Search Engine Optimization Tips, Tutorials, Windows XP, Windows Vista, Tips and Tricks, Programming Tutorials
31.12.07
super computers
Hardware:
Supercomputers using custom CPUs traditionally gained their speed over conventional computers through the use of innovative designs that allow them to perform many tasks in parallel, as well as complex detail engineering. They tend to be specialized for certain types of computation, usually numerical calculations, and perform poorly at more general computing tasks. Their memory hierarchy is very carefully designed to ensure the processor is kept fed with data and instructions at all times—in fact, much of the performance difference between slower computers and supercomputers is due to the memory hierarchy. Their I/O systems tend to be designed to support high bandwidth, with latency less of an issue, because supercomputers are not used for transaction processing.
As with all highly parallel systems, Amdahl's law applies, and supercomputer designs devote great effort to eliminating software serialization, and using hardware to accelerate the remaining bottlenecks.
Processing techniques:
Vector processing techniques were first developed for supercomputers and continue to be used in specialist high-performance applications. Vector processing techniques have trickled down to the mass market in DSP architectures and SIMD processing instructions for general-purpose computers.
Modern video game consoles in particular use SIMD extensively and this is the basis for some manufacturers' claim that their game machines are themselves supercomputers. Indeed, some graphics cards have the computing power of several TeraFLOPS. The applications to which this power can be applied was limited by the special-purpose nature of early video processing. As video processing has become more sophisticated, Graphics processing units (GPUs) have evolved to become more useful as general-purpose vector processors, and an entire computer science sub-discipline has arisen to exploit this capability: General-Purpose Computing on Graphics Processing Units (GPGPU.)
Programming
The parallel architectures of supercomputers often dictate the use of special programming techniques to exploit their speed. Special-purpose Fortran compilers can often generate faster code than C or C++ compilers, so Fortran remains the language of choice for scientific programming, and hence for most programs run on supercomputers. To exploit the parallelism of supercomputers, programming environments such as PVM and MPI for loosely connected clusters and OpenMP for tightly coordinated shared memory machines are being used.
As you can easily guess super computers are all about speed when it comes to numeric
computations.
p.s.
japan is currently building a super computer that will dwarf today's fastest super
computers when it comes to speed . the speed of that computer will be
about 10 petaflops.
by the way today's fastest (blu genes) has speed of about 480 teraflops
just imagine.........
Search engines
All of us use a search engine (Google yaar) without knowing actually how it works.
Here is some material you will find really useful.
Definition;
A search engine is an information retrieval system designed to help find information stored on a computer system. Search engines help to minimize the time required to find information and the amount of information which must be consulted, akin to other techniques for managing information overload.
The most public, visible form of a search engine is a Web search engine which searches for information on the World Wide Web.
Working:
Search engines provide an interface to a group of items that enables users to specify criteria about an item of interest and have the engine find the matching items. The criteria are referred to as a search query. In the case of text search engines, the search query is typically expressed as a set of words that identify the desired concept that one or more documents may contain.
There are several styles of search query syntax that vary in strictness. Where as some text search engines require users to enter two or three words separated by white space, other search engines may enable users to specify entire documents, pictures, sounds, and various forms of natural language. Some search engines apply improvements to search queries to increase the likelihood of providing a quality set of items through a process known as query expansion.
The list of items that meet the criteria specified by the query is typically sorted, or ranked, in some regard so as to place the most relevant items first. Ranking items by relevance (from highest to lowest) reduces the time required to find the desired information. Probabilistic search engines rank items based on measures of similarity and sometimes popularity or authority. Boolean search engines typically only return items which match exactly without regard to order.
To provide a set of matching items quickly, a search engine will typically collect metadata about the group of items under consideration beforehand through a process referred to as indexing. The index typically requires a smaller amount of computer storage, and provides a basis for the search engine to calculate item relevance. The search engine may store of copy of each item in a cache so that users can see the state of the item at the time it was indexed or for archive purposes or to make repetitive processes work more efficiently and quickly.
Notably, some search engines do not store an index. Crawler, or spider type search engines may collect and assess items at the time of the search query. Meta search engines simply reuse the index or results of one or more other search engines.
29.12.07
Instant Messaging
Instant messaging allows instantaneous communication between a number of parties simultaneously, by transmitting information quickly and efficiently, featuring immediate receipt of acknowledgment or reply. In certain cases IM involves additional features, which make it even more popular, i.e. to see the other party, e.g. by using web-cams, or to talk directly for free over the internet.
It is possible to save a conversation for later reference. Instant messages are typically logged in a local message history which closes the gap to the persistent nature of e-mails and facilitates quick exchange of information like URLs or document snippets (which can be unwieldy when communicated via telephone).
28.12.07
operating systems
The most commonly-used contemporary desktop and laptop (notebook) OS is Microsoft Windows. More powerful servers often employ Linux, FreeBSD, and other Unix-like systems. However, these operating systems, especially Mac OS X, are also used on personal computers
Most operating systems enable concurrent execution of many processes and programs at once via multitasking, even with one CPU. The mechanism was used in mainframes since the early 1960s, but in the personal computers it became available in 1990s. Process management is an operating system's way of dealing with running those multiple processes. On the most fundamental of computers (those containing one processor with one core) multitasking is done by simply switching processes quickly. Depending on the operating system, as more processes run, either each time slice will become smaller or there will be a longer delay before each process is given a chance to run. Process management involves computing and distributing CPU time as well as other resources. Most operating systems allow a process to be assigned a priority which affects its allocation of CPU time. Interactive operating systems also employ some level of feedback in which the task with which the user is working receives higher priority. Interrupt driven processes will normally run at a very high priority. In many systems there is a background process, such as the System Idle Process in Windows, which will run when no other process is waiting for the CPU.
Another important part of memory management is managing virtual addresses. If multiple processes are in memory at once, they must be prevented from interfering with each other's memory (unless there is an explicit request to utilise shared memory). This is achieved by having separate address spaces. Each process sees the whole virtual address space, typically from address 0 up to the maximum size of virtual memory, as uniquely assigned to it. The operating system maintains a page table that match virtual addresses to physical addresses. These memory allocations are tracked so that when a process terminates, all memory used by that process can be made available for other processes.
The operating system can also write inactive memory pages to secondary storage. This process is called "paging" or "swapping" – the terminology varies between operating systems.
It is also typical for operating systems to employ otherwise unused physical memory as a page cache; requests for data from a slower device can be retained in memory to improve performance. The operating system can also pre-load the in-memory cache with data that may be requested by the user in the near future; SuperFetch is an example of this.
CHS
Though CHS values no longer have a direct physical relationship to the data stored on disks, pseudo CHS values (which can be translated by disk electronics or software) are still being used by many utility programs.
However, many PC engineers and technicians use the term sector (instead of block) as if it were also defined as the smallest geometrical breakdown of a disk.[1] The UNIX/Linux communities, however, continue to employ the term block. For example, the Linux fdisk utility normally displays partition table information using 1024-byte blocks while also using sector to help describe a disk's size with its phrase, 63 sectors/track.
The number of blocks on one side of a platter is:
VOIP
Voice over Internet Protocol (VoIP) is a protocol optimized for the transmission of voice through the Internet or other packet switched networks. VoIP is often used abstractly to refer to the actual transmission of voice (rather than the protocol implementing it). VoIP is also known as IP Telephony, Internet telephony, Broadband telephony, Broadband Phone and Voice over Broadband. "VoIP" is pronounced voyp.
Companies providing VoIP service are commonly referred to as providers, and protocols which are used to carry voice signals over the IP network are commonly referred to as Voice over IP or VoIP protocols. They may be viewed as commercial realizations of the experimental Network Voice Protocol (1973) invented for the ARPANET providers. Some cost savings are due to utilizing a single network to carry voice and data, especially where users have existing underutilized network capacity that can carry VoIP at no additional cost. VoIP to VoIP phone calls are sometimes free, while VoIP to public switched telephone networks, PSTN, may have a cost that is borne by the VoIP user.
Voice over IP protocols carry telephony signals as digital audio, typically reduced in data rate using speech data compression techniques, encapsulated in a data packet stream over IP.
There are two types of PSTN to VoIP services: Direct Inward Dialing (DID) and access numbers. DID will connect the caller directly to the VoIP user while access numbers require the caller to input the extension number of the VoIP user.
Functionality:
VoIP can facilitate tasks and provide services that may be more difficult to implement or expensive using the more traditional PSTN. Examples include:
The ability to transmit more than one telephone call down the same broadband-connected telephone line. This can make VoIP a simple way to add an extra telephone line to a home or office. 3-way calling, call forwarding, automatic redial, and caller ID; features that traditional telecommunication companies (telcos) normally charge extra for. Secure calls using standardized protocols (such as Secure Real-time Transport Protocol.) Most of the difficulties of creating a secure phone over traditional phone lines, like digitizing and digital transmission are already in place with VoIP. It is only necessary to encrypt and authenticate the existing data stream. Location independence. Only an internet connection is needed to get a connection to a VoIP provider. For instance, call center agents using VoIP phones can work from anywhere with a sufficiently fast and stable Internet connection. Integration with other services available over the Internet, including video conversation, message or data file exchange in parallel with the conversation, audio conferencing, managing address books, and passing information about whether others (e.g. friends or colleagues) are available online to interested parties.
MBR(Master Boot Record)
By convention, there are exactly four primary partition table entries in the MBR Partition Table scheme, although some DOS operating systems did extend this to five (PTS-DOS) or even eight (AST or NEC DOS) entries.
Where a data storage device has been partitioned with the GUID Partition Table scheme, the Master Boot Record will still contain a partition table, but its only purpose is to indicate the existence of the GUID Table and to prevent utility programs that only understand the MBR Partition Table scheme from creating any partitions in what they would see as only free space on the disk.
To back up the MBR of a hard disk or other storage device, use the following command to create a file named mbr.bin containing the entire contents of the master boot record:
Minibike
1.12.07
trojans and their ports
so now i have made your job simple just memorize all these and block
the ports in case these are active on your pc.
Simple huh???
TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250
TCP 28 Amanda.200
TCP 31 MastersParadise.920
TCP 68 Subseven.100
TCP 142 NetTaxi.180
TCP 146 Infector.141, Intruder.100, Intruder.100
TCP 171 ATrojan.200
TCP 285 WCTrojan.100
TCP 286 WCTrojan.100
TCP 334 Backage.310
TCP 370 NeuroticKat.120, NeuroticKat.130
TCP 413 Coma.109
TCP 420 Breach.450
TCP 555 Id2001.100, PhaseZero.100, StealthSpy.100
TCP 623 Rtb666.160
TCP 660 Zaratustra.100
TCP 661 Noknok.800, Noknok.820
TCP 666 BackConstruction.210, BackConstruction.250, Bla.100, Bla.200, Bla.400, Bla.503, Cain.150, Dimbus.100, Noknok.820, Ripper.100, SatansBackdoor.100, SatansBackdoor.101, SatansBackdoor.102, Unicorn.100, Unicorn.101, Unicorn.110
TCP 667 SniperNet.210, Snipernet.220
TCP 668 Unicorn.101, Unicorn.110
TCP 680 Rtb666.160
TCP 777 Tiny.100, Undetected.230, Undetected.300, Undetected.310, Undetected.320, Undetected.330, Undetected.331, Undetected.332
TCP 785 NetworkTerrorist.100
TCP 800 NeuroticKitten.010
TCP 831 NeuroticKat.100, NeuroticKat.120, NeuroticKat.130
TCP 901 NetDevil.130, NetDevil.140
TCP 1000 DerSpaeher.200
TCP 1001 Silencer.100
TCP 1008 AutoSpy.100
TCP 1010 DerSpaeher.200
TCP 1015 Doly.150
TCP 1111 TPort.100
TCP 1130 Noknok.800, Noknok.820
TCP 1207 SoftWAR.100
TCP 1243 Subseven.100, SubSeven.110, SubSeven.180, SubSeven.190, Subseven.200
TCP 1245 VoodooDoll.006
TCP 1269 Matrix.130
TCP 1480 RemoteHack.130
TCP 1568 RemoteHack.100, RemoteHack.110
TCP 1600 DirectConnection.100
TCP 1601 DirectConnection.100
TCP 1602 DirectConnection.100
TCP 1634 NetCrack.100
TCP 1784 Snid.120, Snid.212
TCP 1999 TransmissionScout.100, TransmissionScout.110
TCP 2000 ATrojan.200, InsaneNetwork.400
TCP 2001 DIRT.220, TrojanCow.100
TCP 2003 TransmissionScout.100, TransmissionScout.110
TCP 2023 RipperPro.100
TCP 2040 InfernoUploader.100
TCP 2115 Bugs.100
TCP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
TCP 2332 SilentSpy.202
TCP 2589 Dagger.140
TCP 2600 DigitalRootbeer.100
TCP 2989 Rat.200
TCP 3128 MastersParadise.970
TCP 3129 MastersParadise.920, MastersParadise.970
TCP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
TCP 3215 BlackStar.100, Ghost.230
TCP 3333 Daodan.123
TCP 3410 OptixPro.100, OptixPro.110
TCP 3456 Force.155, TerrorTrojan.100
TCP 3505 AutoSpy.130, AutoSpy.140
TCP 3586 Snid.120, Snid.212
TCP 3700 PortalOfDoom.100
TCP 3723 Mantis.100
TCP 3800 Eclypse.100
TCP 3996 RemoteAnything.364
TCP 4000 SkyDance.220, SkyDance.229
TCP 4201 Wartrojan.160, Wartrojan.200
TCP 4225 SilentSpy.202
TCP 4321 Bobo.100
TCP 4444 AlexTrojan.200, Crackdown.100
TCP 4488 EventHorizon.100
TCP 4523 Celine.100
TCP 4545 InternalRevise.100, RemoteRevise.150
TCP 4567 FileNail.100
TCP 4666 Mneah.100
TCP 4950 ICQTrojan.100
TCP 5005 Aladino.060
TCP 5025 Keylogger.WMRemote.100
TCP 5031 NetMetro.104
TCP 5032 NetMetro.104
TCP 5033 NetMetro.104
TCP 5050 RoxRat.100
TCP 5151 OptixLite.020, OptixLite.030, OptixLite.040
TCP 5190 MBomber.100
TCP 5277 WinShell.400
TCP 5343 WCRat.100
TCP 5400 BackConstruction.120, BackConstruction.150, BladeRunner.080, DeepThroat.300
TCP 5401 BackConstruction.120, BackConstruction.150, BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
TCP 5402 BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
TCP 5534 TheFlu.100
TCP 5550 XTCP.200, XTCP.201
TCP 5555 Noxcape.100, Noxcape.200
TCP 5695 Assassin.100
TCP 5714 WinCrash.100
TCP 5741 WinCrash.100
TCP 5742 WinCrash.103
TCP 5802 Y3KRat.160
TCP 5810 Y3KRat.160
TCP 5838 Y3KRat.170
TCP 5858 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5880 Y3KRat.140
TCP 5881 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5883 Y3KRat.110, Y3KRat.140
TCP 5884 Y3KRat.140, Y3KRat.150
TCP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5886 Y3KRat.120, Y3KRat.140
TCP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5889 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5890 Y3KRat.140
TCP 6400 Thething.100, Thething.150
TCP 6556 AutoSpy.120, AutoSpy.122
TCP 6655 Aqua.020
TCP 6660 LameSpy.095
TCP 6666 LameRemote.100, ProjectMayhem.100
TCP 6669 Vampire.100
TCP 6670 DeepThroat.200, DeepThroat.210
TCP 6671 DeepThroat.310
TCP 6699 HostControl.101
TCP 6711 DeepThroat.300, Noknok.820, SubSeven.180, SubSeven.190
TCP 6712 Subseven.100
TCP 6713 Subseven.100
TCP 6767 NTRC.120
TCP 6776 SubSeven.180, SubSeven.190, Subseven.200
TCP 6789 Doly.200
TCP 6796 SubSeven.214
TCP 6912 ShitHeep.100
TCP 6939 Indoctrination.100
TCP 6953 Lithium.100
TCP 6969 2000Cracks.100, Bigorna.100, Danton.110, Danton.210, Danton.220, Danton.310, Danton.320, Danton.330, GateCrasher.110, NetController.108, Sparta.110, VagrNocker.120
TCP 6970 Danton.330
TCP 7001 Freak88.100
TCP 7119 Massaker.100
TCP 7200 Massaker.110
TCP 7300 Coced.221
TCP 7301 Coced.221
TCP 7306 NetSpy.200, NetSpy.200
TCP 7410 Phoenix.190, Phoenix.200
TCP 7511 Genue.100
TCP 7609 Snid.120, Snid.212
TCP 7614 Wollf.130
TCP 7648 BlackStar.100, Ghost.230
TCP 7788 Last.2000, Matrix.200
TCP 7826 MiniOblivion.010, Oblivion.010
TCP 7887 SmallFun.110
TCP 7891 Revenger.100
TCP 7979 VagrNocker.200
TCP 7997 VagrNocker.200
TCP 8000 XConsole.100
TCP 8011 Way.240
TCP 8012 Ptakks.215, Ptakks.217
TCP 8110 LoseLove.100
TCP 8111 LoseLove.100
TCP 8301 LoseLove.100
TCP 8302 LoseLove.100
TCP 8372 NetBoy.100
TCP 8720 Connection.130
TCP 8734 AutoSpy.110
TCP 8811 Force.155
TCP 8899 Last.2000
TCP 9000 Aristotles.100
TCP 9301 LoseLove.100
TCP 9400 InCommand.100, InCommand.110, InCommand.120, InCommand.130, InCommand.140, InCommand.150, InCommand.153, InCommand.160, InCommand.167, InCommand.170
TCP 9401 InCommand.100, InCommand.110, InCommand.170
TCP 9402 InCommand.100, InCommand.110
TCP 9561 CRatPro.110
TCP 9563 CRatPro.110
TCP 9580 TheefLE.100
TCP 9696 Danton.210, Ghost.230
TCP 9697 Danton.320, Danton.330, Ghost.230
TCP 9870 R3C.100
TCP 9872 PortalOfDoom.100
TCP 9873 PortalOfDoom.100
TCP 9874 PortalOfDoom.100
TCP 9875 PortalOfDoom.100
TCP 9876 Rux.100, SheepGoat.100
TCP 9877 SmallBigBrother.020
TCP 9878 SmallBigBrother.020, TransmissionScout.100, TransmissionScout.110, TransmissionScout.120
TCP 9879 SmallBigBrother.020
TCP 9999 ForcedEntry.100, Infra.100, Prayer.120, Prayer.130, TakeOver.200, TakeOver.300
TCP 10001 DTr.130, DTr.140
TCP 10013 Amanda.200
TCP 10067 PortalOfDoom.100
TCP 10100 Gift.240
TCP 10101 NewSilencer.100
TCP 10167 PortalOfDoom.100
TCP 10528 HostControl.100, HostControl.260
TCP 10607 Coma.109
TCP 10666 Ambush.100
TCP 11011 Amanda.200
TCP 11050 HostControl.101
TCP 11051 HostControl.100, HostControl.260
TCP 11223 AntiNuke.100, Progenic.100, Progenic.110
TCP 11225 Cyn.100, Cyn.103, Cyn.120
TCP 11306 Noknok.800, Noknok.820
TCP 11831 Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
TCP 11991 PitfallSurprise.100
TCP 12043 Frenzy.2000
TCP 12345 Fade.100, Netbus.160, Netbus.170, VagrNocker.400
TCP 12346 Netbus.160, Netbus.170
TCP 12348 Bionet.210, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.316, Bionet.317
TCP 12349 Bionet.084, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.314, Bionet.316, Bionet.317, Bionet.401, Bionet.402
TCP 12389 KheSanh.210
TCP 12478 Bionet.210
TCP 12623 Buttman.090, Buttman.100
TCP 12624 Buttman.090, Buttman.100
TCP 12625 Buttman.100
TCP 12904 Akropolis.100, Rocks.100
TCP 13473 Chupacabra.100
TCP 13753 AFTP.010
TCP 14100 Eurosol.100
TCP 14194 CyberSpy.840
TCP 14286 HellDriver.100
TCP 14500 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14501 PCInvader.060, PCInvader.070
TCP 14502 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14503 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14504 PCInvader.050, PCInvader.060
TCP 15092 HostControl.100, HostControl.260
TCP 15382 SubZero.100
TCP 15432 Cyn.210
TCP 15555 ICMIBC.100
TCP 16322 LastDoor.100
TCP 16484 MoSucker.110
TCP 16661 Dfch.010
TCP 16969 Progenic.100
TCP 16982 AcidShiver.100
TCP 17300 Kuang.200
TCP 17499 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
TCP 17500 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
TCP 17569 Infector.141, Infector.160, Infector.170, Infector.180, Infector.190, Infector.200, Intruder.100, Intruder.100
TCP 17593 AudioDoor.120
TCP 19191 BlueFire.035, BlueFire.041
TCP 19604 Metal.270
TCP 19605 Metal.270
TCP 19991 Dfch.010
TCP 20000 Millenium.100
TCP 20001 Millenium.100, PshychoFiles.180
TCP 20002 AcidKor.100, PshychoFiles.180
TCP 20005 MoSucker.200, MoSucker.210, MoSucker.220
TCP 21212 Schwindler.182
TCP 21554 Exploiter.100, Exploiter.110, Girlfriend.130, GirlFriend.135
TCP 21579 Breach.2001
TCP 21584 Breach.2001
TCP 21684 Intruse.134
TCP 22068 AcidShiver.110
TCP 22115 Cyn.120
TCP 22222 Prosiak.047, Ruler.141, Rux.300, Rux.400, Rux.500, Rux.600
TCP 22223 Rux.400, Rux.500, Rux.600
TCP 22456 Bla.200, Bla.503
TCP 22457 AcidShiver.120, Bla.200, Bla.503
TCP 22784 Intruzzo.110
TCP 22845 Breach.450
TCP 22847 Breach.450
TCP 23005 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
TCP 23006 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
TCP 23032 Amanda.200
TCP 23432 Asylum.010, Asylum.012, Asylum.013, Asylum.014, MiniAsylum.110
TCP 23456 EvilFTP.100, VagrNocker.400
TCP 23476 DonaldDick.153, DonaldDick.154, DonaldDick.155
TCP 23477 DonaldDick.153
TCP 24000 Infector.170
TCP 24307 Wildek.020
TCP 25386 MoonPie.220
TCP 25486 MoonPie.220
TCP 25555 FreddyK.100, FreddyK.200
TCP 25556 FreddyK.100
TCP 25685 MoonPie.010, MoonPie.012, MoonPie.130, MoonPie.220, MoonPie.240, MoonPie.400
TCP 25686 MoonPie.135, MoonPie.200, MoonPie.400
TCP 25982 MoonPie.135, MoonPie.200
TCP 26274 Delta.050
TCP 27160 MoonPie.135, MoonPie.200
TCP 27184 Alvgus.100, Alvgus.800
TCP 27374 Muerte.110, Subseven.210, SubSeven.213
TCP 28429 Hack'a'Tack.2000
TCP 28430 Hack'a'Tack.2000
TCP 28431 Hack'a'Tack.2000
TCP 28432 Hack'a'Tack.2000
TCP 28433 Hack'a'Tack.2000
TCP 28434 Hack'a'Tack.2000
TCP 28435 Hack'a'Tack.2000
TCP 28436 Hack'a'Tack.2000
TCP 29559 DuckToy.100, DuckToy.101, Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
TCP 29891 Unexplained.100
TCP 30000 Infector.170
TCP 30001 Error32.100
TCP 30003 LamersDeath.100
TCP 30029 AOLTrojan.110
TCP 30100 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30101 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30102 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30103 NetSphere.131
TCP 30947 Intruse.134
TCP 31320 LittleWitch.400, LittleWitch.420
TCP 31337 BackOrifice.120, Khaled.100, OPC.200
TCP 31415 Lithium.101
TCP 31416 Lithium.100, Lithium.101
TCP 31557 Xanadu.110
TCP 31631 CleptoManicos.100
TCP 31745 Buschtrommel.100, Buschtrommel.122
TCP 31785 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31787 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31789 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31791 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31887 BDDT.100
TCP 31889 BDDT.100
TCP 32100 ProjectNext.053
TCP 32418 AcidBattery.100
TCP 32791 Akropolis.100, Rocks.100
TCP 33291 RemoteHak.001
TCP 33333 Blackharaz.100, Prosiak.047, SubSeven.214
TCP 33577 SonOfPsychward.020
TCP 34324 TelnetServer.100
TCP 34763 Infector.180, Infector.190, Infector.200
TCP 35000 Infector.190, Infector.200
TCP 35600 Subsari.140
TCP 36794 BugBear.100
TCP 37237 Mantis.020
TCP 37651 YAT.210
TCP 37653 YAT.310
TCP 40308 Subsari.140
TCP 40412 TheSpy.100
TCP 40421 MastersParadise.970
TCP 40422 MastersParadise.970
TCP 40999 DiemsMutter.110, DiemsMutter.140
TCP 41626 Shah.100
TCP 44444 Prosiak.070
TCP 45673 Akropolis.100, Rocks.100
TCP 47262 Delta.050
TCP 48006 Fragglerock.200
TCP 49683 HolzPferd.210
TCP 50000 Infector.180
TCP 50130 Enterprise.100
TCP 50766 Fore.100
TCP 51234 Cyn.210
TCP 51966 Cafeini.080, Cafeini.110
TCP 54321 PCInvader.010
TCP 57341 NetRaider.100
TCP 57922 Bionet.084
TCP 58008 Tron.100
TCP 58009 Tron.100
TCP 59090 AcidReign.200
TCP 59211 DuckToy.100, DuckToy.101
TCP 59345 NewFuture.100
TCP 60000 DeepThroat.300, MiniBacklash.100, MiniBacklash.101, MiniBacklash.101
TCP 60411 Connection.100, Connection.130
TCP 60412 Connection.130
TCP 60552 RoxRat.100
TCP 63536 InsaneNetwork.500
TCP 63878 AphexFTP.100
TCP 63879 AphexFTP.100
TCP 64969 Lithium.100
TCP 65000 Socket.100
UDP 1 SocketsDeTroie.250
UDP 666 Bla.200, Bla.400, Bla.503, Noknok.820
UDP 1130 Noknok.800, Noknok.820
UDP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
UDP 2989 Rat.200
UDP 3128 MastersParadise.970
UDP 3129 MastersParadise.920, MastersParadise.970
UDP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
UDP 3333 Daodan.123
UDP 3800 Eclypse.100
UDP 3996 RemoteAnything.364
UDP 4000 RemoteAnything.364
UDP 5555 Daodan.123
UDP 5881 Y3KRat.110, Y3KRat.140
UDP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
UDP 5883 Y3KRat.110, Y3KRat.140
UDP 5884 Y3KRat.140, Y3KRat.150
UDP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
UDP 5886 Y3KRat.120, Y3KRat.140
UDP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
UDP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.150
UDP 6953 Lithium.100
UDP 8012 Ptakks.217
UDP 10067 PortalOfDoom.100
UDP 10167 PortalOfDoom.100
UDP 10666 Ambush.100
UDP 11225 Cyn.100, Cyn.103, Cyn.120
UDP 11306 Noknok.800, Noknok.820
UDP 12389 KheSanh.210
UDP 12623 Buttman.090, Buttman.100
UDP 12625 Buttman.100
UDP 14100 Eurosol.100
UDP 23476 DonaldDick.155
UDP 26274 Delta.050
UDP 27184 Alvgus.100
UDP 28431 Hack'a'Tack.2000
UDP 28432 Hack'a'Tack.2000
UDP 28433 Hack'a'Tack.2000
UDP 28434 Hack'a'Tack.2000
UDP 28435 Hack'a'Tack.2000
UDP 28436 Hack'a'Tack.2000
UDP 29891 Unexplained.100
UDP 30103 NetSphere.131
UDP 31320 LittleWitch.400, LittleWitch.420
UDP 31337 BackOrifice.120, OPC.200
UDP 31416 Lithium.100, Lithium.101
UDP 31789 Hack'a'Tack.100, Hack'a'Tack.112
UDP 31791 Hack'a'Tack.100, Hack'a'Tack.112
UDP 33333 Blackharaz.100
UDP 47262 Delta.050
UDP 49683 HolzPferd.210
UDP 60000 MiniBacklash.100
Just goto start >run>cmd
and type "netstat -an" you will get a complete list of open ports and their connections.
p.s:
the list may be wrong somewhere. you see its a long one
SERIAL KEYS
But most of the times when we try search string like "serial key for....."
we get a lot of reviews about the product and other crap.
Now here is a simple way to solve this problem.
Get the serial number you need ! (For Certain Things)
* Go to Google.
* In the search field type: "Product name" 94FBR
* Where, "Product Name" is the name of the item you want to find the serial number for.
* And voila - there you go - the serial number you needed.
HOW DOES THIS WORK?
Elementary my dear friends!
94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.
See these example searches:
"power dvd 7" 94FBR
".... antivirus" 94FBR
1.11.07
BROWSER BOOKMARKS
without any of my precious bookmarks. Now i think it is necessary to know how to back up
bookmarks.
This is to be taken as both a warning and a tutorial, cause I know lots of people that've lost all their bookmarks because of a virus, or failed harddrive etc.
So here is how to make a copy of all your bookmarks from FireFox.
go to "bookmarks"->"organize bookmarks"
select all your bookmarks.
go to "file menu" -> "export"
select your location (where you want to save it.)
and save with the name you prefer.
e.g.
bookmarks.html
Now to get these bookmarks back.
goto "bookmarks"->"organize bookmarks"
"file menu" -> "import"
from the next window select "from file"
and select the saved file.
there you go. all your precious bookmarks are yours again.
I know most of you already know this, but it's for the people that don't know about it.
FIREFOX
Here's what you do:
In the URL bar, type “about:config” and press enter. This will bring up the configuration “menu” where you can change the parameters of Firefox.
Note that these are what I’ve found to REALLY speed up my Firefox significantly - and these settings seem to be common among everybody else as well. But these settings are optimized for broadband connections - I mean with as much concurrent requests we’re going to open up with pipelining… lol… you’d better have a big connection.
Double Click on the following settins and put in the numbers below - for the true / false booleans - they’ll change when you double click.
Code:
browser.tabs.showSingleWindowModePrefs – true
network.http.max-connections – 48
network.http.max-connections-per-server – 16
network.http.max-persistent-connections-per-proxy – 8
network.http.max-persistent-connections-per-server – 4
network.http.pipelining – true
network.http.pipelining.maxrequests – 100
network.http.proxy.pipelining – true
network.http.request.timeout – 300
“network.http.pipelining” to “true”
“network.http.proxy.pipelining” to “true
Lastly right-click anywhere and select New-> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0″. This value is the amount of time the browser waits before it acts on information it receives.
Now you should notice you’re loading pages MUCH faster now!
say "thank you onkar" if you like it.
MOVIES
now here is a trick that works 100%.
First you have to look for your subtitles, here is a site:
http://www.divxsubtitles.net/
Put it in the same folder from your movie and rename the file to the name from the movie:
Example:
Name movie: Pirates of The Caribbean 2 - Dead Mans Chest.DvdRip.CD1
Name subtitle: xxxx.srt
Rename:
Name movie: Pirates of The Caribbean 2 - Dead Mans Chest.DvdRip.CD1
Name subtitle: Pirates of The Caribbean 2 - Dead Mans Chest.DvdRip.CD1.srt
After you did this you download this tool:
Pass
laptops
It's stands in Microseconds so 1000 ms is 1 s offcourse.
5500 is 5.5 s.
Then everything should work perfect and then you have subtitles! Hope this is help to a lot of people
Enjoy!!
P..S :
much as it pains me to confess but this trick doesn't belong to me.say thanx to laptop
from whom i got this.
18.10.07
XP boot problems
here i have listed most frequent boot failure problems and have also tried to provide the answers for the same.
i hope you will find this useful.
1.when you first power on your pc , the bios after completing its routines examines the MBR(master boot record) and starts booting sequence.
At this point sometimes boot failure occurs.
fix: insert windows XP CD , choose repair and enter "FIXMBR"
2. next step is to call NTLDR(NT loader) this in turn loads "boot.ini" if this file is missing a
message "NTLDR is missing" gets displayed . i think most are familiar with this error.
fix: enter "fixboot.c" after choosing repair and copy "NTloader" from setup CD.
3. in case multiple operating systems the boot menu gets displayed. then the user is asked to
select one.
the message "boot.ini" gets displayed
fix: enter "bootcfg/rebuild after choosing repair.
4. Then all the installed hardware components are checked (if you want to see this process
disable the splash screen)
"NTdetect not found"
fix: enter windows disk and copy "\i386\ntdetect"
5. Loading of kernels
" Bluescreen of death"
fix: enter setup disk and select repair. then repair boot partition.
if this fails reinstalling windows is only solution.
6. Next step is to load all the device drivers.
" Bluescreen of death"
fix: boot windows in safe mode. then remove the faulty driver/s .
i faced this problem not too long ago with my TV tuner card and the solution is to remove
the hardware.
7. windows hangs at "windows is booting...."
fix: turn off the pc and go to microsoft website.
You will find about a billion problems with solutons.
8. windows services startup.
" Bluescreen of death"
cause: viruses
fix: boot in safe mode , remove the virus and repair windows.
9. incorrect password
fix: use a password recovery disk.(search GOOGLE for the s/w i wont tell you)
don't use this if the pc doesn't belong to you.
10.from here onwards no specific solution is available.
bluescreens will rain upon you , system will hang on its own and much more...
fix: innumerable fixes
go to run>msconfig>startup and clear non responding auto starts.
10.
6.10.07
"YAHOO AWARDS AND WINDOWS LIVE " is a fraud
Hi buddy,
I just received this mail telling me that I have won this huge money
from yahoo! I don't know if I had entered in any such contests. I tried
to search about "yahoo! awards" on "Google" and all my results there
told me that its fake. But as you can easily see that this is one huge hell
of money so obviously I will be happy if I can somehow get it.just post
a reply if you know anything about this. As I have got 15 days to reply,
your suggestions will really help me.
Yahoo Awards Center
124 Stockport Road, Longsight, Manchester M60 2DB - United Kingdom
This is to inform you that you have won a prize money of SIX
HUNDRED,THOUSAND POUNDS Great Britain Pounds ( £600,000.00) for the
2007 Promotion which is Organized by YAHOO AWARDS & WINDOWS LIVE.
YAHOO! collects all the email addresses of the people that are active
online, among the millions that subscribed to Yahoo and Hotmail and few
from other e-mail providers. Six people are selected monthly to benefit
from this promotion and you are one of the Selected Winners.
PAYMENT OF PRIZE AND CLAIM
Winners shall be paid in accordance with his/her Settlement Center.
Yahoo Prize Award must be claimed not later than 15 days from date of Draw
Notification. Any prize not claimed within this period will be
forfeited.
Stated below are your identification numbers:
BATCH NUMBER: YPA/06/APA-43658
REFERENCE NUMBER: 2006234522
PIN: 1206
These numbers fall within the England Location file and you are
requested to contact our fiduciary agent in Manchester and send your winning
identification numbers to him;
Agent Name: Dr James Thomas
E-Mail: claimsofficer_djt@yahoo.com
Tel: +447045754575
As soon as our agent hears from you, he shall commence the process that
will facilitate the release of your fund to you.
Congratulations!! once again.
Yours in service,
Dr. (Mrs.) Edith Barth
Answer:
Friends do not fall for any thing like this. THIS IS FRAUD.
5.10.07
Trouble shooting your PC
try to help you solving the other problems.
- 1.HDD failures:
can be anything like you took it to your friends place, who has a lot of movies and games and the drive works well at his place but when you connect it back to your good old PC it just wont work. Other factors though highly rare compared to above mentioned are overheating, aeging, or a huge shock.
This is all so easy to speak but when you are in real hurry to complete your
project then it really becomes frustrating.
TRY THIS:
- First of all just check whether you have connected the cables properly .It may be possible that the data or power cable is not connected properly.Even after this if the problem continues then try buying a new data cable.these are extremely cheap and will cost between 20 to 40 rupees at most.
- If you have got a "live" disk then try and boot using that disk and see whetheryour hdd is responding.
- Take it back to your friends place. if it works then copy all your data to the other hdd and format yours.Then you can easily get your data back any time you want.
- There is possibility of bad sectors being formed on your hdd.Try a good bad sector remover. for that you can search GOOGLE or you can get it from here
- If the problem continues then the solution is to go for data recovery softwares.Again search google or get it from here
- One last solution is to put your hard drive in freezer.Yeah, i mean it. Just wrap it properly in plastic so that water wont get inside it.keep it for at least 24 hrs.Then get rid of any condensation before connecting it back. This may make your drive work for one last time and then dont turn your PC off until you have got all the important data like games , movies copied and secured.Then you can think whether or not to copy trivial data like projects and all that.
25.9.07
not hindu vs muslim
it was an absolute cracker of game of cricket that can only be played between arch rivals INDIA and pakistan. As it was expected the the driving schools never needed
to find any low traffic roads for the learning drivers,alas the learners as well as the tutors
were highly reluctant to come out and miss the game. Till almost 17th over it was a one sided
affair tilted towards INDIA but then misbah turned the game in pakistan's favor.pakistan had almost won when again misbah himself attempted a foolish scoop that landed in shreesanth's hand giving INDIANS a night to celebrate and a moment to cherish.
Doesn't all this look like a great and healthy contest between two national teams?
While everyone was talking about the game, a looser of a shoaib malik thanked "muslims all over the world" and tried to make the match as a "Hindu vs Muslim" affair.But he conviniently forgot IRFAN being the man of the match.While this game will be remembered by every INDIAN not only for we won it but also for those nonsense comments of shoaib malik.
i dont know how bush and mush will react to this!
what say you my friends?
21.9.07
लातूर PATTERN
Sinhgad Institutes,Pune
harsha123kool@yahoo.com
The rank lists of secondary as well as higher secondary school examinations in Maharashtra are considered indicators of certain realities in the State। For four consecutive years - from 1999 to 2001 - the toppers in the HSC examination were from Dayanand College, Latur। The merit list for medical as well as engineering seats also had more than a hundred students from Latur district।
The success of Latur is truly amazing। While western Maharashtra progressed economically and socio-culturally Vidarbha and Marathawada regions remained backward as far as education was concerned। Latur, one of the seven districts of drought-prone Marathwada, was a part of Hyderabad State before Independence। Until 1950, students from Marathwada had to go to Hyderabad to attend college। The then Chief Minister of Maharashtra, Y।B। Chavan, encouraged the establishment of schools and colleges in rural Marathwada। Gradually, some of these educational institutions came to have well-equipped laboratories and excellent libraries, apart from good teachers।
The decade of 1970-1980 was a critical period for the majority of the colleges in Marathwada. The University Grants Commission (UGC) offered grants in proportion to the number of students. This compelled colleges to send its teachers to the villages in search of students. Dr. J.M Waghmare, the founder principal of the Rajarshi Shahu College, urged fellow teachers to go to the villages and help people overcome their fear of college education. Dr. A.S. Jadhav, the Vice-Principal of the Rajarshi Shahu College, exhorted his colleagues to cut short their vacations and utilise it to teach students. This idea clicked. With teachers devoting personal attention to each student, success became a hallmark of the Rajarshi Shahu College. The working spirit evolved by Waghamre and Jadhav is maintained even now.
With academic competition becoming fierce in the 1980s, teachers in Latur also decided to improve the curriculum and teaching pattern in their colleges. The Rajarshi Shahu College and later the Dayanand College adopted innovative teaching techniques. Every student was given personal guidance after his/her capabilities were evaluated. Parents were briefed and consulted. Suggestion boxes were kept near classrooms so that students could offer their evaluation of the performance of their teachers. Teachers thus became accountable to the students. The Shahu method of education was later adopted by the Mahatma Gandhi College, Ahmedpur, near Latur.
In 1987, the Supreme Court, in a landmark judgment revoked the restrictions based on geographical regions in the matter of admission to professional colleges. Until then, a student from Marathwada or Konkan could join only colleges in their own region. Now 70 per cent of the total intake in professional colleges are from that particular region and 30 per cent from outside the region, on the basis of merit. From 1988 to 1999, students from the Shahu College accounted for about 120 seats in all government medical colleges and 80 seats in the engineering colleges, in the merit quota. Students of the Dayanand College and the Mahatma Gandhi College were not far behind. Thus Latur grabbed 90 per cent of the open seats in professional colleges across the State year after year. This brought Latur to the limelight in the State. Candidates from the neighbouring districts of Marathwada began to seek admission in Latur colleges.
In 1999, the government of Maharashtra decided to conduct common entrance tests (MH-CET) for all medical colleges. Four years of the test has seen students from the Shahu College leading the lists of successful candidates. The Principal of the Shahu College, R.L. Kawale, says: "The kind of preparation needed for MH-CET is taken care of only in Latur and Ahmedpur." This year 150 students from Latur secured seats in medical colleges.
But there is a lot of debate about the overall quality of education in Latur. Dr. Jadhav admits: "The so-called `Latur pattern' is a technique for getting good marks in HSC examinations. It is not at all ideal education. Parents crave to put their children in medical or engineering colleges and hence this is a demand-driven programme that has nothing to do with the multi-faceted development of a student.''
The real beneficiaries of the Latur system are the rural lower middle class students। Today students from Latur have made their way to the Birla Institute of Technology in Pilani(BITs) or National Institute of Technologies(NITs)। They also come back to Latur once a year to guide HSC pass-outs in selecting the right colleges and disciplines. Latur Students Association (LSA) is one such Nobel Endeavor initiated by Latur Alumni.