Sign up for PayPal and start accepting credit card payments instantly.
Showing posts with label os. Show all posts
Showing posts with label os. Show all posts

Tuesday

Mac OS X Booting

Here , I am just pointing about how to boot MAC OS .

Little Talk about FIRMWARE , The firmware is not pare of MAC OS X, but it plays an important role in the operation of the machine.

 

Open Firmware :

Open firmware is a non proprietary, Platform (CPU and System) independent boot firmware, similar to a PC’s BIOS, Open Firmware is stored in ROM and is the first stored program to be executed upon power UP. Apple and SUN are two prominent computer system makers that use implementations of open firmware in their systems.

The Firmware is implemented in forth programming language, and stored in the ROM as Code byte code,Device drivers that are required during system Startup are also implemented similarly, such drivers usually exist in the expansion ROM of expansion cards that are needed before the operating system has loaded.

 

() Open firmware by pressing the key combination (cmd-opt-0-F)  just as you on a Macintosh.

  The cmd keys is the one with the apple logo .

   The opd key is the same as the alt key.

     You can see a welcome message and other messages and dropped into a prompt message like

 

ok

0 >

 

you can continue booting the machine by typing (mac-boot) or shut it down by typing (shut-down).

 

 

If you want to access a MAC’s open firmware from another arbitrary computer,over the network, here is the command.

 

0 >  dev/packages/telnet

 

More details

 

Boot Loader

 

BootX(/system/library/coreservices/Bootx) is the default bootloader on MAC OS X.

 

BootX can load kernels from various filesystem : HFS+,HFS,UFS,ext2, and TFTP

 

 

More Boot loader Information you Can see the Source  page

Thursday

How to install Telnet in windows 7?

How to Install Telnet in Windows 7
By default, Telnet is not installed with windows , you can install with following steps

telnet_4


  • Go to Control Panel and Then Click Programs.
  • Under Programs and Features, Click Turn Windows Features On or Off, If you are prompted for an administrator password or confirmation, type the password or proved confirmation.
  • In the Windows Features Dialog Box , Select The Telnet Client Check Box.
  • Click OK, the installation might take several Minutes.
if you are using windows server 2008 R2 , you should use server manager to install telnet.
What is Cloud(Computing) ?

Tuesday

Window 7 revealed The hidden Truth

How To use hidden International Wallpaper and themes

 

  • In the search box Or RUN , type   C:\windows\Globalization\MCT and press Enter (if your windows is installed in  C Drive else D,E,F whatever).
  • Will show you a list of subfolder like MCT-AU,MCT-CA, MCT-GB etc Each folder has wallpaper for a specific Country.
  • For any of the countries whose wallpaper and themes you want to use , then go into its theme folder  and click on
  • That will install shortcut to the theme and wallpaper in the personalization section of control panel.

 

Power Efficiency Report in Windows7

How to improve Battery life in laptop

  • Run a command prompt as an administrator . To do this Type CMD in the search box and when cmd icon appears, right click it and choose “ run as administrator “.
  • Command line Type “ powercfg –energy –output \folder\energy_report.html

Where folder = you want the report to be placed.

after a minute windows 7 will examine the behavior of your laptop. and you will get a report .

 

follow its recommendations for ways to improve power performance.

Monday

What is Windows Error Reporting ?

Windows Error Reporting (WER) is a crash reporting technology introduced by Microsoft with windows XP.
Windows error reporting collects and offers to send post error debug information, using the internet, to the developer of an application that crashes or stops reporting on a user’s desktop. No data is sent without user confirmation.

When a error signature  information reaches the Microsoft server ,its is analyzed ant a solution is sent back to the user when one is available.

If windows error reporting itshelf crashes, then an error reports that the original crashed process cannot be sent.

windows error reporing



You can view some of Error code (Click) System Error Code

Sunday

Linux ?

So, Linux is Operating system , Simple just like Dos,windows OS X   and Etc.
Operating system is what makes the hardware work together with the software.

Linux gives you a graphical interface that makes it easy to use your computer, It is only the Kernel that is named LINUX,The rest of the OS are GNU tools. some Variants Distribution  Mandrake,SUSE Linux,Gentoo and Redhat .

Linux is made with one thought in mind Everything is a File.
A file is an element of data storage in a file system .File usually stored in hard drives,CD-ROMs and other media. but may also be stored in RAM or links to devices.

linux logo
Organizing Our files into a system we use Folders. The lowest Possible folder is Root/ where you will find the user homes called /home/
let
/
/home/
/home/nj/
home/pj/
home/dj/


etc.

Files system Lowest folder root/ contains the following folders.

/bin          Essential user command binaries (for use by all users)

/boot       Static files of the boot loader,only used at system startup.

/dev         Device files,links to your hardware \nj\sound\,       /nj/input/js0(joystic).

/etc          Host specific system configuration.

/home    user home directories.Your personal files.

/lib         Essentail shared libraries and kernel modules.

/mnt     mount point for a temporarily mounted file system like      /mnt/cdrom

/opt       add on software pakages

The only folder a normal user need to use is /home/nj/  ……. this is where you keeping all your files/documents.

like

/home/nj/Documents
/home/nj/Music
/home/nj/Music/Michal Jackson

Files are case sensitive ,   if  “myMusic” and   “Mymusic” are two different files


More soon , Thank you for visit .

Thursday

What is Android Operating System ?

Android Application
What is android ?

Hello , so many people are using a Android Os Phone, but tell me about WHAT IS ANDROID ? The ANS is

It's cool Phone, Cool Application, Great Phone but what is Android ? here it is ..


1. Android Operating system is a multi user Linux system in which each applicaion
   is a different user.

2. Each process has its own virutal machine(VM) , so an application code runs in isolation from
   Other applicaion.

3.Android Graphics are powered by a custom 2D graphics library and OpenGL Es 1.0 for high performance 3D graphics.
  The most common 2D graphics APIs can be found in drwable package.


In this way, the Android system implements the principle of least privilege. That is, each application, by default, has access only to the components that it requires to do its work and no more. This creates a very secure environment in which an application cannot access parts of the system for which it is not given permission.

HTC Inspire 4G Android Phone (AT&T)HTC EVO 4G Android Phone (Sprint)T-Mobile G2 with Google Android Phone (T-Mobile)
More  Android 
Systemctc Hacking Basic Guide
How to Crack Admin PasswordSearch Amazon.com for android sony

Sony Ericsson XPERIA X10 Mini Pro (U20i) Unlocked GSM Android Smartphone with 5MP Camera, Bluetooth, Wi-Fi, Touch Screen, QWERTY Keyboard--International Version with No US Warranty (Black)Sony Ericsson Xperia PLAY Android Phone (Verizon Wireless) 


Simple Guide to the Best Android Apps
A Simpler Guide to the best free Android Apps: 100+ apps to inform, entertain and organise

Tuesday

Use Of Netstat


Use Of Netstat
  (To OPEN Netstat) - To open [Netstat] you must do the following: Click on the


Net stat
  [Start] button-->Then click [Programs]--> Then look for [Ms-Dos Prompt].

Netstat is a very helpful tool that has many uses. I personally use Netstat

to get IP addresses from other users I'm talking with on ICQ or AIM.  Also

you can use Netstat go moniter your port activity for attackers sending syn

requests (part of the TCP/IP 3 way handshake) or just to see what ports are

listening/Established. Look at the example below for the average layout of

a response to typing Netstat at the

Net Stat Commnd
C:\windows\ prompt.



C:\WINDOWS>netstat



Active Connections



  Proto  Local Address          Foreign Address        State

  TCP    pavilion:25872         WARLOCK:1045           ESTABLISHED

  TCP    pavilion:25872         sy-as-09-112.free.net.au:3925  ESTABLISHED

  TCP    pavilion:31580         WARLOCK:1046           ESTABLISHED

  TCP    pavilion:2980          205.188.2.9:5190       ESTABLISHED

  TCP    pavilion:3039          24.66.10.101.on.wave.home.com:1031  ESTABLISHED



Now look above at the example. You will see [Proto] on the top left. This just

tells you if the protocol is TCP/UDP etc. Next to the right you will see

[Local Address] this just tells you the local IP/Host name:Port open.  Then to the

right once again you will see [Foreign Address] this will give you the persons

IP/Host name and port in the format of IP:Port with ":" in between the port and IP.

And at last you will see [State] Which simply states the STATE of the connection.

This can be Established if it is connected or waiting connect if its listening.

Now with this knowledge we will dive into deeper on how to use this for monitering

and port activity and detecting open ports in use.



Detecting Open ports


Now so you are noticing something funny is going on with your computer? Your cd-rom

tray is going crazy...Opening and closing when your doing nothing. And you say What the

phruck is going on..or you realize someones been messing with a Trojan on your computer.

So now your goal is to locate what trojan it is so you can remove it right? Well your right.

So you goto your ms-dos prompt. Now there are many ways to use Netstat and below is a help

menu. Look through it.



C:\WINDOWS>netstat ?



Displays protocol statistics and current TCP/IP network connections.



NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]



  -a            Displays all connections and listening ports.

  -e            Displays Ethernet statistics. This may be combined with the -s

                option.

  -n            Displays addresses and port numbers in numerical form.

  -p proto      Shows connections for the protocol specified by proto; proto

                may be TCP or UDP.  If used with the -s option to display

                per-protocol statistics, proto may be TCP, UDP, or IP.

  -r            Displays the routing table.

  -s            Displays per-protocol statistics.  By default, statistics are

                shown for TCP, UDP and IP; the -p option may be used to specify

                a subset of the default.

  interval      Redisplays selected statistics, pausing interval seconds

                between each display.  Press CTRL+C to stop redisplaying

                statistics.  If omitted, netstat will print the current

                configuration information once.



I personally like using (C:\Windows\Netstat -an) Which Displays all connections and

listening ports in the form of IP instead of Hostname.  As you see how i did the command

Netstat(space)-a(Displays all connections and listening ports.)n(in numerical form)

Netstat -an  -So doing that does TWO of the options at once no need for -a-n.  So

now that you know how to use netstat to view all your connections and listening you

can search for common ports like 12345(old Netbus Trojan),1243(subseven) etc.  This

Becomes very handy for everything you will soon find out. Take a break now and go chill

out on your couch and relax for about 5 minutes and let all this soak in then come back

ready to learn more. :)




SYN and ACK
When you here Syn and Ack(ACKnowledge) you do not think of the communication of packets on

your system. Well let me tell you what SYN and ACK do.

    [SYN] - SYN in common words is a request for a connection used in the 3-way handshake

in TCP/IP. Once you send a SYN out for a connection, the target computer will reply with a SYN and ACK. So basically when you see in [State] catagory Syn that means you are sending

out a request to connect to something.

    [ACK] - Now the ACK is a ACKnowledgement to the request made by a computer that is

trying to connect to you. Once a Syn is sent to you you need to ACK it, then Send back another syn to the computer requesting connection to confirm the packet sent was correct.

I sure hope that helped you understand a little more about SYN and ACK. If you have further

questions try looking for texts on TCP/IP (such as BSRF's TCP/IP text - blacksun.box.sk/tcpip.txt). Now onto the fun stuff.




Using Netstat it for ICQ and AIM


Have you ever wanted to get someones IP address or hostname using [Aol Instant Messanger]

or [ICQ]? Well your in Luck.

    [AIM] - With AIM you can not ussually find the exact IP address without some trial and error because most of the time it seems to open up all online users on Port

5190. So Less users online easier it is. So goto Ms-Dos Prompt and type netstat -n here you will see under [Foreign Addresses] a IP:With port 5190. Now one of those IP's connected

to you with 5190 is going to be your target aim user. Just use trial and error to find out

is ussually the easiest way.

    [ICQ] - To get a IP using netstat of a ICQ user is easy before talking to the person on ICQ you must open ms-dos prompt and do netstat -n to list all IP's and ports.Write them

down or copy them somewhere you will remember to look back. Now it's time to find out his

IP. Message the user witha  single message now quickly do Nestat -n. And you will have a new added line of a IP address, just search for the new one on the list under foreign and once you find it you now have your buddys ip without any patches or hacks. Pure skill :P.

Wednesday

Gaming on Laptop / netbook

ou may have thought that gaming on slower notebooks and netbooks would be difficult, but this isn’t the case. You won’t be playing Mafia 2, but older games that are still considered some of the best ever made – like Chrono Trigger – are easily playable. I may update this thread with pictures for some of these emulators, but this will get you started.

You need

Minimum system requirements:

CPU: Intel Atom 1.6GHz +
RAM: 1GB +
GPU: Onboard +
HDD: 5GB +
OS: XP 

Recommended system settings

CPU: 3GHz Dual core +
RAM: 2GB +
GPU: AMD 4200 / 5500 series w/ 512MB VRAM +
HDD: As much as you can spare
OS: 7 (either x86-64 or x64)


The key to gaming on these systems are emulators. They are available for most systems and playback fine on the minimum specs, with some detail settings turned down. The recommended specs should be able to push every setting to high, and enable HQ filters. If you have a 16:9 monitor you will see black mattes on some of these emulators.

So, these are some of your choices:

1)Dosbox – this will run a lot of classic DOS games. I installed Wolf 3D off a CD that I still had from the 90’s and it plays perfectly, with mattes on the left and right. You can also play older RTS’s etc.

2)ZSNES – this is a SNES emulator that you can use to play some classics such as Chrono Trigger or Secret of Mana

3)Nestopia – this is an NES emulator. Great for playing through the original Final Fantasy.

4)Visual Boy Advance – for old GBA games.

5)EPSXE – this is a PSX emulator that works for most PSX games, some need patches you can find online. You can rip your PSX games to HDD and play them via Imgburn

6)Pre 2004 games such as Black and White and Max Payne can be played on older laptops .

7)Other systems, MAME etc.

I tried these out on a laptop with a P9700/2.8GHz Core 2 with 6GB RAM and a 4500MHD/9300M GS chip. On a netbook with a standard Atom, you need to turn down some of the PSX settings to maintain a smooth frame rate.

For any system, you absolutely need the latest GPU driver and the latest DirectX. For EPSXE you might need to add it as a DEP exception if you have DEP enabled for all programs. Everything can be found online.

These games will swallow hours of a time, so take heed . . . .

 EPSXE
Virtual Boy Advance (VBA-M)
Nestopia  

ZSNES

DosBox: DosBoX

Monday

Hidden MS-DOS Commands

Collection of undocumented and obscure features in various MS-DOS versions.

Contents:

- TRUENAME
- FDISK /STATUS
- FDISK /MBR
- SHELL=C:\COMMAND.COM /P /F
- COMMAND /F
- COMMAND /P
- COMMAND /D
- VER /R
- ECHO OFF and ECHO ON
- FORMAT /AUTOTEST
- FORMAT /BACKUP
- FORMAT /SELECT
- FORMAT /SELECT /U
- FORMAT /H
- IF EXIST <dirname>\NUL <command> and IF EXIST EMMXXXX0 <command>
- Using ATTRIB to hide directories
- SWITCHES=/W
- FOR %%V IN (/SOMETHING)
- DIR,
- COPY. A:
- DOS?=HIGH
- INSTALLHIGH
- Using : for batch file comments
- REM in lines with pipes or redirection
- Delimiter character

===========================================================================
 TRUENAME
 --------

Internal DOS 5.0 command.  Canonicalize a filename or path (using DOS interrupt 21h, function 60) prints the actual directory.

     Syntax:

     TRUENAME filename   - Prints the complete path to file.
     TRUENAME directory  - Prints the complete path to directory.

Note:  If the path is in a network, it starts with a \\machine-name.

TRUENAME is analogous to the UNIX "whence" command.  It returns the real fully-qualified path name for a command.

TRUENAME is useful in networks, where a physical drive may be mapped to a logical volume, and the user needs to know the physical location of the file.  It ignores the DOS SUBST and JOIN commands, or network MAPped drives.

TRUENAME is an undocumented MS-DOS feature, but it is documented in JP Software's 4DOS software (COMMAND.COM replacement) as follows:

     Syntax:

     TRUENAME [d:][path]filename

     Purpose:

     Returns a fully qualified filename.

     Comments:

     TRUENAME will see "through" JOIN and SUBST commands, and
     requires MS-DOS 3.0 or above.

     Example:

     The following command uses TRUENAME to get the true pathname
     for a file:

     c:\>subst d: c:\util\test
     c:\>truename d:\test.exe

     c:\util\test\test.exe

TRUENAME : will reveal the full name drive and path of the filename.  If you specify a wildcard (*) in the filename, it will expand the filename to use question marks instead.  If the path includes the ..\ sequence, TRUENAME will examine the directory structure and calculate the path.

Stranger still, the line:

     TRUENAME \CRONK\FLIBBET\..\ART

...produces the response:

     C:\CRONK\ART

...even if the directories \CRONK\FLIBBET and the file ART don't exist!  Don't expect this command to work well across networks.  After all, this is still undocumented in MS-DOS for a reason!

===========================================================================
 FDISK /STATUS
 -------------

Prints a screen just like using option 4 of FDISK, "Partition information", but includes extended partition information.  Nice if you want to get an overview without fear of pressing the wrong keys.

Doesn't work in DOS 3.30.

===========================================================================
 FDISK /MBR
 ----------

MS-DOS 5.0 FDISK has an undocumented parameter, /MBR, that causes it to write the master boot record to the hard disk without altering the partition table information.  While this feature is not documented, it can be told to customers on a need-to-know basis.

Warning:  Writing the master boot record to the hard disk in this manner can make certain hard disks partitioned with SpeedStor unusable.  It can also cause problems for some dual-boot programs, or for disks with more than 4 partitions.  Specific information is below.

What is the MBR?

At the end of the ROM BIOS bootstrap routine, the BIOS will read and execute the first physical sector of the first floppy or hard drive on the system. This first sector of the hard disk is called the master boot record, or sometimes the partition table or master boot block. At the beginning of this sector of the hard disk is a small program. At the end of this sector is where the partition information, or partition table, is stored. This program uses the partition information to determine which partition is bootable (usually the first primary DOS partition) and attempts to boot from it.
DOS for Dummies
This program is what is written to the disk by FDISK /MBR and is usually called the master boot record.  During normal operation, FDISK only writes this program to the disk if there is no master boot record.

Why is the MBR changed during Setup?

During installation of Microsoft MS-DOS 5 Upgrade, Setup will replace the master boot record on the hard disk with code to display the message:
Justamente Tres
        The MS-DOS 5.0 Setup was not completed.
        Insert the UNINSTALL #1 diskette in drive A.
        Press the ENTER key to continue.

This message should be erased and the master boot code rewritten before Setup is completed. If a problem occurs during Setup and you return to the previous MS-DOS, UNINSTAL should also remove this message. However, should Setup or UNINSTAL fail to remove this message, or should the master boot record become corrupted, a new master boot record can be written to the disk using the following command:

         C:\>fdisk /mbr

     WARNINGS:

     This option should not be used if:

        - the disk was partitioned using Storage Dimensions'
          SpeedStor utility with its /Bootall option
        - more than 4 partitions exist
        - certain dual-boot programs are in use

Storage Dimensions' SpeedStor utility using the /Bootall option redefines the drive's physical parameters (cylinder, head, sector).  /BOOTALL stores information on how the drive has been changed in an area of the master boot record that MS-DOS does not use. FDISK /MBR will erase that information, making the disk unusable.

Some older OEM versions of MS-DOS and some third-party partitioning utilities can create more than 4 partitions.  Additional partition information is commonly stored information on partitions in an area that FDISK /MBR will overwrite.

Some dual-boot programs have a special MBR that asks the user which operating system they want on bootup.  FDISK /MBR erases this program.  Dual-boot systems that boot whichever partition is marked Active are not affected by FDISK /MBR.

If you have a Boot Sector Virus, just boot from a known "clean" floppy disk that's write protected and which has FDISK on it, and run FDISK /MBR.

===========================================================================
 SHELL=C:\COMMAND.COM /P /F
 --------------------------

The /F in the CONFIG.SYS SHELL= statement forces a "Fail" response to all "Abort, Retry, Fail" prompts issued by the DOS critical error handler.

===========================================================================
 COMMAND /F
 ----------

Entered on the command line, COMMAND /F makes all those annoying "Abort, Retry, Ignore, Fail" disk error messages default to "Fail" from then on until rebooting.

===========================================================================
 COMMAND /P
 ----------

For DOS 3.30 (not checked with other versions):  Docs say that this doesn't allow you to exit back to the previous shell, but /P also forces AUTOEXEC.BAT to be run on secondary shells.

===========================================================================
 COMMAND /D
 ----------

When used with a primary shell, or secondary with /P, prevents execution of AUTOEXEC.BAT.

===========================================================================
 VER /R
 ------

Yields extended information about the DOS version:

     MS-DOS Version 5.00
     Revision A
     DOS is in HMA

Doesn't work with DOS 3.30.  VER /R is a documented feature of JP Software's 4DOS.

===========================================================================
 ECHO OFF and ECHO ON
 --------------------

Entering ECHO OFF from the command line erases the prompt and leaves just a cursor on the screen.  ECHO ON from the command line restores the prompt.  This works with all version of DOS.

One of the most frequently asked questions is "How do I ECHO a blank line in a batch file?"  The most common answer is to use ECHO directly followed by a period:  ECHO. like so.  However, just about any "white space" character will work, as well as any "delimiter".  The following alternatives can be used:  ECHO.  ECHO"  ECHO,  ECHO:  ECHO;  ECHO[  ECHO]  etc.  Apparently it's just the way that the command handles the delimiter and has been available from way back!  Microsoft just began mentioning it in the documentation recently, though, and their examples use a period.

===========================================================================
 FORMAT /AUTOTEST
 ----------------

The autotest parameter will allow FORMAT to proceed, checking the existing format of the disk (unless the /U parameter with DOS 5 or 6 is also present), and proceeding with the format.

All this will take place with no delay and no waiting for user input.  It will also end without pausing.  It will not ask for a volume label or whether to format another diskette.

WARNING!  This procedure will also work on hard drives!  Be very cautious if you plan to use this feature!

===========================================================================
 FORMAT /BACKUP
 --------------

This works exactly like /AUTOTEST, but it does ask for a volume label.

===========================================================================
 FORMAT /SELECT
 --------------

This is like the DOS MIRROR command... For safety-fanatics only.

===========================================================================
 FORMAT /SELECT /U
 -----------------

Just makes a disk unreadable.  Guess it could be handy?

===========================================================================
 FORMAT /H
 ---------

In DOS 3.30 (not tested with other versions), FORMAT /H will cause the format to begin immediately after pressing Y in response to "Format another", rather than displaying "Place disk to be formatted in drive x: and press Enter" on a second and subsequent disks.

In DOS 5.0, FORMAT reports "invalid switch".

===========================================================================
 IF EXIST <dirname>\NUL <command> and IF EXIST EMMXXXX0 <command>
 ----------------------------------------------------------------

This is a handy quirk of DOS.  Installable drivers are seen as files in all directories.  You can use the if exist test to either test for the existence of a directory, with "if exist <dirname>\nul", which fails if the directory does not exist because the nul device is not found; or to test whether any driver is loaded, such as the DOS 5 or 6 EMM386 memory manager.

Caveats:  For testing NUL, you need to know the name of the directory or the driver whose existence you are testing, and this is MS-DOS specific -- it doesn't work on network drives, and may not work under DR-DOS.

Where did you learn the "EMMXXXX0" name from?  Instead of typing MEM /C, type MEM /D for the "debug" listing.

The only trouble is EXISTS returns true for COM3/4 and LPT2/3 even if the hardware does not exist.

===========================================================================
 Using ATTRIB to hide directories
 --------------------------------

The DOS 5.0 and 6.0 ATTRIB command can do the same thing for directories as it can for files:  ATTRIB +H <dirname>  will hide the named directory.

===========================================================================
 SWITCHES=/W
 -----------

Enables you to have the Windows 3.0 WINA20.386 file anywhere on your boot drive.  Without this you have to have it in the root directory.

This should not be used with Windows 3.1, since it appears to waste around 120K of UMBs.

===========================================================================
 FOR %%V IN (/SOMETHING)
 -----------------------

How can a batch file (without 4DOS) determine from which drive it has been started?

      Example:  C:\>a:test.bat

Now my batch should be able to find out that it is located on drive A: (not the path, only the drive!).

In a batch file, the variable %0 contains the name of the batch file as it was typed at the command line.  If you run the batch file as A:TEST.BAT, %0 will be "A:TEST.BAT".  If you have the directory on your path, and simply type TEST, then %0 will be "TEST".  The drive, path, and extension will only appear in %0 if you enter them in the command used to call the batch file (either typed at the command line, or called from another batch file).  So, you must specify the drive as part of the batch filename for this to work.

To extract the drive only from %0, use the undocumented FOR %%V in /SOMETHING command:

     set drive=
     for %%v in (/%0) do call test2 %%v
     echo Calling drive is %drive%

...where TEST2.BAT is:

     if not '%drive%'=='' set drive=%1:

FOR %%V IN (/SOMETHING) DO WHATEVER will do WHATEVER twice -- the first time with %%V set to the first character in SOMETHING ("S"), the second time with all the remaining characters in SOMETHING ("OMETHING").  If SOMETHING is only a single character, WHATEVER will only be called once, with that character in %%V.  If the single character is a wildcard (? or *) that wild card will not be expanded to a set of filenames.  (The main purpose of this feature is apparently to allow inclusion of the literal characters "?" and "*" without them being expanded.)

This works in DOS 3.30 and later.

===========================================================================
 DIR,
 ----

Using a comma immediately after DIR shows ALL files, including the HIDDEN ones.

This appears only to work with DOS 5.0 and 6.0.  With 3.30, it doesn't display either IO.SYS, MSDOS.SYS (both with S, H and R attribs) or a test file with A and H attribs.

With DOS 5.0, it displayed a test file with H and A, but would not display IO.SYS or MSDOS.SYS with S, H and R.  This isn't surprising actually, since S alone (without H) will prevent inclusion of a file in a normal DIR.

Not tested with DOS 4.x.  Not supported by JP Software's 4DOS.

===========================================================================
 COPY. A:
 --------

The use of a period IMMEDIATELY after some DOS statements will work just like *.*

     Examples:  DEL.      (erase all files in current directory)
                COPY. A:  (copy all files in current directory to A:)

There may be more statements with which it works.

This is actually a documented although obscure feature, though the ability to use the period with COPY is not documented.  What is documented is the fact that "." and ".." can be used to represent the current and parent directories respectively, and these will work with many applications which can handle directory names as arguments.  In this case the "." could also be viewed as a replacement for "*.*"

===========================================================================
 DOS?=HIGH
 ---------

DOS?=HIGH in CONFIG.SYS with DOS 6.0 will prompt you whether to load the DOS kernel high (into the HMA) or not.

===========================================================================
 INSTALLHIGH
 -----------
Forgot Your File Where You Store
In DOS 6.0, there is an undocumented CONFIG.SYS command called INSTALLHIGH= which works just like INSTALL= but loads the TSR high (into upper memory).

The only drawback to this is that MemMaker will not touch INSTALLHIGH lines during the optimizing process.  It just takes it as it is currently.  But then again, INSTALL= is ignored too.  All in all, INSTALL and INSTALLHIGH really are commands to set up manually by the user, and are not really recommended for normal use.  Load TSRs at the beginning of AUTOEXEC.BAT (and using LOADHIGH if desired).

       Example:

       DOS=HIGH,UMB
       DEVICE=C:\DOS\HIMEM.SYS
       DEVICE=C:\DOS\EMM386.EXE NOEMS
       INSTALLHIGH=C:\DOS\SHARE.EXE

===========================================================================
 Using : for batch file comments
 -------------------------------

DOS uses a leading : to indicate a label in a batch file.  If the next character following the : is a space or other non-alphanumeric character, then DOS will decide it's an invalid label and skip to the next line, performing no further action.  Faster batch file processing is achieved using this method for comments instead of REM commands.

===========================================================================
 REM in lines with pipes or redirection
 --------------------------------------

For example:  REM echo y | del *.*
How To Create Strong Password
Problems are encountered when trying to REM out an "echo y | del *.*" line in a batch file.  The problem appears to only occur if there is a pipe or redirection in the REMed out line, which shows that DOS first reads the entire line and processes pipes and redirections first, and then goes back to find out what to do with them in the line.  It's actually doing what it thinks you've told it:  Piping the output of REM to DEL.  Since REM has no output, DEL hangs, waiting for the answer to its question.

===========================================================================
 Delimiter character
 -------------------

Prior to DOS 5.0, there was an undocumented DOS function that would allow you to set the DOS option delimiter character to something else, like a dash (-).  Once you did this, you could use either \ or / in PATH specifications.

DOS 5.0 removed the function to set the option delimiter, but retained the function to query what it currently is.
Boot Block Recovery
Bandwidth
What is LED
Backlink For Free
 

Saturday

How Linux boots

As it turns out, there isn't much to the boot process:

   1. A boot loader finds the kernel image on the disk, loads it into memory, and starts it.
   2. The kernel initializes the devices and its drivers.
   3. The kernel mounts the root filesystem.
   4. The kernel starts a program called init.
   5. init sets the rest of the processes in motion.
   6. The last processes that init starts as part of the boot sequence allow you to log in.
Hard Drive Problem
Identifying each stage of the boot process is invaluable in fixing boot problems and understanding the system as a whole. To start, zero in on the boot loader, which is the initial screen or prompt you get after the computer does its power-on self-test, asking which operating system to run. After you make a choice, the boot loader runs the Linux kernel, handing control of the system to the kernel.


There is a detailed discussion of the kernel elsewhere in this book from which this article is excerpted. This article covers the kernel initialization stage, the stage when the kernel prints a bunch of messages about the hardware present on the system. The kernel starts init just after it displays a message proclaiming that the kernel has mounted the root filesystem:

VFS: Mounted root (ext2 filesystem) readonly.

Soon after, you will see a message about init starting, followed by system service startup messages, and finally you get a login prompt of some sort.

NOTE On Red Hat Linux, the init note is especially obvious, because it "welcomes" you to "Red Hat Linux." All messages thereafter show success or failure in brackets at the right-hand side of the screen.
Linux Desktop


Most of this chapter deals with init, because it is the part of the boot sequence where you have the most control.
init

There is nothing special about init. It is a program just like any other on the Linux system, and you'll find it in /sbin along with other system binaries. The main purpose of init is to start and stop other programs in a particular sequence. All you have to know is how this sequence works.
Window to Linux


There are a few different variations, but most Linux distributions use the System V style discussed here. Some distributions use a simpler version that resembles the BSD init, but you are unlikely to encounter this.

Runlevels

At any given time on a Linux system, a certain base set of processes is running. This state of the machine is called its runlevel, and it is denoted with a number from 0 through 6. The system spends most of its time in a single runlevel. However, when you shut the machine down, init switches to a different runlevel in order to terminate the system services in an orderly fashion and to tell the kernel to stop. Yet another runlevel is for single-user mode, discussed later.

The easiest way to get a handle on runlevels is to examine the init configuration file, /etc/inittab. Look for a line like the following:

id:5:initdefault:

This line means that the default runlevel on the system is 5. All lines in the inittab file take this form, with four fields separated by colons occurring in the following order:

# A unique identifier (a short string, such as id in the preceding example)
# The applicable runlevel number(s)
# The action that init should take (in the preceding example, the action is to set the default runlevel to 5)
# A command to execute (optional)

There is no command to execute in the preceding initdefault example because a command doesn't make sense in the context of setting the default runlevel. Look a little further down in inittab, until you see a line like this:

l5:5:wait:/etc/rc.d/rc 5

This line triggers most of the system configuration and services through the rc*.d and init.d directories. You can see that init is set to execute a command called /etc/rc.d/rc 5 when in runlevel 5. The wait action tells when and how init runs the command: run rc 5 once when entering runlevel 5, and then wait for this command to finish before doing anything else.

There are several different actions in addition to initdefault and wait, especially pertaining to power management, and the inittab(5) manual page tells you all about them. The ones that you're most likely to encounter are explained in the following sections.

respawn

The respawn action causes init to run the command that follows, and if the command finishes executing, to run it again. You're likely to see something similar to this line in your inittab file:

1:2345:respawn:/sbin/mingetty tty1

The getty programs provide login prompts. The preceding line is for the first virtual console (/dev/tty1), the one you see when you press ALT-F1 or CONTROL-ALT-F1. The respawn action brings the login prompt back after you log out.

ctrlaltdel

The ctrlaltdel action controls what the system does when you press CONTROL-ALT-DELETE on a virtual console. On most systems, this is some sort of reboot command using the shutdown command.

sysinit

The sysinit action is the very first thing that init should run when it starts up, before entering any runlevels.

How processes in runlevels start

You are now ready to learn how init starts the system services, just before it lets you log in. Recall this inittab line from earlier:

l5:5:wait:/etc/rc.d/rc 5

This small line triggers many other programs. rc stands for run commands, and you will hear people refer to the commands as scripts, programs, or services. So, where are these commands, anyway?

For runlevel 5, in this example, the commands are probably either in /etc/rc.d/rc5.d or /etc/rc5.d. Runlevel 1 uses rc1.d, runlevel 2 uses rc2.d, and so on. You might find the following items in the rc5.d directory:

S10sysklogd       S20ppp          S99gpm
S12kerneld        S25netstd_nfs   S99httpd
S15netstd_init    S30netstd_misc  S99rmnologin
S18netbase        S45pcmcia       S99sshd
S20acct           S89atd
S20logoutd        S89cron

The rc 5 command starts programs in this runlevel directory by running the following commands:

S10sysklogd start
S12kerneld start
S15netstd_init start
S18netbase start
...
S99sshd start

Notice the start argument in each command. The S in a command name means that the command should run in start mode, and the number (00 through 99) determines where in the sequence rc starts the command.

The rc*.d commands are usually shell scripts that start programs in /sbin or /usr/sbin. Normally, you can figure out what one of the commands actually does by looking at the script with less or another pager program.

You can start one of these services by hand. For example, if you want to start the httpd Web server program manually, run S99httpd start. Similarly, if you ever need to kill one of the services when the machine is on, you can run the command in the rc*.d directory with the stop argument (S99httpd stop, for instance).

Some rc*.d directories contain commands that start with K (for "kill," or stop mode). In this case, rc runs the command with the stop argument instead of start. You are most likely to encounter K commands in runlevels that shut the system down.

Adding and removing services

If you want to add, delete, or modify services in the rc*.d directories, you need to take a closer look at the files inside. A long listing reveals a structure like this:

lrwxrwxrwx . . . S10sysklogd -> ../init.d/sysklogd
lrwxrwxrwx . . . S12kerneld -> ../init.d/kerneld
lrwxrwxrwx . . . S15netstd_init -> ../init.d/netstd_init
lrwxrwxrwx . . . S18netbase -> ../init.d/netbase
...

The commands in an rc*.d directory are actually symbolic links to files in an init.d directory, usually in /etc or /etc/rc.d. Linux distributions contain these links so that they can use the same startup scripts for all runlevels. This convention is by no means a requirement, but it often makes organization a little easier.

To prevent one of the commands in the init.d directory from running in a particular runlevel, you might think of removing the symbolic link in the appropriate rc*.d directory. This does work, but if you make a mistake and ever need to put the link back in place, you might have trouble remembering the exact name of the link. Therefore, you shouldn't remove links in the rc*.d directories, but rather, add an underscore (_) to the beginning of the link name like this:
Linux Kernel Development (3rd Edition)Embedded Linux Primer: A Practical Real-World Approach (2nd Edition)
mv S99httpd _S99httpd

At boot time, rc ignores _S99httpd because it doesn't start with S or K. Furthermore, the original name is still obvious, and you have quick access to the command if you're in a pinch and need to start it by hand.

To add a service, you must create a script like the others in the init.d directory and then make a symbolic link in the correct rc*.d directory. The easiest way to write a script is to examine the scripts already in init.d, make a copy of one that you understand, and modify the copy.

When adding a service, make sure that you choose an appropriate place in the boot sequence to start the service. If the service starts too soon, it may not work, due to a dependency on some other service. For non-essential services, most systems administrators prefer numbers in the 90s, after most of the services that came with the system.

Linux distributions usually come with a command to enable and disable services in the rc*.d directories. For example, in Debian, the command is update-rc.d, and in Red Hat Linux, the command is chkconfig. Graphical user interfaces are also available. Using these programs helps keep the startup directories consistent and helps with upgrades.

HINT: One of the most common Linux installation problems is an improperly configured XFree86 server that flicks on and off, making the system unusable on console. To stop this behavior, boot into single-user mode and alter your runlevel or runlevel services. Look for something containing xdm, gdm, or kdm in your rc*.d directories, or your /etc/inittab.


Controlling init

Occasionally, you need to give init a little kick to tell it to switch runlevels, to re-read the inittab file, or just to shut down the system. Because init is always the first process on a system, its process ID is always 1.

You can control init with telinit. For example, if you want to switch to runlevel 3, use this command:

telinit 3

When switching runlevels, init tries to kill off any processes that aren't in the inittab file for the new runlevel. Therefore, you should be careful about changing runlevels.

When you need to add or remove respawning jobs or make any other change to the inittab file, you must tell init about the change and cause it to re-read the file. Some people use kill -HUP 1 to tell init to do this. This traditional method works on most versions of Unix, as long as you type it correctly. However, you can also run this telinit command:

telinit q

You can also use telinit s to switch to single-user mode.

Shutting down

init also controls how the system shuts down and reboots. The proper way to shut down a Linux machine is to use the shutdown command.

There are two basic ways to use shutdown. If you halt the system, it shuts the machine down and keeps it down. To make the machine halt immediately, use this command:

shutdown -h now

On most modern machines with reasonably recent versions of Linux, a halt cuts the power to the machine. You can also reboot the machine. For a reboot, use -r instead of -h.

The shutdown process takes several seconds. You should never reset or power off a machine during this stage.

In the preceding example, now is the time to shut down. This argument is mandatory, but there are many ways of specifying it. If you want the machine to go down sometime in the future, one way is to use +n, where n is the number of minutes shutdown should wait before doing its work. For other options, look at the shutdown(8) manual page.

To make the system reboot in 10 minutes, run this command:
Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)The Linux Programming Interface: A Linux and UNIX System Programming Handbook
shutdown -r +10

On Linux, shutdown notifies anyone logged on that the machine is going down, but it does little real work. If you specify a time other than now, shutdown creates a file called /etc/nologin. When this file is present, the system prohibits logins by anyone except the superuser.

When system shutdown time finally arrives, shutdown tells init to switch to runlevel 0 for a halt and runlevel 6 for a reboot. When init enters runlevel 0 or 6, all of the following takes place, which you can verify by looking at the scripts inside rc0.d and rc6.d:

   1. init kills every process that it can (as it would when switching to any other runlevel).

# The initial rc0.d/rc6.d commands run, locking system files into place and making other preparations for shutdown.
# The next rc0.d/rc6.d commands unmount all filesystems other than the root.
# Further rc0.d/rc6.d commands remount the root filesystem read-only.
# Still more rc0.d/rc6.d commands write all buffered data out to the filesystem with the sync program.
# The final rc0.d/rc6.d commands tell the kernel to reboot or stop with the reboot, halt, or poweroff program.

The reboot and halt programs behave differently for each runlevel, potentially causing confusion. By default, these programs call shutdown with the -r or -h options, but if the system is already at the halt or reboot runlevel, the programs tell the kernel to shut itself off immediately. If you really want to shut your machine down in a hurry (disregarding any possible damage from a disorderly shutdown), use the -f option.

Tuesday

Install Xp From Dos

Microsoft Windows XP Professional Full Version(OEM)

If XP will not install from the CD or if you have a new drive with no operating system on
it yet try these:

Install Windows XP from the hard drive with Windows 98 already installed:
Microsoft Windows XP Home with Service Pack 3 Full New Genuine Version
Boot Windows 98
Insert the XP CD into your CD reader
Explore Windows XP through My Computer
Copy i386 folder to C:\Microsoft® Windows® XP Inside Out, Second Editionwindows xp
Go into C:\i386 folder and double click on winnt32.exe to launch the setup from the hard drive

Install Windows XP from DOS (ie. no OS on a new hard drive):

Boot with a Windows 98 Start Up disk
Insert the Windows 98 CD into the CD reader
Run smartdrv.exe from the Win98 directory on the windows 98 CD (file caching)
Type cd.. to back up to the root directory
Insert Windows XP CD into the CD reader
Copy the i386 folder to C:\
Go into C:\i386 folder on C: and type winnt.exe to launch the setup from the hard drive.

Windows 7 Home Premium SP1 64bit (Full) OEM System Builder DVD 1 Pack
Windows 7 home premium 64
Microsoft Windows 7 Home Premium Upgrade Family Pack (3-User)Microsoft Windows 7 Home PremiumWindows 7 Home Premum 64 Bit System Builder 1pk [Old Version]

Install Xp From Dos

Shop

Wolf - 150 x 150

Dmoz

Comments