Funny computer tricks

Copy and paste the java script code in the following red lines to the address bar of your browser

javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)


Press enter and watch your window's "shaking it". You can change the value of i if you wish :-)

Welcome to our Mozilla Firefox section.

The Firefox browser is becoming more and more popular.

Firefox is based on Mozilla technology, the latest release Mozilla Firefox 3.5 has all the features you would expect from a first class browser.

Some of the features include tabbed browsing, privacy control, excellent compatibility and very fast browsing.

Each tip includes a guide for the different versions of Firefox (if needed), including versions 1, 2, 3 and 3.5.

A Faster Start Menu

I see no reason for there to be any delay when I click on the Start Menu. Effects are pretty, but I wouldn’t click on it if I didn’t have business inside, so lets get it open and get moving. The default speed can be adjusted with a quick registry entry.

The default value is 400. Set it to 0 and the delay is gone, but it will be nearly impossible to move the mouse fast enough not to activate [All Programs] if you mouse over it in route to your final selection. It's easy to train yourself to move the pointer to the right after clicking Start to avoid activating All Programs. Pick a number that suits your style and make the change, then test it until you find a good compromise between speed and usability.

[Start] [Run] [Regedit]
Registry Key: HKEY_CURRENT_USER\Control Panel\Desktop
Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.
Data Type: String Value // Value Name: MenuShowDelay
Setting for Value Data: [Default = 400 / Adjust to Preference]
Exit Registry and Reboot

Make A Simple LAN Computer Network

When my friend at home has more than one computer, and each computer to connect to one so I could lainnnya sharing data, printers, Internet connection sharing, etc., we could do with a computer network LAN (Local Area Network) simple ..

If the posts are then used ad hoc wireless connections, in post, this time we use a cable connection that is using a data cable UTP (unshielded twisted pair), which is standard cable to the LAN network connection.
Computers are used at present are already equipped with LAN Card or also known as NIC (Network Interface Controller), or Ethernet Card

Disable Right Click In Windows XP

Right-click menu in windows mouse to the systems many properties, and a fast pace compared to the control panel or start menu.
If you want to nonaktifkannya any reason, for example to a friend utak not easily manipulate or modify computer settings, desktop display, etc., or you may want to idle quietly lock the computer right click your friend's ..
how:

klik RUN --> ketik Regedit-->klik OK">• Go to the Registry editor (must be logged in as administrator) click start -> Click RUN -> type Regedit -> click OK
• Go to HKEY_CURRENT_USER \ Software \
Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer
New --> DWORD value --> beri nama NoViewContextMenu">• In the blank area right: right click -> New -> DWORD value -> give name NoViewContextMenu

Simple Tips To Avoiding Viruses From Computer

I do not have long to write about computing tips on home computers since kesamber lightning (tragic yes). This time I will try to share simple tips avoid computer virus infection that I always use and proven to be quite pretty powerful. These tips are general and very easy to apply for the layman who wants to penguna computer "clean of the virus". Many of my fellow colleagues who ask this question, so that encouraged me to make this little paper. Before I was reminded once again "Have you done Update Antivirus that you use", any AntiVirus that you use frequently been used in the Update, because the virus is always growing all the time.

Simply right without a lot of strings attached, whether simple tips that I use to prevent computer virus infection. Computer viruses can basically see the obvious through features - features that look through the file name, iconnya, type and extensionnya through Windows Explorer. Get used to view files on your Explorer windows with view details. Way, right-click anywhere inside the Explorer window and select "view" - details "



It's as well you are displaying the "file extension" of his, the way he was in Folder Options. Example for Windows XP is to select the menu "Tools" - "Folder Options", then klil tab "view" and remove the check mark on "Hide Extensions for known file types", then click OK.

Next consider any of the files you have. According to my experience that the file is virus file usually has several features, including the following.

1. Disguise themselves with Icon.

* The virus of this type can be seen to have icons that are very familiar, for example using the icon Word, Exel, Pictures, Videos and more. By using the View details we will see irregularities. That the problem usually is not sesuainya between image icon and the "File Type" example: icon icon file is the file type word but read "Application", and usually extensinya. EXE. If you see this kind of thing should never your file execution. Or better just delete. Because these files can be a virus that will spread in your computer.

2. Files that are not in place.

* This time you should really consider expansions of the files that you suspect the file as a virus. This kind of virus is usually disguised as a file which is seen as an important file such as, "backup.dll" Setup.exe "" service.js "and more. (The expansions used in the virus is traveling. Exe. Vbs. Js. Etc. .. scr. bat. inf) What I mean is misplaced files which I mean is on the folder you think are inappropriate or even you feel is never made, or to copy the file. If you find such files should be you alert, but do not delete the original, because it could be these files are important and relate to one of your installed software.

* In this case you should study it carefully and use the file type based on file extensinya (I'll explain about this file type in the next post)

Well maybe for a while that first tip I can give, in fact there are many other tips which I will write later. If no additional entries or corrections or I have received with pleasure

New Computer Buying Tips

Having a computer has become imperative now. Besides for working, attendance computer at home can support various activities, like making a child's birthday invitations, play a song in the living room to the other entertainment such as playing games. Objectives and needs are clearly identified, but there is one thing propping before deciding to buy a computer. What kind of computer should I buy and what things should I know before buying computer accessories? These questions hopefully answered by this paper.


The first tips you should consider when buying a computer and computer accessories is do not buy Celeron class processor that costs much cheaper, unless you are very sensitive to the difference in price. Better you buy a newer generation processors such as Pentium 4 hyper-threading (ht), pentium d, dual core or core 2 duo

The second tips, buying a computer hard drive sata ii manifold. The reason, this type of hard drive read speed is much faster writes (300mb/detik theoretical) and the price is even cheaper than pata hard drive type (old-fashioned hard disk).

Third tips, do not buy the 80 gb hard drive size. It's more wise if we buy a 160 gb hard drive size just because the price difference between a thin, about 50,000 rp - rp 80,000. See the online computer accessories and computer accessories stores.

Tips fourth, buy computer memory which is DDR2. Therefore, make sure the motherboard that we buy have supported memory this type. Besides its ability have is better, old version memory like ddr sdram price and even more expensive (computer store).


Tips fifth, do not be lazy to ask. Ask the store computer accessories extent of their services if the computer trouble, long warranty, write down the address and phone number cheap computer accessories store them. It's good, we bought a cheap computer accessories directly to the shop and computer accessories stores

Facts - Change location of My Documents

I guess many of you don't know about this fact that the storage location of "My Documents" can be changed. Its bit safer , when PC crashes.Normally windows saves the "My Documents" folder on your C-drive. But when you right-click on it and go to properties, you can change the location where you want windows to save your Documents folder.


I have a partition set up with just windows on it, and all my things i want to keep are on different partitions/disks. So now I put My Documents on another partition than where I have windows installed


If windows screws up and you have to format your C-drive again, your documents will be spared at least...

Save time and effort in typing URL addresses

There is a quicker way to have auto-completion of the whole website address in internet explorer,like "www" or ".com" With Internet Explorer 6 in Windows XP, typing web addresses is very convenient. All you have to do is type the domain of an address, such as 'google' and then press [Ctrl]+ENTER . Internet Explorer automatically wraps ' http://www...........com' around what you typed.In case you are not sure whether the site uses a .com extension or some other one ? Just type the domain of the address and hit ENTER. Internet Explorer tries to find the site by using various extensions that are used by websites. If you need to edit an address, you can use [Ctrl]+LEFT ARROW and [Ctrl]+RIGHT ARROW to easily move between different parts of the address separated by periods.

Display icons on the desktop without labels

Unfortunately, Windows does not allow deleting the label directly. The operating system rejects empty strings or labels consisting space characters by displaying the message ' Enter a file name' . However, the following trick will help you.1. Right-click on the desired icon and select the context command 'Rename' or simply press [F2].2. Keep the key [Alt] pressed and enter the number combination '0160' on the numeric pad of the keyboard.3. Let go of the [Alt] key and confirm it by pressing [Enter]. The label now disappears.
Tags: , , , , , , , , , , , , , ,

Disable Right Click on your blog or webpage

Its becoming essential to secure the content of your web page and blog from being copied. To achieve this you have to disable the RIGHT CLICK . Many of my friends are trying various scripts to disable right click. Even I tried one. But the problem is that it was running fine in Internet Explorer and not in Firefox or other browsers. So I found the simplest way to disable right click. A bit higher security is achieved.Lets see..... how..( sign in to your blogger --> layout -->edit html)Find this piece of code in your template.< / head>its the end of the head tag < / head > and the beginning of body tag .In the body tag just write this sentence " oncontextmenu='return false;' "u will see it like this

< / head >< oncontextmenu="'return">and your are done... THATS IT...save n check your blog...

Drag & Drop in Firefox

There are many things that you can drag and drop in Firefox.* Drag the favicon of any site to your home icon to set it as the home page.* Drag a hyperlink (or image) to the new tab icon to open the link in a new tab.* Drag a download link (or image file) to the download icon to instantly download the file.* Drag a highlighted word to the search bar (beside the address bar) will bring you to the Google search result page for that word. If you drag the highlighted word to the address bar (and press enter), Firefox will perform a Google “I’m Feeling Lucky” search

Gmail offline...

Not to long ago someone brought to my attention that Gmail was offering to be able to have your gmail account offline. What this means is that you can look at all your e-mail that had been synched even if you are not connected to the net, sorry to say you cannot send e-mails or save them at this time that I can tell. I have come up with a parser for your gmail offline account. It only does the basics right now but we will look to add more in the future. Some of the sample reports are:1. Contact information2. Email conversations with hyperlink to email3. Word Xref to email That last one has 2 flavors depending on the option you pick when you run the parser. In the gui if you choose not to create the e-mail xref report then you will only get a report with all distinct words in the emails. If you choose to create the e-mail xref report then it will create the report with distinct words and those words will be hyperlinked to a report that will show each e-mail that the word appears in. This may take a while depending on how big the mailbox is, but it is pretty cool.The program can be found here.As always Questions/Comments/Suggestions

Sans "WhatWorks in Forensics and Incident Response Summit" in July

The agenda is out and it looks to be a fantastic lineup of expert briefings and panels. The summit will be in Washington DC July 7 and 8, 2009. I was lucky enough to be chosen to be on the "Essential Forensic Tools" panel. With me on the panel are some of the big names in the Forensic/IR community, they are:Jesse Kornblum who has made significant contributions with the free tools (MD5Deep, SSDeep, and Miss Identify and others) he has provided as well as the excellent papers he has written ("Using Every Part of the Buffalo in Windows Memory Analysis" and "Implementing BitLocker Drive Encryption for Forensic Analysis" as well as others), Jesse also has a blog that can be found here.Troy Larson who is the Senior Forensic Investigator with Microsoft’s IT Security Group. Troy has presented my times at different conferences (Recovering Information from Deleted Security Event Logs, Vista Shadow Volume Forensic, etc.. and is a coauthor of the Handbook of Computer Crime Investigation: Forensic Tools and Technology. and finallyLance Mueller of the blog Computer Forensics, Malware Analysis and Digital Investigations. Lance has provide many enScripts on his blog to be used by all. I do not use Encase but I have learned many things by looking at the enScripts that Lance has developed, they have provided me insights into many areas of computer forensics.I look forward to joining this panel of experts who have distinguished themselves in the field of Computer Forensics and Incident Response as well as meeting quite a few people who I have had the privilege of trading ideas and email's with.As always Thoughts/Comments/Questions.........

Update Skype Log Parser..........

I know this whole blog has gotten pretty stale as there have not been any posts in a loooong time. Well I am going to try and remedy that with some good posts in the coming weeks.
Well the skype log parser, which is my most downloaded tool, has gone through a few updates since I last posted at the end of last year/beginning of this year. The current version is 1.7. A few of the notable changes are (for full list see change_log.txt):
1. Ability to search for the log files from the gui.2. Skype 4.x is now supported.3. The ability to merge 2 cases into 1 report to compare the reports.4. Ability to cancel the program at anytime.5. Ability to parse the iTunes iPhone/iPod Touch backup files and get the skype log files if skype is installed.6. If record in UserXXXXX.dbb file was truncated would throw program into infinite loop and this has been fixed.
The new program can be found http://redwolfcomputerforensics.com/downloads/skype-log-installer-1.7.exe here. I have also created a new email account that I would like to use for support and also to send out email's to users when I update the program. If you would like to receive updates about the skype log parser send an email to skype-parser at redwolfcomputerforensics dot com. Comments are encouraged good or bad and requests for enhancements.
As always Thoughts/Comments/Questions.........

Decoding the DateCreated and DateLastConnected SSID values From Vista/Win 7

Tips/Tricks and Information I or someone else provides that will help further the knowledge the field of Computer Foresnics and Electronic Discovery.
Decoding the DateCreated and DateLastConnected SSID values From Vista/Win 7
This information was provided to me by Longshot (Just passing this great information along).
Decoding the DateCreated and DateLastConnected registry values from the registry keys
SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles\{GUID}
In Vista and Windows 7
The DateCreated and DateLastConnected are binary values that can be broken up into 4 byte parts, with 1 part left over. Each 4 byte part corresponds to a value of a date. The order of the values are as follows:
YearMonthWeekdayDayHourMinutesSeconds
Each of these 4 byte parts is in little endian. Using the following data that was unpacked from binary and converted to hex we get the following translation:
d9070200020018001700140025000001
d907 0200 0200 1800 1700 1400 2500 0001
Year = h4 = d907 = 07d9 = 2009
Month = h4 = 0200 = 0002 = Month {Jan = 1, Feb = 2, etc....}
Weekday = h4 = 0200 = 0020 = Weekday {Sunday = 0, Monday = 1, etc...}
date = h4 = 1800 = 0018 = 24
hour = h4 = 1700 = 0017 = 23
minutes = h4 = 1400 = 0014 = 20
Seconds = h4 = 2500 = 0025 = 37
The Month and Weekday fields have to be converted to their proper Month and weekday name.
which would yield the following:
Date First Connected: Tuesday, 24 February 2009 23:20:37

Here is the perl code to do the above, I only include the $data as a place holder that would need to get data fed to it:
use strict;
# This is the binary data that would be read from the registry filemy $data = "";
my %month_type = (1 => "January",2 => "February",3 => "March",4 => "April",5 => "May",6 => "June",7 => "July",8 => "August",9 => "September",10 => "October",11 => "November",12 => "December");
my %dayofweek_type = (0 => "Sunday",1 => "Monday",2 => "Tuesday",3 => "Wednesday",4 => "Thursday",5 => "Friday",6 => "Saturday");
my ($year, $month, $weekday, $date, $hour, $minute, $second ) = unpack("h4 h4 h4 h4 h4 h4 h4", $data);
#This part converts the yearmy $finalyear= hex(reverse $year);
#Now we convert the monthmy $monthnumber=hex(reverse $month);my $finalmonth = $month_type{$monthnumber};
#Now we convert the weekdaymy $weekdaynumber=hex(reverse $weekday);my $finalweekday = $dayofweek_type{$weekdaynumber};
# This converts the datemy $finaldate=hex(reverse $date);
#This converts the hourmy $finalhour=hex(reverse $hour);
#This converts the minutemy $finalminute=hex(reverse $minute);my $howlongisfinalminute=length($finalminute);if ($howlongisfinalminute == 1){$finalminute="0$finalminute";}if ($finalminute eq "0"){$finalminute='00';}
#This converts the secondmy $finalsecond=hex(reverse $second);my $howlongisfinalsecond=length($finalsecond);if ($howlongisfinalsecond == 1){my $finalsecond="0$finalsecond";}if ($finalsecond eq "0"){$finalsecond='00';}
my $ssidtimestamp= "$finalweekday, $finaldate $finalmonth $finalyear $finalhour:$finalminute:$finalsecond";if ($n =~ /Created/){$finaln="Date First Connected:";} else {$finaln="Date Last Connected:";}
print "$finaln $ssidtimestamp\n";