Archive for category computer

Howto: Installing VLC Player on Linux Using Script

Following things must exist on your Computer/Linux :-

=> Direct Working Internet Connection or Yum Should run from Terminal. If you are using Internet connection with Proxy then it will be problematic for you.

=> RHEL 5.x must be installed

What is VLC Player ?

=> VLC media player is an open source, free software media player and multimedia framework written by the VideoLAN project.

There are so many peoples who is facing issue while installing VLC Player on Linux and CentOS, Most of the peoples suffer with dependencies problem if they are going to install VLC Player using RPM or YUM.

But Now you will find a very easy way to install VLC Player, I have created Bash Script to Install VLC Player with all Dependencies, So Forget about all problems Just Download and Run Bash Script which I have created for VLC Player Installation on RHEL 5.

Perform Following Steps to Install VLC Player on RHEL 5.x / Cent OS 5.x

1. You need to be root to run this script.

2. Download this VLC INSTALLATION SCRIPT.

3. Execute following Command where you have downloaded the script.
[root@ask4itsolutions ~]# chmod +x vlc-installation.sh

4. Now Execute your script by two ways mentioned below

[root@ask4itsolutions ~]# sh vlc-installation.sh
OR
[root@ask4itsolutions ~]# ./vlc-installation.sh

5. Now Just Site Back and Relax for Few Minutes as per your Internet Connection it will Install VLC Player Without any error.

6. Remember you have to be normal user to run VLC Player, You cannot Run VLC Player as root.

Hope you ENJOY THIS………

If this works for you then Show your support and encourage me to write some more howto’s by commenting on the same topic or by sending me mail on blog(at)ask4itsolutions(dot)com

If this doesn’t work for you then also please do let me know so i can helps you out to solve the issue, If you are facing the error then please send me mail on blog(at)ask4itsolutions(dot)com with Subject:- VLC Installation Issue

Enjoy Ubuntu 11.10 Oneiric Ocelot :) Enjoy Ubuntu  :) Enjoy Open Source :) Enjoy Linux :)

 

Leave a comment

Sharing Files between RHEL 6 and Windows Systems with Samba

Samba and Samba Client

Samba allows both RHEL resources to be shared with Windows systems and Windows resources to be shared with RHEL systems. RHEL accesses Windows resources using a package named samba-client. RHEL resources, on the other hand, are shared with Windows systems using a package named samba. Typically, the samba-client is installed and configured by default allowing you to browse available Windows resources without any additional work (this is covered later in the chapter). In order to allow an RHEL 6 system to share resources with Windows systems, however, some more work is required.

Installing Samba on an RHEL 6 System

The default settings used during the RHEL 6 installation process do not install the samba package. Unless you specifically requested that Samba be installed it is unlikely that you have Samba installed on your system. To check whether Samba is installed, open a terminal window (Applications -> System Tools -> Terminal) and run the following rpm command:

rpm -q samba

If Samba is installed, the rpm command will generate output similar to the following:

samba-3.5.4-68.el6_0.1.x86_64

If Samba is not installed, rpm will return with “package samba is not installed”. That being the case, it can be installed using the yum command-line tool:

su -
yum install samba

The above command will install both the samba package and the samba-common dependency package.

If you prefer to use the graphical tool to perform the Samba installation, select Applications -> Add/Remove Software, enter the root password if prompted to do so and then perform a search for Samba. When the list of matching packages appears, set the checkbox next to the samba and samba-common packages and click on Apply to initiate the installation.

Configuring the RHEL Firewall to Enable Samba

Next, the firewall currently protecting the RHEL system needs to be configured to allow Samba traffic. To achieve this, run the Firewall Configuration tool by selecting the System -> Administration -> Firewall menu option and select the check box next to Samba in the Trusted Services section of the tool. Click Apply and OK to commit the change.

Before any resources on the RHEL system can be accessed from the Windows systems, however, some additional configuration steps are necessary.

Configuring the smb.conf File

In releases of Red Hat Enterprise Linux prior to release 6, a user friendly graphical tool named system-config-samba was provided to assist in the configuration of Samba. In RHEL 6, however, this tool has been removed. This means that the Samba environment must be configured manually within the /etc/samba/smb.conf file and using the smbpasswd command line tool. Whilst the loss of system-config-samba may be mourned by those who relied on it, the tool’s simplicity actually masked many of the more advanced features of Samba. In practice, much more can be achieved by tasking the time to understand the intricacies of the smb.conf file.

Samba is a highly flexible and configurable system that provides many different options for controlling how resources are shared on Windows networks. This flexibility can lead to the sense that Samba is overly complex to work with. In reality, however, many of the configuration options are not needed by the typical installation, and the learning curve to set up a basic configuration is actually quite short.

For the purposes of this chapter we will look at joining an RHEL 6 system to a Windows workgroup and setting up a directory as a shared resource that can be accessed by a specific user.

The first step, therefore, is to gain root privileges and to load the /etc/samba/smb.conf file into a suitable editor, for example:

su –
gedit /etc/samba/smb.conf

Configuring the [global] Section

The smb.conf file is divided into sections. The first section is the [global] section where settings can be specified that apply to the entire Samba configuration. Whilst these settings are global, each option may be overridden within other sections of the configuration file.

The first task is to define the name of the Windows workgroup on which the RHEL 6 resources are to be shared. This is controlled via the workgroup = directive of the [global] section which by default is configured as follows:

workgroup = MYGROUP

Begin by changing this to the actual name of the workgroup. For example, if the workgroup is named WORKGROUP (the default for most Windows networks):

workgroup = workgroup

Configuring a Shared Resource

The next step is to configure a shared resource (in other words a resource that will be accessible from other systems on the Windows network). In order to achieve this, the section is given a name by which it will be referred to when shared. For example, if we plan to share the /tmp directory of our RHEL 6 system, we might entitle the section [tmp]. In this section a variety of configuration options are possible. For the purposes of this example, however, we will simply define the directory that is to be shared, indicate that the directory is browsable and writable and declare the users that are allowed to access the shared resource (in this case a user named demo):

[tmp]
        path = /tmp
        writeable = yes
        browseable = yes
        valid users = demo

Creating a Samba User

Any user that requires access to a Samba shared resource must be configured as a Samba User and assigned a password. This task is achieved using the smbpasswd command line tool. In our example smb.conf file we stated the user demo is entitled to access the /tmp directory of our RHEL 6 system. In order to fulfill this requirement, therefore, we must add demo as a samba user as follows:

# su - 
# smbpasswd -a demo
New SMB password:
Retype new SMB password:
Added user demo.

Now that we have completed the configuration of a very basic Samba server, it is time to test our configuration file and then start the Samba services.

Testing the smb.conf File

The settings in the smb.conf file may be tested using the testparm command line tool as follows:

# testparm
Load smb config files from /etc/samba/smb.conf
rlimit_max: rlimit_max (1024) below minimum Windows limit (16384)
Processing section "[homes]"
Processing section "[printers]"
Processing section "[tmp]"
Loaded services file OK.
Server role: ROLE_STANDALONE
Press enter to see a dump of your service definitions

[global]
        server string = Samba Server Version %v
        log file = /var/log/samba/log.%m
        max log size = 50
        cups options = raw

[homes]
        comment = Home Directories
        read only = No
        browseable = No

[printers]
        comment = All Printers
        path = /var/spool/samba
        printable = Yes
        browseable = No

[tmp]
        path = /tmp
        valid users = demo
        read only = No

Starting the Samba and NetBIOS Name Services on RHEL 6

In order for an RHEL 6 server to operate within a Windows network both the Samba (SMB) and NetBOIS nameservice (NMB) services must be started. To identify if the services are already running, the following command may be executed with root privileges in a terminal window:

su –
/sbin/service smb status
smbd is stopped
# /sbin/service nmb status
nmbd is stopped

If the services are reported as currently running and you have made changes to the smb.conf file it will be necessary to restart the services in order to pick up the changes:

/sbin/service smb restart
/sbin/service nmb restart

If, on the other hand, the services are currently stopped, start them as follows:

/sbin/service smb start
/sbin/service nmb start

Accessing Samba Shares

Now that the Samba resources are configured and the services are running, it is time to access the shared resource from a Windows system. On a suitable Windows system on the same workgroup as the RHEL 6 system, open Windows Explorer and navigate to the Network page. At this point, explorer should search the network and list any systems using the SMB protocol that it finds. The following figure illustrates an RHEL 6 system named rhel6 located using Windows Explorer on a Windows 7 system:
Accessing an RHEL 6 system from a Windows 7 desktop
Double clicking on the RHEL 6 host will prompt for the name and password of a user with access privileges. In this case it is the demo account that we configured using the smbpasswd tool. Entering the username and password will result in the shared resources configured for that user appearing the explorer window, including the tmp resource previously configured:
RHEL 6 shares listed on Windows 7
Double clicking on the tmp shred resource will display a listing of the files and directories contained therein.

Accessing Windows Shares from RHEL 6

As previously mentioned, Samba is a two way street, allowing not only Windows systems to access files and printers hosted on an RHEL 6 system, but also allowing the RHEL system to access shared resources on Windows systems. This is achieved using the samba-client package which is installed by default under most RHEL 6 configurations. If it is not currently installed, install it from a Terminal window as follows:

su –
yum install samba-client

To access any shared resources on a Windows system, begin by selecting the Places -> Network desktop menu option. This will display the Network browser dialog including an icon for the Windows Network (if one is detected) as illustrated in the following figure:
Image:rhel6_windows_network_in_nautilus.jpg
To obtain a list of Windows workgroups on the network, double click on the Windows Network icon. From within the list of workgroups double click on the desired group to obtain a listing of servers available for access:

Image:rhel6_samba_windows_resources.jpg
Finally, double clicking on a computer will list the shared resources available for access from the RHEL client.

Summary

In this chapter we have looked at the steps necessary to configure an RHEL 6 system to act as both a Samba client and server allowing the sharing of resources with other systems on a Windows based network. In the case of Samba server configuration in particular we have only scratched the surface of the configuration options available. A full over of Samba would require an entire book. Many such publications and online resources are available if you would like to learn more. Another good place to start is to type man samba in a

terminal window.

Requirements for Configuring an RHEL 6 Web Server

To set up your own web site you need a computer, an operating system, a web server, a domain name, a name server and an IP address.

The computer can be any system capable of running Linux. In terms of an operating system, we will, of course, assume you are using RHEL 6. As previously mentioned RHEL supports the Apache web server which can easily be installed once the operating system is up and running. A domain name can be registered with any domain name registration service.

If your ISP provides static IP addresses then you will need to associate your domain with your static IP address. This is achieved using a name server. Most domain registration services will provide this service for you.

If you do not have a static IP address (i.e. your ISP provides you with a dynamic address which changes frequently) then you can use one of a number of free services which map your dynamic IP address to your domain name. One such service is provided by http://www.dnsExit.com.

Once you have your domain name and your name server configured the next step is install and configure your web server.

Installing the Apache Web Server on RHEL 6

The current release of RHEL typically does not install the Apache web server by default. To check whether the server is already installed, open a Terminal window (Applications -> System Tools -> Terminal) and run the following command:

rpm -q httpd

If rpm generates output similar to the following, the apache server is already installed:

httpd-2.2.15-5.el6.x86_64

Alternatively, if rpm generates a “package httpd is not installed” then the next step, obviously, is to install it. This can be performed either from the command-line or using the Add/Remove Software tool. To use this tool, open the System -> Administration desktop menu and select Add/Remove Software. Enter your root password if prompted to do so. Select the Search tab and search for httpd. After the search completes the Apache HTTP Server should be listed in the search results. Click on the toggle next to the httpd server. Finally, click on the Apply button to begin the installation.

To install Apache from the command-line start a terminal window (Applications -> System Tools -> Terminal) and run the following commands at the command prompt:

su -
yum install httpd

Starting the Apache Web Server

Once the Apache server is installed, the next step is to verify that the server is running and, if it is not yet running, to start it.

The status of the server can be verified from the command-line or via the GUI Service Configuration tool. To check the status of the Apache httpd service from the command-line, enter the following command in a Terminal window:

/sbin/service httpd status

If the above command indicates that the httpd service is not running, it can be launched from the command-line as follows:

su -
/sbin/service httpd start

If you would like the Apache httpd service to start automatically when the system boots (for example when booting to runlevel 3), this can be achieved by running the following command:

/sbin/chkconfig --level 3 httpd on

For more information on runlevels refer to the chapter entitled Configuring RHEL 6 Runlevels and Services.

To configure the Apache service using the Service Configuration tool, select the System -> Administration -> Services menu option and scroll down the list of services until you find httpd. Select the item in the list and click on the Start button.

Testing the Web Server

Once the installation is complete the next step is to verify the web server is up and running. To do this fire up the web browser by clicking on the web browser icon in the top desktop panel and enter 127.0.0.1 in the address bar (127.0.0.1 is the loop-back network address which tells the system to connect to the local machine). The browser should load the Red Hat Enterprise Linux Test Page:
The RHEL 6 Apache test web page
Congratulations, you have now installed the web server and served up what will hopefully be the first of many web pages.

Configuring the Apache Web Server for Your Domain

The next step in setting up your web server is to configure it for your domain name. This is performed in the /etc/httpd directory. To configure the web server open a terminal window and change directory to /etc/httpd. In this directory you will find a number of sub-directories. Change directory into the conf sub-directory where you will find an httpd.conf file which contains the configuration settings for the Apache server.

Edit the httpd.conf file using your favorite editor using the su command to ensure you have write permission to the file. Once loaded, there are a number of settings that need to be changed to match your environment.

The ServerAdmin directive defines an administrative email address for people wishing to contact the webmaster for your site. Change this to an appropriate email address where you can be contacted:

ServerAdmin webmaster@myexample.com

Next the ServerName and ServerAlias directives need to be defined so that the web server knows which virtual host this configuration file refers to:

ServerName myexample.com

Next, we need to define where the web site files are going to be located using the DocumentRoot directive. The tradition is to use /var/www/domain-name:

DocumentRoot /var/www/myexample.com

Next, create the /var/www/myexample.com directory and place an index.html file in it. For example:

<html>
<title>Sample Web Page</title>
<body>
Welcome to MyExample.com
</body>
</html>

The last step is to restart the apache web server to make sure it picks up our new settings:

su - 
/sbin/service httpd restart

Web Server and Firewall Issues

If your RHEL 6 system is configured to use a firewall, you will need to ensure that HTTP traffic on port 80 is permitted in order for external systems to be able to access your web server. Refer to Basic RHEL 6 Firewall Configuration for details on configuring RHEL Firewalls.

If the RHEL 6 system hosting your web server sits on a network protected by a firewall (either another computer running a firewall, or a router or wireless base station containing built in firewall protection) you will need to configure the firewall to forward port 80 to your web server system. The mechanism for performing this differs between firewalls and devices so check your documentation to find out how to configure port forwarding.

Once everything is configured it should be possible to enter the domain name of your web site into a browser anywhere in the world and access your web server.

Leave a comment

Top Ten Tips To Improve System Speed-Suresh Dangi

1. Let your PC boot up completely before opening any applications.
2. Refresh the desktop after closing any application. This will remove any unused files from the RAM.
3. Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).
4. Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM.
5. Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.
6. Delete the temporary internet files regularly.
7. Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.
8. Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.
9. When installing new Softwares disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.
10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.
IMP TIPS:-“RAM IS THE WORKING AREA (DESKTOP) OF THE CPU, KEEP IT AS EMPTY AND UNCLUTTERED AS POSSIBLE!”

Leave a comment

Calculations On Command Prompt- Suresh Dangi

The command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit signed integers:

C:\>set /a 2+2
4
C:\>set /a 2*(9/2)
8
C:\>set /a (2*9)/2
9
C:\>set /a “31>>2”
7

Note that we had to quote the shift operator since it would otherwise be misinterpreted as a “redirect stdout and append” operator.

For more information, type set /? at the command prompt.

Leave a comment

Chat with Friends through ms dos Command Prompt– Suresh Dangi

Read the rest of this entry »

Leave a comment

Xp Tricks Contd.. More of Dem by Suresh Dangi

Make your folders invicible…:)

1)Right Click on the desktop.Make a new folder
2)Now rename the folder with a space(U have to hold ALT key and type 0160).
3)Now u have a folder with out a name.
4)Right click on the folder>properties>customize. Click on change icon.
5)Scroll a bit, u should find some empty spaces, Click on any one of them.

click ok

Easily Disable Messenger

Go into: C:/Program Files/Messenger. Rename the Messenger folder to “MessengerOFF”.
Remove Messenger

· Go to Start/Run, and type: “rundll32 setupapi,InstallHinfSection BLC.Remove 128

%SystemRoot%\INF\msmsgs.inf”

Turn Off Autoplay for Program CDs

How can you stop Windows XP from launching program CDs?
· Click Start, click Run, type GPEDIT.MSC to open Group Policy in the Microsoft
Management Console.

· Double-click Computer Configuration, double-click Administrative templates,
double-click System, and then click Turn off autoplay.

· The instructions on your screen describe how to configure this setting. Click
Properties to display the setting dialog.

· Click Enabled, and choose CD-ROM drives, then click OK, to stop CD autoplay.
This setting does not prevent Autoplay for music CDs.

Change Drive Letters in Windows XP

When you add drives to your computer, such as an extra hard drive, a CD drive, or a
storage device that corresponds to a drive, Windows automatically assigns letters to the
drives. However, this assignment might not suit your system; for example, you might have
mapped a network drive to the same letter that Windows assigns to a new drive. When you
want to change drive letters, follow these steps:

· Right-click My Computer, and then click Manage.

· Under Computer Management, click Disk Management. In the right pane, you’ll see
your drives listed. CD-ROM drives are listed at the bottom of the pane.

· Right-click the drive or device you want to change, and then click Change Drive
Letter and Paths.

· Click Change, click Assign the following drive letter, click the drive letter you
want to assign, and then click OK.

Do Not Highlight Newly Installed Programs

Tired of that annoying little window that pops up to tell you that new software is
installed? If it gets in the way when you’re logging off, turn it off completely. To do
this:

· Click Start, right-click at the top of the Start menu where your name is displayed,
and then click Properties.

· In the Taskbar and Start Menu Properties dialog box, on the Start Menu tab, click
Customize.

· Click the Advanced tab, and then clear the Highlight newly installed programs check
box.

· Click OK, and then click OK again

Change the Default Opening Folder in Windows Explorer

By default, Windows Explorer opens showing the My Documents folder. To change the
default setting so that all top-level drives and folders are shown, follow these steps:

· Click Start > Programs > Accessories, then right-click Windows Explorer, and click
Properties.

· Under Target field, which reads %SystemRoot%\explorer.exe, add to make the line
read:

%SystemRoot%\explorer.exe /n, /e, /select, C:\

Close Multiple Windows

If you just opened a number of separate, related windows (a folder inside a folder,
and so on), there’s an easier way to close them all than one-at-a-time:
· Hold down the shift-key as you click the X caption button in the upper-right corner
of the last window opened. Doing so closes that window and all windows that came before it

change fat -> ntfs

To change ur File system from command prompt
type: convert c:/fs:ntfs(ex:’c’ is the drive letter)

Leave a comment

Xp problems and their solutions by Suresh Dangi

There is One for Everyone !!

1) When i try to access my task manager(Ctr+Alt+Del)…it displays message
‘task manger has been disabled by ur administrator’…, and also i cant access my registry too..!!
what may have caused this problem….
is it becos of some VIRUS…????
how can i repair this without re installing…?? any particular software??

1: Close the IE browser. Log out messenger / Remove Internet Cable.
2: To enable Regedit
Click Start, Run and type this command exactly as given below: (better – Copy and paste)
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f
3: To enable task manager : (To kill the process we need to enable task manager)
Click Start, Run and type this command exactly as given below: (better – Copy and paste)
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 0 /f
4: Now we need to change the default page of IE though regedit.
Start>Run>Regedit
From the below locations in Regedit chage your default home page to google.com or other.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
HKEY_ LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main
HKEY_USERS\Default\Software\Microsoft\Internet Explorer\Main
Just replace the attacker site with google.com or set it to blank page.
5: Now we need to kill the process from back end. Press Ctrl + Alt + Del
Kill the process svhost32.exe . ( may be more than one process is running.. check properly)
6: Delete svhost32.exe , svhost.exe files from Windows/ & temp/ directories. Or just search for svhost in your comp.. delete those files.
7: Go to regedit search for svhost and delete all the results you get.
Start menu > Run > Regedit >
8: Restart the computer. That’s it now you are virus free.

it works !!

** Shared from Internet (reva)

2)I don’t have IIS( Internet Information Services) windows componet on my system

As far as I know one can’t have IIS running on XP Home. I think u will have to upgrade it to XP Prof.
in proff That’s simple get the Win XP CD, go to control panel–>add/remove programs and then to add/remove windows components. There u will find the option for adding IIS, just check the checkbox and follow the instructions. You r done!!

3) Folder Option Vanished

IF U WANT UR FILES THT WERE HIDDEN U CAN TYPE *.* IN SEARCH AND ALSO TICK THE OPTION “INCLUDE HIDDEN FILES”.
NOW SEARCH IN THE DRIVE IN WHICH U STORED UR FILES, U WILL GET UR FILES BUT TO GET BACK THE OPTION U EITHER HAVE TO REINSTALL WINDOWS OR REPAIR IT. well this is as far as i know..

Post your Comment If you Know More

4) My volume icon is not showing in taskbar, Yet It’s Enable From Control Panel > Sound And devices

Assuming that you have tried the basic steps i am directly trying with the most possible solutions. This issue most commmonly occurs because the settings are not saved. Also there might be some startup program which is diabling the Systray.exe from loading up.

Try this…
1) Re-enable the volume icon by disabling and then enabling Place volume icon in the taskbar in the Sound and Audio applet.
2) Then copy the following text which is in red into a notepad file and then save it as “fix.reg”. Please make sure that there is no .txt extension after that.
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
“NoSaveSettings”=dword:00000000
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
“SystemTray”=”SysTray.Exe”

3) Merge the file to the registry by simply double clicking on it.
4) Reboot

This should definitely work. Please reply back with the status.

Cheers

:shared frm internet (bond)

5)Whenever i try d’loading stuff from the net, the download starts and the comp just restarts. due to dis i have to install d’load managers wich i hate. help needed anyone. i have win xp!

If the computer just restarts itself, it cud possibly be an application crash..
check the Dr.watson log for details..
START-RUN- drwtsn32.
check the path for the log here… open the log and check which application is causing the crash.
turn of automatic reboot,cos you wud miss it if there is a BSOD being generated.

or may be u could try this one out

Go to Start>Run–Type ‘services.msc’, hit ENTER
Scroll down to a service called Remote Procedure Call, right click, go to properties, there will be a tab named Recover Action, change it to ‘Take No Action’ if it’s not already selected. Your problem should be solved for the time being. Also look for all network related srvices DNS, TCP-IP and also Windows Firewall/ICS service if you’re on LAN/WAN, see that all of these are set to Automatic or Manual. Reply to me with results

(david n kumar)

6)I accidentally deleted the Show Desktop icon which sits normally on the bottom left hand corner of the Taskbar. How do I restore the icon?

Click Start, Run and type the following command:

regsvr32 /n /i:U shell32.dll

The Show Desktop icon file should be available now.

or

Click Start, Run, and type Notepad.exe. Copy the following contents to Notepad.

[Shell]
Command=2
IconFile=explorer.exe,3
[Taskbar]
Command=ToggleDesktop

Save the file as – : Show Desktop.scf. Now, drag the file to the Quick Launch Toolbar. (Notepad might automatically append a .txt extension to the file name. Remove this extension if present.)

Leave a comment

Top 5 Security Tips To Protect Your Computer From USB Viruses– Suresh Dangi

With increasing anti-virus security in place against email-aware viruses and malware, hackers are turning their attention to less well-defended routes such as USB drives. This is the latest method that’s used by hackers to torment innocent users. However, there are ways you can protect your computer from USB and Pen drive viruses.

1.Block USB Viruses
Invest in an excellent anti-virus program that has built in USB virus scan and remover. These anti-USB virus scan programs not only protect your computer from USB Autorun viruses but can also clean worms, Trojans and viruses in your USB memory sticks.You can try anti-virus programs for USB virus such as USB Virus Scan, USB Drive Antivirus and so on.

2.Disable Your Computer’s Autorun Feature

When you plug in a USB drive stick into your system, the Autorun feature initiates automatically. If your USB contains any virus programs, it’ll use the Autorun feature to infect your computer. To protect your computer, disable the Autorun feature.You can disable the Autorun feature via the Control Panel.
Alternatively, you can use antivirus software to disable and enable the Autorun feature whenever you want. Additionally, these USB blocking softwares allow system administrators to specify which removable storage drives users can access.

3.Update Your Device Driver

Keeping your USB device driver updated is a good way to ensure greater stability for your USB drives. While this won’t help eradicate USB viruses, USB device drivers are constantly updated to block viruses and deliver timely warnings. You can update your USB device drive from your Windows Computer Management feature in the Control Panel.

4.Use USB Firewall Software

USB firewalls prevent Windows OS from processing malicious programs when a virus infected portable USB device is opened. USB firewalls monitor only your USB devices, and not your CD and DVD drives. By using USB firewalls, you’ll be enabling a basic level of protection from the autorun.inf viruses that spread from portable USB devices.

5.Always Safely Remove USB Devices

Viruses are sometimes created via damaged documents. If you are transferring a set of files to your USB drive, make sure the transfer is complete before you eject the device. Always use the Safely Remove Hardware feature of Windows OS. This is because partially transferred or damaged files can in turn corrupt other files on your USB drive.

Leave a comment

TURN ON UR PC IN JUST 10 SECONDS by suresh dangi

Aight so u wanna know how to turn the pc on in 10 seconds (may vary)Aight heres what u have to do to turn ur pc on in 10 seconds

Aite Click on the start button then press R it will take u to Run well go to run
n type Regedit
press enter
this will open Registery Editor
now look for the key

HKEY_LOACAL_MECHINE\SYSTEM\CurrentControlSet\Control\ContentIndex

now there find the Key Called
“Startup Delay”
Double Click On It
Now where its Base
Click Decimal
Now its Default Value Is 4800000 (75300:hexadecimal)
Change The Value To 40000
here u go u have done it
now close the Registery Editor and Restart Your Computer

Leave a comment

Clear CMOS all Tricks– Suresh Dangi

Clear CMOS all Tricks
ENTERING DEBUG

Debug has been included in every version of MS-DOS as well as Windows. When running any of the debug routines it is recommended that if you have Windows that you exit or shut down to get into a real DOS prompt (unless you’re running Windows ME, Windows 2000, Windows XP, or later versions).

Once at the MS- DOS prompt, run through the below example, this example is perfectly fine to run on any PC Computer running MS-DOS / Windows and will not harm anything.
Type debug and press enter.
This should get you to a – (small dash). This is the debug prompt.
At the – type d40:00 and press enter; this will return several lines of information.
After the feedback you will be back to the debug prompt.
To exit out of debug type q and press enter. This will return you back to the MS-DOS prompt.

In some of the below debug routines you will notice that a “g” is typed, then “q”. G tells the computer that the code type is not self executing and must be run at this point. If completed, the program will return Program Terminated Normally which indicates you can now quit from the debug program. TESTING PORTS

The below debug routine will check the ports of the computer to allow you to know if ports are being detected or not. Type debug to get to the “-” Type D40:0
You should get several lines; however, the first line is the only important line, which should read the following:
0040:0000 F8 03 F8 02 E8 03 E8 02 – 78 03 78 02 BC 03
F8 03
F8 02
E8 03
E8 02

78 03
78 02
BC 03

COM1
COM2
COM3
COM4

LPT1
LPT2
LPT3

The above graph shows you what the feed back means as far as port, so if you see F8 03, this would be an indication that COM1 is being detected; if you see 00 00, this is an indication that it is not being detected, which could mean that hardware is bad or that it is disabled inCMOS
Once you have finished looking at the information, type Q and press enter to get out of Debug.
CLEAR CMOS

The below debug routine will clear CMOS, BIOS, Passwords, Settings, Viruses, and other items residing in the CMOS. During this process you may get returned characters which are an indication that the string has gone in, if you by chance get ERROR ensure that you have typed the line in correctly, if not retype. Ensure that you do not skip any lines, that it is ALL typed in correctly to help prevent problems. Before running this Debug routine also ensure that you have read the above disclaimer. After typing debug you will get “-” which is were you can begin by typing A and pressing enter. A
MOV AX,0
MOV AX,CX
OUT 70,AL
MOV AX,0
OUT 71,AL
INC CX
CMP CX,100
JB 103
INT 20
Note: Nothing is typed on this line
G By pressing G this will execute the above script, ensure you have read and agree to the above disclaimer.
Q Then reboot and you will get a Setup Checksum Error. Go into setup, correct all the incorrect values, time, date…

JOYSTICK TEST

This test will test to see if your Joystick is present or not. Type debug from the DOS prompt once at the “-“. Type i201 If you get a FF response attempt hold one of the main buttons on your joystick, and while holding the button down type i201 and see if a different response is given, each button on the joystick should return a different response. However, some special joysticks, such as the Microsoft Sidewinder, which has more than 4-5 buttons, may not return a response for all extra buttons because these buttons are generally controlled through software. If a FF is still given on each of the buttons on the game paddle or joystick, it is a good possibility that either the Joystick and or the Joystick port is bad. If possible, attempt these steps with another known working joystick. However, if you are receiving different responses when pressing and holding the keys on the joystick, the computer hardware is working properly. Type q and press enter to quit out of debug.

ERASING SECTOR 2

Before doing the below routine ensure that you have read our disclaimer and that you’re sure that this is safe to do on your hard drive. Some computer hard drive manufacturers may void your warranty if this routine is ran or in some situations this can cause damage to the hard drive. This routine is useful in clearing DDO and unknown partitions. If this routine completes successfully it will erase everything in Sector 2. In the below debug routine, only type what is in bold from line 3 to 9, you will get a response if typed in properly. If you get a response continue to type the bold text as shown below in the below example.
A:\>debug
-FCS:200 400 0
-ACS:100
-xxxx:0100 mov ax,302
-xxxx:0103 mov bx,200
-xxxx:0106 mov cx,2
-xxxx:0109 mov dx, 80
-xxxx:010a int 13
-xxxx:010c int 20
-xxxx:0110 (without typing anything)
-g
Program terminated normally.
-q

ERASE ALL HDD INFORMATION

This debug routine is used to erase all partition information on the hard disk drive and is only recommend for experienced users or users who are unable to delete the partition information through fdisk. In the below debug routine, only type what is in bold from line 3 to 8, you will get a response if typed in properly. If you get a response continue to type the bold text as shown below in the below example. A:\>debug
-F 200 L1000 0
-A CS:100
xxxx:0100 MOV AX,301
xxxx:0103 MOV BX,200
xxxx:0106 MOV CX,1
xxxx:0109 MOV DX,80 (80 for hd 0 or 81 for hd 1 ) xxxx:010C INT 13
xxxx:010E INT 20
xxxx:0110
-g
Program terminated normally
-q Once this debug routine is complete, reboot computer and all partitions should be erased. Before anything can be installed back onto the computer you must run Fdisk and recreate the partition as well as format the hard disk drive.

ERASE HDD AND CLEAR CMOS

Before doing the below routine ensure that you read our disclaimer as well as are sure that this is safe to do on your hard drive. Some computer hard drive manufacturers may void your warranty or this may cause damage to the hard drive when doing the below example. This routine is useful in clearing DDO and removing possible viruses. If this routine completes successfully it will erase everything from your Hard Drive as well as your reset your CMOS values. In the below debug routine, only type what is in bold from line 3 to 17, you will get a response if typed in properly. If you get a response continue to type the bold text as shown below in the below example.
A:\>debug
-fcs:200 400 0
-acs:100
-xxxx:0100 mov ax, 0
-xxxx:0103 mov ax, cx
-xxxx:0105 out 70, al
-xxxx:0107 mov ax, 0
-xxxx:010a out 71,al
-xxxx:010c inc cx
-xxxx:010d cmp cx,100
-xxxx:0111 jb 103
-xxxx:0113 mov ax,302
-xxxx:0116 mov bx,200
-xxxx:0119 mov cx,1
-xxxx:011c mov dx,80
-xxxx:011f int 13
-xxxx:012l int 20
-xxxx:0123 (without typing anything.)
-g program terminated normally
If you are doing this debug routine to clear out a possible virus turn off your computer and wait and turn back on.
-q
Once back at DOS, reboot your computer When your computer comes back on from doing the above you will get an error message as booting up the computer, such as “Invalid Configuration”. You must enter CMOS and set the time and date, save, and reboot again. Once rebooted, you will then need to run fdisk and recreate the partitions. Once created, you will then need to format the hard drive and proceed as normal.

DISCHARGE OLD LAPTOP BATTERIES

The below debug routine is used for older laptop batteries (i.e. batteries made from 1990-1992), we do not recommend using this routine on any newer laptop batteries or any NiMH batteries N DPDISCHG.COM
A
MOV DX,01E8
MOV AL,F9
OUT DX,AL
INT 20

RCX
10
W
Q This will write dpdischg.com to the current directory. To run this utility type dpdischg.

REBOOT YOUR COMPUTER

Implement this debug routine to reboot your computer. DEBUG E 40:72 34 12
RCS
FFFF
RIP
0000
G To create a batch file that reboots your computer without having to type the above command each time, use the below example. GOTO BEGIN

E 40:72 34 12
RCS
FFFF
RIP
0000
G

:BEGIN
DEBUG < REBOOT.BAT

CREATE A SLEEP FILE

This file allows your computer to sleep for a specified amount of time. This file is not dangerous in any way; if typed improperly, more than likely the file will just not work. Type Debug You should get a "-" begin typing the below information; after each line you may get a response, do not press enter and type the next line after the response. N SLEEP.COM
A 100
MOV SI,0082
MOV AX,[SI]
XCHG AH,AL
XOR AX,3030
MOV BL,AL
MOV AL,0A
MUL AH
ADD AX,BX
MOV SI,AX
MOV AH,2C
INT 21
MOV BL,DH
MOV AX,SI
AAM
OR AX,3030
XCHG AH,AL
MOV [0160],AX
MOV AH,09
MOV DX,0160
INT 21
MOV AH,06
MOV DL,FF
INT 21
JZ 014C
OR AL,AL
JNZ 013F
MOV AH,08
INT 21
MOV AL,FF
MOV DX,016C
PUSH AX
MOV AH,09
INT 21
POP AX
MOV AH,4C
INT 21
MOV AH,2C
INT 21
CMP BL,DH
JZ 012D
MOV BL,DH
DEC SI
JNZ 011A
SUB AL,AL
MOV DX,016C
JMP 0142
DB "XX SECONDS", D, 24
DB " ", D, A, 24 RCX
79
W
Q Tip: You may cut and paste the above test into a notepad document and save the file with a .scr extension. Once saved from DOS, type debug type debug – d FFFF:5 L 8 After typing the above command you should receive a string similar to: FFFF:0000 30 34 2F-33 30 2F 39 38 4/30/98 The 4/30/98 would be the date of your computer BIOS.

VIDEO CARD TYPE

The below debug routine will list the type of video card within your computer. This is an excellent way of determining the chipset on the card or the card within your computer without opening the computer. At the C:\> type debug -d c000:0040 After typing the above command you should receive several lines of text similar to: C000:0040

00
00
00
00
00
00
00
00

00
00
00
00
00
00
00
00

…………….

C000:0050

E9
63
7B
00
B4
10
49
27

E9
FE
2B
E9
F7
2B
50
4D

.c{…I’..+..+PM

C000:0060

49
44
58
00
5B
00
00
00

00
A0
00
B0
00
B8
00
C0

IDX.[………..

C000:0070

00
5B
53
54
42
20
6E
56

49
44
49
41
20
54
4E
54

.[STB nVIDIA TNT

C000:0080

20
76
65
72
2E
20
31
2E

31
30
20
0D
0A
00
1B
43

ver. 1.10 ….C

C000:0090

6F
70
79
72
69
67
68
74

28
43
29
31
39
39
38
20

opyright(C)1998

C000:00A0

53
54
42
20
53
79
73
74

65
6D
73
20
49
6E
63
0D

STB Systems Inc.

C000:00B0

0A
00
22
6C
2C
0A
01
00

C3
50
24
7F
E8
60
36
58

..”1,….P$..’6X

As you can pick out in the above dump, this gives you enough information to determine the make and the year made on the video card. On line 4 you can see the make of this video card, which in this case is a N VIDIA TNT which would be the Riva TNT chipset. The next line you notice the version of the card and finally the line thereafter is the copyright or the year manufactured, generally. If you are unable to capture any information which sounds like the video card, you can also type -d c000:0090

Leave a comment