Tuesday 23 August 2011

Hide unwanted images from gallery

Hiding these images is extremely simple and can be done for free with my favorite freeware browser - Y-Browser

First open Y-browser and select [options] -> [search files]. Now in the “Filename” field, input a picture title followed by “.*” as pictured below (since you don’t know what format the picture is). Then select [Options] -> [Start search]. You do not need to do this if you know the directory where the images are stored of course.

Once you have found your file in the list of search results, highlight it and select [Options] -> [File] -> [Attributes].

Now simply change “System” and “Hidden” to yes and select [Save].

repeat same for all files you want to be hide.

and finally restart the phone.

Key in Proxy settings for access point in NOKIA S40 v2 v3

As we all know, Nokia doesn't allow one to specify a proxy for an Access Point in Series 40 v2 and v3 phones (6131, 6133, 3110c ...) etc.

In its recent versions of the Series40 OS (v2 & v3), Nokia has removed the ability to specify a proxy server associated with an access point. Therefore, those with WAP network plans (such as TMobileWeb users, Airtel NOP users) are unable to use JAVA programs that require internet access (such as Opera Mini, Google Maps, ...).

However, Nokia does allow users to create a provisioning document on their computer. This document, created in wbxml, specifies an access point along with a proxy. The S40 phone recognizes the configuration settings in the document and allows the JAVA midlet to use those instead, thereby allowing the midlet to access the proxy. Its very simple to implement.

The files included in the zip provide some sample xml documents, and the associated provisioning (.prov) files.

Click here to download Nokia S40 proxy settings for JAVA applications ZIP file

figure it out yourself, genius.
NokiaJAVAProxy.wml: The wml file that you can edit if you need/want different proxy settings.
NokiaJAVAProxy.prov: The actual binary wbxml provisioning file that should be sent to your phone (via bluetooth or usb). This can NOT be manually edited.

---------------------------------
QUICK START:
1: Push the "NokiaJAVAProxy.prov" file to your phone using Bluetooth. send the file via "Send File..." option only do not copy paste to your phone ("object push", not file transfer). If your are unable to do it, just transfer it to any bluetooth supported phone and send that file via bluetooth to your phone.

2: The phone will recognize the configuration settings, and will prompt you to save them. Don't worry if it says "no supported applications".

3: Go to Settings->Configuration->Default Config. Settings, and change the default config to [the name of the configuration we just loaded].

That's it! JAVA midlets like Opera Mini, Google Maps, MGMaps, etc... should work now.

Detailed README file is inside the zip file

Mobile TV Elite Software With No More Monthly Payments

There is a new way that you can actually watch Mobile TV on the go or even on demand. This is software that has turned many heads and has saved many people thousands of dollars in monthly cable payments. This software is known as Mobile TV Elite software. What this does is it allows you to watch satellite TV from your phone for only one lifetime fee. With new types of television cable coming out almost every year, you may have a few questions if this can really be a good deal or not.

 Well first off; having Mobile TV Elite on your phone can save you a ton of money in the long run. If you got this software you can totally kiss your cable bill goodbye and never have to worry about it coming back again. When you get Mobile TV Elite software you only have to pay once and once only for the rest of your life. You may be thinking well it sounds good so far, but I don't like the fact that it is on my phone.

Visit Mobile TV Elite website.

 To be honest, maybe you don't have a fast phone or your graphics arent to great on it. You can actually buy a cord that can have the ability to hook your phone up to your TV so that you can view whatever you are playing on your computer onto your TV. So, just open up your Mobile TV Elite software and bam, you have Mobile TV Elite transferred onto your real television.

 Mobile TV Elite software also comes with a minimum of 1000 channels. Of course there will be a low price but you wont be disappointed in the channels you receive. Especially if you enjoy television a lot.

Visit Mobile TV Elite website.

 You will be able to watch any show that you like on this software. There are channels like CNN, ESPN, CW, FOX and pretty much everything that is basic plus thousands more. Its exactly like satellite TV that you pay for monthly, but on your computer instead.

 If you don't like commercials either, you can kiss them away for good. No more ever having to miss a show of yours again also because you can search for it in the database and pull it up so you can watch it whenever you want to. So, there is a little background information on the Mobile TV Elite software for a phone. Hopefully you will now have a better understanding on what exactly this software has to offer and you can make your decision a little bit better now.

For more information, you can check out:

==>> Go Here: Visit Mobile TV Elite website.

Mobile Bluetooth Hack

How to prevent mobile Bluetooth hacK
The appearance of the sites for social networking has done a big job for the human society as it enables one to make friends and socialize with the utilization of internet. Side by side another glitch of new type has also crept up for which it is very difficult to know whether one is a sufferer or not. This is regarding the confidentiality of one’s privacy which has come under threat. Security is one of the foremost criterions in every matter of life and it should be realized by the Bluetooth users. Cell phones are the most common gadget in which Bluetooth technology is being used and utilizing the same mobile Bluetooth hack is done very easily Bluetooth gadgets having weaker security are prone to hacking very comfortably.
Specialists about Bluetooth are of the opinion that mobile Bluetooth hack can be performed in the following way. One should cut off the link in between two pair of Bluetooth gadgets and unearth the packets for resending the pin and then breaking of pin code should be done. Mobile Bluetooth hack will not be possible if one is out of signal range of Bluetooth. For escaping mobile hacking, specialists recommend that one should utilize lengthy pins and type of pins which are difficult to keep in mind. Pins which are not of common pattern are the desired ones. An instance of common type of pin pattern is 12345. The most usual type of characteristics for Bluetooth gadget is “pairing process” where in two gadgets sharing files are made paired with the help of inserting the same type of pin. Mobile Bluetooth hack will not be able to get the information being delivered if they insert the wrong kind of pin. However, if two gadgets are not kept paired, the gadgets will not be able to transfer information regarding data communications and files.

Hide Unwanted Images from Phone Gallery

Hiding these images is extremely simple and can be done for free with my favorite freeware browser – Y-Browser
First open Y-browser and select [options] -> [search files]. Now in the Filename field, input a picture title followed by as pictured below (since you dont know what format the picture is). Then select [Options] -> [Start search]. You do not need to do this if you know the directory where the images are stored of course.


Once you have found your file in the list of search results, highlight it and select [Options] -> [File] -> [Attributes].
Now simply change System and Hidden to yes and select [Save].
repeat same for all files you want to be hide.
and finally restart the phone.


Monday 22 August 2011

Free Internet by Bluetooth using Nokia Mobile

Enjoy free Internet on your Nokia Mobile Phone with Bluetooth! Follow this simple trick to access free internet on your Mobile using Bluetooth. It̢۪s as easy as possible.
Creating an access point on your Mobile
Tools\settings\connection\access points\options\new access point>default settings These are the settings u need there..
Connection Name : Something (sugestion ADLS or PCGPRS something u remember well you need it later!)
Data Bearer: GPRS
Access Point Name: The name you gave to your bt connection when pairing up with the computer
Username : None
Password : None
Authentication : Normal
IP Address Gateway : 0.0.0.0 and thats all on this on this part..
Now, go to: tools/settings/connection, and select GPRS
Make GPRS settings to when availabl, and the access point to none.

To Lock a folder in windows XP

To Lock a folder in windows XP without any software. Follow the steps Below.
    Make a Folder in C drive rename it as "abc" without quotes.
    Now open Command Prompt from Start Menu.
    Type "attrib +s +h C:\abc" without quotes and press enter.
    This command will Make your folder invisble and it can not be seen even in hidden files and folders
    To make it visible again type "attrib -s -h C:\abc"
    You can lock any other folder also by changing the location C:\abc to address of your folder.

Windows Tricks : Changing Startup and Log-off screens

Startup Screen
  1. Create a 320x400 bitmap in the root directory and name it LOGO.SYS
  2. You can use LOGOW.SYS file in the Windows directory as a starter
Logoff Screens
  1. There are many system file that constitutes Lofoff screen.
  2. They are actually bitmaps 320x400 that just have a different extension
  3. The hidden file in the root directory LOGO.SYS is the startup logo.
  4. There are two files in the Windows directory.
  5. LOGOW.SYS is the Wait while Shutting down ... screen.
  6. LOGOS.SYS is the You may now shut-off or Reboot screen.
  7. Make two new image files of your chice in Paint and name it as LOGOW.SYS and LOGOS.SYS and replce the actual windows file by this two.
  8. But make sure they should be of the same size

Mozilla Firefox Shortcuts....


·         Ctrl + Tab or Ctrl + PageDown: Cycle through tabs.

·         Ctrl + Shift + Tab or Ctrl + PageUp: Cycle through tabs in reverse.

·         Ctrl + (1-9): Switch to tab corresponding to number.

·         Ctrl + N: New window.

·         Ctrl + T: New tab.

·         Ctrl + L or Alt + D or F6: Switch focus to location bar.

·         Ctrl + Enter: Open location in new tab.

·         Shift + Enter: Open location in new window.

·         Ctrl + K or Ctrl + E: Switch focus to search bar.

·         Ctrl + O: Open a local file.

·         Ctrl + W: Close tab, or window if there's only one tab open.

·         Ctrl + Shift + W: Close window.

·         Ctrl + S: Save page as a local file.

·         Ctrl + P: Print page.

·         Ctrl + F or F3: Open find toolbar.

·         Ctrl + G or F3: Find next...

·         Ctrl + Shift + G or Shift + F3: Find previous...

·         Ctrl + B or Ctrl + I: Open Bookmarks sidebar.

·         Ctrl + H: Open History sidebar.

·         Escape: Stop loading page.

·         Ctrl + R or F5: Reload current page.

·         Ctrl + Shift + R or Ctrl + F5: Reload current page; bypass cache.

·         Ctrl + U: View page source.

·         Ctrl + D: Bookmark current page.

·         Ctrl + NumpadPlus or Ctrl + Equals (+/=): Increase text size.

·         Ctrl + NumpadMinus or Ctrl + Minus: Decrease text size.

·         Ctrl + Numpad0 or Ctrl + 0: Set text size to default.

·         Alt + Left or Backspace: Back.

·         Alt + Right or Shift + Backspace: Forward.

·         Alt + Home: Open home page.

·         Ctrl + M: Open new message in integrated mail client.

·         Ctrl + J: Open Downloads dialog.

·         F6: Switch to next frame. You must have selected something on the page already, e.g. by use of Tab.

·         Shift + F6: Switch to previous frame.

·         Apostrophe ('): Find link as you type.

·         Slash (/): Find text as you type.

Make ur pdf files to speak


make ur pdf files to speak
here r the shortcuts for hearing pdf files in abobe reader 6.0 or higher

ctrl+shift+b ---->to hear the whole topic
ctrl+shift+v ---->to hear the page

AUTO DELETE TEMPORARY FOLDER.!!

ll what i prefer is %temp% " without quotes.. at Start -> Run..
this opens ur temp folder n den u cal erase it neatly// still try dis one too..



First go into gpedit.msc
Next select -> Computer Configuration/Administrative Templates/Windows Components/Terminal Services/Temporary Folder
Then right click "Do Not Delete Temp Folder Upon Exit"
Go to properties and hit disable. Now next time Windows puts a temp file in that folder it will automatically delete it when its done! Note from Forum Admin: Remember, GPEDIT (Group Policy Editor) is only available in XP Pro.

How to make your Desktop Icons Transparent

Go to Control Panel > System, > Advanced > Performance area > Settings button Visual Effects tab "Use drop shadows for icon labels on the Desktop

CD ROM STOPS AUTOPLAYING/AUTORUN.!!

And the AutoPlay Tab has disappeared in My Computer, Devices With Removable Storage, Right Click on CDROM, Properties.
Solution: The service: "Shell Hardware Detection" has been set to Manual or Disabled. Go to Control Panel, Administrative Tools, Services. Return this service to "Automatic
".

CLICKING * .AVI FILES ON EXPLORER CAUSING 100% CPU USAGE.!!

Well windows seem to have a REALLY big problem when it comes to reading AVI files. It seems that when you click on an AVI file in explorer, it'll try to read the entire AVI file to determine the width,height, etc. of the AVI file (this is displayed in the Properties window). Now the problem with Windows is that if you have a broken/not fully downloaded AVI file that doesnt contain this info, Windows will scan the entire AVI file trying to figure out all these properties which in the process will probably cause 100% CPU usage and heavy memory usage. To solve this problem all you have to do is the following:
1. Open up regedit
2. Goto HKEY_CLASSES_ROOT\SystemFileAssociations\.avi\shellex\PropertyHandler
3. Delete the "Default" value which should be "{87D62D94-71B3-4b9a-9489-5FE6850DC73E}"
Voila! Please not that this will no longer provide you with the windows properties displaying the AVI file information such as width, height, bitrate etc. But its a small price to pay for saving you resources.
NOTE: Please use caution when using regedit. Improper usage may cause windows to behave imcorrectly. Also, I cannot be held resposible. Backup your registry first.

SPEED UP MENU DISPLAY.!!

When using the start menu the you will notice a delay between different tiers of the menu hierarchy. For the fastest computer experience possible I recommend changing this value to zero. This will allow the different tiers to appear instantly.

Start Regedit. If you are unfamiliar with regedit please refer to our FAQ on how to get started.

Navigate to HKEY_CURRENT_USER\Control Panel\Desktop
Select MenuShowDelay from the list on the right.

Right on it and select Modify.
Change the value to 0.
Reboot your computer.


To get back the username and the picture, reverse the above procedure.

For the New Start Menu, Windows XP looks for the <username>.bmp file in the folder

C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures

If the file is not found, it takes a picture from the "Default Pictures" sub-folder. By renaming the <username>.bmp and the "Default Pictures" folder, you're giving no chance for Windows to fetch an image for the Start Menu

~ Cheers ~.

Remove the Username and picture from Windows XP New Start Menu

The User account picture can be removed by turning off the Welcome Screen. Or, by switching to Windows Classic theme. Follow the method described in this article if you want to remove the username and picture from the Start Menu, without disabling the Welcome Screen and Windows XP Theme.

For those who want to remove the user name and user account picture from Start Menu, in order to have a blank blue panel at the top, try this:
Start Windows Explorer and go to this folder:


C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures

From that folder, rename the BMP file which corresponds to your user account.

( For example, if your username is Robert, rename Robert.bmp to old_Robert.bmp )
Next, rename the following folder:

C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures

to something else, say...

C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\No_Default Pictures
To remove the user name, follow these steps

Start regedit.exe and navigate to the this key:

HKEY_CURRENT_USER \ Software \ Microsoft\ Windows \ CurrentVersion \ Policies \ Explorer
In the right-pane, set NoUserNameInStartMenu value-data to 1

Close Regedit.exe and restart Windows.

You'll end up with a blue space at the top of the Start Menu.


Remove Stored username and Passwords !

To remove the Stored User Names and Passwords from your system, try this:
Click Start, Run and type Control keymgr.dll
Remove the entries from the list.

The other ways to access this dialog are:
Type Control Userpasswords2 in RUN box, click Advanced, Manage Passwords
-or-
From Control Panel, select your User Account, click Manage your network passwords

It Works

~ Cheers ~

SPEED UP UR ACROBAT READER (ALMOST LIKE NOTEPAD)

Do u get irritated when acrobat reader takes 5/10 seconds to load when you want to open a pdf document. There is a way to speed up the loading.

1. Go to the installation folder of acrobat reader
(C:\program files\adobe\acrobat\reader\.. whatever)

2. Move all the files and folders from the "plugins" directory to the "Optional" directory. (I repeat.. cut and paste the files NOT copy & paste).

Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).

Now your acrobat reader will load very fast
and almost as good as notepad..

Lock pc just by double clicking mouse

You can lock your XP workstation with two clicks of
the mouse. Create a new shortcut on your desktop using
a right mouse click, and enter 'rundll32.exe
user32.dll,LockWorkStation' in the location field.
Give the shortcut a name you like. That's it -- just
double click on it and your computer will be locked.
And if that's not easy enough, Windows key + L will do
the same

How to get Full System Information

system up time only for xp professional edition
It boasts how long it can stay up. Whereas previous
versions of Windows were coy about how long they went
between boots, XP is positively proud of its stamina.
Go to the Command Prompt in the Accessories menu from
the All Programs start button option, and then type
'systeminfo'. The computer will produce a lot of
useful info, including the uptime. If you want to keep
these, type 'systeminfo > info.txt'. This creates a
file called info.txt you can look at later with
Notepad. (Professional Edition only).

Hide ur folders.. never known trick !!!!!!!!!! Disguise them to "Recycle Bin"

Rename any folder with extension {645FF040-5081-101B-9F08-00AA002F954E}
eg,
if u've a folder games
press F2,
then type, "games.{645FF040-5081-101B-9F08-00AA002F954E}"
c the magic....
then 2 get to original form,
remove the extension using
"ren games.{645FF040-5081-101B-9F08-00AA002F954E} games" in dos or as a bat file


n u are done..

~cheers~

Chaet and Hacking Tips Only for you


Set Processes Priority




Follow this tip to increase the priority of active processes, this will result in prioritisation of processes using the CPU.
CTRL-SHIFT-ESC

1.Go to the second tab called Processes, right click on one of the active processes, you will see the Set Priority option


2.For example, your Run your CDwriter program , set the priority higher, and guess what, no crashed CD’s

Shutdown Trick !


Imidiate rapid shut down window
while shutting down window. open task manager(Ctr+Alt+Del),
Select shut down tab. and press ' Ctrl ' key while select Turn Off from dis tab.
Count 5 4 3 2 1 Voila!!! U r window will rapidly shut down.


Speed Up Ur Shut down !!

Start Regedit.
Navigate to HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control.
Click on the "Control" Folder.
Select "WaitToKillServiceTimeout"
Right click on it and select Modify.
Set it a value lower than 2000 (Mine is set to 200)
.

and !

Like previous versions of windows, it takes long time to restart or shutdown windows xp when the "Exit Windows" sound is enabled. to solve this problem you
must disable this useless sound. click start button then go to settings -> control panel -> Sound,Speech and Audio devices -> Sounds and Audio Devices -> Sounds, then under program events and windows menu click on "Exit Windows" sub-menu and highlight it.now from sounds you can select,choose "none" and then click apply and ok. now you can see some improvements when shutting down your system.



Learn what is IP and how to get the IP of a system

In here I have figure out some very easy but cool ways to trace out the geographical location and various other infos like ISP details etc of a remote computer using its IP.

Well I guess its one of the most important must learn manul for boys out there if you want to impress your friends particularly gals whom you’ll meet online in a chat room and tell them their geographical locations and ISP details and make them surprised and impressed .

In the practical execution of this manual you don’t have to work much as it is very simple only you have to use your brain to understand some symbols and some format of expressions and use your IQ to execute things the right way.

What is IP and how to get the IP of a remote system::






Getting the IP or Internet Protocol of a remote system is the most important and the first step of hacking into it. Probably it is the first thing a hacker do to get info for researching on a system. Well IP is a unique number assigned to each computer on a network. It is this unique address which represents the system on the network. Generally the IP of a particular system changes each time you log on to the network by dialing to your ISP and it is assigned to you by your ISP. IP of a system which is always on the network remains generally the same. Generally those kind of systems are most likely to suffer a hacking attack because of its stable IP. Using IP you can even execute system commands on the victim’s computer.

Lets take the example of the following IP address: 202.144.49.110 Now the first part, the numbers before the first decimal i.e. 209 is the Network number or the Network Prefix.. This means that it identifies the number of the network in which the host is. The second part i.e. 144 is the Host Number that is it identifies the number of the host within the Network. This means that in the same Network, the network number is same. In order to provide flexibility in the size of the Network, here are different classes of IP addresses:



Address Class Dotted Decimal Notation Ranges

Class A ( /8 Prefixes) 1.xxx.xxx.xxx through 126.xxx.xxx.xxx

Class B ( /16 Prefixes) 128.0.xxx.xxx through 191.255.xxx.xxx

Class C ( /24 Prefixes) 192.0.0.xxx through 223.255.255.xxx



The various classes will be clearer after reading the next few lines.



Each Class A Network Address contains a 8 bit Network Prefix followed by a 24-bit host number. They are considered to be primitive. They are referred to as "/8''s" or just "8's" as they have an 8-bit Network prefix.

In a Class B Network Address there is a 16 bit Network Prefix followed by a 16-bit Host number. It is referred to as "16's".



A class C Network address contains a 24-bit Network Prefix and a 8 bit Host number. It is referred to as

"24's" and is commonly used by most ISP's.



Due to the growing size of the Internet the Network Administrators faced many problems. The Internet routing tables were beginning to grow and now the administrators had to request another network number from the Internet before a new network could be installed at their site. This is where sub-netting came in.



Now if your ISP is a big one and if it provides you with dynamic IP addresses then you will most probably see that whenever you log on to the net, your IP address will have the same first 24 bits and only the last 8 bits will keep changing. This is due to the fact that when sub-netting comes in then the IP Addresses structure becomes:



xxx.xxx.zzz.yyy



where the first 2 parts are Network Prefix numbers and the zzz is the Subnet number and the yyy is the host number. So you are always connected to the same Subnet within the same Network. As a result the first 3 parts will remain the same and only the last part i.e. yyy is variable.

***********************



For Example, if say an ISP xyz is given the IP: 203.98.12.xx Network address then you can be awarded any IP, whose first three fields are 203.98.12. Get it?



So, basically this means that each ISP has a particular range in which to allocate all its subscribers. Or in other words, all subscribers or all people connected to the internet using the same ISP, will have to be in this range. This in effect would mean that all people using the same ISP are likely to have the same first three fields of their IP Addresses.



This means that if you have done a lot of (By this I really mean a lot) of research, then you could figure out which ISP a person is using by simply looking at his IP. The ISP name could then be used to figure out the city and the country of the person. Right? Let me take an example to stress as to how cumbersome but easy (once the research is done) the above method can be.



In my country, say there are three main ISP’s:



ISP Name Network Address Allotted



ISP I 203.94.47.xx

ISP II 202.92.12.xx

ISP III 203.91.35.xx



Now, if I get to know the IP of an e-pal of mine, and it reads: 203.91.35.12, then I can pretty easily figure out that he uses ISP III to connect to the internet. Right? You might say that any idiot would be able to do this. Well, yes and no. You see, the above method of finding out the ISP of a person was successful only because we already had the ISP and Network Address Allotted list with us. So, what my point is, that the above method can be successful only after a lot of research and experimentation. And, I do think such research can be helpful sometimes.



Also, this would not work, if you take it all on in larger scale. What if the IP that you have belongs to someone living in a remote igloo in the North Pole? You could not possibly get the Network Addresses of all the ISP’s in the world, could you? If yes please send it to me J.



Well now I guess you have pretty good knowledge about what an IP is and what you can do by knowing the IP of a remote system. Now lets come to the point of finding out the IP of remote system.

Well you can easily figure out the IP of a remote system using the netstat utility available in the microsoft’s version of DOS. The netstat command shows the connections in which your system is engaged to and the ports they are using. Suppose you are checking your mail in hotmail and you want to find out the IP of msn. All you need to do is to open a dos window (command.com) and type netstat. You will see all the open connections of your system. There you will see something :



Proto Local Address Foreign Address State

TCP abhisek:1031 64.4.xx.xx:80 ESTABLISHED



Now you got the IP address of hotmail ass 64.4.xx.xx .

Similarly you can figure out the IP address of most http or ftp connections.



To know your own IP type the following command in a dos windows

C:\netstat –n

[this commands converts the IP name into IP addresses]

this is what you will probably see on typing the above command :



Proto Local Address Foreign Address State

TCP 203.xx.251.161:1031 194.1.129.227:21 ESTABLISHED

TCP 203.xx.251.161:1043 207.138.41.181:80 FIN_WAIT_2

TCP 203.xx.251.161:1053 203.94.243.71:110 TIME_WAIT

TCP 203.xx.251.161:1058 194.1.129.227:20 TIME_WAIT

TCP 203.xx.251.161:1069 203.94.243.71:110 TIME_WAIT

TCP 203.xx.251.161:1071 194.98.93.244:80 ESTABLISHED

TCP 203.xx.251.161:1078 203.94.243.71:110 TIME_WAIT



Here 203.xx.251.161 is your IP address.



Now lets clarify the format used by netstat :



Proto : It shows the type of protocol the connection with the remote system is using.

Here TCP (transmission control protocol) is the protocol used by my system to connect to other systems.



Local Address : It shows the local address ie the local IP. When the netstat command is executed without –n switch then the name of the local system is displayed and when the netstat is executed with –n switch then the IP of the local system is displayed. Here you can also find out the port used by the connection.

xxx.yyy.zzz.aaa:1024

in this format you will see the local address. Here 1024 is the port to which the remote system is connected in your system



Foreign Address :: It shows the IP address of the remote system to which your system is connected. In this case also if the netstat command is excuted with –n switch then you directly get the IP of the victim but if the netstat is executed without –n switch then you will get the address of the remote system. Something like



C:\netstat

Proto Local Address Foreign Address State

TCP abhisek:1031 msgr.lw4.gs681.hotmail.com:80 ESTABLISHED



Here msgr.lw4.gs681.hotmail.com is the address of the foreign system . putting this address in any IP lookup program and doing a whois lookup will reveal the IP of the remote system.



Note: The port to which your system is connected can be found from this in the same way as I have shown in the case of local address. The difference is that, this is the port of the remote system to which your computer is connected to.

Below I have produced a list of ports and popular services generally found to be running.

21 :: FTP port

80 :: http port

23 :: Telnet port



Note: If your execute the netstat command and find ports like 12345,27374 are open and are in use then make it sure that your sweat heart computer is infected with her boyfriend.. J J J J I mean your computer is infected with some sort of Trojan.

Below I have produced a list of commonly known Trojans and the ports they use by default. So if you find these ports open then get a good virus buster and get these stupid servers of the Trojans kicked out. Well if you want to play with these Trojan by keeping them in your computer but not letting them ruin your system performance then just disble it from the system registry run and they wont be loaded to memory each time when windows starts up[This trick doesn’t work for all Trojans].



Netbus :: 12345(TCP)

Subseven :: 27374(TCP)

Girl Friend :: 21554(TCP)

Back Oriface :: 31337 (UDP)



Well guys and gals I hope you are now well familiar with the term IP and what is the utility of IP in cyber world and how to get the IP of a remote system to which you are connected. I hope you find my writings very easy to undertstand. I know I lack the capacity of explaining myself but I try my level best to make things very easy and clear for you’ll.