Tricks

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Tricks as PDF for free.

More details

  • Words: 5,688
  • Pages: 15
General Computer Hardware Prod

These are just a few common hardware problems people have everyday, and how to fix them. 1.My computer keeps shutting itself down after a few minutes of being on. A.This is probably done your computer over-heating and shutting off as a saftey measure. -Check to see if your fans are working, if not, you may want to replace your fans. -If you fans are working, see if your heatsink on your processor is good, this is usually the main cause of overheating.

2.My computer turns on, but there is no video going to the moniter. A.This could be many problems, either the onboard video, or your video card is bad, your moniter is bad, or your power supply. -1st check to see if its the moniter, if you have another moniter in your house then just replace it and see if the video comes up. -If video still does not come up, i would suggest testing your video card next. If you just have onboard video, then try putting in a not very expinsive video card, and see if it will play from the Video card. If you have a Video card, take it out, adn see if it will play off the onboard video. -Your power supply may not be putting out enough power in order to run the video card you have, or it may not have enough power to push the video to output on your moniter. DO NOT WORK ON THE POWERSUPPLY. it holds a charge large enough to kill many humans it 1 shock, even unpluged, and for a long period of time. so i would suggest getting a Meter, so you may test the voltage output, or you can replace the powersupply and see if this works.

3.My computer wont even turn on at all. A. this could either be because your computer is unplugged, the power switch in back is turned off, the power cables either came undone, or were not connected properly, or you have a bad powersupply. -Make sure its plugged in.... -look it back, there should be a switch either under, or beside, the power plug going to the computer. just flip it and see if it works then. -check inside, follow the cables from the power supply, be sure there is power connecting to the hard-drive, cd rom, floppy(if you have one) and especially make sure that the power cords that are supposed to be connected to the motherboard are connected. -If none of these work, i suggest getting a new powersupply, but be sure the specs fit your computer.

4.My computer turns on, then it beeps to a blue screen. A. This problem is called the blue screen of death. Not many ways around this problem. -Restart your computer a few times, if nothing happens and it keeps going back to a blue screen, then you may need to try these other steps. -You can try to use recovery disc if you have made them, when the computer is booting, press the key to go to BIOS settup, and make your computer boot from CD drive as 1st priorty. this will allow you to boot from the recovery CD and you may be able to recover you computer to an earlier time without losing much of you data. -If Neither of these work, you will have to Format your computer useing your OS disc. This will delete your whole harddrive, and start you over fresh as if you just got a new computer. if you need help on this, ask me how to do this(i will be making an article on how). The data you lose when formating is possible to recover, but is a long process.

5. I have recently formated my computer, and now i am not able to get on the internet. A.This problem is due to the fact you lost your ethernet driver in the format. -If this is a factory, or an after market, ethernet device, then you should have gotton a disc with the drivers on it, just reinstall the disc and you are good to go. -If you have lost the disc, then figure out the name of your ethernet card and who the made it. Next thing you do is get on a computer with internet access, and google "your ethernet card" drivers. you will be able to download the driver, either put it on a USB drive, floppy, or a CD-r/rw. Then load the driver on the computer who needs the driver.

6.I have set a password on BIOS, but i forgot what it is. A. I have seen this many times, dont worry, it happens to a lot of people, or you may have gotton it like this from a store, or from someone else. - On some computers if you just take out the BIOS battery it will reset everything in bios, including the password. -Others you can flash the motherboard, this is VERY dangerous if you dont konw what your doing. and it is differant on almost all motherboards, so google your motherboard and how to do this before you try anything. I will be adding to this article whenever i get a chance, these are just teh common problems people have with there hardware, if you have any questions then please ask me. --xtwitchx—

File Permissions

Understanding file permissions In GNU/Linux every user has his own user account, and is a member of one or more user groups. Similarly, each file belongs to a user and to a user group. For restricting file access, GNU/Linux (and Unix in general) defines three different types of rights: - Read (symbolized by the letter r), which means that the file can be read; - Write (symbolized by the letter w), which means that the content of the file can be changed; - Execute (symbolized by the letter x), which means that the file can be executed. For each file, each of these rights (Read, Write and Execute) are defined for three sets of users : - The user (symbolized by the letter u), who is the owner of the file. - The group (symbolized by the letter g), who represents all the users who are members of the group which the file belongs to (as a file belongs both to a user, and a user group). - The others (symbolized by the letter o), who basically represent all the users that are neither members of the group nor the owner of the file. For instance, if a file belongs to George (as the owner) and Administrators (as the group), it can define different Read, Write and Execute permissions for George, for members of the "Administrators" group, and for all other users. Reading file permissions : ls -l All information related to file permissions is contained within the file and can be viewed by the "ls -l" command: ls -l myfile -rwxr-x--- 1 george administrators 10 2006-03-09 21:31 myfile As you can see in this example, the "ls -l" command gives a lot of information about the file "myfile": - Its name, "myfile"; - Its permissions, "-rwxr-x---"; - Its owner, "george"; - Its group, "administrators"; - And other information which is not relevant to this article. The way permissions are shown can seem a bit confusing if you're new to GNU/Linux or Unix, but don't be mistaken, it is very simple. The first character simply indicates the type of file as indicated in the table below: Character Type of file - regular file d directory lsymbolic link ssocket pnamed pipe ccharacter device file (unbuffered) bblocked device file (buffered) In this case myfile is a regular file. Let's have a look at the other nine characters: "rwxr-x---". The first three characters indicate whether or not the read, write and execute permissions are given to the owner (in this case, George). If they are, their character representation appear (r, w or x), otherwise they are replaced by the character "-". In the same manner, the next three characters indicate whether or not these permissions are given to the group (in this case, Administrators). Finally, the last three characters indicate whether the same rights are given to the others (in this case, people who are not members of the Administrators group).

Letter Permission rRead wWrite xExecute, Go through (for directories) -No permission Letter Type of users u User (owner of the file) g Group (group to which belong the file) o Other (users who are neither a member of the Group nor the owner of the file) a All (everybody) So, in our example myfile features the following set of permissions : " rwxr-x---". This means that George has all three rights on it, that members of the Administrators group can only read (R) and execute (X) the file, and that everybody else can't do anything with the file. You could imagine that this file, written and maintained by George could be an executable script dedicated to the administrators and not made available to other users.. but hey.. this is only an example, so let's not assume too much The important thing is that you now understand the concept of file permissions and that you know how to read them using the "ls -l" command. The next step is to learn how to change them. Changing file permissions : chmod You can change the permissions of your files (or other people's files if you're the root superuser) by using the command "chmod". The syntax is very simple. For instance if George decides to give write permissions to the administrators, he will type: chmod g+w myfile g represents the group of the file (administrators). w represents the write permission. + represents the fact that the permission is added If George then lists the permissions using ls -l he obtains: ls -l myfile -rwxrwx--- 1 george administrators 10 2006-03-09 21:31 myfile As you can see, the administrators now have write access to the file, and permission to change its content. The "chmod" command takes 4 parameters: - The type of users to apply the change of permissions for (u for user, g for group, o for others, a combination of them or a for all three of them). - The type of change to make (+ to add permissions, - to remove permissions, = to define permissions) - The type of permissions to apply the change with (r for read, w for write, x for execute) - The file or group of files to apply the change on (filename for a precise file, but wildcard characters for multiple files) Let's have a look at a few examples: - chmod o+r myfile adds read permission to the others on myfile; - chmod ug+rx myfile adds read and execute permissions to both the owner (user) and the group on myfile; - chmod a-rwx myfile removes all permissions to everybody (all) on myfile; - chmod a=rx *.txt defines permissions to be read and write to everybody on all files suffixed by .txt. The chmod command also accepts another syntax which is quite popular among system administrators: the octal system. Rather than using letters such as u, g, o, a, r, w and x.. you can use octal numbers. The main advantage is that once you're used to it, it is faster to use. Also, because it sets permissions rather than adding or removing them,

you don't accidentally overlook anything. Here is how the octal numbers work: Each permission is given a value: Permission Value - 0 x 1 w 2 r 4 Values add up when you combine permissions. Consequently the total value can go from 0 (no permission at all) to 7 (full permissions): Permission Value --- 0 --x 1 -w- 2 -wx 3 r-- 4 r-x 5 rw- 6 rwx 7 Finally a value is given for each of the three types of users (User, Group and Other) and these three numbers ranging from 0 to 7 are put together to form the octal number. This is the number you can use with "chmod". For instance: chmod 750 myfile 750 means 7 (rwx) for the owner, 5 (r-x) for the group and 0 (---) for others. As a result, the permissions of myfile will be "rwxr-x---". As seen above this command is equivalent to: chmod u=rwx,g=rx myfile; chmod o-rwx myfile; Here are some common uses of the octal numbers: - chmod 755 myfile : rwxr-xr-x, all rights to the owner, other people only read and execute; - chmod 644 myfile : rw-r--r--, owner car read and write, other people only read; - chmod 777 myfile : can be considered bad practice in some cases, full permissions to everybody. Changing file owner or group : chown, chgrp You can give ownership of your files to somebody else, or change the group that they belong to, by using the commands "chown" and "chgrp". "chown" allows you yo change the owner of the file, and "chgrp" allows you to change its group. For instance, if George decides to give ownership of myfile to Robert, he can simply type: chown robert myfile Also, if Robert later on decides to make the file only available to members of the group "SeniorAdmin" group rather than to those of the group "Administrators", he can type: chgrp senioradmin myfile Note: The "chown" command also allows to change the group ownership. In fact George could have directly typed the following command: chown robert:senioradmin myfile Setting the sticky bit on a directory : chmod +t If you have a look at the /tmp permissions, in most GNU/Linux distributions, you'll see the following: clem@pluto:/$ ls -l | grep tmp drwxrwxrwt 10 root root 4096 2006-03-10 12:40 tmp The "t" in the end of the permissions is called the "sticky bit". It replaces the "x" and indicates that in this directory, files can only be deleted by their owners, the owner of the directory or the root superuser. This way, it is not enough for a user to have write permission on /tmp, he also needs to be the owner of the file to be able to delete it. In order to set or to remove the sticky bit, use the following commands: chmod +t tmp chmod -t tmp Setting the SGID attribute on a directory : chmod g+s If the SGID (Set Group Identification) attribute is set on a directory, files created in that directory inherit its group ownership. If the SGID is not set the file's group ownership corresponds to the user's default group. In order to set the SGID on a directory or to remove it, use the following commands: chmod g+s directory chmod g-s directory When set, the SGID attribute is represented by the letter "s" which replaces the "x" in the group permissions:

ls -l directory drwxrwsr-x 10 george administrators 4096 2006-03-10 12:50 directory Setting SUID and SGID attributes on executable files : chmod u+s, chmod g+s By default, when a user executes a file, the process which results in this execution has the same permissions as those of the user. In fact, the process inherits his default group and user identification. If you set the SUID attribute on an executable file, the process resulting in its execution doesn't use the user's identification but the user identification of the file owner. For instance, consider the script myscript.sh which tries to write things into mylog.log : ls -l -rwxrwxrwx 10 george administrators 4096 2006-03-10 12:50 myscript.sh -rwxrwx--- 10 george administrators 4096 2006-03-10 12:50 mylog.log As you can see in this example, George gave full permissions to everybody on myscript.sh but he forgot to do so on mylog.log. When Robert executes myscript.sh, the process runs using Robert's user identification and Robert's default group (robert:senioradmin). As a consequence, myscript fails and reports that it can't write in mylog.log. In order to fix this problem George could simply give full permissions to everybody on mylog.log. But this would make it possible for anybody to write in mylog.log, and George only wants this file to be updated by his myscript.sh program. For this he sets the SUID bit on myscript.sh: chmod u+s myscript.sh As a consequence, when a user executes the script the resulting process uses George's user identification rather than the user's. If set on an executable file, the SUID makes the process inherit the owner's user identification rather than the one of the user who executed it. This fixes the problem, and even though nobody but George can write directly in mylog.log, anybody can execute myscript.sh which updates the file content. Similarly, it is possible to set the SGID attribute on an executable file. This makes the process use the owner's default group instead of the user's one. This is done by: chmod g+s myscript.sh By setting SUID and SGID attributes the owner makes it possible for other users to execute the file as if they were him or members of his default group. The SUID and GUID are represented by a "s" which replaces the "x" character respectively in the user and group permissions: chmod u+s myscript.sh ls -l -rwsrwxrwx 10 george administrators 4096 2006-03-10 12:50 myscript.sh chmod u-s myscript.sh chmod g+s myscript.sh ls -l -rwxrwsrwx 10 george administrators 4096 2006-03-10 12:50 myscript.sh Setting the default file creation permissions : umask When a file is created, its permissions are set by default depending on the umask setting. This value is usually set for all users in /etc/profile and can be obtained by typing:

umask The default umask value is usually 022. It is an octal number which indicates what rights will be removed by default to all new files. For instance, 022 indicates that write permissions will not be given to group and other. By default, and with a umask of 000, files get mode 666 and directories get mode 777. As a result, with a default umask value of 022, newly created files get a default mode 644 (666 - 022 = 644) and directories get a default mode 755 (777 - 022 = 755). In order to change the umask value, simply use the umask command and give it an octal number. For instance, if you want all new directories to get permissions rwxr-xr--- and files to get permissions rw-r----- by default (modes 750 and 640), you'll need to use a umask value which removes all rights to other, and write permissions to the group : 027. The command to use is: umask 027

Getting lost password back on XP

Because of the security features built into Windows XP, it is virtually impossible to get back into the system without the password. You have several options to try and get around this problem. If you have access to another user account with administrator rights, you can use that account to change the password of the account that is locked out. You can also use the default Administrator account that is built into Windows XP. First you need to boot the system into Safe Mode. 1.Restart your system. 2.When you see the blue Dell globe or screen, press the ( F8 ) key about 3 times a second. 3.You should get the Windows startup menu. Use the (Up or Down) arrow keys to highlight (SafeMode) 4.Press (Enter) on (Safe Mode), then press (Enter) on (Windows XP). 5.The system should boot to Safe Mode. Once you are at the Account Log on Screen, click on the icon for the user account with administrator rights, or click on the icon for the administrators account. Note: For Home the Administrator account isn't normally shown & in Safe Mode you have to press Ctrl+Alt+Delete keys twice to show. For PRO you can do this in normal mode When the system has booted to the desktop, use the following steps to change the accounts password. 1.Click Start, Control Panel, Administrative Tools. 2.Click Computer Management. 3.Double click Local Users and Groups, double click the folder Users. 4.Right click on the account name that is locked out, and click on Set Password. 5.You may get a warning message about changing the password, simply click proceed. 6.Leave the New Password box blank, also leave the Confirm Password box blank. 7.Click OK, and OK again. 8.Then close all Windows, reboot the system and try to log in.

There are also applications that can recover the password for you. The following companies provide these applications. iOpus® Password Recovery XP LostPassword.com, Asterisk Password Recovery XP v1.89 Cain and able GOOGLE<< search for more programs If the above information does not help in recovering the password, the only option left is to format the hard drive then reinstall Windows and the system software as you can read how to do in my other articles

Ip Address Basics

This is my first article, I hope you enjoy and mainly learn. This article is intended to give you basic knowledge on what an Ip address is and what is is made of: What is an IP address? Yes it is the address of your computer internally and externally but how is it made? An Ip address is a 32 bit binary number which is broken down into four parts, these parts have 8 bits . each of these 4 sections are called octets. for example; (192.168.0.1) 192. 168. 0 . 1 11000000. 10101000 00110000 00110001 This is IPV4 the current ip addressing scheme we are all using. The original Ip address was made up like this Ip Address = NETWORK portion + HOST portion. however IPV4 is different in Ip addresses have different classes: ( I have decided not to include CLASS D AND CLASS E Ip address types because its not neccessary for this article) A class C Ip address is made up of: Network. Host. Host. Host A class B Ip address is made up of: Network. Network. Host. Host A class A Ip address is made up of: Network. Network. Network. Host So i guess your thinking how to we tell which Ip is which well heres how you know to simplify, in the first octet is the number which tells you which class an ip address is caterogised as.

(192.168.0.1) which is the first part of the Ip address in this example the first octet is 192. (key) CLASS FIRST OCTET (BINARY) NETWORK NUMBER RANGE C 110XXXXX 1-126 B 10XXXXXX 128-191 A 0XXXXXXX 192-223 Now between class C and class B you might think that i have made a typo and missed 127. No i havent and there is a reason for this. 127 is reserved for test you network interface card (Ethernet) to test you network interface card (NIC) do the following action: Start>>Run>>cmd.exe>>Hit Return>>(type) ping 127.0.0.1>> if you get a response your NIC is working horray! (WINDOWS USERS) IPV6 IS COMING.....(10 Ip Addresses per square metre, ill write another article when its relevant) For More Information + Any Questions Dont Hesitate To PM Me.

Open Command Prompt from where it is banned

Open command prompt from where it is Banned Open up Command Prompt (Start>Run>Command.com) Can't use command prompt at your school? Open up Microsoft word..Type: Command.com Then save it as Somthing.bat. Warning: Make sure you delete the file because if the admin finds out your in big trouble.

--Adding a user to your network-Type: Net user Haxxor /ADD ----That will add "Haxxor" onto the school user system. ----Now you added users lets delete them! Type: Net user Haxxor /DELETE Warning: Be carefull it deletes all their files. ----"Haxxor" will be deleted from the user system. ----Hmmm? It says access denied? Thats because your not admin! ---Now lets make your Admin! ---This will make Haxxor an admin. Remember that some schools may not call their admins 'adminstrator' and so you need to find out the name of the local group they belong to. Type: net localgroup It will show you what they call admin, say at my school they calll it adminstrator so then i would Type: net localgroup administrator Haxxor /ADD ---Getting past your web filter. Easy way: Type whatever you want to go on say i wanted to go on miniclips bug on wire i would go to google and search miniclip bug on wire then instead of clicking the link i would click "cached". Hard way: I'm hoping you still have command prompt open. Type: ping miniclip.com

And then you should get a IP type that out in your web browser, and don't forget to put "http://" before you type the IP. ----Sending messages throught your school server Okay, here's how to send crazy messages to everyone in your school on a computer. In your command prompt, type Net Send <domain> * "The server is h4x0r3d" Note: <domain> may not be necessary, depending on how many your school has access too. If it's just one, you can leave it out. Where <domain> is, replace it with the domain name of your school. For instance, when you log on to the network, you should have a choice of where to log on, either to your school, or to just the local machine. It tends to be called the same as your school, or something like it. So, at my school, I use Net Send Haxxor School * "The server is h4x0r3d" The asterisk denotes wildcard sending, or sending to every computer in the domain. You can swap this for people's accounts, for example NetSend Varndean dan,jimmy,admin "The server is h4x0r3d" use commas to divide the names and NO SPACES between them. what say?? ~Cheers~ or Allowing dos and regedit in a restricted Windows A very simple tactic I found after accidentally locking myself out of dos and regedit is to open notepad and type the following: REGEDIT4 [HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesWinOldApp] "Disabled"=dword:0 [HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem] "DisableRegistryTools"=dword:0 Save it as something.reg then run it. Simple.

Change Text on XP Start Button

Step 1 - Modify Explorer.exe File In order to make the changes, the file explorer.exe located at C:Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems. get this from http://delphi.icm.edu.pl/ftp/tools/ResHack.zip The first step is to make a backup copy of the file explorer.exe located at C:Windowsexplorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:Windowsexplorer.exe. The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We are going to modify item 578, currently showing the word "start" just as it displays on the current Start button. There is no magic here. Just double click on the word "start" so that it's highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you'll type. Go ahead and type your new entry. In my case I used Click Me! You'll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won't get into what's involved in compiling a script, but suffice it to say it's going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command - Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:Windows. Step 2 - Modify the Registry !!!make a backup of your registry before making changes!!! Now that the modified explorer.exe has been created it's necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don't know how to access the registry I'm not sure this article is for you, but just in case it's a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to: HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows NT CurrentVersion Winlogon In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.

Close Registry Editor and either log off the system and log back in, or reboot the entire system if that's your preference. If all went as planned you should see your new Start button with the revised text.

Introduction about IP-addresses.

What is an IP-address? An IP-address is a number, which get used as a unique identification for your computer on the net. With other words, no one has the same IP as you, and it is the IP address which makes that you have internet. There are exceptions though if you're on a big net, for example and School network or behind a Proxy server, then all the user share the same IP-address.. This is something you should think of, if you use a Proxy server to stay anonymous. Is it dangerous if someone get a hold of my IP? No. In fact, it's almost impossible to avoid that someone you're communicating with on the internet gets your IP.. It's just an address which identifies your computer, and not you as a person. If anyone get your IP, can they find out which country you live in, and which ISP (Internet Service Provider) you have. They can not find out who you are, nor take control over your machine. How can I find the one who owns the IP xxx.xxx.xxx.xxx? Technically you can't, all you can do is th do a WHOIS search, whcih means it gather information about the ISP itself. You could always find a download that trace IP addresses, but you will only get to the ISP, and see the map over the Country where the ISP is. If you somehow want to WHOIS someone then I suggest you use a WHOIS tool based on Web applications. The programs doesn't really give exact data. Links for WHOIS'ing are posted at the bottom of the article. Can the Police trace me based on my IP? Yes. If the Court has given the police orders to gather the ISP's traffic data,Then can they trace you. The ISP has data which shows which IP's you've had and which time you had them.. These logs are not given out to the police or whatever without order from court (following Norwegian laws), there are many laws about how these logs needs to be taken care of by the ISP. You won't get the data before you've actually been convicted for something you've done on the net. How can I avoid that someone get my IP? You could always use a proxy server. A proxy takes data from you, and then sends the data to whatever is going to have the data. The bad part is that you have to trust the proxy, Since the proxy can actually show your original IP, andor it can listen or save the data you're transferring IF you're gonna use a Proxy server, will you be able to see the IP to the Proxy server. This IP will be the same for everyone that uses the Proxy server.

Is it important to avoid people from seeing my IP? NO! You have absolutely nothing to be afraid of. The best you can do for your security is to have your Operating System patched, and use safe Services connected to the internet, if you run a web server from your computer etc. They will have a hard time getting access to your computer with your IP, so don't be scared. Private IP's! There is 4 private IP-areas: * 10.0.0.0 - 10.255.255.255 * 172.16.0.0 - 172.31.255.255 * 192.168.0.0 - 192.168.255.255 in addition is there 169.254.0.0-169.254.255.255 for automatic giving of IP-addresses, where not DHCP or any other automatic allocation exists. Private IP's are special because they can be found in different places, as distinct from public (normal) IP's which have to be unique. It's likely that you have Private IP-address, if you're connected to the internet with an ADSL-router.. Private IP's doesn't get routed by routers, and therefore is it only good to use in the same physical net, or with ruterar which is setup to explicitly route it. WHOIS-Services http://www.afrinic.net/ - AfriNIC - Africa http://www.apnic.net/ - APNIC - Asian/Pacific http://www.arin.net/ - ARIN - North America http://lacnic.net/en/ - LACNIC - Latin- og South-America http://www.ripe.net/ - RIPE - Europe You have to try them all to get results for the IP you want to WHOIS, because you can't be sure which continent the ISP is!

check if computer has been infected or hacked

hi everyone this is a tutorial that i learned on how to see if your computer has been infected or hacked... steps-make sure you have no program running..aim/yahoo/msn or web-pages nothing! 1. click start-run then type cmd 2. ok type in netstat -ano then enter

3. then a list of PID's IP's and states should come up saying either listening or established 4. alright you want to look at the established PID's (process identifier) 5. write down the PID numbers and close the command prompt 6. press ctrl alt and delete or exit the task manager should come up. 7. click on view-columns and check the box with the PID (process identifier) on it hit ok 8. go to the processes and look for the established PID number then highlight it and end process. 9. you can check to see if you cleared the connection by doing steps 1 and 2.. 10. the established connections should be gone :) hope this helps everyone out there......

Related Documents

Tricks
November 2019 32
Tricks
April 2020 18
Tricks
May 2020 17
Tricks
November 2019 25
Mhtcet Tricks
April 2020 15
Funny Tricks
November 2019 14