computerwork.com
Look up any phone number, look up an ip address and get private voicemail.
phonevalidator.com
privatephone.com
ip-address.com
Online identity theft isn't going to stop...
Protect yourself. This is a great link to protecting your name and what to do if something happens http://creditinfocenter.com/
Missing the System.INI file?
Go here and follow the directions if you are missing the system ini file in your registry
http://support.microsoft.com/kb/q132008/
Get FREE SSL for your website...
Has anyone tried this yet? http://www.cacert.org/ - Free SSL for your website.
Look up website and jack their keywords!
http://samspade.org/ - Whois website look up, crawl websites, decode a url, parse headers, get their keywords, parse e-mail headers, and more! Don't forget that e-mails are read from the bottom to the top.
How do I take care of my CD's and/or DVD's?
The information on a CD or DVD is placed on the top. Yes, it is read from the bottom but, if you mark on it with a pen, you will be literally scratching data off of it. The bottom is an acrylic protective layer but please don't confuse them. If you must write on the media, please use a non emulsive marker.
Find What You Are Looking For -- Faster.
Tired of putting in a key word in your search engine (google, msn, overture, etc.) and getting over a million websites as a result? Try these simple steps to help narrow down your search.
"Put the exact phrase you are searching for in quotes"
What you are looking for -what you are not.
Example: Search {banana -apple} will find all the banana word but not include apple in the search.
Adding +the +plus +sign +will + require +the +search +to +include +it.
Example: Search {banana + apple} will find web pages with the word banana and apple within the text.
The wild card * after a word and you will get a variation of a word.
Example: Search {app*} this will find words like apple, applies, applied, etc.
You can also combine symbols in a search. Just tell the search engine what you are looking for.
Major Adware You Should Avoid
ZWinky is advertising hard on myspace but what they won't tell you is that you are agreeing to all of their adware slowing your computer dramatically. Yes, they are cute. Yes I have one on my space but removed it from my computer when my virus scanner caught it. I don't even want to go near this program again. Just not worth it.
Save These Links To Your Favorites
http://ntsecurity.nu/toolbox/
http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/freetools.htm
http://www.dmares.com/maresware/freesoftware.htm
http://www.forensics-intl.com/le.html
http://www.ccleaner.com/ You'll find a lot of cool free computer forensic tools! Enjoy.
Use The Internet Safely
Never connect a computer to a network cable (the internet) without a firewall device or software.
Make sure your operating system is up to date or automatic updates are installed when needed.
The Internet Concept - individual computers connected by electrical and networking cables to be able to communicate with each other.
You will need and ISP (internet service provider) who allow you to connect your Ethernet card to your phone line or network cable and modem and connect to the world wide web.
Some will charge anywhere from 0.00 to over 50.00. So why doesn't everyone use the free internet? Duh, the service is crappy. Using your phone line usually gives you a slower net surfing ability than if you were using a cable modem like broadband/DSL.
On the top of the browser there is a tool bar that consists of different buttons that will allow you to go back, forward (navigating between pages you have already searched), stop (a page that is downloading or taking to long), refresh (will renew the page you are looking at incase any changes have been made or a page gets stuck), home (will take you to what ever page you marked as your favorite or start page), search (allows you to search for terms on the internet), favorites (will allow you to bookmark pages so you won't forget them), media (displays a list of your audio and video options), history (shows a list of websites you visited), mail (if connected to outlook will allow you to open/read mail), print, edit (opens a file in notepad and allows viewing and editing), and messenger (opens windows messenger). Please not that Macintosh may be a little different but the same concept.
Understanding the address bar. URL + Domain Name Server (DNS)
What is the URL (uniform resource locator)?
http:// - hyper text transfer protocol - not encrypted, no security.
https:// - hyper text transfer protocol secure - SSL (secure socket layer) pages are secure.
ftp:// - file transfer protocol - ability to transfer files.
telnet:// - remote process communication protocol
DNS is the www.addressoftheplaceyouwanttogo.com or .net, or .org, or .cc, or .name, or .us, etc.
This is how e-mail is broken down.
Protecting your self from viruses:
Do not allow html e-mail. Text mail only. Some html e-mail have embedded spyware/malware.
Get an antivirus before you even connect to the internet, you are sure to get bombarded with spyware the moment you connect. Yes, it is that out of control.
Never open pictures with their file extensions ending in:
.exe
.dat
.cil
.bat
.com
.reg
You may be downloading something that will be very difficult to get rid of.
While using the internet, you may be tempted to purchase something. The best practice for entering any of your personal data into any computer is to look for the SSL lock on the bottom right corner of your screen. This means they have a security feature that will give you added privacy. No lock, no sale!
As we must have mentioned in the latest scams page, please do not follow a link in an e-mail that make look like a legitimate company you have dealt with, that will lead you to another site that looks exactly the same. They will mirror a website to look like a major bank, or company and prompt you for your user name and password. One of the software we mention in the members page will allow you to decode this information that would other wise look like junk. For example: if you think it's www.ebay.com and they claim to be eBay, but when you click on the link, the URL looks something like www.fjskld/20%40%xx/7o.htm . Don't fall for it! Notify the company immediately and let them do the work to track them down.
What is software?
Software - this is the logical aspect of the computer that is written in our language and programmed to do what we tell it to.
Sometimes installing new software on your computer can be as easy as putting a cd/diskette in or downloading software and following the prompts. Sometimes it's not. Software is programs that you install to view or use applications.
How Criminals Get Caught
Criminals get caught because they get tracked down by their IP address.
They constantly brag about what they are doing and how much they are making.
They commit criminal acts for others and when the other party gets caught they name the criminal.
Criminals get caught by committing other criminal acts and exposing the rest.
Fingerprints/footprints on paper or other objects on the site.
They turn themselves in.
There are witnesses to their crimes.
They slip up when being interrogated and get caught in a lie.
Building A Computer
What you will need:
1. Choose what is most important to you and build around it. Make sure everything is compatible before you purchase it.
2. Power supply cord
3. Motherboard
4. Processor
5. Cpu cooler
6. Memory module
7. Hard drives and cables (SATA power adapters)
8. Optical drive (CD Rom/Floppy Disk Drive/Tape Drive) w/ data cables and optional audio cables.
9. Card reader and cables optional
10. Chasis Case make sure there is enough room for upgrading
11. Video adapter
12. Display monitor and its cables
13. Audio adapter (optional)
14. Speakers (optional)
15. Keyboard
16. Mouse
17. Network adapter (ethernet card)
18. Modems
19. UPS (power back up supply optional)
Creating the mainstream PC in 50 easy steps:
1. Prepare the case by selecting proper voltage
2. Remove the shipping screws
3. Carefully remove the side panel you may have to press a latch
4. Remove the factory I/O template
5. Snap the custom I/O template into place
6. Install standoffs in each mounting position
7. Verify there are no extra standoffs
8. Remove the plastic posts to release the standard brackets
9. Four mounting holes should be visible
10. Grab the base plate for the fan unit
11. Working from the bottom of the motherboard press into position
12. Drop retaining bracket into place over posts into position
13. Screw bracket and plate into place
14. Lift the socket lever to prepare the socket for the processor
15. Drop the processor into place without forcing it
16. Hold it down with your finger and lock it into place
17. Polish it with a paper towel before you install the fan
18. Apply thermal compound that is provided with the fan
19. Align the fan over the processor and seat it
20. Clamp the fan into place
21. Connect CPU fan cable into the CPU fan connector
22. Unlock the locking tabs of the DIMM memory socket outward
23. Align the first DIMM with the socket and press until it snaps into place (same with the second)
24. Slide the motherboard into place
25. Verify that the back panel connectors fit cleanly
26. Screw the motherboard into place
27. Connect the front panel switch and indicator cables
28. Connect the front panel USB cables
29. Connect the front panel firewire cables
30. Connect the front panel audio parts (optional)
31. Remove internal hard drive bay
32. Screw the drive into the bay and slide it into place until it snaps (depending on what kind)
33. Connect the serial ATA cables from the the hard drive to the motherboard after verifying jumper settings
34. Insert your video adapter and seat it securely
35. Install the mounting rails on the optical drive and verify its jumper settings
36. Connect the serial ATA cables to the optical drive and the motherboard
37. Connect power cables to all drives
38. Connect the main ATX power connector and the ATX12V power connector
39. Connect the supplemental case fan
40. Connect the front panel LED's
41. Dress the cables (move them away from the motherboard)
42. Leave the cover off and check the rocker switch in the back and run a smoke test (turn it on)
43. Check that all the fans work
44. Hard drive should spin and beep once
45. Turn it off and remove the power cord
46. Set the BIOS configuration jumper to configure located on the left front of the motherboard
47. Connect all external cables, monitor, keyboard, mouse, etc.
48. System will configure itself. On BIOS screen, clear all data and reset the clock, save and exit
49. When the system shuts down, disconnect the power cord move the BIOS set up configure jumper to normal
50. Replace side panel and reconnect the power.
Congratulations! You are now ready to install your operating system.
When it comes to upgrading your computer, please check with your manufacture to see their recommendations. If you have practiced with a junk computer to see what's inside and take it apart, I would recommend doing it yourself. If you are still intimidated, let someone else do it.
What is a bit, byte, kilobyte, megabyte, gigabyte, terabyte?
1 bit- it takes 8 bits to create a single character such as the number 2 the letter B, etc.
8 bits = 1 byte (smallest form of computer information)
1024 bytes = 1 kilobyte KB
1,024,000 bytes = 1 megabyte MB
1,073,741,824 bytes = 1 gigabyte GB
1,099,511,627,776 bytes = 1 terabyte TB
1,125,899,906,842,624 bytes = 1 petabyte PB
1,152,921,504,606,846,976 bytes = 1 exabyte EB
How does a hard drive work?
The hard drive has one or more platters that look like disks and can spin up to 10,000 rotations per minute. An arm with heads are able to read, write or wipe the drive. The heads are the small needles that are capable of writing in binary on the platters. The platters have tracks that are similar to the ones on a vinyl record. Identical tracks on either side of one platter are called cylinders. The tracks are organized into sectors. All information is written to the top of the platter sector by sector. A sector is 512 bytes in size. Sector numbering starts at 1.
Cylinder X Heads X Sectors X 512 = The capacity of the drive. (How ever many gigabytes it is)
The size of the drive is always less than the actual size drive. It is rounded down.
What is binary?
This is computer language. Each character you see on this screen has a binary number code that tells the computer to translate it into the character you see. Each character consist of 8 bits. Each of the 8 bit numbers can be either a 1 or a 0. This is the smallest fragment of the logistics of computer language. For example:
What you see "D"
What the computer sees "01000100"
http://asciitable.com has the table of how this works and what other character codes are.
How to get to the device manager
If you have a MY COMPUTER icon on your desktop, right click on it with your mouse and go to properties. You may have to go to the hardware tab to be able to find the device manager. The device manager will show you all your hardware. You can also install hardware through this device. Normally if a device is not recognized, it will have a yellow question mark and label it as unknown.
The difference between an logical and physical drive
The physical drive is the actual hard ware that you can touch. The logical drive is the a partition on the physical drive that allows you to save your media in readable form.
The difference between an logical and physical drive
The physical drive is the actual hard ware that you can touch. The logical drive is the a partition on the physical drive that allows you to save your media in readable form.
Flooding TCP/IP Packets
Download Synister - Synister is a command-line DoS, utility that operates by flooding a host with spoofed tcp/ip packets. Synister is written only in C using the libnet packet injection library. It is entirely self-sufficient meaning it requires no other scripts or programs to run. Note: for more information on SYNflooding, read Barfbag's article at: www.theblankpages.com in the texts section.