Monday, December 13, 2010

Re-format Re-install


Part 1

This series covers the basic steps of reformatting your hard drive and re-installing Windows. Now, this is not for the digitally squeamish and it's defiantly one of those do-at-your-own-risk deals. It's not intended for novices and should not be attempted unless you are fairly comfortable with DOS (if you have to ask what DOS is, than skip this tip).

A final warning - This is a general procedure so you may run into unforeseen problems. You may be able to get answers to problems at the message board, but don't come cryin' to me - You've been warned!!

OK, before we start any kind of disk formatting, we need to back up all the important info on your computer. I usually copy everything to my CD-R or a few zip disks. I generally only back up stuff that I created. I don't backup programs I have on disk, I re-install those. Make sure you get everything that's important to you backed up (maybe twice) because after we're done formatting the disk it will be COMPLETELY GONE!

Next, you'll want a boot disk. Even if you don't think you'll need it you should still have it, just in case.

To make a boot disk for win 95/98, (not a Windows recovery disk) follow these steps:

1. Open My Computer, insert a 3.5 floppy into your Drive A: and right-click the icon for your A: drive. Select Format from the resulting menu.

2. Select Full format and check the "Copy system files box". Then hit Start to format the disk.



>> Note that if you are using Win ME that the above little trick won't work. You'll need to go to your Start button, Settings, Control Panel. Open up the Add/Remove programs icon. From there, click the Startup Disk tab and create a new startup disk.<<

You should now have a bootable disk. You'll probably want to copy the following files to it:

EDIT.COM (you may need this to create or edit DOS files- this should be there if you made a Win ME recovery disk)
FORMAT.COM (for disk formatting)
FDISK.EXE (you'll lean about FDISK tomorrow- this should be there if you made a Win ME recovery disk)
MSCDEX.EXE (you may need this for your CD ROM)

All the above files should be under your C:\Windows\Command\ directory.
If not, use the Find feature to locate them (Start button, "Find" or "Search", depending on what version of Windows you have) . Once you find the files, right-click them and select Send to, 3 1/2 Floppy (A).



Here's some other stuff you'll want handy:

- Your CD ROM driver
- Your Windows CD
- Your Windows Setup Disk 1 (it's a floppy that you may have if you have a full version of Win 98. It's not 100% neces
Procedure used to recover data from a quick-erased CD-RW disc

1. Make a file of exactly the size of the cdrw disc's capacity (650MB in my case).
(this step may not be needed)

2. With Nero I created a new project and added the file to it so that I have the disc filled. I gues you can also fill up the disc with other files.
The reason why I fill the disc is because I want Nero to make a session that uses the entire disc. Like I wrote earlier in this thread I experienced that my CD-Drive refuses to read off the disc beyond the session's boundaries. When you quick-erase a disc there is no session anymore so the drive will not read at all. Burning a new session will overwrite the data and burning only a small session will NOT make the drive read the other data that is still on the disc.
The reason why I used the one big file is so that I could later on recognize which part of the disc was overwritten by this file because this file contained all zeros (0x00).

3. I pressed burn and selected disc-at-once. Then while Nero was burning the leadin I pressed cancel. My CD-Drive finished writing the lead-in and Nero reported an error.
This is what was accomplished however: Now the disc contains a session that says that the used disc size is the complete disc. Nero did not get to writing file because I cancelled it. Good thing because I don't want Nero to write any files because my old data will get overwritten!
I gues it works the same with different writing software. Another method that I used during a test was simply press the reset button of the computer when the burning software was done with writing the lead-in and started with the files.

4. I had to restart the computer after cancelling burning.
With the cdrw disc inserted I saw in "my computer" that windows recognized that the disc was 650MB, clicking on it gave an error. Good so far!

Now with IsoBuster you can extract the sectors from a disc to a file. This is what I did.
I gues that if you have data-recovery software at this point it will be usefull because now (if all went well;)) the CD-Drive WILL read data from the entire disc. Anyway, I used ISO-Buster because the files that I needed to recover where a bit odd for nowadays (.XM, .S3M, .MP3):
In IsoBuster I had to do several steps:

Step 1: Find out from and to which sector the drive will read
By choosing "Sector View" you can look at any given sector.
Here I found out what the first and the last sectors where that are readable. (Hint I used the method for the old game: "Gues a number below 100, I'll tell if it is higher or lower than what you gues")
Step 2: Extract the actual sectors
By choosing "Extract From-To" you can extract any given range of sectors to a file. My disc was a data-disc so I choose the first extraction type "User data, 2048 bytes/block...".

In the end I got a .tao file which was about 650MB. I ran several programs on it to look for files inside a file by searching for file-header-paterns:
1. Multi Ripper 2.80 (for DOS, for the .XM files. It does many other file formats as well (jpg,png, bmp,wav,etc,etc +100). Try google with this query: Multi Ripper 2.80. I still had the file from good old days but I saw several good search results)

2. Winamp for mp3.
Winamp will scan any file when you give it the extension .mp3 and play it as one big song (so I renamed the .tao file to .mp3). I used the discwriter to get a .wav and the Adobe Audition to manually cut and save my songs. I looked at the MP3 file format and it is hard to find an mp3 file in a big file because it has no clear header just a bunch of mpeg-frames in most cases for me . A lot of my files had no ID3v2 or ID3v1 tags... But after a couple of hours I recovered everything.

Finally a list of used stuff:

Software:
- IsoBuster v1.5
- Nero 6.3.0.3
- Multi Ripper 2.80
- WinAmp v5.02
- Windows XP Pro NL (patched up)

Hardware:
- NEC DVDRW ND1300A 1.06

Disc:
- some old 4 speed cdrw


Recover a Corrupted System File


If an essential Windows file gets whacked by a virus or otherwise corrupted, restore it from the Windows CD. Search the CD for the filename, replacing the last character with an underscore; for example, Notepad.ex_. If it's found, open a command prompt and enter the command EXPAND, followed by the full pathname of the file and of the desired destination: EXPAND D:\SETUP\NOTEPAD.EX_ C:\Windows\NOTEPAD.EXE. If either pathname contains any spaces, surround it with double quotes.

If the file isn't found, search on the unmodified filename. It will probably be inside a CAB file, which Win XP treats as a folder. Simply right-drag and copy the file to the desired location. In other Windows platforms, search for a file matching *.cab that contains the filename. When the search is done, open a command prompt and enter EXTRACT /L followed by the desired location, the full pathname of the CAB file, and the desired filename; for example: EXTRACT /L C:\Windows D:\I386\Driver.cab Notepad.exe. Again, if the destination or CAB file pathname contains spaces, surround it with double quotes.

Read This! Av Compare

Testbed consisted of 321 Viruses, Trojans and Worms, all for the Windows32 environment, and all reasonably new samples. I don't have any data on whether some of these are zoo, or ITW, but they are all real threats I feel someone is likely to encounter, since I got them off the internet (and i've verified they are real as each sample must be detected by at least 4 AV's for me to consider it). All scanners were installed on a clean system, without any traces of other anti-virus softwares - between each test the system and directories were cleaned, and the registry was sweeped. Each AV product was treated with a double-reboot, one before, and one after installation. Each scanner was set at its highest possible settings, and was triple checked for proper options and configuration. Most products were the full registered version when possible, others were fully functional unrestricted trials. All products were tested with the current version as of 6-14-04, and the latest definitions for that date. Each product was run through the test set a minimum of 3 times to establish proper settings and reliability, the only product to exhibit some variance on this was F-Secure, which had one scan come up less than the other two without any settings changes indicating a possible stability issue.

The final standings:

1) MKS-Vir
1a) eXtendia AVK
2) Kaspersky 5.0/4.5
2a) McAfee VirusScan 8.0
3) F-Secure
4) GData AVK
5) RAV + Norton (2 way tie)
6) Dr.Web
7) CommandAV + F-Prot + BitDefender (3 Way Tie)
8) ETrust
9) Trend
10) Panda
11) Avast! Pro
12) KingSoft
13) NOD32
14) AVG Pro
15) AntiVIR
16) ClamWIN
17) UNA
18) Norman
19) Solo
20) Proland
21) Sophos
22) Hauri
23) CAT Quickheal
24) Ikarus

Heuristics seemed to play some of a roll in this test, as no AV had every virus in my test in their definitions, and products with stronger heuristics were able to hold their position towards the top of the test. Double/Multi engined products put up strong showings as well, proving to me that the redundacy method works, and I think more AV companies should considering double-engines. The strongest heurisitical AV I noticed was F-Prot/Command, picking up only 247 samples with definitions but they were able to power through 67 additional hits on "Possible Virus" indicators - very strong! Norton with BloodHound activated had 30 Heuristical pickups, and DrWeb rounded up the pack with 20 heuristical pickups. eXtendia AVK grabs the number one slot with double engine scanning, anything the KAV engine missed, the RAV engine picked up with great redundancy on the double engine/definition system. McAfee actually missed only 2 samples with its definitions, but picked those 2 up as "Suspicious File", and therefore, scores nearly perfect as well.

The biggest dissapointments for me were Norman and Nod32. Even with Advanced-Heuristics enabled, NOD32 failed to pick up a large portion of the samples. Norman, while finding some of the toughest samples, managed to completely miss a large portion of them! Showing that their sandbox-emulation system has great potetential, but its far from complete.

Actual test numbers were:

Total Samples/Found Samples (321 total possible) + Number Missed + Detection Percentage

Discovered and tested MKS-Vir2004, from Poland. Surprisingly, this one with caught every sample perfectly on Medium Heuristics. Specifically, nearly 50 samples were picked up Heuristically giving it a perfect score of 321/321. However, when I increased Heuristics to "Super Deep", it picked up an addition 10 more suspicious files. Upon further investigation, it was found that it was picking up signatures of hacktool utilities left over in some of the archives and flagging those files. Indeed, this is impressive. MKS-Vir2004 exhibits the most advanced detection algorithms i've ever seen, clearly it only had signatures for 271 of my samples, but through code emulation, it was able to pick up all 321 samples!! It clearly labeled the Heuristically found ones as things as "Likely Win32 Trojan" or "Highly Suspicious Acting File". In addition, its scanning speed was incredibly quick, and its memory footprint was quite small. Impressive! Furthermore, this is a full featured and fairly polished product that appears to update at least once per day, and tech support responded to me within 5-15 minutes on my emails. Unfortunately, it appears to not be available in the US for purchase at this time.

1a) MKS_Vir 2004 - 321/321 0 Missed - 100%
1b) eXtendia AVK - 321/321 0 Missed - 100%
2a) Kaspersky 5.0 - 320/321 1 Missed - 99.70% (with Extended Database ON)
2b) McAfee VirusScan 8.0 - 319/321 + 2 (2 found as joke programs - heuristically) - 99%
3) F-Secure - 319/321 2 Missed - 99.37%
4) GData AVK - 317/321 4 Missed - 98.75%
5) RAV + Norton (2 way tie) - 315/321 6 Missed - 98.13%
6) Dr.Web - 310/321 11 Missed - 96.57%
7) CommandAV + F-Prot + BitDefender (3 Way Tie) - 309/321 12 Missed - 96.26%
8) ETrust - 301/321 20 Missed - 93.76%
9) Trend - 300/321 21 Missed - 93.45%
10) Avast! Pro - 299/321 22 Missed - 93.14%
11) Panda - 298/321 23 Missed - 92.83%
12) Virus Buster - 290/321 31 Missed - 90.34%
13) KingSoft - 288/321 33 Missed - 89.71%
14) NOD32 - 285/321 36 Missed (results identical with or without advanced heuristics) - 88.78%
15) AVG Pro - 275/321 46 Missed - 85.66%
16) AntiVIR - 268/321 53 Missed - 83.48%
17) Antidote - 252/321 69 Missed - 78.50%
18) ClamWIN - 247/321 74 Missed - 76.94%
19) UNA - 222/321 99 Missed - 69.15%
20) Norman - 215/321 106 Missed - 66.97%
21) Solo - 182/321 139 Missed - 56.69%
22) Fire AV - 179/321 142 Missed - 55.76%
23) V3 Pro - 109/321 212 Missed - 33.95%
24) Per_AV - 75/321 - 246 Missed - 23.36%
25) Proland - 73/321 248 Missed - 22.74%
26) Sophos - 50/321 271 Missed - 15.57%
27) Hauri - 49/321 272 Missed - 15.26%
28) CAT Quickheal - 21/321 300 Missed - 6%
29) Vir_iT - 10/321 311 Missed - 3%
30) Ikarus - Crashed on first virus. - 0%

Interesting also to note, is the detection level of the US AVK version with KAV+RAV engines was higher than the German version with KAV+BitDefender engines. Several vendors have free versions of their for purchase AV's, we didn't test the free versions, as it would serve no purpose for this test, but based on the results, none of the free versions would have been very impressive anyway. The term "Heuristics" seems like it should be taken very liberally, as some products that claim to be loaded with Heuristics scored miserably on items they clearly didn't have definitions for. Scanning speed was not measured, as it was totally irrelevant to my testing, and on-access scanners were not tested, as it would have been too time consuming, but considering most products have similar on-access engines as on-demand, and use the same database, results most likely, would be very similar.

Cut through the hype, cut through the marketing schemes, this was a real test, with real samples, and none of these samples were provided to the antivirus software vendors in advance. This is real world, and these are likely badguys you'll encounter, since I got them in my real encounters, and all were aquired on the internet in daily activities which anyone out there might be involved in. (Installing shareware, filesharing, surfing, etc). Keep in mind that with ITW tests the AV vendors have full disclosure of what they will be tested on in advance, not so here, so heuristics and real detection algorithms will play a big part, as well as the depth and scope of their definition database.

[Edit: After re-testing the Kaspersky products with Extended Database option turned ON, the moved up effectively scoring 100% considering the 1% margin of error]
Rapidshare Timelimit
Directions
Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day. To get around this, you need to show the rapidshare server, a different IP address. You can do this one of multiple ways.

Requesting a new IP address from your ISP server.

Here's how to do it in windows:
1. Click Start
2. Click run
3. In the run box type cmd.exe and click OK
4. When the command prompt opens type the following. ENTER after each new line.


ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit


5. Erase your cookies in whatever browser you are using.
6. Try the rapidshare download again.
Frequently you will be assigned a new IP address when this happens. Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work. To be honest, I do not know how to do this in linux/unix/etc. If this works for you, you may want to save the above commands into a batch file, and just run it when you need it.
Rapidshare Hacked, unlimited upload, no countdown

UNLIMITED download/upload
Its very easy to fool Rapid Share server if your IP address is assigned by your ISP. Just follow these simple steps:

clean up IE or netscape or Firefox cookie( In this case the one that belong to rapidshare website)
On Command prompt (open MS-DOS)
type -----> ipconfig /flushdns <---Enter
type -----> ipconfig /release <---Enter
type -----> ipconfig /renew <---Enter
type -----> exit <--------Enter

Or save these commands in a bat file and run it everytime you need to fool Rapidshare server. Remember to clean up rapidshare cookie in your temp Internet files folder.

Now you should be ready to download/upload as many files as you want from their server.

another way, get proxies from the internet and apply to the browser.
some of proxies might not work though...

Note:
If you are on a LAN and behind a router (using NAT, for example)---this will not work.
If you use a fixed proxy--- this will not work.
If you have a fixed IP address from your ISP or college or employer or whatever -- this will not work.
If you happen to get the same IP address from your DHCP server because it's assigned to you -- this will not work

NO waiting
THIS "cheat" for RAPIDSHARE DOWNLOADS eliminates the "WAITING" for the file. No more COUNTDOWNS. So heres what you do:

1. First, Find a rapidshare download.
2. Hit the FREE BUTTON, like always.
3. While your waiting for it to countdown, change the URL in the bar to:
Code:
java script:c(countdown = 0);
and hit ENTER or the GO button over and over. Eachtime you do so, it decreases 10-20 seconds. Few times and the link appears.
or you can simply do the code below ONCE
java script: for (i=0; i<30; i++) { c(); }
Rapidshare hack!!!!! Free premium acount for all

hi i got the encrypted message if you decode that message you get a link to register premium acount on rappit share but i dont have a decomipler for PKCS7 help me decode this message and we have all free premium acounts.

Code:




Quickly Start The Shared Folder Wizard

Want to share a folder, or multiple folders, quickly and easily?

You can invoke the Shared Folder Wizard by typing shrpubw.exe at the Run box or command line. The wizard takes you through the process of setting up a shared folder and allows you to start the process over within the same wizard, which is especially good if you want to make multiple folders shared.
Quick Shutdown for XP, How to create a shutdown shortcut

Ever want a quicker way to shutdown XP without navigating through the start menu, or using a third party shutdown utility Here is a script that will do just that.

Right click the desktop and choose New Shortcut. Copy and paste this script or type it in.

%windir%System32shutdown.exe -s -t 0

Choose Next and name it whatever you like. I name mine OFF. Click Finished. Right click and choose properties and pick a Icon for it if you'd like. I use a wall light switch Icon. I drag mine into my QuickLaunch toolbar for one click shutdown.

Enjoy!
Quick Msc

Start > Run >

Certificates - certmgr.msc

Indexing Service - ciadv.msc

Computer Management - compmgmt.msc

Device Manager - devmgmt.msc

Disk Defragmenter - dfrg.msc

Disk Management - diskmgmt.msc

Event Viewer - eventvwr.msc

Shared Folders - fsmgmt.msc

Local Users and Groups - lusrmgr.msc

Removable Storage - ntmsmgr.msc

Removable Store Operator Requests - ntmsoprq.msc

Performance - perfmon.msc

Services - services.msc

Windows Management Infrastructure (WMI) - wmimgmt.msc

Thursday, December 2, 2010

Free X-box Live

Anyone here think about getting xbox live but not have enough money to pay for the starter kit...

WELL GUESS WHAT!!!!!!!!

You can now get it without paying a cent (that is if you have a free 2 month trial)

First go to http://www.xbconnect.com/downloads.php and download the current version of XBConnect...

Secondly you must get a Ethernet cable and connect your X-BOX to your router (if you have, you MUST have one BTW)

Thirdly install and open xbconnect. Create a new account .......

Fourthly go on www.xbox.com/live and sign in your .NET passport and create a profile for xbox live

Fifthly open your xbox with a xbox live supported game and follow the setup for xbox live ....

And YOUR DONE!!!!!
General Keyboard Shortcuts, General Keyboard Shortcuts

General Keyboard Shortcuts
CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box Keyboard Shortcuts
CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
Microsoft Natural Keyboard Shortcuts
Windows Logo (Display or hide the Start menu)
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard)
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)
Accessibility Keyboard Shortcuts
Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)
Windows Explorer Keyboard Shortcuts
END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
Microsoft Management Console (MMC) Main Window Keyboard Shortcuts
CTRL+O (Open a saved console)
CTRL+N (Open a new console)
CTRL+S (Save the open console)
CTRL+M (Add or remove a console item)
CTRL+W (Open a new window)
F5 key (Update the content of all console windows)
ALT+SPACEBAR (Display the MMC window menu)
ALT+F4 (Close the console)
ALT+A (Display the Action menu)
ALT+V (Display the View menu)
ALT+F (Display the File menu)
ALT+O (Display the Favorites menu)
MMC Console Window Keyboard Shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
Microsoft Internet Explorer Navigation
CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)
CTRL+O (Open the Open dialog box, the same as CTRL+L)
CTRL+P (Open the Print dialog box)
CTRL+R (Update the current Web page)
CTRL+W (Close the current window)
Free World Dialup

Free World Dialup - http://www.freeworlddialup.com/
"Use FWD to make real, free phone calls using your favorite telephone, computer or PDA and any broadband connection. Call your neighbor or a relative, next door or in another country; all with the same ease, speed, and high quality." Thanks to Jeff Pulver and his crew!

Quick summary:

1 - First, got to http://www.freeworlddialup.com and sign up to get your FWD # and password.
2 - Download http://brands.xten.net/x-litefwd/download/X-LiteFWD_Install.exe FWD/X-Lite ("self-configures") program or go to http://www.myphonebooth.com/ to call any FWD # and U.S. toll free #s using Internet Explorer (Firefox not supported).

Quickstart Guide: http://www.freeworlddialup.com/support/quick_start_guide
FWD Xlite Configuration Guide: http://www.freeworlddialup.com/support/configuration_guide/configure_your_fwd_certified_phone/fwd_xlite/all
MS Windows Messenger Configuration Guide: http://pulver.com/fwd/fwd30news.html#messenger (FWD supports Windows Messenger 4.6/4.7 but not MSN Messenger 5.x.)

3 - To call a U.S. landline/cell #, dial *+arecode+7digit#. (This FWD feature is not listed on their website, but has been working for several months now.)

4 - To call a FWD # from a PSTN (your regular phone), click
http://www.dslreports.com/r0/download/476274~3ccc4c9edbe2a596714a4fd9da897204/fwdaccessnumbers.zip or after you've signed up go to FWD web page, click on "Features", "Access #s" for a list of FWD access numbers in your area. Available in several states in the U.S., UK, NL and DE at this time.

Packet8:
-- To call a P8 phone # from a FWD phone: Dial **898 + 1 + P8 number to be routed to P8 service.
-- To call a FWD # from a P8 phone:
*If the FWD # you are calling contains 5 digits, start to dial with the prefix 0351. For example: 035112345
*If the FWD # you are calling contains 6 digits, start to dial with the prefix 0451.

Call UK:
Get a UK telephone # that will call you on your FWD #. Register http://fwd.calluk.com.

FWD Features: Some features like Voice email needs to be activated at http://www.fwdnet.net

Internet Calling
Call Waiting
CallerID
Missed Call notification
Call Forwarding
Call Transfer
Three Way Calling
Voice email
SoftPhone, IP Phones & *Web-based
Aliases
Whitepages directory
ENUM Entry
eDial SOAP
Conferencing
Instant Messaging
Web Calling/FWD-Talk
Corporate Cisco Call Manager Connection
Calling to Toll Free Numbers in the UK, US, NL, JP and FR TellMe Service (411).
-- NL Dial *31(800)... to reach Netherlands toll free #s.
-- UK Dial *44(800)... or *44(808)... or *44 (500) to reach UK toll free #s.
-- US Dial *1(8xx) xxx xxxx to reach United States toll free #s.
-- JP Dial *81 0120... to reach Japan toll free #s.

Frequently used numbers
613 Echo test
55555 Volunteer Welcome Line
514 FWD Coffee House
612 Time
411 TellMe Information
611 Part Time Technical support
511 FWD Conference Bridge

At the moment, I think this is way better than Skype, Yahoo IM voice chat, etc...I've been using FWD for over a year with my cable broadband service and didn't have to set up any port forwarding on my broadband router. Obviously you'ld need a mic/speakers connected to your PC.

You can also use your regular telephone via an adapter http://voipstore.pulver.com/product_info.php?products_id=32 and IP phone http://voipstore.pulver.com/product_info.php?products_id=33. Adapters and IP phones from different vendors like Cisco are available.

* Broadbandreports.com VoIP forum (formerly known as DSLReports.com)
-- If you have any questions or just curious about VoIP, visit the VoIP forum http://www.dslreports.com/forum/voip at DSLReports.com.
Formatting An Hdd, when fdisk won't

This was originally posted by andro11meda in Hardware and Networking Support. It worked so well for me on a problem-computer that I was working on that I had to post it in tutorials. Thanks andro11meda!!


***
This is my favorite way to wipe it clean:

CAUTION: This debug script is for advanced users only. Its Purpose is to remove all formatting and partitioning information from your hard disk when FDISK is unable to do so. THIS WILL REMOVE ALL DATA AND PROGRAMS FORM THE DRIVE.

1. Create a MSDOS bood disk with Debug

2. At DOS command prompt type the following: Debug[Enter] (Where enter is to press the enter key once)

NOTE: Type the following bolded text only. You will recieve an error if you type anything other than the bold text. The non-bolded text represents what will appear on you screen once you press [Enter] after each command.

-F 200 L1000 0 [Enter]
-A CS:100 [Enter]
xxxx:0100 MOV AX,301 [Enter]
xxxx:0103 MOV BX,200 [Enter]
xxxx:0106 MOV CX,1 [Enter]
xxxx:0109 MOV DX,80 [Enter]

NOTE: ( --- "80" for hd0, "81" for hd1)

xxxx:010c INT 13 [Enter]
xxxx: 010e INT 20 [Enter]
xxxx: 0110 [Enter]

-G [Enter]
"Program terminated normally"

3. Turn off the computer. On the next startup the hard drive will need to be partitioned and formatted.
***
Firefox Speed Tweaks

Yes, firefox is already pretty damn fast but did you know that you can tweak it and improve the speed even more?

That's the beauty of this program being open source.
Here's what you do:
In the URL bar, type “about:config” and press enter. This will bring up the configuration “menu” where you can change the parameters of Firefox.

Note that these are what I’ve found to REALLY speed up my Firefox significantly - and these settings seem to be common among everybody else as well. But these settings are optimized for broadband connections - I mean with as much concurrent requests we’re going to open up with pipelining… lol… you’d better have a big connection.

Double Click on the following settins and put in the numbers below - for the true / false booleans - they’ll change when you double click.

Code:
browser.tabs.showSingleWindowModePrefs – true
network.http.max-connections – 48
network.http.max-connections-per-server – 16
network.http.max-persistent-connections-per-proxy – 8
network.http.max-persistent-connections-per-server – 4
network.http.pipelining – true
network.http.pipelining.maxrequests – 100
network.http.proxy.pipelining – true
network.http.request.timeout – 300


One more thing… Right-click somewhere on that screen and add a NEW -> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0”. This value is the amount of time the browser waits before it acts on information it receives. Since you’re broadband - it shouldn’t have to wait.

Now you should notice you’re loading pages MUCH faster now!
Finding Missing Files From A Release


I hope this hasn't been submitted before, but i did a search and didn't find anything so here goes.
Have you ever downloaded a game/app/movie/... and when it was finished, you find out that are some missing files or corrupt ones?
Well here's a way to find those files:
--> www.incomplete.me.uk

This is a service that works through irc (so mirc (or another) must be installed to use it).
You go on the specific channel (manually or by clicking one of the direct links on the site) and then "ask" for the specific file.
When there's someone out there who has it, it will be send to you automatically
If not, the file request shall be put on a queu list untill someone that has it, has sent it to the person that requested it.
!!! Obey the rules though, if not you can be banned from the channel and in severe cases your provider can be banned so others won't be able to use this !!!

I hope this can help out some people here, who have experienced/will experience this



16x Dvd+-rw Dl Dvd Writer Comparison Guide

Source:
CODE
http://www.extrememhz.com/dlcomp-p1.shtml


Since the introduction of double layer DVD writers, the interest has been quite overwhelming and is why we keep bringing you reviews of these highly popular drives. The anticipation has now turned into down right obsession and it has become a key component in any current or new system build, thanks to the declining prices and continued media hype. Manufacturers are quite aware of the fascination and is why they have each been releasing their own products which excel in at least one area of the testing methodology used in most reviews. This has led to some confusion as to which drive is best suited for the individuals needs. Today, we compare four 16x double layer drives and highlight both the strong and weak points in order to give you a better idea of which drive is best suited for you.


In this comparison guide, we will be looking at four of the top 16x drives to hit the market, the Pioneer DVR-108, NEC ND3500A, Lite-On SOHW-1633s and the new LG GSA-4160B. We will cover everything from design and features to performance and price. Let's begin with a quick look at each of these drives.


As far as the front bezel design goes, the LG-GSA4160B is by far the most attractive drive of the bunch. However, for those who are looking for a headphone jack, the Lite-On drive is the only DL writer offering a headphone jack, as well as volume control. The Pioneer and NEC drives, in my opinion, are the ugliest drives, with a very plain look that just wants to make you hide the drive period. Although we only obtained the 4160B in black, all these drives are offered with both white and black bezels. If you opt for the more expensive Pioneer "XL" model, it has the most impressive looks of any drive in the market. However, this will come at a very hefty price tag, considering they contain different firmware as well that offer a few extra features.

So, we have determined which is the sexiest-looking drive, but what about performance? I've done some extensive testing on each model to determine which is indeed the most impressive of the bunch. But before we show you performance results, let's briefly look at the features and what they have to offer.

Features



Each one of these drives has there disappointments when it comes to features. Let's compare each to see what they really offer.



DVD Writing



DVD+R DVD-R DVD+RW DVD-RW
LG GSA-4160B 16x 8x 4x 4x
Lite-On SOHW-1633s 16x 8x 4x 4x
NEC ND-3500A 16x 16x 4x 4x
Pioneer DVR-108 16x 16x 4x 4x



While all these drives are indeed 16x models, only two will write to both formats at this speed. The LG GSA-4160B and the Lite-On SOHW-1633s only support 8x DVD-R writing. So if you are one who only prefers this format, the NEC or Pioneer would be the best choice. All of these drives support writing to DVD re-writable media at 4x.



DVD+R9 Double Layer Writing



Write Speed
LG GSA-4160B 2.4x
Lite-On SOHW-1633s 2.4x
NEC ND-3500A 4x
Pioneer DVR-108 4x



The major disappointment with both the LG and the Lite-On 16x drives is the lack of 4x double layer writing support. Pioneer and NEC seem to be the only manufacturers to jump in and release second generation double layer drives supporting much faster 4x writing. In fact, the jump from 2.4x to 4x is quite substantial as we will show you a bit later in this comparison.



DVD-RAM Support



Supported Read Write
LG GSA-4160B YES 5x 5x
Lite-On SOHW-1633s NO NO NO
NEC ND-3500A NO NO NO
Pioneer DVR-108 YES 2x NO



Now this is where both the LG GSA-4120B and GSA-4160B shine above the rest. In fact, it is what has made these drives the most popular DVD writers on the market. Unlike the rest in the roundup, it is a triple format burner, offering full support for DVD-RAM media. The other drives do not support it, with the exception of the Pioneer DVR-108 which supports reading of DVD-RAM discs at 2x. I personally don't see the point in offering only read capabilities, but it's at least one extra feature added to distinguish it from the rest. Fast 5x support of the LG GSA-4160 will actually be tested a bit later in this article.



CDR Writing



CDR CDRW
LG GSA-4160B 40x 24x
Lite-On SOHW-1633s 48x 24x
NEC ND-3500A 48x 24x
Pioneer DVR-108 32x 24x



The fastest CDR writers of the bunch are the Lite-On SOHW-1633s and the NEC ND-3500A. With their support for 48x writing, they make a great all-in-one drive for many users. The only drive lacking in this lineup is the Pioneer DVR-108. Why they opted for only 32x writing is still quite puzzling and is actually why I have found that many are choosing the NEC over the Pioneer. The LG GSA-4160B should not be left out of consideration though. We will show you later that the difference in write times between 40x and 48x is not much to brag about.



Bitsetting Support



One feature I've found that is most important for many users is bitsetting support. Let's compare these drives and see what they offer.



DVD+R/RW Support DVD+R DL Support
LG GSA-4160B NO NO
Lite-On SOHW-1633s YES NO
NEC ND-3500A NO YES
Pioneer DVR-108 NO YES



The LG GSA-4160B does not offer bitsetting support out of the box. However, it is very likely that you will be able to obtain support through an excellent third-party tool called DVDInfo Pro. Right now, they only support the GSA-4120B, but I'm confident with the author that support for this drive will be likely. LG firmware is very hard to hack, however some select few have been able to do so. Using Lite-On's booktype utility, you can change the booktype of DVD+R/RW media, however, the firmware does not automatically change booktype of DVD+R DL discs to DVD-ROM like the NEC and Pioneer models do.



Additional Features



As far as other features go, all these drives have a 2MB buffer but offer some sort of buffer under-run protection, which all work exceptionally well. This is especially useful if you will be burning discs at 16x, which I personally don't recommend just yet. As our individual tests of these drives revealed, burning at this speed is quite unstable, with the exception of the Lite-On SOHW-1633s.
A very small tut for RealMedia

You may find this helpful if you donwload hundreds of short episodes in rm format like me and tired of double-click to open next files.

Very easy. Use notepad to open a new file, type this inside:
file://link to file1
file://link to file2
(type as many as you want)
Close file. Rename it to FileName.rm

Then you`re done!!!!

Ex:
I put my playlist file here: C:\Movies\7VNR
And the movie files are in C:\Movies\7VNR\DragonBall

Then inside my playlist file I`ll have something like this:

file://DragonBall/db134.rm
file://DragonBall/db135.rm
file://DragonBall/db136.rm
file://DragonBall/db137.rm
file://DragonBall/db138.rm
Advanced Shellcoding Techniques - by Darawk
* * ************************************************

Introduction

This paper assumes a working knowledge of basic shellcoding techniques, and x86 assembly, I will not rehash these in this paper. I hope to teach you some of the lesser known shellcoding techniques that I have picked up, which will allow you to write smaller and better shellcodes. I do not claim to have invented any of these techniques, except for the one that uses the div instruction.



The multiplicity of mul

This technique was originally developed by Sorbo of darkircop.net. The mul instruction may, on the surface, seem mundane, and it's purpose obvious. However, when faced with the difficult challenge of shrinking your shellcode, it proves to be quite useful. First some background information on the mul instruction itself.

mul performs an unsigned multiply of two integers. It takes only one operand, the other is implicitly specified by the %eax register. So, a common mul instruction might look something like this:

movl $0x0a,%eax
mul $0x0a

This would multiply the value stored in %eax by the operand of mul, which in this case would be 10*10. The result is then implicitly stored in EDX:EAX. The result is stored over a span of two registers because it has the potential to be considerably larger than the previous value, possibly exceeding the capacity of a single register(this is also how floating points are stored in some cases, as an interesting sidenote).

So, now comes the ever-important question. How can we use these attributes to our advantage when writing shellcode? Well, let's think for a second, the instruction takes only one operand, therefore, since it is a very common instruction, it will generate only two bytes in our final shellcode. It multiplies whatever is passed to it by the value stored in %eax, and stores the value in both %edx and %eax, completely overwriting the contents of both registers, regardless of whether it is necessary to do so, in order to store the result of the multiplication. Let's put on our mathematician hats for a second, and consider this, what is the only possible result of a multiplication by 0? The answer, as you may have guessed, is 0. I think it's about time for some example code, so here it is:

xorl %ecx,%ecx
mul %ecx

What is this shellcode doing? Well, it 0's out the %ecx register using the xor instruction, so we now know that %ecx is 0. Then it does a mul %ecx, which as we just learned, multiplies it's operand by the value in %eax, and then proceeds to store the result of this multiplication in EDX:EAX. So, regardless of %eax's previous contents, %eax must now be 0. However that's not all, %edx is 0'd now too, because, even though no overflow occurs, it still overwrites the %edx register with the sign bit(left-most bit) of %eax. Using this technique we can zero out three registers in only three bytes, whereas by any other method(that I know of) it would have taken at least six.


The div instruction

Div is very similar to mul, in that it takes only one operand and implicitly divides the operand by the value in %eax. Also like, mul it stores the result of the divide in %eax. Again, we will require the mathematical side of our brains to figure out how we can take advantage of this instruction. But first, let's think about what is normally stored in the %eax register. The %eax register holds the return value of functions and/or syscalls. Most syscalls that are used in shellcoding will return -1(on failure) or a positive value of some kind, only rarely will they return 0(though it does occur). So, if we know that after a syscall is performed, %eax will have a non-zero value, and that the instruction divl %eax will divide %eax by itself, and then store the result in %eax, we can say that executing the divl %eax instruction after a syscall will put the value 1 into %eax. So...how is this applicable to shellcoding? Well, their is another important thing that %eax is used for, and that is to pass the specific syscall that you would like to call to int $0x80. It just so happens that the syscall that corresponds to the value 1 is exit(). Now for an example:


xorl %ebx,%ebx
mul %ebx
push %edx
pushl $0x3268732f
pushl $0x6e69622f
mov %esp, %ebx
push %edx
push %ebx
mov %esp,%ecx
movb $0xb, %al #execve() syscall, doesn't return at all unless it fails, in which case it returns -1
int $0x80

divl %eax # -1 / -1 = 1
int $0x80

Now, we have a 3 byte exit function, where as before it was 5 bytes. However, there is a catch, what if a syscall does return 0? Well in the odd situation in which that could happen, you could do many different things, like inc %eax, dec %eax, not %eax anything that will make %eax non-zero. Some people say that exit's are not important in shellcode, because your code gets executed regardless of whether or not it exits cleanly. They are right too, if you really need to save 3 bytes to fit your shellcode in somewhere, the exit() isn't worth keeping. However, when your code does finish, it will try to execute whatever was after your last instruction, which will most likely produce a SIG ILL(illegal instruction) which is a rather odd error, and will be logged by the system. So, an exit() simply adds an extra layer of stealth to your exploit, so that even if it fails or you can't wipe all the logs, at least this part of your presence will be clear.



Unlocking the power of leal

The leal instruction is an often neglected instruction in shellcode, even though it is quite useful. Consider this short piece of shellcode.

xorl %ecx,%ecx
leal 0x10(%ecx),%eax

This will load the value 17 into eax, and clear all of the extraneous bits of eax. This occurs because the leal instruction loads a variable of the type long into it's desitination operand. In it's normal usage, this would load the address of a variable into a register, thus creating a pointer of sorts. However, since ecx is 0'd and 0+17=17, we load the value 17 into eax instead of any kind of actual address. In a normal shellcode we would do something like this, to accomplish the same thing:

xorl %eax,%eax
movb $0x10,%eax

I can hear you saying, but that shellcode is a byte shorter than the leal one, and you're quite right. However, in a real shellcode you may already have to 0 out a register like ecx(or any other register), so the xorl instruction in the leal shellcode isn't counted. Here's an example:

xorl %eax,%eax
xorl %ebx,%ebx
movb $0x17,%al
int $0x80

xorl %ebx,%ebx
leal 0x17(%ebx),%al
int $0x80

Both of these shellcodes call setuid(0), but one does it in 7 bytes while the other does it in 8. Again, I hear you saying but that's only one byte it doesn't make that much of a difference, and you're right, here it doesn't make much of a difference(except for in shellcode-size pissing contests =p), but when applied to much larger shellcodes, which have many function calls and need to do things like this frequently, it can save quite a bit of space.



Conclusion

I hope you all learned something, and will go out and apply your knowledge to create smaller and better shellcodes. If you know who invented the leal technique, please tell me and I will credit him/her.
36 Graphics & Design Ebooks

Maya, Photoshop, Macromedia, Bryce, Digital Photography, & more....

Download with FlashGet

f*p://195.135.232.80/Books/design/8.books.Maya.[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/A.Short.Course.in.Digital.Photography.[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Adobe.Creative.Suite.Keyboard.Shortcuts.[by.KiN_www.netz.ru]_3,1.MB.rar
f*p://195.135.232.80/Books/design/Adobe.Photoshop.CS.in.10.Simple.Steps.or.Less.(2004).[by.KiN_www.netz.ru]_7,84 MB.rar
f*p://195.135.232.80/Books/design/Adobe.Photoshop.Tutorial.7.Day.Course.html.a.[28.84.MB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Advanced.3D.Photorealism.Techniques[9,76.MB_RUS_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Bill.Flemming.Advanced.3D.Photorealism.Techniques.[RUS].[by.KiN_www.netz.ru]_9,75 MB.rar
f*p://195.135.232.80/Books/design/Bryce.5.Manual.[by.KiN_www.netz.ru_4.01MB].rar
f*p://195.135.232.80/Books/design/Corel.103.tutorials.RUS.[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Designing Secure Web-Based Applications for Windows 2000.zip
f*p://195.135.232.80/Books/design/DHTML.Weekend.Crash.Course[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Digital.Photography.Hacks.[by.KiN_www.netz.ru]_11,76.MB.rar
f*p://195.135.232.80/Books/design/How.To.Do.Everything.With.Illustrator.[by.KiN_www.netz.ru]_30,58.MB.rar
f*p://195.135.232.80/Books/design/How.To.Do.Everything.With.Photoshop.7.[by.KiN_www.netz.ru]_9,8 MB.rar
f*p://195.135.232.80/Books/design/How.To.Draw.Anime.Photoshop.Coloring.Tips.[by.KiN_www.netz.ru]_773 kB.rar
f*p://195.135.232.80/Books/design/How.To.Draw.Manga.Photoshop.Techniques.[by.KiN_www.netz.ru]_343 kB.rar
f*p://195.135.232.80/Books/design/How.To.Use.Adobe.Photoshop.7.[by.KiN_www.netz.ru]_14,66 MB.rar
f*p://195.135.232.80/Books/design/HTML.4.01.Weekend.Crash.Course[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/HTML.Complete.Course.[by.KiN_www.netz.ru]_26,79.MB.rar
f*p://195.135.232.80/Books/design/Learn.How.To.Draw.[by.KiN_www.netz.ru]_1,61.MB.rar
f*p://195.135.232.80/Books/design/Learn.HTML4.In.a.Weekend.[by.KiN_www.netz.ru]_11,02.MB.rar
f*p://195.135.232.80/Books/design/Learning.Macromedia.FlashMX.2004[658.kB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Macromedia.Dreamweaver.4.Bible[8,86.MB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Macromedia.Dreamweaver.MX.2004.Web.Application.Recipes[6,5.MB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Macromedia.Flash.MX.2004.ActionScript.Reference.Guide.rar
f*p://195.135.232.80/Books/design/Macromedia.Flash.MX.2004.Using.Components.rar
f*p://195.135.232.80/Books/design/Macromedia.Flashmx.Actionscript.Reference.Guide.2004[2,66.MB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Macromedia.Flashmx.Using.Components.2004[979.kB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Macromedia.Press.Macromedia.Dreamweaver.MX.Dynamic.Applications.[10.46.MB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/New.Riders.Photoshop.7.Power.Shortcuts.[by.KiN_www.netz.ru]_3,5 MB.rar
f*p://195.135.232.80/Books/design/NewRiders.MacromediaDreamweaverMx2004WebApplicationRecipes(6,5MB_www.netz.ru).rar f*p://195.135.232.80/Books/design/PhotoShop.&.Illustrator.Tutorial.[14.37.MB_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Photoshop.6.Bible.[13.95.MB_www.netz.ru].rar f*p://195.135.232.80/Books/design/Photoshop.75.tutorial.RUS.[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Photoshop.CS.Tips.and.Tricks.[by.KiN_www.netz.ru].rar
f*p://195.135.232.80/Books/design/Photoshop.Rus.4-18[6.5Mb,_www.netz.ru].rar
23 Ways To Speed WinXP, Not only Defrag

Since defragging the disk won't do much to improve Windows XP performance, here are 23
suggestions that will. Each can enhance the performance and reliability of your customers'
PCs. Best of all, most of them will cost you nothing.
1.) To decrease a system's boot time and increase system performance, use the money you
save by not buying defragmentation software -- the built-in Windows defragmenter works
just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive
with 8-MB cache buffer.

2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive
and easy upgrade that can dramatically improve system performance.

3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's
how to check: First, double-click the My Computer icon, right-click on the C: Drive,
then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from documents and
other files on the hard drive and creates a "searchable keyword index." As you can imagine,
this process can be quite taxing on any system.

The idea is that the user can search for a word, phrase, or property inside a document,
should they have hundreds or thousands of documents and not know the file name of the
document they want. Windows XP's built-in search functionality can still perform these
kinds of searches without the Indexing service. It just takes longer. The OS has to
open each file at the time of the request to help find what the user is looking for.

Most people never need this feature of search. Those who do are typically in a large
corporate environment where thousands of documents are located on at least one server.
But if you're a typical system builder, most of your clients are small and medium
businesses. And if your clients have no need for this search feature, I recommend
disabling it.

Here's how: First, double-click the My Computer icon. Next, right-click on the
C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this
disk for fast file searching." Next, apply changes to "C: subfolders and files,"
and click OK. If a warning or error message appears (such as "Access is denied"),
click the Ignore All button.

5.) Update the PC's video and motherboard chipset drivers. Also, update and configure
the BIOS. For more information on how to configure your BIOS properly, see this article
on my site.

6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch"
portions of data and applications that are used frequently. This makes processes appear
to load faster when called upon by the user. That's fine. But over time, the prefetch
folder may become overloaded with references to files and applications no longer in use.
When that happens, Windows XP is wasting time, and slowing system performance, by
pre-loading them. Nothing critical is in this folder, and the entire contents are
safe to delete.

7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon.
Then right-click on the C: drive and select Properties. Click the Disk Cleanup button
-- it's just to the right of the Capacity pie graph -- and delete all temporary files.

8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and
ensure that DMA is enabled for each drive you have connected to the Primary and Secondary
controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.

9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to
achieve these performance boosts have become more stringent. Be sure to use 80-wire
Ultra-133 cables on all of your IDE devices with the connectors properly assigned
to the matching Master/Slave/Motherboard sockets. A single device must be at the
end of the cable; connecting a single drive to the middle connector on a ribbon
cable will cause signaling problems. With Ultra DMA hard drives, these signaling
problems will prevent the drive from performing at its maximum potential. Also,
because these cables inherently support "cable select," the location of each
drive on the cable is important. For these reasons, the cable is designed so drive
positioning is explicitly clear.

10.) Remove all spyware from the computer. Use free programs such as AdAware by
Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure
to check for and download any updates before starting your search. Anything either
program finds can be safely removed. Any free software that requires spyware to run
will no longer function once the spyware portion has been removed; if your customer
really wants the program even though it contains spyware, simply reinstall it. For
more information on removing Spyware visit this Web Pro News page.

11.) Remove any unnecessary programs and/or items from Windows Startup routine using
the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and
click OK. Click the StartUp tab, then uncheck any items you don't want to start when
Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It
contains known system processes, applications, as well as spyware references and
explanations. Or quickly identify them by searching for the filenames using Google
or another Web search engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section
of the Control Panel.

13.) Turn off any and all unnecessary animations, and disable active desktop. In fact,
for optimal performance, turn off all animations. Windows XP offers many different
settings in this area. Here's how to do it: First click on the System icon in the Control
Panel. Next, click on the Advanced tab. Select the Settings button located under
Performance. Feel free to play around with the options offered here, as nothing you
can change will alter the reliability of the computer -- only its responsiveness.

14.) If your customer is an advanced user who is comfortable editing their registry,
try some of the performance registry tweaks offered at Tweak XP.

15.) Visit Microsoft's Windows update site regularly, and download all updates
labeled Critical. Download any optional updates at your discretion.

16.) Update the customer's anti-virus software on a weekly, even daily, basis.
Make sure they have only one anti-virus software package installed. Mixing anti-virus
software is a sure way to spell disaster for performance and reliability.

17.) Make sure the customer has fewer than 500 type fonts installed on their
computer. The more fonts they have, the slower the system will become. While
Windows XP handles fonts much more efficiently than did the previous versions of
Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.

18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently
on one large partition. The data is no safer on a separate partition, and a reformat is
never necessary to reinstall an operating system. The same excuses people offer for using
partitions apply to using a folder instead. For example, instead of putting all your data
on the D: drive, put it in a folder called "D drive." You'll achieve the same org
anizational
benefits that a separate partition offers, but without the degradation in system
performance. Also, your free space won't be limited by the size of the partition;
instead, it will be limited by the size of the entire hard drive. This means you won't
need to resize any partitions, ever. That task can be time-consuming and also can result
in lost data.

19.) Check the system's RAM to ensure it is operating properly. I recommend using a
free program called MemTest86. The download will make a bootable CD or diskette
(your choice), which will run 10 extensive tests on the PC's memory automatically
after you boot to the disk you created. Allow all tests to run until at least three
passes of the 10 tests are completed. If the program encounters any errors, turn off
and unplug the computer, remove a stick of memory (assuming you have more than one),
and run the test again. Remember, bad memory cannot be repaired, but only replaced.

20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for
updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed.
Best of all, it's free.

21.) Disable unnecessary services. Windows XP loads a lot of services that your
customer most likely does not need. To determine which services you can disable for your
client, visit the Black Viper site for Windows XP configurations.

22.) If you're sick of a single Windows Explorer window crashing and then taking the
rest of your OS down with it, then follow this tip: open My Computer, click on Tools,
then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows
in a separate process," and enable this option. You'll have to reboot your machine for
this option to take effect.

23.) At least once a year, open the computer's cases and blow out all the dust and
debris. While you're in there, check that all the fans are turning properly.
Also inspect the motherboard capacitors for bulging or leaks. For more information
on this leaking-capacitor phenomena, you can read numerous articles on my site.


Following any of these suggestions should result in noticeable improvements to the
performance and reliability of your customers' computers. If you still want to defrag
a disk, remember that the main benefit will be to make your data more retrievable in the
event of a crashed drive.
The Myth of the 2600Hz Detector
~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Just about everyone I talk to these days about ESS seems to be scared witless about the 2600Hz detector. I don't know who thought this one up, but it simply does not exist. So many of you people whine about this so-called phreak catching device for no reason. Someone with AT&T said they had it to catch phrea-kers. This was just to scare the Blue-Boxers enough to make them quit boxing free calls.
I'm not saying ESS is without its hang-ups, either. One thing that ESS can detect readily is the kick-back that the trunk circuitry sends back to the ESS machine when your little 2600Hz tone resets the toll trunk. After an ESS detects a kick-back it turns an M-F detector on and recordesany M-F tones X-mitted.
---------------------------------------
DEFEATING THE KICK-BACK DETECTOR
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

As mentioned in my previous
note, kick-back detection can be a
serious nuisance to anyone interested
in gaining control of a trunk line.
The easiest way to by-pass this
detection circuitry is not really by-passing
it at all, it is just letting the
kick-back get detected on some other line.
This other line is your local
MCI, SPRINT, or other long distance
carrier (except AT&T). The only
catch is that the service you use
must not disconnect the line when
you hit the 2600Hz tone.
This is how you do it: Call
up your local extender, put in the
code, and dial a number in the 601
area code and the 644 exchange.
Lots of other exchanges work across
the country, I'm sure, but this is
the only one that I have found so
far. Anyway, when it starts ringing,
simply hit 2600Hz and you'll hear the
kick-back, (ka-chirp, or whatever).
Then you are ready to dial whoever
you want (conferences, inward, route
and rate, overseas, etc.) from the
trunk line in operator tones!
Since blowing 2600Hz doesn't make you
you a phreaker until the toll equip-
ment resets the line, kickback
detection is the method AT&T chooses
(for now).
This information comes as a
result of my experiments & experience
and has been verified by local AT&T
employees I have as acquaintances.
They could only say that this is
true for my area, but were pretty
sure that the same idea is imple-
mented across the country.

=======================================

Now that you know how to access a trunk
line or as operators say a loop, I will
tell you the many things you can do
with it.

Here is a list of AT&T services acces-
sible to you by using a Blue Box.

A/C+101 Toll Switching
A/C+121 Inward operator
A/C+131 Information
A/C+141 Route & Rate op.
A/C+11501 Mobile operator
A/C+11521 Mobile operator



Starting Conferances:
---------------------

This is one the most useful attributes
of blue boxing. Now the confs. are up
24 hours/day and 7 days/week and the
billing lines are being billed.
Since I beleive the above is true
(about the billing lines being billed)
I would recommend that you never let
your # show up on the conf. if you
started it, put it on a loop and then
call the loop. ENOUGH BULLSHIT!!!!!
To start the conf. dial one of these
three numbers in M-F while you are on
the trunk.

213+080+XXXX
XXXX=1050,3050
special XXXX=1000,1100,1200,1500,2200,
2500.
These #s are in L.A. and are the
most watched, I do not advise using
this NPA.

312+001+1050 or 3050

914+042+1050 or 1100,1200 ect..


***************************************
UPDATE, I BELEIVE ONLY 914 WORKS AT THE
MOMENT
***************************************

Once connected with one of these you
will either hear a re-order, busy, or
cherp. When you hear the cherp enter
the billing line in M-F. I use the
conf. dial- up.
A billing line example:
kp312+001+1050st
You will then hear two tutes and a re-
cording asking you for the # of confer-
rees including yourself. Enter a #
between 20 and 30. If you ever get over
30 people on a conferance all you will
hear is jumbled voices. After the it
says "Your conferance size is XX" then
hit # sign. Add Your favorite loop on
and hit 6 to transfer control to it.
After it says control will be transfer-
ed hang up and call the other side of
the loop, hit #sign and follow the in-
structions. A bonus for conf. is to add
an international # dial 1+011+CC+NUMBER
pretty cool ehhh.
A few extra notes.
Do not add #s that you will want to
hang up, add these through MCI or
Sprint.

You cannot blow anyone off w/2600hz
unless they are in an old X-bar or
older system.

Many D.A. operators will stay on
after you abuse them; you may have
to start another or at least don't
say any numbers.

Never add the tone side of a loop
onto a conf.

Never add more than one MCI node on
your conf.


Route & Rate:
-------------


Note Route & Rate and RQS perform the
same service.

R&R simply tells you route and rate info which is very valuble, ex.
such as the inward routing for an ex-
change in an area code. An inward
routing will let you call her and she
can do an emergency interupt for you.
She can tell you how to get interna-
tional operators, ect.

Here are the terms you are required to
use:

International,
-operator route
for [country, city].
*Gives you inward op.
-directory route
for [country, city].
*Gives you Directory Ass.
-city route
for [country, city].
*Gives you country and city
code.

Operator route for [A/C]+
[EXCHANGE]
*Gives you inward op. route
ex. [A/C]+ or [A/C]+0XX+
when she says plus she means
plus 121.
Numbers route for [state, city]
*Gives you A/C.

Place name [A/C]+[EXCHANGE]
*Gives you city/state for that
A/C and exchange.



International calls:
--------------------


To call international over cable simply
access a trunk and dial kp011XXXst
wait for sender tone, kpXXXCC-NUMBERst

XXX - A 3 digit country code, it may
not be 3 digits so just put 1 or 2 0's
in front of it.
CC - is the city code

To go by satellite:
dial kp18Xst X - numbers 2-8
wait for sender tone then
kpXXXCCNUMBERst


---------------------------------------

Fedex will put out a file on RQS soon.

Written by: Scarface
&
Zardoz

DISTRIBUTED THROUGH THE PIRATE CLUB/1200
CALL THE PIRATE CLUB/1200 AE LINE: 814-234-1667 PW: SWITCH 300/1200 BAUD
CALL INFINITY'S EDGE: 814-237-0216 300/1200 BAUD

CRACKER JACK
THE PIRATE CLUB/1200
THE CONNECTION I/O
DOS BUSTERS
UNDERSTANDING THE TELEPHONE SYSTEM

FROM "UNDERSTANDING COMMUNICATIONS SYSTEMS" CHAPTER 6

BY DON L. CANNON

AND

GERARD LUECKE

TEXAS INSTRUMENTS PUBLISHING, 1984
--------------------------------------------------------------------------------
IN THE TELEPHONE SYSTEM, THE TWO-YWA COMMUNICATION IS CARRIED BY EITHER A
TWO-WIRE OR A FOUR-WIRE SYSTEM. IN THE FOUR-WIRE SYSTEM ON PAIR OF WIRES IS
CONNECTED FROM THE TRANSMITTER AT TELEPHONE A TO THE RECEIVER AT TELEPHONE B,
AND THE OTHER PAIR OF WIRES IS CNNECTED FORM THE TRANSMITTER AT TELEPHONE B TO
THE RECEIVER AT TELEPHONE A. IN THE TWO-WIRERE SYSTEM, WHICH USES ONE-HALF OF
THE WIRING OF THE FOUR-WIRE SYSTEM AND THEREFORE IS LESS COSTLY, BOTH
TRANSMITTER AND RECEIVERS AT TELEPHONES A AND B SHARE THE SAME PAIR OF WIRES FOR
THE TWO-WAY COMMUNICATION. THE POWER FOR THE COMMUNICATION IS PROVIDED BY A
BATTERY (OR AN APPROPRIATE POWER SOURCE WITH BATTERY BACKUP). THE BATTERY IS
USUALLY PROVIDED AT THE CENTRAL OFFICE IN COMMERCIAL TELEPHONE NETWORKS, THOUGH
IT CAN BE PROVIDED AT THE TRANSMITTER IN A PRIVATE OR SPECIAL PURPOSE FOUR-WIRE
SYSTEM.

THE TRANSMISSION LINKS IN MODERN TELEPHONE SYSTEMS MAY TAKE SEVERAL
DIFFERENT FORMS, SUCH AS OVERHEAD WIRE, BURIED CABLE, MICROWAVE LINKS, SATELLITE
LINKS, AND SO ON. WHICH OPTION IS USED FOR A GIVEN COMMUNICATION DEPENDS
LAREGELY ON WHERE A AND B ARE LOCATED. IF A AND B ARE LOCATED CLOSE TO EACH
OTHER, THE INFORMATION WILL BE CARRIED OVER WIRES ON TELEPHONE POLES OR IN
OVERHEAD OR UNDERGROUND CABLES. IF A AND B ARE LOCATED ON THE SAME LAND MASS BUT
A LARGE DISTANCE APART, THE INFORMATION COULD BE TRANSMITTED OVER TELEPHONE
LINES, CABLES, MICROWAVE LINKS, OR EVEN SATELLITE LINKS). IF A AND B ARE
SEPARATED BY AN OCEAN, THE TRANSMISSION MUST BE THROUGH TRANSOCEANIC CABLE,
RADIO, OR SATELLITE LINKS, SINCE THESE ARE THE ONLY FEASIBLE WAYS TO GET
INFORMATION FROM ONE CONTINENT TO ANOTHER. WHICHEVER APPROACH IS USED, A MEANS
MUST BE PROVIDED FOR SELECTING THE PROPER PATHS OVER WHICH THE INFORMATION IS TO
TRAVEL. THIS REQUIRES SOME WAY TO CONNECT CIRCUITS THROUGH SWITCHES CALLED
NETWORK SWITCHING.


NETWORK SWITCHING
-----------------

THE NETWORK SWITCHING PROCESS IDENTIFIES THE ORIGINATOR AND RECIPIENT OF A
TELEPHONE CALL AND ROUTES THE CALL THROUGH SUITABLE TRANSMISSION LINKS TO ITS
DESTINATION. REQUIREMENTS: EACH TELEPHONE IN THE SYSTEM MUST BE ASSIGNED A
NUMBER TO INDICATE ITS LOCATION IN THE SYSTEM. THE SWITCHING NETWORK MUST
RECOGNIZE WHICH TELEPHONE IS INITIATING THE CALL AND WHICH TELEPHONE IS TO
RECEIVE THE CALL. FROM THIS INFORMATION, IT MUST SET UP THE CIRCUIT CONNECTIONS
FOR A SIGNAL PATH THAT WILL SEND THE INFORMATION FROM THE SENDING (CALLING)
TELEPHONE TO THE RECEIVING (CALLED) TELEPHONE. IN COMMERCIAL TELEPHONE SYSTEMS A
SEVEN DIGIT NUMBER IS SUFFICIENT TO LOCATE INDIVIDUAL TELEPHONES WITHIN A
METROPOLITAN AREA. DIGITS SPECIFY WHICH CENTRAL OFFICE SUPPLIES THE POWER TO THE
TELEPHONES THAT ARE TO BE CONNECTED AND THE LAST FOUR DIGITS DETERMINE WHICH
TELEPHONE OF A POSSIBLE 10,000 TELEPHONES IS CALLING OR IS BEING CALLED. THE
CENTRAL OFFICE RECOGNIZES WHICH TELEPHONE IS CALLING (INITIATING THE CALL) WHEN
THE TELEPHONE IS REMOVED FROM ITS HOOK OR CRADLE. IT RECOGNIZES WHICH TELEPHONE
IS CALLED BY THE NUMBER THAT IS DIALED BY THE CALLING TELEPHONE. IF THE CALL IS
TO A TELEPHONE OUTSIDE THE METROPOLITAN AREA, AN ADDITIONAL THREE DIGITS ARE
USED TO DEFINE THE AREA CODE OR LOCATION OF THE CALLED METROPOLITAN AREA. THIS
WOULD THEN BE A LONG DISTANCE CALL.

IF CENTRAL OFFICE A HAS AN EXCHANGE CODE OF 123 AND CENTRAL OFFICE B HAS AN
EXCHANGE CODE OF 456, THEN A CALL FROM TELEPONE NUMBER 123-0001 TO NUMBER
123-0003 WOULD REQUIRE A CIRCUIT CONNECTED BY THE SWITCHED PATH. IF ON THE OTHER
HAND THE TELEPHONE AT 123-0001 IS CALLING THE TELEPHONE NUMBER 456-0002, THE
SWITCHING NETWORK WOULD HAVE TO SET UP A DIFFEREENT SWITCHED CIRCUIT PATH. THE
NETWORK MUST PROVIDE THE SWITCHING CIRCUITRY ALLOWING FOR THE POSSIBILITY OF
MANY CALLS OCCURRING AT THE SAME TIME WITHIN A CENTRAL OFFICE AND BETWEEN
CENTRAL OFFICES. THUS, MANY PARALLEL SWITCH PATHS MUST BE AVAILABLE.
FURTHERMORE, THE NETWORK ALSO PROVIDES DETECTION CIRCUITS FOR ALL OF THE
SIGNALLING WHICH DETERMINES THE CALLING AND CALLED TELEPHONES AND ALL OF THE
LINE CHECKING REQUIRED TO ESTABLISH THA THE LINES AND TELEPHONES ARE CLEAR TO
COMPLETE THE COMMUNICATION. THESE SIGNALLING REQUIREMENTS DEPEND ON THE
CHARACTERISTICS OF EACH TELEPHONE SET AND ON THE SIGNALLING SEQUENCE REQUIRED TO
MAKE A TELEPHONE CALL.


THE HANDSET
-----------

THE TELEPHONE HANDSET CONTAINS A MICROPHONE, A SPEAKER, SWITCH CONNECTIONS
TO THE TELEPHONE SYSTEM, RINGING CIRCUITRY, AND A DIAL NETWORK. THE INSTRUMENT
USED FOR TALKING INTO AND LISTENING WILL BE CALLED THE SUBSET. IT CONTAINS THE
MICROPHONE AND THE SPEAKER. WHEN THE TELEPHONE IS NOT IN USE THE SUBSET RESTS ON
THE CRADLE WHICH OPENS THE SWITCHES DENOTED SH (FOR SWITCH HOOK). THESE
SWITCHES DISCONNECT THE TELEPHONE SUBSET FROM THE TELEPHONE SYSTEM. HOWEVER,
THERE IS A CIRCUIT CONNECTION THAT IS MAINTAINED TO THE HANDSET. AN
ELECTROMAGNET CALLED THE RINGER SOLENOID IS CONNECTED TO THE TELEPHONE LINE
WIRES ON THE CENTRAL OFFICE SIDE OF THE SH SWITCH SO THAT THE CENTRAL OFFICE CAN
RING THE TELEPHONE WITH AN AC SIGNAL WHEN IT IS CALLED. THE TELEPHONE WIRES ARE
DENOTED AS THE T AND R LINES, FOR THE TERMS TIP AND RING, WHICH WERE RELATED TO
PLUG CONNECTIONS USED IN THE ORIGINAL MANUAL (OPERATOR CONTROLLED) SWITCHING
CENTRAL OFFICES OR EXCHANGES.

WITH THE SUBSET IN THE CRADLE (OR HANGING TELEPHONES MAY BE ON A HOOK -
THUS THE NAME SWITCH HOOK) NO DC CURRENT FLOWS FROM THE CENTRAL OFFICE 48-VOLT
TALKING BATTERY THROUGH THE T-R LOOP OR THRU THE RING SOLENOID LOOP BECAUSE OF
CAPACITOR C. THE CENTRAL OFFICE MONITORS THE DC CURRENT TO DETERMINE IF THE
PHONE IS IDLE OR BUSY OR IS INITIATING A CALL. THE CENTRAL OFFICE CONTROLS THE
SIGNALS THAT CAN BE DELIVERED TO A HANDSET THROUGH THE SWITCHES S1, S2, AND S3.
WITH THE PHONE ON THE HOOK, SH IS OPEN AND ONLY THE RINGER CIRCUIT CAN FUNCTION.


RINGING A CALLED TELEPHONE
--------------------------

THE RINGING SIGNAL IS A 20-47 HZ AC SIGNAL FROM THE CENTRAL OFFICE. PICKING
UP THE HANDSET LETS DC CURRENT FLOW IN THE TALKING CIRCUIT, STOPS THE RING, AND
CONNECTS THE REECEIVING TELEPHONE TO THE CALLING TELEPHONE.

THE SIGNALS THAT CAN BE SENT ARE:

SIGNAL TONE INTERRUPT RATE FREQUENCIES (HERTZ)
----------- -------------- -------------------

DIAL NONE 480

RINGING NONE 440 MODULATED WITH 480

BUSY 60 (CALLED LINE) 480 MODULATED WITH 620

30 (TOLL LINE)

120 (INTRA-OFFICE)



ASSUME THAT THE TELEPHONE IS IDLE - THE SUBSET IS ON THE CRADLE OR ON THE
HOOK. IT IS READY AND WAITING TO RECEIVE AN INCOMING CALL AS INDICATED BY THE
LACK OF DC CURRENT FLOW IN ITS T AND R LINES. IF THIS TELEPHONE HAS BEEN
SELECTED BY THE CENTRAL OFFICE TO RECEIVE A CALL, S2 WILL BE THROWN TO CONNECT
THE RINGING SIGNAL TO THE T AND R LINES THROUGH THE TRANSFORMER TC. THE 110 VOLT
AC SIGNAL FO 20 TO 47 HERTZ WILL CAUSE THE RINGER SOLENOID TO SOUND THE FAMILIAR
TELEPHONE RING AT THE HANDSET. THIS RINGING WILL CONTINUE UNTIL THE CALLER HANGS
UP OR UNTIL THE TELEPHONE IS ANSWERED BY LIFTIG THE SUBSET OFF THE SWITCH HOOK.
SUCH ACTION WILL CAUSE DC CURRENT TO FLOW IN THE T-R LOOP THROUGH THE SUBSET.
THE CENTRAL OFFICE CIRCUITRY WILL DETECT THE DC CURRENT FLOW AND REMOVE THE
RINGING SIGNAL BY OPENING S2. IT ALSO WILL THROW SWITCH S3 TO CONNECT THE SET TO
THE CALLING TRANSMISSION PATH.


ANSWERING THE TELEPHONE
-----------------------

AS THE SPEAKER TALKS INTO THE SUBSET TO ANSWER THE PHONE, THE MICROPHONE OF
THE HANDSET CAUSES THE CURRENT IN THE T-R LOOP TO VARY TO PRODUCE ELECTRICAL
SIGNALS THAT CORRESPOND TO THE PATTERN OF THE SPEECH WAVEFORM. THE T-R LOOP
CURRENT THROUGH THE MATCHING TRANSFORMER TS AND THE PRIMARY OF THE TRANSFORMER
TC PRODUCES THE SPEECH SIGNALS IN THE SECONDARY CIRCUIT OF THE TRANSFORMER TC.
THE SECONDARY OF THE TRANSFORMER TC IS CONNECTED TO THE CALLING TELEPHONE
THROUGH THE CIRCUIT PATH FORMED BY THE CLOSING OF SWITCH S3 AND NETWORK
SWITCHING CIRCUITS IN THE CENTRAL OFFICE.

THE DIRECTION OF THE INFORMATON FLOW THROUGH THE TRANSFORMERS ALTERNATES AS
ONE PERSON SPEAKS, THEN THE OTHER.

NOW IF THE HANDSET IS CONSIDERED TO BE THE CALLING HANDSET, AFTER THE
PERSON CALLING HAS DIALED AND THE CALLED TELEPHONE OWNER HAS LIFTED THE SUBSET
AND SPOKEN INTO IT TO ANSWER THE TELEPHONE (AS DISCUSSED ABOVE), THE ELECTRICAL
SIGNALS REPRESENTING THE SPOKEN WORD ARE NOW THE INPUT SIGNAL TO THE TRANSFORMER
TC THROUGH TTHE CLOSED SWITCH S3. THE S3 SIDE OF THE TRANSFORMER IS NOW THE
PRIMARY AND THE T-R LOOP SIDE IS THE SECONDARY. THE CURREENT IN THE PRIMARY
PRODUCED BYTHE SPEECH SIGNALS INDUCE A CURRENT IN THE SECONDARY WHICH EXCITES
THE SPEAKER OF THE HANDSET THROUGH THE MATCHING TRANSFORMER TS AND REPRODUCES
THE SPOKEN WORD OF THE PERSON ANSWERING THE CALLED TELEPHONE IN THE EAR OF THE
PERSON AT THE CALLING TELEPHONE. AS EACH PERSON SPEAKS AT EITHER THE CALLED OR
CALLING TELEPHONE, THE SPOKEN WORD IS REPRODUCED FROM TRANSMITTER TO RECEIVER
THROUGH THE COMPLETED COMMUNICATIONS CIRCUIT. THE SYSTEM REPRODUCES THE SPOKEN
WORD IN BOTH DIRECTIONS THROUGH THE SAME CIRCUIT.

WHENEVER A PERSON SPEAKS INTO THE MICROPHONE OF THE HANDSET THEY ALSO HEAR
THEIR SPOKEN WORDS IN THE SPEAKER OF THE SAME HADNSET. THE MATCHING TRANSFORMER
TS DETERMINES THE CORRECT SIGNAL LEVEL FOR THIS SIGNAL AS WELL AS THE CORREECT
SIGNAL LEVEL FOR THE SIGNAL RECEIVED FROM THE SENDING TELEPHONE.

DURING THE ABOVE DESCRIBED SEQUENCE THE DIALER SUB-CIRCUIT IS NOT USED, THE
TONE SIGNALLING CIRCUIT IS NOT USED, AND SWITCH S1 REMAINS OPEN.


INITIATING A CALL
-----------------

BOTH THE DIAL NETWORK AND THE TONE SIGNAL GENERATORS ARE NEEDED TO PROVIDE
THE PROPER BASIC SIGNALLING TONES BETWEEN THE CALLING TELEPHONE AND THE CENTRAL
OFFICE. WHEN THE CALLER LIFTS THE SUBSET OFF THE CRADLE, DC CURRENT FLOWS IN THE
T-R LOOP. THIS IS SENSED BY THE CENTRAL OFFICE AND INDICATES THAT A CALL HAS
BEEN INITIATED. THE CENTRAL OFFICE LOCATES THE LINE INITIATING THE CALL AND
PLACES A SELECTED TONE SIGNAL GENERATOR OUTPUT OF 480 HERTZ ON THE T-R LINE BY
CLOSING SWITCH S1 AND PRODUCING A CURREENT INT HE PRIMARY OF TRANSFORMER TC.
THIS PRODUCES A DIAL TONE IN THE CALLING HADNSET'S SPEAKER. SWITCHES S2 AND S3
ARE OPEN (S2 WILL REMAIN OPEN, SINCE NO RINGING CURRENT WILL BE DELIVERED TO THE
CALLING TELEPHONE). WHEN THE CALLER HEARS THE DIAL TONE, THE NUMBER OF THE
TELEPHONE TO BE CALLED WILL BE INDICATED AS AN ELECTRICAL SIGNAL BY A ROTARY
DIAL CONTAINING SWITCH CONTACTS THAT OPENA ND CLOSE OR BY PRESSING TONE DIALING
PUSHBUTTONS. THE DIAL TONE WILL BE INTERRUPTED WHEN THE FIRST DIGIT IS DIALED
WITH A MECHANICAL DIALER. IN THE CASE OF THE TONE DIALING SYSTEM IT WILL BE
REPLACED WITH THE TONE OF THE BUTTON PUSHED.


MECHANICAL DIALER
-----------------

IF A MECHANICAL DIALER (PULSE) IS USED, THE DIAL WILL BE ROTATED ACCORDING
TO THE DIGIT REQUIREED AND ALLOWED TO ROTATE BACK TO ITS REST POSITION. AS IT
DOES IT WILL INTERRUPT THE DC CURRENT IN THE T-R LINES TO CAUSE A NUMBER OF
PULSES EQUAL TO THE NUMBER DIALED. THE DIAL IS MECHANICALLY DESIGNED TO PROVIDE
10 PULSES PER SECOND. THE SPEAKER IS USUALLY DISCONNECTED BY THE DIAL NETWORK TO
KEEP FROM SOUNDING THE DIALING CLICKS. THE CENTRAL OFFICE CIRCUITS RECEIVE THE
PULSES AND DETECT THE SEQUENCE OF NUMBERS DIALED AND STORES THEM. THEY USE THESE
NUMBERS TO LOCATE THE CALLED TELEPHONE AND TO SET UP AN AVAILABLE TRANSMISSION
PATH BETWEEN THE TWO STATIONS. WHEN THE CALLED TELEPHONE IS LOCATED, THE CENTRAL
OFFICE CHECKS THE ON-HOOK STATUS OF THE CALLED TELEPHONE, AND RINGS IT IF THE
TELEPHONE IS ON-HOOK (IDLE). IT ALSO PLACES A RINGING TONE THROUGHT H CLOSED S1
SWITCHES (S2 AND S3 ARE STILL OPEN) ON THE LINE SO IT IS HEARD AT THE CALLING
TELEPHONE. THIS RINGING TONE IS DEVELOPED BY MODULATING A 440-HERTZ SINUSOID
WITH A 480-HERTZ SINUSOID. THIS RESULTS IN A 920-HERTZ TONE INCREASED AND
DECREASED IN INTENSITY AT A 40-HERTZ RATE. THE RINGING TONE CONTINUES UNTIL
EITHE THE CALLED TELEPHONE ANSWERS OR THE CALLING TELEPONE HANGS UP. IF THE
CALLED TELEPHONE ANSWERS, THE CENTRAL OFFICE CIRCUITS REMOVE THE RINGING CURRENT
FORM THE CALLED SET, THE RINGING TONE FROM THE CALLING SET AND COMPLETES THE
TRANSMISSION PATH BY CLOSING THE SWITCHES S3.


BUSY TELEPHONE
--------------

IF THE CALLED TELEPHONE IS BUSY (OFF-HOOK) THE TONE GENERATOR WILL SOUND
ONE OF THREE POSSIBLE BUSY SIGNALS TO THE CALLING TELEPHONE. THE BUSY TONE IS A
140-HERTZ TONE GENERATED BY MODULATING A 480-HERTZ SINUSOID WITH A 620-HERTZ
SINUSOID AND FILTERING OUT THE 1100-HERTZ SIGNAL (WHEN ONE SINEWAVE MODULATES
ANOTHER, BOTH THE SUM AND DIFFERENCE FREQUENCY SINE WAVE SIGNALS RESULT). THIS
TONE IS INTERRUPTED AT A RATE THAT INDICATES THE REASON FOR THE BUSY SIGNAL. A
SIGNAL INTERRUPTED AT THE RATE OF 60 TIMES PER IMNUTE INDICATES THE CALLED LINE
WAS BUSY. IF THE INTERRUPT RATE IS 1/2 OF THIS, THE TOLL LINE BETWEEN THE
CENTRAL OFFICES WAS BUSY (FULL OF EXISTING CALLS.) IF THE INTERRUPT RATE IS
DOUBLED TO 120 TIMES PER IMIUTE IT IMPLIES THAT ALL INTRA-OFFICE PATHS ARE BUSY.
ONLY WITH THE 60 INTERRUPTS/MINUTE IS THE CALLER SURE THAT THE CALLED PARTY LINE
IS BUSY.


TONE DIALING
------------

WHEN THE HANDSET IS A TOUCH-TONE SERVICE TELEPHONE, THEN THE DIAL NETWORK
IS MORE THAN JUST SWITCHES. IT CONTAINS TONE GENERATING CIRCUITS AS WELL. WHEN
THE TONE DIALING TELEPHONE IS USED, THE TONE KEY OR PAD CAUSES A SIGNAL OF TWO
FREQUENCIES TO BE PLACED ON THE LINE. THE FREQUENCIES AREE INDICATED BY THE
INTERSECTION OF THE FREQUENCY LINES IN THE TONE MATRIX OF THE FOLLOWING DIAGRAM:

697--------1-------2-------3-------!
! ! ! !
! ! ! !
! ! ! !
770--------4-------5-------6-------!
! ! ! !
! ! ! !
! ! ! !
852--------7-------8-------9-------!
! ! ! !
! ! ! !
! ! ! !
941--------*-------0-------#-------!
! ! ! !
! ! ! !
! ! ! !
1209 1336 1477 1633


FOR EXAMPLE, PRESSING THE 5 KEY CAUSES A 770-HERTZ AND A 1336-HERTZ TONE TO
BE SENT TO THE CENTRAL OFFICE (AND TO THE CALLED PARTY IF THE BUTTON IS PUSHED
DURING A CONVERSATION). CENTRAL OFFICE CIRCUITS THAT DETECT AND DECODE THE TONES
SET UP THE SWITCHING FOR THE COMMUNICATAONS PATH JUST AS FOR THE MECHANICAL
DIALER. THE USE OF SUCH TONES SPEEDS UP THE DIALING OPERATION AND ALLOWS COMMAND
AND CONTROL INFORMATION TO BE SENT TO THE CALLED LOCATION.


BANDWIDTH
---------

THE FREQUENCIES OF THE TONES GENERATED BY THE TONE KEYS AS WELL AS THE
CONVERSATTQIONS OF THE TELEPHONE USERS MUST BE WITHIN THE BANDPASS CAPABILITIES
OF THE TELEPHONE SYSTEM. THE BANDWIDTH OF A CHANNEL IN A TYPICAL TELEPHONE
SYSTEM USED FOR CONVERSATIONS IS 4 KILOHERTZ. THE BANDPASS REGION ALLOWED FOR
THE VOICE SIGNALS IS 200 HERTZ TO 3400 HERTZ. THE TONE DIALING SIGNALS FITS INTO
THIS RANGE AS DO SOME SPECIAL CONTROL SIGNALS AT 2400 AND 2600 HERTZ. OTHER
CONTROL SIGNALS FORM 3400 TO 3700 HERTZ FIT INTO THE OVERALL 4 KILOHERTZ
BANDWIDTH OF THE TELEPHONE CHANNEL. THIS VOICE CHANNEL BANDWIDTH WILL BE AN
IMPORTANT SYSTEM PARAMETER THROUGHOUT THIS CHAPTER. THE OTHER IMPORTANT
PARAMETERS OF THE VOICE CHANNEL ARE THE SIGNALLING TONES AND THE DC CURRENTS
THAT ARE USED BY THE SWITCHING AND CONTROL CIRCUITS OF THE CENTRAL OFFICES TO
ESTABLISH THE COMMUNICATIONS PATHS BETWEEN MANY PAIRS OF TELEPHONES OVER A
WORLDWIDE NETWORK. UNDERSTANDING THE BASIC CONCEPTS OF THE CENTRAL OFFICE
CIRCUITS WILL HELP TO FURTHER UNDERSTAND THE TELEPHONE COMMUNICATIONS SYSTEMS.

(CONTINUED IN PART II)
--------------------------------------------------------------------------------
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-
THE CONVENT TEXTFILES BBS 619-475-6187 10 MEGS 3/1200 BAUD NO PASS
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-
--------------------------------------------------------------------------------
Your Ad Here