Low-Level Formatting

Low-level formatting is the process of outlining the positions of the tracks and sectors on the hard disk, and writing the control structures that define where the tracks and sectors are. This is often called a "true" formatting operation, because it really creates the physical format that defines where the data is stored on the disk. The first time that a low-level format ("LLF") is performed on a hard disk, the disk's platters start out empty. That's the last time the platters will be empty for the life of the drive. If an LLF is done on a disk with data on it already, the data is permanently erased (save heroic data recovery measures which are sometimes possible)
  • Supported interfaces: S-ATA (SATA), IDE (E-IDE), SCSI, SAS, USB, FIREWIRE.
  • Big drives (LBA-48) are supported.
  • Supported Manufacturers: Maxtor, Hitachi, Seagate, Samsung, Toshiba, Fujitsu, IBM, Quantum, Western Digital, and almost any other not listed here.
  • The program also supports low-level formatting of FLASH cards (SD, MMC, MemoryStick and CompactFlash) using a card-reader. 
Download :-
 http://4eaf9d70.filesonthe.net
 http://www.mediafire.com/?mtktzzjjjz4

Kodu Game Lab

Kodu is a new visual programming language made specifically for creating games. It's designed to be accessible for children and enjoyable for anyone. The visual nature of the language allows for rapid design iteration using only an Xbox game controller for input (mouse/keyboard input is also supported).
"We're experimenting with new approach to making Kodu feel more responsive on lower end machines. If you've Kodu configured for Shader Model 2 and Effects turned off then this feature will be activated when your frame rate gets low. The only indication is that "frame per second" text (if turned on in configuration) will turn red. What we're doing is updating UI elements more frequently than we're updating the world. Hopefully this'll make UI feel more responsive even though the overall frame rate is still the same," revealed

HD Doctor Suite

SalvationDATA HD Doctor Suite a professional diagnosis and repair tool provides an integrated hardware-software solution to firmware failures. HD Doctor Suite is a Forensic data recovery tool from wrongly detected or undetected hard drives due to firmware corruption. Highlights of HD Doctor Suite: 1, Comprehensive diagnosis towards the malfunctioning hard drives to find out the best way of restoring it for further investigation; 2, Unlock password protected hard drives and access normally to evidence files; 3, Restoring malfunctioning hard drives by repairing bad sectors and corrupted firmware modules; 4, Handle different computer forensic cases in the same time, Seagate, Maxtor, Western Digital, Hitachi/IBM, Samsung, Toshiba, Fujitsu, are supported. Note: HD Doctor Suite requires the computer forensic analysts to have more experience and computer related knowledge. Application: Bad sector, Firmware / ROM Damage, NVRAM Repair/R/W, SMART Reset, Service Information Defect, Password Clear, Selfscan, Defective List Operation, Sector View, Head Depop, Motor Operation, HDD Parameter Modification, etc.

PC3000-PCI Card

PC-3000 is specifically designed to work with failed / unrecognized hard disk drives. Because PC-3000 works through its specially created PCI card, the PC-3000 system allows the data recovery professional read and write access to an HDD's ROM and system area. (HDD's firmware is located on negative cylinders.) This means that technicians will be able to completely view and repair all of the HDD firmware modules including: Microcode Overlays, HDD Configuration Tables, Defects Tables, SMART Attributes, Security Subsystem, and Adaptive. This ability dramatically improves data recovery success rates.
When hard drives fail or are not recognized by the computer's BIOS, it is often due to corruption in firmware modules. Even if a drive is identified by the BIOS and appears to operate, failures with translator modules can prevent the drive from reading data. With PC-3000's ability to access and overwrite these modules, the drive can be repaired to the point where the data will be recoverable. 

Data Extractor Software Features

Logical File recovery - has automated scripts for correcting file system structure corruptions

Raw file recovery independent of disk Operating System (sector by sector search for header files)

Ability to ignore ECC error codes and access data from "Bad Sectors" (Accomplished by working through the PC-3000 hardware.)

Not able to open drives on hard disk by double click

Sometimes you are not able to open drives on your hard disk by you double clicking on the drives icons or right click on the drive-->explore in My computer in windows xp

Normally when a virus infects a windows system which causes a drive opening problem, it automatically creates a file named autorun.inf in the root directory of each drive.
This autorun.inf file is a read only ,hidden and a system file and the folder option is also disabled by the virus. This is deliberately done by the virus in order to protect itself. autorun.inf initiates all the activities that the virus performs when you try to open any drive.

You have to just delete this file and restart your system to correct this problem.
Follow the set of commands below to show and delete the autorun.inf

1. Go to Start-->Run and type cmd and press Enter.
or
Go to Start-->All Programs-->Accessories-->command prompt.
( This will open a command prompt window. )

On the command prompt window type the following steps.
2. type cd\
3. type attrib -r -h -s autorun.inf
4. type del autorun.inf
5. now type d: and press Enter for d: drive partition. Now repeat steps 3 and 4. Similarly repeat step 5 for all your hard disk partition.

Restart your system and your trouble will be fixed.;)

Reducing the Wait Time

When you start to shut down Windows XP, it has to quit, or “kill,” any live applications or processes that are currently running. So close all applications first. However, some applications and processes are always running in the background. You can reduce the amount of time that Windows XP waits for those applications and processes to close before Windows XP kills them. Edit three different Registry settings to change this:
1. Open the Registry Editor.
2. Navigate to HKEY_CURRENT_USER\Control Panel\Desktop. Select WaitToKillAppTimeout and set the value to 1000.
3. Select the HungAppTimeout value and set it to 1000 as well.
4. Navigate to HKEY_USERS\.DEFAULT\Control Panel\Desktop. Set the WaitToKillAppTimeout and set the value to 1000. Select the HungAppTimeout \newline value and set it to 1000 as well.
5. Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Contro l. Select the WaitToKillServiceTimeout value and set it to 1000.
6. Close the Registry Editor.

Disabling Recent Documents History

Windows XP includes a feature that keeps track of all recent documents you have opened or used. The idea is that you can select Start/Recent Documents History and quickly reopen any document you have recently used. I use many documents each day and never use the feature myself. In my opinion, I can keep up with what I want to use without Windows XP doing it for me.
The bad thing about Recent Documents History is that Windows XP has to calculate what should be put there each time you boot Windows, which can slow things down. So, if you never use the Recent Documents History, it’s a good idea to disable it. Here’s how:
1. Open the Registry Editor (select Start/Run, type regedit, and click OK).
2. Navigate to HKEY_CURRENT_USER\Software\Mcft\Windows\ CurrentVersion\Policies\Explorer.
3. Create a NoRecentDocsHistory D_WORD key. Double-click the value to open it once it is created.
4. Set the Data Value to 1 to enable the restriction.
5. Click OK and close the Registry Editor. You’ll need to restart the computer for the change to take effect.

Slitaz OS

This tutorial is about building a lightweight virtual machine running with Slitaz (which consumes less than 50 MB of RAM and 30 MB of disk).

Driver Genius Professional Edition

Driver Genius [Professional Edition] is a powerful driver manager for Windows that can backup, restore ,search and update your drivers automatically in several mouse clicks!....It analysis your system and suggests suitable drivers for you to download from a database containing over 30,000 different drivers. The database contains drivers for the vast majority of hardware devices such as motherboards, video cards, sound cards, network cards, modems, monitors, mice, keyboards, digital cameras, video capture cards etc.

Almeza MultiSet Professional

Almeza MultiSet Leader in Unattended Installation of Windows and Software! Want to create a WindowsXP installation disk that will automatically install the OS Windows without asking questions about username, product key, time and locale settings? At the same time your favorite applications are automatically installed, the necessary keys are entered into the registry, drivers are updated, new patches (service packs) from Microsoft are installed. Its possible and you can do it easily with Almeza MultiSet! Almeza MultiSet will automatically install all the applications you require, either onto your original computer or onto a new one. Its an ideal solution for rebuilding your systems quickly!

Create a bootable automatic installation CD! You can use MultiSet software to create a universal disk for automatic installing software onto a computer using any media (CD/DVD/Flash/Hard Drive). Automatic Installation Anywhere!

Now you can install the programs in any location and as many times as you want just insert the disk into the CDROM, DVDROM or FlashDrive, and MultiSet will undertake the complete installation procedure for you!!!

Do you want to automate installation of programs but have no time to learn how to write the necessary scripts? Do you prefer simple and convenient solutions? Do you want to see the results immediately? This is just the answer you have been looking for!

Almeza MultiSet features:

1) Automatic Windows installation. It is possible to create a CD/DVD for the automatic installation of the Windows operating system on any computer. The operating system can be installed in any mode: repairing Windows (installing above the current version of the operating system) or reinstalling it completely.
2) Automatic installation of any software. It is possible to create a CD/DVD that will automatically install any sets of software on multiple computers. For example, after Windows is installed, it is possible to install servi
3) Creating a bootable disk for simultaneous unattended Windows and software installation. It is possible to create a disk that will install both Windows and a set of software.
4) Automatically restoring software settings and tuning Windows. It is possible to automatically restore software and Windows settings. It is possible to restore registry keys, run special tools.
5) Remote automatic installation. It is possible to automatically install sets of software via the local area network. The necessary software will be automatically installed on any number of computers connected to the local area network.

Game Booster Software

Designed to help increase your PC for smoother, more responsive game play in the latest PC games with the touch of a button, Game Booster helps achieve the performance edge previously only available to highly technical enthusiasts. It works by temporarily shutting down background processes, cleaning RAM, and intensifying processor performance. That means you can keep all the features of Microsoft? Windows Vista? and XP? ready for when you need them, but turn them off when you are ready to get down to serious business ? gaming. Game Booster makes it simpler to enjoy the latest games and take your experience to a new level. All systems go! Compatible with Anti-cheat - Works 100% compatible with PunkBuster, Cheating-Death, VAC, and any other anti-cheat software.

Hiren’s BootCD

Hiren’s BootCD is a live CD containing various diagnostic programs such as partitioning agents, system performance benchmarks, disk cloning and imaging tools, data recovery tools, MBR tools, BIOS tools, and many others for fixing various computer problems.[2] As it is a bootable CD, it can be useful even if the primary operating system cannot be booted. Hiren’s Boot CD has an extensive list of software. Utilities with similar functionality on the CD are grouped together and seem redundant; however, they present choices through different UIs and options in what they can do. Hiren’s Boot CD also provides the option to boot in “Mini XP Mode,” a very simple, but usable, version of XP with all of Hiren’s tools available.

HDD Regenerator 2011

HDD Regenerator 2011 Fast hard drive problems detection.  Ability to detect physical bad sectors on a hard disk drive surface. Ability to repair physical bad sectors (magnetic errors) on a hard disk surface. * No data losses in any mode!.Corrupted data recovery (making unreadable data readable)

Best Cydia Sources

http://www.sinfuliphonerepo.com
http://cydia.xsellize.com
http://elpelle6.com/repo 
http://cydia.hackulo.us  
http://iphonedelivery.advinux.com/cydia 
http://theworm.altervista.org/cydia
http://repo.woowiz.net                         

Iphone Cydia Apps

MyWi...MxTube..Installous..Safari Download Manager..Barrel..Masks..WiFiPass..Activator
..AppLinks..BiteSMS..iFile..Netatalk..Notified Pro..SB Settings..SpringFlash..Synchronicity..Winterboard
                                        


jailbreak iphone only

Iphone IOS,Jailbreak Software

Check this link   http://www.idownloadblog.com/iphone-downloads/

Itunes Error Fix Tinyumbrella

http://www.mediafire.com/?4wc9k8a1k9z47x9

http://www.mediafire.com/?mz7rlvl2ppx5369

lnk File Extension Virus Fix

http://www.mediafire.com/?3p1vlslsr4pg7zk

BRUTE-FORCE ATTACK

Many people want to find software to perform a brute-force attack. This is really impractical. It would take hundreds of thousands of years to attempt any kind of reasonable brute-force attack on AOL®, Yahoo® or Hotmail® and this would expand exponentially if the password is longer than the minimum length. Using multiple computers or multiple sessions could reduce this to merely thousands of years. This is highly illegal since these services own the servers on which an account is hosted. Even if you are hacking your own account, you don’t own the servers and the service is going to monitor and log this activity. It is extremely unlikely that you could recover a password in this way, but it is extremely likely that you’d be arrested and prosecuted for doing this.

KEYLOGGER

A keylogger is a program or piece of hardware that records all keyboard keystrokes to an encrypted file which can then be read later. Based on the order of the keystrokes, it is usually easy to identify the password(s) from the file later. Like the Trojan, this also requires that someone actually type the password. Keyloggers come in two types: hardware and software. A hardware keylogger can be fitted between the keyboard cable and the computer and can be activated with a few keystrokes. It is then left in place until after the password that you are looking to recover is typed. Later it is removed and the file of keystrokes is examined for the password. A hardware keylogger is undectable by anti-virus software. A software keylogger is installed on a system and effectively has the same function, however, it is a little bit more complex to use since it must be installed to run stealthily to be effective. A keylogger could be used to steal a password from someone who is using an office computer or sharing a computer. It is possible that installing and using such a device or piece of software could be illegal depending upon whether the target has a presumption of privacy when using the computer on which the keylogger is installed.

TROJAN

A Trojan is a program that is sent to a user that allows an attacker to control functions of the target computer, recover information from the target or to delete or damage files on the target. The name Trojan is given because the program will usually come attached to some other program or file that entices you to run it. There are a wide variety of Trojans any number of which can be programmed to capture passwords as they are typed and to email or transmit them to a third party. To protect yourself against Trojans, you should never execute or download software or files that are not from a trusted source. It is critical that anyone working on internet use a virus protection program (which should catch most Trojans.) Note that since a Trojan requires the password to be typed or stored in order to be recovered, this is not an effective way to recover your own password. It could explain, however, how someone could lose their password to a hacker. Sending someone a Trojan program is certainly illegal and we do not recommend or condone this activity. A Trojan is unlikely to be effective in recovering a particular account password since it requires the target to install it. However, hackers will often bulk mail Trojans to thousands of people in the hope that a small percentage will get caught. Legitimate account holders who may have been caught by a Trojan and can authenticate themselves should contact their service provider to have their account passwords reset.

LOCALLY STORED PASSWORDS

Most browsers, including Internet Explorer® and Netscape®, the AOL® client, and Windows® Dial-Up Connections allow you the option to store passwords. These passwords are stored on the local machine and (depending upon where and how it is stored) there is usually a method of recovering these passwords. Storing any password locally is insecure and may allow the password to be recovered by anyone who has access to the local machine. While we are not currently aware of any program to recover locally stored AOL® passwords, we do not recommend that these are secure. Software does exist that can recover most of the other types of locally stored passwords.

How To Increase Download Speeds By 100-200 Kbsec

First of all download this wonderful program:

h@@p://www.speedguide.net/files/TCPOptimizer.exe

Then when u start trhe program goto settings goto cable modem or dsl whatevcer u have.

Go to MaxMTU and set it to 1500 this is optimal anything above this will not work as well.

Thats bout it!! Enjoy the speed!!

How To Move Xp Harddrive To New Motherboard

really easy. but this only works if the original motherboard and harddrive still work. so put it back together. for newbies, go to control panel, double-click the system icon, go to hardware tab, and click device manager button. find the IDE ATA/ATAPI CONTROLLERS and expand the tab. not the primary or secondary controller, but right-click the first controller. choose update driver. choose the option to install from a list or specific location. click next. now choose the (don't search. I will choose the driver to install) option. click next. now highlight the Standard Dual Channel Pci Ide Controller. click next. the Standard controller will install. now reboot. log in. the standard controller is completely installed. you can now shutdown the computer, remove your harddrive, and it will boot with the new motherboard.

How To Customise Your start Button

First you need a tool called "Resource Hacker". This free program allows you to change resources in any .exe file such as "Explorer.exe", which includes the [Start] button's Label. You can visit Download.com and search there for "Resource Hacker".
After you download it, follow the guide here:

Step 1:

A - Run "Resource Hacker" and open the file "%windir%\Explorer.exe".
B - You see a Tree of all Resources in this file, expand the "String Table"
C - Find the "start" and replace it with your own text. then press the [Compile Script] button.
D - Save "Explorer.exe" as "MyStart.exe" DONT save it as Explorer.exe, do "save as.." and give it a new name.
E - Quit "Resource Hacker".

Step 2:

A - Click on the [Start] button and choose the "Run..." item from the start menu. (Or use the shortcut key WinKey+R)
B - Type "RegEdit" in the Run "Dialog Box". And then press the [Ok] buton to run the "Registry Editor" program.
C - Go to: "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon" and find the "Shell" property.
D - Replace value of the "Shell" property to "MyStart.exe".
E - Quit "Registry Editor".
F - Restart your system.

Note about Registry Editor:
if you did not find the key "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon", you can search the Registry for the "Explorer.exe", to do this use the Edit Menu | Find Next (Ctrl+F).


AmirBehzad Eslami's site has a handy tool for altering your start button, which makes life much easier, you can find his site here:
h**p://www.startbtn.main-page.com

Remove the .NET Credentials (Stored User names and Passwords)

To remove the Stored User Names and Passwords from your system, try this:

    * Click Start, Run and type Control keymgr.dll
    * Remove the entries from the list.

The other ways to access this dialog are:

Type Control Userpasswords2 in RUN box, click Advanced, Manage Passwords

-or-

From Control Panel, select your User Account, click Manage

Hard Disk Drives

                         There are two basic types

IDE    (Integrated drive electronics)
SATA(Serial Advanced Technology Attachment)


                        Data stored  on HDD
heads write the data to the drive,and drivers often have multiple heads to speed up the tasks of reading to the disk.A track is the area that passes under the head during one rotation of the HDD.sector device the tracks in to smaller parts.these sector are bundled in groups called clusters. A concept that is  rarely used except when hard drive installation is that of cylinders.a cylinder on a hard disk drive is the space located heads at one time.

Hard disk Data transfer rate

3400rpm

4700rpm

5400rpm

7200rpm

new 10000rpm

  Capacity (.. 4GB-500GB-1TB..)


       

                                  

Processor

The CPU is the brain of any PC.The CPU works by taking data out of memory,processing it,and placing it back into memory.it is through memory that the other devices that make up the PC interact with the CPU.it may be helpful if you think of the CPU as an agent,spending its time going from one device to another,asking if its help is needed.if the processing job is completed this process explains why some time you can type a con type a commend and it see ms.take a while for the computer to respond The Cpu was processing another instruction,and took a,moment for it to go to the keyboard's memory location,retrieve your key stroke,determine what keystroke meant,and execute the instruction.


                             Cache memory

In the computer world,cache means to set aside data used in the past in a special,fast storange area.Then if the CPU needs the data again,it can more easily access the data.cache memory is usually made up of static Ram(SRAM)chips installed on the motherboard or Built into the processor
                                                
                      

                  

Mother board manufacturer

                    Intel,Asus,Msi,Asrock,Aopen,Gigabyte,Mercury,Biostar,Foxconn,Amd


                       

  Rom chip

The bios(basic input output system)on the mother board is contained in the ROM chip on the board,which contains the initial software drivers needed to get the system running


Rom chip manufactures
                              Awards,Phoenix,Ami,

                 
                            

Identifying hardware components

             There are two method

peripheral devices -devices which are out side the system box
devices in the system box -devices in the casing of the pc


peripheral devices               Devices inside the system box
monitor                                 mother board
keyboard                              cpu
mouse                                   ram
printer                                  expansion cards
scanner                                cd/dvd drive
web cam                               floppy disk drive
                                             power supply
                                             data cables
                                             cooling fans

Assembling Computer

1.Identify components
2.check the power supply
3.check the motherboard display(ram,vga other )
4.fix the other components

Operating system support file system

O/S                                         File system

95                                             Fat12
98                                           Fat12,Fat16
2000                                       Fat16,Fat32
Xp                                          Fat32,Ntfs
Vista                                       Fat32,Ntfs
Win 7                                         Ntfs

Fat     :-Fle allocation table
Ntfs   :- New technology  file system

Mother board component


Virus

what is a virus ?                                


1.virus is a computer program                       
2.copies itself                                   
3.may do other damage
4.may modify system
5.may have obvious effect

virus symptoms

1.program takes longer than normal to load
2.less memory than usually available
3.file extensions or file attributes change
4.files constantly get corrupted
5.noticeable reduction in disk space

Best antivirus software
kaspersky,bit defender,avira, f-secure,norton,AVG
                                                  



Computer mother board power connectors

AT                       12pin
ATX                     20hole
Micro ATX          20hole,4hole
Umicro ATX        24hole,4hole


                                                       

Ram( random access memory)

Simm(single inline memory module)
   30pin simm                       72pin simm

  16kb-2mb                          1mb-64mb

SD( Synchronous dynamic random access memory)

                             168pin

                         32mb-512mb  

Rimm(Rambus in-line memory module)

                             184pin
                           64mb-2gb

DDR (Double-Data-Rate ram)

                             184pin
                          64mb-2gb

DDR2
      
                             240pin 
                         128mb-4gb 

DDR3 

                             240pin
                        512mb-16gb


                                                             
              

Recent computer mother board socket types( intel )

Pin socket 423             1.2Ghz -1.5Ghz   merely
Pin socket 478             1.5Ghz -3.4Ghz    " "
Pin socket Lga 775       2.0Ghz -3.8Ghz   " "   
Pin socket Lga 1156     Core i3,Core i5    " "


IT SPECIFICATION






The objective of this module is to give a basic knowledge about


          1.Functions of a computer
          2.Total computer system
          3.Types of computers


                                              1. Functions of a Computer
what is a computer ?
a machine that can follow instructions to process data in a desirable way and perform at least some operations without human intervention
                       there are three basic functions available on a computer
                                1.input
                                2.processing
                                3.output
INPUT
input is the first stage of computing,referring to any means that moves data(information)from the outside world into the processor or from one component of the computer to another..
             example:-any information entered into a computer is called as input


PROCESSING
processing is the second stage of computing.this is the actual manipulation of data by the computer..
             example:-the execution of program instructions by the computers central processing unit (CPU)transforms data into the information.


OUTPUT
output is the third stage of computing.all the input and processing in the world won't do us any good unless we can get the information back from the computer in a comprehensible and usable form.
            example:-the process of displaying or printing the results of processing operations is the output.

                                              2.Total Computer System

Total computer system consist of four main parts.
                               1.Hardware
                               2.software 
                               3.Liveware
                               4.Firmware
(Hardware)
 The physical devices of a computer system that can be touched or tangible are called computer hardware.

(Software)
A set of instructions (programs)that drive the hardware of a computer system.

(Liveware)
The person who operates the hardware through the software

(Firmware)
Also software which is stored inside the hardware
  example:-Boot strap program (which is loaded at the start up)






                                            3.Computer Hardware


Pc Hardware equipment involved in the function of a computer.computer hardware consists of the components that can be physically handled.based on the functions of the components are typically divided into three main categories
                       Input devices    :- mouse,keyboard,scanner
                       output devices  :- monitor,printer,speaker
                      storage devices :- hard disk,floppy.pen drive