিয়ারিং বিভাগ।

Make A Autorun File For Ur Cd


If you wanna make a autorun file for that CD you are ready to burn just read this...

1) You open notepad

2) now you writ: [autorun]
OPEN=INSTALL\Setup_filename.EXE
ICON=INSTALL\Setup_filename.EXE

Now save it but not as a .txt file but as a .inf file.

But remember! The "Setup_filename.EXE" MUST be replaced with the name of the setup file. And you also need to rember that it is not all of the setup files there are called '.exe but some are called '.msi

3) Now burn your CD with the autorun .inf file included.

4) Now set the CD in you CD drive and wait for the autorun to begin or if nothing happens just double-click on the CD drive in "This Computer"

হইতে মো. রানা হামিদ রাজশাহী বিশ্ববিদ্যালয় কম্পিউটার সায়েন্স এন্ড ইঞ্জিনিয়ারিং বিভাগ।

Microsoft's Really Hidden Files, Reveled Hidden files


Microsoft's Really Hidden Files:  A New Look At Forensics. (v2.5b)
By The Riddler
October 14, 2001  (v2.0 finished May 16, 2001; v1.0 finished June 11, 2000)

Written with Windows 9x in mind, but not limited to.

DISCLAIMER:

I will not be liable for any damage or lost information, whether due to
reader's error, or any other reason.

SUMMARY:

There are folders on your computer that Microsoft has tried hard to keep
secret.  Within these folders you will find two major things:  Microsoft
Internet Explorer has been logging all of the sites you have ever visited --
even after you've cleared your history, and Microsoft's Outlook Express has
been logging all of your e-mail correspondence -- even after you've erased
them from your Deleted Items bin.  (This also includes all incoming and
outgoing file attachments.)  And believe me, that's not even the half of it.

When I say these files are hidden well, I really mean it.  If you don't have
any knowledge of DOS then don't plan on finding these files on your own.  I
say this because these files/folders won't be displayed in Windows Explorer at
all -- only DOS.  (Even after you have enabled Windows Explorer to "view all
files.")  And to top it off, the only way to find them in DOS is if you knew
the exact location of them.  Basically, what I'm saying is if you didn't know
the files existed then the chances of you running across them is slim to
slimmer.

It's interesting to note that Microsoft does not explain this behavior
adequately at all.  Just try searching on microsoft.com.

FORWARD:

I know there are some people out there that are already aware of some of the
things I mention.  I also know that most people are not.  The purpose of this
tutorial is teach people what is really going on with Microsoft's products and
how to take control of their privacy again.  This tutorial was written by me,
so if you see a mistake somewhere then it is my mistake, and I apologize.

Thanks for reading.

INDEX:

1) DEFINITIONS AND ACRONYMS
2) WHY YOU SHOULD ERASE THESE FILES
3) HOW TO ERASE THE FILES ASAP
   3.1) If You Own Microsoft Internet Explorer
   3.2) Clearing Your Registry
   3.3) If You Own Outlook Express
   3.4) Slack files
   3.5) Keeping Microsoft's Products
4) STEP-BY-STEP GUIDE THROUGH YOUR HIDDEN FILES (For the savvy.)
5) A LOOK AT OUTLOOK
6) HOW MICROSOFT DOES IT
7) +S MEANS [S]ECRET NOT [S]YSTEM.
8) THE TRUTH ABOUT FIND FAST
   8.1) Removing Find Fast
9) CONTACT INFORMATION AND PGP BLOCKS
   9.1) Recommended reading
10) SPECIAL THANKS
11) REFERENCES

Coming Soon:

ù pstores.exe
ù Related Windows Tricks.
ù The NSA-Key.
ù Researching the [Microsoft Update] button.
ù Why the temp folders aren't intended to be temporary at all.
ù What's with Outlook Express's .dbx database files?
ù Win2k support.


1. DEFINITIONS AND ACRONYMS

Well, the best definition I have been able to come up with is the following:

I) A "really hidden" file/folder is one that cannot be seen in Windows
Explorer after enabling it to "view all files," and cannot be seen in MS-DOS
after receiving a proper directory listing from root.

   a) There is at least one loophole to enabling Windows Explorer to see them.
   B) There is at least one loophole to enabling MS-DOS to see them.

(Interesting to note that the "Find: Files or Folders" utility cannot even
search through one of these folders.  It doesn't even exist on the [Browse]
menu.)

II) Distinguishes "really hidden" file/folders from just plain +h[idden] ones,
such as your "MSDOS.SYS" or "Sysbckup" folder.

III) Distinguishes from certain "other" intended hidden files, such as a file
with a name with high ascii characters (eg, "?ëï¨?").

DOS = Disk Operating System
MSIE = Microsoft Internet Explorer
TIF = Temporary Internet Files (folder)
HD = Hard Drive
OS = Operating System


2. WHY SHOULD I ERASE THESE FILES?

Just from one of these files I would be able to tell you which web sites you
previously visited, what types of things you search for in search engines, and
probably gather your ethnicity, religion, and sexual preference.  Needless to
say, one can build quite a profile on you from these files.  It has the
potential to expose and humiliate -- putting your marriage, friendship, and
corporation at risk.  Here's one good example of the forensic capabilities...

------------------------------------------------------------------------------

"I've been reading your article as I have a problem with an employee of mine.
He has been using the works pc for the internet and using it to chat and look
at porn sites.  He was then deleting the cookies and history in order to cover
his tracks.  A friend of mine pointed me in the direction of this site and
your article.  I have found it to be incredibly useful,..."

--Concerned Boss, 8/24/01

------------------------------------------------------------------------------


3. HOW TO ERASE THE FILES ASAP

Step by step information on how to erase these files as soon as possible.
This section is recommended for the non-savvy.  Further explanation can be
found in Section 4.0.  Please note that following these next steps will erase
all your cache files and cookies files.  If you use the offline content
feature with MSIE, it will remove this as well.  It will not erase your
bookmarks.


3.1. IF YOU OWN A COPY OF MICROSOFT INTERNET EXPLORER

1) Shut your computer down, and turn it back on.
2) While your computer is booting keep pressing the [F8] key until you are
given an option screen.
3) Choose "Command Prompt Only"  This will take you to real DOS mode.  ME
users must use a bootdisk to get into real DOS mode.
4) When your computer is done booting, you will have a C:\> followed by a
blinking cursor.  Type in this hitting enter after each line (sans
parenthesis):

C:\WINDOWS\SMARTDRV (Loads smartdrive to speed things up.)
CD\
DELTREE/Y TEMP (this line removes temporary files.)
CD WINDOWS
DELTREE/Y COOKIES (This line removes cookies.)
DELTREE/Y TEMP (This removes temporary files.)
DELTREE/Y HISTORY (This line removes your browsing history.)
DELTREE/Y TEMPOR~1

(If this last line doesn't work then type this:)

CD\WINDOWS\APPLIC~1
DELTREE/Y TEMPOR~1

(If this doesn't work then type this:)

CD\WINDOWS\LOCALS~1
DELTREE/Y TEMPOR~1

(If this still does not work, and you are sure you are using MSIE5.x, then
please e-mail me.  Finding the location of these may be difficult and I'd
certainly like to know where else MSIE likes to hide its cache.  I believe
older versions of MSIE keep them under "\windows\content\".)

This last one will take a ridiculous amount of time to process.  The reason it
takes so incredibly long is because there is a ton of semi-useless cache
stored on your HD.


3.2. CLEARING YOUR REGISTRY

It was once believed that the registry is the central database of Windows that
stores and maintains the OS configuration information.  Well, this is wrong.
Apparently it also maintains a bunch of other doo-dah that has absolutely
nothing to do with the configuration.  I won't get into the other stuff, but
for one, your Typed URLs are stored in the registry.

HKEY_USERS/Default/Software/Microsoft/Internet Explorer/TypedURLs/
HKEY_CURRENT_USER/Software/Microsoft/Internet Explorer/TypedURLs/

These "Typed URLs" come from MSIE's autocomplete feature.  It records all URLs
that you've typed in manually in order to save you some time filling out the
address field.  By typing "ama" the autocomplete feature might bring up
"amazon.com" for you.  Although, I find it annoying, some people prefer this
feature.  One thing is for sure, however -- it's an obvious privacy risk.  You
wouldn't want a guest to type "ama" and have it autocomplete
"amaturemudwrestlers.com" now would you?

You can clear your Typed URLs out of your registry by doing going to Tools >
Internet Options > Content > [AutoComplete] > and finally [Clear Forms] under
MSIE.  If you do not like the AutoComplete feature then uncheck the
appropriate boxes here.


3.3. IF YOU HAVE OUTLOOK OR OUTLOOK EXPRESS INSTALLED

Microsoft's e-mail clients DO NOT delete your messages until a) you really
know how, and B) you go through the redundant process.  And besides this,
there's the glaring e-mail virus problems (in which virtually all other e-mail
client's are immune to.)  This, alone, should be enough to want to strangle
Slick Willy -- as I like to call him.

My suggestion?

1) Install another e-mail program like Eudora or Pegasus Mail.  Make sure
everything is setup correctly.  (www.eudora.com / www.pmail.com)
2) Backup any e-mail and address books that you wish to save by making use of
the export/import features.
3) Uninstall Outlook.

Warning:  Simply uninstalling Outlook does not erase any of your e-mail
correspondence.  The database files are still there on your hard drive.  To
find them open up a DOS window and type this:

dir *.mbx /s/p
The files you are looking for are:

INBOX.MBX
OUTBOX.MBX
SENTIT~1.MBX
DELETE~1.MBX
DRAFTS.MBX

If these files come up they should be listed in either of these folders:

C:\Windows\Application Data\Microsoft\Outlook Express\Mail\
C:\Program Files\internet mail and news\%USER%\mail\

Now type either of the following (depending on the location of your .mbx
files...)

*Remember, this will erase all your e-mail correspondence so backup what you
want to keep.  By now you should have already imported your mail into Eudora,
or Pegasus Mail.

CD\WINDOWS\APPLIC~1\MICROS~1\OUTLOO~1
DELTREE/Y MAIL

or

CD\PROGRA~1\INTERN~1\%USER%

(replace "%user%" with the proper name.)

DELTREE/Y MAIL

If you have newer versions of Outlook or Outlook Express the databases are
*.dbx, or *.pst files.  Five times as creepy as the *.mbx files.  I recommend
that you take a look at them yourself.)


3.4. SLACK FILES

As you may already know, deleting files only deletes the references to them.
They are in fact still sitting there on your HD and can still be recovered by
a very motivated person.

ù BCWipe is a nice program that will clear these files.  (www.bcwipe.com).
ù For you DOS buffs, there's a freeware file wiper on simtel.net that I use.
(www.simtel.net/pub/dl/45631.shtml).
ù If you are using PGP then there is a "Freespace Wipe" option under PGPtools.
ù The latest version of Norton Utilities has a nice filewiping utility.
ù You might want to check out Evidence Eliminator's 30 day trial.  This is
probably the best program as far as your privacy goes.
(www.evidence-eliminator.com)


3.5. KEEPING MICROSOFT'S PRODUCTS

If you insist on using Microsoft Internet Explorer then I strongly recommend
that you check out at least one of these programs:

ù PurgeIE (www.aandrc.com/purgeie)
ù Cache and Cookie Cleaner for IE (www.webroot.com/washie.htm)
ù Anonymizer Window Washer (www.anonymizer.com/anonwash)

Other programs that claim to clear your history don't seem to work, although
I haven't run any tests in a while.

And if you insist on using Outlook or Outlook Express then you should get in
the habit of compacting your mailboxes.

You can do this by going to File > Folder > Compact All if you have Outlook
Express.

or

Tools > Options > Other tab > [Auto Archive] if you have Outlook.  Make sure
to set things up here.


4. STEP-BY-STEP GUIDE THROUGH YOUR HIDDEN FILES

This next section is for those of you who are more interested in learning the
ins and outs of your computer.  This section is intended for the savvy user.

The most important files to be paying attention to are your "index.dat" files.
These are database files that reference your history, cache and cookies.  The
first thing you should know is that the index.dat files is that they don't
exist in less you know they do.  They second thing you should know about them
is that some will *not* get cleared after deleting your history and cache.

The result:

A log of your browsing history hidden away on your computer after you thought
you cleared it.

To view these files, follow these steps:

In MSIE 5.x, you can skip this first step by opening MSIE and going to Tools >
Internet Options > [Settings] > [View Files].  Now write down the names of
your alphanumeric folders on a peice of paper.  If you can't see any
alphanumeric folder names then start with step 1 here:

1) First, drop to a DOS box and type this at prompt (in all lower-case) to
bring up Windows Explorer under the correct directory...

c:\windows\explorer /e,c:\windows\tempor~1\content.ie5\

You see all those alphanumeric names listed under "content.ie5?" (left-hand
side.)  That's Microsoft's idea of making this project as hard as possible.
Actually, these are your alphanumeric folders that was created to keep your
cache.  Write these names down on a peice of paper.  (They should look
something like this:  6YQ2GSWF, QRM7KL3F, U7YHQKI4, 7YMZ516U, etc...)  If you
click on any of the alphanumeric folders then nothing will be displayed.  Not
because there aren't any files here, but because Windows Explorer has lied to
you.  If you want to view the contents of these alphanumeric folders you will
have to do so in DOS.  (Actually, this is not always true.  *Sometimes*
Windows Explorer will display the contents of the alphanumeric folders -- but
mostly it won't.  I can't explain this.)

2) Then you must restart in MS-DOS mode.  (Start > Shutdown > Restart in
MS-DOS mode.  ME users use a bootdisk.)

Note that you must restart to DOS because windows has locked down some of the
files and they can only be accessed in real DOS mode.

3) Type this in at prompt:

CD\WINDOWS\TEMPOR~1\CONTENT.IE5
CD %alphanumeric%
(replace the "%alphanumeric%" with the first name that you just wrote down.)

DIR/P

The cache files you are now looking at are directly responsible for the
mysterious erosion of HD space you may have been noticing.  One thing
particularly interesting is the ability to view some your old e-mail if you
happen to have a hotmail account.  (Oddly, I've only been able to retreive
hotmail e-mail, and not e-mail from my other web-based e-mail accounts.  Send
me your experiences with this.)  To see them for yourself you must first copy
them into another directory and then open them with your browser.  Don't ask
me why this works.

A note about these files:  These are your cache files that help speed up
your internet browsing.  It is quite normal to use this cache system, as every
major browser does.  On the other hand.  It isn't normal for some cache files
to be left behined after you have instructed your browser to erase it.

5) Type this in:

CD\WINDOWS\TEMPOR~1\CONTENT.IE5
EDIT /75 INDEX.DAT

You will be brought to a blue screen with a bunch of binary.

6) Press and hold the [Page Down] button until you start seeing lists of URLs.
These are all the sites that you've ever visited as well as a brief
description of each.  You'll notice it records everything you've searched for
in a search engine in plain text, in addition to the URL.

7) When you get done searching around you can go to File > Exit.

8) Next you'll probably want to erase these files by typing this:

C:\WINDOWS\SMARTDRV
CD\WINDOWS
DELTREE/Y TEMPOR~1

(replace "cd\windows" with the location of your TIF folder if different.)

This will take a seriously long time to process.  Even with smartdrive loaded.

9) Then check out the contents of your History folder by typing this:

CD\WINDOWS\HISTORY\HISTORY.IE5
EDIT /75 INDEX.DAT

You will be brought to a blue screen with more binary.

10) Press and hold the [Page Down] button until you start seeing lists of URLS
again.

This is another database of the sites you've visited.

11) And if you're still with me type this:

CD\WINDOWS\HISTORY

12) If you see any mmXXXX.dat files here, then check them out (and delete
them.) Then...

CD\WINDOWS\HISTORY\HISTORY.IE5
CD MSHIST~1
EDIT /75 INDEX.DAT

More URLs from your internet history.  Note, there are probably other mshist~x
folders here.

3) You can repeat these steps for every occurrence of a mshist~x folder.

4) By now you'll probably want to type in this:

CD\WINDOWS
DELTREE/Y HISTORY

This is about it as far as I know.  You may also want to take a look at your
*.mbx files if you own Outlook.  (dir *.mbx/s)  All your e-mail correspondence
and file attachments are located within these database files.  More detailed
information is covered in the next section.


5. A LOOK AT OUTLOOK EXPRESS

Would you think twice about what you said if you knew it was being recorded?
E-mail correspondence leaves a permanent record of everything you've said --
even after you've told Outlook Express to erase it.  You are given a false
sense of security sense you've erased it twice, so surely it must be gone.
The first time Outlook simply moves it to your "Deleted Items" folder.  The
second time you erase it Outlook simply "pretends" it is gone.  The truth is
your messages are still being retained in the database files on your hard
drive.  (Same with your e-mail attachments.)

For earlier versions of Outlook Express, they will be located in either of
the following folder:

c:\program files\internet mail and news\%user%\mail\*.mbx

(replace %user% with the name you use.)

or if your lucky, it will be located here:

c:\windows\application data\microsoft\outlook\mail\*.mbx

At this point you have two choices.

a)  Get in the habit of compacting your folders all the time.
B)  Import the data into another e-mail client such as Pegasus Mail or Eudora
and then delete the mbx files (and thus all your e-mail correspondence) by
typing this:

cd\windows\intern~1\%user%\mail
deltree/y mail

or

cd\windows\applic~1\micros~1\outloo~1\
deltree/y mail

*Typing in the above commands will kill all your e-mail correspondence.  Do
not follow those steps in less you have already exported your e-mail and
address book!


6. HOW MICROSOFT DOES IT

TIP:  Study this section if you would like to learn how to obscure your files
using Windows' own built-in mechanisms.

How does Microsoft make these folders/files invisible to DOS?

The only thing Microsoft had to do to make the folders/files invisible to a
directory listing is to set them +s[ystem].  That's it.  As soon as the dir/s
command hits a system folder, it renders the command useless (unlike normal
folders.)  A more detailed explanation is given in Section 7.

So how does Microsoft make these folders/files invisible to Windows Explorer?

The "desktop.ini" is a standard text file that can be added to any folder to
customize certain aspects of the folder's behavior.  In these cases, Microsoft
utilized the desktop.ini file to make these files invisible.  Invisible to
Windows Explorer and even to the "Find: Files or Folders" utility (so you
wouldn't be able to perform searches in these folders!)  All that Microsoft
had to do was create a desktop.ini file with certain CLSID tags and the
folders would disappear like magic.

To show you exactly what's going on:

Found in the c:\windows\temporary internet files\desktop.ini and the
c:\windows\temporary internet files\content.ie5\desktop.ini contains this
text:

[.ShellClassInfo]
UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933}

Found in the c:\windows\history\desktop.ini and the
c:\windows\history\history.ie5\desktop.ini contains this text:

[.ShellClassInfo]
UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933}
CLSID={FF393560-C2A7-11CF-BFF4-444553540000}

The UICLSID line cloaks the folder in Windows Explorer.  The CLSID line
disables the "Find" utility from searching through the folder.  (Additionally,
it gives a folder the appearance of the "History" folder.)

To see for yourself, you can simply erase the desktop.ini files.  You'll see
that it will instantly give Windows Explorer proper viewing functionality
again, and the "Find" utility proper searching capabilities again.  Problem
solved right?  Actually, no.  As it turns out, the desktop.ini files get
reconstructed every single time you restart your computer.  Nice one, Slick.

Luckily there is a workaround which will keep Windows from hiding these
folders.  You can manually edit the desktop.ini's and remove everything except
for the "[.ShellClassInfo]" line.  This will trick windows into thinking they
have still covered their tracks, and wininet won't think to reconstruct them.

I can't stress how rediculous it is that Windows actually makes sure the files
are hidden and in place on every single boot.  No other files or folders get
this kind of special treatment.  What's the agenda, here?


7. +S MEANS [S]ECRET NOT [S]YSTEM

Executing the "dir/a/s" command from root *should* be the correct command to
display all files in all subdirectories in DOS.  However, doing so will not
display the index.dat files.  This is because when DOS tries to get a list of
the subdirectories of any +s[ystem] folder it hits a brick wall.  No files or
folders will be listed within any system folder.  Not only does this defeat
the whole purpose of the "/s" switch in the first place, but I'd say it looks
like Microsoft took extra precautions to keep people from finding the files.
Remember.  The only thing you need to do to obscure a file in DOS is to mark
the parent directory +s[ystem].

I was told by a few people that this was due to a very old DOS bug that dates
back many years.  Fine.  I can accept that.  A bug it is.

But, would you consider your Temporary Internet Files to be "system files?"
It would seem that your TIF folder appears to be marked +s[ystem] for no good
reason at all.  Just because.  Same with your history folder.  Just because.
You may not agree, but I tend to think that Microsoft marked the folders as
+s[ystem] solely to hide any directory recursal from DOS.

In case you didn't understand, here's a small experiment that will show you
what I mean...

Since the content.ie5 and history.ie5 subfolders are both located within a
+s[ystem] folder, we will run the experiment with them.  The proper command to
locate them *should* be this:

CD\
DIR *.IE5 /as/s

The problem is that you will receive a "No files found" error message.

Since we already know there is a content.ie5 subfolder located here, why is
it giving me the "no files found" message?

But there is a way to get around this brick wall.  That is, once you are
inside the system directory, then it no longer has an effect on the dir
listings.  For example, if you enter the system folder first, and THEN try to
find any +s[ystem] directories you can see them just fine:

CD\WINDOWS\TEMPOR~1
DIR *.IE5 /as/s

1 folder(s) found.

Now you will get a "1 folder(s) found." message.  (But only after you knew the
exact location.)

In other words, if you didn't know the files existed then finding them would
be almost impossible.

And, by the way.  To see the "bug" in progress...

CD\
DIR *.IE5 /as/s

It will echo "no files found."

Now, just take away the system attributes from the parent directory...

CD\WINDOWS
ATTRIB -S TEMPOR~1

And retry the test...

CD\
DIR *.IE5 /as/s

It will echo "1 folder(s) found."


8. THE TRUTH ABOUT FIND FAST

Have you ever wondered what that "Find Fast" program was under your control
panel?  Here's a hint:  It has NOTHING to do with the "Find: Files or Folders"
utility located under the [Start] menu.  Up until last month I honestly
thought it was completely useless, but it was finally adequately explained to
me...

------------------------------------------------------------------------------

"In any version of Word after 95, choose File Open and you'll get the Office
App Open dialog.  Instead of just a space for the file name, there are text
boxes for file name, files of type, text or property & last modified.  These
are search criteria you can use to find one or more files.  There is also an
"Advanced" button that opens a dedicated search dialog with more options.
When you use either of these dialogs to perform a search, that search process
uses the indexes built by Find Fast."

--Oblivion

------------------------------------------------------------------------------

That sure answered a lot.  Now instead of a "completely useless resource hog,"
I realize Find Fast actually does serve some purpose.

But what would you say if I told you that Find Fast was scanning every single
file on your hard drive?  Did you know that in Office 95, the Find Fast
Indexer had an "exclusion list" comprised of .exe, .swp, .dll and other
extensions, but the feature was eliminated?  If you were a programmer would
you program Find Fast to index every single file, or just the ones with Office
extensions?

FYI:  If you have ever had problems with scandisk or defrag restarting due to
disk writes, it is because Find Fast was indexing your hard drive in the
background.  It loads every time you start your computer up.

Now here is a good example of the lengths Microsoft has gone through to keep
people from finding out Find Fast is constantly scanning and indexing their
hard drives. (Always good to have an alibi.)  Here's a snippet taken from
microsoft.com:

"When you specify the type of documents to index in the Create Index dialog
box, Find Fast includes the document types that are listed in the following
table.

Document type                  File name extension
-------------                  -------------------

MS Office and Web Documents    All the Microsoft Excel, Microsoft
                               PowerPoint, Microsoft
                               Project, and Microsoft Word document types
                               listed in this table. Microsoft Binder
                               (.odb, .obt) and Microsoft Access (.mdb)
                               files. Note that in .mdb files, only
                               document properties are indexed.

Word documents                 .doc (document),
                               .dot (template), .ht* (Hypertext Markup
                               Language document), .txt (text file), .rtf
                               (Rich Text Format) files, Excel workbooks
                               .xl* files

PowerPoint                     .ppt (presentation), .pot (template), .pps
                               (auto-running presentation) files

Microsoft Project files        .mpp, .mpw, .mpt, .mpx, .mpd files

All files                      *.* files"


Did you get that last part?  "All files?"  Find Fast indexes Office Documents,
Web documents, Word Documents, Power Point files, Project files, and (oh I
forgot) EVERY SINGLE other file on your computer.

Actually, the good news is that this isn't neccessarily true.  In another
statement, Microsoft claims that if Find Fast deems the file "unreadable" then
the file will not be included in the index.  For example, your command.com
probably wouldn't get indexed because it doesn't have a lot of plain text --
mostly binary.

But, back to the bad news.  Every single file that has legible text is going
to be included in the Find Fast database.  Do you understand the implication
here?  Well, if you don't, then maybe you should check out those Find Fast
database files -- because acording to Microsoft, ALL TEXT SAVED TO YOUR HARD
DRIVE IS INDEXED.  Do you see the forensic capabilities now?  And don't forget
"all text" also means previously visited webpages from your cache.  See for
yourself...

1) Open up a DOS window and type...
2) CD\
3) DIR FF*.* /AH (This will bring up a list of the find fast databases.)
4) EDIT /75 %ff% (insert %ff% with any of the names that were listed.)

Notice the incredible amount of disk accesses to your cache and history
folders?  Why do we need two indexes?


8.1. REMOVING THE FIND FAST PROGRAM

You can remove Find Fast using your Office CD, but I recommend you do it
manually...

1)  Reboot your computer in MS-DOS Mode.
2)  Delete the findfast.cpl file from c:\windows\system\
3)  Delete the shortcut (.lnk) under c:\windows\start menu\programs\startup\
4)  Delete the findfast.exe file from c:\progra~1\micros~1\office\
5)  Delete the find fast databases in your root, by typing this:

cd\
deltree ff*.*

6)  You can also safely delete FFNT.exe, FFSetup.dll, FFService.dll, and
FFast_bb.dll if you have them.

Feel free to check out the ffastlog.txt (which is the Find Fast error log).
It's a +h[idden] file under c:\windows\system\.


9. CONTACT INFO AND PGP BLOCKS

This tutorial is being updated all the time.  If you have any useful input, or
if you see a mistake somewhere, then please e-mail me so I can compile it into
future versions.  You will be able to find the most recent version of this
tutorial at fuckmicrosoft.com

My e-mail address is located at the end of this note.  Please let me know
where you heard about this tutorial in your message.  If you have something
important to say to me, then please use encryption.  My public key blocks are
located below.

Thanks for reading,

-- The Riddler
Contact:  theriddler@fuckmicrosoft.com

My PGP 2.6.2 Block:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2

mQCNAzu4wRAAAAEEAJnvaDDA9PydmZnnAmo80XZL57OycoCndppYyMv6CBMh+U35
NYtOxFfQiH8JhUN8uF3FgGBxckG0vBJ+RsYBIBXaP/JdxLX4qQnTsByyPEkoIomW
QCDfWXBMbFXxEKc1mrVTRmXpANpIjsj557qzW7dXxuvd5/E/bhviYkNfEe49AAUR
tAt0aGUgcmlkZGxlcg==
=B7ib
-----END PGP PUBLIC KEY BLOCK-----

My GPG 1.0.6 Block:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.6 (MingW32)
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=pFTK
-----END PGP PUBLIC KEY BLOCK-----


9.1. RECOMMENDED READING

And if you aren't already paranoid enough here's some sites/articles that I
definitely recommend:

[URL=http://www.theregister.co.uk/content/4/18002.html]http://www.theregister.co.uk/content/4/18002.html[/URL]
[URL=http://www.findarticles.com/m0CGN/3741/55695355/p1/article.jhtml]http://www.findarticles.com/m0CGN/3741/556...1/article.jhtml[/URL]
[URL=http://www.mobtown.org/news/archive/msg00492.html]http://www.mobtown.org/news/archive/msg00492.html[/URL]
[URL=http://194.159.40.109/05069801.htm]http://194.159.40.109/05069801.htm[/URL]
[URL=http://www.yarbles.demon.co.uk/mssniff.html]http://www.yarbles.demon.co.uk/mssniff.html[/URL]
[URL=http://www.macintouch.com/o98security.html]http://www.macintouch.com/o98security.html[/URL]
[URL=http://www.theregister.co.uk/content/archive/3079.html]http://www.theregister.co.uk/content/archive/3079.html[/URL]
[URL=http://www.fsm.nl/ward/]http://www.fsm.nl/ward/[/URL]
[URL=http://slashdot.org]http://slashdot.org[/URL]
[URL=http://www.peacefire.org]http://www.peacefire.org[/URL]
[URL=http://stopcarnivore.org]http://stopcarnivore.org[/URL]
[URL=http://nomorefakenews.com]http://nomorefakenews.com[/URL]
[URL=http://grc.com/steve.htm#project-x]http://grc.com/steve.htm#project-x[/URL]


10. SPECIAL THANKS (and no thanks)

This version I want to give special thanks to Concerned Boss, Oblivion, and
the F-Prot virus scanner.

I also want to take this time to show my dissatisfaction to the New Zealand
Herald.  Although partly flattering, it was more disgusting to see a
well-known newspaper try to take credit for my work.


11. REFERENCES

[URL=http://support.microsoft.com/support/kb/articles/Q137/1/13.asp]http://support.microsoft.com/support/kb/ar...s/Q137/1/13.asp[/URL]
[URL=http://support.microsoft.com/support/kb/articles/Q136/3/86.asp]http://support.microsoft.com/support/kb/ar...s/Q136/3/86.asp[/URL]
[URL=http://support.microsoft.com/support/kb/articles/Q169/5/31.ASP]http://support.microsoft.com/support/kb/ar...s/Q169/5/31.ASP[/URL]
[URL=http://support.microsoft.com/support/kb/articles/Q141/0/12.asp]http://support.microsoft.com/support/kb/ar...s/Q141/0/12.asp[/URL]
[URL=http://support.microsoft.com/support/kb/articles/Q205/2/89.ASP]http://support.microsoft.com/support/kb/ar...s/Q205/2/89.ASP[/URL]
[URL=http://support.microsoft.com/support/kb/articles/Q166/3/02.ASP]http://support.microsoft.com/support/kb/ar...s/Q166/3/02.ASP[/URL]
[URL=http://www.insecure.org/sploits/Internet.explorer.web.usage.logs.html]http://www.insecure.org/sploits/Internet.e...usage.logs.html[/URL]
[URL=http://www.parascope.com/cgi-bin/psforum.pl/topic=matrix&disc=514&mmark=all]http://www.parascope.com/cgi-bin/psforum.p...c=514&mmark=all[/URL]
[URL=http://www.hackers.com/bulletin/]http://www.hackers.com/bulletin/[/URL]
[URL=http://slashdot.org/articles/00/05/11/173257.shtml]http://slashdot.org/articles/00/05/11/173257.shtml[/URL]
[URL=http://peacefire.org]http://peacefire.org[/URL]

COPYRIGHT INFORMATION

This article has been under the protection of copyright laws the moment it was
fixed in a tangible form.  In less otherwise agreed, this article may ony be
distributed as a whole and without modification.  Thank you.

হইতে মো. রানা হামিদ রাজশাহী বিশ্ববিদ্যালয় কম্পিউটার সায়েন্স এন্ড ইঞ্জিনিয়ারিং বিভাগ।

এই ব্লগটি সন্ধান করুন

ব্লগ সংরক্ষাণাগার