Windows Registry Tutorial |
|||
Overview
The Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.
The Structure of the Registry
The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer. |
Tuesday, November 5, 2013
Registry tutorial windows registry, change registery, registry editor regedit by gorvam saddar
ALL ABOUT HACKERS AND HACKING WORD MEANS, HACK GLOSSARY by Gorvam saddar
We live in an era of unprecedented cyberattacks,
where malicious campaigns, both personal and governmental, are carried out
across laptops and wireless networks.
Even if you
are not technically minded, your day-to-day life is still probably pretty
crowded with stories about hacking, whether you recognize them as such or not.
Have you
ever installed an antivirus tool on your computer? Read a story about WikiLeaks or
the Arab Spring? Opened a bank account? Then
hacking is important to you, even if remains largely in the background of your
life. It makes sense to get informed about it. Unfortunately, it is a very
technical subject, with a great deal of specialized vocabulary.
FRAME RELAY wan technology cisco ccna fully EXPLAINED with configuration by gorvam saddar
This paper will address the following issues:
What is Frame Relay?
How does Frame Relay differ from other techniques?
What is Frame Relay useful for?
How does frame relay fit in the U.S. Internet strategy?
Mixing Frame Relay with other technologies
Pros and Cons of Frame Relay
Technical aspects of installing and running frame
Items one through six will address general overviews of frame; item 7 will be a technical discussion related to equipment installation and setup that is probably only interesting for the technical staff involved in this area.
1. What is Frame Relay?Frame relay is a technique used to transport data from locations to location, just like T-1 lines or ISDN connections do. In frame relay, there are a number of locations on the network that can send and receive data. These connections are known as Ports. Each location that needs access to the frame system, needs to have one of these ports.
ROUTER PASSWORD BREAKING BYPASS ROUTER PASSWORD PROCESS STEP BY STEP GORVAM SADDAR
- Turn the power switch off and back on to recycle the power.
- Press the Break key or key sequence to put the router into ROM Monitor mode. The break key varies by computer or terminal software. The sequence might be CTRL-D, CTRL-Breakor another combination.
- At the > prompt, type 0 to record the current value of the configuration register normally 0x2102, or 0x102.
- Type o/r 0x2142 to tell the router to boot from flash without loading the configuration in NVRAM at the next reload.
- Type i to have the router reboot. The router ignores the configuration in NVRAM.
- The router runs the setup dialog, Type no or press Ctrl-C to skip the initial setup Dialog.
- Type enable ate the Router> prompt to go to privileged exec mode.
- Copy the startup configuration to the running configuration by using the configure memory or copy startup-config running-config commands. Do not type configure terminal. If you use the configure terminal command, you overwrite the configuration stored in NVRAM.
- View the configuration by typing write terminal or show running-config. View the configured line, vty and enable passwords. Any encrypted passwords need to be changed.
>o
Configuration register = 0x2102 at last boot
Bit# Configuration register option settings:
15 Diagnostic mode disabled.
ALL WINDOWS CMD COMMANDS, DOS COMMANDS, COMMAND PROMPT COMMNADS
ASSOC Displays or modifies file extension
associations.
ATTRIB Displays or changes file attributes.
BREAK Sets or clears extended CTRL+C checking.
*BCDEDIT Sets properties in boot database to control boot loading.
CACLS Displays or modifies access control lists (ACLs) of files.
CALL Calls one batch program from another.
CD Displays the name of or changes the current directory.
CHCP Displays or sets the active code page number.
CHDIR Displays the name of or changes the current directory.
CHKDSK Checks a disk and displays a status report.
CHKNTFS Displays or modifies the checking of disk at boot time.
*CHOICE Batch file command that allows users to select from a set of options.
CIPHER Displays or alters the encryption of directories [files] on NTFS partitions.
*CLIP Redirects output of another command to the Windows clipboard.
CLS Clears the screen.
CMD Starts a new instance of the Windows command interpreter.
*CMDKEY Creates, lists and deletes stored user names and passwords or credentials.
COLOR Sets the default console foreground and background colors.
COMP Compares the contents of two files or sets of files.
COMPACT Displays or alters the compression of files on NTFS partitions.
CONVERT Converts FAT volumes to NTFS. You cannot convert the current drive.
COPY Copies one or more files to another location.
DATE Displays or sets the date.
DEFRAG Disk defragmenter accessory.
ATTRIB Displays or changes file attributes.
BREAK Sets or clears extended CTRL+C checking.
*BCDEDIT Sets properties in boot database to control boot loading.
CACLS Displays or modifies access control lists (ACLs) of files.
CALL Calls one batch program from another.
CD Displays the name of or changes the current directory.
CHCP Displays or sets the active code page number.
CHDIR Displays the name of or changes the current directory.
CHKDSK Checks a disk and displays a status report.
CHKNTFS Displays or modifies the checking of disk at boot time.
*CHOICE Batch file command that allows users to select from a set of options.
CIPHER Displays or alters the encryption of directories [files] on NTFS partitions.
*CLIP Redirects output of another command to the Windows clipboard.
CLS Clears the screen.
CMD Starts a new instance of the Windows command interpreter.
*CMDKEY Creates, lists and deletes stored user names and passwords or credentials.
COLOR Sets the default console foreground and background colors.
COMP Compares the contents of two files or sets of files.
COMPACT Displays or alters the compression of files on NTFS partitions.
CONVERT Converts FAT volumes to NTFS. You cannot convert the current drive.
COPY Copies one or more files to another location.
DATE Displays or sets the date.
DEFRAG Disk defragmenter accessory.
DNS SERVER ,FULL EXPLAINED STEP BY STEP GORVAM SADDAR
Understanding the DNS namespace
The following illustration shows how the DNS namespace is organized.
A DNS name consists of two or more parts separated by periods, or "dots" (.). The last (rightmost) part of the name is called the top-level domain (TLD). Other parts of the name are subdomains of the TLD or another subdomain. The names of the TLDs are either functional or geographical. Subdomains usually refer to the organization that owns the domain name.
Functional TLDs suggest the purpose of the organization that has registered a subdomain in the TLD. The following table shows some of the most common functional TLD names.
Functional TLD
|
Typically used by …
|
.com
|
Commercial entities, such as corporations, to register DNS domain names
|
.edu
|
Educational institutions, such as colleges, and public and private schools
|
.gov
|
Government entities, such as federal, state, and local governments
|
.net
|
Organizations that provide Internet services, such as Internet service providers (ISPs)
|
.org
|
Private, nonprofit organizations
|
Creating an Internet DNS domain name
An Internet DNS domain name has a TLD name, such as .com, .org, or .edu, and a unique subdomain name that the domain owner chooses. For example, a company named Contoso Corporation would probably choose contoso.com as its Internet domain name.
Subscribe to:
Posts (Atom)