Keyboard Shortcuts, Microsoft Word


Keyboard Shortcuts, Microsoft Word

 Keyboard Shortcuts Result in Microsoft Word

CTRL and A Selects all in the current document.
CTRL and B Bold text.
CTRL and C Copies the item or text to the Clipboard and can be pasted using CTRL and V.
CTRL and D Displays the Font dialogue box.
CTRL and E Centre Alignment.
CTRL and F Displays the Find dialog box, to search the current document.
CTRL and G Displays the Go to dialog box, to go to a specific location in the current document.
CTRL and H Displays the Replace dialogue box.
CTRL and I Italic text.
CTRL and J Full Justification.
CTRL and K Create Hyperlink
CTRL and L Left Alignment
CTRL and M Tab
CTRL and N Creates a new document.
CTRL and O Displays the Open File dialogue box.
CTRL and P Displays the Print dialog box.
CTRL and R Right Alignment.
CTRL and S Displays the Save dialog box.
CTRL and U Underline text
CTRL and V Pastes the copied item or text from the Clipboard into the current position in the document.
CTRL and X Cuts the item or text selected to the Clipboard.
CTRL and Y Redo the last undone action.
CTRL and Z Undoes the last action.
CTRL and ENTER Insert Page Break.
CTRL and F2 Show Print preview.
CTRL and F4 Closes the active document window.
CTRL and F6 Opens the next document window.

Keyboard Shortcuts Result in Microsoft Word
F1 key Get help or use the Office assistant.
SHIFT and F1 Key Context sensitive help.
F2 Key Move text or image.
SHIFT and F2 Key Copy Text.
F3 Key Insert an autotext entry.
SHIFT and F3 Key Change the case of the selected text.
F4 Key Perform last action again.
SHIFT and F4 Key Perform a Find or Go to action again.
F5 Key Displays the Go to dialogue box, from here you can also Find and Replace.
SHIFT and F5 Key Move to a previous revision.
F6 Key Go to the next frame or pane.
SHIFT and F6 Key Go to the previous frame or pane.
F7 Key Launch the Spell checker.
SHIFT and F7 Key Launch the Thesaurus.
F8 Key Extend the current selection.
SHIFT and F8 Key Shrink the current selection.
F9 Key Update the selected fields.
SHIFT and F9 Key Switch between a field code and it's result.
F10 Key Activate the menu bar.
SHIFT and F10 Key Display a Shortcut Menu. Same as right clicking.
F11 Key Go to the next field.
SHIFT and F11 Key Go to the previous field.
F12 Key Save file As, equivalent to tools menu.
SHIFT and F12 Key Save document, equivalent to tools menu

How to move start button



 Operating System = Windows 95 Only
Annoyance level = Medium
Damage Level = 0/5

The Objective
The objective is to move the Start button around on the task bar, or to remove it completely from the taskbar.

The Steps
Click twice on the Start button so it has the dotted line around it.
Then press the "Alt" and the "-" keys simultaneously.
This will bring up the option box that allows you to move or close the Start button. If you choose move, you will have to use the arrow keys to move it around the taskbar.

NOTE: Moving it doesn't stay if you move the entire start bar with your mouse, and ending task on explorer.exe or rebooting will put it back in the corner.

How to make a new web site


how to make a new web site
http://www.make-a-web-site.com/
http://www.pagetutor.com/pagetutor/makapage/index.html
www.webmonkey.com


Colour Palletes
http://colormatch.dk


HTMLlock <---Need


http://www.devside.net
http://www.devside.net/download/crypto/disclaimer1.html


well, if you want text seperate from image, you could just do this:




<table width="100%" height="100%" border="0" cellpadding="0" cellspacing="0">
<td><td>


your text here, it's totally fun, yeah yeah yeah


</td><td>


<img src="your picture here">


</td></tr>
</table>






if you want to have the image on the left side, and text on the right side, just reverse the code like so:




<table width="100%" height="100%" border="0" cellpadding="0" cellspacing="0">
<td valign="bottom" align="left">


<img src="your picture here">


</td>


<td><td>


your text here, it's totally fun, yeah yeah yeah


</td></tr>
</table>

Fire Wall

The best firewall is a hardware firewall that is completely separate from your operating system. It need not be a dedicated router, could be an old pentium box running Linux. Below I have found some sites that have How To's on setting up an outside hardware router using an old computer and using a little linux program that fits on a single floppy disk.
Brief Description:
floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.
Features:
Access lists, IP-masquerading (Network Address Translation), connection tracked packet filtering and (quite) advanced routing. Package for traffic shaping is also available.
Requires only a 386sx or better with two network interface cards, a 1.44MB floppy drive and 12MByte of RAM ( for less than 12M and no FPU, use the 1.0 series, which will stay maintained. )
Very simple packaging system. Is used for editors, PPP, VPN, traffic shaping and whatever comes up. (now this is looking even more like LRP (may it rest in peace) but floppyfw is not a fork.)
Logging through klogd/syslogd, both local and remote.
Serial support for console over serial port.
DHCP server and DNS cache for internal networks.
floppyfw

h#tp://www.zelow.no/floppyfw/


Sentry Firewall CD-ROM is a Linux-based bootable CDROM suitable for use as an inexpensive and easy to maintain firewall, server, or IDS(Intrusion Detection System) Node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk, a local hard drive, and/or a network via HTTP(S), FTP, SFTP, or SCP.
The Sentry Firewall CD is a complete Linux system that runs off of an initial ramdisk, much like a floppy-based system, and a CD. The default kernel is a current 2.4.x series kernel with various Netfilter patches applied. An OpenWall-patched current 2.2.x kernel is also available on the CD.
Booting from the CDROM is a fairly familiar process. The BIOS execs the bootloader(Syslinux) - which then displays a bootprompt and loads the kernel and ramdisk into memory. Once the kernel is running, the ramdisk is then mounted as root(/). At this point our configuration scripts are run(written in perl) that configure the rest of the system. It is the job of these configure scripts to put the various startup and system files into the proper location using either what is declared in the configuration file(sentry.conf) or the system defaults located in the /etc/default directory.
Most of the critical files used at boot time can be replaced with your own copy when declared in the configuration file. This is essentially how we allow the user to configure the system using his/her own configuration and init files.
All of the binaries, files, scripts, etc, used to create the CD-ROM are also available on the CD-ROM. So, with a little practice, you can easily build and customize your own bootable Sentry Firewall CD. Please see the HOWTO for more details.

Sentry Firewall

ht*p://www.sentryfirewall.com/docs.html#overview

How to hack password protected sites


There are many ways to defeat java-script protected web
sites. S ome are very simplistic, such as hitting ctl-alt-del
when the password box is displayed, to simply turning off
java capability, which will dump you into t he default page.
You can try manually searching for other directories, by
typing the directory name into the url address box of your
browser, ie: you w ant access to www.target.com . Try typing
www.target.com/images .(almost ever y web site has an images
directory) This will put you into the images directo ry,
and give you a text list of all the images located there.
Often, the t itle of an image will give you a clue to the
name of another directory. ie: in www.target.com/images,
there is a .gif named gamestitle.gif . There is a g ood
chance then, that there is a 'games' directory on the site,
so you wou ld then type in www.target.com/games, and if it is
a valid directory, you aga in get a text listing of all thefiles available there.
For a more automated a pproach, use a program like WEB SNAKE
from anawave, or Web Wacker. These pro grams will create a
mirror image of an entire web site, showing all director ies,
or even mirror a complete server. They are indispensable for
locating hidden files and directories.
What do you do if you can't get past an openin g "Password
Required" box? First do an WHOIS Lookup for the site. In our
example, www.target.com . We find it's hosted by www.host.com
at 100.100.100. 1. We then go to 100.100.100.1, and then launch \
Web Snake, and mirror the e ntire server. Set Web Snake to NOT
download anything over about 20K. (not ma ny HTML pages are
bigger than this) This speeds things up some, and keeps yo u
from getting a lot of files and images you don't care about.
This can take a long time, so consider running it right before bed time.
Once you have an image of the entire server, you look through
the directories listed, and find /target. When we open that
directory, we find its contents, and all of i ts sub-directories listed.
Let's say we find /target/games/zip/zipindex.html . This would be the index
page that would be displayed had you gone through the
password procedure, and allowed it to redirect you here.
By simply typ ing in the url
www.target.com/games/zip/zipindex.html you will be on
the index page and ready to follow the links for downloading.

How to crack windows


ebug: Learn how to crack windows, programs ect manually




Debug is a program that comes with modern versions of DOS (I do not know when I started shipping out with DOS). Anyway, all Windows users should have it already.

It's a great tool for debuging programs, unassembling and cracking, and reading "hidden" memory areas like the boot sector, and much more.

The following was copied from an assembly tutorial who's author we cannot credit, because we have no idea who he is.

Get into DOS and type "debug", you will get a prompt like this:
-

now type "?", you should get the following response:
assemble A [address]
compare C range address
dump D [range]
enter E address [list]
fill F range list
go G [=address] [addresses]
hex H value1 value2
input I port
load L [address] [drive] [firstsector] [number]
move M range address
name N [pathname] [arglist]
output O port byte
proceed P [=address] [number]
quit Q
register R [register]
search S range list
trace T [=address] [value]
unassemble U [range]
write W [address] [drive] [firstsector] [number]
allocate expanded memory XA [#pages]
deallocate expanded memory XD [handle]
map expanded memory pages XM [Lpage] [Ppage] [handle]
display expanded memory status XS

Lets go through each of these commands:
Assemble:

-a
107A:0100

At this point you can start assembling some programs, just like using a assembler. However the debug assembler is very limited as you will probably notice. Lets try to enter a simple program:

-a
107A:0100 MOV AH,02
107A:0102 MOV DL,41
107A:0104 INT 21
107A:0106 INT 20
-g
A

Program terminated normally

That's the same program we did at the end of the previous chapter. Notice how you run the program you just entered with "g", and also notice how the set-up part is not there? That's because debug is just too limited to support that.
Another thing you can do with assemble is specify the address at which you want to start, by default this is 0100 since that's where all .COM files start.
Compare:

Compare takes 2 block of memory and displays them side by side, byte for byte. Lets do an example. Quite out of debug if you haven't already using "q". Now type "debug c:\command.com"

-c 0100 l 8 0200
10A3:0100 7A 06 10A3:0200

This command compared offset 0100 with 0200 for a length of 8 bytes. Debug responded with the location that was DIFFERENT. If 2 locations were the same, debug would just omit them, if all are the same debug would simply return to the prompt without any response.
Dump:

Dump will dump a specified memory segment. To test it, code that assembly program again:

C:\>debug
-a
107A:0100 MOV AH,02
107A:0102 MOV DL,41
107A:0104 INT 21
107A:0106 INT 20
-d 0100 l 8
107A:0100 B4 02 B2 41 CD 21 CD 20
...A.!.

The "B4 02 B2 41 CD 21 CD 20" is the program you just made in machine language.

B4 02 = MOV AH,02
B2 41 = MOV DL,41
CD 21 = INT 21
CD 20 = INT 20

The "...A.!." part is your program in ASCII. The "." represent non-printable characters. Notice the A in there.
Enter:

This is one of the hard commands. With it you can enter/change certain memory areas. Lets change our program so that it prints a B instead of an A.
-e 0103 <-- edit program at segment 0103
107A:0103 41.42 <-- change 41 to 42
-g
B

Program terminated normally
-
Wasn't that amazing?
Fill:

This command is fairly useless, but who knows....
It fills the specified amount of memory with the specified data. Lets for example clear out all memory from segment 0100 to 0108, which happens to be our program.
-f 0100 l 8 0 <-- file offset 0100 for a length of 8 bytes with 0
-d 0100 l 8 <-- verify that it worked
107A:0100 00 00 00 00 00 00 00 00 .......
Yep, it worked.
Go:

So far we used go (g) to start the program we just created. But Go can be used for much more. For example, lets say we want to execute a program at 107B:0100:
-r CS <-- set the CS register to point to 107B
CS 107A
:107B
-g =100

You can also set breakpoints.
-a <-- enter our original program so we have something
107A:0100 MOV AH,02 to work with
107A:0102 MOV DL,41
107A:0104 INT 21
107A:0106 INT 20
-g 102 <-- set up a break point at 107A:0102

At this point the program will stop, display all registers and the current instruction.
Hex:

This can be very useful. It subtracts and adds two hexadecimal values:
-h 2 1
0003 0001 <-- 2h + 1+ = 3h and 2h - 1h = 1h

This is very useful for calculating a programs length, as you will see later.
Input:

This is one of the more advanced commands, and I decided not to talk about it too much for now. It will read a byte of data from any of your computers I/O ports (keyboard, mouse, printer, etc).

-i 3FD
60
-

Your data may be different.
In case you want to know, 3FD is Com port 1, also known as First Asynchronous Adapter.
Load:

This command has 2 formats. It can be used to load the filename specified with the name command (n), or it can load a specific sector.

-n c:\command.com
-l

This will load command.com into debug. When a valid program is loaded all registers will be set up and ready to execute the program.
The other method is a bit more complicated, but potential also more usefull. The syntax is

L <address> <drive letter/> <sector> <amount to load>
-l 100 2 10 20

This will load starting at offset 0100 from drive C (0 = A, 1 = B, 2 = C, etc), sector 10h for 20h sectors. This can be useful for recovering files you deleted.
Move:

Move takes a byte from the starting address and moves it to the destination address. This is very good to temporary move data into a free area, than manipulate it without having to worry about affecting the original program. It is especially useful if used in conjunction with the r command to which I will get later. Lets try an example:
-a <-- enter our original program so we have something
107A:0100 MOV AH,02 to work with
107A:0102 MOV DL,41
107A:0104 INT 21
107A:0106 INT 20
-m 107A:0100 L 8 107B:0100 <-- more 8 bytes starting from 107A:0100 into 107B:0100
-e 107B:0103 <-- edit 107B:0103
107B:0103 41.42 <-- and change it 42 (
-d 107A:0100 L 8 <-- make sure it worked
107A:0100 B4 02 B2 41 CD 21 CD 20 ...A.!.
-d 107B:0100 L 8
107A:0100 B4 02 B2 42 CD 21 CD 20 ...B.!.
-m 107B:0100 L 8 107A:0100 <-- restore the original program since we like the changes.
Name:

This will set debug up with a filename to use for I/O commands. You have to include the file extension, and you may use addition commands:

-n c:\command.com
Output:

Exactly what you think it is. Output sends stuff to an I/O port. If you have an external modem with those cool lights on it, you can test this out. Find out what port your modem is on and use the corresponding hex number below:

Com 1 = 3F8 - 3FF (3DF for mine)
Com 2 = 2F8 - 2FF
Com 3 = ??? - ??? (if someone knows, please let me know)

Now turn on the DTA (Data Terminal Ready) bit by sending 01h to it:
-o XXX 1 <-- XXX is the com port in hex

As soon as you hit enter, take a look at your modem, you should see a light light up. You can have even more fun with the output command. Say someone put one of those BIOS passwords on "your" computer. Usually you'd have to take out the battery to get rid of it, but not anymore:

MI/AWARD BIOS
-o 70 17
-o 71 17

QPHOENIX BIOS
-o 70 FF
-o 71 17

QGENERIC
-o 70 2E
-o 71 FF

These commands will clear the BIOS memory, thus disabling the password.
Proceed:

Proceeds in the execution of a program, usually used together withy Trace, which I will cover later. Like the go command, you can specify an address from which to start

using =address
-p 2

Debug will respond with the registers and the current command to be executed.
Quite:

This has got to be the most advanced feature of debug, it exits debug!

-q
Register:

This command can be used to display the current value of all registers, or to manually set them. This is very useful for writing files as you will see later on.

-r AX
AX: 011B
:5
-
Search:

Another very useful command. It is used to find the occurrence of a specific byte, or series of bytes in a segment. The data to search for can by either characters, or a hex value. Hex values are entered with a space or comma in between them, and characters are enclosed with quotes (single or double). You can also search for hex and characters with the same string:
-n c:\command.com <-- load command.com so we have some data to search in
-l
-s 0 l 0 "MS-DOS" <-- search entire memory block for "MS-DOS"
10A3:39E9 <-- found the string in 10A3:39E9

NOTE: the search is case sensitive!
Trace:

This is a truly great feature of debug. It will trace through a program one instruction at a time, displaying the instruction and registers after each. Like the go command you can specify where to start executing from, and for how long.
-a <-- yes, this thing again
107A:0100 MOV AH,02
107A:0102 MOV DL,41
107A:0104 INT 21
107A:0106 INT 20
-t =0100 8

If you leave out the amount of instructions that you want to trace, you can use the proceed (p) to continue the execution as long as you want.
Unassemble:

Unassembles a block of code. Great for debugging (and cracking)
-u 100 L 8 <-- unassembles 8 bytes starting at offset 100
107A:0100 MOV AH,02 <-- debut's response
107A:0102 MOV DL,41
107A:0104 INT 21
107A:0106 INT 20
Write:

This command works very similar to Load. It also has 2 ways it can operate: using name, and by specifying an exact location. Refer to back to Load for more information.

NOTE: The register CX must be set the file size in order to write!
NOTE: Write will not write .EXE or .HEX files.[SIZE=7][SIZE=14]

Ebay Hack

Just found this on the net, so I gave it a try.
Lo and behold, it actually works.
Very handy if you are an Ebayer.
Enjoy
When you look at an item and click on bid history all the bid amount are replaced with "-" until the end of the auction.
To view these amounts before the auction ends when viewing the item change

http://cgi.ebay.co.uk/ws/eBayISAPI.dll

in the address bar to

http://cgi.ebay.com/ws/eBayISAPI.dll

And then click on the bid history. The bid amounts will be shown.

How to Delete An undeletable File


Delete An "undeletable" File

Open a Command Prompt window and leave it open.
Close all open programs.
Click Start, Run and enter TASKMGR.EXE
Go to the Processes tab and End Process on Explorer.exe.
Leave Task Manager open.
Go back to the Command Prompt window and change to the directory the AVI (or other undeletable file) is located in.
At the command prompt type DEL <filename> where <filename> is the file you wish to delete.
Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell.
Close Task Manager.


Or you can try this

Open Notepad.exe

Click File>Save As..>

locate the folder where ur undeletable file is

Choose 'All files' from the file type box

click once on the file u wanna delete so its name appears in the 'filename' box

put a " at the start and end of the filename
(the filename should have the extension of the undeletable file so it will overwrite it)

click save,

It should ask u to overwrite the existing file, choose yes and u can delete it as normal


Here's a manual way of doing it. I'll take this off once you put into your first post zain.

1. Start
2. Run
3. Type: command
4. To move into a directory type: cd c:\*** (The stars stand for your folder)
5. If you cannot access the folder because it has spaces for example Program Files or Kazaa Lite folder you have to do the following. instead of typing in the full folder name only take the first 6 letters then put a ~ and then 1 without spaces. Example: cd c:\progra~1\kazaal~1
6. Once your in the folder the non-deletable file it in type in dir - a list will come up with everything inside.
7. Now to delete the file type in del ***.bmp, txt, jpg, avi, etc... And if the file name has spaces you would use the special 1st 6 letters followed by a ~ and a 1 rule. Example: if your file name was bad file.bmp you would type once in the specific folder thorugh command, del badfil~1.bmp and your file should be gone. Make sure to type in the correct extension.

How to Convert Firefox into keylogger


Do you want create your own working undectable keylogger and without any programming knowledge.The keylogger can store all the usernames and passwords of mozilla firefox without the user’s consent.

How this Keylogger Works?

Whenever you login into any website using mozilla firefox browser it always ask’s you whether you want to Save password or not for that website.

Tips for Protection Against Keyloggers

Tips for Protection Against Keyloggers


http://3.bp.blogspot.com/-D9EaTMJsARU/TumvH_LfBII/AAAAAAAAAkY/nKazW0ywTEo/s200/keylogger.png
Keyloggers also known as key Stroke recorders are the softwares that can record the key strokes.These are Used in phishing websites to steal your username and password.These keylogger can also be installed on a computer and they can send usernames and passwords using your Internet connection.You can protect yourself using special tips and tricks.And if you follow the guidelines we are providing your username and password will be safe even if a keylogger has been already installed on your system.Here are the tips and tricks to protect yourself from the keyloggers 


1.Enable Your Firewall:-
Firewalls donot stop the keyloggers from entering into your PC But hey can help in stopping the keyloggers from sending your information.It is always recommended that you install a good firewall software to protect your computer from unauthorized access.By default Microsoft windows firewall is enabled.

2.Use Good Antivirus Software And Avoid Downloading cracked Softwares:-
Use good antivirus softwares like Norton,mcafee or use the free ones like Avg,Avast,Avira.They certainly provide a lot of protection against keylogger.Using a special Antispyware program also helps.And avoid downloading softwares which have been cracked.Also avoid using torrents as much as you can because torrents is the hub of viruses and home of hackers.
Now Will Discuss How to Fool Keyloggers

If you believe that their is a keylogger in your system then you can do the following things to protect yourself

1.Instead of typing your username and password using your keyboard type it using On Screen Keyboard.On Windows Platform it can be opened By typing osk in run.

2.Type 2-3  random characters in your password field and then select it using your mouse,Now type your real password.This will add the random characters in front of the password recorded by keylogger and the keylogger is fooled by you for sending wrong password.

3.Keylogger runs in the background.Always check out for suspicious processes using task manger and end them.
This tips and tricks will help you out in protecting yourself from these harmful spywares

 

How To Increase Download Speed In Torrent


The use of Bit Torrent is an efficient way to transfer files of just about any size quickly and efficiently. How this works is by breaking the huge files into smaller pieces and is from one or many of the different sources. This is one of the best ways to transfer bulky files quickly even when you are using a low bandwidth connection. There are many more things that you can do with Bit Torrent, but here we are going to discuss how to make this work much faster. 

Here are some essential tips for the same,

  1. Start with your ISP:
All ISP has a preset maximum upload and download speed, and you cannot make your torrent work beyond this speed. All you can do is to use the best use of this upload and download speed even when the signal is weak. You can check the maximum speed that you can achieve by conducting a broadband speed test and compare with the DSLReports that comes with your uTorrent.
  1. Opt-In for healthy seeds and peers:
A peer is any computer participating           in downloading and uploading of torrent files along with that of yours. A seeder is one who has a complete copy of the file that is being shared across a torrent network. A leecher is the person who has joined the network recently and do not have most of the file that you or the peer has. This leecher becomes the seeder when they download the entire file and is able to share it across the network.  For getting high torrent speed, you need to increase the number of seeders to increase the chance of healthier and reception of higher speeds.
  1. Get through the firewall:
Many times, you will find the administrator or the firewall in your web browser is set to block and receive torrent files. The first thing that you need to do is to get appropriate permissions for downloading torrent files, and add this to your firewall, which will enhance the speed at which you can download torrent files. If the internet is through a router, then you have to set the torrent file to cross the barrier of the security of the router also.
  1. Go to a different port:
The default port for BitTorrent protocol is always between the numbers 6881-6999. This is because BitTorrent sharing will involve high bandwidth usage. However, this is possible that you can configure a different port for your torrent client and this has been best advised to set this number to somewhere around 10000.
  1. Limit your upload rate:
A peer to peer network is sharing alike on the same or similar platform and therefore you should be able to set your client’s upload speed rate to a maximum amount, which will usually be about 80 percent of your maximum upload speed that is being offered by your ISP. Keep this speed, as high as possible, but you have to play your cards well as the upload speed affects your download speed as well.
  1. Use your common sense:
If you understand the concept of how Bit Torrent works, then your common sense will automatically tell you that this is possible to view the individual files being downloaded and disable the ones that you are not in need off, which will  help you to speed up the process of downloading the files using Bit Torrent.
  1. Bandwidth and connections:
This is possible to set the maximum number of connections, maximum number of peers connected per torrent and number of slots per torrent so that you can decide on which numbers gives the maximum efficiency from your Bit Torrent files.
Now is that you have some tips on how to increase the speed of downloading while using Bit Torrent, why not try these tips out next time! Comments are appreciated!!