Tuesday, December 01, 2009

Command Promt Magic


How to Change your IP !!
1. Click on "Start" in the bottom left hand corner of screen2. Click on "Run"3. Type in "command" or "cmd"and hit okYou should now be at an MSDOS prompt screen.4. Type "ipconfig /release" just like that, and hit "enter"5. Type "exit" and leave the prompt6. Right-click on "Network Places" or "My Network Places" on your desktop.7. Click on "properties"You should now be on a screen with something titled "Local Area Connection", 8. Right click on "Local Area Connection" and click "properties"9. Double-click on the "Internet Protocol (TCP/IP) " from the list under the "General" tab10. Click on "Use the following IP address" under the "General" tab11. Create an IP address (put any ip there like 1.2.3.4 it doesn't matter what you give there , this is only to tell you how to change your "IP" .12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.13. Hit the "Ok" button here14. Hit the "Ok" button againYou should now be back to the "Local Area Connection" screen.15. Right-click back on "Local Area Connection" and go to properties again.16. Go back to the "TCP/IP" settings17. This time, select "Obtain an IP address automatically"18. Hit "Ok"19. Hit "Ok" again20. You now have a new IP addressWith a little practice, you can easily get this process down to 15 seconds.
Love happen's once and the rest is just life!!!!
Posted by Marshal at 11:12 AM 0 comments
Labels: ,
Wednesday, December 12, 2007

Tips For Command Prompt !!
Turn on Quick Edit Mode. This will allow you to easily select, copy and paste all with just your mouse and a right click. When typing in a file or folder name, type in part of the name and then hit the TAB key to bring up matches. Use SHIFT +TAB to go the other direction. When searching for a file, type in dir part_of_filename* to look for the file in the folder. To search sub directories as well, append the /s flag as well. Example: dir exp* /s Use the up arrow to go back over past commands. Alternatively you can hit F7 and go directly to the command. When working with network drives type: prompt $m$p$g to show the full network path along with the drive prompt. Other prompt settings can be found by running prompt /?. You can print the contents of a file by typing: copy file.txt prn Write the output of any command by appending > output.txt. For example, dir > filelist.txt
Love happen's once and the rest is just life!!!!
Posted by Marshal at 10:28 AM 0 comments
Labels:

Customize The Command Prompt !!
1◘ Click on the Start Button and key in Command Prompt and hit Enter. 2◘ Once Command Prompt has started, right click on the top left icon in the menu bar and select Defaults. Alternatively you can select Properties if you want to have different settings for different Command Prompt shortcuts. 3◘ You will now see the four tabs of options to customize. The sections that I always work with are Font, Layout and Colors. To get started, click on the Font tab. Here you will be able to change the font and size used. If you would like a micro prompt as shown below, select Raster Fonts and size 4x6.4◘ On the Layout tab you can specify the size and location of the window as well as the buffer. I usually only change the Screen Buffer Height setting. This controls how many previous command lines are saved and can be scrolled back up through. 5◘ Increasing this value is useful if you are looking at a large directory with more than 300 files. I always increase the Height value to the max which is 9999. 6◘ The Color tab is where you get to have the most fun changing the look of your Command Prompt. Just select what you want to change the color for and then change the color. 7◘ Back on the Options tab I recommend turning on Quick Edit Mode. This allows you to easily highlight text without having to go to Edit -> Mark and copy it by just right clicking. Then you can paste it by simply right clicking once more. 8◘ When you are finished customizing your Command Prompt, just hit OK to save your changes.
Love happen's once and the rest is just life!!!!
Posted by Marshal at 10:28 AM 0 comments
Labels: ,
Thursday, November 15, 2007

How to Hack (Basic Tips To Start Hacking ) !!
How to Hack?what they do to Hack?These are the common enough question, asked on nearly every hacking board across the web, and yet, no one seems to be able to answer it. One reason for this is the fact that the vast majority of people who really don't have, want, or need a clue. Then there's a small minority who have a good basic knowledge but simply not enough conviction to teach. Then there's the tiny minority who really know the ins and outs of computer systems, they can program exploits, bug fixes, and can generally fix, or find out how to fix nearly any problem. These are the people referred to as computer experts. An even smaller percentage of people again are called hackers. Hacker is a term that over recent time has been changed and exploited by the media to mean someone who breaks into and destroys a computer system. I don't like these people. These are the people who give true hackers a bad name. By dictionary definition, a hacker is someone who has an extraordinary ability to push a computer system, or program, to work beyond expected boundaries, "He hacked away at the program all night until he got it to work". A Hacker, in the true meaning should be respected, the modern interpretation, someone who breaks systems is traditionally known as a crackerThe biggest reason for someone to truly want to become a hacker is to learn. There's no bigger reason than this. The simple craving to learn about, change, understand and improve a computer system and/or program is the single biggest goal for any hacker. Maybe the second biggest reason behind hacking is freedom. To understand this you must fist understand what I talked about in the previous paragraph, that hacking is not breaking systems, but improving them. Any one who considers themselves half knowledgeable about the Internet should have heard of Gnu/Linux. If you haven't please refer to http://www.linux.org/info/index.html. Linux and the GNU project embody the spirit of what I consider to be a true hacker goal. The ideas of freedom, improvement and development should be at the heart of every hacker's life. The Internet itself is another representation of this ideal. There is no one owner of the Internet; anyone can access it for no costs other than that of a phone call. The Internet is the single biggest source of information the world has ever seen. It contains information on billions of subjects, the vast majority of which is absolutely free. A person with a connection to the Internet can access information on everything from quantum computing to the exploration of mars, from pro-anarchy to pro-capitalist. It allows all this information to be accessible to everyone with no discrimination on the basis of age, colour, religious or political orientation. That's enough of a rant on freedom now. I'm sure most people are reading this to find out what it takes to become a hacker.A hacker, as I have previously explained, is a person who has a craving for knowledge. If you don't have the will to learn continuously, spend countless hours reading, researching and improving then hacking defiantly isn't for you. Many people will give up after a few months, many I'm sure didn't even make it to this far into the document, if you did then well done, keep reading, in time, you will learn to truly enjoy hacking away at your own programs and helping others too. I am by no means a hacker; neither do I claim to be. However, I have been reading, learning and sometimes even contributing for quite a while now, and hopefully this document will allow you to do the same. Enough talk. This is where you start to learn.As by now you will know, the main aim of hacking is knowledge. Before you can even hope to understand how to improve software you must fist understand how the current software works. Since most newbies (Newbie n. Someone who has little knowledge or experience with computer systems and/or programs) I assuming will be using a version of the Windows OS (OS - Operating System) Since you wish to learn how to hack I am assuming you have quite a strong grasp of the basics or Windows such as how to run programs, navigate your hard disk, install new software, hardware etc. If you do not know how to do this use the built in help function by clicking Start -> Help, or use your favourite search engine, I suggest google.com as it's probably the largest in the world. Learn how to use everything about your OS, including MS-DOS. To open a MS-DOS prompt, or shell Click on Start -> Programs -> MS-DOS Prompt , if this fails or the link isn't there for some unknown reason click Start -> Run and then type 'command.com'. This will run the program command.com, which is located in the c:\ directory of your hard disk. There are various programs that can be run from the dos prompt, which are very useful in basic hacking techniques.Intro to MS-DOSMS-DOS is a command line OS which is the basis for most windows OS's. It has many internal commands such as copy, cd, cls, ren, del. And several external commands including sys, move, format, deltree, syscopy. Internal commands are commands which are built into the command.com program and so can be run in any MS-DOS with no dependencies, External commands are commands which are not built into command.com, they are external programs which are usually found in c:\windows\command but can be found anywhere. In DOS, to find out what a command does you can type 'command /?' at a dos prompt where command is the name of the command you wish to learn about. This is invaluable and if you ever need to find out what a command does, this is the first thing you should try. Next I am going to explain some basic MS-DOS commands which will be useful during your exploration of the web.pingUsage: ping [-options] hostname.domainOutput:Pinging yahoo.com [66.218.71.112] with 32 bytes of data:Reply from 66.218.71.112: bytes=32 time=306ms TTL=45Reply from 66.218.71.112: bytes=32 time=430ms TTL=45Reply from 66.218.71.112: bytes=32 time=295ms TTL=45Reply from 66.218.71.112: bytes=32 time=340ms TTL=45Ping statistics for 66.218.71.112:Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),Approximate round trip times in milli-seconds:Minimum = 295ms, Maximum = 430ms, Average = 342msPing sends a ping request to a domain name to test its reactivity and response times. It does this by sending a packet of information to the server in question and requests a response. The output, as you can see is tells you the domain name that is being pinged, its IP address, the size of packets sent out, the response times, and averages. Ping is a very useful command as it tells you the IP address of a domain name, and tells you if it is 'alive' and responsive. The uses of this will become apparent later on. To find out extra options that can be used with ping, type 'ping /?' at the dos prompt.netstatUsage: netstat [-options]Output:Active ConnectionsProto Local Address Foreign Address StateTCP pbn-computer:1067 w3.dcx.yahoo.com:80 ESTABLISHEDTCP pbn-computer:1069 209.73.225.7:80 ESTABLISHEDTCP pbn-computer:1070 212.187.244.14:80 ESTABLISHEDTCP pbn-computer:1071 212.187.244.14:80 ESTABLISHEDNetstat gives a list of all connections coming to and from your computer. It displays the ports (A virtual port of a computer is like an imaginary route for information to come in and out of your computer (to the internet) All services and programs which use the internet use a different port to ensure that information does not get sent to the wrong program) and IP's of both ends of the connections. There are thousands of available ports, not something you run out of. Once again, typing 'traceroute /?' at the dos prompt to get more information. Netstat can also be used as a crude method of getting a person's IP. To do this you do the following, for the sake of simplicity you should try to minimise the number of connections, this can be done by closing internet browsers, chat programs etc. Firstly, you will need to talk to the person on a chat program such as msn messenger, aim, yahoo messenger or something similar. At the dos prompt type 'netstat > temp1.txt' this will give the standard output, but the output will be routed into the file temp.txt (which if does not exist, will be created, and if does exist will be over written). Next you will need to establish a direct connection with the target computer, this can be done by initiating a file transfer. Whilst the file transfer is talking place you will need to once again type 'netstat >temp2.txt'. The next task is to compare the two files (temp1.txt and temp2.txt), the second file should contain an IP address that is not in the first, this new connection is the connection you initiated o the target computer, hence the IP address is the IP of your target. tracertUsage: tracert [-options] IPOutput:Tracing route to yahoo.com [66.218.71.113]over a maximum of 30 hops:1 * * * Request timed out.2 175 ms 180 ms 180 ms cdf-dam1-a-fa11.inet.ntl.com [62.252.33.201]3 185 ms 200 ms 200 ms 62.254.253.174 180 ms 170 ms 190 ms bir-bb-a-so-220-0.inet.ntl.com [213.105.172.45]5 165 ms 180 ms 180 ms bir-bb-b-ge-720-0.inet.ntl.com [62.253.185.154]6 320 ms 360 ms 320 ms yahoo-above-1.pao1.above.net [64.125.31.230]7 400 ms 340 ms 339 ms ge-1-3-0.msr2.pao.yahoo.com [216.115.100.146]8 315 ms 355 ms 345 ms vl11.bas2.scd.yahoo.com [66.218.64.138]9 420 ms 320 ms 340 ms yahoo.com [66.218.71.113]Trace complete.Tracert short for trace route does exactly that, it traces the route taken by individual packets of information as they are transmitted across the Internet to the destination. The uses of this are numerous and will become clear as you learn more. In its simplest form it can be crudely used to find out a persons ISP and even locate them on a international level. For example, is you tracert a persons ISP, and the final hop before reaching them is m284-mp1-cvx1c.car.ntl.com [62.252.45.28] , we know that the person uses ntl as an ISP, on further investigation it can be found that ntl is a UK based ISP and the abbreviation .car. stands for Cardiff, a city in the UK. From this we know that the person in question uses ntl and lives in the vicinity of Cardiff. Encase any one out their is wondering, I do live in Cardiff, UK and the IP address is mine, its a dynamic IP address (dynamic means it changes every time I connect to the internet as oppose to static which means the connection is constant and IP does not change). Use 'tracert /?' for more information. Ok, so they are three basic, and surprisingly simple yet useful commands to give you a basic understanding of DOS. If you want to learn more then I suggest you search the internet, http://www.google.com is, as far as I know, the biggest search engine on the web and along with the most simple of knowledge should allow you to find anything about anything. The next step in your journey towards hackerdom is a programming language. Many people wonder why they should 'waste their time' learning a language to help them hack when they could just as easily download a trojan or other script kiddie (A 'script kiddie' is someone who uses other peoples programs to crack without the knowledge of how they work) tool to break into someone's computer. If you search the web I'm sure you can very easily find programs and viruses that let you take control of peoples computers, delete their programs and cause havoc. This is not hacking. Trojans, getting their name from the Greek trojan horse, require a program to be run on the target computer to allow you access. This will probably work on your friends who don't have virus scanners (as virus scanners will very easily pick up viruses) but if you set your sights on a computer owned by anyone with more than half a brain trojans simply are not effective. Again, to refer back to the original definition of hacking, it is about learning how systems work, how to improve them, not simply to break in and gain control. It is for this reason that in order to hack effectively you _must_ learn a programming language. Their are many different languages out there to learn, they fall into two categories. There are interpreted languages, such as perl, python, bash scripting and even batch scripting (feel free to do a search on any of these to learn more about them). These languages are text files that contain commands that are interpreted by a program and then executed by the computer. They have the advantage of being quick to write and edit but the major advantage is that they can be run on any machine which supports the interpreter of that language but on the downside they run much slower than compiled languages and are generally less powerful. Compiled languages on the other hand create binary files, which do not require an interpreter. They are created when the language is written in a readable text file and then compiled by a compiler. This changes it into a binary file which understandable to humans. To change them you must edit the source code file and recompile them. They have the advantage of being much faster and they allow you to perform much more complex operations. However on the downside they take longer to edit and are OS specific. Examples of compiled languages are C and C++. It is advisable to learn at least one of each of the types of language as this will give you the advantages of both types of language. I suggest that you do some basic reading (again using a search engine) on all the languages I have mentioned. On a personal note, I would suggest that you learn perl, due to its power and simplicity as well as cross-platform compatibility and C, because it is as close as you will get to an Internet standard and is used by most open source programmers. This brings me on to my next topic. Operating systems. As you immerse yourself into the world of hacking I'm sure you will hear everyone shouting at you to run gnu/Linux instead of windows. I'm also sure that most of you will have no idea why. First, a little history. The GNU project was started in 1984 with the aim of developing a completely free and open source operating system. In 1990 Linus Torvalds finished writing a Unix based open source kernel. An operating system is basically a lot of programs grouped together to run computer hardware the kernel is the software that interfaces directly with the hardware, and the other software interfaces with the kernel. In short, an operating system cannot exist with out both software and a kernel. By the time that Linus Torvalds finished writing his kernel, the Gnu project has just about finished writing their OS, all they were short of was a kernel. The timing was perfect. Linus and the GNU project teamed up to release the operating system which is commonly called Linux, but should be more accurately know as GNU/Linux. Since that time, Linus has continued developing his kernel and the GNU project has continued developing their software. Since then variations of the GNU/Linux system have developed called distributions. Each distribution is configured differently with slightly different software, each designed for different reasons. Examples of commonly used distributions are SuSe, RedHat, debian and slackware (each have .com sites). Linux is considered _the_ operating system for various reasons, not least of which is its freedom. The GNU/Linux operating system was, and is being, developed under the GNU public licence. This licence is intended to keep software free, under it you are able to change, sell or give away the software for any charge as long as you supply the source code along with it as so to enable other people to have the same rights as you have. Another benefit of the freedom of GNU/Linux is its stability, the fact that the source code is available to anyone means that anyone is free to add to it, change it, modify it. This means that if someone finds a bug they can find it, write a patch and submit it to the author who may include it in his next update. Due to its fundamental Unix like design, Linux is very virus resistant, its user based system it is hard for viruses to spread. Once again, if an exploit is found in and GNU/Linux software you can almost guarantee that a patch will be written within a few days, if not the same day, this means if security is a concern, you can keep your box wrapped up tight.GNU/Linux also has many features built in which make it very good as a development platform. It has built in compilers for C and C++, most distributions also contain perl and python interpreters. Its openness also means that you can customise your distribution much more effectively than with windows, optimising it for speed, stability or security. This is the reason why most hackers or computer enthusiasts use Gnu/Linux. I'm not going to include a guide to how to use Linux, simply because their are so many out there do a search on google.com. However, since I'm feeling nice today I will point you in the direction of my favourite reference http://www.slackware.com/book/, it is supposed to be specific to Slackware Linux, but what it teaches is quite general and will work on any Linux system. As well as all of the above, you should also continuously be reading and learning about current exploits and 'tricks' on both windows and Unix based operating systems. There is no end of information out there for those willing to search. To become a hacker you must want to learn about and more importantly understand everything you come into contact with. If there is a new concept you come into contact with, learn about it, search for it on google.com and if all else fails, ask. Most hacks aim to gain root access, as you will now know from your experience of Linux systems, root is a super user that can do anything on the system. There are five common ways of getting root. MisconfigurationIf excessive permission exists on certain directories and files, these can lead to gaining higher levels of access. For example, if /dev/kmem is writable it is possible to rewrite your UID to match root's. Another example would be if a .rhosts file has read/write permissions allowing anyone to write them. Yet another example would be a script launched at startup, cron, or respawned. If this script is editable, you could add commands to run with the same privileges as who started them (particularly for startup rc files this would be as root).Poor SUIDSometimes you will find scripts (shell or Perl) that perform certain tasks and run as root. If the scripts are writable by your id, you can edit it and run it. For example I once found a shutdown script world writable. By adding a few lines at the beginning of the script it was possible to have the script create a root shell in /tmp.Race ConditionsA Race Condition is when a program creates a short opportunity for evil by opening a small window of vulnerability. For example, a program that alters a sensitive file might use a temporary backup copy of the file during its alteration. If the permissions on that temporary file allow it to be edited, it might be possible to alter it before the program finishes its editing process.Poor Temp FilesMany programs create temporary files while they run. If a program runs as root and is not careful about where it puts its temp files and what permissions these temp files have, it might be possible to use links to create root-owned files. Buffer OverflowBuffer overflows are typically used to spawn root shells from a process running as root. A buffer overflow could occur when a program has a buffer for user-defined data and the user-defined data's length is not checked before the program acts upon it.Four out of the five ways of getting root mentioned above are only applicable on a machine where you have local access. In these cases you will need to get an account on the machine. This could be in a school or collage that you attend, or simply an internet shell account. Since this text is only meant to be an introduction and outline guide I will not go into huge details about these. There is plenty of information on the web, once again I suggest you use google.com, I can't stress enough how useful a search engine is in the world of hacking. By far the most common way to gain a root shell is through a buffer overflow. It is also unsurprisingly the most complicated of the about ways of getting root and deserves a bit more explanation. Firstly, a buffer is simply a block of computer memory, which holds data of a certain type. If, as I suggested, you have learnt, or are learning, how to program in C, you will probably associate buffers with arrays. A stack has a set amount of space in memory, if you overflow the buffer by sending too much information, the extra data overflows onto the next stack and can be used to execute arbitrary code. For a much better explanation of buffer overflow techniques I suggest you read Phrack 49, File 14, called "Smashing The Stack For Fun And Profit" which can be found at http://www.phrack.com/phrack/49/P49-14 .Well, it looks like this guide has come to an end. There is only one thing that I have left to say. If you follow all the instructions I have mentioned above, you will have a very good understanding of how the Internet, Ms-dos, Windows, Linux and various hacking techniques work, You may even be considered by some to be a Hacker. If you do end up in this situation, the world is yours, continue to learn, expand and enjoy..
Love happen's once and the rest is just life!!!!
Posted by Marshal at 11:59 AM 2 comments
Labels: , , ,
Monday, November 12, 2007

Hide your files in a JPEG file!!
For this, you will only need to download WinRAR. You just need to have a little knowledge about Command Prompt and have WinRAR installed.1. Gather all the files that you wish to hide in a folder anywhere in your PC (make it in C:\hidden - RECOMMENDED).2. Now, add those files in a RAR archive (e.g. secret.rar). This file should also be in the same directory (C:\hidden).3. Now, look for a simple JPEG picture file (e.g. logo.jpg). Copy/Paste that file also in C:\hidden.4. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.5. Now type: “COPY /b logo.jpg + secret.rar output.jpg” (without quotes) - Now, logo.jpg is the picture you want to show, secret.rar is the file to be hidden, and output.jpg is the file which contains both. 6. Now, after you have done this, you will see a file output.jpg in C:\hidden. Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive .
Love happen's once and the rest is just life!!!!
Posted by Marshal at 11:03 AM 0 comments
Labels: , ,
Friday, November 9, 2007

Shutdown pc from dos prompt !!
You can shut down your pc from dos prompt like this :type .... shutdown -s ( it'll give you 30 secs to save your work and then it'll shutdown)for restart type shutdown -rand for logoff type shutdown -lfor more options type shutdown only. I tested these only on win xp ...
Love happen's once and the rest is just life!!!!
Posted by Marshal at 12:01 PM 1 comments
Labels: ,

Dos Tricks and Shortcuts !!
Accessibility Controlsaccess.cplAdd Hardware Wizardhdwwiz.cplAdd/Remove Programsappwiz.cplAdministrative Toolscontrol admintoolsAutomatic Updateswuaucpl.cplBluetooth Transfer WizardfsquirtCalculatorcalcCertificate Managercertmgr.mscCharacter MapcharmapCheck Disk UtilitychkdskClipboard ViewerclipbrdCommand PromptcmdComponent ServicesdcomcnfgComputer Managementcompmgmt.msctimedate.cplddeshareDevice Managerdevmgmt.mscDirect X Control Panel (If Installed)*directx.cplDirect X TroubleshooterdxdiagDisk Cleanup UtilitycleanmgrDisk Defragmentdfrg.mscDisk Managementdiskmgmt.mscDisk Partition ManagerdiskpartDisplay Propertiescontrol desktopDisplay Propertiesdesk.cplDisplay Properties (w/Appearance Tab Preselected)control colorDr. Watson System Troubleshooting Utilitydrwtsn32Driver Verifier UtilityverifierEvent Viewereventvwr.mscFile Signature Verification ToolsigverifFindfastfindfast.cplFolders Propertiescontrol foldersFontscontrol fontsFonts FolderfontsFree Cell Card GamefreecellGame Controllersjoy.cplGroup Policy Editor (XP Prof)gpedit.mscHearts Card GamemsheartsIexpress WizardiexpressIndexing Serviceciadv.mscInternet Propertiesinetcpl.cplIP Configuration (Display Connection Configuration)ipconfig /allIP Configuration (Display DNS Cache Contents)ipconfig /displaydnsIP Configuration (Delete DNS Cache Contents)ipconfig /flushdnsIP Configuration (Release All Connections)ipconfig /releaseIP Configuration (Renew All Connections)ipconfig /renewIP Configuration (Refreshes DHCP & Re-Registers DNS)ipconfig /registerdnsIP Configuration (Display DHCP Class ID)ipconfig /showclassidIP Configuration (Modifies DHCP Class ID)ipconfig /setclassidJava Control Panel (If Installed)jpicpl32.cplJava Control Panel (If Installed)javawsKeyboard Propertiescontrol keyboardLocal Security Settingssecpol.mscLocal Users and Groupslusrmgr.mscLogs You Out Of WindowslogoffMicrosoft ChatwinchatMinesweeper GamewinmineMouse Propertiescontrol mouseMouse Propertiesmain.cplNetwork Connectionscontrol netconnectionsNetwork Connectionsncpa.cplNetwork Setup Wizardnetsetup.cplNotepadnotepadNview Desktop Manager (If Installed)nvtuicpl.cplObject PackagerpackagerODBC Data Source Administratorodbccp32.cplOn Screen KeyboardoskOpens AC3 Filter (If Installed)ac3filter.cplPassword Propertiespassword.cplPerformance Monitorperfmon.mscPerformance MonitorperfmonPhone and Modem Optionstelephon.cplPower Configurationpowercfg.cplPrinters and Faxescontrol printersPrinters FolderprintersPrivate Character EditoreudceditQuicktime (If Installed)QuickTime.cplRegional Settingsintl.cplRegistry EditorregeditRegistry Editorregedit32Remote DesktopmstscRemovable Storagentmsmgr.mscRemovable Storage Operator Requestsntmsoprq.mscResultant Set of Policy (XP Prof)rsop.mscScanners and Camerassticpl.cplScheduled Taskscontrol schedtasksSecurity Centerwscui.cplServicesservices.mscShared Foldersfsmgmt.mscShuts Down WindowsshutdownSounds and Audiommsys.cplSpider Solitare Card GamespiderSQL Client ConfigurationcliconfgSystem Configuration EditorsyseditSystem Configuration UtilitymsconfigSystem File Checker Utility (Scan Immediately)sfc /scannowSystem File Checker Utility (Scan Once At Next Boot)sfc /scanonceSystem File Checker Utility (Scan On Every Boot)sfc /scanbootSystem File Checker Utility (Return to Default Setting)sfc /revertSystem File Checker Utility (Purge File Cache)sfc /purgecacheSystem File Checker Utility (Set Cache Size to size x)sfc /cachesize=xSystem Propertiessysdm.cplTask ManagertaskmgrTelnet ClienttelnetUser Account Managementnusrmgr.cplUtility ManagerutilmanWindows Firewallfirewall.cplWindows MagnifiermagnifyWindows Management Infrastructurewmimgmt.mscWindows System Security ToolsyskeyWindows Update LauncheswupdmgrWindows XP Tour WizardtourstartWordpadwriteRun line commands can be very useful some times, its better to know them here are all the commands that i know u might find them usefull too Commands are same for Windows xp pro and homeRun Line CommandsThese are GUI applications that can be opened from the run line.These applications are not located in the C:\windows\system32\ directory, thekeys for these applications are located in the registry under:HKLM\software\microsoft\windows\currentversion\app pathsBCKGZM.EXE - BackgammonCHKRZM.EXE - CheckersCONF.EXE - NetMeetingDIALER.EXE - Phone DialerHELPCTR.EXE - Help and SupportHRTZZM.EXE - Internet HeartsHYPERTRM.EXE - HyperTerminalICWCONN1.EXE - Internet Connection WizardIEXPLORE.EXE - Internet ExplorerINETWIZ.EXE - Setup Your Internet ConnectionINSTALL.EXE - User's FolderMIGWIZ.EXE - File and Settings Transfer WizardMOVIEMK.EXE - Windows Movie MakerMPLAYER2.EXE - Windows Media Player Version 6.4.09.1120MSCONFIG.EXE - System Configuration UtilityMSIMN.EXE - Outlook ExpressMSINFO32.EXE - System InformationMSMSGS.EXE - Windows MessengerMSN6.EXE - MSN ExplorerPBRUSH.EXE - PaintPINBALL.EXE - PinballRVSEZM.EXE - ReversiSHVLZM.EXE - SpadesTABLE30.EXE - User's FolderWAB.EXE - Windows Address BookWABMIG.EXE - Address Book Import ToolWINNT32.EXE - User's FolderWMPLAYER.EXE - Windows Media PlayerWRITE.EXE - WordpadThese .EXE files reside in (c:\windows\system32\) or (c:\windows\) directory.ACCWIZ.EXE - Accessibility WizardCALC.EXE - CalculatorCHARMAP.EXE - Character MapCLEANMGR.EXE - Disk Space Cleanup ManagerCLICONFG.EXE - SQL Client Configuration UtilityCLIPBRD.EXE - Clipbook ViewerCLSPACK.EXE - Class Package Export ToolCMD.EXE - Command LineCMSTP.EXE - Connection Manager Profile InstallerCONTROL.EXE - Control PanelDCOMCNFG.EXE - Component ServicesDDESHARE.EXE - DDE ShareDRWATSON.EXE - Doctor Watson v1.00bDRWTSN32.EXE - Doctor Watson SettingsDVDPLAY.EXE - DVD PlayerDXDIAG.EXE - DirectX DiagnosticsEUDCEDIT.EXE - Private Character EditorEVENTVWR.EXE - Event ViewerEXPLORER.EXE - Windows ExplorerFREECELL.EXE - Free CellFXSCLNT.EXE - Fax ConsoleFXSCOVER.EXE - Fax Cover Page EditorFXSEND.EXE - MS Fax Send Note UtilityIEXPRESS.EXE - IExpress 2.0LOGOFF.EXE - System LogoffMAGNIFY.EXE - Microsoft MagnifierMMC.EXE - Microsoft Management ConsoleMOBSYNC.EXE - Microsoft Synchronization ManagerMPLAY32.EXE - Windows Media Player version 5.1MSHEARTS.EXE - HeartsMSPAINT.EXE - PaintMSTSC.EXE - Remote Desktop ConnectionNARRATOR.EXE - Microsoft NarratorNETSETUP.EXE - Network Setup WizardNOTEPAD.EXE - NotepadNSLOOKUP.EXE - NSLookup ApplicationNTSD.EXE - Symbolic Debugger for Windows 2000ODBCAD32.EXE - ODBC Data Source AdministratorOSK.EXE - On Screen KeyboardOSUNINST.EXE - Windows Uninstall UtilityPACKAGER.EXE - Object PackagerPERFMON.EXE - Performance MonitorPROGMAN.EXE - Program ManagerRASPHONE.EXE - Remote Access PhonebookREGEDIT.EXE - Registry EditorREGEDT32.EXE - Registry EditorRESET.EXE - Resets SessionRSTRUI.EXE - System RestoreRTCSHARE.EXE - RTC Application SharingSFC.EXE - System File CheckerSHRPUBW.EXE - Create Shared FolderSHUTDOWN.EXE - System ShutdownSIGVERIF.EXE - File Signature VerificationSNDREC32.EXE - Sound RecorderSNDVOL32.EXE - Sound VolumeSOL.EXE - SolitaireSPIDER.EXE - Spider SolitaireSYNCAPP.EXE - Create A BriefcaseSYSEDIT.EXE - System Configuration EditorSYSKEY.EXE - SAM Lock ToolTASKMGR.EXE - Task ManagerTELNET.EXE - MS Telnet ClientTSSHUTDN.EXE - System ShutdownTOURSTART.EXE - Windows Tour LauncherUTILMAN.EXE - System Utility ManagerUSERINIT.EXE - My DocumentsVERIFIER.EXE - Driver Verifier ManagerWIAACMGR.EXE - Scanner and Camera WizardWINCHAT.EXE - Windows for Workgroups ChatWINHELP.EXE - Windows Help EngineWINHLP32.EXE - HelpWINMINE.EXE - MinesweeperWINVER.EXE - Windows Version InformationWRITE.EXE - WordPadWSCRIPT.EXE - Windows Script Host SettingsWUPDMGR.EXE - Windows UpdateThe following are Control Panel applets that can be run from the run line.They are located in the c:\windows\system32 directory, and have the file typeextension ".CPL".ACCESS.CPL - Accessibility OptionsAPPWIZ.CPL - Add or Remove ProgramsDESK.CPL - Display PropertiesHDWWIZ.CPL - Add Hardware WizardINETCPL.CPL - Internet Explorer PropertiesINTL.CPL - Regional and Language OptionsJOY.CPL - Game ControllersMAIN.CPL - Mouse PropertiesMMSYS.CPL - Sounds and Audio Device PropertiesNCPA.CPL - Network ConnectionsNUSRMGR.CPL - User AccountsODBCCP32.CPL - ODBC Data Source AdministratorPOWERCFG.CPL - Power Options PropertiesSYSDM.CPL - System PropertiesTELEPHON.CPL - Phone and Modem OptionsTIMEDATE.CPL - Date and Time PropertiesThe following are Microsoft Management Console Snap-ins that can be opened fromthe run line. These applications have the file type extension ".MSC".CERTMGR.MSC - CertificatesCIADV.MSC - Indexing ServiceCOMPMGMT.MSC - Computer ManagementDEVMGMT.MSC - Device ManagerDFRG.MSC - Disk DefragmenterDISKMGMT.MSC - Disk ManagementEVENTVWR.MSC - Event ViewerFSMGMT.MSC - Shared FoldersLUSRMGR.MSC - Local Users and GroupsNTMSMGR.MSC - Removable StorageNTMSOPRQ.MSC - Removable Storage Operator RequestsPERFMON.MSC - Performance MonitorSERVICES.MSC - ServicesWMIMGMT.MSC - Windows Management InfrastructureCalculation on command Prompt ! u knew dis???The command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit signed integers:C:\>set /a 2+24C:\>set /a 2*(9/2)8C:\>set /a (2*9)/29C:\>set /a "31>>2"7Note that we had to quote the shift operator since it would otherwise be misinterpreted as a "redirect stdout and append" operator.For more information, type set /? at the command prompt.
Love happen's once and the rest is just life!!!!
Posted by Marshal at 9:56 AM 0 comments
Labels: , ,

Change DOS color !!
SYNTAX Sets the default console foreground and background colors.COLOR [attr]attr Specifies color attribute of console output Color attributes are specified by TWO hex digits -- the first corresponds to the background; the second the foreground. Each digit can be any of the below values.0 = Black8 = Gray1 = Blue9 = Light Blue2 = GreenA = Light Green3 = AquaB = Light Aqua4 = RedC = Light Red5 = PurpleD = Light Purple6 = YellowE = Light Yellow7 = WhiteF = Bright WhiteIf no argument is given, this command restores the color to what it was when CMD.EXE started. This value either comes from the current console window, the /T command line switch or from the DefaultColor registry value. The COLOR command sets ERRORLEVEL to 1 if an attempt is made to execute the COLOR command with a foreground and background color that are the same.EXAMPLEColor 2A = Creates a green background with light bright green text, similar to many of the FTP, telnet, and old BBS console screens.Valid for a session only..
Love happen's once and the rest is just life!!!!
Posted by Marshal at 9:54 AM 0 comments
Labels: , ,

Windows game Cheats !!
MinesweeperSecret - Reveal MinesInstructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.PinballSecret - Extra BallsInstructions - Type 1max at the start of a new ball to get extra balls.Secret - Gravity WellInstructions - Type gmax at the start of a new game to activate the Gravity Well.Secret - Instant PromotionInstructions - Type rmax at the start of a new game to go up in ranks.Secret - Skill ShotInstructions - Launch the ball partially up the chute past the third yellow light bar so it falls back down to get 75,000 points. There are six yellow light bars that are worth a varying amount of points:First: 15,000 pointsSecond: 30,000 pointsThird: 75,000 pointsFourth: 30,000 pointsFifth: 15,000 pointsSixth: 7,500 pointsSecret - Test ModeInstructions - Type hidden test at the start of a new ball to activate Test Mode. No notification will be given that this is activated but you can now left-click the mouse button and drag the ball around.Secret - Unlimited BallsInstructions - Type bmax at the start of a new ball. No notification will be given that this is activated but when a ball is lost a new ball will appear from the yellow wormhole indefinitely. Once this is activated you will be unable to activate other secrets without restartingFreeCellSecret - Instant WinInstructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.Secret - Hidden Game ModesInstructions - In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.SolitaireSecret - Instant WinInstructions - Press Alt + Shift + 2 during game play to instantly win.Secret - Draw single cards in a Draw Three gameInstructions - Hold down CTRL + ALT + SHIFT while drawing a new card. Instead of drawing three cards you will only draw one.Infinite PointsIn the Windows XP version of solitaire, draw from the deck at least twice. Hold control and drag a card down from the deck. Click the "A" key and then let go of the left mouse key. You will get 10 points for this. Continue doing this for infinite points!Infinite points trick IITo do this trick, finish a game of solitaire with the time bonus option on. The cards will start bouncing. Click on the solitaire screen and the play again box will pop up. Select no, so the solitaire screen is just blank green. Use the instant win cheat (Alt+Shift+2) and you will recieve the time bonus you got last game will be added to your last game's score. For example, if your time bonus was 5000, and your final score was 6000, after using this glitch, you will have a score of 11000. This glitch can be used as many times as you want.registry hack which will allow you to see your opponents' cardsLaunch REGEDIT.EXE and navigate to HKEY_CURRENT_USER Software Microsoft Windows CurrentVersion Applets Hearts. NOTE: You may have to create the Hearts key under Applets In the right-hand pane, create a new String Value. Immediately rename it to "ZB" (without the quotes); give it a value of "42" (again, sans quotes). The next time you're in a game of Hearts, press CTRL + SHIFT + ALT + F12.
Love happen's once and the rest is just life!!!!
Posted by Marshal at 9:47 AM 1 comments
Labels: , , ,

Hacking Via Windows Utility!!
To see the ip all computers you are connected to (web servers, people attempting to hack into your computer).Go to dos (start>run>type command) and run the netstat command. Type netstat /? for details.Type netstat -r at the command prompt to see the ip of all computers you are connected toIn MSN (and other programs) when you are chatting to someone everything you type goes through the MSN servers first (they act as a proxy) so you see their ip rather than who you are chatting to. You can get round this by sending them a file as MSN doesn't send file through its proxy.When you type the netstat -r (or -a for a different view) the ip's are under the foreign address table. The ports are seperated by a :Different programs use different ports, so you can work out which ip's are from which program.Connecting to other computers and what ports are:--Servers send information. Clients retrieve. Simple.Windows comes with a built in program to connect to other computers called telnet.To start Windows telnet Start menu> Run> type Telnet. Click connect> remote systemPorts are doors into computers. Hosts are computer names(ip number or a name that is translated into the ip automatically)Different programs open different ports, but they always open the same ports so other computers know which port to connect to. You can get a port list listing all the different ports, but a basic one is:11 :- Sends info on the computer21 :- FTP (File transfer program)23 :- Telnet (Login to the computers command line)80 :- Http (Web pages)There are thousands of different programs using different ports. You can get programs called portscanners which check a computer for all ports up to a certain number, looking for ways in. You can portscan a computer looking for ways-in. Type www.yahoo.com as the host and port as 80 the click connect.If nothing happens, you're in. You are connected to Yahoo's server
Love happen's once and the rest is just life!!!!
Posted by Marshal at 12:28 AM 0 comments
Labels: , ,
Monday, August 27, 2007

All Dos Commands
ADDUSERS Add or list users to/from a CSV fileARP Address Resolution ProtocolASSOC Change file extension associationsASSOCIAT One step file associationAT Schedule a command to run at a later timeATTRIB Change file attributesBOOTCFG Edit Windows boot settingsBROWSTAT Get domain, browser and PDC infoCACLS Change file permissionsCALL Call one batch program from anotherCD Change Directory - move to a specific FolderCHANGE Change Terminal Server Session propertiesCHKDSK Check Disk - check and repair disk problemsCHKNTFS Check the NTFS file systemCHOICE Accept keyboard input to a batch fileCIPHER Encrypt or Decrypt files/foldersCleanMgr Automated cleanup of Temp files, recycle binCLEARMEM Clear memory leaksCLIP Copy STDIN to the Windows clipboard.CLS Clear the screenCLUSTER Windows ClusteringCMD Start a new CMD shellCOLOR Change colors of the CMD windowCOMP Compare the contents of two files or sets of filesCOMPACT Compress files or folders on an NTFS partitionCOMPRESS Compress individual files on an NTFS partitionCON2PRT Connect or disconnect a PrinterCONVERT Convert a FAT drive to NTFS.COPY Copy one or more files to another locationCSVDE Import or Export Active Directory data DATE Display or set the dateDcomcnfg DCOM Configuration UtilityDEFRAG Defragment hard driveDEL Delete one or more filesDELPROF Delete NT user profilesDELTREE Delete a folder and all subfoldersDevCon Device Manager Command Line Utility DIR Display a list of files and foldersDIRUSE Display disk usageDISKCOMP Compare the contents of two floppy disksDISKCOPY Copy the contents of one floppy disk to anotherDNSSTAT DNS StatisticsDOSKEY Edit command line, recall commands, and create macrosDSADD Add user (computer, group..) to active directoryDSQUERY List items in active directoryDSMOD Modify user (computer, group..) in active directoryECHO Display message on screenENDLOCAL End localisation of environment changes in a batch fileERASE Delete one or more filesEXIT Quit the CMD shellEXPAND Uncompress filesEXTRACT Uncompress CAB filesFC Compare two filesFDISK Disk Format and partitionFIND Search for a text string in a fileFINDSTR Search for strings in filesFOR Conditionally perform a command several timesFORFILES Batch process multiple filesFORMAT Format a diskFREEDISK Check free disk space (in bytes)FSUTIL File and Volume utilitiesFTP File Transfer ProtocolFTYPE Display or modify file types used in file extension associationsGLOBAL Display membership of global groupsGOTO Direct a batch program to jump to a labelled lineHELP Online HelpHFNETCHK Network Security Hotfix Checker IF Conditionally perform a commandIFMEMBER Is the current user in an NT WorkgroupIPCONFIG Configure IPKILL Remove a program from memoryLABEL Edit a disk labelLOCAL Display membership of local groupsLOGEVENT Write text to the NT event viewer.LOGOFF Log a user offLOGTIME Log the date and time in a fileMAPISEND Send email from the command lineMEM Display memory usageMD Create new foldersMODE Configure a system deviceMORE Display output, one screen at a timeMOUNTVOL Manage a volume mount pointMOVE Move files from one folder to anotherMOVEUSER Move a user from one domain to anotherMSG Send a messageMSIEXEC Microsoft Windows InstallerMSINFO Windows NT diagnosticsMSTSC Terminal Server Connection (Remote Desktop Protocol)MUNGE Find and Replace text within file(s)MV Copy in-use filesNET Manage network resourcesNETDOM Domain ManagerNETSH Configure network protocolsNETSVC Command-line Service ControllerNBTSTAT Display networking statistics (NetBIOS over TCP/IP)NETSTAT Display networking statistics (TCP/IP)NOW Display the current Date and Time NSLOOKUP Name server lookupNTBACKUP Backup folders to tapeNTRIGHTS Edit user account rightsPATH Display or set a search path for executable filesPATHPING Trace route plus network latency and packet lossPAUSE Suspend processing of a batch file and display a messagePERMS Show permissions for a userPERFMON Performance MonitorPING Test a network connectionPOPD Restore the previous value of the current directory saved by PUSHDPORTQRY Display the status of ports and servicesPRINT Print a text filePRNCNFG Display, configure or rename a printerPRNMNGR Add, delete, list printers set the default printerPROMPT Change the command promptPsExec Execute process remotelyPsFile Show files opened remotelyPsGetSid Display the SID of a computer or a userPsInfo List information about a systemPsKill Kill processes by name or process IDPsList List detailed information about processesPsLoggedOn Who's logged on (locally or via resource sharing)PsLogList Event log recordsPsPasswd Change account passwordPsService View and control servicesPsShutdown Shutdown or reboot a computerPsSuspend Suspend processesPUSHD Save and then change the current directoryQGREP Search file(s) for lines that match a given pattern.RASDIAL Manage RAS connectionsRASPHONE Manage RAS connectionsRECOVER Recover a damaged file from a defective disk.REG Read, Set or Delete registry keys and valuesREGEDIT Import or export registry settingsREGSVR32 Register or unregister a DLLREGINI Change Registry PermissionsREM Record comments (remarks) in a batch fileREN Rename a file or files.REPLACE Replace or update one file with anotherRD Delete folder(s)RDISK Create a Recovery DiskRMTSHARE Share a folder or a printerROBOCOPY Robust File and Folder CopyROUTE Manipulate network routing tablesRUNAS Execute a program under a different user accountRUNDLL32 Run a DLL command (add/remove print connections)SC Service ControlSCHTASKS Create or Edit Scheduled Tasks SCLIST Display NT ServicesScriptIt Control GUI applicationsSET Display, set, or remove environment variablesSETLOCAL Begin localisation of environment changes in a batch fileSETX Set environment variables permanently SHARE List or edit a file share or print shareSHIFT Shift the position of replaceable parameters in a batch fileSHORTCUT Create a windows shortcut (.LNK file)SHOWGRPS List the NT Workgroups a user has joinedSHOWMBRS List the Users who are members of a WorkgroupSHUTDOWN Shutdown the computerSLEEP Wait for x secondsSOON Schedule a command to run in the near futureSORT Sort inputSTART Start a separate window to run a specified program or commandSU Switch UserSUBINACL Edit file and folder Permissions, Ownership and DomainSUBST Associate a path with a drive letterSYSTEMINFO List system configurationTASKLIST List running applications and servicesTIME Display or set the system timeTIMEOUT Delay processing of a batch fileTITLE Set the window title for a CMD.EXE sessionTOUCH Change file timestamps TRACERT Trace route to a remote hostTREE Graphical display of folder structureTYPE Display the contents of a text fileUSRSTAT List domain usernames and last loginVER Display version informationVERIFY Verify that files have been savedVOL Display a disk labelWHERE Locate and display files in a directory treeWHOAMI Output the current UserName and domainWINDIFF Compare the contents of two files or sets of filesWINMSD Windows system diagnosticsWINMSDP Windows system diagnostics IIWMIC WMI CommandsXCACLS Change file permissionsXCOPY Copy files and folders
Love happen's once and the rest is just life!!!!
Posted by Marshal at 1:46 PM 0 comments
Labels:
Thursday, August 23, 2007

Create A Huge File!!!!!
You can create a file of any size using nothing more than what's supplied with Windows. Start by converting the desired file size into hexadecimal notation. You can use the Windows Calculator in Scientific mode do to this. Suppose you want a file of 1 million bytes. Enter 1000000 in the calculator and click on the Hex option to convert it (1 million in hex is F4240.) Pad the result with zeroes at the left until the file size reaches eight digits—000F4240.Now open a command prompt window. In Windows 95, 98, or Me, you can do this by entering COMMAND in the Start menu's Run dialog; in Windows NT 4.0, 2000, or XP enter CMD instead. Enter the command DEBUG BIGFILE.DAT and ignore the File not found message. Type RCX and press Enter. Debug will display a colon prompt. Enter the last four digits of the hexadecimal number you calculated (4240, in our example). Type RBX and press Enter, then enter the first four digits of the hexadecimal size (000F, in our example). Enter W for Write and Q for Quit. You've just created a 1-million-byte file using Debug. Of course you can create a file of any desired size using the same technique.
Love happen's once and the rest is just life!!!!
Posted by Marshal at 2:20 PM 0 comments
Labels: ,
Monday, August 20, 2007

DOS Command for Hacking!!!!!
TCP/IP commands:telnetnetstatnslookuptracertpingftp NetBIOS commands (just some examples):nbtstatnet usenet viewnet localgroup TCP/IP stands for transmission control protocol/Internet protocol. As you can guess by the name, TCP/IP is the protocol under which the Internet runs. along with user datagram protocol (UDP). So when you are connected to the Internet, you can try these commands against other Internet computers. Most local area networks also use TCP/IP. NetBIOS (Net Basic Input/Output System) protocol is another way to communicate between computers. This is often used by Windows computers, and by Unix/Linux type computers running Samba. You can often use NetBIOS commands over the Internet (being carried inside of, so to speak, TCP/IP). In many cases, however, NetBIOS commands will be blocked by firewalls. Also, not many Internet computers run NetBIOS because it is so easy to break in using them.
Love happen's once and the rest is just life!!!!
Posted by Marshal at 9:44 AM 0 comments
Labels:
Thursday, August 16, 2007

Command Prompt!!!!
ANSI.SYS : Defines functions that change display graphics, control cursor movement, and reassign keys.APPEND : Causes MS-DOS to look in other directories when editing a file or running a command.ARP : Displays, adds, and removes arp information from network devices.ASSIGN : Assign a drive letter to an alternate letter.ASSOC : View the file associations.AT : Schedule a time to execute commands or programs.ATMADM : Lists connections and addresses seen by Windows ATM call manager.ATTRIB : Display and change file attributes.BATCH : Recovery console command that executes a series of commands in a file.BOOTCFG : Recovery console command that allows a user to view, modify, and rebuild the boot.iniBREAK : Enable / disable CTRL + C feature.CACLS : View and modify file ACL's.CALL : Calls a batch file from another batch file.CD : Changes directories.CHCP : Supplement the International keyboard and character set information.CHDIR : Changes directories.CHKDSK : Check the hard disk drive running FAT for errors.CHKNTFS : Check the hard disk drive running NTFS for errors.CHOICE : Specify a listing of multiple options within a batch file.CLS : Clears the screen.CMD : Opens the command interpreter.COLOR : Easily change the foreground and background color of the MS-DOS window.COMP : Compares files.COMPACT : Compresses and uncompress files.CONTROL : Open control panel icons from the MS-DOS prompt.CONVERT : Convert FAT to NTFS.COPY : Copy one or more files to an alternate location.CTTY : Change the computers input/output devices.DATE : View or change the systems date.DEBUG : Debug utility to create assembly programs to modify hardware settings.DEFRAG : Re-arrange the hard disk drive to help with loading programs.DEL : Deletes one or more files.DELETE : Recovery console command that deletes a file.DELTREE : Deletes one or more files and/or directories.DIR : List the contents of one or more directory.DISABLE : Recovery console command that disables Windows system services or drivers.DISKCOMP : Compare a disk with another disk.DISKCOPY : Copy the contents of one disk and place them on another disk.DOSKEY : Command to view and execute commands that have been run in the past.DOSSHELL : A GUI to help with early MS-DOS users.DRIVPARM : Enables overwrite of original device drivers.ECHO : Displays messages and enables and disables echo.EDIT : View and edit files.EDLIN : View and edit files.EMM386 : Load extended Memory Manager.ENABLE : Recovery console command to enable a disable service or driver.ENDLOCAL : Stops the localization of the environment changes enabled by the setlocal command.ERASE : Erase files from computer.EXIT : Exit from the command interpreter.EXPAND : Expand a M*cros*ft Windows file back to it's original format.EXTRACT : Extract files from the M*cros*ft Windows cabinets.FASTHELP : Displays a listing of MS-DOS commands and information about them.FC Compare files.FDISK : Utility used to create partitions on the hard disk drive.FIND : Search for text within a file.FINDSTR : Searches for a string of text within a file.FIXBOOT : Writes a new boot sector.FIXMBR : Writes a new boot record to a disk drive.FOR : Boolean used in batch files.FORMAT : Command to erase and prepare a disk drive.FTP : Command to connect and operate on a FTP server.FTYPE : Displays or modifies file types used in file extension associations.GOTO : Moves a batch file to a specific label or location.GRAFTABL : Show extended characters in graphics mode.HELP : Display a listing of commands and brief explanation.IF : Allows for batch files to perform conditional processing.IFSHLP.SYS : 32-bit file manager.IPCONFIG : Network command to view network adapter settings and assigned values.KEYB : Change layout of keyboard.LABEL : Change the label of a disk drive.LH : Load a device driver in to high memory.LISTSVC : Recovery console command that displays the services and drivers.LOADFIX : Load a program above the first 64k.LOADHIGH : Load a device driver in to high memory.LOCK : Lock the hard disk drive.LOGON : Recovery console command to list installations and enable administrator login.MAP : Displays the device name of a drive.MD : Command to create a new directory.MEM : Display memory on system.MKDIR : Command to create a new directory.MODE : Modify the port or display settings.MORE : Display one page at a time.MOVE : Move one or more files from one directory to another directory.MSAV : Early M*cros*ft Virus scanner.MSD : Diagnostics utility.MSCDEX : Utility used to load and provide access to the CD-ROM.NBTSTAT : Displays protocol statistics and current TCP/IP connections using NBTNET : Update, fix, or view the network or network settingsNETSH : Configure dynamic and static network information from MS-DOS.NETSTAT : Display the TCP/IP network protocol statistics and information.NLSFUNC : Load country specific information.NSLOOKUP : Look up an IP address of a domain or host on a network.PATH : View and modify the computers path location.PATHPING : View and locate locations of network latency.PAUSE : Command used in batch files to stop the processing of a command.PING Test / send information to another network computer or network device.POPD : Changes to the directory or network path stored by the pushd command.POWER : Conserve power with computer portables.PRINT : Prints data to a printer port.PROMPT : View and change the MS-DOS prompt.PUSHD : Stores a directory or network path in memory so it can be returned to at any time.QBASIC : Open the QBasic.RD : Removes an empty directory.REN : Renames a file or directory.RENAME : Renames a file or directory.RMDIR : Removes an empty directory.ROUTE : View and configure windows network route tables.RUNAS : Enables a user to execute a program on another computer.SCANDISK : Run the scandisk utility.SCANREG : Scan registry and recover registry from errors.SET : Change one variable or string to another.SETLOCAL : Enables local environments to be changed without affecting anything else.SETVER : Change MS-DOS version to trick older MS-DOS programs.SHARE : Installs support for file sharing and locking capabilities.SHIFT : Changes the position of replaceable parameters in a batch program.SHUTDOWN : Shutdown the computer from the MS-DOS prompt.SMARTDRV : Create a disk cache in conventional memory or extended memory.SORT : Sorts the input and displays the output to the screen.START : Start a separate window in Windows from the MS-DOS prompt.SUBST : Substitute a folder on your computer for another drive letter.SWITCHES : Remove add functions from MS-DOS.SYS : Transfer system files to disk drive.TELNET : Telnet to another computer / device from the prompt.TIME : View or modify the system time.TITLE : Change the title of their MS-DOS window.TRACERT : Visually view a network packets route across a network.TREE : View a visual tree of the hard disk drive.TYPE : Display the contents of a file.UNDELETE : Undelete a file that has been deleted.UNFORMAT : Unformat a hard disk drive.UNLOCK : Unlock a disk drive.VER : Display the version information.VERIFY : Enables or disables the feature to determine if files have been written properly.VOL : Displays the volume information about the designated drive.XCOPY : Copy multiple files, directories, and/or drives from one location to another.TRUENAME : When placed before a file, will display the whole directory in which it existsTASKKILL : It allows you to kill those unneeded or locked up applications
Love happen's once and the rest is just life!!!!
Posted by Marshal at 12:05 AM 0 comments
Labels:
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

1 comment:

Unknown said...

CONTACT US FOR ALL KINDS OF HACKING JOB @ triannguyen09@gmail.com and Text Business Whatsapp :- (317 762 8526) We offer professional hacking services , we offer the following services;
-University grades changing
-Bank accounts hack
-Erase criminal records hack
-Facebook hack
-Twitters hack
-email accounts hack
-Grade Changes hack
-Website crashed hack
-server crashed hack
-Skype hack
-Databases hack
-Word Press Blogs hack
-Individual computers hack
Control devices remotely hack
-Burner Numbers hack
-Verified Paypal Accounts hack
-Any social media account hack
-Android & iPhone Hack
-Text message interception hack
-email interception hack
-Untraceable Ip etc.
Contact us at triannguyen09@gmail.com or text or call Business Whatsapp :- (317 762 8526) for more inquiry..
Track Calls log and Spy Call Recording.
Monitoring SMS text messages remotely.
Cell phone GPS location tracking. Spy on Whatsapp Messages.
Free Update and 100% Undetectable.
Track BBM messages and Line messages. Track Internet Browsing History and Read phone Access Address Book, totally worth your money, please no time wasters, he won't under any circumstances work for free, you can reach him by email triannguyen09@gmail.com or add on Hangout or text call on (317 762 8526) .

Nguyen Tran

Explaining DNS Concepts - DNS Servers-DNS Queries-DNS Records

3 types of DNS queries— recursive, iterative, and non-recursive 3 types of DNS servers— DNS Resolver, DNS Root Server and Authoritative Name...