Collection Of Operating System 2009 | Xclusive**


Collection operating systems

- Windows Vista Ultimate SP1 x86
- Windows Vista Business SP1 x86
- Windows Vista Home Premium SP1 x86
- Windows Vista Home Basic SP1 x86
- Windows Vista Starter SP1 x86
- Windows XP Professional SP3 x86 VL
- Windows 2000 Professional SP4 Rollup 1
- Windows Millennium
- Windows 98 Second Edition
- Hiren's BootCD 9.5
In adjusting files Windows XP Pro x86 one of libraries owing to what began possible to restore system in case of crash even if during using system in it additional updatings have been established is replaced. In adjusting files Windows XP Pro x86 a number of the drivers necessary for support SATA AHCI is added. Without it installation of OS on the computers working in mode SATA AHCI, was impossible. For support of parent payments with ICH8 and ICH9 (without R) have been a little corrected the driver that by OS it was put in mode SATA AHCI and on them. Because of it the digital signature of drivers, the prevention of which absence you, certainly, has departed can see at installation. Be not frightened, it is quite normal.
Also, in system of preset Windows 98 SE and Windows Millennium it is included Partition Magic 8.0 for DOS, allowing to break and format HDD before start of installation of the AXIS. All disks are supplied by the convenient graphic menu, allowing to start appendices from a disk as from the Bootable-device, or from under established version Windows. The operational systems presented on disks do not demand registration and activation. All procedures necessary for it are spent in an automatic mode during installation of the AXIS. However, it is valid only at start of installation directly with DVD-ROM'a. At attempt of start of installation of presented versions Windows from under already established before the AXIS, serial number of a product can request.
The size: 3.6 Gb
http://rapidshare.com/files/185334794/x86SBDVD1.part01.rar
http://rapidshare.com/files/185338444/x86SBDVD1.part02.rar
http://rapidshare.com/files/185342393/x86SBDVD1.part03.rar
http://rapidshare.com/files/185345514/x86SBDVD1.part04.rar
http://rapidshare.com/files/185348518/x86SBDVD1.part05.rar
http://rapidshare.com/files/185351818/x86SBDVD1.part06.rar
http://rapidshare.com/files/185355792/x86SBDVD1.part07.rar
http://rapidshare.com/files/185359439/x86SBDVD1.part08.rar
http://rapidshare.com/files/185362999/x86SBDVD1.part09.rar
http://rapidshare.com/files/185367081/x86SBDVD1.part10.rar
http://rapidshare.com/files/185371241/x86SBDVD1.part11.rar
http://rapidshare.com/files/185376115/x86SBDVD1.part12.rar
http://rapidshare.com/files/185380250/x86SBDVD1.part13.rar
http://rapidshare.com/files/185384484/x86SBDVD1.part14.rar
http://rapidshare.com/files/185389936/x86SBDVD1.part15.rar
http://rapidshare.com/files/185393935/x86SBDVD1.part16.rar
http://rapidshare.com/files/185398423/x86SBDVD1.part17.rar
http://rapidshare.com/files/185402595/x86SBDVD1.part18.rar
http://rapidshare.com/files/185409331/x86SBDVD1.part19.rar
http://rapidshare.com/files/185413262/x86SBDVD1.part20.rar
http://rapidshare.com/files/185418334/x86SBDVD1.part21.rar
http://rapidshare.com/files/185462509/x86SBDVD1.part22.rar
http://rapidshare.com/files/185468423/x86SBDVD1.part23.rar
http://rapidshare.com/files/185470930/x86SBDVD1.part24.rar
http://rapidshare.com/files/185479360/x86SBDVD1.part25.rar
http://rapidshare.com/files/185481893/x86SBDVD1.part26.rar
http://rapidshare.com/files/185490486/x86SBDVD1.part27.rar
http://rapidshare.com/files/185498231/x86SBDVD1.part28.rar
http://rapidshare.com/files/185502507/x86SBDVD1.part29.rar
http://rapidshare.com/files/185520071/x86SBDVD1.part30.rar
http://rapidshare.com/files/185542701/x86SBDVD1.part31.rar
http://rapidshare.com/files/185548223/x86SBDVD1.part32.rar
http://rapidshare.com/files/185554275/x86SBDVD1.part33.rar
http://rapidshare.com/files/185566746/x86SBDVD1.part34.rar
http://rapidshare.com/files/185586241/x86SBDVD1.part35.rar
http://rapidshare.com/files/185604184/x86SBDVD1.part36.rar
http://rapidshare.com/files/185610166/x86SBDVD1.part37.rar
http://rapidshare.com/files/185631339/x86SBDVD1.part38.rar
http://rapidshare.com/files/185634577/x86SBDVD1.part39.rar




How to Remove Virus in Pendrive with Nero

you can now easily remove virus through Nero CD burner,


please follow these instructions..........................

1.insert your external drive(pocket hard drive,pen drive etc ..)
2.without opening the drive start Nero
3.select "make data CD" in Nero software
4.select "add" button and explore the pen drive drive letter(for ex:say i: )
5.now you can see all the virus files and hidden files on the drive
6.directly delete the files using delete key
7.after deleting make sure to empty your recycle bin

a small collection of BIOS entry key combos

a small collection of BIOS entry key combos:

Acer - CTL ALT ESC

AMI BIOS - DEL, F1 or F2

AST, Advantage, Award, Tandon - CTL ALT ESC

Award BIOS - DEL or CTL ALT ESC

Compaq - F10

DELL - F1 or DEL or CTL ALT ENTER

DTK BIOS - Esc

Gateway 2000 - F1

Hewlett Packard - F1

IBM
Older Models - In order to get into the configuration of the IBM setup screen CMOS screen you need to hold down both mouse buttons during bootup.
Aptiva - F1
PS/2 - CTL ALT INS after CTL ALT DEL
PS/2 with reference partition - INS

NEC - F2

Olivetti PC Pro - SHIFT CTL ALT Numpad DEL

Packard Bell - F1 or F2

Phoenix BIOS F1 or F2, or CTL ALT ESC or CTL ALT S or CTL S or CTL ALT INS

Sharp Laptop 9020 - F2

Sony - F3 at switchon, then F2 or F1

Tandon - CTL SHIFT ESC

Toshiba - ESC at switchon

Zenith - CTL ALT INS

Miscellaneous - CTL ESC or CTL ALT +

To Delete An "undeletable" File

Open a Command Prompt window and leave it open.
Close all open programs.
Click Start, Run and enter TASKMGR.EXE
Go to the Processes tab and End Process on Explorer.exe.
Leave Task Manager open.
Go back to the Command Prompt window and change to the directory the AVI (or other undeletable file) is located in.
At the command prompt type DEL where is the file you wish to delete.
Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell.
Close Task Manager.


Or you can try this

Open Notepad.exe

Click File>Save As..>

locate the folder where ur undeletable file is

Choose 'All files' from the file type box

click once on the file u wanna delete so its name appears in the 'filename' box

put a " at the start and end of the filename
(the filename should have the extension of the undeletable file so it will overwrite it)

click save,

It should ask u to overwrite the existing file, choose yes and u can delete it as normal


Here's a manual way of doing it. I'll take this off once you put into your first post zain.

1. Start
2. Run
3. Type: command
4. To move into a directory type: cd c:*** (The stars stand for your folder)
5. If you cannot access the folder because it has spaces for example Program Files or Kazaa Lite folder you have to do the following. instead of typing in the full folder name only take the first 6 letters then put a ~ and then 1 without spaces. Example: cd c:progra~1kazaal~1
6. Once your in the folder the non-deletable file it in type in dir - a list will come up with everything inside.
7. Now to delete the file type in del ***.bmp, txt, jpg, avi, etc... And if the file name has spaces you would use the special 1st 6 letters followed by a ~ and a 1 rule. Example: if your file name was bad file.bmp you would type once in the specific folder thorugh command, del badfil~1.bmp and your file should be gone. Make sure to type in the correct extension.

Windows Registry Structure And Function

You can view the structure of the Windows Registry when you open it up with a Registry Editor utility like REGEDIT.EXE or REGEDT32.EXE.

If you've never opened the Registry before, you might be surprised and comforted by its familiar-looking layout. Its hierarchical data structure is much like the data structure you see everyday in Windows Explorer, except here the tree structure units are keys, subkeys, and values rather than directories, subdirectories, and files. But any intuitive understanding of the Registry's content (for most people) ends right here, because the registry was designed more for the operating system and installed applications than for humans.

The Registry's hierarchical data structure and central location allow Windows and hosted applications to quickly locate their configuration settings and default parameters, but these parameters have values in the Registry that are different from their internally-defined values used by the applications themselves. This can make altering application settings from within the Registry a grueling and tedious task, and this is why most changes to Registry data are more easily (and more safely) made by changing settings from within individual applications or system utilities.

A Closer Look at Registry Structure

The primary divisions of the Windows Registry are seen a list of 4-6 expandable folders, called root keys or subtrees, in the left pane of the Registry Editor window. These can be expanded to show the keys and subkeys, and these can be expanded in turn to show further subkeys below or their value entries listed on the right pane in Registry Editor. The Registry subtrees and a description of their contents are as follows:

* HKEY_LOCAL_MACHINE (HKLM): This root key (or subtree) contains configuration data specific to the local computer, including its hardware devices and operating system components. The information contained within HKLM is independent of the current user and applications or processes in use.

* HKEY_CLASSES_ROOT (HKCR): This root key contains the file-class, OLE, and COM object data. The keys, subkeys, and data within this subtree are linked to (and identical to) those contained in the HKEY_LOCAL_MACHINESoftwareClasses subtree.

* HKEY_CURRENT_CONFIG (HKCC): This root key is added to make current versions of Windows compatible with older Windows 95 applications. It is derived from HKLMSystemCurrentControlSetHardwareProfilesCurrent and contains configuration settings for all currently active hardware.

* HKEY_CURRENT_USER (HKCU): This root key contains profile information for the user currently logged in. Each time a user logs on, HKCU is rebuilt with that user's profile data from HKEY_USERS.

* HKEY_USERS (HKU): This root key contains the default profile and the profiles of all users who have logged onto the computer.

* HKEY_DYN_DATA (HKDD): This root key is found only on Windows 95/98/ME. It is linked to HKEY_LOCAL_MACHINE and contains information about Plug and Play hardware components. HKDD , for use with the Plug-&-Play features of Windows, this section will change as devices are added and removed from the system.

The "HKEY_" at the beginning of each root key's name indicates that the key is a unique identifier (or handle) that programs can use to access resources. Each of these root keys branches out, first into keys and then further into subkeys. At the end of these branches of keys and subkeys lay the Registry data, or value entries, corresponding to the data stored in the hive files.

The Windows Registry can store several different value types, but the most common that you will see are binary, strings (text for humans), and DWORD (Boolean) values.

Registry Hives

Much of the information contained in the Registry is stored on the computer's hard drive as a set of binary data files aptly named "hives". The hives are permanent Registry components, serving as both supporting files from which Windows retrieves Registry data during system startup, and as backup files that the Registry writes to each time its supporting data is altered or changed through a process called flushing. Flushes are automatic and occur within a few seconds after changes are made to the Registry.

Visit Windows Registry Repair for more information.The Windows Registry is a complicated way of storing information and can make or break your windows operating system.

Hardware Troubleshooting Tips

Hardware Troubleshooting Guide

Troubleshooting Tips for New Monitors

Here is some basic trouble shooting tips for new monitors:


1. The picture does not appear

* Check to make sure the signal cable is firmly connected in the socket.
* Check to see if the computer system's power is ON.
* Check that the Brightness Control is at the appropriate position, not at the minimum.

2. The Screen is not synchronized

* Check to make sure the signal cable is firmly connected in the socket.
* Check that the output level matches the input level of your computer.
* Make sure the signal timing of the computer system is within the specification of the monitor.

3. The position of the screen is not in the center

* Adjust the H-Size, H-Phase or V-Size, V-Center controls.
* Check if the signal timing of the computer system is within the specification of the monitor.

4. The screen is too bright or too dark

* Check if the Brightness or contrast control is at the appropriate position, not at the maximum or minimum.
* Check if the specified voltage is applied
* Check if the signal timing of the computer system is within the specification of the monitor.
* Especially, check the horizontal frequency.

5. The screen is shaking

* Move all objects that emit a magnetic field, such as a motor or transformer, away from the monitor.
* Check if the specified voltage is applied.
* Check if the signal timing of the computer system is within the specification of the monitor.

Computer maintenance tips

With the amount of information available for download on the Internet, it's easy to quickly fill up your valuable hard drive space and turn your computer into a sluggish, unresponsive monster. Keeping your hard drive clean is essential to the high performance that the latest computers can achieve. Fortunately, it's a simple process; one that can easily be performed on a regular basis and, with some organization, keep your computer running like a well-oiled machine.

You can discover how much hard drive space is available on your computer by accessing the DriveSpace program in your System Tools. A pie graph will show you the amount of used and unused space for each of your drives. Check this often to keep an idea of how much space you are using.

There are six simple steps to clearing up your hard drive:

1. Uninstall unused programs.

Many times a new program will come along that looks fun to have or play with, but after a week or two you simply stop using it. These programs clutter up your drive and take up valuable space. You might be tempted to delete these programs from your drive, but doing so will cause problems. You must use the uninstall function of Windows for the program to be removed safely and completely.

2. Clean out temporary files.

When your computer is not shut down properly, it will pass information from memory into fragmented files. Also, while you are running programs, your computer will write information that it does not immediately need into temporary files. Installation files will also expand themselves into the temporary folder and will not always clean up after themselves. You can delete these temporary files safely by using the Disk Cleanup option in your System Tools.

3. Empty your Internet cache.

As you surf the Internet your computer stores web pages and images into a temporary Internet cache so that it can quickly recall and access information when you move back and forth between pages. This backup information can quickly add up and eat hard drive space.

Whether you use Internet Explorer, Netscape, or one of the many other browsers available, emptying out your cache is quick and easy. Simply follow the instructions in the Help files located within those programs. You may also wish to set a specific maximum file size for your cache folder, so that it is not allowed to run rampant.

4. Empty your mail programs of clutter.

It's easy to browse through your email and leave old messages there, promising yourself you'll sort them out later. One or two messages don't take up much space, but hundreds certainly do. Take the time to sort through these old emails now and delete what is not important. Create folders and organize what is left. Make it a habit that when new emails come in, they are either filed immediately or thrown away. Set your email program to empty your deleted items folder each time you close your mail program.

5. Empty your recycle bin.

Once you've emptied your drive of cluttering, unnecessary programs; empty your recycle bin to remove what has been placed there in the process.

6. Scandisk and Defrag.

When Windows installs programs, it will put the files it needs anywhere that it finds free space, and not directly after the last program installed. As a result, your hard drive has patches of empty space on it that are not big enough to fit a full program, and will result in a drive space error if you attempt to install something new. Scandisk your drive to check for lost file fragments and to fix any errors it finds, then Defrag to pack all of the program files together at the beginning of your drive. This will clear out those empty patches and move all of the free space you've just created to the end of your drive.

Now that you've got it clean, keep it that way. Perform this quick maintenance routine every week. For your work computer, Friday afternoon before you leave for the weekend is the perfect time. When you return to work on Monday, you'll have a computer that is clutter-free and as responsive as it should be.

Organize your surfing habits. Direct all of your downloads to the same folder, so that you can easily find them and delete them when necessary, or move them to zip disks for storage. Keep track of the programs that you install. For trial versions, note the date that they will expire on a calendar. This will remind you to uninstall the programs that you can no longer use rather than allowing them to clutter up your drive. Also, if you run into problems, keeping track of new downloaded and installed programs and the date they were installed can help you track down the cause of problems.

Remember that the cleaner your hard drive is, the better your machine will respond! In order for your computer to be user friendly, it must have a friendly user. Be your computer's best friend and clean out the cobwebs regularly.

How to make your Desktop Icons Transparent

Go to Control Panel
> System,
> Advanced
> Performance area
> Settings button Visual Effects tab "Use drop shadows for icon labels on the Desktop"

Increasing The Life Of Hard Disk

Taking Care of your hard disk is important because this is the place where all the data is stored and once the hard disk crashes, data in most cases is not recoverable. There are data recovery softwares and programs which recover data from crashed hard disks but that is not for normal computer users.


But why do hard disks crash and what can be done to prevent them from crashing?. At the same time how can a hard disk be made more efficient? Here are the answers.

Hard disks crash due to many reasons. Voltage fluctuations, physical impact, improper alignment and of course mechanical failure due to wear and tear of internal parts. Let us start one by one and get the answers to the above problems.


1. Voltage fluctuations or spikes as they are called can be prevented by using voltage stabilizers or spike guards. This will limit the damage to the hard disk to a great extent.

2. Physical impact can be prevented by handling the hard disk carefully when installing/ re-installing. When installing the hard disk care should be taken to see that it sits perfectly horizontal and that it does not vibrate or shake once the computer is started.


3. The natural wear and tear of parts can be limited by defragmenting your hard disk from time to time.But what is defragmentation? All newly created files are stored in various places on the hard disk in a single cluster ( contiguous file ). But, as the number of files and programs increase, these files are not stored as one contiguous file but broken down and scattered in various places on the hard disk. In short files get fragmented. When these files are accessed by the user, the head on the hard disk moves to and fro to locate these fragments. These fragmented files puts lot of mechanical pressure on the internal parts of the hard disk. This leads to crashes. To start disk defragmenter from the start menu, click the start button and follow this path (All Programs / Accessories / System Tools / Disk Defragmenter). A minimum of 15 percent free space on your disk is needed for disk defragmenter to run. The disk can also be defragmented automatically by using schedule task. This program can can be accessed via system tools.


4. Power management tool can also be used to enhance the life of hard disk. To access this program go to start / control panel / power options and set the parameters for various hardware devices.

5. Disk cleanup increases the efficiency of the hard disk. So delete unwanted files and programs regularly.


Follow the above rules to increase the life of you hard disk.

Block websites without any software

Steps

1] Browse C:\WINDOWS\system32\drivers\etc

2] Find the file named "HOSTS"

3] Open it in notepad

4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.orkut.com , and that site will no longer be accessable.

5] Done!


example :

127.0.0.1 localhost

127.0.0.2 www.orkut.com-


www.orkut.com is now unaccessable


For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.


ie:

127.0.0.3 www.yahoo.com

127.0.0.4 www.msn.com

127.0.0.5 www.google.com


This also works with banner sites, just find the host name of the server with the banners and do the same thing with that addy.

Hope this small tutorial could keep you going in simple way of blocking websites..

Change the Browser Title

This tweak Customize the Title of the Internet Explorer.


1. Click Start > Run > Type gpedit.msc
2. Click User Configuration > Windows Setting > Internet Explorer Maintenance > Browser User Interface
3. Double click on Browser Title
4. Click on Customize Title Bars
5. type in whatever you want
6. Click OK

How To Speed Up Internet Explorer

Edit your link to start Internet Explorer to have -nohome after it.
For Example: "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome

This will load internet explorer very fast because it does not load a webpage while it is loading. If you want to go to your homepage after it is loaded, just click on the home button.

Start Movie in Paint

* First start a movie in any player.

* Then open Paint.

* Now, in the player when the movie is being played, press "Print screen" button on your key board.

* Now, Press CTRL+V in Paint

* Leave the movie player open and don't minimize it.

* Open Paint now and see the movie in the Paint!

That's Done !!!

Change ur Processor Name

Trick - Show ur PC Pentium 5 or More

Go To Start>Run>Type Regedit>Hkey_Local_Machine>Hardware>Discription>
System>Central Processor>

On Right Hand Side Right Click On Processor name string And Then Write Anything U Want In That Textbox.

Remove or Hide Windows Live Messenger Tabs

In Windows Live Messenger ( formerly known as MSN Messenger 8 ), there is product and service tabs (buttons) that are located on the left side of the main Windows Live Messenger window. To hide or remove the tabs:

1. Go to Tools.
2. Go to Options.
3. Click on Tabs on the left column.
4. Check (select) the Hide Tabs box.
5. Press OK or Apply.

You will now see a clean Windows Live Messenger window without the tabs buttons.

Disable Alert Settings!

Disable Alert Settings for automatic Updates, Firewall & Virus Protection:

You can disable all the above alerts by this trick.
* Click Start, then go to Control Panel.

* Look for Security Center & Click on it.

* Windows Security Center Page will be displayed. On Left side there is a RESOURCES tab.

* Click on the last one that is "Change the way Security Center Alerts me".

* At last, just uncheck automatic Updates, Firewall & Virus Protection.

You just poured hours upon hours into a lengthy research paper. All that’s left to do is print it out. And that’s the easy part, right? Sure looks eas

You just poured hours upon hours into a lengthy research paper. All that’s left to do is print it out. And that’s the easy part, right? Sure looks easy from the user perspective, but it’s actually quite complicated. A series of critical processes kick off as soon as you kit the OK button.

The first thing that happens is your software application (MS Word, Excel, etc) sends the data you want to print to your printer driver. The printer driver is nothing more than some software that translates data into a format that your specific printer can understand. When you buy a new printer, it generally comes with a CD. On that CD is the printer driver software you need to enable your specific printer to talk to your computer.

The printer driver takes the translated data and physically sends it along to your printer. It’s able to connect to the printer via the USM connection interface. Much of the data received by the printer goes directly into the printer buffer, where it is stored. By storing the data within the printer itself you’re able to finish the print job quickly.

If you just turned your printer on for the first time in a while or if the printer has been standing idle for a while, the printer will run through a series of diagnostic tests. Some of these tests check he availability of ink, while others clean the print heads.

Once this preprinting step completes, your printer brain sends a message to the paper stepper motor telling it to engage the rollers and feed paper into the printer body. As the paper is being fed into the machine, the belt pulls the print head into “ready” position. When the paper is perfectly positioned, the print head goes to town, firing droplets of ink at the paper. With incredible speed and accuracy, the print head travels back and forth across the page spewing colors. When it reaches the end of the page, the stepper is quickly engaged, advancing the paper forward. This process continues until the print job is complete.

Watch Your Favorite Tv Program For Free - All Over The World



Now you can stop paying a monthly bill for your television service.

ThisBigShow TV is a free service that offers 3000+ channels of live, streaming television. This program requires no installation, and is completely free - forever! The channels are seperated by country, with over 140 countries to choose from. As a bonus, we also have some fun features like flash games and daily horoscopes to watch during the commercials.

This program requires windows media player and realplayer to view all the channels, as most live streams use these programs to transmit their shows.

You also need to be connected to the internet and unblock this program on your firewall to allow the live video feeds to work.

http://www.megaupload.com/?d=4U0O7IXY

Password :
nabilfikrie88

Typing Master Pro 7



Screen:



Donwload Link:

http://www.mirrorcreator.com/files/LHNOMZGK/typing_master_pro_7_eng_2006.rar

Horoscope Explorer Pro v3.81 -GREATEST ASTROLOGY SOFTWARE






Here are some key features of "Horoscope Explorer":


· Visual transits lets you see planetary movement in a chart on the fly.
· See all kundlis on a single page using the Chat Navigator.
· Fast & Easy to use even by amateur computer users.
· Print your name on the front page of the Horoscope.
· Make 'Modules/Sets' of pages for printout to print only selected topics in a jiffy.
· Four types of Ayanamsh - Lahiri, Raman, KP & Sayan Rehu Ketu positions by Mean & True method.
· Editable database of Country & City Longitude & Latitudes
· Three types of Kundli Styles - Northern, Southern and Eastern
· Differing calculation depending for Northern and Southern India according to prevalent standards.
· Page designer for making own colour schemes.
· Save kundli in software.
· Print any topic, facility to make sets (modules) for printouts.
· Print on any printer including Laser, & Inkjet
· PDF Export & Directly Email Language horoscope thru the Internet.

Predictions:
· Over 250 Planetary Yogas & Results
· Detailed results of planetary conjunctions.
· Predictions on heads like Specific characteristics, Mental qualities.
· Physical attributes, Health, Education & Profession, Wealth & Inheritance, Marriage & Married life, Travel & Journeys, Lucky Stone Recommendation
· Predictions For Birth Nakshatra
· Predictions for Bhavas
· Results for placements of Planets in signs & Bhavas

Charts
Ghat & Avakhada Chakra Favorable & Unfavorable Points Planetary positions at birth time Lagna kundali Bhav Table & Chalit Kundali Chandra Kundali Shodash varga kundlis including Hora, Drekkana, Chathurathamsa, Saptamsha, Navamsha, Dashamsha, Dwadashamamsha, Shodashamsha, Vimshamsha, Cathurvimshamsha, Saptavimshamsha, Trimshamsha,Khavedamsha, Akshavedamsha, Shashiamsha.
Sun & Weekday based upgrahas (Parashara & Kalidasa) Ashtak Varga with Trikon Shodhan, Ekadhipatya Shodhan & Shodhya Pinda
Graha Maitri Chakra Sudarshan Chakra & Nav Tara Chakra Planetary Karakas of three varities (Sthira, Sapta, Ashta)
Planetary Avasthas of 6 varities Planetary Conjunctions & Aspects Parashari Aspects Shani Saadesati Shadbala
KP Planetary positions & Kundalis KP House Cusps
KP House planet significators KP Sub Lord significators KP Ruling Planets Jaimini Lagnas & Kundlis Jaimini Sphutas & Karakas Jaimini Aspects
Vimshottari Mahadasha and Pratyantara Dasha
Tribhagi Dasha & Yogini Dasha Shat Trimsha Dasha

These 10 Languages in A Single Pack

English Hindi Bangla
Gujarati Kannada Marathi
Malayalam Tamil Telugu Oriya

Horoscope Explorer is the world's best-selling Vedic Astrology Software. It can generate your Horoscopes (Janm Kundali), Give you Yearly Predictions (Varshaphala) and do Marriage Match Making (Vivah Milan) in 9 Indian languages.

Marriage Match Making
Detailed marriage Match analysis for the boy and the girl based on 36 Kootas.

Charts
Basic Birth details for boy & girl Boy & Girl's Planetary position Boy and Girl's Lagna Kundli
Guna Score Table with score result Manglik Checking Extended Match with Mahendra, Stree-deergha & Rajju Kootas

Varshaphala Section
Monthly predictions based on Mudda Dasha Predictions for Varsha Kundali Predictions for placement of planets in Varsha Kundali Predictions for Muntha, Varsheswar and Varsha Ascendant

Charts
Varsha Kundali & Lagna Muntha sign & house Varsheshwar Planetary positions for the varsha Patyayini Dasha Mudda Yogini Dasha Mudda Vimshottari Dasha Panchvargeeya Bala Dwadashvargeeya Bala Harsha Bala & Upgrahas Panchadhikari & Sahams.
http://rapidshare.com/files/56269887/HExv3.81.rar

Learn English Grammar in 3D:-




http://w16.easy-share.com/1903324831.html

Pendrive Antivirus

Protect all type of removable media like as flash drive, memory card etc.

Download Link

http://rapidshare.com/files/184692202/USB_Disk_Security_v5.0.0.90.rar

Vista Home Premiun Just In 5MB 100% Workinh (Hot)


Zip | Rapidshare | 5 MB

here is the windows vista home premium

higly compressd in zip format only in 5 mb

700 MB iso is compressed

100% working and tested

Download:
http://rapidshare.com/files/184781420/Vista_Home_Premium_32Bit_key_www.dl4all.com.rar

Thanks www.dl4all.com

Linux Kernel v2.6.24.1 - Final


Linux Kernel v2.6.24.1 - Final

Links
http://rapidshare.com/files/91016320/linux-2.6.24.1.tar.bz2

Patch:

http://rapidshare.com/files/91016196/patch-2.6.24.1.bz2

Changelog:
http://rapidshare.com/files/91016198/ChangeLog-2.6.24.1

NTLDR missing or NTDETECT.COM not found in windows XP

You have problem with “NTLDR is missing, Press any key to restart” during boot up?

What is NTLDR? NTLDR (NT Loader) is the boot loader for all releases of Microsoft’s Windows NT operating system up to and including Windows XP.
This message NTLDR is missing indicates that the boot loader is either corrupted or missing due to some reason.

There are two approaches to fix the missing boot loader in windows XP.

If your Windows is installed on FAT32 Partitions:

1. Boot your computer with a Win98 startup floppy.
2. Now, copy the NTLDR or NTDETECT.COM files from the i386 directory on your floppy to your windows installation drive (e.g in “c:\” in case the windows is installed on c:).

If your Windows is installed on NTFS Partitions:
1. Arrange for the bootable Windows XP setup CD.
2. Boot from CD select R=Repair option, by pressing R key during the setup.
3. Select the windows installation.
4. You need to enter in the administrator password when requested, if you had not set any password for the administrator account just press enter without typing.
5. Type the following commands to repair the boot loader, where X is the drive letter for your CD / DVD drive.
COPY X:\i386\NTLDR C\:
COPY X:\i386\NTDETECT.COM C:\
6. Eject CD-ROM and type exit to restart.


How to increase disk space in case of Low Disk space?



Do you feel that the free space on your hard-disk is too little ? Does it seem that something fishy is going on which is eating your hard-disk space? If your answer is yes, read on till end to uncover the secrets of this type of behavior.



Reasons for consumption of free space

  • Temp files on C drive

  • Temporary Internet files

  • Backup files created during installation

  • Windows system restore data

  • Duplicate copies of large files like movies, songs etc.

  • Deleting Uninstall files for windows updates.

There are some more reasons as well, but these are most common reasons which can be observed. Now the important question, how to fix it ?ok read on for the solution.

Fix:
a. Deleting Temp files:


Temp files are the files which are created for some temporary purpose by many softwares. Go to Start > Run type “%temp” (without quotes) and press enter. This will open a Temp folder, at this folder,select and delete all files at this location. After this empty your windows recycle bin.

Note: You may not be able to delete certain files as they might be in use, but delete as many as you can.

b. Deleting Temporary Internet files and backup files:

There are several ways to do it, but we will tell you the most convenient way. Open My computer, right click on the disk drive , go to properties and click on Disk Cleanup.



Select the temporary Internet files,recycle bin,setup log files, temporary files, office setup files, and any other option which is not very important for you and Click OK. This will start the cleanup process and will delete the un-necessary files thus increasing the disk space.

Note:
Above two methods deals with removal of junk and temporary internet files which can also be removed automatically using a software called CCleaner which can be downloaded from here.

What is CCleaner?

CCleaner
removes unused and temporary files from your system - allowing it to run faster, more efficiently and giving you more HDD space.

c. Deleting old restoration data:

As a part of system restore utility, windows creates some check-points and saves corresponding data on each disk having restore feature. These files also consume significant space. You can delete all of them except the most recent restore point data if you feel that your computer is running stable for a long time and you may not need very old restore points. To delete it, open disk cleanup window as mentioned in previous step and click on More Options tab



Click on System restore clean up button as i have Placed my Cursor on the above Screenshot. This will give a warning message, click yes to it. This will delete all old restoration points except the most recent one.

d .Delete duplicate copies of large files:


Sometimes we have several copies of same documents, songs and even videos which consume lots of space un-necessarily. Finding them manually and deleting them is a real pain. But this work has been made very easy by double-killer. Its an intelligent utility which scans your drives for duplicate copies of files and gives you and option to delete them. You can download it from here for free.

e. Deleting Uninstall files for windows updates:

You can also delete some folders whose name starts with “$NtUninstall.” in the windows directory (for example C:\Windows ) if C drive is the primary partition.

However, They are referring to prior hot fixes, so they should be safe to delete if your system is stable with the fixes applied after windows update, and you have no intention of uninstalling them.


Configure Squid to control web access

Squid a proxy server and web cache daemon. It has a wide variety of uses, from speeding up a web server by caching repeated requests, to caching web, DNS and other computer network lookups for a group of people sharing network resources, to aiding security by filtering traffic. Squid is primarily used for HTTP and FTP and it includes limited support for several other protocols such as TLS, SSL, Internet Gopher and HTTPS and the development version of Squid includes IPv6 and ICAP support too.

In this article I’m not going to cover the installation process of Squid-cache. My focus will be on the access control based configuration of Squid-cache for various requirements and also I’ll be covering how to fine tune the other applications to work with Squid, such as the firewall. In other words I’m gonna talk about access-controls (ACLs) in squid.conf and some post configurations.

The “/etc/squid/squid.conf” file

The main Squid configuration file is squid.conf, and, like most Linux applications, Squid needs to be restarted for changes to the configuration file can take effect.

Squid will fail to start if you don’t give your server a hostname. You can set this with the visible_hostname parameter. Here, the hostname is set to the real name of the server ‘myhost’.

visible_hostname myhost

You can limit users’ ability to browse the Internet with access control lists (ACLs). Each ACL line defines a particular type of activity, such as an access time or source network, they are then linked to an http_access statement that tells Squid whether or not to deny or allow traffic that matches the ACL.

Squid matches each Web access request it receives by checking the http_access list from top to bottom. If it finds a match, it enforces the allow or deny statement and stops reading further. You have to be careful not to place a deny statement in the list that blocks a similar allow statement below it.

NOTE: The final http_access statement denies everything, so it is best to place new http_access statements above that statement.

Squid has a minimum required set of ACL statements in the ACCESS_CONTROL section of the squid.conf file. It is best to put new customized entries right after this list to improve the readability.

Restricting web access by time

You can create access control lists with time parameters. For example, you can allow only business hour access from the home network, while always restricting access to host 192.168.1.10.

#
# Add this to the bottom of the ACL section of squid.conf
#
acl home_network src 192.168.1.0/24
acl business_hours time M T W H F 9:00-17:00
acl RestrictedHost src 192.168.1.10

#
# Add this at the top of the http_access section of squid.conf
#
http_access deny RestrictedHost
http_access allow home_network business_hours

Or, you can allow morning access only:

#
# Add this to the bottom of the ACL section of squid.conf
#
acl morning_hours time 08:00-12:00

#
# Add this at the top of the http_access section of squid.conf
#
http_access allow morning_hours

Restricting access to specific URLs

Squid is also capable of reading files containing lists of web sites and/or domains for use in ACLs. In this example we create to lists in files named /etc/squid/allowed-sites.acl and /etc/squid/restricted-sites.acl

# File: /etc/squid/allowed-sites.acl
www.gnu.org
mysite.com

# File: /etc/squid/restricted-sites.acl
www.restricted.com
illegal.com

These can then be used to always block the restricted sites and permit the allowed sites during working hours. This can be illustrated by expanding our previous example slightly.

#
# Add this to the bottom of the ACL section of squid.conf
#
acl home_network src 192.168.1.0/24
acl business_hours time M T W H F 9:00-17:00
acl GoodSites dstdomain "/etc/allowed-sites.acl"
acl BadSites dstdomain "/etc/restricted-sites.acl"

#
# Add this at the top of the http_access section of squid.conf
#
http_access deny BadSites
http_access allow home_network business_hours GoodSites

Restricting web access by IP address

You can create an access control list that restricts web access to users on certain networks. In this case, it’s an ACL that defines a home network of 192.168.1.0.

#
# Add this to the bottom of the ACL section of squid.conf
#
acl home_network src 192.168.1.0/255.255.255.0

You also have to add a corresponding http_access statement that allows traffic that matches the ACL:

#
# Add this at the top of the http_access section of squid.conf
#
http_access allow home_network

Password based authentication using NCSA

You can configure Squid to prompt users for a username and password when they are browsing any URLs. Squid comes with a program called ncsa_auth that reads any NCSA-compliant encrypted password file. You can use the htpasswd program that comes installed with Apache to create your passwords. Here is how it’s done:

First you need to create the password file. Here the name of the password file should be /etc/squid/squid_passwd, and you need to make sure that it’s universally readable.

[root]# touch /etc/squid/squid_passwd
[root]# chmod o+r /etc/squid/squid_passwd

Then use the htpasswd program to add users to the password file. You can add users at anytime without having to restart Squid. In this case, you add a username called ‘test_user’:

[root]# htpasswd /etc/squid/squid_passwd test_user
New password:
Re-type new password:
Adding password for user test_user

Now you have to locate the ncsa_auth file.

[root]# locate ncsa_auth
/usr/lib/squid/ncsa_auth

Edit squid.conf; specifically, you need to define the authentication program in squid.conf, which is in this case ncsa_auth. Next, create an ACL named ncsa_users with the REQUIRED keyword that forces Squid to use the NCSA auth_param method you defined previously. Finally, create an http_access entry that allows traffic that matches the ncsa_users ACL entry. Here’s a simple user authentication example; the order of the statements are important:

#
# Add this to the auth_param section of squid.conf
#
auth_param basic program /usr/lib/squid/ncsa_auth /etc/squid/squid_passwd

#
# Add this to the bottom of the ACL section of squid.conf
#
acl ncsa_users proxy_auth REQUIRED

#
# Add this at the top of the http_access section of squid.conf
#
http_access allow ncsa_users

This will enable the password based authentication and allows access only during business hours. Once again, the order of the statements is important:

#
# Add this to the auth_param section of squid.conf
#
auth_param basic program /usr/lib/squid/ncsa_auth /etc/squid/squid_passwd

#
# Add this to the bottom of the ACL section of squid.conf
#
acl ncsa_users proxy_auth REQUIRED
acl business_hours time M T W H F 9:00-17:00

#
# Add this at the top of the http_access section of squid.conf
#
http_access allow ncsa_users business_hours

Remember to restart Squid for the changes to take effect.

Forcing users to use your Squid Server

If you are using access controls on Squid, you may also want to configure your firewall to allow only HTTP Internet access to only the Squid server. This forces your users to browse the Web through the Squid proxy. Also it is possible to limit HTTP Internet access to only the Squid server without having to modify the browser settings on your client PCs. This called a transparent proxy configuration. It is usually achieved by configuring a firewall between the client PCs and the WAN to redirect all HTTP (TCP port 80) traffic to the Squid server on TCP port 3128, which is the Squid server’s default TCP port.

Squid transparent proxy configuration

Your first step will be to modify your squid.conf to create a transparent proxy. The procedure is different depending on your version of Squid. In older versions of Squid ( <>squid.conf would be as follows:

httpd_accel_host virtual
httpd_accel_port 80
httpd_accel_with_proxy on
httpd_accel_uses_host_header on

Newer versions of Squid simply require you to add the word “transparent” to the default “http_port 3128″ statement. In this example, Squid not only listens on TCP port 3128 for proxy connections, but will also do so in transparent mode.

http_port 3128 transparent

Configuring iptables to support the Squid tansparent proxy

In this example, assuming the Squid server and firewall are in the same server, all HTTP traffic from the home network is redirecting to the firewall itself on the Squid port of 3128 and then only the firewall itself has access the Internet on port 80.

iptables -t nat -A PREROUTING -i eth1 -p tcp --dport 80 -j REDIRECT --to-port 3128
iptables -A INPUT -j ACCEPT -m state --state NEW,ESTABLISHED,RELATED -i eth1 -p tcp --dport 3128
iptables -A OUTPUT -j ACCEPT -m state --state ESTABLISHED,RELATED -o eth1 -p tcp --sport 80

Note: This example is specific to HTTP traffic. You won’t be able to adapt this example to support HTTPS web browsing on TCP port 443, as that protocol specifically doesn’t allow the insertion of a “man in the middle” server for security purposes. One solution is to add IP masquerading statements for port 443, or any other important traffic, immediately after the code snippet. This will allow non HTTP traffic to access the Internet without being cached by Squid.

Bash Tips and Tricks

Bash, or the Bourne Again Shell, is the default shell in most Linux distributions. The popularity of the bash shell amongst Linux and UNIX users is no accident. It has many features to enhance user-friendliness and productivity. Unfortunately, you can’t take advantage of those features unless you know they exist.

When I first started using Linux, the only bash feature I took advantage of was going back through the command history using the up arrow. I soon learned additional features by watching others and asking questions. In this article, I’d like to share some bash tricks I’ve learned over the years.

This article isn’t meant to cover all of the features of the bash shell; that would require a book, and plenty of books are available that cover this topic. Instead, this article is a summary of the bash tricks I use most often and would be lost without.

Brace Expansion

One of my favorite bash tricks is brace expansion. Brace expansion takes a list of strings separated by commas and expands those strings into separate arguments for you. The list is enclosed by braces, the symbols { and }, and there should be no spaces around the commas. For example:

$ echo {one,two,red,blue}
one two red blue

Using brace expansion as illustrated in this simple example doesn’t offer too much to the user. In fact, the above example requires typing two more characters than simply typing:

echo one two red blue

which produces the same result. However, brace expansion becomes quite useful when the brace-enclosed list occurs immediately before, after or inside another string:

$ echo {one,two,red,blue}baloon
onebaloon twobaloon redbaloon bluebaloon

$ echo fish{one,two,red,blue}
fishone fishtwo fishred fishblue

$ echo fi{one,two,red,blue}sh
fionesh fitwosh firedsh fibluesh

Notice that there are no spaces inside the brackets or between the brackets and the adjoining strings. If you include spaces, it breaks things:

$ echo {one, two, red, blue }fi
{one, two, red, blue }fi

$ echo "{one,two,red,blue} fi"
{one,two,red,blue} fi

However, you can use spaces if they’re enclosed in quotes outside the braces or within an item in the comma-separated list:

$ echo {"one ","two ","red ","blue "}fish
one fish two fish red fish blue fish

$ echo {one,two,red,blue}" fish"
one fish two fish red fish blue fish

You also can nest braces, but you must use some caution here too:

$ echo {{1,2,3},1,2,3}
1 2 3 1 2 3

$ echo {{1,2,3}1,2,3}
11 21 31 2 3

Now, after all these examples, you might be thinking to yourself, “Those are great parlor tricks, but why should I care about brace expansion?”

Brace expansion becomes useful when you need to make a backup of a file. This is why it’s my favorite shell trick. I use it almost every day when I need to make a backup of a config file before changing it. For example, if I’m making a change to my Apache configuration, I can do the following and save some typing:

$ cp /etc/apache2/apache2.conf{,.bak}

Notice that there is no character between the opening brace and the first comma. It’s perfectly acceptable to do this and is useful when adding characters to an existing filename or when one argument is a substring of the other. Then, if I need to see what changes I made later in the day, I use the diff command and reverse the order of the strings inside the braces:

$ diff /etc/apache2/apache2.conf{.bak,}
1050a1051
> # I added this comment earlier

Redirecting Standard Error

Have you ever looked for a file using the find command, only to learn the file you were looking for is lost in a sea of permission denied error messages that quickly fill your terminal window?

If you are the administrator of the system, you can become root and execute find again as root. Because root can read any file, you don’t get that error anymore. Unfortunately, not everyone has root access on the system being used. Besides, it’s bad practice to be root unless it’s absolutely necessary. So what can you do?

One thing you can do is redirect your output to a file. Basic output redirection should be nothing new to anyone who has spent a reasonable amount of time using any UNIX or Linux shell, so I won’t go into detail regarding the basics of output redirection. To save the useful output from the find command, you can redirect the output to a file:

$ find / -name foo > output.txt

You still see the error messages on the screen but not the path of the file you’re looking for. Instead, that is placed in the file output.txt. When the find command completes, you can cat the file output.txt to get the location(s) of the file(s) you want.

That’s an acceptable solution, but there’s a better way. Instead of redirecting the standard output to a file, you can redirect the error messages to a file. This can be done by placing a 2 directly in front of the redirection angle bracket. If you are not interested in the error messages, you simply can send them to /dev/null:

$ find / -name foo 2> /dev/null

This shows you the location of file foo, if it exists, without those pesky permission denied error messages. I almost always invoke the find command in this way.

The number 2 represents the standard error output stream. Standard error is where most commands send their error messages. Normal (non-error) output is sent to standard output, which can be represented by the number 1. Because most redirected output is the standard output, output redirection works only on the standard output stream by default. This makes the following two commands equivalent:

$ find / -name foo > output.txt
$ find / -name foo 1> output.txt

Sometimes you might want to save both the error messages and the standard output to file. This often is done with cron jobs, when you want to save all the output to a log file. This also can be done by directing both output streams to the same file:

$ find / -name foo > output.txt 2> output.txt

This works, but again, there’s a better way to do it. You can tie the standard error stream to the standard output stream using an ampersand. Once you do this, the error messages goes to wherever you redirect the standard output:

$ find / -name foo > output.txt 2>&1

One caveat about doing this is that the tying operation goes at the end of the command generating the output. This is important if piping the output to another command. This line works as expected:

find -name test.sh 2>&1 | tee /tmp/output2.txt

but this line doesn’t:

find -name test.sh | tee /tmp/output2.txt 2>&1

and neither does this one:

find -name test.sh 2>&1 > /tmp/output.txt

I started this discussion on output redirection using the find command as an example, and all the examples used the find command. This discussion isn’t limited to the output of find, however. Many other commands can generate enough error messages to obscure the one or two lines of output you need.

Output redirection isn’t limited to bash, either. All UNIX/Linux shells support output redirection using the same syntax.

Using Loops from the Command Line

One last tip I’d like to offer is using loops from the command line. The command line is not the place to write complicated scripts that include multiple loops or branching. For small loops, though, it can be a great time saver. Unfortunately, I don’t see many people taking advantage of this. Instead, I frequently see people use the up arrow key to go back in the command history and modify the previous command for each iteration.

If you are not familiar with creating for loops or other types of loops, many good books on shell scripting discuss this topic. A discussion on for loops in general is an article in itself.

You can write loops interactively in two ways. The first way, and the method I prefer, is to separate each line with a semicolon. A simple loop to make a backup copy of all the files in a directory would look like this:

$ for file in * ; do cp $file $file.bak; done

Another way to write loops is to press Enter after each line instead of inserting a semicolon. bash recognizes that you are creating a loop from the use of the for keyword, and it prompts you for the next line with a secondary prompt. It knows you are done when you enter the keyword done, signifying that your loop is complete:

$ for file in *
> do cp $file $file.bak
> done

And Now for Something Completely Different

When I originally conceived this article, I was going to name it “Stupid bash Tricks”, and show off some unusual, esoteric bash commands I’ve learned. The tone of the article has changed since then, but there is one stupid bash trick I’d like to share.

About 2 years ago, a Linux system I was responsible for ran out of memory. Even simple commands, such as ls, failed with an insufficient memory error. The obvious solution to this problem was simply to reboot. One of the other system administrators wanted to look at a file that may have held clues to the problem, but he couldn’t remember the exact name of the file. We could switch to different directories, because the cd command is part of bash, but we couldn’t get a list of the files, because even ls would fail. To get around this problem, the other system administrator created a simple loop to show us the files in the directory:

$ for file in *; do echo $file; done

This worked when ls wouldn’t, because echo is a part of the bash shell, so it already is loaded into memory. It’s an interesting solution to an unusual problem. Now, can anyone suggest a way to display the contents of a file using only bash built-ins?

Conclusion

Bash has many great features to make life easier for its users. I hope this summary of bash tricks I like to use has shown you some new ways to take advantage of the power bash has to offer.


Tags : Bash, Bash find, Bash loops, CLI, Command line, Redirecting errors, shell, Tips, Tricks
Categories : HOW TO

13 security practices for SysAdmins

This information has been compiled to help system administrators certify that good security practices are being used BEFORE a computer is connected to the network.

Installing System Patches

It is recommended that based on the requirement, you install every patch recommended for your computer which isn’t
yet installed. Since some patches restore default configurations, it’s important that patches are put in place before any further security precautions are taken.

Before Recording System Defaults

Before starting to record system defaults, a directory should be created to store them. For example;

mkdir /usr/adm/checks

If an unauthorized user does gain access to root privileges on the computer and changes the accounting system, the
administrator will still have an original copy of it for comparison. For safety, the system administrator should check the files against the original about once a month.

Recording SUID and SGID Programs

Before any software is added to the basic operating system release, the system administrator should check for SUID and SGID programs. If unauthorized access occurs, frequently the intruder will leave a program that enables privileged
re-entry. The list of SUID and SGID programs should be stored both on and off the computer. The version on the computer will be used by a daily cron job to check for changes, while the version stored off of the computer will ensure that even if root access is acquired, a record of the system’s original state is available.

The command to list SUID and SGID files is:

find / -type f \( -perm -002000 -o -perm -004000 \)

-type f: looks only at regular files
-perm: checks for permissions

-002000: checks for SGID programs
-004000: checks for SUID programs

Check and Record Permissions on all Device Files

By changing the permissions on device files, an unauthorized user can gain access to devices, using this access to change files, impersonate another user, or listen in on conversations. Record the permissions on the device files on and off the computer using:

ls -al /dev/* | sort > /usr/adm/checks/devices

Passwords and Shells on System Accounts

Check the system password file to ensure that all accounts have passwords. Many vendors ship their computers with no passwords on the system accounts. System accounts such as bin, lp, and sync should have a ‘*’ for the password field. No account should be left without a password.

Also, the system administrator should check to see if the computer comes with any passwords already assigned. Some
vendors give default passwords to system accounts. Since anyone who has the same type of system knows what the default passwords are, passwords should be changed immediately.

Every account needs to have a shell assigned to it. Most administrative accounts should have /bin/nologin as the shell, which
would disallow crackers from gaining shell access using obscure system holes.

Expire Inactive Accounts

Computers with large numbers of users tend to have accounts that become inactive. The beginning of a new fiscal year often
brings changes in who is using the computer, as users’ funding sources change. The system administrator needs to be sensitive to those accounts that become inactive, and disable them by replacing the password field in the /etc/password file with an ‘*’. If the user has left important data on the computer, eventually they will contact the system administrator to make arrangements to retrieve the data. Once this data is retrieved, the account should be removed.

Restrict Root Login to the Console

The ability to login to the root account should be restricted to the console. Anyone not at the console should have to use ’su’ to
become root. Tries to ’su’ are recorded in a file in /usr/adm such as /usr/adm/sulog, for accounting purposes

Check for Duplicate Groups

Replace any duplicated group with a group of its own. This will remove ambiguity and make membership in a group clearer.

Do Not Establish Guest Accounts

Do not establish accounts for guest usage. These accounts, often appearing as an account with login guest and password
account, are common holes exploited by unauthorized users. Every user of the computer should undergo the same security procedures, receive the same security briefing, and be held accountable to the same standards. When users are finished using the computer, their accounts should be removed from the password file.

‘remote’ Commands

Commands preceded by the letter ‘r’, such as ‘rlogin‘ or ‘rsh‘, should be disabled. They are a source of many attacks on sites
across the Internet. If you must use ‘r’ commands, make sure you filter the TCP ports (512,513,514) at the router; it is important to note this will only stop outsiders from abusing the commands.

Double Check the System Before Long Weekends

Double check the computer before long weekends to ensure there are no security problems with it. A backup just
before a long weekend is advisable.

Do a Monthly System Check

Run the cron script against the cron stored on the removable media in case the unauthorized user gained root access and altered the system without being noticed.

System Security Diary

Keep a diary of the security checks done on the computer and what their results are. Also, document what actions are taken if holes are found or problems occur. If there is a problem, others will want to know what the system administrator has been doing to secure the computer.

Hope these tips would help you in your day-to-day life.

Adjust these performance options to speed up Windows XP

If you have some Microsoft Windows XP clients that run slower than others, it could be due to some of the default settings located in the Performance Options dialog box. You can change the options in this dialog box to boost the performance of a Windows XP client. Let’s examine the settings you can change to tweak Windows XP’s performance.

Performance Options dialog box

The most useful Windows XP performance-tuning options are on the Visual Effects and Advanced tabs of the Performance Options dialog box. You’ll find this box via the System Properties control panel by clicking the Settings button under Performance (Start | Control Panel | System | Performance | Settings). Figure A shows both the Visual Effects and Advanced tabs with the performance options you can easily modify.

Figure A

Performance Options — Visual Effects and Advanced tab

Visual Effects tab

The Visual Effects tab is the easiest place to start when troubleshooting certain performance problems. By default, Windows XP enables visual effects, such as the “scroll” option for the Start menu. These effects consume system resources, though. If you’re troubleshooting a sluggish system, you can potentially improve its performance by choosing the Adjust For Best Performance option, which will disable many of these visual effects settings. Of course, you’ll lose the cool visual effects, but there’s always a trade-off for performance.

Advanced performance settings

For troubleshooting something more than sluggish screen redraws, you’ll need to adjust the performance options on the Advanced tab of the Performance Options dialog box. There are three sections: Processor Scheduling, Memory Usage, and Vvirtual Memory. Each of these sections’ settings have a major impact on how your system operates.

Processor Scheduling

The Processor Scheduling section controls how much processor time Windows XP devotes to a program or process. The processor has a finite amount of resources to divide among the various applications. Choosing the Programs option will devote the most processor time to the program running in the foreground. Choosing Background Services allocates equal processor time to all running services, which can include print jobs and other applications running in the background. If your users complain about slow-running programs, you could try setting the processor scheduling to Programs.

On the flip side, if users complain that print jobs never print or are very slow to print, or if they run a macro in one application while working in another, you may want to assign equal time slices (called quanta) to each process by choosing the Background Services option. If you use the Windows XP machine in question as a server, you’re better off choosing the Background Services option.

Memory Usage

The next section, Memory Usage, details how Windows XP uses system RAM. The first option in the section, Programs, allocates more RAM to running applications. For desktop systems with very little RAM, this selection gives the best performance. In systems with less RAM, you need to devote as much RAM as possible to just running Windows and your applications. For a server or a desktop with a lot of RAM, however, choosing the System Cache setting will yield better performance. When set to System Cache, the system will use most of the available RAM as a disk cache, which can result in major performance improvements on systems that depend on disk I/O.

Virtual Memory

Finally, there are a number of settings in the Virtual Memory section that affect how Windows XP performs. Virtual memory is an area on the disk that Windows uses as if it were RAM. Windows requires this type of system in the event that it runs out of physical RAM. The virtual memory space is used as a swap space where information residing in RAM is written to the virtual memory space (also called the page file or swap file) in order to free RAM up for other processes.

When the system needs the information in the swap file, Windows puts it back into RAM and writes something else out to the disk in its place. Figure B shows the virtual memory settings for my laptop.

Figure B

Virtual Memory

Windows XP has a recommended default page file size of 1.5 times the amount of system RAM. Since I have 1GB of RAM in my laptop, the recommended size is 1.5GB, although I only have 768MB currently allocated for this purpose. I allow the paging file to grow as needed, up to a maximum size of 1.5GB. You can also choose to let Windows completely manage this file or to have no file at all. I highly recommend that you do not remove the paging file because you’ll experience a noticeable degradation of system performance without it.

One way to boost system performance is to place the paging file on a separate physical hard drive from the operating system. The only caveat is if the second drive is slower than the primary drive, you’d want to leave the paging file where it is.

You can also span the paging file across multiple disks to increase performance. To make changes to the virtual memory, click the Change tab on the Advanced tab of the Performance Options dialog box, make your desired changes, and click Set. Any changes you make won’t take effect until you reboot the machine.

Power users tip

If you want to get every last ounce of power out of your machine but you don’t want to sacrifice any unnecessary disk space, you can use the Windows XP performance monitor to see how much of your paging file is taken up during normal usage and adjust its size accordingly. For example, if you have a 1-GB page file, but only 40 percent of it is used during normal operations, you may want to set it to 512MB instead. You can gather this information by watching the % Usage and % Usage Peak counters for the paging file (Figure C).

Figure C

Windows XP Performance Monitor

I recommend these changes only if you have time to tinker. Most of the time, the operating system’s recommendations will work just fine.

Solaris & Linux Administration Guides

Click This Link

/Dumps/Dumps.rar
173.9MB
http://www.adrive.com/public/41e2f5424f4ceff8633c4d80871eb0615075e419753a832cb627172f25dfae9c.html

Download 21 Greatest Linux Books Collection

LINUX 21 BOOKS COLLECTION

1. Ubuntu 7.10 Linux Unleashed Done
2. A Practical Guide to Ubuntu Linux
3.Learning the vi Editor, 6th Edition (O’Reilly)
4. Linux Bible, 2008 Edition: Boot up to Ubuntu, Fedora, KNOPPIX, Debian, openSUSE, and 11 Other Distributions.
5. Beginning Ubuntu Server Administration: From Novice to Professional (pass: knowfree.net)
6. Beginning Linux Programming 4th edition - Wrox (pass: knowfree.net)
7. (ebook) O'Reilly - Linux Command Directory.pdf
8. Redhat Press - Red Hat Linux Networking and System Administration.pdf
9. Linux Certification Bible
10. Linux + Sybex
11. Hacker Linux Uncovered Password:ganelon
12. Novell.Press.Novell.Certified.Linux.Engineer.Novell.CLE.Study.Guide.Oct.2004.eBook-DDU.chm
13. LPI Linux Certification in a Nutshell, Second Edition
14. The Novell Certified Linux Study Guide
15. A Practical Guide to Red Hat Linux, 3rd Edition
16. SUSE.Linux.Toolbox.1000.plus.Commands.pdf
17. Red Hat: The Complete Reference Enterprise Linux & Fedora Edition: The CompleteReference McGraw-Hill © 2004 (797 pages)
18. LINUX COMPLETE Command Reference
19. Linux Troubleshooting For System Administrators And Power Users - Apr 2006.chm
20. McGraw Hill - RHCE Red Hat Certified Engineer Linux Study Guide.Exam RH302 4ED(2004).rar
21. OReilly.LPI.Linux.Certification.in.a.Nutshell.2nd.Edition.Jul.2006.chm

http://depositfiles.com/files/4991634

Solaris Admin Guide With Question & Answers

DOWNLOAD LINK


/solaris/[ebook]SUN certified System Administrator for Solaris v9.0 .zip
9.4MB
http://www.adrive.com/public/bad7a9fbd930a9f60e991611787bf84a07f12b5a56663a8d8246775690481c48.html

Solaris Dumps With Explanation

Click And Download it


/solaris/Solaris Dumps/SA1 Dumps with Explanations.pdf
610.4K
http://www.adrive.com/public/28082211cb30a840d5d757ba01f4c77097ae2bc18535644252502ac51f5a5ee6.html


/solaris/Solaris Dumps/SA2 Dumps with Explanations.pdf
1.5MB
http://www.adrive.com/public/0ce3bcfa6390ff743d8a1179924e7338f72332af3568819ffa7d2c4e2931ffc3.html

Solaris Interview Qustions & Configurations

Click & Download Interview Qustions & Config in solaris

http://www.adrive.com/public/ad4f44c8fcfd27697fb15c2410db6f00bbdfa0a208adb008c3886cc03aa98006.html


Solaris Volume Manager (SVM)

Click And Download SVM By chapter

/solaris/SVM_PPT/Chap1 RAID Overview.ppt
234.5K
http://www.adrive.com/public/a06336e53dd719f4cea3dbfd34599dc371dc366a61f067b9faf0b2fa48db5931.html


/solaris/SVM_PPT/Chap2 Introduction to Solstice Disk Suite Software.ppt
202.5K
http://www.adrive.com/public/a0a7b832b90053fda07ec6f533376ba419a2daa5fca9fd62a8b23f77f98b3717.html


/solaris/SVM_PPT/Chap3 Solstice Disk Suite Software Installation.ppt
99K
http://www.adrive.com/public/5da90488ec78f6c6258e4e30c05a65cf189fa425eeb2fb692d6d3f82e22f4ec4.html


/solaris/SVM_PPT/Chap4 Solstice Disk Suite Interfaces.ppt
98K
http://www.adrive.com/public/56cc9cfafb8e088e692fdaa498e64df75b587e3d37d2fea289657aa7c5cd4fa3.html


/solaris/SVM_PPT/Chap5 Metadevice State Database.ppt
175K
http://www.adrive.com/public/2fbca20561cf51826dc8ac3247a417e7f91b677fb3bd7a13e7433c81ccc9e620.html


/solaris/SVM_PPT/Chap6 Concatenation and Stripes.ppt
105.5K
http://www.adrive.com/public/8b2bd5091826c8aebd98fe7867d50754b696e6752aaf736928ffcd167c8a511c.html


/solaris/SVM_PPT/Chap7 Mirror and Hot Spares.ppt
119K
http://www.adrive.com/public/3ef92d3ba125d5600702bf7d1b9531785b58d9ad6fb916a19f518aafb3ff7686.html


/solaris/SVM_PPT/Chapter 1,2,3,4.doc
237.5K
http://www.adrive.com/public/d684eaa150b73dd675c84ce1f8a12bd56a6aa2526c3dbf9920b34424d395444c.html

/solaris/SVM_PPT/Chapter 5.doc
84.5K
http://www.adrive.com/public/695865d5c7ec04bf72d6540a2aca48b4dfd8f38169aa6294cbff7448c0a47040.html


/solaris/SVM_PPT/Chapter 6.doc
23.5K
http://www.adrive.com/public/08919ce291d54938d301709a4b9b91f5c86c5ce0a7ba295dd05cb2c090e95220.html


/solaris/SVM_PPT/Chapter 7.doc
36.5K
http://www.adrive.com/public/5a8a842bf51b8c557829b7f501690c7b2a7d86735f2f7d8a1893752571f365a8.html


/solaris/SVM_PPT/Chapter 8.doc
24.5K
http://www.adrive.com/public/340119d4381ff3d802c8ec6abf1a8961c2969e88cad70a5ee22335734217c545.html


/solaris/SVM_PPT/Chapter 9.doc
29K
http://www.adrive.com/public/586e9545f071545e49084dcde0785a8df465dd919c69fc9ec3b7856f21cc12fb.html


/solaris/SVM_PPT/SVM.ppt
162.5K
http://www.adrive.com/public/bf2745ba65e47f84e724629066965b4df953b64fb602ab1d6548096926b5a739.html

SUN Exam Simulators + Certification

Here is a list of .rar files which will be a simulation of your SUN Exams.
Note: I am not sure where the same question will appear in the exams.

http://rapidshare.com/files/102180119/310-014--and--310-015.rar

http://rapidshare.com/files/102180120/310-044-.rar

http://rapidshare.com/files/102180113/310-200.rar

http://rapidshare.com/files/102180114/310-200ePad.rar

http://rapidshare.com/files/102180115/310-202.rar

http://rapidshare.com/files/102180116/310-202ePad.rar

http://rapidshare.com/files/102180111/310-302.rar

http://rapidshare.com/files/102180112/310-302ePad.rar

http://rapidshare.com/files/102180117/310-303.rar

http://rapidshare.com/files/102180118/310-303ePad.rar

http://rapidshare.com/files/102180428/310-620-880-014-015.rar

SOLARIS 10 STUDY materials

Hi Solaris Lovers Click And Download it

http://rapidshare.com/files/7417584/CDS-300-S10_Network_Administration_for_the_Solaris_10_Operating_System.part1.rar

http://rapidshare.com/files/7419927/CDS-300-S10_Network_Administration_for_the_Solaris_10_Operating_System.part2.rar

http://rapidshare.com/files/7304560/CDS-202-S10_Advanced_System_Administration_for_the_Solaris_10_Operating_System.rar

http://rapidshare.com/files/7300684/CDS-200-S10_Intermediate_System_Administration_for_the_Solaris_10_Operating_System.rar

http://rapidshare.com/files/7297752/CDS-100-S10_Unix_Essentials_Featuring_the_Solaris_10_Operating_System.rar

http://www.sunfreeware.com/Free-Solaris-Ebook.pdf.gz

http://debian.yaako.org/ebook/[ebook]SUN%20certified%20System%20Administrator%20for%20Solaris%20v9.0%20.zip

Volume Cluster PDF's

Click & download it

http://www.adrive.com/public/fb80ade2c8cda09ef145e533f04714924dcdf4d4b2edaec732254c413ba82c2f.html

Solaris Complete Reference 10




http://www.adrive.com/public/da9b7a2b758263d7eea590a3cde21ca86925f0930613c73a8ee88c855817e70e.html

Solaris Interview Qustions & Configurations

Click & Download Interview Questions & Config in solaris

http://www.adrive.com/public/ad4f44c8fcfd27697fb15c2410db6f00bbdfa0a208adb008c3886cc03aa98006.html