$1.99/mo Web Hosting
Save some Cold, Hard Cash! $7.49/yr domains

Friday, February 25, 2011

How do I move a blog between accounts?

The short answer is that you can do this by making the blog in question a team blog, with two members, then removing the original team member.
In detail, the process goes like this:
  1. Sign in to Blogger with Account 1, which we'll assume is the account containing the blog.
  2. Go to the Settings | Permissions tab. 
  3. Click the Add Authors button and send an invitation to the owner of Account 2, the account to which you'd like to move the blog.  
  4. Wait for the owner of Account 2 to accept the invitation. If you're sharing a computer, you'll need to sign out of Account 1 first, or each use a different browser.
  5. Once Account 2 has joined the blog, Account 1 can log in again and go back to the Settings | Permissions tab.
  6. Click the grand admin privileges link next to Account 2. 
  • You'll still see any posts made on the blog by Account 1 with Account 1's display name. Account 2 can delete and repost these posts if they'd like to change the display name.
  • Account 1 cannot be removed until Account 2 has admin rights, since every blog must have at least one admin member at all times.
  • Photos uploaded with Account 1 will break if that account is deleted. If you want your old photos to display after adding Account 2, you'll have to leave Account 1 active.

For more you can see from official blog support  :
 How do I move a blog between accounts?

Thursday, February 24, 2011

Microsoft Windows 7 Service Pack 1 released to public

As of February 22, 2011, Finally Microsoft has released Service Pack 1 for Windows 7 to the public today.. Service Pack 1 for Windows 7 is available to the general public from the Microsoft Service Pack Center.

Windows 7 SP1 includes previously released security, performance, and stability updates, plus some improvements to features and services.

Microsoft suggests that individuals just let the normal Windows update system handle installation of the service pack. However, if you’d like to accelerate the process you can download the file and install it manually. The install will take around 30 minutes and you will have to reboot the PC during the process.
Depending on what method is used to install the service pack, you will need anywhere from 750MB to 7400MB of available disk space storage to complete the installation procedure, so plan accordingly. If you have a pre-release version of SP1 installed, you will have to uninstall it before you install the latest version.
Also note that some antivirus software will prevent SP1 from being installed properly, so you may want to temporarily turn off your antivirus while the installation takes place.

Microsoft Releases Windows 7 Service Pack 1 To The Public Via Windows Update

Those of you on the P2P bandwagon may already be running your PCs off Windows 7 Service Pack 1, but the rest of us have had to wait until today to grab the latest update from Redmond. The update is available to download now through Windows Update, although you can also download it manually from the Microsoft website.

The size of the update will vary from machine to machine, which is why Microsoft recommends that you download it through Windows Update, so that you don’t grab any unnecessarily large files that you don’t need.

Most people can expect to download roughly 1GB, so you may want to leave Windows to do its thing whilst you’re not using the internet if you have a slow connection speed.

You won’t see any drastic changes to Windows 7 after downloading the update, just a number of security fixes and the usual service pack maintenance. Still, you’ll probably want to get the update as soon as possible.

Microsoft says the standalone update package should weigh in at 527MB for x86 users, about 903MB for x64 users, and 511MB for users on Itanium chips. In Windows Update, the download sizes are much smaller.

Are you planning to install Windows 7 Service Pack 1 immediately? Have you already installed SP1? Did you come across any problems; can you share any caveats with your peers about the installation process?

Direct Download Links - Windows 7 SP1

Download SP1 RTM ISO (32-bit & 64-bit)

Courtesy :

Monday, February 21, 2011

ESPNcricinfo extension for Firefox and Google Chrome - Live Cricket Score

Working from an office or for any other reason, and unable to watch the live telecast of Cricket matches on television or the live streaming of Cricket matches online?
This time Worldcup 2011 you won't miss from office too.. just install addon in firefox or chrome and get live updated score without refreshing sites or clicking anywhere..

The official ESPN Cricinfo Firefox and chrome extension. alerting you the moment anything happens in the world of cricket, along with live scores and wicket alerts.


Friday, February 18, 2011

Protection stpes from Conficker / Kido / Downadup Virus : Conficker Worm Attack Getting Worse

Conficker is a most common virus now a days which hits your system. stop system and antivirus update by making DNS entry of own in local system and worst is it keeps download latest trojans and viruses in your system.


First, it attacks a vulnerability in the Microsoft Server service. Computers without the October patch can be remotely attacked and taken over.

Second, Conficker can attempt to guess or 'brute force' Administrator passwords used by local networks and spread through network shares.

And third, the worm infects removable devices and network shares with an autorun file that executes as soon as a USB drive or other infected device is connected to a victim PC.

Conficker and other worms are typically of most concern to businesses that don't regularly update the desktops and servers in their networks. Once one computer in a network is infected, it often has ready access to other vulnerable computers in that network and can spread rapidly.

Home computers, on the other hand, are usually protected by a firewall and are less at risk. However, a home network can suffer as well. For example, a laptop might pick up the worm from a company network and launch attacks at home.

Kido worm also known as Downadup, Downup and Conficker is continuing to spread more rapidly than ever, even though its already several months since it was first spotted. More than 9 million PC’s have been infected and Panda Security reporting infection rates of 6% in two million computers scanned via their website. China (the probable country of origin) is the most infected.

Downadup or Kido is remarkable in it’s sophistication. It can infect computers even if Autoplay feature is disabled for USB devices, by pretending to be a folder. It spreads via network as well as usb devices (pen drives, mp3 players etc). It resets your system restore points, disables Windows update, Windows Defender, Windows Security Center and even manipulates certain TCP settings to block access to security websites. It is also known to change access permissions. New variants even disable Firewall and may interface with Antivirus scans.

As soon as any removable drive is interted it creates a file called autorun.inf and a folder RECYCLED (commonly used by the system to store Recycle Bin files). It then goes on to create another file {SID<....>}RANDOM_NAME.vmx inside the RECYCLED folder. Most antivirus softwares would be able to detect this *.vmx file, but once a system is infected won’t be properly able to eliminate the worm (thus you would end up with new detection everytime you insert a USB device).

Like most worms once Kido infects a machine it calls home and may download malicious files to the infected computer. What is really interesting is that, Kido uses a complicated algorithm to create a large list of new domain names everyday. The script to be downloaded may be hosted on any one of these domain names, thus making things even harder for the good guys. Kido also launches a brute force dictionary attack in order to guess the administrator password. Hence, it would be a good idea to change your administrator password to a non-dictionary word right now.

Kido worm has been dubbed as an epidemic and is the biggest worm epidemic in recent years. And it’s still evolving. Kaspersky is reporting that new variants have been spotted which further enhance the original worm’s funtionality. The new variants generate as many as 50,000 domain names everyday (compared to 250 in the older variants) from which it can download updates.

How to Check Your system is infected?

Go to http://update.microsoft.com/microsoftupdate to verify your settings and check for updates.
if you can't access try any antivirus site
for example

if you are not able to access above sites where your net is running smooth with yahoo and orkut then your system may be effected with Conficker Kido Virus..

Technical Details of Conficker is :


Upon execution, Downadup creates copies of itself in:

  • %System%\[Random].dll
  • %Program Files%\Internet Explorer\[Random].dll
  • %Program Files%\Movie Maker\[Random].dll
  • %All Users Application Data%\[Random].dll
  • %Temp%\[Random].dll
  • %System%\[Random].tmp
  • %Temp%\[Random].tmp

* Note: [Random] represents a randomly generated name.

Each file's timestamp is amended to match the timestamp of the %System%\kernel32.dll file. The worm then creates autorun entries in the registry, which ensure that a copy of the worm is executed at every system startup.

The worm then attach itself to the following processes:

  • svchost.exe
  • explorer.exe
  • services.exe


Conficker.C is designed to spread by exploiting a vulnerability in the Windows Server Service which allows remote code execution. It is the vulnerability MS08-067.

Additionally, Conficker.C carries out the following actions:

    * It checks the system date in the following web addresses:
      and if the system date is after January 1, 2009, it will attempt to connect to a website in order to download a malicious executable file. The website to which it connects varies depending on the system date.
    * It disables the following services:
      - Windows update, disabling the Windows updates.
      - BITS (Background Intelligent Transfer Service), which is a service to transfer Windows files.
      - Error reporting service, which allows to send Microsoft information about errors occurring in the operating system, Windows components and programs.
    * It prevents the user and the computer from connecting to the websites that contain any of the following text strings:
      As they are security related websites, the antivirus programs could not be updated and the user could not access the information of these pages.
    * It modifies the security policies of the user accounts. In order to access the user accounts, it uses the following weak passwords:
      00000, 0000000, 00000000, 0987654321, 11111, 111111, 1111111, 11111111, 123123, 12321, 123321, 12345, 123456, 1234567, 12345678, 123456789, 1234567890, 1234abcd, 1234qwer, 123abc, 123asd, 123qwe, 1q2w3e, 22222, 222222, 2222222, 22222222, 33333, 333333, 3333333, 33333333, 44444, 444444, 4444444, 44444444, 54321, 55555, 555555, 5555555, 55555555, 654321, 66666, 666666, 6666666, 66666666, 7654321, 77777, 777777, 7777777, 77777777, 87654321, 88888, 888888, 8888888, 88888888, 987654321, 99999, 999999, 9999999, 99999999.
      a1b2c3, aaaaa, abc123, academia, access, account, Admin, admin, admin1, admin12, admin123, adminadmin, administrator, anything, asddsa, asdfgh, asdsa, asdzxc.

      backup, boss123, business.

      campus, changeme, cluster, codename, codeword, coffee, computer, controller, cookie, customer.

      database, default, desktop, domain.

      example, exchange, explorer.

      files, foobar, foofoo, forever, freedom.



      ihavenopass, Internet, internet, intranet.


      letitbe, letmein, Login, login, lotus, love123.

      manager, market, money, monitor, mypass, mypassword, mypc123.

      nimda, nobody, nopass, nopassword, nothing.

      office, oracle, owner.

      pass1, pass12, pass123, passwd, Password, password, password1, password12, password123, private, public, pw123.

      q1w2e3, qazwsx, qazwsxedc, qqqqq, qwe123, qweasd, qweasdzxc, qweewq, qwerty, qwewq.

      root123, rootroot.

      sample, secret, secure, security, server, shadow, share, student, super, superuser, supervisor, system.

      temp123, temporary, temptemp, test123, testtest.


      windows, work123.


      zxccxz, zxcvb, zxcvbn, zxcxz, zzzzz.

Infection strategy

Conficker.C creates a random DLL in the Windows system directory. This file is created with system, read-only and hidden attributes.

It also creates a file with random name and VMX extension in the folder RECYCLER\%random name% of all the shared and removable drives of the computer. It is copied with system, read-only and hidden attributes. Additionally, it creates an AUTORUN.INF file in these drives. This way, it is run whenever any of them is accessed.

On the other hand, it creates a scheduled task in the folder Tasks of the Windows directory in order to start its execution periodically.

Conficker.C creates the following entries in the Windows Registry:

    * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
      %random name% = rundll32.exe %letra unidad%\RECYCLER\%random name%\%random filename.vmx
      By creating this entry, Conficker.C ensures that it is run whenever Windows is started.
    * HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
      TcpNumConnections = 0x00FFFFFE
    * HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
      Image Path = %sysdir%\svchost.exe -k netsvcs
    * HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
      ServiceDll = %name of the drive%\RECYCLER\%random name%\%random filename%.vmx
      By creating these two entries, it is registered as a service.

Conficker.C modifies the following entries from the Windows Registry in order to make its detection more difficult:

    * HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\Advanced\Folder\Hidden\SHOWALL
      CheckedValue = 1
      It changes this entry to:
      CheckedValue = 0
    * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
      SuperHidden = 1
      It changes this entry to:
      SuperHidden = 0
    * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
      Hidden = 1
      It changes this entry to:
      Hidden = 0
      It hides the files and folders with hidden attribute.

Means of transmission

Conficker.C spreads by exploiting the vulnerability called MS08-067, which is a vulnerability in the Windows server service. In order to do so, it sends malformed RPC requests to other computers. If any of them is vulnerable, it will download a copy of the worm to the system.

Additionally, Conficker.C also spreads through the system drives, both shared and removable, making copies of itself in them. It also creates an AUTORUN.INF file in order to be run whenever any of them is accessed.

Here is Symantec, Panda and Mcafee Report

Discovered:     November 21, 2008
Updated:     July 9, 2010 9:15:40 AM
Also Known As:     Win32/Conficker.A [Computer Associates], W32/Downadup.A [F-Secure], Conficker.A [Panda Software], Net-Worm.Win32.Kido.bt [Kaspersky], WORM_DOWNAD.AP [Trend], W32/Conficker [Norman]
Type:    Worm
Infection Length:    Varies
Systems Affected:    Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Vista, Windows XP

W32.Downadup, also known as Conficker by some news agencies and antivirus vendors, is an extremely interesting piece of malicious code and one of the most prolific worms in recent years. It has an extremely large infection base – estimated to be upwards of 3 million computers - that have the potential to do a lot of damage. This is largely attributed to the fact that it is capable of exploiting computers that are running unpatched Windows XP SP2 and Windows 2003 SP1 systems. Other worms released over the past few years have largely targeted older system versions, which have an ever decreasing distribution.


W32.Downadup spreads primarily by exploiting the Microsoft Windows Server Service RPC Handling Remote Code Execution Vulnerability, which was first discovered in late-October of 2008. It scans the network for vulnerable hosts, but instead of flooding it with traffic, it selectively queries various computers in an attempt to mask its traffic instead. It also takes advantage of Universal Plug and Play to pass through routers and gateways.

It also attempts to spread to network shares by brute-forcing commonly used network passwords and by copying itself to removable drives.

It has the ability to update itself or receive additional files for execution. It does this by generating a large number of new domains to connect to every day. The worm may also receive and execute files through a peer-to-peer mechanism by communicating with other compromised computers, which are seeded into the botnet by the malware author.

The worm blocks access to predetermined security-related websites so that it appears that the network request timed out. Furthermore, it deletes registry entries to disable certain security-related software, prevent access to Safe Mode, and to disable Windows Security Alert notifications.

PANDA Antivirus says :

Common name:    Conficker.C
Technical name:    W32/Conficker.C.worm
Threat level:    High
Alias:    W32.Downadup,Net-Worm.Win32.Kido.cn,WORM_DOWNAD.AD,
Type:    Worm

It exploits the vulnerability MS08-067 in the Windows Server Service in order to spread itself. It also spreads through shared and removable drives. It reduces considerably the protection level of the computer, modifies the security policies of the user accounts and attempts to download another type of malware to the affected computer.
Affected platforms:    

Windows 2003/XP/2000/NT/ME/98/95
First detected on:    Dec. 31, 2008
Detection updated on:    Dec. 22, 2010
Statistics    Yes
Proactive protection:    Yes, using TruPrevent Technologies


The most critical and obvious protection is to make sure the Microsoft patch is applied. Network administrators can also use a blocklist provided by F-Secure to try and stop the worm's attempts to connect to Web sites.

First and foremost thing is self care about the system

Downadup copies itself to removable drives as a random file name and also copies an autorun.inf file to the drive so that it runs every time the drive is inserted into a computer. It also uses a social engineering technique to trick the user into running the file. The malware author makes the executable worm file look like an innocent folder. Unsuspecting users will then double click on the folder icon thinking that it indeed is a folder, rather than the executable file that it is.

Most users just double click on the pop-up box that appears when they insert a removable drive into a computer without reading the pop-up box carefully. But even those that are savvy computer uses and read the pop-up box carefully may still be mislead into thinking that they are opening a folder instead of actually running a file.

so be sure that you don't click on any autorun file. or better you disable autorun on your system for all drives. check out the link if you don't know how to do that..

If your computer does not have an up-to-date antivirus solution, or does not have an antivirus solution at all, you can either use a special removal tool (which can be found here or follow the instructions below:

Delete the following system registry key:
Delete “%System%\.dll” from the system registry key value shown below:
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost]
Reboot the computer.
Delete the original worm file (the location will depend on how the program originally penetrated the victim machine).

Delete copies of the worm:
%Program Files%\Internet Explorer\.dll
%Program Files%\Movie Maker\.dll
%All Users Application Data%\.dll
is a random string of symbols.

Delete the files shown below from all removable storage media:

To remove conficker with a conficker remover, check out the following urls to Download downadup/conficker remover tools:
Symantec W32.Downadup Removal Tool 

F-SECURE Malware Removal Tool: 

Microsoft’s Malicious Software Removal tool: 

Remover conficker applications may be regularly updated to make conflicker virus removal efficient in removing new variants of this worm. Make sure to check out the respective developers’ site of these virus conficker removal tools.

Courtesy :
Above information was collected from almost 100s of sites.. so can't type each link here..  Mostly information from microsoft, symantec, f-secure, mcafee, panda, experts-exchange.com. cnet, pcworld and also few blogs.

Thursday, February 17, 2011

How to Remove Windows Genuine Advantage (WGA - WGATray.exe)

1) Go to the Start Menu tab and click on Run.

2) Once Run has been opened, type in %systemroot%\system32 and click on ok.

3) Now once your folder is opened,
go to Tools Menu
-> Go to Folder Option.
-> Click on View Tab.
-> select Show hidden files and folders.
-> uncheck the option "Hide extensions for known file types".
-> uncheck "hide operating system files" you will get warning click on "Yes".

4) Now go and find WgaLogon.dll and you have to rename it with another extension.
To do this, right click and rename make it's extention .dll.bak instead of .dll you need to type .bak after it's name
If a warning pops up for changing the name, click on yes.

5) Now you have to find and delete the WgaTray.exe file that's in the System32. Once the file has been deleted, go straight to the "Processes" tab and highlight WgaTray.exe and click on "End Process".

Note : You may get warned that file is already in used. so be careful. First you open task manager and under process tab find "wgatray.exe" click on end task and you will get warned that "yes" or "no" keep it open and now delete the file from system32 folder now directly click on "yes" to end the process. you may find it hard but to make genuine freely you need to atleast work little harder. :-)

6) Go back to System32 and delete the WgaLogon.dll application. Then you got to change the name back to the original name.

This is exactly how you should remove Windows Genuine Advantage.
Well steps may be harder but you shouldn't perform above steps if you are not a technical person. which may lead to unstable your system.

Tuesday, February 15, 2011

Disable Autorun file - Protect your computer from USB

Most of the computer seems to get transferred from USB drives and other portable and removable media like external Harddisk or Memory card. As soon as you plug and play your removable storage media, the windows’ default feature will search for Autorun.inf file which contains all the information about the things to do when media is plugged in.

It can execute programs (probably virus) which are already in removable storage media. Eventually the programs copies itself to the hard drive.

Therefore it is necessary to turn of autorun feature in your windows to get rid of viruses.

Here is the quick solution to prevent your system. you just need to disable autorun feature of windows..

Follow this step by step to disable autorun feature.

Go to Start Menu and Select Run

Type gpedit.msc and press OK

you will see group policy editor window.

In the explorer sidebar at the left,
open Computer configuration ..
then Administrative templates..
now inside System folder.

At the right side, scroll down for the Turn off Autoplay.
Double click to open it.
Click on Enabled button
choose All Drives
and then OK

Same steps you need to do in user configuration.

open Computer configuration ..
then Administrative templates..
now inside System folder.

At the right side, scroll down for the Turn off Autoplay.
Double click to open it.
Click on Enabled button
choose All Drives
and then OK

Restart you machine..

Now your system won't autorun any file from external media.

Good Luck :-)

Monday, February 14, 2011

OpenDNS: Facebook was most-blocked site in 2010

According to OpenDNS, Facebook was the most-blocked site during 2010...but it was also the second most-likely site to be whitelisted.

According to a new report (Click Here to view PDF) from DNS and online security service provider OpenDNS, social networking site Facebook was the most-blocked site during 2010. In this context, blocking means that OpenDNS customers specifically configured their DNS and security services to prevent their users from connecting, presumably out of security concerns, to prevent people from wasting time at work, or using company or organizational resources inappropriately. However, Facebook ranked highly on another list: it was the second most commonly whitelisted site, meaning sites that were specifically granted exemptions from other security or blocking rules.

“Overall, 2010 was all about social, and this trend is reflected in the data we’re seeing,” said OpenDNS founder and CEO David Ulevitch, in a statement. “Facebook is both one of the most blocked and the most allowed Web sites, reflecting the push/pull of allowing social sites in schools and the workplace.”

OpenDNS found the top five most commonly blacklisted sites for 2010 were Facebook, MySpace, YouTube, Doubleclick (an advertising network now owned by Google), and Twitter. Other commonly-blocked sites included other ad networks and adult-oriented sites. However, the top five whitelisted sites included a few of the same times—YouTube and Facebook, followed by Gmail, Google, and Google’s translation service.

Overall, Facebook was blocked by 14.2 percent of networks using OpenDNS, and specifically whitelisted by 12.7 percent. However, amongst OpenDNS’s business users the proportions changed: a full 23 percent blocked Facebook.

OpenDNS also broke down Web content filtering into broad categories, finding that during 2010 Web sites classified as pornographic were blocked by 85 percent of users, followed by sites with “sexuality” (80.1 percent) and “tasteless” content (77.3 percent). Proxies and anonymizing sites were also blocked by 76.2 percent of users, meaning the organizations are attempting to prevent their users from circumventing Web content filtering.

OpenDNS also found that the United States hosts more phishing sites than any other country—by a significant margin. According to OpenDNS, some 53.8 percent of phishing Web sites were on systems hosted in the United States, with Germany coming in a distant second with 6.3 percent.

Courtesy :

Tuesday, February 8, 2011

Type in Indian Language - Typing in Hindi, Gujarati is too easy now..

Sometimes you may feel to write in your Local language.. Personally I like to write in Gujarati so much in some of my documents..

If you are using Windows OS it's very easy to type in Gujarati/Hindi.. No need to install any other fonts or software.. Microsoft officially out a tool which helps you to write in your Indian local language.

Go to microsoft official support..


Download "MS Indic for Gujarat"
Install and restart the system..

You can find other language
Bengali Gujarati Hindi Kannada Malayalam Marathi Oriya Punjabi Tamil Telugu

Open Word/Excel or other office document..
and make your language bar is open.. select Gujarati from it.

you can do it by
Control Panel -> Regional and Language Option -> Under Language Tab -> Details -> Language Bar ( Preference ) -> Show Language Bar on Desktop. 

other way is most simpler..

Right click on your task bar.. then click on Toolbars.. Language Toolbar.. click on it.. it will be placed in your task bar nearer to clock..

You need not to do any other setting.

Try it out..

Good Luck.. :-)

Monday, February 7, 2011

Use only RUN from your start menu - Many Useful Commands.

Command Prompt is as most powerful as linux terminal but unfortunately we don't know many commands and that's why we never ever use run so often..

Here is the list of command which I got from various sites h

Control Command
Accessibility Controls access.cpl
Accessibility Wizardaccwiz
Add Hardware Wizardhdwwiz.cpl
Add/Remove Programs appwiz.cpl
Administrative Toolscontrol admintools
Adobe Acrobat (if installed)acrobat
Adobe Designer (if installed)formdesigner
Adobe Distiller (if installed)acrodist
Adobe ImageReady (if installed)imageready
Adobe Photoshop (if installed)photoshop
Automatic Updateswuaucpl.cpl
Bluetooth Transfer Wizardfsquirt
Certificate Managercertmgr.msc
Character Mapcharmap
Check Disk Utilitychkdsk
Clipboard Viewerclipbrd
Command Promptcmd
Component Servicesdcomcnfg
Computer Managementcompmgmt.msc
Control Panelcontrol
Date and Time Properties timedate.cpl
DDE Shares ddeshare
Device Managerdevmgmt.msc
Direct X Control Panel (if installed)*directx.cpl
Direct X Troubleshooterdxdiag
Disk Cleanup Utilitycleanmgr
Disk Defragmentdfrg.msc
Disk Managementdiskmgmt.msc
Disk Partition Managerdiskpart
Display Propertiescontrol desktop
Display Propertiesdesk.cpl
Display Properties (w/Appearance Tab Preselected)control color
Dr. Watson System Troubleshooting Utilitydrwtsn32
Driver Verifier Utilityverifier
Event Viewereventvwr.msc
Files and Settings Transfer Toolmigwiz
File Signature Verification Toolsigverif
Firefox (if installed) firefox
Folders Propertiesfolders
Fontscontrol fonts
Fonts Folderfonts
Free Cell Card Gamefreecell
Game Controllers joy.cpl
Group Policy Editor (XP Prof)gpedit.msc
Hearts Card Gamemshearts
Help and Supporthelpctr
Iexpress Wizardiexpress
Indexing Serviceciadv.msc
Internet Connection Wizardicwconn1
Internet Exploreriexplore
Internet Properties inetcpl.cpl
Internet Setup Wizardinetwiz
IP Configuration (Display Connection Configuration)ipconfig /all
IP Configuration (Display DNS Cache Contents)ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents)ipconfig /flushdns
IP Configuration (Release All Connections)ipconfig /release
IP Configuration (Renew All Connections)ipconfig /renew
IP Configuration (Refreshes DHCP & Re-Registers DNS)ipconfig /registerdns
IP Configuration (Display DHCP Class ID)ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID)ipconfig /setclassid
Java Control Panel (if installed)jpicpl32.cpl
Java Control Panel (if installed)javaws
Keyboard Propertiescontrol keyboard
Local Security Settingssecpol.msc
Local Users and Groupslusrmgr.msc
Logs You Out Of Windows logoff
Malicious Software Removal Tool mrt
Microsoft Access (if installed)msaccess
Microsoft Chatwinchat
Microsoft Excel (if installed)excel
Microsoft Frontpage (if installed)frontpg
Microsoft Movie Makermoviemk
Microsoft Paintmspaint
Microsoft Powerpoint (if installed)powerpnt
Microsoft Word (if installed)winword
Microsoft Syncronization Toolmobsync
Minesweeper Gamewinmine
Mouse Propertiescontrol mouse
Mouse Propertiesmain.cpl
Nero (if installed)nero
Netmeeting conf
Network Connectionscontrol netconnections
Network Connectionsncpa.cpl
Network Setup Wizardnetsetup.cpl
Nview Desktop Manager (if installed)nvtuicpl.cpl
Object Packagerpackager
ODBC Data Source Administratorodbccp32.cpl
On Screen Keyboardosk
Opens AC3 Filter (if installed)ac3filter.cpl
Outlook Expressmsimn
Password Propertiespassword.cpl
Performance Monitorperfmon.msc
Performance Monitorperfmon
Phone and Modem Options telephon.cpl
Phone Dialerdialer
Pinball Gamepinball
Power Configuration powercfg.cpl
Printers and Faxescontrol printers
Printers Folderprinters
Private Character Editoreudcedit
Quicktime (If Installed)QuickTime.cpl
Quicktime Player (if installed)quicktimeplayer
Real Player (if installed)realplay
Regional Settings intl.cpl
Registry Editorregedit
Registry Editorregedit32
Remote Access Phonebookrasphone
Remote Desktop mstsc
Removable Storagentmsmgr.msc
Removable Storage Operator Requestsntmsoprq.msc
Resultant Set of Policy (XP Prof)rsop.msc
Scanners and Camerassticpl.cpl
Scheduled Taskscontrol schedtasks
Security Center wscui.cpl
Shared Foldersfsmgmt.msc
Shuts Down Windowsshutdown
Sounds and Audio mmsys.cpl
Spider Solitare Card Gamespider
SQL Client Configuration cliconfg
System Configuration Editorsysedit
System Configuration Utilitymsconfig
System File Checker Utility (Scan Immediately)sfc /scannow
System File Checker Utility (Scan Once At The Next Boot)sfc /scanonce
System File Checker Utility (Scan On Every Boot)sfc /scanboot
System File Checker Utility (Return Scan Setting To Default)sfc /revert
System File Checker Utility (Purge File Cache)sfc /purgecache
System File Checker Utility (Sets Cache Size to size x)sfc /cachesize=x
System Informationmsinfo32
System Properties sysdm.cpl
Task Managertaskmgr
TCP Testertcptest
Telnet Clienttelnet
Tweak UI (if installed)tweakui
User Account Managementnusrmgr.cpl
Utility Managerutilman
Windows Address Bookwab
Windows Address Book Import Utilitywabmig
Windows Backup Utility (if installed)ntbackup
Windows Explorerexplorer
Windows Firewallfirewall.cpl
Windows Magnifier magnify
Windows Management Infrastructurewmimgmt.msc
Windows Media Playerwmplayer
Windows Messengermsmsgs
Windows Picture Import Wizard (need camera connected)wiaacmgr
Windows System Security Toolsyskey
Windows Update Launcheswupdmgr
Windows Version (to show which version of windows)winver
Windows XP Tour Wizardtourstart
Wordpad write

Courtesy : http://mypchell.com

Saturday, February 5, 2011

Department Of Telecom (DOT) banned Mobango.com

The old and famous mobile sharing site Mobango.com is blocked by DOT (Department of Telecom). Today when I open that site it is showing home page that DOT has banned this site.. also in.mobango or pk.mobango banned too..

When you try to open the site you will get following page via any of ISP in India.. I had tried with BSNL, Airtel and Reliance..

I am wondering why this only site is blocked.. though India's biggest Internet service provider BSNL had already banned this site before almost a year.. when you try to access using BSNL net that URL wasn't resolved.. to access that site I was using opendns.. but unfortunately this site is now no longer available for India..

There is no reason or clue we have why was this site banned. I was member of that site but yet not get any mail from site admin too about this issue..