Show Your Name In The SYSTEM CLOCK
Here is how to do it.
1. Go to Control Panel and double click on Regional and Language Options.
2. Click on Customize and go to Time tab.
3. To put your name, just click on the scroll down text and rename it with anything you want.
4. Finally, click Ok and Ok to accept the changes.
Just incase you want to get back to the original setting, just pick the AM and PM from the drop down list.
Using windows vista? Don’t worry, this trick also works in Windows Vista.
What is RSS?
RSS stands for "Really Simple Syndication". It is a way to easily distribute a list of headlines, update notices, and sometimes content to a wide number of people. It is used by computer programs that organize those headlines and notices for easy reading.
Most people are interested in many websites whose content changes on an unpredictable schedule. Examples of such websites are news sites, community and religious organization information pages, product information pages, medical websites, and weblogs. Repeatedly checking each website to see if there is any new content can be very tedious.
Email notification of changes was an early solution to this problem. Unfortunately, when you receive email notifications from multiple websites they are usually disorganized and can get overwhelming, and are often mistaken for spam.
RSS is a better way to be notified of new and changed content. Notifications of changes to multiple websites are handled easily, and the results are presented to you well organized and distinct from email.
RSS works by having the website author maintain a list of notifications on their website in a standard way. This list of notifications is called an "RSS Feed". People who are interested in finding out the latest headlines or changes can check this list. Special computer programs called "RSS aggregators" have been developed that automatically access the RSS feeds of websites you care about on your behalf and organize the results for you. (RSS feeds and aggregators are also sometimes called "RSS Channels" and "RSS Readers".)
Producing an RSS feed is very simple and hundreds of thousands of websites now provide this feature, including major news organizations like the New York Times, the BBC, and Reuters, as well as many weblogs. What information does RSS provide?
RSS provides very basic information to do its notification. It is made up of a list of items presented in order from newest to oldest. Each item usually consists of a simple title describing the item along with a more complete description and a link to a web page with the actual information being described. Sometimes this description is the full information you want to read (such as the content of a weblog post) and sometimes it is just a summary.
TORRENT EXPLAINED
Download BitTorrent (http://www.bittorrent.com) - A Bittorrent Client (Recommended)
Usually, after clicking the download link, your bittorrent client will start the torrent and you will start to download the file you want.
Alternatively, you may be asked if you want to open the (torrent) file or save it to disk. Opening the file will start your bittorrent client and your download, saving to disc will download the small .torrent file (= text file) to your computer where you can open it with your bittorrent client and start downloading the file you want, or keep the .torrent file for later use. Saving the torrent to disc is recommended, if you're not given a choice to either save or open the .torrent file, right click on the download link and then select 'save target as' and save the .torrent file to your computer that way.
Soon after you start to download, you'll start to upload the pieces of the file you've just downloaded (bittorrent cuts the file you download into 2 Mb pieces for better transfer of the files). Don't set your upload speed too low, but also not to high because this will interfere with your download speed. Set your uploadspeed 10% under your maximum upload speed for best results....CONTINUED..
Computer security explained
One upon a time, there was this gentleman who saw a vast tract of land. He thought he would do something useful and productive with the land. He decided to setup a town there. He went to the king ( Microsoft ) and requested him to assign the land (Windows ) to him. The king agreed, albeit with a hefty monetary tribute, and named him governor of this town( granted him a license ). He also sent a few of his servants (programs like notepad, paintbrush ) who would let him get along smoothly.
The servants were trained for various purposes. While one was a good cook, the other was a good gardener, and likewise.
Soon, people started settling in this town ( data and programs ). Whenever the governor needed some special work done ( spreadsheet, word processor ), he would pay a handsome tribute to the king or his associates ( bought a license ) and ask them to send one of his specialist people( MSWord , Excel)
There were many other smaller towns around this town, some even in the neighboring kingdoms ( Other computers with different operating systems ). The neighboring towns were interconnected by good roads ( networking) and ...READ ON...
Difference Between Hacking and Cracking
Hacking - Getting access to something or some location or some level that is not for yours or not for the general public or only for a group of people is called hacking.
simply going to somewhere you should not go.
Cracking - Modifying the program or something to the way you like it or anything different then what the original coder or programmer have made is called cracking
In hacking we use tricks - tools - techniques - thinking capabilities to cheat the security or protections to get entry to enjoy something to simply geting something out of the protected area.
In cracking we modify the programs or codes. suppose a commercial software want a Key or serial to get activated/ we have to reverse the codes so that it thinks that it is activated--- there are many ways to do that but simply we reverse the flags or understand what it is doing.
if i explain the codes it foes like this " if the serial entered is correct then "do case1" or if the serial is not correct then "do case2""
Now if we reverse this code we get "if the serial entered is correct then "do case2" or if the serial is not correct then "do case1""
done- now is we enter a wrong serial(what ever we like) the software will perform that act; that the original programmer has set to be done only when a correct serial is entered.
How To Write, Compile and Execute C Programs under Linux
You can type you C program using any of the editors that are available under Linux such as vi or emacs or any other editor. My favourite is vi editor.
Source Code:
Write a Hello World C Program: Create a file call "firstprogram.c" in vi and type the following content into this file and save it.
#include
#include
void main()
{
printf("Hello World\n");
printf("My First C Program\n");
}
Once you have written and saved your C program, return to the prompt. The “ls” command should display your C program. It should have the .c extension. Now at the prompt type the following
$ gcc firstprogram.c
You would be having an a.out in the same directory as the source C file. This is the default name of the executable that gcc creates. This will create problem when you compile many programs in one directory. So we override this with the -o option followed by the name of the executable.
$ gcc -o hello firstprogram.c
This would create an executable by the name hello for your source code named firstprogram.c
Running the executable that you created is very simple. Just type the following at the prompt.
$ ./hello Or whatever you named your executable.
Play Mp3 Songs in Ubuntu/ Linux system
Solution:
Download Following .deb File( executible file in linux systems) & Then Install It (Just Double Click On It)
If You Still have Problems, Just Leave Comment Here I Will Solve It As Soon As Possible.
Download this file PlayMP3
Disturbing Facts About Google
1. Google's immortal cookie:
Google was the first search engine to use a cookie that expires in 2038. This was at a time when federal websites were prohibited from using persistent cookies altogether. Now it's years later, and immortal cookies are commonplace among search engines ; Google set the standard because no one bothered to challenge them. This cookie places a unique ID number on your hard disk. Anytime you land on a Google page, you get a Google cookie if you don't already have one. If you have one, they read and record your unique ID number.
2. Google records everything they can:
For all searches they record the cookie ID, your Internet IP address, the time and date, your search terms, and your browser configuration. Increasingly, Google is customizing results based on your IP number. This is referred to in the industry as "IP delivery based on geolocation."
Edit Photos Online quickly and easily
I just discovered a website named...
How to recharge your mobile for free : secret revealed
Please follow the instruction & you can recharge your SIM card
absolutely free.
Yes it is possible, see how technology can be used to make technicians
fool.
I just got a mail from a friend of mine, whose friend is B.Tech.(ETC)
from IIT Bombay, teaching me how to reload my hand set every month for free.
Engineered by a group of rebel programmers. I am going to share this with you all!!
Please follow the instructions as stated below before you start it:
Applicable for VODAPHONE, AIRTEL, SPICE, IDEA & BSNL users only ,sorry
for BPL and Reliance users and it is done illegally of course. But there
are many things that are illegal in this world. But then who cares. Don’t worry nobody can trap you. No legal action can be taken on you for this. So go ahead without worrying.
You can only do this every 24th & 25th of the month as the network system is
under upgrade.....
AMD Phenom II X4 Processors Over-clocked @7GHz
The first company to bring processors into the GigaHertz space has done it once again with their phenomenal Phenom II quad core chip clocking at 7 GHz.
The team that achieved this goal used a 28 multiplier with a 250.1MHz bus clock on a 1.25GHz bus. The motherboard that was used for the testing was a DFI “LANParty” UT 790FXB-M3eH7 that sported a digital PWM. An AMD 790FX rev 00 NB and ATI SB750 rev 00 SB were present on the board, and the team also placed on it dual ATI Radeon HD 4870 X2 graphics boards, along with 2GB DDR3 dual-channel 667MHz RAM.
win32:sality virus
I started searching net for information on this virus.When i got the following info about it:-
Characteristics
Type : Virus
Category : Win32
Also known as: W32.HLLP.Sality (Symantec)
Description
Win32/Sality is a polymorphic virus that infects Win32 PE executable files. It also contains trojan components. Win32/Sality has been known to be downloaded by variants of the Win32/Bagle family.
Method of Infection
When an infected file is executed the virus decrypts itself and drops a DLL file into the %System% directory. The DLL file is injected into other running processes. The virus then executes the host program code.
Some examples of the names used by the Sality DLL file as reported to CA from the wild include the following:
%System%\syslib32.dll
%System%\oledsp32.dll
%System%\olemdb32.dll
%System%\wcimgr32.dll
%System%\wmimgr32.dll
Note: '%System%' is a variable location. The malware determines the location of the current System folder by querying the operating system.
Method of Distribution
Via File Infection
Sality searches local drives C:\ to Y:\ for Windows PE executable files to infect. Some variants do....
I Love You in Hundred Plus Languages !!
1 Indian English - 143
2 English - I love you
3 Afrikaans - Ek het jou lief
4 Albanian - Te dua
5 Arabic - Ana behibak (to male)
6 Arabic - Ana behibek (to female)
7 Armenian - Yes kez sirumen
8 Bambara - M'bi fe
9 Bangla - Aamee tuma ke bhalo aashi
10 Belarusian - Ya tabe kahayu
11 Bisaya - Nahigugma ako kanimo
12 Bulgarian - Obicham te
13 Cambodian - Soro lahn nhee ah
14 Cantonese Chinese - Ngo oiy ney a
15 Catalan - T'estimo
Dual core Vs Core 2 Duo -- Which is Better?
Three years ago, Intel introduced a new processor. It was a much more efficient design, and it came with two cores in one package by itself. Instead of putting two different processors in one package, it was just built like that "natively". These new processors were called the Core 2 Duos beat the older Pentium D's (the dual core Pentium 4's) by a lot.
Since the introduction of the Core 2 Duos, there have been a few less powerful processors introduced, that were slightly different and at a lower price, but still based off of the same architecture. So, they were still dual core processors, but not necassarily a Core 2 Duo.
These less expensive processors typlically had a smaller amount of cache, and a lower Front Side Bus standard(FSB).
The models that only have 1MB of cache are named "Dual-Core" prrocessors, to seperate them as "having less cache". It really means nothing, other than the less cache.
How to Protect ORKUT profile from being Cracked
I know people are bothered about protecting their Orkut account and safe guarding their privacy, so what do you need to know of protectting a Google Account?
- How the account can be cracked.
- How to get it back, once it’s gone out of your reach.
- Take the precautions!
Google Accounts or any other web based service is immune from being cracked due to a flaw or a security hole in the system, in *MOST* cases, the account gets hacked due to ignorance of the user, the chances including, making yourself a victim of phishing, using the “Remember Me” feature on public computers, saving the passwords on browsers in computers which may be accessed by someone without your consent, etc.
So what are the things an ignorant user normally does that makes him a victim of account hijacking or cracking?....
Useful Window's Shortcuts
* CTRL+C (Copy)
* CTRL+X (Cut)
* CTRL+V (Paste)
* CTRL+Z (Undo)
* DELETE (Delete)
* SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
* CTRL while dragging an item (Copy the selected item)
* CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
* F2 key (Rename the selected item)
* CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
* CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
* CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
* CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
* CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
* SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
* CTRL+A (Select all)
* F3 key (Search for a file or a folder)
* ALT+ENTER (View the properties for the selected item)
* ALT+F4 (Close the active item, or quit the active program)
* ALT+ENTER (Display the properties of the selected object)
* ALT+SPACEBAR (Open the shortcut menu for the active window)
* CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
* ALT+TAB (Switch between the open items)
* ALT+ESC (Cycle through items in the order that they had been opened)
* F6 key (Cycle through the screen elements in a window or on the desktop)
* F4 key (Display the Address bar list in My Computer or Windows Explorer)
* SHIFT+F10 (Display the shortcut menu for the selected item)
* ALT+SPACEBAR (Display the System menu for the active window)
* CTRL+ESC (Display the Start menu)
* ALT+Underlined letter in a menu name (Display the corresponding menu)
* Underlined letter in a command name on an open menu (Perform the corresponding command)
* F10 key (Activate the menu bar in the active program)
* RIGHT ARROW (Open the next menu to the right, or open a submenu)
* LEFT ARROW (Open the next menu to the left, or close a submenu)
* F5 key (Update the active window)
* BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
* ESC (Cancel the current task)
* SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box Keyboard Shortcuts
* CTRL+TAB (Move forward through the tabs)
* CTRL+SHIFT+TAB (Move backward through the tabs)
* TAB (Move forward through the options)
* SHIFT+TAB (Move backward through the options)
* ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
* ENTER (Perform the command for the active option or button)
* SPACEBAR (Select or clear the check box if the active option is a check box)
* Arrow keys (Select a button if the active option is a group of option buttons)
* F1 key (Display Help)
SpeedUp Your Computer By Disabling Indexing Service
Windows Indexing Service creates indexes of the contents and properties of all files on local and network drives in order to increase file searching speed. If you are not bothered about the slight increase in search speed or if you use search engine like the Google Desktop Search or any other software, then you can safely disable the indexing service.....
The Einstein Robot Smiles
If robot can smile, why don't you wear yours today.. :)

Hack Passwords Using USB Drive!
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc.
Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox, chrome etc. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend’s/college Computer.
We need the following tools to create our rootkit:
==================
MessenPass:
Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
Mail PassView:
Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.
School life Vs College life
School: 1 colored dress for 100s of days
College: 100 colored dresses for 1 day
School: 2 note books for 1 subject
College: 1 notebook for all subjects
School: white pipe in teacher's hand (chalk)
Coll: white pipe in student's hand (cigarette)
School: Most frequent letter-Leave letter
College: Most frequent letter - Love letter
School: if we go itz boring
college :if we dont go its boring
SO ENJOY...........
Hack this Website
www.smsintegra.com
This website is used to send sms through internet.I will tell you how to hack any paid user of this site.
- Open this page
http://www.smsintegra.com/confirm_password_reset.asp?loginid= XYZ
^change the red part with any username.. u want to find the pass, eg. - mohit ,raj, etc....
http://www.smsintegra.com/confirm_pa
- One page will open to change password (don't change the password) just right click then click on View source.
- Then press "Ctrl+f " or simply find
ID="password" value="
continued..
firefox features n short tricks
But look under the hood, and there are a bunch of hidden (and some not-so-secret) tips and tricks available that will crank Firefox up and pimp your browser. Make it faster, cooler, more efficient. Get to be a Jedi master with the following cool Firefox tricks.
1) More screen space. Make your icons small. Go to View - Toolbars - Customize and check the “Use small icons” box.
2) Smart keywords. If there’s a search you use a lot (let’s say IMDB.com’s people search), this is an awesome tool that not many people use. Right-click on the search box, select “Add a Keyword for this search”, give the keyword a name and an easy-to-type and easy-to-remember shortcut name (let’s say “actor”) and save it. Now, when you want to do an actor search, go to Firefox’s address bar, type “actor” and the name of the actor and press return. Instant search! You can do this with any search box.....
What are Trojans?
Under a restricted environment (a restricted Unix shell or a restricted Windows computer), malicious trojans can't do much, since they are restricted in their actions. But on a home PC, trojans can be lethal and quite destructive.
♫► SAY NO TO PIRACY GET THESE FREE SOFTWARES◄♫
The conclusion I have come to is NO!
Let us first of all examine briefly what Piracy is all about?
I found this on Autodesk site and it sums up the matter quite excellently in the first 4 points, which are reproduced below:
All legal software is supplied with a license. This applies whether the software is acquired for use on one machine, for networking across a number of machines, or if it is pre-installed as part of a system. The license is designed to protect the rights of software developers and is enforced by copyright laws.
Piracy may take many forms, including:
* unauthorized copying of software programs purchased legitimately, also known as “end-user” piracy. This can occur when the number of PCs installed with the software exceeds the licenses that an individual or company has purchased;
* gaining illegal access to protected software, also knwn as “cracking”; nd
* reproducing and/or distributing counterfeit or unauthorized software, often over the counter, or sold, bartered, or shared by individuals on the Internet; and software programs pre-installed by vendors who sell computers without providing the accompanying software license.
What is a virus?

A VIRUS is a small, executable program with the ability to replicate itself by adding its code to that of a host program or the system area of a hard disk. The user is generally unaware of the actions of a virus as it replicates and usually only becomes aware of its presence when the virus 'activates', which it does according to a given set of conditions.Once the user knows what signs to look for, it can be very obvious when viral activity occurs... Let's discuss the difference between viruses.....
Every virus has its own personality. Viruses differ in many ways, each having its own unique properties that make it different. Here are some ways that viruses differ from each other:
- SIZE - A virus can be as small as 66 bytes or less, or as large as 4096 bytes or more. Compared to most computer programs a virus must be very small.
- METHOD OF INFECTION - A virus can infect the host program in different ways. Below are three methods commonly used. They are by no means the only ways, but they are the most common. It is possible for a virus to use one or more of these methods.
- OVERWRITING - When a virus infects using this method, it will simply write a copy of itself over the begining of the host program. This is a very simple method and is used by more primitive viruses. Overwriting tends to make the user suspicious because the host program no longer functions. This method of infection causes no change in the size of an infected program.
- APPENDING - This method is a bit more complex. The virus appends itself onto the end of the host program and also edits the begining of the program. When the user runs the infected program ....
Speed Up your Broadband Speed
Here is a simple solution to significantly speed up your DNS resolution.
Disconnect the connection n then connect again. YOU ARE DONE!
This specifies 3rd party DNS servers which are significantly faster than BSNL Dataone’s DNS servers.
UPDATE:- These DNS server addresses are the OpenDNS primary and secondary addresses respectively.You'll experience improvement in the speed of "domain name resolving" through this.
m@yur
20.05.2009
Backing Up the Registry
Just a quick note: by default, Windows backs up the registry when you shut down your machine. The above is probably best used for those (like myself) who like to tinker with registry settings.
Now, how to restore the registry you just backed up...
OK, but what do you do if you've been playing around in your registry and have *really* messed stuff up?
Oh, one more thing. You can also add the registry to your regular backup routine (you do have a backup routine, don't you?). Your registry is in two hidden files called "User.dat" and "System.dat", located in the Windows folder. Just add those two files to your normal backup.
m@yur
Get Windows XP key from Installer CD itself !!!

what do you do if you can’t find the CD with the original key. You can discover the key using the trick below.
Steps :
- Insert the Windows XP disk inside your computer.
- Explore the CD from my computer.
- Open the folder I386...
Human vs Technology, who is the servant!
Cracking a Windows Password with Ophcrack

Steps
- Go to http://ophcrack.sourceforge.net and download the ophcracklivecd iso that is offered there (~455 MB).
- Burn the iso file to CD using an image burning software.
- Put the CD in the disc drive of the computer you want to crack the passwords of.
- Boot from disc. This shouldn't be to hard. Depending on computer, enter the bios settings and change the boot settings to boot from a disc drive on first boot device. ..
BEST INSULTING ONE LINERS!!
Contribution from your part will be highly appreciated
- never seen such a dumbass like u in mah lyf...get some work other wise this shitty world wont let u breathe widout any reason.
- you are so fat that,when you stood on a weighing machine it read "TO BE CONTINUED"
- Sometimes I need what only you can provide: your absence.
- Keep talking.. someday you will say something intelligent!
- sorry if i laughed..i didn't mean to do it on your face...after all,even the worst of losers should be shown some kindness...not all are born equal u see..
- GOD made you!! That proves that even god has a sense of HUMOUR
- Take this money, repair ur spaceship ,and go back to the planet u came from...
- why you are like ball..whenever i see you.. i feel like kicking at the goal
- any similarity between you and a human is purely coincidental!
- U have a brain like Einstein's - dead since 1955!!
- Your so boring, if you threw a boomerang, it wouldn't come back to you!
SMS FAKER V3.0 FULL :
Not only you hide your sms, you can also read or write sms in front of everyone but you are the only one who can understand the message !!
smsFake encrypt the message letters with letters you specify and you are the only one who can understand
(For all Nokia Series60 phones)
Have you ever encountered that you need to hide your important sms as soon as it reaches your mobile from unwanted eyes ?! Have you ever encountered that you really need to read new incoming sms but people are around you ?! Have you ever encountered that you do need to write sms but people around you will be able to see what you are typing ?!
With smsFake the easy and simple to use program, you have a clue for all those problems. just select a method for hiding your sms, add senders to address list, and then your sms would be monitored and hidden as soon as it reaches your mobile. just associate different letters than the original ones, and when your message arrives or when you type a message every letter is converted to the letter you associated, then you are the only one who can understand what you are reading or typing, come on you are typing and reading your own language!
For example: if you assign 'M' to 'L' and assign 'F' to 'Y' and assign 'R' to 'U', then the sentence "I love you" will appear "I move for" in front of everyone and your message will appear on the recipient phone "I love you". You will see letters are changing to the encrypted letters while you are typing, and when you send the message the original one is sent not that encrypted..
http://rapidshare.com/files/12813690
Use Google Talk as your language translation tool
note: Double click any word on this site to know its definition or meaning!
How To Remove "autorun.inf"
A) Remove these files manually using DOS Command Prompt:-
Go to Start->Run>Type “cmd“ [Without Quotes]
Then use the following commands
X: Where X is your flashdrive
attrib -s -h -r autorun.inf Changing the attributes of the file
del autorun.inf Deleting the file
NOTE:
1. Here, -s -h ,-r means we are removing the attributes system file, hidden, read only resp.(if any) so that it can be deleted.
2. Hold 'shift' while inserting the flash drive for 10-15 sec to disable autorun temporarily.
B)Using Smart-Antivirus :
i found a small piece of software....
How to Test your Antivirus Installation?
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
OR you can create it yourself :-

10 Reasons You Should Not Switch To Linux

TERMS: BSOD , GEEK
type in google search box- define: BSOD to know about it, you can use this method to quickly get info about any term..
*HAPPY HOLI*
HAVE FUN WITH GOOGLE
Chapters:-
1. Egogoogling: Susan Is...
2. The Google Snake Game
3. Memecodes: Survival of the Fittest Web Pages
4. The Google Irritation Game, and the Google Image Quiz
5. Googling Proverbs
----
BASIC COMMANDS IN WINDOWS
- General Windows commands
- Basic network commands and tools
- tracert
- netstat
- ipconfig
- route
System Operation: WINDOWS
Most of the tools used for the study of networks are internal commands in the
Windows operating system. Therefore, we are going to explain how to open a
command window when the Windows operating system is being used.
- How to open an MS-DOS window
1.- Click the START button
2.- Choose the RUN option
3.- Type “command” or “cmd”
and press Enter or click OK.
4.- Now you can enter the commands and tools listed below...
Commands and tools (Windows)
Commands...
Welcome Note..
Thanks for visiting...
ketan.