Tuesday, November 5, 2013

Registry tutorial windows registry, change registery, registry editor regedit by gorvam saddar

Windows Registry Tutorial


Overview
The Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.
The physical files that make up the registry are stored differently depending on your version of Windows; under Windows 95 & 98 it is contained in two hidden files in your Windows directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the %SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a tool commonly known as a "Registry Editor" to make any changes (using registry editors will be discussed later in the article).
The Structure of the Registry
The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer.


Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context.
There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:

ALL ABOUT HACKERS AND HACKING WORD MEANS, HACK GLOSSARY by Gorvam saddar

We live in an era of unprecedented cyberattacks, where malicious campaigns, both personal and governmental, are carried out across laptops and wireless networks.
Even if you are not technically minded, your day-to-day life is still probably pretty crowded with stories about hacking, whether you recognize them as such or not.
Have you ever installed an antivirus tool on your computer? Read a story about WikiLeaks or the Arab Spring? Opened a bank account? Then hacking is important to you, even if remains largely in the background of your life. It makes sense to get informed about it. Unfortunately, it is a very technical subject, with a great deal of specialized vocabulary.

FRAME RELAY wan technology cisco ccna fully EXPLAINED with configuration by gorvam saddar

This paper will address the following issues:
  1. What is Frame Relay?
  2. How does Frame Relay differ from other techniques?
  3. What is Frame Relay useful for?
  4. How does frame relay fit in the U.S. Internet strategy?
  5. Mixing Frame Relay with other technologies
  6. Pros and Cons of Frame Relay
  7. Technical aspects of installing and running frame
Items one through six will address general overviews of frame; item 7 will be a technical discussion related to equipment installation and setup that is probably only interesting for the technical staff involved in this area.
1. What is Frame Relay?
Frame relay is a technique used to transport data from locations to location, just like T-1 lines or ISDN connections do. In frame relay, there are a number of locations on the network that can send and receive data. These connections are known as Ports. Each location that needs access to the frame system, needs to have one of these ports.

ROUTER PASSWORD BREAKING BYPASS ROUTER PASSWORD PROCESS STEP BY STEP GORVAM SADDAR


  • Turn the power switch off and back on to recycle the power. 
  • Press the Break key or key sequence to put the router into ROM Monitor mode. The break key varies by computer or terminal software. The sequence might be CTRL-D, CTRL-Breakor another combination. 
  • At the  > prompt, type 0 to record the current value of the configuration register normally 0x2102, or 0x102.
  • >o
    Configuration register = 0x2102 at last boot
    Bit#    Configuration register option settings:
    15      Diagnostic mode disabled. 
  • Type o/r 0x2142 to tell the router to boot from flash without loading the configuration in NVRAM at the next reload. 
  • Type i to have the router reboot. The router ignores the configuration in NVRAM.
  • The router runs the setup dialog, Type no or press Ctrl-C to skip the initial setup Dialog
  • Type enable ate the Router> prompt to go to privileged exec mode.
  • Copy the startup configuration to the running configuration by using the configure memory or copy startup-config running-config commands. Do not type configure terminal. If you use the configure terminal command, you overwrite the configuration stored in NVRAM.
  • View the configuration by typing write terminal or show running-config. View the configured line, vty and enable passwords. Any encrypted passwords need to be changed. 

ALL WINDOWS CMD COMMANDS, DOS COMMANDS, COMMAND PROMPT COMMNADS

ASSOC Displays or modifies file extension associations.
ATTRIB Displays or changes file attributes.
BREAK Sets or clears extended CTRL+C checking.
*BCDEDIT Sets properties in boot database to control boot loading.
CACLS Displays or modifies access control lists (ACLs) of files.
CALL Calls one batch program from another.
CD Displays the name of or changes the current directory.
CHCP Displays or sets the active code page number.
CHDIR Displays the name of or changes the current directory.
CHKDSK Checks a disk and displays a status report.
CHKNTFS Displays or modifies the checking of disk at boot time.
*CHOICE Batch file command that allows users to select from a set of options.
CIPHER Displays or alters the encryption of directories [files] on NTFS partitions.
*CLIP Redirects output of another command to the Windows clipboard.
CLS Clears the screen.
CMD Starts a new instance of the Windows command interpreter.
*CMDKEY Creates, lists and deletes stored user names and passwords or credentials.
COLOR Sets the default console foreground and background colors.
COMP Compares the contents of two files or sets of files.
COMPACT Displays or alters the compression of files on NTFS partitions.
CONVERT Converts FAT volumes to NTFS. You cannot convert the current drive.
COPY Copies one or more files to another location.
DATE Displays or sets the date.
DEFRAG Disk defragmenter accessory.

DNS SERVER ,FULL EXPLAINED STEP BY STEP GORVAM SADDAR


Understanding the DNS namespace


The following illustration shows how the DNS namespace is organized.

A DNS name consists of two or more parts separated by periods, or "dots" (.). The last (rightmost) part of the name is called the top-level domain (TLD). Other parts of the name are subdomains of the TLD or another subdomain. The names of the TLDs are either functional or geographical. Subdomains usually refer to the organization that owns the domain name.
Functional TLDs suggest the purpose of the organization that has registered a subdomain in the TLD. The following table shows some of the most common functional TLD names.

Functional TLD
Typically used by …
.com
Commercial entities, such as corporations, to register DNS domain names
.edu
Educational institutions, such as colleges, and public and private schools
.gov
Government entities, such as federal, state, and local governments
.net
Organizations that provide Internet services, such as Internet service providers (ISPs)
.org
Private, nonprofit organizations

Creating an Internet DNS domain name

An Internet DNS domain name has a TLD name, such as .com, .org, or .edu, and a unique subdomain name that the domain owner chooses. For example, a company named Contoso Corporation would probably choose contoso.com as its Internet domain name.