2010 here we come!

Posted by webmaster | 8:10 AM | , , | 8 comments »


Haktech is getting stroger!..

TO my little boy Ethan.. i love you. happy new year, even thou we are far apart. my mind and my heart will always be with you..Happy new year to you.

this will be a great year for haktech and nsfive SEO solutions. please visit haktech for more free tools and information.

How to detect virus on your computer?

This is another updated guide by haktech solutions. the best online guide for computer users on how to remove and detect virus on a windows based computer. anyone at all ages can do this removal process, and we call it as a "standard procedure on removing virus"

Now for beginner and new users. you may ask.

  • what is a virus?
  • what is a trojan?
  • what is a computer worm?

Advance users like me can detect if a computer is infected. there are many types of infection.
but it is very important that you know what windows services and programs are running on your system and if you have installed some other programs, you should know what it is and where it resides. so that you can identify programs that are windows default and installed by you.

How to see running programs and service in your computer?

By default, windows comes with a tool that lets you see programs and services installed and running in your computer. and it is called the "Windows Task Manager"

to access the Windows Task Manager is very simple. just press CTRL + ALT + DEL
this will bring you to the Windows Task MAnager.

from here you can find windows programs and services.

Default Microsoft programs and Service - this is a list of windows default programs and services.

if you found unknown programs listed on the programs or services then you may want to know more about it just to make sure it its harmfull or not.

Another way to identify is to use a more advance tool compared to the "windows Task Manager" this tool is so called HijackThis.

This tool have some advance feature that the windows task manager, you can go to the services window and disable all windows

services and also you can disable all windows startup program in just one click. that is if you are that paranoid.

by using either windows task manager or hihackthis you have the advantage to detect virus or any suspicious program/services

running in your computer.

Now. if you found any suspicious programs or services. it is time to do the standard removal part. you can either skip the 1st part and run this standard virus removal procedure automatically.

Standard procedure on removing virus:

1. We need to download combofix - combofix a an automated process that detects virus,spyware, malware automaticaly and
remove them on your system. using advance detection to detect such harmful programs on your computer.


2. Once done downloading combofix. before running it. you should
  • Check if your current virus scanner is running, if it does. please disable it as it may conflict the fix.

  • Unplug or disconnect from your network. this will ensure that your computer is not connected to any type of network connections. if you are using wireless network, disable the wireless and disconnect form your current network.
  • Lastly, you will need to close all running program. like internet explorer, firefox, yahoomesseger, skype, etc. check your system tray beside your system clock and exit/close all running programs residing in the system tray.

Now Run ComboFix

After running combofix, your computer will restart. and combofix will deliver reports on deleted files, you will see full

report given by the Combofix. now before connecting to your network. make sure you have enabled your virus scanner, then

connect to your network. for safety measures. also update your virus scaner to any new definition files. to stay protected.

The human brain is the center of the human nervous system and is a highly complex organ. According to BBC,A detailed, functional artificial human brain can be built within the next 10 years, a leading scientist has claimed. The team are trying to reverse engineer the brain.

"Nice, but I highly doubt it. First, our brain works in a self learning mode. As far as I know there is no such technology exists. In other words all your efforts are good and but you can't build a artificial brain as it will not be functional like our brain. However, this research could give insights into brain disease and may find out many other details about our brain."

Maybe create a zombie soldiers.. lol.. anyway if this experiment will be successful then we can get some brains transplant. the last thing is how to transfer ones self into another black brain?.. we could be immortal by that time. earth is getting interesting.

"2012 - this is the topic everybody is concerned. the Mayan calendar ends in 2012. and this is the big issue, Does our world ends at 2012 too?.. well no body knows. but if we look back in time. Nostradamus predictions became true. he predicts Hitler and the twin towers. .and also the year 2012. he even predicts the day he died. isn't this scary?.. now Nov. 2009. a group of investors will invest the first Hotel in space. and will be open a 2012. if the prediction will be true. then. i think they will be the only survivor of the human race.. oh well. . why they choose 2012 and the project is on a rapid development.. do they know something that we don't. well lets see about that.."

read below.
A company behind plans to open the first hotel in space says it is on target to accept its first paying guests in 2012 despite critics questioning the investment and time frame for the multi-billion dollar project.

The Barcelona-based architects of The Galactic Suite Space Resort say it will cost 3 million euro for a three-night stay at the hotel, with this price including an eight-week training course on a tropical island.

During their stay, guests would see the sun rise 15 times a day and travel around the world every 80 minutes. They would wear velcro suits so they can crawl around their pod rooms by sticking themselves to the walls like Spiderman.

Galactic Suite Ltd's CEO Xavier Claramunt, a former aerospace engineer, said the project will put his company at the forefront of an infant industry with a huge future ahead of it, and forecast space travel will become common in the future.

"It's very normal to think that your children, possibly within 15 years, could spend a weekend in space," he told Reuters Television.

A nascent space tourism industry is beginning to take shape with construction underway in New Mexico of Spaceport America, the world's first facility built specifically for space-bound commercial customers and fee-paying passengers.

British tycoon Richard Branson's space tours firm, Virgin Galactic, will use the facility to propel tourists into suborbital space at a cost of $200,000 a ride.

Galactic Suite Ltd, set up in 2007, hopes to start its project with a single pod in orbit 450 km above the earth, traveling at 30,000 km per hour, with the capacity to hold four guests and two astronaut-pilots.

It will take a day and a half to reach the pod - which Claramunt compared to a mountain retreat, with no staff to greet the traveler.

"When the passengers arrive in the rocket, they will join it for 3 days, rocket and capsule. With this we create in the tourist a confidence that he hasn't been abandoned. After 3 days the passenger returns to the transport rocket and returns to earth," he said.

More than 200 people have expressed an interest in traveling to the space hotel and at least 43 people have already reserved.

The numbers are similar for Virgin Galactic with 300 people already paid or signed up for the trip but unlike Branson, Galactic Suite say they will use Russian rockets to transport their guests into space from a spaceport to be built on an island in the Caribbean.

But critics have questioned the project, saying the time frame is unreasonable and also where the money is coming from to finance the project.

Claramunt said an anonymous billionaire space enthusiast has granted $3 billion to finance the project.

Source: YahooNews

" You may overgrow my lap, but never my heart, hapi bday Ethan..we love you!.. :) "

Left for Dead 2 in game demo. i was interested in using the skillet to kill zombies..hehehehe..

Microsoft first introduced multi-touch in Microsoft Surface. Since then, the Windows and Surface development teams have been collaborating closely on bringing multi-touch to Windows, and last year demoed a few applications they created to run on Windows 7. Today, the company unveiled the Microsoft Touch Pack for Windows 7.

The Microsoft Touch Pack for Windows 7 is a set of six multi-touch optimized applications and games that are designed to truly showcase the capabilities of Windows Touch in Windows 7. It consists of 3 casual games, and 3 Microsoft Surface applications that have been created for Windows 7.

To use the Microsoft Touch Pack for Windows 7 - you'll will need a Windows 7 PC that supports multi-touch. The Microsoft Touch Pack for Windows 7 will be available to PC makers (OEMs) who will have the option to pre-install some, none, or all of the applications available in the Microsoft Touch Pack for Windows 7 on PCs designed for Windows Touch (PCs that meet the logo requirements for Windows Touch) - so you should start to see these applications showing up on some touch PCs around the time Windows 7 is made broadly available.

Applications For Microsoft Touch Pack for Windows 7

1. Microsoft Surface Globe
2. Microsoft Surface Collage!
3. Microsoft Surface Lagoon
4. Microsoft Blackboard
5. Microsoft Rebound
6. Microsoft Garden Pond

Facebook.com is now releasing the facebook lite.
this is an easy and fast interface for people using facebook from
slow internet connection. you can try it. http://lite.facebook.com/

Facebook users beware. Psychologists are now probing a new kind of addiction called Facebook Addiction Disorder (FAD).

Psychologist Dr. Michael Fenichel, who has published numerous writings on FAD online, describes it as a situation in which Facebook usage "overtakes" daily activities like waking up, getting dressed, using the telephone, or checking e-mail.

"The amazing thing is that, like cellphones, nobody seems to notice the vast amount of time and energy - at work, at home, and now while on the move - people are devoting to Facebook. It has become a given," Fenichel writes in an online post titled "Facebook Addiction Disorder- A New Challenge?"

FAD could be classified under the more broad "internet addiction disorder" or internet overuse.

Academic papers have already posed theories on internet addiction and social networking addiction, and even less, cellphone addiction.

"Like most activities, moderation and integration are key. Those that may seriously label and treat FAD as a behavioral addiction will clearly need to use context in determining if a behavior has become demonstrably harmful to overall social, work, or face-to-face interpersonal efficacy," Fenichel added.

You are a Facebook addict if...

According to Joanna Lipari, a clinical psychologist at the University of California, Los Angeles who was interviewed for a CNN report, here are some signs that you are addicted to Facebook:

1. You lose sleep over Facebook. When using Facebook becomes a compulsion and you spend entire nights logged on to the site, causing you to become tired the next day.

2. You spend more than an hour a day on Facebook. Lipari said it is difficult to define how much is too much when it comes to Facebook usage, but that an average person need only spend half an hour on the site.

3. You become obsessed with old loves or exes you reconnect with on Facebook.

4. You ignore work in favor of Facebook. This means you do not do your job in order to sneak time on Facebook.

5. The thought of getting off Facebook leaves you in cold sweat. If you try going a day without Facebook and it causes you stress and anxiety, this means you need help.

According to the same report by Elizabeth Cohen, Senior CNN Medical Correspondent, Facebook addiction is not yet an actual medical diagnosis.

However, the report notes that several therapists in the United States have noticed a rise in the number of clients who get hooked on social networking, to the point of social dysfunction.

Facebook fun

Facebook, launched by the world's youngest billionaire Mark Zuckerberg, has over 300 million users worldwide, half of whom log on to the site every day.

Further, about 2 billion photos and 14 million videos are uploaded on various Facebook pages a month and about 6 billion minutes are spent on Facebook a day, worldwide.

According to Willis Wee, founder of the social media and marketing blog Penn-Olson.com, this is twice as much time that people spend on Google.

The global social networking website allows users to post and share content (like photos, links, videos, and notes), play casual games and applications, and interact with friends and family through messaging and chat. abs-cbnNEWS.com. With reports from CNN.com.

Clean and Optimize Your Registry:
This is a simple guide on how to clean your windows registry, repair errors and remove unused registry entry's
first of all you will need to download and install a software from COMODO. you can download here
"Download System Cleaner"
after downloading it. install and run.

there is also a portable version where you can just run it from your USB flash drive. no need to install
you can also download it here "System Cleaner Portable"

Memory Improve Master:

Memory Improve Master is an intellectualized and easy-to-use application designed to optimize and monitor system memory. It frees up and compresses system memory to make processes run faster and crash less often. Powerful features include the ability to view and monitor data of RAM memory, paging file usage and CPU usage in real time, set parameters RAM

optimization, display running processes on you PC, etc.
Generally, main causes of system slow down :
• Many programs are running but not using the memory efficiently
• Large and heavy sized applications are running simultaneously
• Memory resources is not enough
• Hard drive has been fragmented
• Computer is infected with virus

Memory Improve Master improves computer's performance by freeing memory. The software helps you, when:
• Your Computer runs slowly
• You Want to Optimize Memory
• Computer crashes too frequently
• No available memory sources in your system disk space.
• Key features of Memory Improve Master:
• Run in background and optimize memory periodically.
• An intelligent learning module added for improving PC's performance more strongly. (New feature added)
• Support updating online. (New feature added)
• Free up memory immediately.
• Compress memory to reclaim more available space.
• Tune up and speed up the system performance.
• Manage processes running on your computer.

Download Here

ORCHARD PARK, N.Y. (AP)—It didn’t take long for Ryan Abshagen to discover how many Buffalo Bills fans are unhappy with their team and want owner Ralph Wilson to make sweeping changes.

In a little more than a week, Abshagen, an unemployed 18-year-old from New Freedom, Pa., raised enough money—$1,402 and counting as of Wednesday— through an Internet campaign to rent a billboard and advertise a message of discontent for everyone in Buffalo to see.

“I honestly never thought it would ever be this big,” Abshagen said. “Fans are disgruntled. It’s out there. It’s big. People are going to hear about it.”

Starting early Monday and running for a week, the message will be flashed up to 3,000 times a day on a digital billboard overlooking Interstate 190 on the south side of the city, said Abshagen after signing a contract with an advertising company.
Source: Yahoo Sports

Old school maybe, but hey. kids still play SUper Mario!..

Captain Lou Albano dies at 76, REST IN PEACE cap.! from haktech we will remember you.

As he always say that if you do drugs
, "you'll go to hell before you die."

SEO can definitely help your website. SEO (search engine optimization) will improve your website rankings in the search engines for relevant keywords and links, bringing more customers and conversions for your business. Without SEO, your traffic and sales will not increase.

SEO tools and tutorials can be found at nsfive seo website

Blogger by default is automatically a rel=nofollow
in this haktech tutorial. we will be removing the rel=nofollow and
make your blog a dofollow blog. this is very simple, remember this
hack only applies to new Blogger styled layout.
Before beginning this hack remember to backup your template

Login to your dashboard and click on the Layout Link. then click on the Edit Html Subtab for Templates.

Here is the important part. On the upper right of the template edit area, there is a checkbox labeled E
xpand Widget Templates. Make sure it is checked.

Search for nofollow in your template code. You can either use your browser menu by clicking on Edit>Find in page or press Ctrl + F. When the search dialog box comes up, type in nofollow, and enter.

Delete the portion of the code that says rel='nofollow' and Save Your Template.

Optionally remove Nofollow from backlinks

By doing another search for nofollow in your expanded template, you will find another one for your backlinks. You can choose to delete this as outlined above -- or not.

If you do delete the reference, do at your own risk. Backlinks are outside of your control and cannot be moderated. You can turn them off altogether via your Settings>Comments Tab.

Tucan Manager

Posted by webmaster | 8:31 AM | , , | 0 comments »

Tucan Manager is a free and open source software designed for automatic management of downloads and uploads at hosting sites like rapidshare or megaupload. Download Here

Main Features:

  • Written entirely in Python.
  • Multiplatform (GNU/Linux, FreeBSD, Microsoft Windows…).
  • Easy to expand with plugins.
  • Lightweight and fast.
  • Premium accounts support.
  • Captcha recognition where needed.
  • Management of interchangeable links.

Warning: Take note and defend your self before its too late.

Recently i have stumbled into this article published by Yahoo. and as i have read it.
it sparks me and as it is true. we should be very careful with out identity.

Security researchers are warning that Web-based applications are increasing the risk of identity theft or losing personal data more than ever before.

The best defense against data theft, malware and viruses in the cloud is self defense, researchers at the Hack In The Box (HITB) security conference said. But getting people to change how they use the Internet, such as what personal data they make public, won't be easy.

People put a lot of personal information on the Web, and that can be used for an attacker's financial gain. From social-networking sites such as MySpace and Facebook to the mini-blogging service Twitter and other blog sites like Wordpress, people are putting photos, resumes, personal diaries and other information in the cloud. Some people don't even bother to read the fine print in agreements that allow them onto a site, even though some agreements clearly state that anything posted becomes the property of the site itself.

The loss of personal data by Sidekick smartphone users over the weekend, including contacts, calendar entries, photographs and other personal information, serves as another example of the potential pitfalls of trusting the Cloud. Danger, the Microsoft subsidiary that stores Sidekick data, said a service disruption almost certainly means user data has been lost for good.

Access to personal data on the cloud from just about anywhere on a variety of devices, from smartphones and laptops to home PCs, shows another major vulnerability because other people may be able to find that data, too.

"As an attacker, you should be licking your lips," said Haroon Meer, a researcher at Sensepost, a South African security company that has focused on Web applications for the past six years. "If all data is accessible from anywhere, then the perimeter disappears. It makes hacking like hacking in the movies."

A person who wants to steal personal information is usually looking for financial gain, Meer said, and every bit of data they can find leads them one step closer to your online bank, credit card or brokerage accounts.

First, they might find your name. Next, they discover your job and a small profile of you online that offers further background information such as what school you graduated from and where you were born. They keep digging until they have a detailed account of you, complete with your date of birth and mother's maiden name for those pesky security questions, and perhaps some family photos for good measure. With enough data they could make false identification cards and take out loans under your name.

Identity theft could also be an inside job. Employees at big companies that host e-mail services have physical access to e-mail accounts. "How do you know nobody's reading it? Do you keep confirmation e-mails and passwords there? You shouldn't," said Meer. "In the cloud, people are trusting their information to systems they have no control over."

Browser makers can play a role in making the cloud safer for people, but their effectiveness is limited by user habits. A browser, for example, may scan a download for viruses, but it still gives the user the choice of whether or not to download. Most security functions on a browser are a choice.

Lucas Adamski, security underlord (that's really what his business card says) at Mozilla, maker of the popular Firefox browser, offered several bits of cyber self defense advice for users, starting with the admonition that people rely on firewalls and anti-virus programs too much.

"You can't buy security in a box," he said. "The way to be as secure as possible is about user behavior."

There is a lot of good built-in security already installed in browsers, he said. If you get a warning not to go to a site, don't go to it. When you do visit a site, make sure it's the right one. Are the images and logos right? Is the URL correct? Check before you proceed with filling in your username and password, he counseled.

Software updates are vital. "Make sure you have the most up-to-date version of whatever software you use," he said. Updates almost always patch security holes. Key software programs such as Adobe Systems' Flash Player and Reader are particularly important to keep updated because they're used on so many computers and are prime targets for hackers.

He also suggested creating a virtual machine on your computer using VMWare as a security measure.

"It's really hard to get people to change their browsing habits," he said. People want to surf the Web fast, visit their favorite sites and download whatever they want without thinking too much about security. "Educate them, move them along, but don't expect them to become security experts."

Internet browser makers take great care in building as much security as possible into their products and putting them through rigorous testing.

The security team for Google's Chrome browser, for example, will take the first crack at any major update to the software, hacking away to find vulnerabilities or ways to improve security, said Chris Evans, an information security engineer at Google.

After the Chrome security team takes a whack at the software and it is reworked to fix the holes they found, other security teams at Google will have a go at the product to see what trouble they can cause. Finally, the software is released in beta form, and private security researchers and others can hack away. Any problems are fixed before the final release goes out and then the Chrome team stands ready to make new patches for any other security issues that crop up.

Despite all the testing, browser makers are only one part of the security solution because they have no control over Web software or user browsing behavior.

The cloud is the Wild West: hackers and malware makers abound, phishers seek passwords and users do whatever they want to, recklessly surfing and downloading potentially dangerous content as judged by security researchers.

Companies developing Cloud applications and services will need to do more for Web security. Amazon.com with its Web Services and Google as it moves forward with initiatives, such as Google Docs, that attempt to draw people to Web applications and away from computer applications will need to work more closely with security researchers, Meer said.

And Google's work on the security in the Chrome browser highlights the reason why: Computer applications such as Chrome face intense scrutiny by security researchers throughout the Web, while Web applications do not.

"Reverse engineering keeps [big software companies] honest," said Meer. "If they hide something in the software code, sooner or later someone finds it. With Cloud services, you just don't know because we simply cannot verify it."

Cloud applications are built by one company, and nobody is looking at the code or how safe it is, said Meer. Applications for computers are different. They can be ripped apart by security experts then put back together stronger so there are no security holes, he said.

"Trust but verify," said Meer. "Just because a guy does no evil today, we cannot trust that they will do no evil tomorrow because we simply cannot verify it."

Source: Yahoo.com

The song is prophetic, as they succinctly summarize what the late King of Pop represents to his global listeners:

"This is it, here I stand
I'm the light of the world I feel grand
This love
I can feel
And I know yet we're sure it is real"

For a second, you feel as though Michael recorded this track for this very moment. The lyrics are actually about gently ending a relationship with a lover.

This song makes us miss him that much more.

Disc 1 of the 2-CD set includes a compilation of hits. Disc 2 includes demo recordings of "She Out Of My Life," "Wanna Be Startin' Somethin'," and "Beat It."

Track List of the Album

Disc 01

"Wanna Be Startin' Somethin'"
"They Don't Care About Us"
"Human Nature"
"Smooth Criminal"
"The Way You Make Me Feel"
"Shake Your Body (Down To The Ground)"
"I Just Can't Stop Loving You"
"Beat It"
"Black Or White"
"Earth Song"
"Billie Jean"
"Man In The Mirror"
"This Is It"
"This Is It (Orchestra Version)"

Disc 02
"She's Out Of My Life (Demo)"
"Wanna Be Startin' Somethin' (Demo)"
"Beat It (Demo)"
"Planet Earth (Poem)"

Rest in Peace Jacko!..

MADRID (AFP) - – Boyzone singer Stephen Gately, 33, died on Saturday while on holiday in Majorca off the coast of Spain, the Irish band with a string of hits in the 1990s said on its website.

"Stephen tragically died yesterday whilst on holiday with his partner Andrew in Majorca," the site said on Sunday.

The Boyzone members, including lead singer Ronan Keating, were heading to Majorca following news of the death.

The circumstances surrounding Gately's death remained unclear but (Britain's) News of the World newspaper reported he died after a night out.

Boyzone manager Louis Walsh told the newspaper: "We're all absolutely devastated."

He said: "I'm in complete shock. I was only with him on Monday at an awards ceremony. We don't know much about what's happened yet... He was a great man."

Speaking to the newspaper late Saturday, band member Shane Lynch said: "Me and the boys are flying out in the morning.

"We just need to get over to where he's passed and work out what we need to do."

Gately, who married his partner Andrew Cowles in a civil union in 2006, sent ripples through the pop music world 10 years ago when he announced that he was gay.

He joined Boyzone in 1993 after answering an advert in Dublin to audition for Ireland's first boyband.

The band went on to enjoy huge success with six number one singles in Britain, but split up in 2000.

They reunited seven years later, but their recent 19-date Better tour failed to fill stadiums, despite offers of free tickets.

Gately also starred in West End musicals in London, including "Joseph and The Amazing Technicolor Dreamcoat".

Boyzone lead singer Keating was "completely distraught", the News of the World said, and former Irish prime minister Bertie Ahern paid tribute to Gately, whom he knew, on the BBC's Andrew Marr show.

He said: "The Gatelys are in my own constituency. I know the family, I know Stephen.

"He (Gately) was with us the other night with his boyfriend Andy, he came to my book launch."

Ahern, whose daughter Georgina is married to Nicky Byrne of boyband Westlife, continued: "It's just such a tragedy.

"Boyzone and Stephen, they've all been part of Irish life and far wider than that, the last 15 years, and so successful, so it's a huge, huge tragedy. It's so sad."

Gately last posted a message on his Twitter page on October 6, writing: "Still busy, lots going on. Focusing on finishing my book next so may be quiet here."

British actor and comedian Stephen Fry said on Twitter that he was shocked at the news.

"Just heard the very sad news about dear Stephen Gately. What a dreadful shock. He was loveable and sweet natured and will be hugely missed."

Source: Yahoo.com

Togsh Togsh..Give me some love..

Posted by webmaster | 10:00 AM | | 0 comments »

Well good day to all haktech fans..
i will be adding more content this week.
so hold on and check us back..

Jai Guru Deva Om

Posted by webmaster | 7:43 PM | 0 comments »

Firstly although the words Guru Diva are the name of Maharishis teacher. Gurus names are often aspects of God almost without exception. This phrase is not so much a homage to Maharishi teacher, its more of praise to God. Remember that Guru also translates as God / Brahma and not just any human teacher. Your thinking of humans, think more broader of the deeper spiritual message. During his immersion in eastern thought his lyrics would have reflected the deeper spiritual sentiment and not just ode to the teachers teacher.
All said here is a better translation.

Jai Guru Deva OM
Victory to God Devine OM

Om cannot easily be translated as a single English word. It is used as the most sacred word in Indian thought. It represents the birth growth and death of the Cosmos. It is also the Vibration / sound of the Cosmos literaly.If you could step outside the Universe and listen to it that is what you would hear. The Yogis hear this in deep meditation. One way of thinking of OM would be Alpha-Omega. From OM all the English words like Omniscience, Omnipresence are derived from. Deva means Divine , this is where the English word divinity comes from. Do you see the Sanskrit roots that have shaped our English words?

So all together it means, "I give thanks (victory) (salutation) to Guru Dev (or heavenly teacher), om".

Pacquiao vs “koto”

Posted by webmaster | 10:20 PM | 1 comments »

We have waited for this fight for so long.
who will be the winner? is it pacquiao or kotto?

i bet on kotto, and hope to bring pacman to KO!

reviewing the fighters statistics on here, i have found an advantage on kotto..

see the fight pacquiao vs kotto..

Party MIX by DJ Mac

Posted by webmaster | 10:50 PM | 0 comments »

ok heres the partymix you have been waiting for. from DJ Mac
Just enjoy the music. thats the point of this release.. :)

More Details Here

Running the Tor on Linux

Posted by webmaster | 7:21 PM | 1 comments »

Running TOR on linux Intruction.

When you want to run TOR on linux. you will need to download
the latest TOR for linux. located in this page. http://www.torproject.org/download-unix.html.en

Select the right packages for youe linux system. form Debian, red hat
, bentoo, bsd and other linux flavors. for ubunto users, it is advise that you
use this link http://www.torproject.org/docs/debian.html.en#ubuntu
for your ubuntu linux.

If you're building from source, first install libevent can be found here
http://www.monkey.org/~provos/libevent/ and make sure you have openssl and zlib (including the -devel packages if applicable).

Then run:
tar xzf tor-; cd tor-
./configure && make
Now you can run tor as src/or/tor, or you can run make install (as root if necessary) to install it into /usr/local/, and then you can start it just by running tor.

Tor comes configured as a client by default. It uses a built-in default configuration file, and most people won't need to change any of the settings. Tor is now installed.

After installing you will need to install Privoxy for Web Browsing
Setup your Web Browsing, Install PRIVOXY can be found here http://www.privoxy.org/
Make sure you have selected the recent releases and pick the right package for you.

PRIVOXY is a filtering web proxy that integrates well with TOR

Now once installed. you will need to configure your PRIVOXY to use TOR.

Open Privoxy's "config" file (look in /etc/privoxy/ or /usr/local/etc/) and add the line
forward-socks4a / .
to the top of the config file. Don't forget to add the dot at the end of the line.

On some distributions, localhost is mapped to an IPv6 address, and some programs might not be able to connect to Privoxy. If so, change the line
listen-address localhost:8118
so that it reads

Privoxy keeps a log file of everything passed through it. In order to stop this you will need to comment out three lines by inserting a # before the line. The three lines are:
logfile logfile
and the line
jarfile jarfile
and (on some systems) the line
debug 1 # show each GET/POST/CONNECT request

Depending on which default config file you have for Privoxy, you may also need to turn off enable-remote-toggle, enable-remote-http-toggle, and enable-edit-actions.

Restart Privoxy for the changes to take effect.

Configure your applications to use Tor

When done installing TOR with Firefox and TORbutton, to be safe always, simply install
the TORbutton plugin for FIREFOX browser can be found here : https://addons.mozilla.org/firefox/2275/

TOR with firefox and torbutton should be use,

To Torify other applications that support HTTP proxies, just point them at Privoxy (that is, localhost port 8118). To use SOCKS directly (for instant messaging, Jabber, IRC, etc), you can point your application directly at Tor (localhost port 9050), but see this FAQ entry

for why this may be dangerous. For applications that support neither SOCKS nor HTTP, take a look at tsocks here http://tsocks.sourceforge.net/ or socat here https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO#socat

For information on how to Torify other applications, check out the Torify HOWTO here https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO

Making sure that it is working.

If tor in firefox is enabled. you will need to open the firefox and browse to see you
IP address. http://www.whatismyip.com

then check your ip address,. now disable TOR in your firefox then check your IP address again.
if the ip address changes. this means TOR is working. now enable TOR back then you can now start surfing anonymously..

If you want to help the TOR community. you may want to be a relay in the network as well.
you can make a relay by following this guide. http://www.torproject.org/docs/tor-doc-relay.html.en

Have Fun. :)

This is one of haktech projects to be. but since we have found somebody is already
doing the project. we will just follow it instead.

hp mini, hp mini 1000, hp mini 110 mi edition, hp mini
110, hp mini 110 xp edition,
hp mini 1101, hp mini 5101, netbook, mobile internet edition, compaq mini, mini 1000,
mini 700, compaq mini 700, vivienne tam edition, netbook pc, hp netbook,
hp mini sleeve, umpc, hp mini forum, compaq mini forum, hp mini 2140, hp mini upgrades,
mini windows 7, 1035nr, hp mini skin, hp mini mobile drive, mini netbook info,
specifications, specs

Things you need for this project.
10.2" Touchscreen kit from mydigitaldiscount.com - 84.99

TouchKit Features:
• 4-Wire 10.1" Analog Resistive Screen
• Touch Screen Response Time <10ms
• High Transmittance >85%
• 25 Points Linearity Position with Edge Compensation
• 3 Additional USB2.0 Ports for Future Modification Plans
• Supports Windows, Mac and Linux Drivers
• Supports 11 Languages for Windows

• Touch Screen Panel
• HUB Harness x 1
• Multi-Function Stylus
• Camera Harness x 1
• USB Harness x 2
• Shock Absorber Rubber x 4
• Rubber Insulation adhesive x 1
• Driver CD
• Touch-Hub Controller Board by EETI

We will update you with this project when its finished by brian.
Have Fun Modding..

Yahoo and Microsoft team up deal

Posted by webmaster | 9:27 AM | 0 comments »

finally Yahoo and Microsoft agreed on a deal, this is a long awaited deal of partnership. this will unit both companies against the big G, yeah Google.. under the deal Microsoft will use yahoo sales force in advertising and yahoo will use Microsoft New bing search technology on its own sites.

this is the first move to takeout google. and its advertising superpower, as google adsense leads the top advertising
on the internet.

The end of iPod is near

Posted by webmaster | 7:34 AM | 1 comments »

The end of iPod is near. thats what i have read from yahoo news today.
anyway its been a few years since the launch of iPod to the world>
it is a small like cigarette pack with thousands of music on it.
and it sells well in the market. now we are seeing almost the end of it.

why? well because apple has some new sexy technology that will replace
the iPods. and if i where you. i will start saving money so you can
get your hands on it when they will release the new sexy products..


Top Ten Ways to Promote Your Books Through Flyers

1. Include a colored picture of your front cover.
2. Hook your prospective buyers with the headline in the top line of your flyer just as you do for your back cover.
3. Include some juicy excerpts from your book.
4. Include your picture with a brief biography near it.
5. Add praise from others.
6. Put ordering information on a coupon at the flyer's bottom.
7. Make it easy for your reader to buy.
8. Give your prospective buyers all the ways to stay in touch with you.
9. Carry at least 25 flyers with you in a folder at all times.
10. Use the backside of the flyer.

For more book promotion information visit http://book-marketing-guides.blogspot.com/

Old Google Adsense Codes

Posted by webmaster | 10:52 PM | | 0 comments »

Old Google Adsense Codes
By: haktech.blogspot.com

If you are looking for the Old adsense codes then you have found it right here.
this are the old adsense codes that you may find usefull to work with since the new
adsense code is a little bit diffucult to use. the old and new adsense codes
works the same way. and the myth of earnings is not true. dont believe
people saying that the new adsense codes earns much more than the old one..
that aint true.

we have tested it and we have the same result with the New Google adsense code and
the new adsense code. and it will not affect your earnings.

To view the old adsense code visit:

Promote your website at : www.nsfive.net

vacation hawaii = the words vacation and Hawaii .
Maui OR Hawaii = either the word Maui or the word Hawaii
"To each his own" = the exact phrase to each his own
virus –computer = the word virus but NOT the word computer
+sock = Only the word sock, and not the plural or any tenses or synonyms
~auto loan = loan info for both the word auto and its synonyms: truck, car, etc.
define:computer = definitions of the word computer from around the Web.
red * blue = the words red and blue separated by one or more words.
I'm Feeling Lucky = Takes you directly to first web page returned for your query.

+ addition 45 + 39
- subtraction 45 – 39
* multiplication 45 * 39
/ division 45 / 39
% of percentage of 45% of 39
^ raise to a power 2^5
(2 to the 5th power)

site: = Search only one website = admission site:www.stanford.edu
(Search Stanford Univ. site for admissions info.)
[#]…[#] = Search within a
range of numbers DVD player $100..150
(Search for DVD players between $100 and $150)
link: linked pages link:www.stanford.edu
(Find pages that link to the Stanford University website.)
info: Info about a page info:www.stanford.edu
(Find information about the Stanford University website.)
related: Related pages related:www.stanford.edu
(Find websites related to the Stanford University website.)

Search google for specific searches is a pain, so i posted this in case you dont know about this
cheat. this may come handy.

I searched google everyday.. do you?

Yeah i think this is not the right place to blog about acne..LOL..
but since recently i got acne problems..oh well its good to blog it here anyway..
if i could just do a reformat and reinstalling my face. that would be good. so it will be
a fresh installed face..LOL..

One of the most effective in Acne medication is Benzoyl peroxide, it is found in a large majority medications of acne, however there are controversy surrounding this chemical. and if you dont know. Cancer is been linked to Benzoyl peroxide. and it is on the FDA list of unsure Database. meaning that while benzoyl feroxide is not been approve by the FDA for human Use. and they cannot say the the chemical is safe to use. but they have determined that is is safe either..

Some of the most effective treatments for a large majority of people who suffer with acne are: ProActiv, Accutane, and Retin-A. This doesn't mean that these medications work for everyone - it just means that it is effective for the majority of people who use these treatments.

ProActiv is a three step topical acne fighting system that does not require a prescription, although it does contain prescription grade Benzoyl peroxide. Accutane is an oral prescription medication. There are many side affects associated with the use of Accutane, such as chapped lips, dry skin, nosebleeds, eye irritation, joint and muscle pain, hair thinning, skin rash, intestinal problems, urinary problems, headaches, and vision problems. There are even some psychological side effects, such as depression. Accutane is not prescribed to women who are pregnant or nursing, due to serious birth defects. Retin-A has very few side effects, and is available in both prescription and over the counter forms. Retin-A is used to treat a variety of skin problems other than acne as well, including wrinkles, lines, scars, and discoloration.

If using one of these products is of interest to you, you should start with ProActiv. If ProActiv doesn't work, try Retin-A next. Avoid using Accutane if you can, and if you do decide that you want to give Accutane a try, make sure that you weigh the potential side effects carefully.

While these treatments are costly, they have proven to be the most successful
Keep in mind, however, that even though these are the best acne treatments available, this doesn't mean that other, less expensive treatments won't work for you. What works for you will depend on many factors, including how severe your acne is. Discuss your options with your dermatologist.

Vista Bugs Report

We also asked Microsoft to release SP2 to fix all those bugs:

SP1 Failed to Fix Several Windows Vista Bugs, Do We Need SP2?

And today we are very pleased to say that Microsoft listened to us and fixed almost all the reported bugs in Windows 7.

Following are the bugs which have been fixed in Windows 7 but are still there in Windows Vista SP2:

* [BUG] New Windows Vista Bug Found in Desktop Icon Settings Window
* [BUG] New Windows Vista Bug Found in Creating New Shortcut
* New File Renaming Bug Found in Windows Vista, Server 2008
* [BUG] Windows Vista MMC Customize Dialog Box Close Button Bug
(They have disabled the Close button permanently)
* [BUG] Windows Vista Explorer Statusbar Doesnt Show File Size Information in Drives Root
(Now Statusbar no longer shows the file size)
* Control Panel -> Programs and Features Task Band Goof-up in Windows Vista
(I'm very happy to see it fixed in 7)
* Taskbar Bug in Windows Vista
* IE7 Goof-up in More/Less Information Button
* Folder List and Favorite Links in Navigation Pane Bug in Windows Vista
* Classic Startmenu Log Off Command Confirmation Bug in Windows Vista
(Classic startmenu has been removed)
* Favorite Links Area in Browse Dialog Box Bug in Windows Vista
* Folder and Search Options Bug in Windows Vista
* Statusbar Bug in Windows Vista Explorer
* Interesting Facts, Bugs and Goof-ups in Windows Vista
(Look at Point 7 in Bugs & Goof-ups, its fixed now)

So it proves that Microsoft has really worked hard in the development of Windows 7 and now you are not supposed to say that Microsoft never listens.

Michael Jackson Died at 50

Posted by webmaster | 8:39 PM | | 0 comments »

Michael Jackson leaves us with a legacy of No. 1 hits, top awards and astounding dance moves. Let's remember the King of Pop.


from Haktech

We all knew netbooks is getting popular these days. its handy and sleek designs.
a must have for anyone on the go.

At haktech Labs. we came up with a list of essential software for your Netbook
a must have software to make your netbook a great tool.

Essential Softwares for your Netbook:

http://openoffice.org/ - Replacement for Microsoft Word, Excel and PowerPoint that are fully compatible with the Microsoft file formats And its FREE.

http://www.ceruleanstudios.com/ - Trillian™ is a fully featured, stand-alone, skinnable chat client that supports AIM, ICQ, MSN, Yahoo Messenger, and IRC. It provides capabilities not possible with original network clients, while supporting standard features such as audio chat, file transfers, group chats, chat rooms, buddy icons, multiple simultaneous connections to the same network, server-side contact importing, typing notification, direct connection (AIM), proxy support, encrypted messaging (AIM/ICQ), SMS support, and privacy settings.

NOTE: if you only use Yahoo! Messenger then just download Yahoo! Messenger. unless you want a multi Protocol supported IM then use Trillian.

http://mozilla.org/thunderbird/ - Thunderbird 2 includes many new features to help you manage your inbox. With Thunderbird 2, it’s easier to prioritize and find your important email with tags and the new find bar helps you find content within your email faster.

http://www.lavasoftusa.com/software/adaware/ - Real-time protection against spyware, trojans,rootkits, hijackers, keyloggers, and more!

http://www.free-av.com- Avira FREE antivirus

NOTE: if you suspect a virus, spyware, trojan is on your computer. you can follow our guide to remove it. the standard virus removal guide.

http://www.mozilla.com/en-US/firefox/all.html - Firefox browser, for fast internet browsing

http://www.seamonkey-project.org/ - Alternative to firefox. a browser that looks like netscape :)

http://www.videolan.org/vlc/ - VLC Player. complete installer with needed video codecs to support popular media extensions. a must have for your netbook.

http://www.winamp.com - the #1 mp3 player in the world.

http://picasa.com/ - Organize, Edit, Create, Share your photo's with PICASA.

http://www.foxitsoftware.com - As a small and fast PDF viewer, Foxit Reader currently has over 50 million users all around the world.

http://www.7-zip.org/ - 7-Zip is a file archiver with a high compression ratio.

http://locate32.webhop.org/ - Locate32 is software which can be used to find files from your harddrives and other locations. It works like updatedb and locate commands in Unix based systems. In other words, it uses databases to store information about directory structures and uses these databases in searches. The use of these databases provides very fast searching speed.

http://www.snes9x.com/ - Snes9x is a portable, freeware Super Nintendo Entertainment System (SNES) emulator.

http://www.daemon-tools.cc - Virutal CD-ROM drive which run directly on your hard drive. You can also work with images created by other burning programs! DAEMON Tools supports variety of image types. Use CD/DVD image converter to have one format images in your Image Catalog!

http://www.bitlord.com/ - A powerful C++ BitTorrent Client. BitLord is a p2p file-sharing freeware program fully compatible with Bittorrent, which is the most popular p2p protocol designed for high-speed distribution of 100MB or GB sized files. BitLord is a powerful, clean, fast, and easy-to-use bittorrent client. It supports simultaneous downloads, download queue, selected downloads in torrent package, fast-resume, chatting, disk cache, speed limits, port mapping, proxy, ip-filter, etc.

- Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless)

All software are FREEWARES you can download and install them for FREE.

Caught A Virus?

Posted by webmaster | 10:13 PM | | 0 comments »

Caught A Virus?

If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.

Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.

You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.

It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.

For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."

Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.

Is Your PC "Owned?"

I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program's presence. People who write commercial software put icons all over your desktop. Who's going to work harder to go unnoticed?

Other indicators that may, in fact, indicate that there's nothing that you need to worry about, include:

* An automated e-mail telling you that you're sending out infected mail. E-mail viruses and worms typically come from faked addresses.
* A frantic note from a friend saying they've been infected, and therefore so have you. This is likely a hoax. It's especially suspicious if the note tells you the virus can't be detected but you can get rid of it by deleting one simple file. Don't be fooled--and don't delete that file.

I'm not saying that you should ignore such warnings. Copy the subject line or a snippet from the body of the e-mail and plug it into your favorite search engine to see if other people have received the same note. A security site may have already pegged it as a hoax.

Sniffing Out an Infection

There are signs that indicate that your PC is actually infected. A lot of network activity coming from your system (when you're not actually using Internet) can be a good indicator that something is amiss. A good software firewall, such as ZoneAlarm, will ask your permission before letting anything leave your PC, and will give you enough information to help you judge if the outgoing data is legitimate. By the way, the firewall that comes with Windows, even the improved version in XP Service Pack 2, lacks this capability.

To put a network status light in your system tray, follow these steps: In Windows XP, choose Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check "Show icon in notification area when connected," and click OK.

If you're interested in being a PC detective, you can sniff around further for malware. By hitting Ctrl-Alt-Delete in Windows, you'll bring up the Task Manager, which will show you the various processes your system is running. Most, if not all, are legit, but if you see a file name that looks suspicious, type it into a search engine and find out what it is.

Want another place to look? In Windows XP, click Start, Run, type "services.msc" in the box, and press Enter. You'll see detailed descriptions of the services Windows is running. Something look weird? Check with your search engine.

Finally, you can do more detective work by selecting Start, Run, and typing "msconfig" in the box. With this tool you not only see the services running, but also the programs that your system is launching at startup. Again, check for anything weird.

If any of these tools won't run--or if your security software won't run--that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect themselves.

What to Do Next

Once you're fairly sure your system is infected, don't panic. There are steps you can take to assess the damage, depending on your current level of protection.

* If you don't have any antivirus software on your system (shame on you), or if the software has stopped working, stay online and go for a free scan at one of several Web sites. There's McAfee FreeScan, Symantec Security Check, and Trend Micro's HouseCall. If one doesn't find anything, try two. In fact, running a free online virus scan is a good way to double-check the work of your own local antivirus program. When you're done, buy or download a real antivirus program.
* If you have antivirus software, but it isn't active, get offline, unplug wires-- whatever it takes to stop your computer from communicating via the Internet. Then, promptly perform a scan with the installed software.
* If nothing seems to be working, do more research on the Web. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses--if manual removal is possible--or a free removal tool if it isn't. Check out GriSOFT's Virus Encyclopedia, Eset's Virus Descriptions, McAffee's Virus Glossary, Symantec's Virus Encyclopedia, or Trend Micro's Virus Encyclopedia.

A Microgram of Prevention

Assuming your system is now clean, you need to make sure it stays that way. Preventing a breach of your computer's security is far more effective than cleaning up the mess afterwards. Start with a good security program, such Trend Micro's PC-Cillin, which you can buy for $50.

Don't want to shell out any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (a personal firewall), and Ad-Aware SE (an antispyware tool).

Just make sure you keep all security software up to date. The bad guys constantly try out new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates isn't worth your money or your time.

Speaking of updating, the same goes for Windows. Use Windows Update (it's right there on your Start Menu) to make sure you're getting all of the high priority updates. If you run Windows XP, make sure to get the Service Pack 2 update. To find out if you already have it, right-click My Computer, and select Properties. Under the General tab, under System, it should say "Service Pack 2."

Here are a few more pointers for a virus-free life:

* Be careful with e-mail. Set your e-mail software security settings to high. Don't open messages with generic-sounding subjects that don't apply specifically to you from people you don't know. Don't open an attachment unless you're expecting it.
* If you have broadband Internet access, such as DSL or cable, get a router, even if you only have one PC. A router adds an extra layer of protection because your PC is not connecting directly with the Internet.
* Check your Internet ports. These doorways between your computer and the Internet can be open, in which case your PC is very vulnerable; closed, but still somewhat vulnerable; or stealthed (or hidden), which is safest. Visit Gibson Research's Web site and run the free ShieldsUP test to see your ports' status. If some ports show up as closed--or worse yet, open--check your router's documentation to find out how to hide them.

This video tutorial from haktech shows you how to install TOR package
and protect your identity online against hackers and other threats.

DOSbox - emulated DOS in your PC

DOSbox - is an emulated DOS that you can run in your PC.
DOSbox runs on Windows, BeOS, Linux, MacOS X...

DOSBox also emulates CPU:286/386 realmode/protected mode, Directory FileSystem/XMS/EMS, Tandy/Hercules/CGA/EGA/VGA/VESA graphics, a SoundBlaster/Gravis Ultra Sound card for excellent sound compatibility with older games...

You can "re-live" the good old days with the help of DOSBox, it can run plenty of the old classics that don't run on your new computer!

DOSBox is totally free of charge and OpenSource.

You can Download DOSbox here:


After installing DOSbox, go to your Desktop and click on DOSbox Icon
This will run DOSbox

Now UNzip you gamefiles to C:\dosgames , you will need to creata a folder name "dosgames"

now after unziping the game files "quake for example." :) i love quake. "we played quake with my master THECardinal!" and my teacher Mr.JOJO -
Anyway. Install or run the games. it depends on the game you are going to run and play..
some games dont require insntallation. but Quake Does. so
We will install the game.

to do so. First we will need to mount the folder we created. and assign a drive letter for it.
in this case we will assign drive letter C:\

to do so. in the DOSbox console

Mount c c:\dosgames

this will mount the contents of the c:\dosgames to C:

then type C: to go to the drive C: mounted in DOS.

type DIR to list the files.
CD to change directory

Run the .exe or the installer for your game. and play..

remember you need to know basic DOS commands to do this :)

i will post DOS commands below..

DOS commands

Aansi.sysNSI.SYS Defines functions that change display graphics, control cursor movement, and reassign keys.
append Causes MS-DOS to look in other directories when editing a file or running a command.
arp Displays, adds, and removes arp information from network devices.
assign Assign a drive letter to an alternate letter.
assoc View the file associations.
at Schedule a time to execute commands or programs.
atmadm Lists connections and addresses seen by Windows ATM call manager.
attrib Display and change file attributes.
batch Recovery console command that executes a series of commands in a file.
bootcfg Recovery console command that allows a user to view, modify, and rebuild the boot.ini
break Enable / disable CTRL + C feature.
cacls View and modify file ACL's.
call Calls a batch file from another batch file.
cd Changes directories.
chcp Supplement the International keyboard and character set information.
chdir Changes directories.
chdsk Check the hard disk drive running FAT for errors.
chkntfs Check the hard disk drive running NTFS for errors.
choice Specify a listing of multiple options within a batch file.
cls Clears the screen.
cmd Opens the command interpreter.
color Easily change the foreground and background color of the MS-DOS window.
command Opens the command interpreter.
comp Compares files.
compact Compresses and uncompress files.
control Open Control Panel icons from the MS-DOS prompt.
convert Convert FAT to NTFS.
copy Copy one or more files to an alternate location.
ctty Change the computers input/output devices.
date View or change the systems date.
debug Debug utility to create assembly programs to modify hardware settings.
defrag Re-arrange the hard disk drive to help with loading programs.
del Deletes one or more files.
delete Recovery console command that deletes a file.
deltree Deletes one or more files and/or directories.
dir List the contents of one or more directory.
disable Recovery console command that disables Windows system services or drivers.
diskcomp Compare a disk with another disk.
diskcopy Copy the contents of one disk and place them on another disk.
doskey Command to view and execute commands that have been run in the past.
dosshell A GUI to help with early MS-DOS users.
drivparm Enables overwrite of original device drivers.
echo Displays messages and enables and disables echo.
edit View and edit files.
edlin View and edit files.
emm386 Load extended Memory Manager.
ename Recovery console command to enable a disable service or driver.
endlocal Stops the localization of the environment changes enabled by the setlocal command.
erase Erase files from computer.
exit Exit from the command interpreter.
expand Expand a Microsoft Windows file back to it's original format.
extract Extract files from the Microsoft Windows cabinets.
fasthelp Displays a listing of MS-DOS commands and information about them.
fc Compare files.
fdisk Utility used to create partitions on the hard disk drive.
find Search for text within a file.
findstr Searches for a string of text within a file.
fixboot Writes a new boot sector.
fixmbr Writes a new boot record to a disk drive.
for Boolean used in batch files.
format Command to erase and prepare a disk drive.
ftp Command to connect and operate on a FTP server.
ftype Displays or modifies file types used in file extension associations.
goto Moves a batch file to a specific label or location.
graftabl Show extended characters in graphics mode.
help Display a listing of commands and brief explanation.
if Allows for batch files to perform conditional processing.
ifshlp.sys 32-bit file manager.
ipconfig Network command to view network adapter settings and assigned values.
keyb Change layout of keyboard.
label Change the label of a disk drive.
lh Load a device driver in to high memory.
listsvc Recovery console command that displays the services and drivers.
loadfix Load a program above the first 64k.
loadhigh Load a device driver in to high memory.
lock Lock the hard disk drive.
logoff Logoff the currently profile using the computer.
logon Recovery console command to list installations and enable administrator login.
map Displays the device name of a drive.
md Command to create a new directory.
mem Display memory on system.
mkdir Command to create a new directory.
mode Modify the port or display settings.
more Display one page at a time.
move Move one or more files from one directory to another directory.
msav Early Microsoft Virus scanner.
msd Diagnostics utility.
msdex Utility used to load and provide access to the CD-ROM.
nbtstat Displays protocol statistics and current TCP/IP connections using NBT
net Update, fix, or view the network or network settings
netsh Configure dynamic and static network information from MS-DOS.
netstat Display the TCP/IP network protocol statistics and information.
nlsfunc Load country specific information.
nslookup Look up an IP address of a domain or host on a network.
path View and modify the computers path location.
pathping View and locate locations of network latency.
pause Command used in batch files to stop the processing of a command.
ping Test / send information to another network computer or network device.
popd Changes to the directory or network path stored by the pushd command.
power Conserve power with computer portables.
print Prints data to a printer port.
prompt View and change the MS-DOS prompt.
pushd Stores a directory or network path in memory so it can be returned to at any time.
qbasic Open the QBasic.
rd Removes an empty directory.
ren Renames a file or directory.
rename Renames a file or directory.
rmdir Removes an empty directory.
route View and configure windows network route tables.
runas Enables a user to execute a program on another computer.
scandisk Run the scandisk utility.
scanreg Scan registry and recover registry from errors.
set Change one variable or string to another.
setlocal Enables local environments to be changed without affecting anything else.
setver Change MS-DOS version to trick older MS-DOS programs.
share Installs support for file sharing and locking capabilities.
shift Changes the position of replaceable parameters in a batch program.
shutdown Shutdown the computer from the MS-DOS prompt.
smartdrv Create a disk cache in conventional memory or extended memory.
sort Sorts the input and displays the output to the screen.
start Start a separate window in Windows from the MS-DOS prompt.
subst Substitute a folder on your computer for another drive letter.
switches Remove add functions from MS-DOS.
sys Transfer system files to disk drive.
telnet Telnet to another computer / device from the prompt.
time View or modify the system time.
title Change the title of their MS-DOS window.
tracert Visually view a network packets route across a network.
tree View a visual tree of the hard disk drive.
type Display the contents of a file.
undelete Undelete a file that has been deleted.
unformat Unformat a hard disk drive.
unlock Unlock a disk drive.
ver Display the version information.
verify Enables or disables the feature to determine if files have been written properly.
vol Displays the volume information about the designated drive.
xcopy Copy multiple files, directories, and/or drives from one location to another.

Download DOS Games: http://www.classicdosgames.com/
Wiki Guide: http://www.dosbox.com/wiki/Basic_Setup_and_Installation_of_DosBox

Have FUN and Enjoy..Nothing like the old school :) :)

-Mark Sheldon Wong.
haktech Guides 2009

Friend Connect