tekball

home of latest tips and tricks for computer,mobie and internet.free sofwares,games,books,tutorials,downloads and much more....

SEARCH TEKBALL

Loading

Friday, February 11, 2011

all about key loggers



A keylogger sometimes called a spying software is a small program which is used to monitor a local or a Remote PC, Keyloggers now a days are so easy to use that a person with even a basic knowledge of computers can use keylogger.Once a keylogger is installed in your computer it can monitor each and every keystroke typed on your computer, thus you can see how dangerous a keylogger can be.
Types of Keylogger

There are two types of Keyloggers:

1.Hardware keylogger
2.Software keylogger

Hardware keyloggers are rarely used now a days since you can monitor a Remote computer, Software keyloggers are the most widely used keyloggers as some of them support remote installaiton which means that you can monitor any computer anywhere in the World.


Can the victim detect it's presence once keylogger is installed in his/her computer?

Well it's really difficult for the victim to detect keylogger's presence as it runs in complete stealth mode, It hides it self from task manager, startup etc

Can I the victim trace you back?

Once the keylogger is installed, I think it's almost impossible for the victim to trace you back

How can I protect my self from keylogger?

A simple keylogger can be detected by even a lame antivirus, but sometimes the attacker can use methods like Crypting,Binding,Hexing etc, that make it harder for the Antivirus to detect the keylogger. So to counter that you should use a piece of software called sandboxie, Sandboxie runs the choosen computer program in an Isolated space so if the file you receive is a keylogger, You need no to worry because it won't affect your other programs, Firefox users can use the free version of keyscrambler which encrypts each and every keystrokes you type, so even if a keylogger is installed in your computer, You need not to worry as the attacker will receive the encrypted keystroke


Which Keylogger is the best?

With my experience of more than 4 years in the field of Ethical Hacking and security I suggest only two keyloggers which I think are best and have a comparatively low antivirus detection rate:

1.Sniperspy
2.Winspy


How do I find if a file is binded with a keylogger?

Keylogger can be binded with almost any file so how do you know if the file is binded?, You can use Bintext or Hex editor to find out, But Bintext and Hex editing method do not work effectively if the server is crypted so alternatively there is a great piece of software named asas "Resource hacker" that can tell you if the file is binded or not

Hope you had enjoyed reading the article.If you have any questions feel free to ask.

download hackin9 magazine for free

Hackin9 magazine is one of the popular online E-magazine available online, Hackin9 magazine contains information related to latest malware and latest vulnerabilities on the web. This month's issue is related to "Network Security" where the magazine talks about network security and hacking and latest threats related to network.





Here is the list of topics available in Hackin9 Magazine:


  • Free Issue (02/2011) to Download!
  • Wuala – Secure Online Storage
  • A Beginners Guide to Ethical Hacking
  • A Security System That Changed The World
  • Get in through the backdoor: Post exploitation with Armitage
  • Breaking The Code: Brute Forcing The Encryption Key
  • Is Data Secure on the Password Protected Blackberry Device?
  • Examine your Network With Nmap What is network Scanning?
  • Network Security – Data Breaches
  • What is Good Enough Coverage?
  • Exploring GCIH certification for fun and employability
  • Certification Smart?
You can Download Hackin9 Magazine here

web server hacking techniques



Lots of people know use, configure and manage their webservers but only few of them really know how to protect their web server from getting hacked i.e making it hack proof. Today lots of websites are hosted on a dedicated web servers so it's extremely important to make your web server hack proof in order to prevent any theft and data loss, Before I mention techniques used by hackers to compromise a web server and how you can protect your web server you should know what a web server is and how it works.
What is a webserver?

Basically a webserver is a single computer or more used to host websites, For a website to be available to every one (connected to internet) 24/7 it needs to be hosted on a webserver

How webservers work?

Webservers work in a simple manner, When ever you are using browser to surf any page your browser will request that particular page from the webserver and the server sends back the requested page.



The above picture illustrates how a webserver works.

How Are Webservers Compromised Or hacked?

There are multiple reasons why a webserver gets compromised or hacked, one of the major reason is installing the webserver with default and lack of updates and weak passwords. Once the server is compromised the hacker can use it to do malicious things online. For Example Hacked webservers can be used to as zombies to for performing a more powerful DDOS attack



Webserver Hacking Techniques

Below mentioned are some of the techniques which can be used by malicious hackers to compromise a webserver.

Orthodox Password Cracking Techniques

1. A hacker can use variety of password Cracking Techniques such as Brute force, Dictionary attacks and rainbow tables to crack weak administrator account passwords, However these attacks create huge logs of presence, so therefore smarter hackers either use a proxy or any other iP hiding method or they use already compromised systems to perform the attack.

2. Man In The Middle Attack

A hacker can also perform a man in the middle attack also known as ARP poisoning to steal credentials of administrator account.

3.  Keyloggers And Trojans

If A hacker can manage to install a trojan or a keylogger on administrator's computer then, the malicious hacker can easily capture the credentials

4. DNS Cache Poisoning Attack

If a hacker can manage to insert fake address records for a domain name into DNS server and can make the webserver accept the fake address record then the hacker or intruder can easily control your browser, This attack is extremely dangerous as it happens without the users knowledge, The topic is quite big and is not possible to explain it here, depending upon readers response I might make a seprate tutorial on this attack

There are many other techniques used by hackers such as Ftp server intrusion, social engineering, exploiting web application bugs which are probably to be explained in the upcoming posts at rha.

Hope you have enjoyed reading the post and have probably got some idea how hackers can attack your web server, In the next post I will continue the series and will introduce some methods you can use to protect your webserver from getting compromised.

Tuesday, February 8, 2011

Extreme Overclocking: Getting Your Celeron to Run at 8.20 GHz



Disappointed at the slow speeds of your old Intel processor? An overclocker at XtremeLabs.org reports getting the clock speed of a 3.06GHz Celeron processor up to a blistering 8.20GHz, setting a new world record in the process.
The forum post at XtremeLabs (in Russian) shows how an overclocker with the moniker of "TiN" went about speeding up this chip: TiN heated the processor so that it separated from the integrated heat spreader and could then be placed into a modded DFI Lanparty UT P35-T2R motherboard. TiN then cooled the whole setup with liquid nitrogen to keep the chip from achieving combustion.

The overclocking setup. Image credit: TiN on XtremeLabs.org
Faster than the previous world record by 16.8MHz, this overclock of almost three times the original speed managed to run without melting the processor. Despite the detailed post and photos, TiN didn't show any benchmarks for the Celeron, so we won't know how it does against newer members of the Intel lineup until TiN demonstrates the capabilities of the 8.20 GHz processor.
Even if the hacked Celeron falls short of the performance of more recent chips, this remains an impressive feat: TiN, my hat's off to you!
[Via Hexus and Tom's Hardware.]

Some Tips for Web Page Headers

Are you a current business owner who has asked the question, "How do I get my website on the first page of Google and the major search engines?" Most business owners don't know that traditional media ad spending is down across the board. Television advertising, radio, newspaper and magazines are down an average of approximately 13% in 2009.

Implementing relative meta-tags in your website makes sure that it will increase effectiveness of your search engine optimization campaign. On which you are investing lots of time and money. You can pick up any of your webpage and click on 'View' button at the top of the browser screen and select 'Page Source' it will show title tag at the top of the page.

Does your website have an actual contact form? There are a lot of websites that have just a mailto web link for users to contact the company. The problem with this is that you are reliant on the user having their own mail client installed and you cannot specify what information you want to collect. If you have a prope
contact form on your contact us page you can specify what information you want to collect e.g. name, phone number, email address, website etc.

On-page optimization is the process of structuring or changing the elements on your webpage so that it can be found by search engines for specific keyword(s). The on-page elements or factors that you need to change in order to improve your website's positions in search engines include title Tag, header tags, page content, alt tag, meta description tag and meta keywords tag.

It allows anyone from any experience level, from a complete beginner with no website technical skills to those who are familiar with website building. For the users who already know how to build sites using all kinds of coding and language and scripts, this will make it much easier for them too. You can start producing websites that look as professional as the big name companies and you can do it by yourself and do it fast.

If you were working with a company that creates designer flip-flops that are embellished with crystals, symbols, jewelry and other decorative items. When you first start their keyword project, the first two keywords that the company will give you is: flip-flops and sandals. You can easily find that there is great search volume and much lighter competition around more specific search terms such as: embellished flip flops, crystal flip-slops, rhinestone flip-flops, decorated flip-flops etc.

Depending on how your templates are created, you can save Huge amounts of time by allowing the template or web editing software to perform repetitive tasks vs. you making them all on your own. A couple of examples might be your website's header, footer or common menu system. Let' say if each page of your website includes these common items, then you could save great time by having all of the pages call a "single file" that simply contains all of the requisite information for each respective section.

A favicon is basically an image that distinguishes a website/company from others. What's the first thing that comes to your mind when you see image of the
latter G with red,green, blue and yellow colors?... Google of course! You see how easy it is to advertise and embed your brand in people's mind. That's the power of favicon. Simply put, a favicon for your blog or website, is another way to make "you brand" (your website/blog), easily recognizable.

Designing Your Site to Be Search Engine Friendly. Creating a site that is search engine friendly should be an objective of every company that wants to do business on the Internet. Search engines are the most common way for Internet surfers to search for something on the Net. In fact, 85 percent of all people who use the Internet use search engines as their primary way to look for information. By using keywords relating to your company in appropriate places on your site, you can improve how search engines rank you.

Boost Your Web Site with Social Bookmarking

There is a lot of talk about social bookmarking when it comes to research engine optimization, and it's sometimes hard to see via the haze of marketing towards the true facts.

Basically, interpersonal book marking services go to websites for example Digg, Stumbleupon, Reddit, Delicious and create hyperlinks to your website, tag it and share it with the world.

 This can assist drive visitors to your website in two methods. First, if you have a novel or fascinating site, people will normally be drawn to it and follow the links for your doorstep. People spend hours on interpersonal ebook marking websites and use it to find the majority of their info. Should you send readers to an interesting article or valuable assistance, they will naturally send a link to their friends, and their friends will do the same. Secondly, each among the links provided by a social ebook marking service will deliver "link juice" to your website.

"Link juice" is jargon for site believability in the eyes of search engines. Social book marking websites use a
significant of believability, and with every hyperlink it provides your website a bit of that credibility. So even if nobody looks at the social bookmark on Digg, the site will assist your website a small a lot more credibility.

The way this functions is that when the bots from Google or Bing search your site, they discover back hyperlinks to sites having a significant of credibility. So even if it's just a blank hyperlink, those research spiders will assume that there's a reason for the hyperlink, thus believing that your site has credible information within.

There's a downside to social bookmarking providers though, there are lots of disreputable businesses that may take your money then spam interpersonal ebook marking websites with garbage -- and that garbage is directly connected to your site. The social bookmarking sites don't like it and nor does Google, utilizing a dirt cheap interpersonal book marking service is an easy way to get your website kicked out of search engine rankings completely.

Social Bookmarking Submission Tips

Social Bookmarking refers to web based applications that allow people to store bookmarks online instead of just putting in the favorites or bookmarks on their computers. The direct advantage of this is that people can access their bookmarked sites from any computer, or even from a mobile phone.

The good aspect of social bookmarking is that it allows users to share bookmarks with other Internet users in a collaborative manner. Generally, social bookmarking takes place on sites where the users can create an account to add their bookmarks to. It's also helpful to do it on sites that allow users to insert keywords for the types of bookmarks they add. In that manner

they all can be organized and set into categories that other users can easily search through.

But how submit your social bookmarking successfully? The follow five tips can help you.

Firstly, when you post the article to a social bookmarking site, make sure the short description you provide entices potential customers, not with a blatant sales pitch but by summarizing the information that people interested in your type of products want to read.

Secondly, take care in adding tags of your most relevant keywords in order to make the link easy to find within the site. Some sites limit the number of tags you can add while others provide nearly limitless space to include every relevant keyword or phrase.

Thirdly, make your content easy to share. All of the major blogging platforms such as WordPress or Blogger include plug-ins to add a little ‘share' graphic to your posts. This allows readers to easily and quickly make one click and add a bookmark of your article URL at any site where they have an account.

Last but not the least, be sure to include a plug-in that allows readers to add your site to an RSS feed as well. These feed aggregators are a popular way for internet users to combine all the blogs they follow into one easy-to-find place that shows the most current updates to all their favourites.


Social bookmarking existed several years before and people will always discover new concepts about the bookmarking world especially with the fields of marketing and promotion. Many have benefited from its advantages and new ideas are still being developed to maximize its use. The online marketing industry and community eye social marketing as one of their major tools in the future. No wonder many social bookmarking sites have come to provide the basic advantages and enjoy the benefits of social bookmarking.

Black Hat vs. White Hat SEO Types

Black Hat SEO- These are aggressive tactics used to gain high search
engines rankings that do not comply with the philosophy of the search
engines. Sites produced with black hat SEO techniques are considered
unethical spam by most web surfers because they provide no real content or
user experience. They basically look like pages of another search engine
or paragraphs of jargon containing keywords instead of real content.






 


The black hats, on the other hand, simply thinks of "How do I get links to
the site?" They pay no consideration to whether the links provide value to
the visitors and readers. The eventual strategy that emerges usually turns
out to be schemes like link farms and reciprocal link schemes.
Black Hat SEO are all about getting fast results. The method they use to
optimize their websites will often get the website to the top of the
search engines very rapidly, but when the search engines catch-on, the
website will very often crash or get banned.

For a while now, there is a battle going on within the Internet among
marketers that use SEO. Black Hat SEO is to use optimizing practices to
fool the search engines and the use of other traffic generating techniques
that are questionable or unethical.

White Hat Optimization- If you're thinking of using an SEO consultancy to
help your website get listed well on search engines then ask them a few
questions about bad techniques that you've heard of. This will probably be
enough for the unethical website optimization company to take the bait
whereas a good, ethical SEO consultancy will try to talk you out of it and
steer you in the right direction.

White Hat SEO remains more time-consuming, but it yields better long-term
results and has a more positive impact. People prefer to use web sites
they haven't been deceived into visiting, and search engines don't like to
list sites which have manipulated their way to a high ranking. Sites using
white hatted techniques usually don't have to worry about being removed
from search engine results.

The use of key-phrases can also be considered white or black hat as white
hat SEO'rs will use key-phrases in the natural context of a body of text, if
you write your web copy for your visitors and not the search engines you
will achieve better results.

White Hat SEO evolves writing good quality content. Don't try to use
spammy tricks. Deliver great content to your visitors and the search
engines. Don't hide text, or stuff Meta tags with keywords that shouldn't
be there. Make sure your title tag and other Meta tags reflect your page

Text Importance Of SEO

When you're approaching the design of your site, it's apparent that technology is king. Web designers will tell you that selecting the right platform to build your site can make a huge difference to its look and usability. As a consequence, many sites are built using highly complex technologies, filled with all sorts of bells and whistles.




Then the site is considered from a search engine optimization perspective. Under this new gaze, not only are the bells and whistles too much noise, but the technology platform the site is based upon is sometimes a liability. What site owners usually come to realize is that they would have been better off working from the basics, focusing on the best they could do with HTML and text.
 When it comes to search engine optimization, it is clear that text rules. This is because of the way the search engines trawl the web. Search engine crawlers have become increasingly sophisticated over the years, but their bias is still toward the format they began with, namely text. If you can fit all of your content into text within plain, text-based code, there's a higher chance that the search engines will understand your site, making indexing a little easier.

A solely text-based site is not entirely attractive to your human users, and there must be some balance. At the same time, your SEO work will be cut in half if your site has nice, handy chunks of text to work with.


If your site is built entirely out of Flash, don't despair. SEO companies are able to work around Flash and other not-so-SEO-friendly technologies, and Google is constantly trying to improve the algorithm's relationship with web design technology. It is important, however, to be aware that the task isn't going to be easy.

Making Money with Twitter

 On first considering about money making online, the primary approach that most people will consider will be twitter! Twitter is actually a micro blogging networking site which gives you message lesser or equal to 140 characters and not more. With so much good intentions and positive benefits, Twitter has set a new line of practice to make money online. Implementing right approach in twitter will make you get the best out from them. On building a best bond and relationship will be the core success of making handful income. The stronger you bind relationship with your network people will right away explain the success of your online business
 
Online money making has become the most awesome gift, where you can bind long term business relationship with worthy clients across the world. Are you not using twitter to promote and get in touch with your customers? This shows that you losing a great deal or even it explicate your craziness of not knowing the supremacy of twitter! Twitter is a power platform which grants you to communicate with several hundreds of people at single shot. Twitter gives you an opening to build enduring relationship and even supports in selling products with quick approach. On joining twitter, you can sell your products to the network customers as most twitter members will buy products from people whom they know. For all these reason, twitter is defined to be the gold mine while it comes in product selling.

People who aren't using Twitter will have either not understand the power of Twitter or they might not be aware of its existence. On research, you can get to know the positive and successful stories of Twitter and their role in driving traffic towards your business sale. Twitter is the best mini blogging site that drives incredible volume of traffic towards your way and this promising fact has inspired everyone to join the network. Is making money through twitter is too hard? Any novice will have this question, because they do not know the procedure of joining the network. Actually, the role of joining twitter will not take hard time rather you merely have to spare minutes to join the network.

Some Tips for Web Page Headers

Are you a current business owner who has asked the question, "How do I get my website on the first page of Google and the major search engines?" Most business owners don't know that traditional media ad spending is down across the board. Television advertising, radio, newspaper and magazines are down an average of approximately 13% in 2009.
 implementing relative meta-tags in your website makes sure that it will increase effectiveness of your search engine optimization campaign. On which you are investing lots of time and money. You can pick up any of your webpage and click on 'View' button at the top of the browser screen and select 'Page Source' it will show title tag at the top of the page.

Does your website have an actual contact form? There are a lot of websites that have just a mailto web link for users to contact the company. The problem with this is that you are reliant on the user having their own mail client installed and you cannot specify what information you want to collect. If you have a proper 

 contact form on your contact us page you can specify what information you want to collect e.g. name, phone number, email address, website etc.

On-page optimization is the process of structuring or changing the elements on your webpage so that it can be found by search engines for specific keyword(s). The on-page elements or factors that you need to change in order to improve your website's positions in search engines include title Tag, header tags, page content, alt tag, meta description tag and meta keywords tag.

It allows anyone from any experience level, from a complete beginner with no website technical skills to those who are familiar with website building. For the users who already know how to build sites using all kinds of coding and language and scripts, this will make it much easier for them too. You can start producing websites that look as professional as the big name companies and you can do it by yourself and do it fast.

If you were working with a company that creates designer flip-flops that are embellished with crystals, symbols, jewelry and other decorative items. When you first start their keyword project, the first two keywords that the company will give you is: flip-flops and sandals. You can easily find that there is great search volume and much lighter competition around more specific search terms such as: embellished flip flops, crystal flip-slops, rhinestone flip-flops, decorated flip-flops etc.

 Depending on how your templates are created, you can save Huge amounts of time by allowing the template or web editing software to perform repetitive tasks vs. you making them all on your own. A couple of examples might be your website's header, footer or common menu system. Let' say if each page of your website includes these common items, then you could save great time by having all of the pages call a "single file" that simply contains all of the requisite information for each respective section.

A favicon is basically an image that distinguishes a website/company from others. What's the first thing that comes to your mind when you see image of the
latter G with red,green, blue and yellow colors?... Google of course! You see how easy it is to advertise and embed your brand in people's mind. That's the power of favicon. Simply put, a favicon for your blog or website, is another way to make "you brand" (your website/blog), easily recognizable.

Designing Your Site to Be Search Engine Friendly. Creating a site that is search engine friendly should be an objective of every company that wants to do business on the Internet. Search engines are the most common way for Internet surfers to search for something on the Net. In fact, 85 percent of all people who use the Internet use search engines as their primary way to look for information. By using keywords relating to your company in appropriate places on your site, you can improve how search engines rank you.


How To Hide Your IP Adress

Are you aware that many websites and most hackers use IP addresses to monitor your personal business, your home address and other personal information about you can be retrieved once your IP address is known?The softwares is 100% free of spyware and adware. This is proven by many 3rd parties.There are several ways to hide your ip, here is a list of sites where you can try it out:

1.hideyouripaddress.net


You can either download the program(the trial version),or pay for it. If you choose to download the trial version,you are allowed to use it for 3 days…


Downlaod Link

If you choose to pay for it, you can choose if you want to pay 1,2, or 3 years.
Link


2. hide-my-ip.com


You can here also choose from the trial version and payment.The trial version allows you to use the program 14 days.
Download Link
If you choose to pay for it go here:
link
you will get something like this


Click the product which name has ,,Hide my ip”


3.easy-hide-ip.com


Trial version last for 3 days
Download Link

How to Enable Right Click in Websites

You are probably sometimes tried to save images or copy the contents of the website site that forbid their use of the right-click. Most websites use javascript to prohibit the use of the right-click , so to enable it you should disable the javascript.
There are many ways to do ti , the simplest by my opinion is using Web Developer 1.1.9 , firefox add-on .
1) Downlaod Web Developer 1.1.9 from this link
2) Click Disable button

3) Select Disable Javascript

4) Again select “All Javascript” option.

BIOS Beep Error Codes

After repeated requests for beep codes i have decided to post them here maybe they could be pinned

Standard Original IBM POST Error Codes
Code Description

1 short beep System is OK
2 short beeps POST Error - error code shown on screen No beep Power supply or system board problem Continuous beep Power supply, system board, or keyboard problem Repeating short beeps Power supply or system board problem
1 long, 1 short beep System board problem
1 long, 2 short beeps Display adapter problem (MDA, CGA)
1 long, 3 short beeps Display adapter problem (EGA)
3 long beeps 3270 keyboard card
IBM POST Diagnostic Code Descriptions
Code Description
100 - 199 System Board
200 - 299 Memory
300 - 399 Keyboard
400 - 499 Monochrome Display
500 - 599 Colour/Graphics Display
600 - 699 Floppy-disk drive and/or Adapter
700 - 799 Math Coprocessor
900 - 999 Parallel Printer Port
1000 - 1099 Alternate Printer Adapter
1100 - 1299 Asynchronous Communication Device, Adapter, or Port
1300 - 1399 Game Port
1400 - 1499 Colour/Graphics Printer
1500 - 1599 Synchronous Communication Device, Adapter, or Port
1700 - 1799 Hard Drive and/or Adapter
1800 - 1899 Expansion Unit (XT)
2000 - 2199 Bisynchronous Communication Adapter
2400 - 2599 EGA system-board Video (MCA)
3000 - 3199 LAN Adapter
4800 - 4999 Internal Modem
7000 - 7099 Phoenix BIOS Chips
7300 - 7399 3.5" Disk Drive
8900 - 8999 MIDI Adapter
11200 - 11299 SCSI Adapter
21000 - 21099 SCSI Fixed Disk and Controller
21500 - 21599 SCSI CD-ROM System

AMI BIOS Beep Codes
Code Description

1 Short Beep System OK
2 Short Beeps Parity error in the first 64 KB of memory
3 Short Beeps Memory failure in the first 64 KB
4 Short Beeps Memory failure in the first 64 KB Operational of memory
or Timer 1 on the motherboard is not functioning
5 Short Beeps The CPU on the motherboard generated an error
6 Short Beeps The keyboard controller may be bad. The BIOS cannot switch to protected mode
7 Short Beeps The CPU generated an exception interrupt
8 Short Beeps The system video adapter is either missing, or its memory is faulty
9 Short Beeps The ROM checksum value does not match the value encoded in the BIOS
10 Short Beeps The shutdown register for CMOS RAM failed
11 Short Beeps The external cache is faulty
1 Long, 3 Short Beeps Memory Problems
1 Long, 8 Short Beeps Video Card Problems

Phoenix BIOS Beep Codes
Note - Phoenix BIOS emits three sets of beeps, separated by a brief pause.

Code Description
1-1-3 CMOS read/write failure
1-1-4 ROM BIOS checksum error
1-2-1 Programmable interval timer failure
1-2-2 DMA initialisation failure
1-2-3 DMA page register read/write failure
1-3-1 RAM refresh verification failure
1-3-3 First 64k RAM chip or data line failure
1-3-4 First 64k RAM odd/even logic failure
1-4-1 Address line failure first 64k RAM
1-4-2 Parity failure first 64k RAM
2-_-_ Faulty Memory
3-1-_ Faulty Motherboard
3-2-4 Keyboard controller Test failure
3-3-4 Screen initialisation failure
3-4-1 Screen retrace test failure
3-4-2 Search for video ROM in progress
4-2-1 Timer tick interrupt in progress or failure
4-2-2 Shutdown test in progress or failure
4-2-3 Gate A20 failure
4-2-4 Unexpected interrupt in protected mode
4-3-1 RAM test in progress or failure>ffffh
4-3-2 Faulty Motherboard
4-3-3 Interval timer channel 2 test or failure
4-3-4 Time of Day clock test failure
4-4-1 Serial port test or failure
4-4-2 Parallel port test or failure
4-4-3 Math coprocessor test or failure
Low 1-1-2 System Board select failure
Low 1-1-3 Extended CMOS RAM failure

Boot Block Recovery For Free

You don't need to pay a measly sum of dollars just to recover from a boot block mode. Here it is folks:

AWARD Bootblock recovery:

That shorting trick should work if the boot block code is not corrupted, and it should not be if /sb switch is used when flashing the bios (instead of /wb switch).

The 2 pins to short to force a checksum error varies from chip to chip. But these are usually the highest-numbered address pins (A10 and above).

These are the pins used by the system to read the System BIOS (original.bin for award v6), calculate the ROM checksum and see if it's valid before decompressing it into memory, and subsequently allow Bootblock POST to pass control over to the System BIOS.


You just have to fool the system into believing that the System BIOS is corrupt. This you do by giving your system a hard time reading the System BIOS by shorting the 2 high address pins. And when it could not read the System BIOS properly, ROM Checksum Error is detected "so to speak" and Bootblock recovery is activated.

Sometimes, any combination of the high address pins won't work to force a checksum error in some chips, like my Winbond W49F002U. But shorting the #WE pin with the highest-numbered address pin (A17) worked for this chip. You just have to be experimentative if you're not comfortable with "hot flashing" or "replacement BIOS".

But to avoid further damage to your chip if you're not sure which are the correct pins to short, measure the potential between the 2 pins by a voltmeter while the system is on. If the voltage reading is zero (or no potential at all), it is safe to short these pins.

But do not short the pins while the system is on. Instead, power down then do the short, then power up while still shorting. And as soon as you hear 3 beeps (1 long, 2 short), remove the short at once so that automatic reflashing from Drive A can proceed without errors (assuming you had autoexec.bat in it).

About how to do the shorting, the tip of a screwdriver would do. But with such minute pins on the PLCC chip, I'm pretty comfortable doing it with the tip of my multi-tester or voltmeter probe. Short the pins at the point where they come out of the chip.


AMIBIOS Recovery bootblock:

  • Copy a known working BIOS image for your board to a floppy and rename it to AMIBOOT.ROM.
  • Insert the floppy in your system's floppydrive.
  • Power on the system while holding CTRL+Home keys. Release the keys when you hear a beep and/or see the floppy light coming on.
  • Just wait until you hear 4 beeps. When 4 beeps are heard the reprogramming of the System Block BIOS went succesfull, so then you may restart your system.
Some alternative keys that can be used to force BIOS update (only the System Block will be updated so it's quite safe):
  • CTRL+Home= restore missing code into system block and clear CMOS when programming went ok.
  • CTRL+Page Up= restore missing code into system block and clear CMOS or DMI when programming went ok.
  • CTRL+Page Down= restore missing code into system block and do not clear CMOS and DMI area when programming went ok.
Btw: the alternative keys work only with AMIBIOS 7 or higher (so for example an AMI 6.26 BIOS can be only recovered by using CTRL+Home keys).

Recovering a Corrupt AMI BIOS chip

With motherboards that use BOOT BLOCK BIOS it is possible to recover a corrupted BIOS because the BOOT BLOCK section of the BIOS, which is responsible for booting the computer remains unmodified.

When an AMI BIOS becomes corrupt the system will appear to start, but nothing will appear on the screen, the floppy drive light will come on and the system will access the floppy drive repeatedly. If your motherboard has an ISA slot and you have an old ISA video card lying around, put the ISA video card in your system and connect the monitor.

The BOOT BLOCK section of the BIOS only supports ISA video cards, so if you do not have an ISA video card or your motherboard does not have ISA slots, you will have to restore your BIOS blind, with no monitor to show you what’s going on.


AMI has integrated a recovery routine into the BOOT BLOCK of the BIOS, which in the event the BIOS becomes corrupt can be used to restore the BIOS to a working state.

The routine is called when the SYSTEM BLOCK of the BIOS is empty. The restore routine will access the floppy drive looking for a BIOS file names AMIBOOT.ROM, this is why the floppy drive light comes on and the drive spins.

If the file is found it is loaded into the SYSTEM BLOCK of the BIOS to replace the missing information. To restore your BIOS simply copy a working BIOS file to a floppy diskette and rename it AMIBOOT.ROM, then insert it into the computer while the power is on.

The diskette does not need to be bootable or contain a flash utility. After about four minutes the system will beep four times. Remove the floppy diskette from the drive and reboot the computer. The BIOS should now be restored.


Recovering a Corrupt AWARD BIOS
With AWARD BIOS the process is similar but still a bit different. To recover an AWARD BIOS you will need to create a floppy diskette with a working BIOS file in .BIN format, an AWARD flash utility and an AUTOEXEC.BAT file. AWARD BIOS will not automatically restore the BIOS information to the SYSTEM BLOCK for this reason you will need to add the commands necessary to flash the BIOS in the AUTOEXEC.BAT file.

The system will run the AUTOEXE.BAT file, which will in turn flash the BIOS. This is fairly easy. Here are the steps you need to take.


· Create a bootable floppy diskette
· Copy the BIOS file and flash utility to the diskette
· Create an text file with any standard text editor and add the following lines

@ECHO OFF
FLASH763 BIOSFILE.BIN /py

In the above example I am assuming that you are using the FLASH763.EXE flash utility. You will need to replace the FLASH763 with the name of whatever flash utility you are using, and replace the BIOSFILE.BIN with the name of the BIOS file you are using.

You will also need to change the ‘/py’ to whatever the command is for your flash utility to automatically program the BIOS without user intervention. If you do not know the command to automatically flash your BIOS type the name of the flash utility with a space and then /? to display the utility’s help
Publish Postscreen.

The help screen should pecify the command switch to automatically flash your BIOS. If you are using the FLASH763.EXE utility then the switch to automatically flash your BIOS is ‘/py’.

Free Ebooks Collection


Free Ebooks Collection

Ebooks are now very essential contents on internet. It is very useful for students who dont study from books. Mostly students are fond of reading news, blogs and other things over internet. Ebooks are the best choice in these cases and it also boost the knowledge of students. some of the examples of ebooks web sites which are free and also secure are:
   



  • Free Ebooks










  • Free Ebooks collection










  • Free Ebooks










  • Free rapidshare and megaupload Ebooks







  • See there is one site above whose title is Free rapidshare and megaupload e-books. So what is rapidshare and megaupload. These are free and unlimited file hosting services where anyone can upload and download large files including MP3 songs, videos, games, software, ebooks, etc.

    While Rapidshare and Megaupload are available only in the browser, there is one another file hosting alternative YouSendIt, which also has a desktop client that canresume uploads.

    I have listed one website above which has divided its ebooks links into some category. These category helps the users to all the books for a given category and can have variety of books of same category. There is also one term TAG which is some what similar to category but has more significant in terms of Search Engine Optimization. Well Tags helps SEO and other bookmarking sites to categories the topics according to their relevancy. Following are the categories which you can find on these sites:


    well at last I would like to thanks all readers and request them to enjoy these sites surfing and reading.

    Make Windows XP Look and Feel like Windows 7


    Make Windows XP Look and Feel like Windows 7

    For all those who don’t want leave their good old XP there are plenty of 3rd party software to get the best feature of Windows 7 in XP.
    Before you get started, create a system restore point, just in case some applications starts acting little funny. For this, go to Start>All Programs>Accessories>System Tools>System Restore to create one.

    Adding the Superbar
    The Superbar like Windows 7 minimizes the space taken by each application by displaying only icon in taskbar and grouping similar instances of an application as one. You can click on the icon to choose the instances you want to open (Just click on the thumbnail to open it).
      A small program named ViGlance doesn’t require an installation. Just run the software (And choose between a few options) and you’re done. Right click on the notification icon click options to select animations and other effects. You can pin items that might be open so that their link stays on the taskbar.  You can Download it on http://www.lee-soft.com/viglance

    Splitting Windows and AeroPeek
    With Windows 7 comes a new set of shortcuts to arrange your open windows. You can “snap” open windows to different edges of your screen, which is helpful if you quickly want to divide the screen into two separate halves. This is done with the Windows + Left or Right keys. Pressing Windows + space bar on the other hand, displays the desktop by making all applications transparent. There are several applications that allow you to get same functionality in Windows XP, but I would recommend Windows Split. With its range of options the application is a delight for any power user. Install the software and check the list of Shortcuts available. Also, it allows you to customize each (Layout Settings) so can enjoy as much as flexibility as you want to. Download this application at http://www.winsplit-revolution.com/download

    Shaking off all inactive windows using AeroShake
    AeroShake feature of Windows 7 is simple. Shake the active window and it hides all other windows. Shake it again and the windows are back to where they were. AeroShake software does the same for Windows XP. Download it from http://cache.gawker.com/assets/images/gawker/2008/11/Aero_Shake_1.3.exe         

    Skinning your Windows
    ·        Windows 7 Complete by DopeySneezy. A complete theme replacement, with a replacement utility to allow you to backup all the system files you need to change. But replacing is manual, so a little time consuming. Get it from http://dopeysneezy.deviantart.com/art/Windows-7-complete-109505907
    ·        Seven VG Theme by Vishal Gupta: A very popular theme by Vishal Gupta, who also run a blog with a lot of other tweaks for Windows users (http://www.askvg.com). Different parts of the themes are available as setups, which make it easier to install. http://www.deviantart.com/download/106952053/SevenVG_Refresh_with_Superbar_by_Vishal_Gupta.zip
    ·        CAD 2009 EDITION v1.5 by Flawless: for getting the Ctrl+Alt+Del screen in Windows 7 style, download this application at http://flawless02.deviantart.com/art/CAD-2009-EDITION-v1-5-for-XP-132794740 

    10 top tips that will help you to increase your Disk Space…

    10 top tips that will help you to increase your Disk Space…



    1.      Monitor your file space: There are lots of tools that can tell you which files and folders consume the most space on your computer and where they are located. Armed with this information, you can decide what to get rid of. There of the best are JDisk Report (www.jgoodies.com), WinDirStat (http://winddirstat.info) and Disktective (www.disktective.com). All are free to download and display their findings in a clear, easy-to-understand manner.

    2.      Run Disk Cleanup
    An obvious tool to try when your hard disk is running short of space is Windows’ built-in Disk Cleanup. The program will calculate how much disk space you can free up. Wait until the ‘files to delete’ list appears, then select every item and click OK. There’s nothing here that you can’t live without and you can reclaim a surprising amount.

    3.      Empty the Recycle Bin
    Deleted files can occupy many gigabytes of disk space without you realizing. To stop them accumulating and taking up valuable room, first right-click the Recycle Bin on your Desktop and select the Empty option to delete the Bin’s contents. Right click it again and this time select Properties, Reduce the space allocated to the Recycle Bin to 1GB and click OK to confirm.

    4.      Compress your files
    Windows can compress files on your hard disk to reduce the amount space require. Right-click a file and choose Properties, then click the Advanced button and select the option to ‘Compress contents to save disk space’. Click OK and OK again. This trick works even better when you right-click a folder as you’ll be prompted to apply compression to all its files and subfolders. Go ahead – it won’t adversely affect their contents. Personally I also use it.

    5.      Zip files up
    If there are files that you don’t use regularly, you can zip them up. Compressing them in this way can, with certain files, save more than 50 per cent of the original space they used. Right-click a file or folder and select Send To, then ‘Compressed (zipped) Folder’. Delete the original afterwards.  
    6.      Remove optional components
    Getting rid of Windows components that you don’t use helps to reclaim disk space. In XP, click Start>All Programs>Accessories>System Tools>Disk Cleanup. When the Disk Cleanup window appears, click the More Options tab and then select Clean Up in the Windows Components section. Some entries contain multiple items, such as Accessories and Utilities, so select them and click the Details button to choose the items you want to keep or remove. You can restore components from your installation disc (if you have one) if you later decide you need them.

    7.      Limit System Restore
    System Restore lets you undo changes that have been made to Windows, such as when you install new software or hardware. It’s a worth reducing the amount of space allocated to System Restore. In XP, click Start>Right-click My Computer and select Properties. Click the System Restore tab and then drag the slider bar to the left to reduce the disk space usage. Set the slider to 1000MB, which is a good compromise between necessary back-ups and the amount of space used.
       In Vista, click Start, right-click Computer and select Properties. Click System Protection and clear the tick against the relevant disk drive. Click Apply and then OK, but note first that this removes all restore points (backups), so you should only proceed if your PC is working well. Click system Protection again but this time tick the box next to the disk drive. The space used by System Restore will now be considerably reduced. 

    8.      Limit IE’s cache
    Internet Explorer can use up to 1GB of disk space to store recently accessed web pages. To stop these from building up in the browser’s cache, click Tools and choose Internet Options>Click the Settings button in the ‘Browsing history’ section of the General tab and set the disk to use to 50.

    9.      Uninstall software
    Old software that you no longer use can consume lots of space. Open ‘Add or Remove Programs’ in the Control Panel (XP) or ‘Programs and Features’ (Vista & 7), and choose the option to sort installed programs by size. This will help you identify the biggest space hogs. You can then uninstall any greedy programs that you don’t need anymore.

    10.    Use online storage
    Microsoft’s Windows Live SkyDrive service (http://skydrive.live.com) provides 5GB of free online storage space for documents, music, photos and videos. Sign up and upload seldom-used files from your hard disk and you’ll have up to 5GB more space to play with. There are many equally good free alternatives, including Adrive (www.adrive.com) and Humyo (www.humyo.com).

      You can use Cloud OS’s for online storage like Glide OS (10GB of free online storage) or G.ho.st (15GB of free storage

    download TweakNow PowerPack 2009 1.7.2

    TweakNow PowerPack 2009 1.7.2
     

    TweakNow PowerPack 2009 is a free set of tools that give you the power to tweak, modify, and personalize just about every aspect of Windows and your PC. It features a fully integrated suite of modular utilities. There's a Registry Cleaner module, a nice touch in freeware since so many of them cost more than they're worth, but there's also a Registry Defragmenter that reorganizes things for speedier performance. The Windows Secrets module gives you access to more than 100 hidden Windows settings. The Virtual Desktop module lets you run as many as four different virtual desktops at once, so you can try out a wide range of looks and configurations, or keep separate desktops for work and play.
       TweakNow PowerPack 2009 is free. New versions have enhanced support for Windows 7. Support for Google's Chrome has also been added the Track Cleaner module, which erases browsing traces and other digital footprints.

    Download

    beautiful collection of wallpaper


    This is the beautiful collection of wallpaper that can give different feel and look for your desktop.


    How To Fix a Corrupted Memory Card

    Hi Guys, Most of us face a common problem when we use memory cards that is nothing but corrupted memory!! error. so we usually try to fix it and it will not be possible all times. So we go and buy a new one. Before trying to buy a new one just follow some trouble shooting steps and in most of the cases it will be unsuccessful but some times it will be fixed. I have a personal experience of recovering a corrupted memory card of one of my friend and was successful 

    All you have to do is see whether you are able to see the memory card is detected by the systrem or not when we connect with the help of data cable via mobile or a simple card reader. IF it is detecting then do follow the simple steps below.

    1) After connecting the mmc to system just check out which drive is holding the memory card and right click on the drive where your memory card is there and click on properties.
    2) Now click on Format and when the pop up box appears just click on file system as FAT and memory cards support only FAT but not FAT32 or NTFS.
    3) Now click on start but don’t check quick format. Just leave it blank.
    4) Now check whether your memory card is working or not. If not then follow these few more steps.
    5) Open RUN by pressing Ctrl+R and type CMD and then press enter.
    6) Now if the memory card drive is L: then type L: and press enter.
    7) Now type as format L: and press enter.
      Its asks for conformation and asks to press y or n just type y and wait until it finishes.
    9) This will create default clusters in mmc and Mostly this will fix the memory card.
    10) Its also a good option to try to format the memory card in mobile itself.



    In-spite of all of these steps if your memory card is not working??? then you can download a simple simple application which will try to fix the memory card. Just download the software below and you can also visit these guys for more info you can find more info in there site : VISIT HERE and the software’s are all available in demos so u can fix or recover the data free.

    Samsung Corby Unknown Secrets

    Samsung corby is really a cool mobile series from samsung mobile and some of the models are having some unknown and never said secrets which are really surprising and a lot interesting. I want to share some secrets with you today. First we will go with basic codes and after that we will get into real action.



    We Start with the basic secret code which is common for all mobile phones
    1. *#06#  — This will show the IMEI(International Mobile Equipment Identity) number of the mobile phone.
    2. *2767* 5282# — This will reset the Java Application (It Deletes All Java Midlets which are installed in your phone)
    3. #*7728# — This will is a master reset code which will not delete any thing from your mobile but will set everything to factory default settings when it was on the time when we bought at the time of purchase.
    1. *#9998*3323# — This code is used to unlock the samsung corby to all networks. 
    2.  
    3. *#9998*4357# — This will bring a Help Menu where we can select a lot of inbuilt options.
    4. *#9998*5282# — This will bring a Java Menu where we can set the GPRS/CSD Settings for java server.
    5. *#9999#0# — This will bring a Monitor Mode Menu.
    6. *#9999# or *#9998*9999# — This will bring a Software Version Menu.
    7. *#8888# or *#9998*8888# — This will bring a Hardware Version Menu.
    8. *#9998*746# or *#9998*0746# or *#0746# — This will give the Sim Information.
    9. *#9998*523# or *#9998*0523# or *#0523# — This will display the Contrast options.
    10. *#9998*842# or *#9998*0842# or *#0842# — This will bring the Vibration On options.
    11. *#9998*289# or *#9998*0289# or *#0289# — This will bring the Buzzer On option.
    12. *#9998*288# or *#9998*0288# or *#0288# — This will bring the Battery & Field Information.
    13. *#9998*377# or *#9998*0377# — This will bring the Error log
    14. *#9998*778# or *#9998*0778# or *#0778# — This will bring the Sim Service table
    15. *#9998*782# — This will bring the date and alarm clock options.
    16. *#8999*638# — This will bring the network information.
    17. *#9998*5646# — This will bring the change operator logo at startup
    18. *#9998*76# — This will show the production number
    19. *#9998*968# — This will bring the melody for alarm option.
    20. *#9998*585# — This will bring the Non-Volatile Memory (NVM) option.
    21. *#3243948# — This will bring the Digital Audio Interference Off option.
    22. *#32436837# — This will bring the Digital Audio Interference On option.
    I will post some more awesome codes which are really cool to read in my next pos