Archive for category computer
Howto: Installing VLC Player on Linux Using Script
Posted by Suresh kumar Dangi in computer, Linux Trick on May 24, 2012
Following things must exist on your Computer/Linux :-
=> Direct Working Internet Connection or Yum Should run from Terminal. If you are using Internet connection with Proxy then it will be problematic for you.
=> RHEL 5.x must be installed
What is VLC Player ?
=> VLC media player is an open source, free software media player and multimedia framework written by the VideoLAN project.
There are so many peoples who is facing issue while installing VLC Player on Linux and CentOS, Most of the peoples suffer with dependencies problem if they are going to install VLC Player using RPM or YUM.
But Now you will find a very easy way to install VLC Player, I have created Bash Script to Install VLC Player with all Dependencies, So Forget about all problems Just Download and Run Bash Script which I have created for VLC Player Installation on RHEL 5.
Perform Following Steps to Install VLC Player on RHEL 5.x / Cent OS 5.x
1. You need to be root to run this script.
2. Download this VLC INSTALLATION SCRIPT.
3. Execute following Command where you have downloaded the script.
[root@ask4itsolutions ~]# chmod +x vlc-installation.sh
4. Now Execute your script by two ways mentioned below
[root@ask4itsolutions ~]# sh vlc-installation.sh
OR
[root@ask4itsolutions ~]# ./vlc-installation.sh
5. Now Just Site Back and Relax for Few Minutes as per your Internet Connection it will Install VLC Player Without any error.
6. Remember you have to be normal user to run VLC Player, You cannot Run VLC Player as root.
Hope you ENJOY THIS………
If this works for you then Show your support and encourage me to write some more howto’s by commenting on the same topic or by sending me mail on blog(at)ask4itsolutions(dot)com
If this doesn’t work for you then also please do let me know so i can helps you out to solve the issue, If you are facing the error then please send me mail on blog(at)ask4itsolutions(dot)com with Subject:- VLC Installation Issue
Enjoy Ubuntu 11.10 Oneiric Ocelot Enjoy Ubuntu Enjoy Open Source Enjoy Linux
Sharing Files between RHEL 6 and Windows Systems with Samba
Posted by Suresh kumar Dangi in computer on May 13, 2012
Samba and Samba Client
Samba allows both RHEL resources to be shared with Windows systems and Windows resources to be shared with RHEL systems. RHEL accesses Windows resources using a package named samba-client. RHEL resources, on the other hand, are shared with Windows systems using a package named samba. Typically, the samba-client is installed and configured by default allowing you to browse available Windows resources without any additional work (this is covered later in the chapter). In order to allow an RHEL 6 system to share resources with Windows systems, however, some more work is required.
Installing Samba on an RHEL 6 System
The default settings used during the RHEL 6 installation process do not install the samba package. Unless you specifically requested that Samba be installed it is unlikely that you have Samba installed on your system. To check whether Samba is installed, open a terminal window (Applications -> System Tools -> Terminal) and run the following rpm command:
rpm -q samba
If Samba is installed, the rpm command will generate output similar to the following:
samba-3.5.4-68.el6_0.1.x86_64
If Samba is not installed, rpm will return with “package samba is not installed”. That being the case, it can be installed using the yum command-line tool:
su - yum install samba
The above command will install both the samba package and the samba-common dependency package.
If you prefer to use the graphical tool to perform the Samba installation, select Applications -> Add/Remove Software, enter the root password if prompted to do so and then perform a search for Samba. When the list of matching packages appears, set the checkbox next to the samba and samba-common packages and click on Apply to initiate the installation.
Configuring the RHEL Firewall to Enable Samba
Next, the firewall currently protecting the RHEL system needs to be configured to allow Samba traffic. To achieve this, run the Firewall Configuration tool by selecting the System -> Administration -> Firewall menu option and select the check box next to Samba in the Trusted Services section of the tool. Click Apply and OK to commit the change.
Before any resources on the RHEL system can be accessed from the Windows systems, however, some additional configuration steps are necessary.
Configuring the smb.conf File
In releases of Red Hat Enterprise Linux prior to release 6, a user friendly graphical tool named system-config-samba was provided to assist in the configuration of Samba. In RHEL 6, however, this tool has been removed. This means that the Samba environment must be configured manually within the /etc/samba/smb.conf file and using the smbpasswd command line tool. Whilst the loss of system-config-samba may be mourned by those who relied on it, the tool’s simplicity actually masked many of the more advanced features of Samba. In practice, much more can be achieved by tasking the time to understand the intricacies of the smb.conf file.
Samba is a highly flexible and configurable system that provides many different options for controlling how resources are shared on Windows networks. This flexibility can lead to the sense that Samba is overly complex to work with. In reality, however, many of the configuration options are not needed by the typical installation, and the learning curve to set up a basic configuration is actually quite short.
For the purposes of this chapter we will look at joining an RHEL 6 system to a Windows workgroup and setting up a directory as a shared resource that can be accessed by a specific user.
The first step, therefore, is to gain root privileges and to load the /etc/samba/smb.conf file into a suitable editor, for example:
su – gedit /etc/samba/smb.conf
Configuring the [global] Section
The smb.conf file is divided into sections. The first section is the [global] section where settings can be specified that apply to the entire Samba configuration. Whilst these settings are global, each option may be overridden within other sections of the configuration file.
The first task is to define the name of the Windows workgroup on which the RHEL 6 resources are to be shared. This is controlled via the workgroup = directive of the [global] section which by default is configured as follows:
workgroup = MYGROUP
Begin by changing this to the actual name of the workgroup. For example, if the workgroup is named WORKGROUP (the default for most Windows networks):
workgroup = workgroup
Configuring a Shared Resource
The next step is to configure a shared resource (in other words a resource that will be accessible from other systems on the Windows network). In order to achieve this, the section is given a name by which it will be referred to when shared. For example, if we plan to share the /tmp directory of our RHEL 6 system, we might entitle the section [tmp]. In this section a variety of configuration options are possible. For the purposes of this example, however, we will simply define the directory that is to be shared, indicate that the directory is browsable and writable and declare the users that are allowed to access the shared resource (in this case a user named demo):
[tmp] path = /tmp writeable = yes browseable = yes valid users = demo
Creating a Samba User
Any user that requires access to a Samba shared resource must be configured as a Samba User and assigned a password. This task is achieved using the smbpasswd command line tool. In our example smb.conf file we stated the user demo is entitled to access the /tmp directory of our RHEL 6 system. In order to fulfill this requirement, therefore, we must add demo as a samba user as follows:
# su - # smbpasswd -a demo New SMB password: Retype new SMB password: Added user demo.
Now that we have completed the configuration of a very basic Samba server, it is time to test our configuration file and then start the Samba services.
Testing the smb.conf File
The settings in the smb.conf file may be tested using the testparm command line tool as follows:
# testparm Load smb config files from /etc/samba/smb.conf rlimit_max: rlimit_max (1024) below minimum Windows limit (16384) Processing section "[homes]" Processing section "[printers]" Processing section "[tmp]" Loaded services file OK. Server role: ROLE_STANDALONE Press enter to see a dump of your service definitions [global] server string = Samba Server Version %v log file = /var/log/samba/log.%m max log size = 50 cups options = raw [homes] comment = Home Directories read only = No browseable = No [printers] comment = All Printers path = /var/spool/samba printable = Yes browseable = No [tmp] path = /tmp valid users = demo read only = No
Starting the Samba and NetBIOS Name Services on RHEL 6
In order for an RHEL 6 server to operate within a Windows network both the Samba (SMB) and NetBOIS nameservice (NMB) services must be started. To identify if the services are already running, the following command may be executed with root privileges in a terminal window:
su – /sbin/service smb status smbd is stopped # /sbin/service nmb status nmbd is stopped
If the services are reported as currently running and you have made changes to the smb.conf file it will be necessary to restart the services in order to pick up the changes:
/sbin/service smb restart /sbin/service nmb restart
If, on the other hand, the services are currently stopped, start them as follows:
/sbin/service smb start /sbin/service nmb start
Accessing Samba Shares
Now that the Samba resources are configured and the services are running, it is time to access the shared resource from a Windows system. On a suitable Windows system on the same workgroup as the RHEL 6 system, open Windows Explorer and navigate to the Network page. At this point, explorer should search the network and list any systems using the SMB protocol that it finds. The following figure illustrates an RHEL 6 system named rhel6 located using Windows Explorer on a Windows 7 system:
Double clicking on the RHEL 6 host will prompt for the name and password of a user with access privileges. In this case it is the demo account that we configured using the smbpasswd tool. Entering the username and password will result in the shared resources configured for that user appearing the explorer window, including the tmp resource previously configured:
Double clicking on the tmp shred resource will display a listing of the files and directories contained therein.
Accessing Windows Shares from RHEL 6
As previously mentioned, Samba is a two way street, allowing not only Windows systems to access files and printers hosted on an RHEL 6 system, but also allowing the RHEL system to access shared resources on Windows systems. This is achieved using the samba-client package which is installed by default under most RHEL 6 configurations. If it is not currently installed, install it from a Terminal window as follows:
su – yum install samba-client
To access any shared resources on a Windows system, begin by selecting the Places -> Network desktop menu option. This will display the Network browser dialog including an icon for the Windows Network (if one is detected) as illustrated in the following figure:
To obtain a list of Windows workgroups on the network, double click on the Windows Network icon. From within the list of workgroups double click on the desired group to obtain a listing of servers available for access:
Finally, double clicking on a computer will list the shared resources available for access from the RHEL client.
Summary
In this chapter we have looked at the steps necessary to configure an RHEL 6 system to act as both a Samba client and server allowing the sharing of resources with other systems on a Windows based network. In the case of Samba server configuration in particular we have only scratched the surface of the configuration options available. A full over of Samba would require an entire book. Many such publications and online resources are available if you would like to learn more. Another good place to start is to type man samba in a
terminal window.
Requirements for Configuring an RHEL 6 Web Server
To set up your own web site you need a computer, an operating system, a web server, a domain name, a name server and an IP address.
The computer can be any system capable of running Linux. In terms of an operating system, we will, of course, assume you are using RHEL 6. As previously mentioned RHEL supports the Apache web server which can easily be installed once the operating system is up and running. A domain name can be registered with any domain name registration service.
If your ISP provides static IP addresses then you will need to associate your domain with your static IP address. This is achieved using a name server. Most domain registration services will provide this service for you.
If you do not have a static IP address (i.e. your ISP provides you with a dynamic address which changes frequently) then you can use one of a number of free services which map your dynamic IP address to your domain name. One such service is provided by http://www.dnsExit.com.
Once you have your domain name and your name server configured the next step is install and configure your web server.
Installing the Apache Web Server on RHEL 6
The current release of RHEL typically does not install the Apache web server by default. To check whether the server is already installed, open a Terminal window (Applications -> System Tools -> Terminal) and run the following command:
rpm -q httpd
If rpm generates output similar to the following, the apache server is already installed:
httpd-2.2.15-5.el6.x86_64
Alternatively, if rpm generates a “package httpd is not installed” then the next step, obviously, is to install it. This can be performed either from the command-line or using the Add/Remove Software tool. To use this tool, open the System -> Administration desktop menu and select Add/Remove Software. Enter your root password if prompted to do so. Select the Search tab and search for httpd. After the search completes the Apache HTTP Server should be listed in the search results. Click on the toggle next to the httpd server. Finally, click on the Apply button to begin the installation.
To install Apache from the command-line start a terminal window (Applications -> System Tools -> Terminal) and run the following commands at the command prompt:
su - yum install httpd
Starting the Apache Web Server
Once the Apache server is installed, the next step is to verify that the server is running and, if it is not yet running, to start it.
The status of the server can be verified from the command-line or via the GUI Service Configuration tool. To check the status of the Apache httpd service from the command-line, enter the following command in a Terminal window:
/sbin/service httpd status
If the above command indicates that the httpd service is not running, it can be launched from the command-line as follows:
su - /sbin/service httpd start
If you would like the Apache httpd service to start automatically when the system boots (for example when booting to runlevel 3), this can be achieved by running the following command:
/sbin/chkconfig --level 3 httpd on
For more information on runlevels refer to the chapter entitled Configuring RHEL 6 Runlevels and Services.
To configure the Apache service using the Service Configuration tool, select the System -> Administration -> Services menu option and scroll down the list of services until you find httpd. Select the item in the list and click on the Start button.
Testing the Web Server
Once the installation is complete the next step is to verify the web server is up and running. To do this fire up the web browser by clicking on the web browser icon in the top desktop panel and enter 127.0.0.1 in the address bar (127.0.0.1 is the loop-back network address which tells the system to connect to the local machine). The browser should load the Red Hat Enterprise Linux Test Page:
Congratulations, you have now installed the web server and served up what will hopefully be the first of many web pages.
Configuring the Apache Web Server for Your Domain
The next step in setting up your web server is to configure it for your domain name. This is performed in the /etc/httpd directory. To configure the web server open a terminal window and change directory to /etc/httpd. In this directory you will find a number of sub-directories. Change directory into the conf sub-directory where you will find an httpd.conf file which contains the configuration settings for the Apache server.
Edit the httpd.conf file using your favorite editor using the su command to ensure you have write permission to the file. Once loaded, there are a number of settings that need to be changed to match your environment.
The ServerAdmin directive defines an administrative email address for people wishing to contact the webmaster for your site. Change this to an appropriate email address where you can be contacted:
ServerAdmin webmaster@myexample.com
Next the ServerName and ServerAlias directives need to be defined so that the web server knows which virtual host this configuration file refers to:
ServerName myexample.com
Next, we need to define where the web site files are going to be located using the DocumentRoot directive. The tradition is to use /var/www/domain-name:
DocumentRoot /var/www/myexample.com
Next, create the /var/www/myexample.com directory and place an index.html file in it. For example:
<html> <title>Sample Web Page</title> <body> Welcome to MyExample.com </body> </html>
The last step is to restart the apache web server to make sure it picks up our new settings:
su - /sbin/service httpd restart
Web Server and Firewall Issues
If your RHEL 6 system is configured to use a firewall, you will need to ensure that HTTP traffic on port 80 is permitted in order for external systems to be able to access your web server. Refer to Basic RHEL 6 Firewall Configuration for details on configuring RHEL Firewalls.
If the RHEL 6 system hosting your web server sits on a network protected by a firewall (either another computer running a firewall, or a router or wireless base station containing built in firewall protection) you will need to configure the firewall to forward port 80 to your web server system. The mechanism for performing this differs between firewalls and devices so check your documentation to find out how to configure port forwarding.
Once everything is configured it should be possible to enter the domain name of your web site into a browser anywhere in the world and access your web server.
Top Ten Tips To Improve System Speed-Suresh Dangi
Posted by Suresh kumar Dangi in computer on January 15, 2012
1. Let your PC boot up completely before opening any applications.
2. Refresh the desktop after closing any application. This will remove any unused files from the RAM.
3. Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).
4. Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM.
5. Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.
6. Delete the temporary internet files regularly.
7. Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.
8. Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.
9. When installing new Softwares disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.
10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.
IMP TIPS:-“RAM IS THE WORKING AREA (DESKTOP) OF THE CPU, KEEP IT AS EMPTY AND UNCLUTTERED AS POSSIBLE!”
Calculations On Command Prompt- Suresh Dangi
Posted by Suresh kumar Dangi in computer on January 3, 2012
The command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit signed integers:
C:\>set /a 2+2
4
C:\>set /a 2*(9/2)
8
C:\>set /a (2*9)/2
9
C:\>set /a “31>>2”
7
Note that we had to quote the shift operator since it would otherwise be misinterpreted as a “redirect stdout and append” operator.
For more information, type set /? at the command prompt.
Chat with Friends through ms dos Command Prompt– Suresh Dangi
Posted by Suresh kumar Dangi in computer on January 3, 2012
Xp Tricks Contd.. More of Dem by Suresh Dangi
Posted by Suresh kumar Dangi in computer on January 3, 2012
Make your folders invicible…:)
1)Right Click on the desktop.Make a new folder
2)Now rename the folder with a space(U have to hold ALT key and type 0160).
3)Now u have a folder with out a name.
4)Right click on the folder>properties>customize. Click on change icon.
5)Scroll a bit, u should find some empty spaces, Click on any one of them.
click ok
Easily Disable Messenger
Go into: C:/Program Files/Messenger. Rename the Messenger folder to “MessengerOFF”.
Remove Messenger
· Go to Start/Run, and type: “rundll32 setupapi,InstallHinfSection BLC.Remove 128
%SystemRoot%\INF\msmsgs.inf”
Turn Off Autoplay for Program CDs
How can you stop Windows XP from launching program CDs?
· Click Start, click Run, type GPEDIT.MSC to open Group Policy in the Microsoft
Management Console.
· Double-click Computer Configuration, double-click Administrative templates,
double-click System, and then click Turn off autoplay.
· The instructions on your screen describe how to configure this setting. Click
Properties to display the setting dialog.
· Click Enabled, and choose CD-ROM drives, then click OK, to stop CD autoplay.
This setting does not prevent Autoplay for music CDs.
Change Drive Letters in Windows XP
When you add drives to your computer, such as an extra hard drive, a CD drive, or a
storage device that corresponds to a drive, Windows automatically assigns letters to the
drives. However, this assignment might not suit your system; for example, you might have
mapped a network drive to the same letter that Windows assigns to a new drive. When you
want to change drive letters, follow these steps:
· Right-click My Computer, and then click Manage.
· Under Computer Management, click Disk Management. In the right pane, you’ll see
your drives listed. CD-ROM drives are listed at the bottom of the pane.
· Right-click the drive or device you want to change, and then click Change Drive
Letter and Paths.
· Click Change, click Assign the following drive letter, click the drive letter you
want to assign, and then click OK.
Do Not Highlight Newly Installed Programs
Tired of that annoying little window that pops up to tell you that new software is
installed? If it gets in the way when you’re logging off, turn it off completely. To do
this:
· Click Start, right-click at the top of the Start menu where your name is displayed,
and then click Properties.
· In the Taskbar and Start Menu Properties dialog box, on the Start Menu tab, click
Customize.
· Click the Advanced tab, and then clear the Highlight newly installed programs check
box.
· Click OK, and then click OK again
Change the Default Opening Folder in Windows Explorer
By default, Windows Explorer opens showing the My Documents folder. To change the
default setting so that all top-level drives and folders are shown, follow these steps:
· Click Start > Programs > Accessories, then right-click Windows Explorer, and click
Properties.
· Under Target field, which reads %SystemRoot%\explorer.exe, add to make the line
read:
%SystemRoot%\explorer.exe /n, /e, /select, C:\
Close Multiple Windows
If you just opened a number of separate, related windows (a folder inside a folder,
and so on), there’s an easier way to close them all than one-at-a-time:
· Hold down the shift-key as you click the X caption button in the upper-right corner
of the last window opened. Doing so closes that window and all windows that came before it
change fat -> ntfs
To change ur File system from command prompt
type: convert c:/fs:ntfs(ex:’c’ is the drive letter)
Xp problems and their solutions by Suresh Dangi
Posted by Suresh kumar Dangi in computer on January 3, 2012
There is One for Everyone !!
1) When i try to access my task manager(Ctr+Alt+Del)…it displays message
‘task manger has been disabled by ur administrator’…, and also i cant access my registry too..!!
what may have caused this problem….
is it becos of some VIRUS…????
how can i repair this without re installing…?? any particular software??
1: Close the IE browser. Log out messenger / Remove Internet Cable.
2: To enable Regedit
Click Start, Run and type this command exactly as given below: (better – Copy and paste)
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f
3: To enable task manager : (To kill the process we need to enable task manager)
Click Start, Run and type this command exactly as given below: (better – Copy and paste)
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 0 /f
4: Now we need to change the default page of IE though regedit.
Start>Run>Regedit
From the below locations in Regedit chage your default home page to google.com or other.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
HKEY_ LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main
HKEY_USERS\Default\Software\Microsoft\Internet Explorer\Main
Just replace the attacker site with google.com or set it to blank page.
5: Now we need to kill the process from back end. Press Ctrl + Alt + Del
Kill the process svhost32.exe . ( may be more than one process is running.. check properly)
6: Delete svhost32.exe , svhost.exe files from Windows/ & temp/ directories. Or just search for svhost in your comp.. delete those files.
7: Go to regedit search for svhost and delete all the results you get.
Start menu > Run > Regedit >
8: Restart the computer. That’s it now you are virus free.
it works !!
** Shared from Internet (reva)
2)I don’t have IIS( Internet Information Services) windows componet on my system
As far as I know one can’t have IIS running on XP Home. I think u will have to upgrade it to XP Prof.
in proff That’s simple get the Win XP CD, go to control panel–>add/remove programs and then to add/remove windows components. There u will find the option for adding IIS, just check the checkbox and follow the instructions. You r done!!
3) Folder Option Vanished
IF U WANT UR FILES THT WERE HIDDEN U CAN TYPE *.* IN SEARCH AND ALSO TICK THE OPTION “INCLUDE HIDDEN FILES”.
NOW SEARCH IN THE DRIVE IN WHICH U STORED UR FILES, U WILL GET UR FILES BUT TO GET BACK THE OPTION U EITHER HAVE TO REINSTALL WINDOWS OR REPAIR IT. well this is as far as i know..
Post your Comment If you Know More
4) My volume icon is not showing in taskbar, Yet It’s Enable From Control Panel > Sound And devices
Assuming that you have tried the basic steps i am directly trying with the most possible solutions. This issue most commmonly occurs because the settings are not saved. Also there might be some startup program which is diabling the Systray.exe from loading up.
Try this…
1) Re-enable the volume icon by disabling and then enabling Place volume icon in the taskbar in the Sound and Audio applet.
2) Then copy the following text which is in red into a notepad file and then save it as “fix.reg”. Please make sure that there is no .txt extension after that.
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
“NoSaveSettings”=dword:00000000
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
“SystemTray”=”SysTray.Exe”
3) Merge the file to the registry by simply double clicking on it.
4) Reboot
This should definitely work. Please reply back with the status.
Cheers
:shared frm internet (bond)
5)Whenever i try d’loading stuff from the net, the download starts and the comp just restarts. due to dis i have to install d’load managers wich i hate. help needed anyone. i have win xp!
If the computer just restarts itself, it cud possibly be an application crash..
check the Dr.watson log for details..
START-RUN- drwtsn32.
check the path for the log here… open the log and check which application is causing the crash.
turn of automatic reboot,cos you wud miss it if there is a BSOD being generated.
or may be u could try this one out
Go to Start>Run–Type ‘services.msc’, hit ENTER
Scroll down to a service called Remote Procedure Call, right click, go to properties, there will be a tab named Recover Action, change it to ‘Take No Action’ if it’s not already selected. Your problem should be solved for the time being. Also look for all network related srvices DNS, TCP-IP and also Windows Firewall/ICS service if you’re on LAN/WAN, see that all of these are set to Automatic or Manual. Reply to me with results
(david n kumar)
6)I accidentally deleted the Show Desktop icon which sits normally on the bottom left hand corner of the Taskbar. How do I restore the icon?
Click Start, Run and type the following command:
regsvr32 /n /i:U shell32.dll
The Show Desktop icon file should be available now.
or
Click Start, Run, and type Notepad.exe. Copy the following contents to Notepad.
[Shell]
Command=2
IconFile=explorer.exe,3
[Taskbar]
Command=ToggleDesktop
Save the file as – : Show Desktop.scf. Now, drag the file to the Quick Launch Toolbar. (Notepad might automatically append a .txt extension to the file name. Remove this extension if present.)
Top 5 Security Tips To Protect Your Computer From USB Viruses– Suresh Dangi
Posted by Suresh kumar Dangi in computer on January 3, 2012
With increasing anti-virus security in place against email-aware viruses and malware, hackers are turning their attention to less well-defended routes such as USB drives. This is the latest method that’s used by hackers to torment innocent users. However, there are ways you can protect your computer from USB and Pen drive viruses.
1.Block USB Viruses
Invest in an excellent anti-virus program that has built in USB virus scan and remover. These anti-USB virus scan programs not only protect your computer from USB Autorun viruses but can also clean worms, Trojans and viruses in your USB memory sticks.You can try anti-virus programs for USB virus such as USB Virus Scan, USB Drive Antivirus and so on.
2.Disable Your Computer’s Autorun Feature
When you plug in a USB drive stick into your system, the Autorun feature initiates automatically. If your USB contains any virus programs, it’ll use the Autorun feature to infect your computer. To protect your computer, disable the Autorun feature.You can disable the Autorun feature via the Control Panel.
Alternatively, you can use antivirus software to disable and enable the Autorun feature whenever you want. Additionally, these USB blocking softwares allow system administrators to specify which removable storage drives users can access.
3.Update Your Device Driver
Keeping your USB device driver updated is a good way to ensure greater stability for your USB drives. While this won’t help eradicate USB viruses, USB device drivers are constantly updated to block viruses and deliver timely warnings. You can update your USB device drive from your Windows Computer Management feature in the Control Panel.
4.Use USB Firewall Software
USB firewalls prevent Windows OS from processing malicious programs when a virus infected portable USB device is opened. USB firewalls monitor only your USB devices, and not your CD and DVD drives. By using USB firewalls, you’ll be enabling a basic level of protection from the autorun.inf viruses that spread from portable USB devices.
5.Always Safely Remove USB Devices
Viruses are sometimes created via damaged documents. If you are transferring a set of files to your USB drive, make sure the transfer is complete before you eject the device. Always use the Safely Remove Hardware feature of Windows OS. This is because partially transferred or damaged files can in turn corrupt other files on your USB drive.
TURN ON UR PC IN JUST 10 SECONDS by suresh dangi
Posted by Suresh kumar Dangi in computer on January 3, 2012
Aight so u wanna know how to turn the pc on in 10 seconds (may vary)Aight heres what u have to do to turn ur pc on in 10 seconds
Aite Click on the start button then press R it will take u to Run well go to run
n type Regedit
press enter
this will open Registery Editor
now look for the key
HKEY_LOACAL_MECHINE\SYSTEM\CurrentControlSet\Control\ContentIndex
now there find the Key Called
“Startup Delay”
Double Click On It
Now where its Base
Click Decimal
Now its Default Value Is 4800000 (75300:hexadecimal)
Change The Value To 40000
here u go u have done it
now close the Registery Editor and Restart Your Computer
Clear CMOS all Tricks– Suresh Dangi
Posted by Suresh kumar Dangi in computer on January 3, 2012
Clear CMOS all Tricks
ENTERING DEBUG
Debug has been included in every version of MS-DOS as well as Windows. When running any of the debug routines it is recommended that if you have Windows that you exit or shut down to get into a real DOS prompt (unless you’re running Windows ME, Windows 2000, Windows XP, or later versions).
Once at the MS- DOS prompt, run through the below example, this example is perfectly fine to run on any PC Computer running MS-DOS / Windows and will not harm anything.
Type debug and press enter.
This should get you to a – (small dash). This is the debug prompt.
At the – type d40:00 and press enter; this will return several lines of information.
After the feedback you will be back to the debug prompt.
To exit out of debug type q and press enter. This will return you back to the MS-DOS prompt.
In some of the below debug routines you will notice that a “g” is typed, then “q”. G tells the computer that the code type is not self executing and must be run at this point. If completed, the program will return Program Terminated Normally which indicates you can now quit from the debug program. TESTING PORTS
The below debug routine will check the ports of the computer to allow you to know if ports are being detected or not. Type debug to get to the “-” Type D40:0
You should get several lines; however, the first line is the only important line, which should read the following:
0040:0000 F8 03 F8 02 E8 03 E8 02 – 78 03 78 02 BC 03
F8 03
F8 02
E8 03
E8 02
78 03
78 02
BC 03
COM1
COM2
COM3
COM4
LPT1
LPT2
LPT3
The above graph shows you what the feed back means as far as port, so if you see F8 03, this would be an indication that COM1 is being detected; if you see 00 00, this is an indication that it is not being detected, which could mean that hardware is bad or that it is disabled inCMOS
Once you have finished looking at the information, type Q and press enter to get out of Debug.
CLEAR CMOS
The below debug routine will clear CMOS, BIOS, Passwords, Settings, Viruses, and other items residing in the CMOS. During this process you may get returned characters which are an indication that the string has gone in, if you by chance get ERROR ensure that you have typed the line in correctly, if not retype. Ensure that you do not skip any lines, that it is ALL typed in correctly to help prevent problems. Before running this Debug routine also ensure that you have read the above disclaimer. After typing debug you will get “-” which is were you can begin by typing A and pressing enter. A
MOV AX,0
MOV AX,CX
OUT 70,AL
MOV AX,0
OUT 71,AL
INC CX
CMP CX,100
JB 103
INT 20
Note: Nothing is typed on this line
G By pressing G this will execute the above script, ensure you have read and agree to the above disclaimer.
Q Then reboot and you will get a Setup Checksum Error. Go into setup, correct all the incorrect values, time, date…
JOYSTICK TEST
This test will test to see if your Joystick is present or not. Type debug from the DOS prompt once at the “-“. Type i201 If you get a FF response attempt hold one of the main buttons on your joystick, and while holding the button down type i201 and see if a different response is given, each button on the joystick should return a different response. However, some special joysticks, such as the Microsoft Sidewinder, which has more than 4-5 buttons, may not return a response for all extra buttons because these buttons are generally controlled through software. If a FF is still given on each of the buttons on the game paddle or joystick, it is a good possibility that either the Joystick and or the Joystick port is bad. If possible, attempt these steps with another known working joystick. However, if you are receiving different responses when pressing and holding the keys on the joystick, the computer hardware is working properly. Type q and press enter to quit out of debug.
ERASING SECTOR 2
Before doing the below routine ensure that you have read our disclaimer and that you’re sure that this is safe to do on your hard drive. Some computer hard drive manufacturers may void your warranty if this routine is ran or in some situations this can cause damage to the hard drive. This routine is useful in clearing DDO and unknown partitions. If this routine completes successfully it will erase everything in Sector 2. In the below debug routine, only type what is in bold from line 3 to 9, you will get a response if typed in properly. If you get a response continue to type the bold text as shown below in the below example.
A:\>debug
-FCS:200 400 0
-ACS:100
-xxxx:0100 mov ax,302
-xxxx:0103 mov bx,200
-xxxx:0106 mov cx,2
-xxxx:0109 mov dx, 80
-xxxx:010a int 13
-xxxx:010c int 20
-xxxx:0110 (without typing anything)
-g
Program terminated normally.
-q
ERASE ALL HDD INFORMATION
This debug routine is used to erase all partition information on the hard disk drive and is only recommend for experienced users or users who are unable to delete the partition information through fdisk. In the below debug routine, only type what is in bold from line 3 to 8, you will get a response if typed in properly. If you get a response continue to type the bold text as shown below in the below example. A:\>debug
-F 200 L1000 0
-A CS:100
xxxx:0100 MOV AX,301
xxxx:0103 MOV BX,200
xxxx:0106 MOV CX,1
xxxx:0109 MOV DX,80 (80 for hd 0 or 81 for hd 1 ) xxxx:010C INT 13
xxxx:010E INT 20
xxxx:0110
-g
Program terminated normally
-q Once this debug routine is complete, reboot computer and all partitions should be erased. Before anything can be installed back onto the computer you must run Fdisk and recreate the partition as well as format the hard disk drive.
ERASE HDD AND CLEAR CMOS
Before doing the below routine ensure that you read our disclaimer as well as are sure that this is safe to do on your hard drive. Some computer hard drive manufacturers may void your warranty or this may cause damage to the hard drive when doing the below example. This routine is useful in clearing DDO and removing possible viruses. If this routine completes successfully it will erase everything from your Hard Drive as well as your reset your CMOS values. In the below debug routine, only type what is in bold from line 3 to 17, you will get a response if typed in properly. If you get a response continue to type the bold text as shown below in the below example.
A:\>debug
-fcs:200 400 0
-acs:100
-xxxx:0100 mov ax, 0
-xxxx:0103 mov ax, cx
-xxxx:0105 out 70, al
-xxxx:0107 mov ax, 0
-xxxx:010a out 71,al
-xxxx:010c inc cx
-xxxx:010d cmp cx,100
-xxxx:0111 jb 103
-xxxx:0113 mov ax,302
-xxxx:0116 mov bx,200
-xxxx:0119 mov cx,1
-xxxx:011c mov dx,80
-xxxx:011f int 13
-xxxx:012l int 20
-xxxx:0123 (without typing anything.)
-g program terminated normally
If you are doing this debug routine to clear out a possible virus turn off your computer and wait and turn back on.
-q
Once back at DOS, reboot your computer When your computer comes back on from doing the above you will get an error message as booting up the computer, such as “Invalid Configuration”. You must enter CMOS and set the time and date, save, and reboot again. Once rebooted, you will then need to run fdisk and recreate the partitions. Once created, you will then need to format the hard drive and proceed as normal.
DISCHARGE OLD LAPTOP BATTERIES
The below debug routine is used for older laptop batteries (i.e. batteries made from 1990-1992), we do not recommend using this routine on any newer laptop batteries or any NiMH batteries N DPDISCHG.COM
A
MOV DX,01E8
MOV AL,F9
OUT DX,AL
INT 20
RCX
10
W
Q This will write dpdischg.com to the current directory. To run this utility type dpdischg.
REBOOT YOUR COMPUTER
Implement this debug routine to reboot your computer. DEBUG E 40:72 34 12
RCS
FFFF
RIP
0000
G To create a batch file that reboots your computer without having to type the above command each time, use the below example. GOTO BEGIN
E 40:72 34 12
RCS
FFFF
RIP
0000
G
:BEGIN
DEBUG < REBOOT.BAT
CREATE A SLEEP FILE
This file allows your computer to sleep for a specified amount of time. This file is not dangerous in any way; if typed improperly, more than likely the file will just not work. Type Debug You should get a "-" begin typing the below information; after each line you may get a response, do not press enter and type the next line after the response. N SLEEP.COM
A 100
MOV SI,0082
MOV AX,[SI]
XCHG AH,AL
XOR AX,3030
MOV BL,AL
MOV AL,0A
MUL AH
ADD AX,BX
MOV SI,AX
MOV AH,2C
INT 21
MOV BL,DH
MOV AX,SI
AAM
OR AX,3030
XCHG AH,AL
MOV [0160],AX
MOV AH,09
MOV DX,0160
INT 21
MOV AH,06
MOV DL,FF
INT 21
JZ 014C
OR AL,AL
JNZ 013F
MOV AH,08
INT 21
MOV AL,FF
MOV DX,016C
PUSH AX
MOV AH,09
INT 21
POP AX
MOV AH,4C
INT 21
MOV AH,2C
INT 21
CMP BL,DH
JZ 012D
MOV BL,DH
DEC SI
JNZ 011A
SUB AL,AL
MOV DX,016C
JMP 0142
DB "XX SECONDS", D, 24
DB " ", D, A, 24 RCX
79
W
Q Tip: You may cut and paste the above test into a notepad document and save the file with a .scr extension. Once saved from DOS, type debug type debug – d FFFF:5 L 8 After typing the above command you should receive a string similar to: FFFF:0000 30 34 2F-33 30 2F 39 38 4/30/98 The 4/30/98 would be the date of your computer BIOS.
VIDEO CARD TYPE
The below debug routine will list the type of video card within your computer. This is an excellent way of determining the chipset on the card or the card within your computer without opening the computer. At the C:\> type debug -d c000:0040 After typing the above command you should receive several lines of text similar to: C000:0040
00
00
00
00
00
00
00
00
–
00
00
00
00
00
00
00
00
…………….
C000:0050
E9
63
7B
00
B4
10
49
27
–
E9
FE
2B
E9
F7
2B
50
4D
.c{…I’..+..+PM
C000:0060
49
44
58
00
5B
00
00
00
–
00
A0
00
B0
00
B8
00
C0
IDX.[………..
C000:0070
00
5B
53
54
42
20
6E
56
–
49
44
49
41
20
54
4E
54
.[STB nVIDIA TNT
C000:0080
20
76
65
72
2E
20
31
2E
–
31
30
20
0D
0A
00
1B
43
ver. 1.10 ….C
C000:0090
6F
70
79
72
69
67
68
74
–
28
43
29
31
39
39
38
20
opyright(C)1998
C000:00A0
53
54
42
20
53
79
73
74
–
65
6D
73
20
49
6E
63
0D
STB Systems Inc.
C000:00B0
0A
00
22
6C
2C
0A
01
00
–
C3
50
24
7F
E8
60
36
58
..”1,….P$..’6X
As you can pick out in the above dump, this gives you enough information to determine the make and the year made on the video card. On line 4 you can see the make of this video card, which in this case is a N VIDIA TNT which would be the Riva TNT chipset. The next line you notice the version of the card and finally the line thereafter is the copyright or the year manufactured, generally. If you are unable to capture any information which sounds like the video card, you can also type -d c000:0090
You must be logged in to post a comment.