Tuesday, August 25, 2009

Keyboard Piano v4.0



Keyboard Piano v4.0

YOU DON'T NEED TO BUY PIANO ANY MORE NOW U CAN PLAY PIANO IN YOUR PC

- Can play like a Piano with your PC.
- Can change over 25 real piano songs.
- Work 100% in Vista & XP.

http://hotfile.com/dl/10818687/9337b93/Kbpn.rar.html

http://qubefiles.com/?file=/getfile/06ed170a6a700881e7f7884ecdd4db442ced588cff2a2a3fa7/Kbpn.rar.html

Googlehack 1.6





Googlehack 1.6

Google Hacks is a compact utility that will allow its users to search google using different google search hacks.

Using Google Hacks one can easily do a music search by using a highly optimized and complex search command that can be obtained just by clicking a number of option boxes that can be found in the program's interface.

What's New in This Release:

· Added new tool.
· Removed product key search.
· Added New proxy technique.
· Added Application Search.
· Added Torrent Search.
· Added Cached Website Viewer.
· Added File Hosting Search.

http://hotfile.com/dl/10823972/5424552/GHKST.rar.html

Friday, August 21, 2009

Life is beautiful virus hoax Removal Tool

Life is beautiful virus hoax Removal Tool

For other uses, see Life is Beautiful (disambiguation).

The Life is beautiful virus hoax is an e-mail hoax which began circulating on the Internet around January 2002. The e-mail details a virus contained in a Microsoft PowerPoint attachment which is supposedly called Life is beautiful.pps. To date, no such virus has been found and the e-mail is widely considered a hoax.

The e-mail claims to be based upon information from Microsoft and Norton. Symantec, the makers of Norton AntiVirus and who actually provides the virus definitions database for Norton AntiVirus, have issued an advisory stating that the e-mail is a hoax.[1]

The hoax began circulating in 2002, but became active once again in 2009.

The hoax e-mail continues by saying that the virus was made by a person, codename "life owner", who is suing Microsoft in court for patent infringement.


[edit] Sample E-Mail
This is a sample of the English version of the hoax.

URGENT! VIRUS!

This information arrived this morning, from Microsoft and Norton.

Please send it to everybody you know who accesses the Internet.

You may receive an apparently harmless email with a PowerPoint presentation called "Life is beautiful.pps."

If you receive it DO NOT OPEN THE FILE UNDER ANY CIRCUMSTANCES, and delete it immediately.

If you open this file, a message will appear on your screen saying: "It is too late now, your life is no longer beautiful", subsequently you will LOSE EVERYTHING IN YOUR PC and the person who sent it to you will gain access to your name, email and password.

This is a new virus which started to circulate on Saturday afternoon. WE NEED TO DO EVERYTHING POSSIBLE TO STOP THIS VIRUS.

AOL has already confirmed it's dangerous, and the antivirus softwares are not capable of destroying it.

The virus has been created by a hacker who calls himself "life owner", and who aims to destroy domestic PCs and who also fights Microsoft in court!

That’s why it comes disguised with extension pps. He fights in court for the Windows-XP patent.

MAKE A COPY OF THIS EMAIL TO ALL YOUR FRIENDS.

Alternative 2008/2009 variation

Be Extremely Careful

Especially if using Internet mail such as Yahoo, Hotmail, AOL and so on.


This information arrived this morning direct from both Microsoft and Norton.

Please send it to everybody you know who has access to the Internet.

You may receive an apparently harmless email with a Power Point presentation 'Life is beautiful.'

If you receive it DO NOT OPEN THE FILE UNDER ANY CIRCUM STANCES , and delete it immediately .

If you open this file, a message will appear on your screen saying: 'It is too late now, your life is no longer beautiful.'

Subsequently you will LOSE EVERYTHING IN YOUR PC and the person who sent it to you will gain access to your name, e-mail and password.

This is a new virus which started to circulate on Saturday afternoon.

AOL has already confirmed the severity, and the antivirus software's are not capable of destroying it.

The virus has been created by a hacker who calls himself 'life owner.'

PLEASE SEND A COPY OF THIS EMAIL TO ALL YOUR FRIENDS and ask them to PASS IT ON IMMEDIATELY

Removal

We are advising users who receive the email to delete it and DO NOT pass it on as this is how an email HOAX propagates.


[edit] References
^ Koris, George (2002-01-15). "Life is beautiful Hoax" (HTML). Symantec.com. Symantec. http://www.symantec.com/security_response/writeup.jsp?docid=2002-011511-0444-99&tabid=2. Retrieved 2007-11-04.

Tuesday, August 18, 2009

How to use the remote shutdown command in Windows

This article will show you how to use the remote shutdown command tool in Windows to remotely shut down, restart, or logoff a local or networked computer. This can be very useful sometimes if you have multiple computers at home or on your network that you want to quickly shutdown or restart.

You can perform a remote shutdown from the command prompt using the shutdown command and it’s associated switches, from the remote shutdown dialog box, or from a batch file. I’ll try to go through all three in this guide.

Remote Shutdown Overview

Firstly, in order to remotely shutdown a computer on your network, you’ll need to make sure you have Administrative access to that computer. If you’re on a home network, the best way to do this is to make sure all computers are in the same workgroup and that they all have at least one Administrator account with the same user name and password.

You can also have different Administrator account names across computers, but then you’ll need to make sure you add the Administrator account of one computer to the account list on the other computers. You’ll also need to know all the names of the other computers on the network. You can do that by going to Control Panel and then clicking on System. Then click on the Computer Name tab.

computer name

Remote shutdown is useful for managing multiple computers at once and especially useful for helpdesk technicians when they have to fix remote computers.

Remote shutdown via Command Prompt

The shutdown command is most flexible when using it from the command prompt because you can add a bunch of switches to it, which allow you to customize the behavior. Go to Start, then Run, and type in CMD. In the black command window, type in shutdown /? to see the list of switches.

shutdown command

You have to use at least one switch in order for the command to do anything. Basically you would type in shutdown -X -Y -Z where X, Y, Z are letters in the list above.

Here are a couple of the most command switches and what actions they peform:

-l: Logs off the computer

-s: Shuts down the computer

-r: Restarts the computer

-m \\computername: remote shutdown of a computer

-f: Forces programs to close immediately

So for remotely shutting down another machine on your network, you would type into the command prompt the following commands:

shutdown –m \\computername –r –f

This above command will restart the computer named computername and force all programs that are still running to die.

shutdown –m \\computername –r –f –c “The computer will restart, please save all work.” –t 60

This command will restart the computer named computername, force all programs that are running to die, show a message to the user, and countdown 60 seconds before it restarts.

Remote Shutdown via Shutdown Dialog

If you don’t like all those switches, etc, or using the command prompt, then you can bring up the shutdown dialog box. You can open the dialog window by clicking Start, click Run, type CMD and typing shutdown -i and in the blank DOS window.

shutdown i

A window similar to the one below will appear:

remote shutdown dialog

Click the Add or Browse button to add computers to the list. You can then run the commands on the entire batch of computers. If you click Add, you’ll need to enter in the network name of the computer in the format \\computername. You can even add your own computer to test it out and make sure it works.

computer name[6]

Of course, you need to know the actual computer name, which I mentioned how you can figure out above. You’ll also need Administrative access. You can determine this by going to My Computer and typing \\computername into the address bar and seeing if you can get access without having to be prompted for a password.

compute name my

So add as many computers to the list as you like and then set your options. You can shutdown, restart, or logoff. You can also display a warning for however many seconds you like. You can type in a comment at the bottom which will be displayed to users. That’s it!

Remote Shutdown via Batch File

Finally, you can create a batch file so that you can do all of this by just clicking on a file! Or you can even schedule the batch file to be run at specific intervals using Windows Scheduler.

Just go to Notepad and type in the commands you would have typed into the command prompt:

shutdown –m \\computername1 –r
shutdown –m \\computername2 –r
shutdown –m \\computername3 –r

This will restart three computers on my home network. You would of course replace computername1 with the actual names of your computers. Then simple save the file with a .BAT file extension. You can put as many commands into the batch file as you like, so feel free to experiment!

I’ve written an extensive post on how to use batch files in Windows, so read that if you are not familiar with batch files. Enjoy!

[tags]remote shutdown, remote shutdown command, remote windows shutdown, remote windows xp shutdown, network remote shutdown, remote computer shutdown[/tags]

Monday, August 17, 2009

Improve Link Popularity And Increase Alexa Rank In No Time

increase alexa rank
Hello.

After All Your Time and Effort are You Only Getting 10-50 Visitors To Your Site Each Day?

How Would Your Website Perform With 500 Visitors Per Day?

Well follow this simple one step and get the traffic for all your valuable content you have been writing for so long.

Make A List Of Links As Below and Insert Your Link instead of YOUR LINK HERE from below:
01. TutZone
02. The Silent Majority
03. Tech Mania
04. CssReflex
05. Tweaking Windows
06. Jobs Tips And Employment Guide
07. 3arabax
08. EastWebDesign
09. Affilate Marketing
10. Download Free Flash Animation
11. The Things We Talk About
12. Get Computer Softwarez
13. Clicking Daily
14. Sobari Blogz
15. Baixa Filmes de Graca
16. Epigraflar
17. Right or Left
18. Explore Computer World
19. Green By Diamond
20. ButtonBash
21. haditsshahih
22. belajar bareng yuk!
23. Blog Gado Gado
24. Risefa
25. www.olympia.gr
26. System Admin Tools
27. Cafeonline
28. Stock Photography
29. And Shine Tungsten Rings
30. AssifahRahman
31. All We Need To Know
32. BLOG HEART THROB{favorites}
33. Read18 Buzz
34. Music Destock : vente instrument de musique
35. Seven
36. Design Of Passion
37. Bloggerz Tipz
38. This blog
39. Money Central Online
40. Panca's Tips
41. Info N Tips
42. Blog.Exxcorpio Graphic, Webdesign and Animation
43. YOUR LINK HERE


Or better get the Copy/Paste Code from


and make a new post on you blog and then make a reply with the posted link here:

This will surely Increase Web Site Traffic and page Rank.

Also Don't forget to promote this article via social networking and telling your friends. It only means better results for yourself and everyone on the list.

Remote Administrator (Radmin) v3.0 FULL




Radmin - fast and reliable pc remote control software for secure networking. Remote Administrator (Radmin) is the award-winning secure remote control software that enables you to work on a remote computer as if you were sitting in front of it. This program is the ideal remote access solution. You can access the same computer from multiple places and use advanced file transfer, remote shutdown, Telnet, OS-integrated NT security system support and other features. Radmin outperforms all other remote controls in speed,reliability and security!
Remote Administrator is deployed on thousands of corporate PCs worldwide. Among our clients are companies where Radmin is the standard application for network management. These corporations require cost-effective pricing as well as special terms for upgrading. In answer, Famatech has created the Volume Licensing Program to offer the best solution for companies/organizations requiring a minimum of 200 licenses.

How it works

You view the remote computer's screen on your own monitor either in a window or full screen. All your mouse movements and keyboard signals are transferred directly to the remote computer. You work on the remote computer just as if it were right there in front of you. According to our tests and user feedback, Radmin outperforms all other remote control software in speed, usability and features.

With Radmin you can work with any remote computer so long as it is connected to the Internet or your local area network. You don't even need a fast network connection! A 56K modem is fast enough to provide 5-10 screen updates a second. On a LAN, real-time speeds of 100 - 500 screen updates per second is normal. Radmin’s speed can be adjusted up or down to save your bandwidth.

* Full compatibility with Windows Vista 32bit
* Highest Speed of Work
* Highest Security Level
* Multi-user Text and Voice Chat
* Multiple monitors support
* User-friendly interface
* File Transfer with "Delta Copy" feature
* Low System Requirements
* Multiple Connections Support
* Free Technical Support



Code:

http://rapidshare.com/files/119973510/remote.Administrator.Radmin.V3.0.by.projectw.pk.rar
Pass = projectw.pk

Symantec Endpoint Protection 11 MR4 - Recommended - Best Anti-Virus

Symantec Endpoint Protection 11.0 combines Symantec AntiVirus with advanced threat prevention to deliver unmatched defense against malware for laptops, desktops and servers. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership..


Features:

Single Agent and Single Console
Delivers a single agent for all Symantec Endpoint Protection technologies and Symantec Network Access Control. Delivers a single integrated interface for managing all Symantec Endpoint Protection technologies and Symantec Network Access Control. All allow for a single communication method and content delivery system across all technologies.

* Provides operational efficiencies such as single software updates, single policy updates.
* Provides unified and central reporting.
* Provides unified licensing and maintenance.
* Requires no change to the client when adding Symantec Network Access Control enforcement.
* Lowers Total Cost of Ownership for endpoint security.
* Reduces administrative effort.

Proactive Threat Scanning
Behavioral-based protection that protects against zero-day threats and threats not seen before. Unlike other heuristic-based technologies, Proactive Threat Scan scores both the good and bad behavior of unknown applications, providing a more accurate malware detection.

* Accurately detects malware without the need to set up rule-based configurations.
* Helps lower the number of false positives.

Advanced Rootkit Detection and Removal
Provides superior rootkit detection and removal by integrating VxMS (Veritas Mapping Service—a Veritas technology), thereby providing access below the operating system to allow thorough analysis and repair.

* Detects and removes the most difficult rootkits.
* Saves time and money and productivity lossses associated with re-imaging infected machines.

Application Control
Allows administrators to control access to specific processes, files, and folders by users and other applications. It provides application analysis, process control, file and registry access control, and module and DLL control. It enables administrators to restrict certain activities deemed as suspicious or high risk.

* Prevents malware from spreading or harming endpoints.
* Locks down endpoints to prevent data leakage.

Device Control
Controls which peripherals can be connected to a machine and how the peripherals are used. It locks down an endpoints to prevent connections from thumb drives, CD burners, printers, and other USB devices.

* Prevents sensitive and confidential data from being extracted or stolen from endpoints (data leakage).
* Prevents endpoints from being infected by viruses spread from peripheral devices.

How to force Group Policy processing remotely

Updating Microsoft Windows Group Policy settings on the local machine is not so hard with a tool such as Gpupdate, but updating these policies on remote domain computers is not possible from within any Microsoft Management Console (MMC) by default or with any Microsoft tool available so far. In this article we will show some tricks, scripts and free tools that makes this task possible – and even easy – for the network administrator.

Introduction

Most administrators know the problem of forcing Group Policy (GP) processing on remote computers. After configuring an important policy of some kind, we would sometimes like GP processing to occur immediately on client computers. The problem is that by default, the so called background processing “only” happens every 90 to 120 minutes (randomized) – if we want to force updates to occur right away we are on our own. Of course there is a reason why policies do not just update every 5 minutes or ‘real-time’. The load on Domain Controllers and the network would simply be too much to handle in most environments. But, if a very important security setting at some point needs to be pushed to a large number of clients “right away”, it’s nice to be prepared for such a situation.
What we basically want, is to make it possible for the administrator (Admin), from a central location (Admin workstation), to update policies on Computer1, Computer2 and/or Computer3 – and the user policies for User A, B and C - whenever the admin finds it necessary. See figure 1.
Figure 1: The scenario
We do have the wonderful Gpupdate tool built in to Microsoft Windows XP and newer – and we had Secedit on Windows 2000 systems - but it is unfortunately so, that unlike the Gpresult command, both Gpupdate and Secedit only handle local updates. Of course, if we have a deployment system set up already, like Microsoft Systems Management Server (SMS), we could use this system to distribute a small script that executes the necessary command for a group of users or computers.
If we do not have such a system on the network, we must try to be creative - because the alternative is to log on to all computers using tools like Remote Assistance, or sending an email to all users, to execute the Gpupdate command... So, let’s try to be creative then.

Issues

Before we get into more detail I just have to mention one common issue people have when trying to implement the methods mentioned in this article.
Firewall trouble:
Like with any other communication that is initiated from the network, packets that try to update policy settings on remote computers' will fail if the remote computers local firewall (like the one built in to Windows operating system from Windows XP Service Pack 2 and up) is not configured to allow such incoming traffic (from a given subnet, IP or whatever). The built in Windows firewall must be configured to allow the incoming traffic we want by using a Group Policy Object (GPO), so ironically, such a policy is the only one we definitely cannot force to firewall-enabled remote computers.
The policy settings that need to be enabled for all the mentioned methods in this article, is the following:
Computer Settings | Administrative Templates | Network | Network Connections | Windows Firewall | Domain Profile | “Windows Firewall: Allow remote administration exception”.
Other firewall devices between the central computer and the remote computers must be configured to comply with the above setting (see Help text on the mentioned policy in GPEDIT.MSC for port info etc.).
Administrator rights:
The user that initiates the processes on the remote computers must be a local administrator on those machines – or else it’s simply not going to work as expected.
After this is taken care of, let’s look at the free methods we have available.

Scripting

Scripts are free and shared heavily among IT professionals on the Internet – this is actually “Open Source” at its best. Microsoft has provided us with some built in opportunities to expand the capabilities of our operating systems (OS) and environments - in this article we will cover how these capabilities can be used in regards to updating GPs remotely.

Gpupdate & Secedit

First of all we should mention Gpupdate and Secedit, without those tools none of this would be possible. The scripts and tools mentioned here all assume that one of the tools exists on the remote client, depending on the OS version. As mentioned above, Secedit was delivered with Windows 2000 and Gpupdate took over from Windows XP and above, it has even survived the trip to Longhorn as it looks right now. In the following scripts I will focus on Gpupdate – we could check for OS version before calling either Gpupdate or Secedit, but that stuff can be added later without much work.
Gpupdate.exe resides in the “%windir%\system32” folder by default, so we don't need an absolute path to its location on the remote workstation. The tool can be called with a number of different switches:
Syntax: Gpupdate [/Target:{Computer | User}] [/Force] [/Wait:] [/Logoff] [/Boot] [/Sync]
In the “do it yourself” HTML Application (HTA) and Windows Management Instrumentations (WMI) scripts we will focus on running Gpupdate without any switches – or with either “/Taget:Computer” (to update only computer related policies) or “/Target:User” (to update only user related policies). The other options could be included with some more work - but would we really use “/Logoff” or “/Boot”? This would mean that users could be logged off if required (software installation, folder redirection etc.) or the computer could even be restarted while the user is working. Is that really what we want? Anyway, we could just as well use tools like Shutdown.exe for that purpose – but my guess is that it’s not going to be popular out there (the users you know).

PsExec

The first method I’ll mention is very easy to implement and requires almost no scripting abilities. Why invent something that has already been invented, right? PsExec is developed by Mark Russinovich, the former owner of Sysinternals which was acquired by Microsoft in July 2006. It is currently available in version 1.73 and can be downloaded from Microsoft Technet here.
PsExec is ‘Heaven’ when talking remote execution, first of all because it does not require any agents installed on the remote computers. You need to specify a computer name and the command that should be executed as switches in a command prompt – that’s basically it! Behind the scenes a service is being installed ‘ad hoc’ remotely and removed again when the command has been executed.
A small tip is to place the PsExec.exe file in the “%windir%” directory, because then we don’t have to specify the complete path to this file when executing it from a command line etc.
To update group policies on the remote computer ‘Computername’ all we have to write is the following command: “PsExec \\Computername Gpupdate”. The user logged on to the remote computer will not see anything happening, but in the background Gpupdate will ‘refresh’ both user and computer policies and apply any missing settings. You would think that PsExec should run with the “-i" switch (interactive) to update the remote users specific user policies, but testing shows that this is not the case.

FLEX COMMAND

Well, the above mentioned method updates policies for a single user/computer only – how about updating an entire Organizational Unit (OU) by using PsExec and Gpupdate together? For that purpose I have created a “demo” script to show some of the possibilities we get with some ‘creative’ scripting. The script is called FLEX COMMAND and can be downloaded here. When opening the HTA file with a text editor like Notepad the code is revealed – no hidden magic or anything.
When FLEX COMMAND is started, it contacts the Active Directory (AD) domain of the computer it is executed on. Therefore it must be executed from a domain member – if not, no OU’s can be found of course.
Select an OU, whether computer objects in sub-OU’s should be handled, and if the tool should only handle machines that are “alive” (answering to WMI requests). The last thing to do is to insert the command line we want to execute on the local machine for each computer object found in the OU selected. The text string “{C}” must be included; this will be replaced by the name of the computer when the script is looping through the computer objects.
Figure 2: FLEX COMMAND in action
Let’s say that the OU “MyComputers” contains only 3 computers: Computer1, Computer2 and Computer3. The command we have typed in, “psexec \\{C} gpupdate”, is then translated into the following 3 commands: “psexec \\computer1 gpupdate”, “psexec \\computer2 gpupdate”, “psexec \\computer3 gpupdate” – all commands will be executed consecutively (if the computers are alive) and remote policies should be updated.
The tool could be modified to get the computers from a file (txt, csv, xls etc.), a database, a specific security group in AD, a manual selection from a list or whatever the need would be. The way the script executes the processes/commands could also be modified, but this demo script is mainly to show the possibilities we have.
The script is freely delivered ‘as-is’ for you to test, use and modify as you please - more info here.

Windows Management Instrumentation (WMI)

Ok, PsExec is nice, but do we have a “do it yourself” method so I can customize the solution to fit my environment? Yes, as a matter of fact we do! WMI is extremely powerful and pretty easy to handle after a few hours of studying. With WMI, a tamed firewall scenario and administrative rights in place, almost anything is possible in a Windows environment – even remote shut down, restart or execution of commands.
I have created another script for demo purposes, called OU GPUPDATE. This HTA script carries some different techniques “under the hood” – it’s actually just a small modification of FLEX COMMAND. First of all it looks up the OU structure in AD (the top dropdown list), it gives the user the option to hit computer objects in sub-OU’s too, to run Gpupdate with “/Target:User” or “/Target:Computer” or without any switches. Only computers that are “alive” (responds to WMI requests) will be hit by default.
Figure 3: Select what to update – user settings, computer settings or both
The script is freely delivered ‘as-is’ for you to test, use and modify as you please. The script can be downloaded here.

Remote scripting

Besides WMI, we have the option to use ‘plain’ remote scripting (VBScript). This must be enabled by setting one value in the HKLM part of the involved computers' registry databases, the script engines must be “remote scripting” enabled, and from that point the rest is pretty straight forward. The procedure is to copy a script file to the remote host (this script should perform Gpupdate as required), and afterwards send a VBScript command that executes the script file remotely.
Jeremy Moskowitz, a Microsoft Group Policy MVP, mentions this procedure briefly in his book “Group Policy, Profiles, and IntelliMirror for Windows 2003, Windows 2000, and Windows XP”, see his website.

RGPREFRESH

RGPREFRESH is a tool developed by Darren Mar-Elia. Darren is a Microsoft Group Policy Most Valuable Professional (MVP), see his website. His tool uses WMI behind the scenes and executes either Secedit or Gpupdate as needed on the remote host, with the command line switches selected by the user. These switches give you the same possibilities as if you were using the tool locally.
Darren's tool handles one machine at the time, but combined with a tool like FLEX COMMAND (as “wrapper”) the tool can hit an entire OU of a computer with a few clicks… Both RGPREFRESH and PsExec could also be combined with DSQUERY, FOR and other command line utilities to execute on more than one host at the time.
Figure 4: The RGPREFRESH options
The tool can be downloaded for free from this webpage.

Specops Gpupdate

Special Operations Software, Specops, is an international software vendor, offering management products enhancing Active Directory and Group Policy based technology. The company has released their own remote policy updating solution, and the best part is that it is completely free to use. The current version of Specops Gpupdate is 1.0.2.13 (2006-10-25) and the utility can be downloaded here. This tool not only brings the functionality we have developed in the above scripts, but also adds some more management features. Let’s take a look at this nice utility…
Installing Specops Gpupdate
Installing the MSI application is very easy; all it requires is the Active Directory Users & Computers (ADUC) MMC and the Microsoft .NET Framework version 2.0.
Figure 5: The install process is as simple as most MSI package installations (next, next, next)
After installing the MSI file nothing is changed in the GUI, only “Add/Remove Programs” tell us that Specops is installed. So we have to perform an additional task for the magic to appear…
Active Directory User & Computers extended
The first time Specops Gpupdate is installed in the AD Forest, a special command must be run:
“%CommonProgramFiles%\Specopssoft\Specops ADUC Extension\SpecopsAducMenuExtensionInstaller.exe” /add
This is not a schema update, even though you must be Enterprise Admin to run this. This update is completely reversible, just run it again with the “/remove” switch instead. What it does is to register so called “Display Specifiers” to extend the view from within ADUC.
When right clicking an OU or a computer object, four new options are added: Gpupdate, Restart, Shut down and Start. It’s possible to make a selection of multiple computers and OU’s by holding down [Ctrl] while left clicking the wanted objects.
Figure 6: ADUC MMC extended
If you are wondering, as I did, if the changes also apply to non-DC’s (or management computers ), the answer is: Yes! After installing the Windows Server 2003 Admin Pack Service Pack 1 Administration Tools Pack on a Windows XP Professional client, the .NET Framework 2.0 and Specops Gpupdate, the management console looked just as nice as on the DC and had the same features available.
The Gpupdate option
The first option we have is to perform a Gpupdate command remotely on the selected computers. After choosing Gpupdate we must confirm the selection, see figure 7, and select if we want to use the force option.
Figure 7
After clicking OK a dynamic graph is presented, see figure 8, and a status report on how the update went.
Figure 8
The Restart and Shutdown option
The next two options, ‘Restart’ and ‘Shutdown’ are both “nice to have” management features, right where we need them, in ADUC. We can force the restart or shutdown, specify the number of seconds the user will have to close any open applications and send the user a customized message. Scripting this is not that hard to do using WMI or sending Shutdown.exe with the proper switches – but with Specops Gpupdate we get this functionality for free, no additional work to be done.
Figure 9: The confirm restart dialog
The Start option
The last of the four options, called ‘Start’, is actually Wake on LAN (WOL) functionality built-in to ADUC. When selecting and confirming this, see figure 10, so called Magic packets are sent against the clients MAC address to make them boot. WOL must be supported by the BIOS of computers of course. Specops Gpupdate communicates with Microsoft DHCP servers in the enterprise to find the info needed to perform this process, so it’s only possible to wake DHCP clients and only in network environments with Microsoft DHCP servers deployed.
Figure 10: Confirm starting remote WOL enabled computers
By the way, scripting WOL is actually possible too, but showing how to do this is far beyond the scope of this article.

Tuesday, August 11, 2009

Learn Microsoft Windows XP - Video Tutorial





Learn Microsoft Windows XP - Video Tutorial

Know your computer's world inside and out. In only three hours Video Professor will equip you with the knowledge you need to work smarter and faster using Windows XP.
This lesson set is designed to work with all versions of Microsoft Windows, so even if you're uncertain of the version of Microsoft Windows you're using, Video Professor has you covered!

http://hotfile.com/dl/9298775/b99d726/VP_L.part1.rar.html
http://hotfile.com/dl/9298778/8c16ea8/VP_L.part2.rar.html
http://hotfile.com/dl/9298785/f939a00/VP_L.part3.rar.html

http://www.storage.to/get/xlmwNAUx/VP_L.part1.rar
http://www.storage.to/get/wilc70DL/VP_L.part2.rar
http://www.storage.to/get/8bwWoBk4/VP_L.part3.rar

Essential Massage and Aromatherapy – Instructional Video Tutorial





Essential Massage and Aromatherapy – Instructional Video Tutorial

Massage and Aromatherapy have been recognized as healing aids for thousands of years. Everyone living and coping with today’s life can find that stress levels make relaxation difficult or impossible. Massage combined with aromatherapy can be used to alleviate the symptoms of stress, tension and fatigue. This program covers techniques of massage, the use of oils and blending. This instructional program is set to a beautiful Mediterranean backdrop.

http://hotfile.com/dl/9190424/3f3a4b5/msgarothpy.part1.rar.html
http://hotfile.com/dl/9190429/c191dfc/msgarothpy.part2.rar.html

http://ul.to/a0bk10/msgarothpy.part1.rar
http://ul.to/n35g50/msgarothpy.part2.rar

XP - 200 Hacks,Tweaks, Mods and Customizations





XP - 200 Hacks,Tweaks, Mods and Customizations

A complete guide on Hacking Windows XP!

XP Your Way:

- Boost up Boot Speed
- Max. Security
- Total Makeover
- Accelerate Surfing and Downloads

http://hotfile.com/dl/9579343/45178df/H_W_X.rar.html

Wi-Fi Toys 15 Cool Wireless Projects for Home, Office, and Entertainment





Wi-Fi Toys 15 Cool Wireless Projects for Home, Office, and Entertainment - Ebook

This ultra-cool volume invites readers to tap into your inner geek and build seventeen ultra-cool wireless devices including a solar powered access point, a wireless picture frame that dynamically changes its own photos, and even a wireless car-to-car audio and video system. This book provides readers with hands-on instruction and insider tips and tricks from those who are on the bleeding edge of wireless technology.

http://hotfile.com/dl/9676506/d30c0d1/wTfunbox.rar.html

http://qubefiles.com/?file=/getfile/05aed302ca4a3deea1a8615f71f1ccd9bded588cff2a2a3fa7/wTfunbox.rar.html

How To Give A Relaxing Massage - Instructional Video Tutorial





How To Give A Relaxing Massage - Instructional Video Tutorial

Join Lita who uses her best tried and true techniques, strokes, and tips and put them into this beautiful one hour instructional massage video.

http://hotfile.com/dl/10024511/da8b8bb/RelaxM.part1.rar.html
http://hotfile.com/dl/10024514/5715c25/RelaxM.part2.rar.html
http://hotfile.com/dl/10024516/b3b76c9/RelaxM.part3.rar.html

http://www.storage.to/get/NkQNfsQg/RelaxM.part1.rar
http://www.storage.to/get/RcEhXKgQ/RelaxM.part2.rar
http://www.storage.to/get/vksrJsbq/RelaxM.part3.rar

Super Utilities Pro 9.6.18





Super Utilities Pro 9.6.18

Super Utilities is a collection of applications that will fix, speed up, maintain and protect your PC.

Comprising four focus modules designed to do everything from cleaning your Registry to removing spyware infestations. Super Utilities is a megamart of system-maintenance tools designed to keep your computer running smoothly.

Super Utilities's integrated suite of programs can get your system running at peak performance levels in few minutes.

Here are some key features of "Super Utilities Pro":

· Disk Cleaner: Find and remove debris that has been left behind on your system by untidy programs, system freezes and sudden system restarts.
· Registry Cleaner: Clean and fix your registry to improve your PC's performance.
· Uninstaller Plus: Uninstall a program,remove invalid uninstaller information left on your computer and hide special uninstall entries to avoid other users from uninstalling programs .
· StartUp Manager: Add, remove, disable, and enable all of the programs that should Start with each Windows session.
· Memmory Turbo: No matter how much RAM you have, this smart memory management program will keep your computer running better, faster, and longer.
· Folder Guard: Hide your private files and folders from other users of your computer, to restrict access to important system files and protect them from damage.
· Tracks Washer: Cleans up all your tracks left by Windows, browser and many other programs. Protect your privac,save storage space and improve performance of your computer.
· Windows Manager: Manange all windows. You can close, topmost, show or hide them and use hotkey for special functions.
· Process Manager: Find out the the detailed information about the running processes,kill processes and forbit special programs to run.
· IE Protecrot: Protect Internet Explorer while you surf, preventing Web sites from running malicious code or changing your browser settings behind your back.
· AutoShutdown: An award-winning system shutdown/restart/logoff manager with many powerful capabilities.
· FolderSize: Find out which folders are the largest on your drives and recover megabytes on it.
· Driver Backup: Designed to backup driver of your system in case of system crash or reinstallation of Windows.

http://hotfile.com/dl/10024814/0bc1a8e/sprutlpr.rar.html

http://ul.to/hcasud/sprutlpr.rar

Monday, August 10, 2009

Boostr PRO 3.0.1 Build 498




eBoostr PRO 3.0.1 Build 498


eBoostr™ allows you to use an additional drive (flash memory or hard disk) as another layer of performance-boosting cache for your Windows XP®. There is no need to purchase a Vista upgrade to get the benefits of the Vista’s ReadyBoost® technology. With the newly developed eBoostr™, the booting of your OS and applications startup get much faster thanks to the smart caching mechanism.
No Costly Hardware Upgrades

eBoostr offers such an easy and relatively cheap solution to the problem of insufficient RAM, that you will have absolutely no need to buy additional memory.

Extremely Easy Way
All you need to boost your computer performance: is plug in a flash drive, choose it as a device to speed up your computer and set the amount of the memory space to be used.

Better Results on Favorite Apps
The product shows the best results for frequently used applications and data, which becomes a great feature for people who are regularly using office programs, graphics applications or developer tools.

Laptops Gain More
More applications are able to run without accessing the slow hard drive. This will surely attract a special attention of laptop owners as laptop upgrade is
usually more complicated and laptop hard drives are almost always considerably slower than those of desktops.

http://hotfile.com/dl/6618370/4f34b0e/eBoostr.Pro.3.0.1.498.rar.html

http://uploading.com/files/0Q2DQ7RV/eBoostr.Pro.3.0.1.498.rar.html

Lock My PC 4.7.10




Lock My PC 4.7.10


These days, computers are everywhere: from banks and government offices to shops and homes. People tend to rely on tireless machines more and more every day. We store our valuable data, personal and business-critical information, photos, credit card information, important phone numbers and vast amount of other private information on our hard drives. We install firewalls and anti-virus software to protect this data from outside intrusions and hijacks. However, according to reports by IT specialists, the majority of electronic data theft crimes happen due to improper protection of computer systems from the inside. Human factor is still the greatest security issue today.

http://hotfile.com/dl/7801895/3279cb2/L__My_PC.rar.html

http://uploading.com/files/XGOF9E8P/L_ My_PC.rar.html

Passware Windows Key Enterprise Edition v9.0 Build 319





Windows Key is an easy-to-use tool to gain access into any Windows system if a login password is lost. The software allows you to reset passwords in a matter of minutes - no need to reinstall the system.

Windows Key creates a password reset CD, USB Flash Drive or a driver floppy that work during the boot process and instantly reset Administrator or other account passwords and Windows security settings that prevent you from logging in.

General Features
100% recovery rate
All passwords are reset instantly
Windows Vista, Vista SP1 supported
All Windows Workstations supported
All Windows Servers supported (Windows Key Professional and Enterprise versions only)
Resets passwords with a bootable CD-ROM
Resets passwords with a bootable USB drive or driver floppy (Windows Key Professional and Enterprise versions only)
Burns password reset CD
Resets local Administrator passwords
Resets Domain Administrator passwords (Windows Key Enterprise version only)
Resets local policy settings
Resets secure boot options: startup password or startup key disk
Displays
properties
Supports all Service Packs
Supports RAID/SCSI/SATA drives Updated!

Download link
http://rapidshare.com/files/249213451/WindowsKey_9.0_319.exe

Super Utilities Pro 9.5 Multilanguage




Super Utilities Pro 9.5 Multilanguage


Super Utilities Pro offers 27 tools for fixing, speeding up, maintaining, and protecting your PC. It encompasses four suites of utilities: system cleaner, privacy protector, system maintenance, and special utilities. System Cleaner features a spyware-removal component as well as tools for cleaning your disk and the registry, and for performing routine maintenance tasks.

Full service for your windows PC
* Super Utilities offers 28 tools for cleaning,fixing, speeding up, maintaining, and protecting your PC.
* System Cleaner: Make your PC faster, more stable, and more efficient by cleaning and optimizing your hard drive, memory, software, and Windows Registry.
* Security Doctor: Protect your PC from thousands of potential spyware, adware, trojans, keyloggers and tracking threats.
* Privacy Protector: Keep your sensitive information safe from prying eyes.
* System Maintenance: Easily perform complicated system maintenance tasks, and keep your computer running quickly and smoothly.
* Special Tools: More easy-to-use tools that make your computing safer and more efficient.
* More windows utilities will be added.

- Disk Cleaner. Get rid of junk files on your PC
- Registry Cleaner. Clean and optimize your system registry
- Uninstall Plus. Completely uninstall any software
- Memory Turbo. Recover, defragment, & optimize system memory
- Shortcuts Repairer. Find and fix broken shortcuts
- Spyware Removal. Remove spyware, adware, trojans, and keyloggers
- StartUp Organizer. Start-up Windows faster
- Super Task Manager. Take control of all running processes
- Service Manager. Take control of all windows services
- BHO Cleaner. Remove unwanted browser helper objects
- IE Password Manager. Manage passwords and AutoComplete strings of IE
- Hide Folder. Hide your files and folders
- Tracks Washer. Cover the tracks you leave behind
- IE Privacy Manager. Manage typed URLS and history items of IE
- Super ExeLock. Password protect your programs
- Super Shredder. Securely delete sensitive information
- SuperMenu Guard. Protect favorite sites and start menu
- Windows Manager. Tailor windows to meet your individual needs
- IE Protector. Protect the settings of Internet Explorer
- Driver Backup. Grab all of your drivers, and store them for you in a safe place
- File Type Manager. A sophisticated file type management tool
- Windows Tools. Several essential utilities of windows
- System Information. Gather information about your hardware and software
- Auto Shutdown. A complete shutdown, restart, and logoff manager
- Folder Analyzer. Find out where all your hard drive space went
- Super Undelete. Recover deleted files
- Super Shell. A unique handy collection of tools
- Super Mounter. Mount ISO file as virtual CD-ROM

http://uploading.com/files/7UGWHKCF/PSUP95.rar.html

http://qubefiles.com/?file=/getfile/01b0230c1a6a70cd703715dc5501a3f988ed588cff2a2a3fa7/PSUP95.rar.html


Google