Thursday, July 30, 2009

Ubuntu 9.04 Desktop

You can Download the latest version of Ubuntu Operating System here
click the link below:

It's Absolutely Free

Friday, July 17, 2009

Making Windows XP Genuine - The Easiest Way

download Jellybean Keyfinder from this website

Now open Keyfinder.exe
Click on options and click "change windows key"
Now enter this key and you're done.
*****************************
V2C47-MK7JD-3R89F-D2KXW-VPK3J
*****************************

P.S: this works on windows xp sp2 only......

ppl u can try this out...
this might sound silly but it works perfectly...

TRY INSTALLING IE7 OR MEDIA PLAYER11.

How To Catch A Hacker

Some one wrote this great Post at orkut about Catching Hackers

I don't know who exactly the writer of this great post is...
Here is what he had to write :

"just wrote this guide to give you some tips of which you may not have heard yet. Hopefully, it won't come to a hacker getting in, but if it does...

Tip 1: Hackers cover their tracks. Experienced hackers cover them more thorougly, but amateur hackers sometimes leave things behind. Don't expect them to leave any really big evidence behind; expect more of little things here and there you might find surprising. For example, if you're writing a term paper and a black hat hacker accidently saved it when he took a paragraph out- that's suspicious. Where did that paragraph go? Well, for one thing, now you know he was in that area. Check the folders surrounding the file- you might find something.

Tip 2: Decipher between the type of hackers that are attacking you. Experienced hackers will have a more in depth look around when they penetrate your system. They won't touch much because they know that that won't add too much to their knowledge. But if you know a hacker's been in, and some files are messed with, and you have a log of someone guessing passwords to a file or something of that sort, its probably some newbie who's just starting out. These are the easiest hackers to catch. They usually get so caught up in thoughts like "I'm in!" that they forget the basics, such as work behind a proxy.

Tip to protect yourself
My friend was setting up a webserver once. His first time too, and he wasn't to anxious to set up some good software to protect against hackers and viruses. He didn't put up one IDS, and before you know it, the obvious happened. But this time, a newbie had struck. The nice log files showed, bluntly across the screen, multiple instances of a foreign IP address that stood out. Some stupid newbie had tried to login as "uucp" on my friend's XP computer, with a password of "uucp." Well, that's great, but he also had tried the same user/pass combination three times, enough to get himself logged nicely. Even a semi-brainless user with some form of neurological system knows that uucp isn't a default XP account. Again, excitement toiled this hacker's brain, and maybe if he hadn't done that, along with a few other stupid things, he wouldn't have gotten caught. What other things did he do? Well, lets see. He openned 35 instances of MS-DOS. He tried to clean the printer's heads, and he edited a .gif in notepad. Then he uninstalled a few programs and installed some html editor, and replaced four files with the words "14P." he might as well have posted his phone number. In a few days, we had tracked him down to a
suburban town in Ohio. We let him go, not pressing any charges, because he had done nothing really damaging and had provided me with an example of a moron for this guide.


Tip 3: Don't go crazy if you lose data. Chances are, if it was that important, you would have backed it up anyway. Most hackers nowadays wish they were back in 1989 when they could use a Black Box and having a Rainbow Book actually meant something. Most hackers aren't blackhat, they are whitehat, and some even greyhat. But in the end, most hackers that are in systems aren't satisfied by looking around. From past experiences, I have concluded that many hackers like to remember where've they been. So, what do they do? They either press delete here and there, or copy some files onto their systems. Stupid hackers (yes, there are plenty of stupid hackers) send files to e-mail addresses. Some free email companies will give you the IP of a certain e-mail address's user if you can prove that user has been notoriously hacking you. But most of the time, by the time you get the e-mail addy it's been unused for weeks if not months or years, and services like hotmail have already deleted it.

Tip 4: Save information! Any information that you get from a log file (proxy server IP, things like "14P", e-mail addresses that things were sent to, etc.) should be saved to a floppy disk (they're not floppy anymore, I wish I could get out of the habit of calling them that) incase there's a next time. If you get another attack, from the same proxy, or with similar e-mail addresses (e.g: one says Blackjack 123@something.whatever and the other says Black_jack_45@something.znn.com) you can make an assumption that these hackers are the same people. In that case, it would probably be worth the effort to resolve the IP using the proxy and do a traceroute. Pressing charges is recommended if this is a repeat offender.

Tip 5: Don't be stupid. If you've been hacked, take security to the next level. Hackers do talk about people they've hacked and they do post IPs and e-mail addresses. Proof? Take a look at Defcon Conventions. I've never gone to one, but I've seen the photos. The "Wall of Shame"-type of boards I've seen have IPs and e-mail addresses written all over them in fat red, dry-erase ink. Don't be the one to go searching the Defcon website and find your e-mail address posted on the Wall of Shame board!

Tip 6: Don't rely on luck. Chances are, sometime or another, you're going to be targeted for an attack. Here you can rely on luck. Maybe they'll forget? Maybe they don't know how to do it? If you think this way, a surprise is going to hit your face very hard. Another way you could stupidly rely on luck is by saying this: It's probably just a whitehat. On the contrary, my friend, it's probably just a blackhat. A blackhat with knowledge stored in his head, ready to be used as an ax. It's your data. You take the chance.

Javascript Trick: Dancing Images

A Javascript trick that makes all the images on the site your on float and dance around. :]

//You can do this to ANY site with images//

Directions:
Open your internet web browser, go to your prefered site you wish to do this trick on, Once there, Go to the address bar on top, Delete everything that's there, and copy and paste the code below into it, press enter and have fun. :]

javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+ "px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+" px"}R++}setInterval('A()',5); void(0);

Rename a Series of Files

When you download photos from your digital camera, they often have unrecognizable names. You can rename several similar files at once with the following procedure. This also works for renaming other types of files.

1.Open the My Pictures folder. (Click Start, and then click My Pictures.) Or open another folder containing files that you want to rename.
2.Select the files you want to rename. If the files you want are not adjacent in the file list, press and hold CTRL, and then click each item to select it.
3.On the File menu, click Rename.
4.Type the new name, and then press ENTER.

All of the files in the series will be named in sequence using the new name you type. For example, if you type Birthday, the first will be named Birthday and subsequent files in the series will be named Birthday (1), Birthday (2), and so on. To specify the starting number for the series, type the starting number in parentheses after the new file name. The files in the series will be numbered in sequence starting with the number you type. For example, if you type Birthday (10), the other files will be named Birthday (11), Birthday (12), and so on.

FDISK - A DOS Command

The Basics of Fdisk:

Primary partitions are the only one that are bootable. They're always the C: drive when active. Normally you can only have one (more with some special tricks etc.) Extended partitions are needed when you want more than one partition. You can only have ONE Extended partition. Logical Drives come into the Extended partition. They are handy since you know that you can only have one Primary and one Extended so you can get more than only two partitions. They would be your D:, E:, etc. drives.

First you need to reboot your system with the Boot Disk inserted.

1.At the A: prompt start "FDISK."

2.If asked to use Large Disc support say Yes.

3.The first screen looks like this:

Create Dos Partition or Logical Drive
Set Active Partition
Delete Partitions or Logical DOS Drives
Display Partition Information
Change current fixed drive. (In case you have two or more Hard Drivess)
So, to prepare you hopefully did a backup from your data. You did, didn't you ?!

4.Next we need to remove the existing partitions. So go to 3.

5.Next screen like this:

Delete Primary DOS
Delete Extended DOS
Delete Logical Drives
Delete Non-DOS
Delete always in the following order

Logical (All) > Extended > Primary (Last)

6.Go back to first screen after all partitions have been removed.

7.Now we need to setup our new partitions. Go to 1.

This screen looks like this:

Create Primary DOS
Create Extended DOS
Create Logical DOS Drives
Here we create in the following order

Primary > Extended > Logical Drives.

8.First create the Primary. If asked to use all space say No and enter the amount you wish for the C: drive. It should be set automatically to be the (only) Active partition. If not it may ask you or you have to select "2. Set active partition" from the main menu.

9.Next create the Extended Partition. Use all space left.

It probably advances automatically to the next step, creating the Logical DOS Drives.

10.Enter the amount you wish for the D: partition and than the rest for the third partition.

Think first about the size for the partitions.

OK now we're finished with FDISK so just exit it. Next you need to reboot with the disc still inserted and Format all partitions (the C: partition might need to be formatted with "format c: /s", check the Win95 tip). Another reboot and you can go ahead and install Windows.

When your system supports booting from CD just insert the Windows CD and reboot. The setup will start.

If not, follow these steps:

Win98: insert Boot Disk and CD, reboot, choose "2. boot with CDROM support" and once you're at the prompt change to your CD-drive letter (depends on your partition setup) and enter "setup".
Win95: You must format the C: partition with "Format C: /s"!. Next install your CDROM driver, reboot, insert the Win95 CD, change to the CD-driveletter, enter "setup".
I hope I made no mistakes.

How to Use Qfixapp.exe In Windows XP

This article describes the Quick Fix utility (Qfixapp.exe) that is included with the Application Compatibility Toolkit for Windows XP and Windows .NET. Qfixapp.exe is a tool that includes pre-packaged fixes that provide an easy way to fix a program.

Use Qfixapp.exe To Apply Program Fixes

You can use Qfixapp.exe to quickly apply various program fixes (AppFixes, also known as "shims") to a program to determine their effectiveness. Qfixapp.exe reads the %SystemRoot%\windows\apppatch\sysmain.sdb database to produce a list of available fixes. When you select an AppFix, you can start the program executable (.exe) file, and the AppFix will be applied. If a suitable AppFix is found, the tool eventually helps you to generate and test matching file information. When you run Qfixapp.exe, you see the following items:
The The application for which to apply the fix(es) check box. This setting disables existing fixes in the database.

The Layer tab with the Choose one of the existing layers to apply to your app box that contains the following entries:

256 Color
640X480
Disable Themes
Internaltional
LUA(Limited User Account)
LUACleanUp
NT4SP5
ProfilesSetup
Win2000
Win95
Win98

The Fixes tab. On this tab you can select the individual fixes that you want to apply.
Example of How to Use Qfixapp.exe

1. Start Notepad, and then click About Notepad on the Help menu. Note that the version is 5.1.

2. Start Qfixapp.exe, click Win95, click Browse, and then open the Windows folder. Note that the Windows\System32 folder is protected by Windows File Protection, so it is not able to use the layers.

3. Click Notepad.exe, click Open, and then click Run.

4. Start Notepad, and then click About Notepad on the Help menu. Note that the version is now 4.0.

If you click ViewLog, you could see what AppFix(es) are being used. If you click Advanced, you could see information about the .exe file. You can click Add Matching Info, and then select files that are related to the .exe file to identify that particular program. After you finish that step, you could click Create Fix Support to add the layers with the Matching Information (GRABMI) and create an XML-based database that is named YourAppName.sdb. Note that in the preceding example it is named Notepad.sdb, and is in the AppPatch folder.

Add Album Art to any Music Folder

One of the coolest new features in Windows XP is its album thumbnail generator, which automatically places the appropriate album cover art on the folder to which you are copying music (generally in WMA format). But what about those people that have already copied their CDs to the hard drive using MP3 format? You can download album cover art from sites such as cdnow.com or amguide.com, and then use the new Windows XP folder customize feature to display the proper image for each folder. But this takes time you have to manually edit the folder properties for every single folder and you will lose customizations if you have to reinstall the OS. There's an excellent fix, however.

When you download the album cover art from the Web, just save the images as folder.jpg each time and place them in the appropriate folder. Then, Windows XP will automatically use that image as the thumbnail for that folder and, best of all, will use that image in Windows Media Player for Windows XP (MPXP) if you choose to display album cover art instead of a visualization. And the folder customization is automatic, so it survives an OS reinstallation as well. Your music folders never looked so good!

Album cover art makes music folder thumbnails look better than ever!

Add Sound to almost every event in Windows

XP comes with a new set of sounds that will surely add pizzazz to the way you work in Windows. But there's one problem -- you need to actually turn on the Windows default sound scheme before you'll be able to hear them.

To turn on the Windows XP default sound scheme, follow these directions:

Single-click the Start menu.
Single-click the Control Panel.
Single-click the Sounds, Speech, and Audio Devices icon.
Single-click the Sounds and Audio Devices icon or the text labeled "Change the sound scheme."
Make sure you're on the Sound tab and locate the pull-down menu under Sound scheme.
Select the Windows Default option and press Apply. Windows will ask you if you want to save the previous sound scheme. Since there wasn't a sound scheme already loaded, just choose No.

If you look under the text labeled "Program events," you'll be able to sample your new sounds or customize them with your own. Read Customize Events Sounds if you'd like to learn how to do this yourself.

How to make a Simple Shutdown Virus?

In this tutorial you will learn how to make a virus joke to your friends and shut down their computer. Replace one of their used icons on the desktop with a fake one. And when they try to open it, their computer will close.
Let's Start :

1. Right click on the desktop and go to New -> Create Shortcut.

2.
Type in the windows that appears:
shutdown -s -t 60 -c "Virus Detection. Computer is shutting down."
Instead of 60 you can put what value you want. It represents the time in seconds. And also between quotes you can put what message you desire.

3. Click Next and type Internet Explorer. You can write whatever you want.

4. You will have a program like this on your desktop.

5. We need to change its icon to look like Internet Explorer. Right click on it and chooseProperties.

6. Go to Shortcut ->Change Icon.

7. You can find the icon in the ones available or go to C:/Program Files/Internet Explorer and select the icon from there.

8.
After the icon is selected press Open.

9. The 'virus' will look like Internet Explorer.

10. And when you open it the computer will be closed in 60 seconds or whatever value you chosed.

11.
The only way to stop the computer from shutting down is to go to Start->Run and type "shutdown -a", and press "Enter" Remember that this is just for educational purposes only and you should not harm computers and their functionality.

Fool your Friend now!

Thursday, July 16, 2009

Ping

Here are all of the ping functions and option. Let's start!

Ping function works only with DOS or something like DOS like "Command Prompt". You can try out this function in Command Prompt. To open Command Prompt just type "cmd" or "command" in Run and press "Enter".

example .. In DOS .. c:>ping 192.168.0.1 -t

-t Ping the specifed host until interrupted

-a Resolve addresses to hostnames

-n count Number of echo requests to send

-l size Send buffer size

-f Set Don't Fragment flag in packet

-i TTL Time To Live

-v TOS Type Of Service

-r count Record route for count hops

-s count Timestamp for count hops

-j host-list Loose source route along host-list

-k host-list Strict source route along host-list

-w timeout Timeout in milliseconds to wait for each reply

Experiment to see how helpful these can be done, provided you have to have a network connection :D

"STOP” Error Message at Shutdown

Some users have gotten an error message similar to the following when attempting either to shutdown or restart Win XP:

STOP 0000009F, DRIVER_POWER_STATE_FAILURE
STOP 0x0000001E: KMODE_EXCEPTION_NOT_HANDLED
STOP 0x000000D1: DRIVER_IRQL_NOT_LESS_OR_EQUAL

TechNet and the Microsoft Knowledge Base have numerous articles discussing this type of error condition; for example, these. As a review of these articles will show, these are commonly device driver problems, but may also be caused by troublesome software (such as the notorious CrashGuard), or a problem in a system service. MSKB article Q262575 discusses a shutdown problem of this type, known to exist in Windows 2000 due to a resource (IRQ) conflict, if you have PACE Interlok anti-piracy software installed. This problem may occur in Windows XP as well.
Microsoft advises the following as one approach to these problems: Restart the computer. Press F8 during the restart and select “Last Known Good Configuration.” If you catch the problem when it first occurs (meaning you likely have installed only one or two drivers or new service), this will return you to a previous working condition. (Would System Restore accomplish the same thing? I don’t know, and don’t have a broken system to test it on.)

Microsoft reported similarly that these STOP code error message occur when Windows XP is trying to shut down devices. He says that he has seen this twice: once with Logitech Quickcam installed (with an unsupported driver), and once with a USB DSL modem that would hang if it wasn’t disconnected before shutdown.

SHUTDOWN WORKS, BUT IT’S REAL SLOW.

If it appears that Win XP is not shutting down, give it some time. Some users have reported a minute or longer for shutdown to visibly start. Thus far, it appears that this is a consequence of software that is running when shutdown is attempted, and it also may have something to do with particular hardware. If you are experiencing this problem, be sure to close all running programs before attempting shutdown and see if this solves your problem. If so, then you can determine, by trial and error, which program(s) are involved.
One specific solution for this was provided by Microsoft support. ” In Control Panel | Administrative Tools | Services. (You can also get this by launching SERVICES.MSC from a Run box. This utility is also built into the Computer Management console.) Stop the Nvidia Driver Helper service. Many other friends quickly confirmed that this solved this “extremely slow shutdown” problem for them.

POWERDOWN ISSUES.

“Powerdown issues” are quite distinctive from “shutdown issues.” I define a shutdown problem as one wherein Windows doesn’t make it at least to the “OK to shut off your computer” screen. If Windows gets that far, or farther, then it has shut down correctly. However, the computer may not powerdown correctly after that. This is a different problem, and I encourage that people reporting these issues to make a very clear distinction in their labeling.

When Windows XP won’t powerdown automatically, the APM/NT Legacy Power Node may not be enabled. To enable this, right-click on the My Computer icon, click Properties | Hardware | Device Manager | View. Check the box labeled “Show Hidden Devices.” If it’s available on your computer, there will be a red X on the APM/NT Legacy Node. Try enabling it and see if this resolves the powerdown problem.

This should resolve the powerdown issue in most cases. However, other factors can sometimes interfere with correct powerdown functioning. In that case, consider the following tips:
If you are changing the default power settings in the BIOS, it can lead to a powerdown problem. Restoring all BIOS power settings to default will likely fix it.

OTHER KNOWN ISSUES & HINTS.

BIOS UPGRADE.
As with every new operating system that comes along - especially one that is as much of a “step up” as Windows XP is from Windows 9x - the recommendation is made to be sure your BIOS is updated. Many people have reported that this has solved their shutdown problems (and had other advantages) with Win XP, just as it has in earlier versions of Windows.

To Convert a FAT partition into NTFS

To convert a FAT partition to NTFS:

Click Start, click Programs, and then click Command Prompt.
In Windows XP, click Start, click Run, type cmd and then click OK.
At the command prompt, type CONVERT [driveletter]: /FS:NTFS.
Convert.exe will attempt to convert the partition to NTFS.

NOTE: Although the chance of corruption or data loss during the conversion from FAT to NTFS is minimal, it is best to perform a full backup of the data on the drive that it is to be converted prior to executing the convert command. It is also recommended to verify the integrity of the backup before proceeding, as well as to run RDISK and update the emergency repair disk (ERD).

Wednesday, July 15, 2009

Keyboard Shortcuts

When speed counts, the keyboard is still king. Almost all the actions and commands you can perform with a mouse you can perform faster using combinations of keys on your keyboard. These simple keyboard shortcuts can get you where you want to go faster than several clicks of a mouse. You'll work faster on spreadsheets and similar documents, too, because you won't lose your place switching back and forth between mouse and keys.

Here are some of the most useful keyboard shortcuts:

Copy. CTRL+C
Cut. CTRL+X
Paste. CTRL+V
Undo. CTRL+Z
Delete. DELETE

Delete selected item permanently without placing the item in the Recycle Bin. SHIFT+DELETE
Copy selected item. CTRL while dragging an item
Create shortcut to selected item. CTRL+SHIFT while dragging an item
Rename selected item. F2
Move the insertion point to the beginning of the next word. CTRL+RIGHT ARROW
Move the insertion point to the beginning of the previous word. CTRL+LEFT ARROW
Move the insertion point to the beginning of the next paragraph. CTRL+DOWN ARROW
Move the insertion point to the beginning of the previous paragraph. CTRL+UP ARROW
Highlight a block of text. CTRL+SHIFT with any of the arrow keys
Select more than one item in a window or on the desktop, or select text within a document. SHIFT with any of the arrow keys
Select all. CTRL+A
Search for a file or folder. F3
View properties for the selected item. ALT+ENTER
Close the active item, or quit the active program. ALT+F4
Opens the shortcut menu for the active window. ALT+SPACEBAR
Close the active document in programs that allow you to have multiple documents open simultaneously. CTRL+F4
Switch between open items. ALT+TAB
Cycle through items in the order they were opened. ALT+ESC
Cycle through screen elements in a window or on the desktop. F6
Display the Address bar list in My Computer or Windows Explorer. F4
Display the shortcut menu for the selected item. SHIFT+F10
Display the System menu for the active window. ALT+SPACEBAR
Display the Start menu. CTRL+ESC
Display the corresponding menu. ALT+Underlined letter in a menu name
Carry out the corresponding command. Underlined letter in a command name on an open menu
Activate the menu bar in the active program. F10
Open the next menu to the right, or open a submenu. RIGHT ARROW
Open the next menu to the left, or close a submenu. LEFT ARROW
Refresh the active window. F5
View the folder one level up in My Computer or Windows Explorer. BACKSPACE
Cancel the current task. ESC
SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.

Use these keyboard shortcuts for dialog boxes:

Move forward through tabs. CTRL+TAB
Move backward through tabs. CTRL+SHIFT+TAB
Move forward through options. TAB
Move backward through options. SHIFT+TAB
Carry out the corresponding command or select the corresponding option. ALT+Underlined letter
Carry out the command for the active option or button. ENTER
Select or clear the check box if the active option is a check box. SPACEBAR
Select a button if the active option is a group of option buttons. Arrow keys
Display Help. F1
Display the items in the active list. F4
Open a folder one level up if a folder is selected in the Save As or Open dialog box. BACKSPACE

If you have a Microsoft Natural Keyboard, or any other compatible keyboard that includes the Windows logo key and the Application key , you can use these keyboard shortcuts:

Display or hide the Start menu.
Display the System Properties dialog box. +BREAK
Show the desktop. +D
Minimize all windows. +M
Restores minimized windows. +Shift+M
Open My Computer. +E
Search for a file or folder. +F
Search for computers. CTRL+ +F
Display Windows Help. +F1
Lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain. + L
Open the Run dialog box. +R
Display the shortcut menu for the selected item.
Open Utility Manager. +U

Helpful accessibility keyboard shortcuts:

Switch FilterKeys on and off. Right SHIFT for eight seconds
Switch High Contrast on and off. Left ALT +left SHIFT +PRINT SCREEN
Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK
Switch StickyKeys on and off. SHIFT five times
Switch ToggleKeys on and off. NUM LOCK for five seconds
Open Utility Manager. +U

Keyboard shortcuts you can use with Windows Explorer:

Display the bottom of the active window. END
Display the top of the active window. HOME
Display all subfolders under the selected folder. NUM LOCK+ASTERISK on numeric keypad (*)
Display the contents of the selected folder. NUM LOCK+PLUS SIGN on numeric keypad (+)
Collapse the selected folder. NUM LOCK+MINUS SIGN on numeric keypad (-)
Collapse current selection if it's expanded, or select parent folder. LEFT ARROW
Display current selection if it's collapsed, or select first subfolder. RIGHT ARROW

How to bypass CD DRM Encryption?

DRM is an encryption manifest file which dissallows an individual who's purchased a CD which contains the DRM directly written into the actual Audio Disk. DRM stands for Digital Rights Management.

What's the cause for DRM Encryption?
DRM(Digital Rights Management) is to control the internets piracy of Audio files, mp3s for example.. on P2P (Peer To Peer) Clients, (A famous one is KaZaA) for non-3rd party use. Which this means that You can rip the audio to your computer, and listen to them only at your computer and nowhere else. Now there usually is an internal ripper provided by the CD itself, for you to burn the audio to another CD-R or whatever, but if you follow my howto it'll make things a lot simpler.
-What you need-

1. 6-ft. (182m)* Shielded Audio Cable, 1/8/11th's stereo miniplug, to 1/8/11th's stereo miniplug. Radio shack item # (42-2387A)
2. A CD Player.
3. The CD which has the DRM encryption.
4. A Computer with working Microphone input, and soundcard output.
5. An Audio editor such as Sonic Foundry Sound forge 6.0 or something like it.

Now, take the Audio chord and plug it into your CD player where you'd put your headphones, then take the other end and plug it directly into your CPU's microphone input.

Once that's done, open up your Audio Editor... click on File>New> Once the new layout has opened, click "Record" now once it has started to record, click Play on your CD Diskman. (Make sure you have your Sound on the Diskman to MAX output)

Now thats pretty much it... once the disk has been fully played and upstreamed to your audio editor... you can disect the Tracks and the name them on New Sound layouts, name the track... and save it as mp3. Becuase by default all audio editors save upstreamed tracks as .WAV format, and wav format is a relativelly enormus size as far as bytes are concerned. Remember, it's our right to do what we want with what we buy.

Tips to create a Strong Password Easily..!!!

How to create a Strong Password. Easily!!!!!

This lead me to explain the method I follow to set a password - A Strong Password indeed by all standards.
You must follow the following criteria while creating a Strong Password:
* The password must be a minimum of 8+ characters.
* The password must have 1 number , 1 special character, 1 Upper Case character.

A very simple example that I use to explain my friends and colleages is : P@ssw0rd. It fullfills all the criteria's. The 'a' is replaced by a special character @. The 'P' is of upper case. The 'o' is replaced by the numeral 0.
Well, you can now convert your regular password into a Strong Password by following a few changes like the example I have mentioned above for the simple password - P@ssw0rd.

* Make the first character Upper Case.
* Change all 'a' in the password to the special character @.
* Change all 's' in the password to the special character $.* Change all 'l' in the password to the special character !.
* Change all 'o' in the password to the numerical 0.
* Change all 'i' in the password to the numerical 1.

Create a better password for your account now!!! Thanks for reading.