Lock folder without any software
Suppose you want to lock the folder games in d: which has the path D:\Games.In the same drive create a text file and type
ren games games.{21EC2020-3AEA-1069-A2DD-08002B30309D}
Now save this text file as loc.bat
create another text file and type in it
ren games.{21EC2020-3AEA-1069-A2DD-08002B30309D} games
Now save this text file as key.bat
Now you can see 2 batch files loc and key.Press loc and the folder games will change to control panel and you cannot view its contents.Press key and you will get back your original folder.
USE
{20D04FE0-3AEA-1069-A2D8-08002B30309D} - Turned to Explorer
{0DF44EAA-FF21-4412-828E-260A8728E7F1} - turned to startmenu properties
{6DFD7C5C-2451-11d3-A299-00C04F8EF6AF} - Turned to Folder Options
{7007ACC7-3202-11D1-AAD2-00805FC1270E} - Turned to Network Connections
{D20EA4E1-3957-11d2-A40B-0C5020524152} - Turned to Fonts Folder
{D6277990-4C6A-11CF-8D87-00AA0060F5BF} - Turned to Shedule tasks
{E211B736-43FD-11D1-9EFB-0000F8757FCD} - Turned to Scanners & camera
{645FF040-5081-101B-9F08-00AA002F954E} - Turned to Recycle bin
{2227A280-3AEA-1069-A2DE-08002B30309D} - Turned to Printers Folder
Saturday, December 16, 2006
Tuesday, April 18, 2006
How to find a lost mobile phone
Useful Thing
A mail from one of my friend:
Experience makes Men perfect. Here is the story.
We have been getting several forwarded mails about getting the International Mobile Equipment Identity (IMEI) number of a cell phone and we used to forward the same to n number of persons but we are ignorant about this, and it costs me a lot now. Some one flicked my Motorola V551 Mobile from Hotel Snows Park in Velacheri on last Friday. When I contacted Local Police they redirected me to a newly Started "CYBER CRIME CELL" which is located in Egmore. I sent a mail to the ACP Mr. Balu and with in a day they responded back asking for IMEI number, unfortunately i never bothered to save that info.
Now Chennai Police is able to track down the cell phone with the special software they have if you give the IMEI number. They can track the cell even if they change the SIM to any other one. This was the first time i felt like a fool in front of them for not having this IMEI information.
So here are the tips. Please make a note of your IMEI number now itself. You can find it in the battery compartment or by keying in *#06#. And if your cell is lost please contact "CYBER CRIME CELL" with the IMEI number at the following Email addresses.
cyberac@rediffmail.com baluac@vsnl.net
Here is the address.
S. BALU,
Assistant Commissioner of Police,
CYBER CRIME CELL,
Central Crime Branch,
Egmore,
Chennai - 8.
Also this will prevent the misuse of any data in the cell phones.
A mail from one of my friend:
Experience makes Men perfect. Here is the story.
We have been getting several forwarded mails about getting the International Mobile Equipment Identity (IMEI) number of a cell phone and we used to forward the same to n number of persons but we are ignorant about this, and it costs me a lot now. Some one flicked my Motorola V551 Mobile from Hotel Snows Park in Velacheri on last Friday. When I contacted Local Police they redirected me to a newly Started "CYBER CRIME CELL" which is located in Egmore. I sent a mail to the ACP Mr. Balu and with in a day they responded back asking for IMEI number, unfortunately i never bothered to save that info.
Now Chennai Police is able to track down the cell phone with the special software they have if you give the IMEI number. They can track the cell even if they change the SIM to any other one. This was the first time i felt like a fool in front of them for not having this IMEI information.
So here are the tips. Please make a note of your IMEI number now itself. You can find it in the battery compartment or by keying in *#06#. And if your cell is lost please contact "CYBER CRIME CELL" with the IMEI number at the following Email addresses.
cyberac@rediffmail.com baluac@vsnl.net
Here is the address.
S. BALU,
Assistant Commissioner of Police,
CYBER CRIME CELL,
Central Crime Branch,
Egmore,
Chennai - 8.
Also this will prevent the misuse of any data in the cell phones.
SPYWARE GLOSSARY
Adware: A type of Advertising Display Software, specifically certain executable applications whose primary purpose is to deliver advertising content in a manner or context that may be unexpected and unwanted by users. Many Adware applications also perform tracking functions, and therefore may also be categorized as Tracking Technologies. Consumers may want to remove Adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance. Some users may wish to keep particular Adware programs if their presence subsidizes the cost of a desired product or service or if they provide advertising that is useful or desired.
Botnet: A type of Remote Control Software, specifically a collection of software robots, or “bots”, which run autonomously. A botnet's originator can control the group remotely. The botnet is usually a collection of cracked machines running programs (worms, trojans, etc.) under a common command and control infrastructure. Botnets have been used for sending spam remotely, installing more spyware without consent, and other illicit purposes.
Browser Plug-in: A software component that interacts with a web browser to provide capabilities or perform functions not otherwise included in the browser. Typical examples are plug-ins to display specific graphic formats, to play multimedia files, or to add toolbars, which can offer searching or anti-phishing services. Plug-ins can also be used to perform potentially unwanted behaviors such as redirecting search results or monitoring user browsing behavior , or installing other unwanted software like nuisance or harmful adware. Types of Browser plug-ins include:
ActiveX controls: A type of Browser Plug-in that is downloaded and executed by the Internet Explorer web browser.
Browser Helper Object (BHOs): A Type of Browser Plug-in that is executed each time the Internet Explorer web browser is launched. Toolbars are a common form of BHO.
Cookie: A piece of data that a web site, through the means of the browser, saves on users’ computers’ hard drives and retrieves when they revisit that Web site or an affiliated site. Some cookies may use a unique identifier that links to information such as login or registration data, online "shopping cart" selections, user preferences, web sites you have visited, etc.
Dialer : A program that utilizes a computer’s modem to make calls or access services. Users may want to remove dialers that can result in unexpected phone numbers being dialed or unexpected telephone charges. Dialer is a colloquial term for Dialing Software.
Distributed Denial-of-Service (DDoS) Attack: A means of burdening or effectively shutting down a remote system by bombarding it with traffic from many other computers. DDoS attacks are typically launched using the compromised systems of Internet users. An attacker will exploit a vulnerability in one computer system and make it the DDoS “master” using Remote Control Software. Later, the intruder will use the master system to identify and communicate with other systems that can perform the attack.
Downloader : A program designed to retrieve and install additional files. Downloaders can be useful tools for consumers to automate upgrades of essential software such as operating systems, browsers, anti-virus applications and anti-spyware tools. Automated upgrades are useful for closing off security vulnerabilities in a timely way. Unauthorized downloaders are used by third parties to download potentially unwanted software without user notification or consent.
End User License Agreement (EULA): An agreement between a producer and a user of computer software that specifies the parameters of use granted to the user. The software producer specifies these parameters and limitations on use, which can become part of a legally binding contract. Some companies use the EULA as the sole means of disclosure of a program’s behaviors or bundling.
Hacker: In computer programming, hacker means a programmer who hacks or reaches a goal by employing a series of modifications to exploit or extend existing code or resources. In computer security, hacker translates to a person able to exploit a system or gain unauthorized access through skill and tactics (Wikipedia). A person who illegally gains access to and sometimes tampers with information in a computer system (Merriam- Webster).
Macromedia Flash: A platform that supports the authoring and display of multimedia content (e.g., graphics, audio, and/or streaming media). Flash content can appear in a web page or be stored in file. Playing Flash content within a browser is typically done through a Browser Plug-in that includes the Flash player. The Flash player is pre-installed in several web browsers and on different operating systems. Flash MX technology includes a mechanism that can be used as alternative to tracking cookies (see PIE).
Persistent Identification Element (PIE) : PIE is a Tracking Technology designed to be an alternative to a cookie that uses Macromedia Flash local shared objects to identify visitors.
Port Scanner : Security Analysis Software used to discover what computer network services a remote system provides. Port scanning gives an assailant an idea where to probe for weaknesses.
Privacy Policy: A legally binding notice of how a company deals with a user’s personal information. The privacy policy should contain information about collecting information and the secondary uses of data including how information is shared with third parties.
Remote Access/Administration Tool (RAT): An executable application designed to allow remote access to or control of a system. RATs are a type of Remote Control Software. While there are many legitimate uses of RATs that do not pose security threats, they can be used maliciously by attackers to start or end programs, install and uninstall new software, or perform other potentially unwanted or unauthorized actions.
System Monitor: Tracking Software used to monitor computer activity. System Montiors range in capabilities but may record some or all of the following: keystrokes, e-mails, chat room conversations, instant messages, Web sites visited, programs run, time spent on Web sites or using programs, or usernames and passwords. The information is typically either stored for later retrieval or transmitted to the remote process or person employing the Monitor. Keyloggers and Screen Scrapers are types of System Monitors.
Tracking Cookies: A Tracking Cookie is any cookie used for trackingusers’ surfing habits. Tracking Cookies are a form of Tracking Technology. They are typically used by advertisers wishing to analyze and manage advertising data, but they may be used to profile and track user activity more closely. However, tracking cookies are far more limited in their ability to track users than software that is actually installed on users’ computers. While installed software can potentially record any data or activity on a computer (see System Monitor), cookies can only record visits or activity on a single website or its affiliated sites. Moreover, unlike Tracking Software, cookies entail no substantial effect on computer reliability, security, or speed.
Trojan : A non-replicating malicious program designed to appear harmless or even useful to the user, but, when executed, harms the user's system. Some software bundles containing malicious forms of spyware or other potentially unwanted software are considered to be Trojans.
Virus : Self-replicating code that propagates by reproducing and inserting itself into other programs, documents, or email attachments. Some viruses are intentionally destructive (for example, erasing information on users' hard drives). For others, the primary negative effect is their uncontrolled self-reproduction, which can overwhelm system resources.
Worm: A computer worm is a self-replicating computer program, similar to a computer virus. Unlike viruses, however, worms self-propagate and so do not require other programs or documents to spread. Worms typically spread through email or other file transmission capabilities found on networked computers.
Zombie: A system that has been taken over using Remote Control Software. Zombies are often used to send spam or to attack remote servers with an overwhelming amount of traffic (a Distributed Denial of Service Attack).
Friday, March 31, 2006
Exiting Windows the Cool and Quick Way
Normally it takes a hell lot of time just Shutting down Windows, you have to move your mouse to the Start Button, click on it, move it again over Shut Down, click, then move it over the necessary option and click, then move the cursor over the OK button and once again (you guessed it) click.This whole process can be shortened by creating shortcuts on the Desktop which will shut down Windows at the click of a button.
Start by creating a new shortcut( right click and select New> Shortcut). Then in the command line box, type (without the quotes.)
'C:\windows\rundll.exe user.exe,exitwindowsexec'
This Shortcut on clicking will restart Windows immediately without any Warning.
To create a Shortcut to Restarting Windows, type the following in the Command Line box:
'c:\windows\rundll.exe user.exe,exitwindows'
This Shortcut on clicking will shut down Windows immediately without any Warning.
Start by creating a new shortcut( right click and select New> Shortcut). Then in the command line box, type (without the quotes.)
'C:\windows\rundll.exe user.exe,exitwindowsexec'
This Shortcut on clicking will restart Windows immediately without any Warning.
To create a Shortcut to Restarting Windows, type the following in the Command Line box:
'c:\windows\rundll.exe user.exe,exitwindows'
This Shortcut on clicking will shut down Windows immediately without any Warning.
Subscribe to:
Posts (Atom)