| 
                           
                              | KNOW ABOUT WINDOWS Windows: Display the Start menu 
 Windows + D: Minimize or restore all windows
 
 Windows + E: Display Windows
                                    Explorer
 
 Windows + F: Display Search for files
 
 Windows + Ctrl + F: Display Search for computer
 
 Windows
                                    + F1: Display Help and Support Center
 
 Windows + R: Display Run dialog box
 
 Windows + break: Display System
                                    Properties dialog box
 
 Windows + shift + M: Undo minimize all windows
 
 Windows + tab: move through taskbar buttons
 
 Windows + L: Lock the workstation (or switch to the Logon screen w/Fast
 User Switching enabled)
 
 Windows
                                    + U: Open Utility Manager
   Over 1000+ individual tweaks accessed through over 700 tweak plugins! Below is a list of plugins!!!
                                    
   HOW TO DELETE A UNDELETABLE FILE 
                                    
                                    
                                    
                                    | Open a Command Prompt window and leave it open. Close all open programs. Click Start, Run and enter TASKMGR.EXE Go to the
                                    Processes tab and End Process on Explorer.exe. Leave Task Manager open. Go back to the Command Prompt window and change to
                                    the directory the AVI (or other undeletable file) is located in. At the command prompt type DEL <filename> where <filename>
                                    is the file you wish to delete. Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell.
                                    Close Task Manager.   WINDOWS XP HIDDEN APPS: =========================================
 
 Access these applications by clicking 'Start'
                                    > 'Run' > and type in the filename followed by the '.exe' !
 =========================================
 
 
 1)
                                    Character Map = charmap.exe (very useful for finding unusual characters)
 
 2) Disk Cleanup = cleanmgr.exe
 
 3)
                                    Clipboard Viewer = clipbrd.exe (views contents of Windows clipboard)
 
 4) Dr Watson = drwtsn32.exe (Troubleshooting
                                    tool)
 
 5) DirectX diagnosis = dxdiag.exe (Diagnose & test DirectX, video & sound cards)
 
 6) Private
                                    character editor = eudcedit.exe (allows creation or modification of characters)
 
 7) IExpress Wizard = iexpress.exe
                                    (Create self-extracting / self-installing package)
 
 8 ) Microsoft Synchronization Manager = mobsync.exe (appears to
                                    allow synchronization of files on the network for when working offline. Apparently undocumented).
 
 9) Windows Media
                                    Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).
 
 10) ODBC Data Source Administrator = odbcad32.exe
                                    (connecting to databases)
 
 11) Object Packager = packager.exe (to do with packaging objects for insertion in files,
                                    appears to have comprehensive help files).
 
 12) System Monitor = perfmon.exe (very useful, highly configurable tool,
                                    tells you everything you ever wanted to know about any aspect of PC performance, for uber-geeks only )
 
 13) Program
                                    Manager = progman.exe (Legacy Windows 3.x desktop shell).
 
 14) Remote Access phone book = rasphone.exe (documentation
                                    is virtually non-existant).
 
 15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the Windows Registry).
 
 16) Network shared folder wizard = shrpubw.exe (creates shared folders on network).
 
 17) File signature verification
                                    tool = sigverif.exe
 
 18 ) Volume Control = sndvol32.exe (I've included this for those people that lose it from the
                                    System Notification area).
 
 19) System Configuration Editor = sysedit.exe (modify System.ini & Win.ini just like
                                    in Win98! ).
 
 20) Syskey = syskey.exe (Secures XP Account database - use with care, it's virtually undocumented but
                                    it appears to encrypt all passwords, I'm not sure of the full implications).
 
 21) Microsoft Telnet Client = telnet.exe
 
 22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the actions of drivers, might be
                                    useful for people having driver problems. Undocumented).
 
 23) Windows for Workgroups Chat = winchat.exe (appears to
                                    be an old NT utility to allow chat sessions over a LAN, help files available).
 
 24) System configuration = msconfig.exe
                                    (can use to control startup programs)
 
 25) gpedit.msc used to manage group policies, and permissions
 |  
                                    |   HACKING GOOGLE You all must understand that alot of research has gone into obtaining this information and that you are all getting this
                                    the easy way. Damn I wish I was you guys. 
 I'll include a tutorial below along with a few example.
 NOTE: Some of
                                    the links will not work anymore because I have notified the sites to fix their flaws.
 
 Theory
 
 The theory behind
                                    this is actually quite simple. Either you think of certain data you would like to acquire and try and imagine in what files
                                    this kind of data could be stored and you search for these files directly. (Search for *.xls files for example) Or you take
                                    the more interesting approach and you try to think of a certain software that allows you to perform certain tasks or to access
                                    certain things and you search for critical files of this software. An example could be a content management system. You read
                                    up on this particular content management system, check out of what files it exists and search for those. A great example is
                                    that of the databases mentioned above, where you know the string “view database” is used on pages that shouldn’t
                                    be accessible to you and you then search for pages containing that string, or you check the software and notice that the option
                                    to view a database is linked on a webpage within this software called “viewdbase.htm” and you search for “viewdbase.htm”
 
 The most important thing is to have a clear goal, to know what it is you want to find. Then search for these specific
                                    files or trademarks that these files have.
 
 
 Google Search Options
 
 Specific file types: *.xls, *.doc, *.pdf
                                    *.ps *.ppt *.rtf
 
 Google allows you to search for specific file types, so instead of getting html-files as a result
                                    (websites) you get Microsoft excel files for example. The search string you would use would be this:
 
 Filetype:xls
                                    (for excel files) or filetype:doc for word files.
 
 But maybe more interesting would be searching for *.db files and
                                    *.mdb files. Google by the way doesn’t tell you you can search for *.db and *mdb files. I wonder what other file types
                                    one can search for. Things that come to mind are *.cfg files or *.pwd files, *.dat files, stuff like that. Try and think of
                                    something that might get you some interesting results.
 
 Inurl
 
 Another useful search option is the inurl: option
                                    which allows one to search for a certain word one would want to be in the url. This gives you the opportunity to search for
                                    specific directories/folders, especially in combination with the “index of” option, about which I will talk later
                                    on.
 
 An example would be inurl:admin which would give you results of website urls that have the word “admin”
                                    in the url.
 
 
 Index of
 
 The index of option is another option that isn’t especially thought of by the
                                    creators of google, but comes in very handy. If you use the “index of” string you will find directory listings
                                    of specific folders on servers. An example could be:
 
 ‘index of” admin or index.of.admin
 
 which
                                    would get you many directory listings of admin folders. (don’t forget to use the quotes in this case since you are looking
                                    for the entire “index of” string, not just for “index” and “of”)
 
 
 Site
 
 The
                                    site option allows you to come up with results that only belong to a certain domain name extension or to a specific site.
                                    For example one could search for .com sites or .box.sk sites or .nl sites, but also for results from just one site, but more
                                    interesting might be to search for specific military or government websites. An example of a search string would be:
 
 Site:mil
                                    or site:gov
 
 Site:neworder.box.sk “board”
 
 
 Intitle
 
 Intitle is another nice option. It
                                    allows you to search for html files that have a certain word or words in the title. The format would be intitle:wordhere.
                                    You could check out what words appear in the title of some online control panel or content management system and then search
                                    google for this word with the intitle option, to find these control panel pages.
 
 
 Link
 
 The Link option
                                    allows you to check which sites link to a specific site. As described in Hacking Exposed Third Edition, this could be useful:
 
 These search engines provide a handy facility that allows you to search for all sites that have links back to the
                                    target organization’s domain. This may not seem significant at first but let’s explore the implications. Suppose
                                    someone in an organization decides to put up a rogue website at home or on the target network’s site.“”[4]
 
 
 Combining Search Options
 
 The above mentioned search options might or might not be known to you, but even
                                    though they can amount to some interesting results, it’s a fact that when you start combining them, that’s when
                                    google’s magic starts to show. For example, one could try this search string:
 
 inurl:nasa.gov filetype:xls "restricted"
                                    or this one: site:mil filetype:xls "password" or maybe
 
 site:mil “index of” admin
 
 (I’m just
                                    producing these from the top of my head, I don’t know whether they’d result in anything interesting, that’s
                                    where you come in. You got to find a search string that gets the results you want.)
 
 
 Examples; The Good Stuff
 
 Specific
                                    file types: *.xls, *.doc, *.pdf *.ps *.ppt *.rtf
 
 To start out simple, you can try and search directly for files that
                                    you believe might hold interesting information. The obvious choices for me were things like:
 
 Password, passwords,
                                    pwd, account, accounts, userid, uid, login, logins, secret, secrets, all followed by either *.doc or *.xls or *.db
 
 This
                                    led me to quite some interesting results, especially with the *.db option but I actually also found some passwords.doc files,
                                    containing working passwords.
 
 http://www.doc.state.ok.us/Spreadsh...20for%20web.xls
 http://www.bmo.com/investorrelation...new/private.xls
 http://www.nescaum.org/Greenhouse/P...cipant_List.xls
 http://www.dscr.dla.mil/aviationinv...ance_5Apr01.xls
 http://web.nps.navy.mil/~drdolk/is3301/PART_IS3301.XLS
 
 
 Admin.cfg
 
 Admin.cfg is, most of the times, an admin configuration file of some sort. Many different software
                                    obviously use names like “config” or “admin” or “setup”, etc. And most of the times these
                                    files contain sensitive information and thus, shouldn’t be accessible for people browsing the web. I tried a search
                                    for admin.cfg, using the following search string on google:
 
 inurl:admin.cfg “index of”
 
 This led
                                    me to many results of which many were useless. But some paid out. I found for example: http://www.alternetwebdesign.com/cg...ctimi/admin.cfg Which contained a password. This was the admin password for a database located at http://www.alternetwebdesign.com/cg...e.cgi?admin.cfg This database contained sensitive client data of this particular company. I then proceeded to e-mail the company and tell
                                    them about the flaw. They replied to me in a very friendly manner and told me they appreciated my help and that they would
                                    take the necessary steps to solve the problem.
 
 
 Webadmin
 
 A short while back, while working on this article,
                                    I ran into this website:
 
 http://wacker-welt.de/webadmin/
 
 The website explains that “webadmin” is a small piece of software that allows one to remotely edit parts
                                    of a website, upload files, etc. The main page for the webadmin control centre is called
 ‘webeditor.php”.
                                    So obviously, my next step was to visit google and use the inurl tag to find webeditor.php pages that I could reach. I used
                                    the following search string:
 
 inurl:webeditor.php
 
 and I found the following results:
 
 http://orbyonline.com/php/webeditor.php
 http://www-user.tu-chemnitz.de/~hkr...r/webeditor.php
 http://artematrix.org/webeditor/webeditor.php
 http://www.directinfo.hu/kapu/webeditor.php
 
 All these webeditor.php files were reachable by anyone, merely because the owners failed to (correctly) protect these
                                    pages by using .htacces. This mistake allows whomever to change the webpages on the server and thus defacing the site, uploading
                                    files and thus possible gaining full access to the server.
 
 In browsing through these sites I noticed that the file
                                    that allows one to upload files is called
 “file_upload.php”, which I could then search for at google and find
                                    more examples.
 
 http://www.hvcc.edu/~kantopet/ciss_...file_upload.php
 
 A good example:
 
 http://www.pelicandecals.com/admin/webeditor.php
 
 The script allows you to change files, like in the above examples, including the index.php.
 In theory one could
                                    write or download whatever malicious script one wants, paste this code into an existing file or just upload it and well, the
                                    consequences are obvious.
 
 there was also a link “Return Administration” and clicking on it took me to:
 
 http://www.pelicandecals.com/admin/administration.html
 
 Where there were customer addresses, where one could change pricing, etc.
 
 
 Content Management Systems
 
 Content Management Systems are software programs that allow a webmaster to edit, alter and control the content of
                                    his website. But the same goes for online control panels of websites. The idea is to find out what files are for example the
                                    main files of these software programs. “cms.html” could be one or “panel.html” or “control.cfg”
                                    You find out what filenames a certain package uses, you then think of a good search string and hope you strike gold.
 
 
 Frontpage
                                    Server Extensions HTML Administration Forms
 
 “You can remotely administer the FrontPage Server Extensions from
                                    any computer connected to the Internet by using the FrontPage Server Extensions HTML Administration Forms, a set of Web pages
                                    that allow you to administer the FrontPage Server Extensions remotely.[3]
 
 Well, that’s what Microsoft’s
                                    manual has to say about it. This means, users with access to these forms are able to perform a number of administrative functions,
                                    remotely. And that means, these forms should be well protected from non-authorized people. Now how would one go about finding
                                    non-protected forms over the internet? The first thing we do is try to find out what files these scripts consist of. A short
                                    visit to the Microsoft website or a peek into the frontpage manual tells us that the main page for these administration forms
                                    is a file called “fpadmin.htm”. So that’s what we need to search for.
 Now to find a correct search string
                                    that will get us the results we want. When a default install is performed, the files get installed in a directory called “admin”.
                                    Putting to use what we have learned about google search options and the theory behind this technique, a good search string
                                    might be:
 
 inurl:fpadmin.htm “index of” admin or maybe inurl:admin/fpadmin.htm
 
 Well, these were
                                    the results I got:
 
 http://www.lehigh.edu/~ineduc/degre...ams/tbte/admin/
 
 http://blackadder.eng.monash.edu.au/frontpage/admin/
 http://www.lehigh.edu/collegeofeduc...ams/tbte/admin/
 http://www.vsl.gifu-u.ac.jp/freeman/frontpage4/admin/
 http://www.tech-geeks.org/contrib/l...033/fpadmin.htm
 http://fp.nsk.fio.ru/admin/1033/fpadmin.htm
 
 But the frontpage manual says more:
 
 “Because of the security implications of making remote FrontPage
                                    administration possible from Web browsers, the HTML Administration Forms are not active when they are first installed.”[3]
 
 This means that some of these could be active and thus useful to us and some might not. There is of course, only one
                                    way to find out and that is to perform one of the possible administrative functions and see if you get results. I for one
                                    decided not to go that far, because it would mean breaking the law. But I’m not here to teach ethics, or at least not
                                    today.
 
 
 
 
   
 
 
 
 | 
 |  
                              |  |  |  | 
                           
                              | 
                                    
                                    
                                    
                                    |  |  
                                    | Using CRACKS and KEYGENS 
 It's
                                    important to read the *.NFO that comes with any of these, to get the right infomation for applying them to unlock the application.
                                    *.NFO files can be opened with NotePad.
 
 
 ___________________________________________________________
 
 Keygens
 
 These provide the registration
                                    info that is needed to access the application.
 
 Sometimes this is required before, during or after installation to
                                    unlock unlimited full access. Some applications require only a serial to unlock, other are more comprehensive in the details
                                    required to finally unlock the application.
 
 Some Keygens will need:
 * Name: this can be fictitious
 * E-mail:
                                    this can be fictitious
 * Business name: this can be fictitious
 
 Some programs need a serial to install then generate
                                    their own code which needs to put into the Keygen which then generates a final activation code which inturn unlocks the application.
                                    Other programs may require a serial number which is derived from the MAC code, this is more specific to the computer that
                                    application is installed on. Most keygens will automatically find your computers MAC code and generate the appropriate serial
                                    to unlock the application, but in some cases you will have to find and input the MAC code into the keygen manually before
                                    it can generate a serial.
 
 MAC is short for Media Access Control. The MAC address is also sometimes called: the ethernet
                                    address.
 
 To find your MAC address for any of these O/S's:
 Windows XP, 2000, and NT
 Windows ME, 98, and 95
 MacOS X
 MacOS 9.2 running TCP/IP (Open Transport)
 Linux
 Solaris
 SunOS
 
 Go here:
 http://www.its.caltech.edu/net/mac.html
 
 _________________________________________________________
 
 
 Patches/Cracks
 
 
 These alter the *.exe file of the application concerned and sometimes
                                    alter the information in the registry.
 
 They are run after installation and in the installation directory where you
                                    installed the application concerned. Sometimes they can be run from anywhere because they have the facility to allow you to
                                    tell them where the installation directory is located.
 
 _________________________________________________________
 
 
 Loaders
 
 
 These replace the applications
                                    *.exe with the one supplied.
 
 You need to copy the crack to the application installed directory and use it to start
                                    the application. Usually you DO NOT remove the applications own *.exe although the loader might rename it. Loaders are less
                                    common when cracking applications, but are still used.
 
 __________________________________________________________
 
 
 Serials
 
 
 These
                                    are the supplied registration information needed to unlock the application.
 
 They might include info such as Name,
                                    Company, Register number etc. and must be entered EXACTLY as supplied in the proscribed place. Often cut and paste is the
                                    best method but occasionally you need to type in the info given. This may be during or after the applications installation.
                                    (Just like Keygens).
 
 Serials are commonly used – especially with new versions. The crack writers have not had
                                    time to design and release a new crack, and software authors learn what is being posted so they “Blacklist” that
                                    serial to prevent it working in the next version of the application.
 
 Serials are commonly supplied with applications
                                    posted for download.
 
 _________________________________________________________
 
 
 Registry Cracks
 
 
 These can be run from anywhere after
                                    you install the application.
 
 They alter the information the application wrote to the registry. Registry cracks alone
                                    are not as common but are still used. Quite often you may have to use a combination, i.e.: Registry Crack and a serial or
                                    loader.
 
 The supplied *.NFO file will have these details.
 ----------------------------------------------------------------------------------------------------------
 For some reason, Hibernate isn't available from the default Shut Down dialog. But you can enable it simply enough, by holding
                                    down the SHIFT key, then hit ENTER while the dialog is visible. Now you see it, now you don't! 
 
 Other shortcuts:
 
 - just hit 'H'
 - or make your power button do hibernate through the Power Options dialog
 
 
 
 
   
 
  |  
                                     
                                    
                                    
                                    | ---------------------------------------------------------------------------------------------- In order to speed up the Start Menu display in Windows XP, there’s a simple registry setting you can change.
                                    Run ‘regedit’ from your command line and look for the following key: 
 HKEY_CURRENT_USER\Control
                                    Panel\Desktop\MenuShowDelay
 
 You’ll see a value here for 400, by default. Try changing this to something
                                    smaller, like 100 or less. For maximum speed, change it to Zero.
 
 Next, to make things even more efficient, you can
                                    turn off the menu shadowing, by going into your Display Properties, click the Appearance tab, click Effects, and then uncheck
                                    the option “Show menu shadow”.
 |  
                                    | ----------------------------------------------------------------------------------------------TIPS TO KEEP YOUR
                                    PC SAFE
 1. Run Windows Update for Windows XP and 2000. Make sure Internet Explorer and other browsers are updated to the latest
                                    versions. 
 2. Connect your computer to a hardware firewall, or run a free firewall program such as Zonealarm. This
                                    will ensure that hackers do not intrude your computer using newly discovered Windows vulnerabilities. If you use a hardware
                                    based firewall, make sure that only ports of services you need are enabled (such as web browsing - HTTP is port 80). Many
                                    of the firewalls for home use allow all ports to be open by default - you turn off services by entering ranges of ports to
                                    be blocked. (See the instruction manual of your firewall).
 
 3. Install adware detection programs, such as Adware or
                                    Spybot: Search and Destroy, which are free for download. Run these at least every other day if you are an active web surfer,
                                    constantly doing research or shopping online.
 
 4. Run anti-virus software and make sure virus definitions are set to
                                    automatically update or you should check for updates, manually. If your anti-virus subscription has run out, uninstall it,
                                    and install AVG Anti-Virus by www.Grisoft.com for a free personal edition (Do not run this on your work computer without paying for it!).
 
 5. If you have an older
                                    computer, investigate any suspicious "whirring" noises. A harddrive that is making a very loud "whirring" noise may be aging
                                    and damaged by heat - consider replacing it soon. Also, make sure that all fans are running properly, inside, and that there
                                    are no large collections of dust on the motherboard, PCI cards, or the fans. If so, be very careful in removing it. All power
                                    should be turned off, including removal of the power cord, as some motherboards maintain a small charge from the power supply
                                    even after the computer is actually turned off.
 
 6. Run the Windows XP / 2000 disk defragmentor once per month. This
                                    allows for data files to be stored with each segment next to each other in order, on the disk. Without defragmenting, Windows
                                    will store data whereever it finds space, but many times it will store pieces of a data file in many different areas on a
                                    hard drive. This is how it was designed. It is faster for Windows to store data in just anyplace it can, without having to
                                    think about storing everything close together - that apparently would be too much logic to be used at one time and slow down
                                    the immediate saving of files (this is *only* my guess).
 
 7. Make sure programs and drivers are updated. If everything
                                    seems to be working, check for driver updates once per year.
 
 8. This is not necessarily related to your computer's
                                    health, but before if it ever does get sick, it is good to make sure that you are getting regular backups. Try backing up
                                    your My Documents folders and files to a CD every month and carefully label and store it away. If it seems to be too much
                                    hassle to burn a CD, try getting a USB memory device and backup your files to this once in awhile, though these are not as
                                    reliable as a CD backup (they are prone to problems with static electricity and breakage), they are better than no backup
                                    at all.
 
 9. Use a UPS (Uninteruptible Power Supply) to ensure that your computer gets good voltage and is not turned
                                    off when the power hiccups. Also, make sure you do not turn off your computer abruptly - always go through the Start button
                                    and shutdown or control-alt-delete, click shutdown sequence to ensure that your computer is shut down as graceful as possible.
 | 
 ---------------------------------------------------------------------------------------------------------------------  
                                     |  
                              |  |  |