Friday, September 19, 2008

I.T. Training: LINUX LPIC - Build your Linux Skills

Build your Linux skills

Introduce yourself to Linux, and advance your proficiency, through a spectrum of self-paced tutorials. With these tutorials, you can build fundamental skills on Linux systems administration at your level of expertise:


Prepare for LPI certification

The Linux Professional Institute (LPI) certifies Linux® system administrators at three levels:

  • Certification level 1 (Junior level)
  • Certification level 2 (Advanced level)
  • Certification level 3 (Senior level)

To attain certification level 1, you must pass LPIC-1 exams 101 and 102.
To attain certification level 2, you must pass LPIC-2 exams 201 and 202.
To attain certification level 3, you must pass LPIC-3 exam 301 ("core") and have an active certification level 2. You may also need to pass additional specialty exams at the senior level.

Before you take the exams, review these developerWorks tutorials, designed as study guides for each topic in the five exams. These tutorials serve as a comprehensive self-study guide so you can take the exams with confidence. Get started with the tutorials on these pages, and we'll add the rest as we complete them. Good luck in preparing for certification!

Full Courses download links:

LPIC-1: http://w14.easy-share.com/f/1325964007.html

LPIC-2: http://w14.easy-share.com/f/1325964008.html

LPIC-3: http://w14.easy-share.com/f/1325964009.html

Enjoy!

Lam Hung

Monday, September 15, 2008

I.T Training: CNIT 123 Ethical Hacking and Network Defense

Instructor: Sam Bowne

Catalog Description

Students learn how hackers attack computers and networks, and how to protect systems from such attacks, using both Windows and Linux systems. Students will learn legal restrictions and ethical guidelines, and will be required to obey them. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, exploiting Windows and Linux vulnerabilities, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.

Prerequisites: CNIT 106 and 120 or equivalent familiarity with the fundamentals of networking and security.

Upon successful completion of this course, the student will be able to:
  1. Explain what an ethical hacker can and can not do legally, and explain the credentials and roles of penetration testers.
  2. Define the types of malicious software found in modern networks.
  3. Explain the threats and countermeasures for physical security and social engineering.
  4. Perform footprinting to learn about a company and its network.
  5. Perform port scans to locate potential entry points to servers and networks.
  6. Perform enumeration (finding resources, accounts, and passwords) on Microsoft, Netware, and Unix/Linux targets.
  7. Perform very simple programming in C, HTML, and Perl, specifically oriented towards the needs of network security professionals.
  8. Learn how to identify Microsoft Windows vulnerabilities and to harden systems.
  9. Learn how to identify Linux vulnerabilities and to protect servers.
  10. Describe how to take control of Web Servers, and how to protect them.
  11. Locate and hack into wireless networks, and protect them.
  12. Explain how cryptography and hashing work, and perform attacks against them such as password cracking and man-in-the-middle attacks.
  13. Describe and deploy security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots.
Full course download:
Chapter 1: http://w17.easy-share.com/1701576129.html
Chapter 2: http://w17.easy-share.com/1701576129.html
Chapter 3: http://w17.easy-share.com/1701577103.html
Chapter 4: http://w17.easy-share.com/1701577109.html
Chapter 5: http://w17.easy-share.com/1701577115.html
Chapter 6: http://w17.easy-share.com/1701577120.html
Chapter 7: http://w17.easy-share.com/1701577131.html
Chapter 8: http://w17.easy-share.com/1701577163.html
Chapter 9: http://w17.easy-share.com/1701577251.html
Chapter 10: http://w13.easy-share.com/1701577256.html
Chapter 11: http://w13.easy-share.com/1701577257.html
Chapter 12: http://w13.easy-share.com/1701577258.html
Chapter 13: http://w13.easy-share.com/1701577263.html

Enjoy.
Lam Hung

Thursday, September 11, 2008

Trouble-shooting: Cd Rom Drive Does Not Appear In Explorer

Cannot Access CD-ROM and "Code 31" Error Message in Device Manager After You Remove Adaptec Easy CD Creator from Your Computer

Article ID:270008
Last Review:February 27, 2007
Revision:5.3
This article was previously published under Q270008
For a Microsoft Windows XP version of this article, see 314060 (http://support.microsoft.com/kb/314060/EN-US/).

This article also applies to Adaptec Easy Creator 5.01.

SYMPTOMS

After you remove Adaptec Easy CD Creator versions 5.01 and earlier or DirectCD version 3.01 or 3.01c from your computer, your computer may experience the following behavior:
You are cannot access your CD-ROMs in My Computer.
In Device Manager, the following error message occurs with all CD-ROM devices connected to your system:
The device is not working properly because Windows cannot load the drivers required for this device (Code 31).
The Device Manager displays the following error code message:
A driver for this device was not required, and has been turned off (Code 32 or Code 31).
NOTE: You may also receive an error code 39 message that indicates that the driver is corrupted.

The Device Manager displays the following error code message:
Your registry might be corrupted. (Code 19)
This code means that the registry returned an unknown result.

Back to the top

RESOLUTION

Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
322756 (http://support.microsoft.com/kb/322756/) How to back up and restore the registry in Windows

There are two supported methods to resolve this issue.

Back to the top

Method One

1.Remove the Upperfilters and Lowerfilters values completely from the following registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E965-E325-11CE-BFC1-08002BE10318}
NOTE: If you are getting a code 39 message, it may be that additional third-party filter drivers were added to UpperFilters and LowerFilters values in addition to Adaptec filter drivers. In that case, you may try to remove the non-Adaptec filter drivers first, leaving the Easy Creator filters in place to see if the Code 39 goes away. If you still receive an error code 39, 32, or 31 message, remove the Upperfilters and Lowerfilters values completely in the preceding key.

2.Restart your computer.

Back to the top

Method Two

If the above method does not resolve the code 31 error message and restore access to your CD-ROMs, if you also have Media Player version 7.0 installed, you can uninstall Media player version 7.0 and download and install the latest release posted at the following Microsoft Web site:
http://www.microsoft.com/windows/windowsmedia (http://www.microsoft.com/windows/windowsmedia)

Back to the top

STATUS

This is a known issue with Easy CD Creator versions 5.01 and earlier, and DirectCD versions 3.01c and earlier.

Back to the top

MORE INFORMATION

This issue may also occur with the latest versions of Easy CD Creator 5.01 and DirectCD 3.01d or later.

The third-party products that are discussed in this article are manufactured by companies that are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, regarding the performance or reliability of these products.

NOTE: There may be other third party CD-Writing Software that exhibit similar behavior. Some or all of these troubleshooting steps can apply to them if they also add entries under the UpperFilters or LowerFilters registry values by either adding their filter drivers or by removing the registry keys and values outlined in this article that start with:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E965-E325-11CE-BFC1-08002BE10318}
WARNING: Ensure you perform a backup of your registry before you make any changes.

(From microsoft.com)

Wednesday, September 10, 2008

[Tutorial] Trace E-mail sender from e-mail header

Here I shall discuss, how to trace an email sender from the email header. I shall take my MSN account as an example. But before I go into depth I shall split the email header and explain each one of them for better understanding.
Viewing Email Header
Every e-mail comes with information attached to it that tells the recipient of its history. This information called a header. The above is the Full header of email .All this information comes with the email. The header contains the information essential to tracing an e-mail. The main components to look for in the header are the lines beginning with "From:" and "Received:" However, it might be instructive to look at what various different lines in the header mean.



MIME-Version: 1.0
Received: from rwcrmhc11.comcast.net ([204.127.198.35]) by mc7-f12.hotmail.com with Microsoft SMTPSVC(5.0.2195.6713); Tue, 25 Nov 2003 19:56:18 -0800
Received: from pavilion (pcp03530790pcs.mnhwkn01.nj.comcast.net[68.37.24.150]) by comcast.net (rwcrmhc11) with SMTP id <20031126034457013001nk6pe>; Wed, 26 Nov 2003 03:44:57 +0000
X-Message-Info: JGTYoYF78jGkTvdOiviUvHyY85nt7iLD
Message-ID: <000801c3b3cf$a92237a0$96182544@mnhwkn01.nj.comcast.net>
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1106
Disposition-Notification-To: "Leona"
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Return-Path: leona6256@comcast.net
X-OriginalArrivalTime: 26 Nov 2003 03:56:18.0897 (UTC) FILETIME=[3F5AFC10:01C3B3D1]



Some e-mail programs, like Yahoo or Hotmail, have their full headers hidden by default In order to view the full header, you must specifically turn on that option. Some ways of doing this in different e-mail programs follow here:


Viewing full Header in Yahoo and Hotmail
Yahoo

Click Options -> Click Mail Preferences -> Click Show Headers -> Click "All" -> Click "Save"

Hotmail

Click Options -> Click Mail Display Headings (under "Additional Options") -> Click Message Headers -> Click "Full" ->

Click "OK"



Viewing full Header in Email Clients like (Outlook and Eudora etc)
Outlook Express
If you use OE, at least the version I have (5.5), you may not have much luck; it sometimes gives little more information than what you can see in the main window. But here's the application path anyway:
Click File/Properties/Details to find the header information.

Outlook
First, highlight the email in your Incoming window, right-click on it, and select Options. The window that comes up will have the headers at the bottom.

Eudora
Be sure the message is open, then Click the 'Blah, Blah, Blah' button from the Tool Bar, and the headers will appear.

Pegasus
Select Reader/Show All Headers/

Netscape Mail
Select Options/Headers/Show All Headers

Netscape Messenger 4.0 and 4.5
Select View/Headers/All



Now I will discuss the full header in detail:



Message ID:
It is used to identify the system from which the the message has originated (i.e. from the system the sender has logged in). However, this is too easy to forge, and is consequently not reliable.



X-Headers:

X- headers are user defined headers. They are inserted by email client programs or applications that use email. Here from the X- headers inserted into the email by the email client it is clear that the sender has used Microsoft Outlook Express 6.00.2800.1106 to send this email.

X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1106



MIME-Version:
MIME stands for Multipurpose Internet Mail Extension. It tells the recipient what types of attachments are included in email. It is a format that allows people to send attachments that do not contain Standard English Words, but rather graphics, sounds, and e-mails written with other characters. The Mime-Version field merely confirms that the version of MIME used corresponds to the standard version (which is currently 1.0).



From:
Form is useless in tracing an e-mail. It consists of the email of the sender but this can be obviously be a fake. One can use any fake-mailer to fake the sender's name.


Content-Type:
This line tells the receiving e-mail client exactly what MIME type or types are included in the e-mail message. If the Content–Type is text/plain; charset="us-ascii" just tells us that the message contains a regular text message that uses English characters. ASCII is the American Standard Code for Information Interchange and is the system used to convert numbers to English characters.


Return-Path:
It is the address to which your return e-mail will be sent. Different e-mail programs use other variations of Return-Path:. These might include Return-Errors-To: or Reply-To etc.



Received:

This field is the key to find out the source of any e-mail. Like a regular letter, e-mails gets postmarked with information that tells where it has been. However, unlike a regular letter, an e-mail might get "postmarked" any number of times as it makes its way from its source through a number of mail transfer agents (MTAs). The MTAs are responsible for properly routing messages to their destination.



Let me strip-off the above email header to make the understanding easy. The header is splitted and the two received headers are given below.

Received Header 1: 204.127.198.35 - Tue, 25 Nov 2003 19:56:18 -0800
from rwcrmhc11.comcast.net ([204.127.198.35])
by mc7-f12.hotmail.com
with Microsoft SMTPSVC(5.0.2195.6713)


Received Header 2: 68.37.24.150 - Wed, 26 Nov 2003 03:44:57 +0000
from pavilion (pcp03530790pcs.mnhwkn01.nj.comcast.net[68.37.24.150])
by comcast.net (rwcrmhc11)
with SMTP
id <20031126034457013001nk6pe>



The MTAs are "stamped" on the e-mail's header so that the most recent MTA is listed on the top of the header and the first MTA through which the e-mail has passed in listed on the bottom of the header. In the above sample e-mail header, e-mail first passed through 68.37.24.150 (pcp03530790pcs.mnhwkn01.nj.comcast.net), and at last made its way through 204.127.198.35 (rwcrmhc11.comcast.net).



In the Received Header 2, the one marked with red colour "pavilion" is either the domain name of the server from which the email has originated or the name of the computer from which the email has been sent. By doing a DNS query for "pavilion", it is confirmed that it is not a know host name hence, must be the name of the computer from which the mail has originated. "68.37.24.150" is the IP address from which the mail might have originated or it is the IP address of the ISP (Internet Service Provider) to which the user was logged on while sending the mail.



Note: Correct me if I am wrong, most of the time "HELO" is prefixed to the system name from which the mail has originated, but its accuracy is not reliable.



Trace who owns the IP address
Every computers hooked on to internet is assigned with an IP address. Individual users possess a dynamic IP address when they logged on to any ISP to access internet. These IP addresses are assigned by the ISP itself. Organization usually possess static/public IP address which is stored in a database of registries.



There are three major registries covering different parts of the world. They are

www.arin.net => American Registry of Internet Numbers (ARIN) : It assigns IP addresses for the Americas and for sub Saharan Africa.

www.apnic.net => Asia Pacific Network Information Centre (APNIC) : It covers Asia

www.ripe.net => Réseaux IP Européens (RIPE NCC) : It covers Europe



Thus, to find out which organization owns a particular IP address, you can make a "WHOIS" query in the database at any of these registries. You do this by typing the IP address into the "WHOIS" box that appears on each of these websites.



"Received Header" will have the IP address of the ISP in case the users has dialed up to the ISP while sending the email. But if the user has send the email from within the corporate then the corporate public/static IP address is logged.



By giving a "WHOIS" query for 68.37.24.150 at www.arin.net, the following result has been displayed:



Comcast Cable Communications, Inc. JUMPSTART-1 (NET-68-32-0-0-1)
68.32.0.0 - 68.63.255.255
Comcast Cable Communications, Inc. NJ-NORTH-14 (NET-68-37-16-0-1)
68.37.16.0 - 68.37.31.255

# ARIN WHOIS database, last updated 2004-02-04 19:15
# Enter ? for additional hints on searching ARIN's WHOIS database.



From above queries it is found that the IP address (68.37.24.150) is owned "Comcast". By making further queries on "Comcast" it is found that it is the name of the ISP located in NJ, US - 08002. The result of further query is given below:



OrgName: Comcast Cable Communications, Inc.
OrgID: CMCS
Address: 3 Executive Campus
Address: 5th Floor
City: Cherry Hill
StateProv: NJ
PostalCode:08002
Country: US

NetRange: 68.32.0.0 - 68.63.255.255
CIDR: 68.32.0.0/11
NetName: JUMPSTART-1
NetHandle: NET-68-32-0-0-1
Parent: NET-68-0-0-0-0
NetType: Direct Allocation
NameServer: DNS01.JDC01.PA.COMCAST.NET
NameServer: DNS02.JDC01.PA.COMCAST.NET
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
RegDate: 2001-11-29
Updated: 2003-11-05

TechHandle: IC161-ARIN
TechName: Comcast Cable Communications Inc
TechPhone: +1-856-317-7200
TechEmail: cips_ip-registration@cable.comcast.com

OrgAbuseHandle: NAPO-ARIN
OrgAbuseName: Network Abuse and Policy Observance
OrgAbusePhone: +1-856-317-7272
OrgAbuseEmail: abuse@comcast.net

OrgTechHandle: IC161-ARIN
OrgTechName: Comcast Cable Communications Inc
OrgTechPhone: +1-856-317-7200
OrgTechEmail: cips_ip-registration@cable.comcast.com

# ARIN WHOIS database, last updated 2004-02-04 19:15
# Enter ? for additional hints on searching ARIN's WHOIS database.



Now since the IP address found belongs to an ISP, it is clear that the sender has dialed up to this ISP while sending the email. For further enquiry we can then request the ISP to provide us with details of the user who has dialed up to them at that given point of time (Wed, 26 Nov 2003 03:44:57 +0000). If the ISP cooperates, they will check their user and message logs to see who was logged into that particular IP address at that time and date. This will reveals the sender's telephone number from which he/she has dialed to the ISP. Now once we have the telephone number we can easily retrieve the name and address of the sender.



Now the above case is solved but there are also other cases where the IP address found on the email header may be owned by an organisation or a cyber cafe. Below I have discussed how you can trace the sender in both of these cases.



Cases1: THE IP ADDRESS OWNED BY AN ORGANISATION

But in case the IP address found belongs to an organisation then you have to request them to provide information about the user who has send the mail from within the organisation network. They must have user and message logs on their firewall / proxy and can trace each of their computers connected at the given point of time. By supplying the organisation with the e-mail header of the offending e-mail, they can check these logs and hopefully produce information of the user of that machine.



Cases2: THE IP ADDRESS OWNED BY A CYBER-CAFE

In case it is found that the sender has sent the email from a cyber-cafe then it becomes a difficult task to trace him/her. The user may not be a frequent visitor to that cyber-cafe. But let's assume that you receive such mails frequently from that particular cyber-cafe then you can install "key-loggers" in the computers at the cafe. These programs records user's keystrokes, thus creating a record of everything that was typed at a particular terminal. By reviewing the key-logger logs you may be able to trace the sender in this case.



Note: These methods would aid greatly in identifying an e-mail sender, they also would impinge on the rights of others using the computers to conduct their personal business. Such a conflict defines the ongoing struggle between the fight against terrorism over the Internet and the right to privacy, which will continue to evolve in the years ahead.

(From Sadikhov.com/Forums)

[Tutorial] Microsoft PowerToys for Windows XP

PowerToys are additional programs that developers work on after the product has been released to manufacturing, but before the next project has begun. These toys add fun and functionality to the Windows experience!

We've taken great care to ensure that PowerToys operate as they should. These programs run on Windows XP client only. They provide additional value to some of the great features in XP. However, the PowerToys were not subjected to the same rigorous testing we provide for the operating system and are therefore not supported. Microsoft Technical Support is unable to answer questions about PowerToys.

The PowerToys are installed into the directory you specify during setup. Typically this is the system32 directory (%windir%\system32).

Some of the PowerToys reside in the taskbar. Before resizing these PowerToys you will first need to check and make sure that the taskbar isn't locked. Right click the taskbar and ensure there is no check mark by 'Lock the Taskbar' menu item.

To uninstall the PowerToys, open Control Panel and then launch Add/Remove Programs. Find the entry for the PowerToy that you wish to remove and choose Change/Remove. You can remove one or more of the Powertoys in this way.

Toys released for Windows XP Client:

Open Command Window Here
This PowerToy adds an "Open Command Window Here" context menu option on file system folders. This gives users a quick way to open a command window (cmd.exe) pointing at the selected folder. After installation, right click on the folder you would like to have a quick launch command window for and select "Open Command Window Here."


Tweak UI
Provides access to system settings that are not exposed in the Windows XP default user interface. There are many settings and options that you can only set from Tweak UI. You can setup your mouse to your liking by setting click speed, hover sensitivity, etc. You can also customize many Explorer settings, taskbar settings, My Computer settings, and a wide variety of other settings.


Power Calculator
This calculator has the support to graph and evaluate functions as well as performing many different types of conversions.


Task Switcher
This PowerToy enhances the existing Alt + Tab application switching mechanism of Windows XP. It provides a thumbnail preview of windows in the task list and is compliant with the new Windows XP visual style. You use this just as you do the existing Alt + Tab mechanism. Press and hold the Alt key and then press the Tab key to cycle through the running applications. When the desired application is highlighted release the Alt key. You can move backwards through the task list by pressing and holding the Shift and Alt key and then pressing the Tab key.


Image Resizer
This PowerToy enables you to resize one or many image files. When resizing you can choose from one of four standard sizes or choose a size that you specify. You can also choose to resize the original image or create a new one. Right click any image(s) and select 'Resize Pictures' in the context menu.


CD Slide Show Generator
Enables you to view images burned to a cd as a slide show. Add only images to a CD-RW drive using Windows XP Explorer and then write these files to a CD-R or CD-RW disc. A new task is presented in the wizard for generating the autorun for the slideshow. Now when you take this disc to another computer that isn't running Windows XP you can still view your images as a slide show.


Virtual Desktop Manager
Manage up to 4 desktops from the Windows taskbar. You can choose a different background for each desktop and run different applications on different desktops. Right click on the taskbar, click toolbars, and then click "Desktop Manager."


Taskbar Magnifier
Allows you to magnify part of the screen from the taskbar. This is very similar to Magnifier that can be found under the Accessories menu on the Start Menu except that this PowerToy remains in the taskbar and has a smaller viewing area. Right click on the taskbar, click toolbars, and then click "Taskbar Magnifier."


HTML Slide Show Wizard
This wizard helps you create a slide show of your digital pictures. When you're done, you can put your slide show on the Web so that your family and friends can view it. Follow the steps of the wizard to select and arrange your pictures, choose from a few simple options, and then save a Web-ready HTML slide show to a folder.


Webcam Timershot
This PowerToy allows you to take pictures from one of the webcams connected to your computer at specified time intervals. When a picture is taken it is saved to a location and with a name that you specify. A simple save option allows you to save all the pictures or only the last picture taken. You can save the pictures to a network share, an ftp share, or an http webdav share

Link to download this tool: http://download.microsoft.com/download/whistler/Install/2/WXP/EN-US/ImageResizerPowertoySetup.exe

(F

Trouble-Shooting: Windows XP BOOT ERRORS & Fixes:

1.Hal.dll missing or corrupt.

If you get an error regarding a missing or corrupt hal.dll file, it might simply be the BOOT.INI file on the root of the C: drive that is misconfigured
1.Insert and boot from your WindowsXP CD.
2.At the first R=Repair option, press the R key
3.Press the number that corresponds to the correct location for the installation of Windows you want to repair.
Typically this will be #1
4.Type bootcfg /list to show the current entries in the BOOT.INI file
5.Type bootcfg /rebuild to repair it
6 Take out the CD ROM and type exit
OR
Better solution: This seems to always work
expand x:\i386\hal.dl_ y:\windows\system32\ X= cd rom drive letter

2.Corrupt or missing WINDOWS\SYSTEM32\CONFIG

If you get the error:
Windows could not start because the following files is missing or corrupt
\WINDOWS\SYSTEM32\CONFIG\SYSTEM or \WINDOWS\SYSTEM32\CONFIG\SOFTWARE
1.Insert and boot from your Windows XP CD.
2.At the first R=Repair option, press the R key
3.Press the number that corresponds to the correct location for the installation of Windows you want to repair.
Typically this will be #1
4.Enter in the administrator password when requested
5.cd \windows\system32\config
6.Depending on which section was corrupted:
ren software software.bad or ren system system.bad
7.Depending on which section was corrupted
copy \windows\repair\system
copy \windows\repair\software
8.Take out the CD ROM and type exit

3. NTOSKRNL not found
If you get an error that NTOSKRNL not found:
1.Insert and boot from your WindowsXP CD.
2.At the first R=Repair option, press the R key
3.Press the number that corresponds to the correct location for the installation of Windows you want to repair.
Typically this will be #1
4.Change to the drive that has the CD ROM.
5.CD i386
6.expand ntkrnlmp.ex_ C:\Windows\System32\ntoskrnl.exe
7.If WindowsXP is installed in a different location, just make the necessary change to C:\Windows
8Take out the CD ROM and type exit

4. NTLDR NOT FOUND DURING BOOTUP

If you have FAT32 partitions, it is much simpler than with NTFS. Just boot with a Win98 floppy and copy the NTLDR or NTDETECT.COM files from the i386 directory to the root of the C:\ drive.
For NTFS:
1.Insert and boot from your Windows XP CD.
2.At the first R=Repair option, press the R key
3.Press the number that corresponds to the correct location for the installation of Windows you want to repair. Typically this will be #1
4.Enter in the administrator password when requested
5.Enter in the following commands (X: is replaced by the actual drive letter that is assigned to the CD ROM drive)
COPY X:\i386\NTLDR C\:
COPY X:\i386\NTDETECT.COM C:\
6.Take out the CD and type exit


5. Isapnp.sys error message at startup:

To replace the Isapnp.sys file in Windows XP, follow these steps:1. Start the computer from the Windows XP CD-ROM.
2. At the Welcome to Setup screen, press R to start Recovery Console.
3. If you have a dual-boot or a multiple-boot computer, type the number that corresponds to your Windows XP installation when you are prompted to select the Windows installation to log on to, and then press ENTER.
4. When you are prompted for the Administrator password, type the password, and then press ENTER.
Note If the administrator password is blank, just press ENTER.
5. At the C:\Windows prompt, type the following command, and then press ENTER:
ren c:\windows\system32\drivers\isapnp.sys isapnp.old
Note The steps in this article assume that you installed Windows XP to the C: drive. The actual location of your Windows installation may vary.
6. At the C:\Windows prompt, type the following command, and then press ENTER:
expand cd-romdrive:\i386\isapnp.sy_ c:\windows\system32\drivers\isapnp.sys
For example, type:
expand d:\i386\isapnp.sy_ c:\windows\system32\drivers
7. After the file is successfully expanded, type exit, and then press ENTER to exit Recovery Console.
8. Restart the computer.

6. ntfs.sys missing or corrupt error message:

To resolve this problem do the followings:-
1] Boot computer with the Windows XP CD-ROM in the CD-ROM drive.
2] To repair a Windows XP installation using Recovery Console, press R.
3] At the command prompt, type the following commands:-

cd \windows\system32\drivers [Press the ENTER Key]
ren ntfs.sys ntfs.old [Press the ENTER Key]

If the ntfs.sys file is there and corrupt it will rename it. If it is not there then it was missing.

4]At the command prompt, type the following command, and then press ENTER:
copy X:\i386\ntfs.sys drive:\windows\system32\drivers [Where X=CD-ROM Drive]

5]Remove the Windows XP CD from CD-ROM drive, type quit, and then
press ENTER to quit the Recovery Console.

6. Restart the system.



7. Windows XP Will Not Start


System files may be corrupted.

1.Start the Operating System from the CD-ROM
When the computer starts from the CD, the system checks your hardware and then prompts you to select one of the following options:
2.To set up Windows XP now, press ENTER.
3.To repair a Windows XP installation using Recovery Console, press R.
To quit Setup without installing Windows XP, press F3.
4.Press ENTER.
5.Press F8 to accept the Licensing Agreement.
A box lists your current Windows XP installation, and then the system prompts you to select one of the following options:
6.To repair the selected Windows XP installation, press R.
To continue installing a fresh copy of Windows XP without repairing, press ESC.
7.Press R to start the automatic repair process.
Note: After repairing Windows XP, you may need re-download all updates.


8. Error message: Unmountable boot volume

When booting up to Windows XP you may get an error that reads: Unmountable Boot Volume.

This is probably because your boot.ini file is messed up. Here is a possible remedy:
1. Start Windows XP with the Windows XP CD in your CD/DVD drive.
Once you see the "Welcome to setup" message, press the letter 'R' on your keyboard to enter the Recovery Console.
2. Select the Windows installation to be repaired (you will need to know the administrator password.
3. You will then get a DOS prompt. from here, type: chkdsk /p [Enter]
4. When that is done type: fixboot [Enter]
5. Type: Y at the next prompt [Enter]
6. Then type: exit [Enter]
The system will now reboot into Windows.
If for some reason that didn't work, you can boot to the recovery console (example above).
Type: "chkdsk /r" [Enter]
When done type: exit [Enter].
This takes a bit longer, but the system should boot back into Windows.
If none of these work do a repair, follow the directions from previous solution.# 7

(From sadikhov.com/forums)

Trouble-Shooting: Modify Your CD-ROM to Watch DVD Movies

There are two types of CD-ROM drives we can mod:
24x to 40x
40x or higher
Drives slower than 24x are too old to be modded.
24x to 40x CD ROMs
Laser Head Adjustments:
The track pitch of CDs is 1.6 microns, and the track pitch of DVDs is only 0.8 microns. The minimum length of track pits of CDs is 0.843mm, and the minimum length of track pits of DVDs is 0.293mm. That's why DVD discs can store much more data in the size of a CD.
Pinpointing this situation, we need to adjust the laser head so it can read discs with smaller track pitchs and shorter track pits. Open up the CD-ROM drive, do you see a lens on the rail? That's the laser head. On the side of the laser head, there's a screw you can adjust.
This is the key of this mod.
This screw can adjust the size of the laser beam that lands on the disc. Referring to the above, after adjusting, the laser beam should be less than 0.293mm, to suit the needs of DVD discs. So turn that screw 2-3 times. I got this number through trial and error. Mark with a pencil, in case you forget how many times you turned that screw.
Speed adjustments:
DVD-ROM drives can play DVD movies smoothly at 4x speed. If we're modding a 32x CD-ROM drive, the rotation speed is obviously too high, increasing heat, and shortening the life of the drive.
So we need to decrease the speed of it.
Most people know that power supplies can provide 5V (red wire) and 12V (yellow wire) electricity output for Molex connectors. Find the Molex connector you'll plug into the modded CD-ROM drive, cut the yellow wire or insulate it with tape, so only 5V of electricity is transferred to the CD-ROM drive. The speed of the drive is now 32 * 5/17 = 9.41x and can now fulfill our requirements.

40x or higher CD ROMs
When 40x CD-ROM drives are released, most manufacturers are already producing DVD-ROM drives. To lower cost, they use the same core as DVD-ROM drives with DVD functions disabled. What we need to do here is to re-enable the DVD function.
Open up the CD-ROM, behind the circuit board, look for a jumper that says DVD JUMP. Find a jumper to connect this jumper. Thin metal wire also works fine.
OK, so the DVD function is unlocked, but we still need to decrease the speed. Use the instructions above on how to decrase the speed of the drive.
Notes:
Modded drives cannot be detected in POST, that means you cannot use it in DOS. But once you get into Windows, the drive works fine.
Modded drives have no region code problems.
Modded drives MIGHT NOT read DVD9 discs, that's why I said you can watch most retail DVDs in the beginning

Trouble-Shooting: 12 lỗi thường gặp trong Windows

Cho dù có muốn hay không muốn thì các lỗi máy tính vẫn xuất hiện và cản trở công việc của bạn. Một số lỗi không nghiêm trọng và không ảnh hưởng nhiều tới quá trình sử dụng; nhưng cũng có rất nhiều lỗi “khó chịu” và trong nhiều trường hợp chúng làm hệ điều hành bị trục trặc, không thể sử dụng được nữa. Nắm được các lỗi này và biết cách khắc phục chúng là các kiến thức và người dùng máy tính nên có.

1. “Lỗi không xác định”

Đây là loại thông báo về các lỗi kỹ thuật và thường kèm sau đó là các hướng dẫn khá hữu ích để bạn có thể sửa chữa chúng. Lỗi này không đòi hỏi bạn phải tiến hành các tác vụ chuẩn đoán mà lỗi đơn thuần chỉ là một dạng đánh giá tình trạng máy tính ở thời điểm đó. Lỗi không xác định phát sinh từ những vấn đề phổ biến, trong đó có cả việc nâng cấp DirectX thất bại cho Microsoft Producer và một lỗi phổ biến trong SQL Server 7.0 của Microsoft.

Giải pháp tốt nhất để xử lý lỗi này là đóng tất cả những ứng dụng đang mở và khởi động lại máy. Nếu lỗi vẫn tiếp tục xảy ra, tải và cài đặt bản nâng cấp mới nhất cho chương trình liên quan. Bạn cũng nên chạy một ứng dụng diệt phân mềm gián điệp (spyware), chẳng hạn như Ad-ware…

2. “The system is either busy or has become unstable. You can wait and see if it becomes available again, or you can restart your computer. Press any key to return to windows and wait. Press CTRL + ALT + DEL again to restart your computer. You will lose unsaved information in any programs that are running. Press any key to continue.”

- “Hệ thống đang bận hoặc không ổn định. Bạn có thể chờ đợi hoặc khởi động lại máy tính. Nhấn bất cứ phím nào để quay trở lại môi trường Windows và chờ trong giây lát. Nhấn CTRL + ALT + DEL một lần nữa để khởi động máy tính. Bạn sẽ mất những thông tin chưa lưu lại trong bất cứ chương trình nào đang chạy. Nhấn bất cứ phím nào để tiếp tục.”

Đôi khi Windows bị “đơ” và không phải ứng với bất cứ tác vụ nào mà bạn thực hiện. Trong những trường hợp đó, việc nhấn tổ hợp phím CTRL-ALT-DELETE có thể làm hiển thị thông báo trên trên nền màn hình xanh (còn được ví là “Màn hình của sự chết chóc” – Blue Screen Death”). Những thông báo này không giúp ích gì nhiều trong việc sửa chữa lỗi, và cũng không đưa ra lý do tại sao mà hệ thống lại trở nên như vậy. Cách giải quyết tốt nhất là bạn nhấn tổ hợp phím CTRL-ALT-DELETE để khởi động lại.

Thông điệp lỗi này thường phát sinh từ những sai sót trong quá trình truy cập bộ nhớ. Bạn hãy ghi nhớ những hoàn cảnh nào làm phát sinh lỗi này; những thông tin về kết quả sẽ có thể giúp bạn xác định nguyên nhân. Bạn cũng có thể giải quyết tình trạng này bằng cách cài đặt lại những ứng dụng có vấn đề; tải bản nâng cấp liên quan; tháo gỡ những chương trình không cần thiết; vô hiệu hoá screen saver, và nâng cấp driver. Nếu sự cố vẫn cứ tiếp diễn, bạn nên nghĩ tới giải pháp cài đặt lại hệ điều hành Windows và tiến hành sao lưu dữ liệu để chuẩn bị.

3. “This programs has performed an illegal operation and will be shutdown. If the problem persists, contact the program vendor”.

Lỗi “illegal operation” (sử dụng bất hợp pháp) không liên quan tới việc bạn truy nhập Internet, tải file, hoặc cách thức sử dụng PC, mà thực tế đó chỉ là cách phản ánh những hành vi chương trình không hợp lệ, thường là những cố gắng thực thi một dòng mã không hợp lệ, hoặc truy nhập và một phần bộ nhớ đã bị hạn chế. Bạn cũng đừng cố gắng tìm kiếm thông tin từ bảng thông báo này, nó chỉ gồm những “module” khó hiểu và hoàn toàn không dành cho những người không là chuyên viên lập trình.

Giải quyết vấn đề này bằng cách đóng tất cả những ứng dụng đang mở và khởi động lại máy tính. Nếu bạn tiếp tục nhìn thấy thông báo lỗi tương tự, hãy sử dụng trình “clean boot troubleshooting” để xác định chương trình gây lỗi và tháo cài đặt chúng. Để thực hiện quá trình “khởi động sạch”, từ Start, chọn Run, rồi gõ dòng lệnh “msconfig”, nhấn OK. Từ trình System Configuration Utility, chọn Selective Startup và bỏ lựa chọn tất cả những hộp đánh dâu trong danh sách thả xuống. Nhấn OK và khởi động lại máy. Bạn lặp lại quá trình này, mỗi lần chọn một ô đánh dấu khác nhau dưới phần Selective Start-up cho tới khi xác định được hộp “checkbox” nào gây ra lỗi.

Bước tiếp theo là chọn một thẻ (tab) trong “System Configuration Utility” liên quan tới hộp “checkbox” có vấn đề, và bỏ lựa chọn tất cả (ngoại trừ dòng lệnh trong tab). Khởi động lại máy tính, và nếu trong quá trình khởi động không có vấn đề gì phát sinh, bạn hãy quay trở lại phần “System Configuration Utility” để chọn một dòng lệnh khác. Lặp lại quá trình này cho tới khi bạn cô lập được dòng lệnh gây ra sự cố; bạn cũng cần liên lạc với các nhà phát triển phần mềm liên quan hoặc nhà sản xuất phần cứng để tìm sự hỗ trợ cụ thể.

4. Lỗi “Runtime error <###>”

Lỗi Runtime để mô tả một chương trình không được nhận dạng có những dòng lệnh bị phá huỷ hoặc bị trục trặc. Thông báo cũng này cũng có thể kèm theo một dòng lệnh lỗi, chẳng hạn như “424” hoặc “216”, hay đôi khi là những thông tin “mù mờ” về một đối tượng cần thiết nào đó (required object). Những thông báo kiểu này thường không cung cấp thông tin hữu ích nào về nguyên nhân xảy ra sự cố cũng như cách thức giải quyết. Liệu lỗi có phải do virus, không đủ bộ nhớ, hoặc chương trình không thương thích ? Chẳng ai biết rõ được điều này!

Khi lỗi runtime xảy ra, bạn không khởi động lại máy tính vì nếu làm như thế, có thể virus lại gây ra hiện tượng lỗi tương tự, hoặc vô tình kích hoạt đoạn mã nguy hiểm của virus. Thay vào đó, bạn cần quét virus ngay lập tức, tiếp theo hãy liên lạc với nhà phát triển phần mềm đã gây ra lỗi runtime và hỏi họ cách khắc phục. Bạn cũng có thể giải quyết vấn đề bằng cách tải bản nâng cấp hoặc cấu hình lại phần mềm.

5. Lỗi “STOP: 0x########”

Trong khi lỗi runtime liên quan tới một chương trình cụ thể, thì lỗi STOP thường chỉ ra vấn đề liên quan tới một thiết bị cụ thể - nhưng thật không may hiếm khi thông báo lỗi chỉ ra thiết bị cụ thể nào. Thay vào đó, thông báo chỉ hiển thị dòng mã hex khó hiểu, chẳng hạn như 0x0000001E, trong các dòng mô tả. Thay vì suy đoán, bạn nên thực hiện một số tác vụ giải quyết cơ bản sau.

Đầu tiên là quét virus. Tiếp tới, cài đặt lại những phần cứng đã được cài đặt vào thời điểm trước đó ít lâu; và cần xác định chắc chắn là những thiết bị đã được kết nối đúng. Trong trường hợp này, việc nâng cấp driver cho tất cả những phần cứng hiện có hoặc nâng cấp BIOS cũng là một ý kiến hay. Hãy liên lạc với nhà sản xuất máy tính để nhờ giúp đỡ.

6. Lỗi “A fatal exception error <##> has occurred at <####:########”

Thông báo lỗi ngoại trừ (exception) nghiêm trọng (fatal) nghe có vẻ rất nghiêm trọng nhưng cách hướng dẫn giải quyết lại chẳng có gì cả. Đây là một dạng thông báo về lỗi bộ nhớ thường là những truy vấn bộ nhớ không hợp lệ hoặc lỗi trong dòng mã lệnh, và thường xảy ra khi khởi động ứng dụng hoặc tắt Windows. Lỗi “fatal exception” có thể rất nghiêm trọng, đó cũng là nguy nhân giải thích tại sao chúng ta lại hay thấy nó trên “màn hình xanh”, khiến Windows bị hỏng.

Lỗi “exception” có thể xảy ra trong rất nhiều trường hợp. Các nhanh nhất để loại bỏ chúng là khởi động lại máy tính. Nếu lỗi vẫn tiếp tục xảy ra, bạn nên khởi động máy tính ở chế độ “khởi động sạch” (clean boot).

7. Lỗi “ caused a general protection failt in module at ####:########”.

Đây là loại lỗi GPF (Generel Protection Fault - lỗi bảo vệ tổng quát) gây phá huỷ hệ điều hành, thuộc một trong những lỗi nghiêm trọng gây ra hiện tượng màn hình xanh. Bạn có thể thấy lỗi GPF nếu một chương trình đang cố gắng ghi dữ liệu vào một khu vực lưu trữ hạn chế, hoặc hệ thống tính sai dung lượng bộ nhớ cần thiết để thực thi một hàm nào đó.

Giải pháp của lỗi GPF là khởi động lại máy tính. Do nguyên nhân của hiện tượng này rất nhiều nên khó có thể xác định chính xác nguồn gốc gây ra lỗi. Cách giải quyết cơ bản nhất là tháo cài đặt tất cả những phần mềm, phần cứng trong thời gian gần nhất, thực hiện tác vụ bảo trì hệ thống tổng quát, và thực hiện phương thức “khởi động sạch”.

8. Lỗi “Runll: error loading. The specified modle could not be found”.

Thông báo lỗi “Runll” xuất hiện khi Windows không thể xác định được vị trí một file mà nó cần tải. Lỗi có thể liên quan tới những phần mềm chưa được tháo gỡ hết, hoặc lỗi driver, virus, hay phần mềm gián điệp.

Giải pháp mà bạn cần thực hiện là chạy ứng dụng diệt spyware (như Ad-ware hoặc Spybot Search & Destroy) và sau đó là quét virus toàn hệ thống. Nếu lỗi liên quan tới một phần mềm mới cài đặt thì hãy gỡ bỏ phần mềm đó ra. Cuối cùng, bạn cần khởi động máy tính ở chế độ sạch để có thể xác định được những dòng lệnh gây ra lỗi.

9. Lỗi “Cannot find the file (or one of its components). Make sure the path and filename are correct and that all required libraries are available”.

Cũng giống một cơn đau đầu, thông điệp lỗi này có thể là triệu chứng của một sự kiện nhỏ nào đó, chẳng hạn như xoá nhầm file; hoặc là một sự kiện lớn nào đó, chẳng hạn như virus đã lây lan khắp hệ thống. Điều bạn cần làm là quét virus và cài đặt lại chương trình có liên quan tới tệp tin (file) bị thất lạc. Nếu lỗi vẫn xảy ra, sử dụng My Computer hoặc Windows Explorer để xác định chính xác tên và vị trí của file.

Lỗi này chỉ có thể xảy ra khi bạn nhấn đúp vào shortcut trên Desktop. Nếu đúng là trường hợp đó, thì chỉ việc nhấn chuột vào shortcut, chọn Properties, rồi gõ chính xác tên và đường dẫn vào trường Target.

10. “An error has occurred in the script on this page. Line <##> Char: <##> Error: Code: <##> Location: Do you want to continue running scripts on this page?”

Thông điệp lỗi rắc rối này ngụ ý rằng trình duyệt Internet Explorer (IE) đang gặp vấn để khó khăn trong việc giải mã một tập lệnh gắn kèm trong trang Web mà bạn đang truy cập. Đây là thông điệp lỗi cố làm cho tình huống trở nên căng thẳng hơn là bản thân chúng là như vậy.

Bạn có thể tắt thông báo lỗi này đi; và nếu vẫn tiếp tục nhận được chúng, hãy cố quét virus, khởi động lại máy tính, và nâng cấp lên phiên bản IE mới nhất. Bạn cũng có thể mở phần menu Tools của trình duyệt và chọn Internet Options để xoá thư mục Temporary Internet Files (nhấn vào nút Delete Files trên thẻ General) và cấu hình phần Security và mức mặc định (default level). Cuối cùng có thể lỗi này đơn giản là do mã nguồn trang Web có vấn đề, và trong trường hợp đó, bạn chỉ có thể thông báo cho người quản trị trang web đó để sửa lỗi.

11. “Windows Update has encountered an error and cannot display the requested page”.

Một lỗ thông dụng liên quan tới việc cài đặt những bản nâng cấp mới nhất dành cho Windows. Lỗi này ngăn không cho bạn truy cập vào trang Web nâng cấp Windows Update (windowsupdate.microsoft.com). Vậy làm thế nào để sửa lỗi này?

Trong hầu hết trường hợp, bạn có thể sửa lỗi bằng cách cài phiên bản IE mới nhất. Ngoài ra, người dùng Windows XP và Windows 2000 cần cài đặt các bản service pack mới nhất cho hệ điều hành. Trong Windows XP, bạn cần kích hoạt chế độ tự động nâng cấp Automated Updates (mở Control Pannel, chọn Performance And Mantenance, System, chọn thẻ Automatic Updates; rồi lựa chọn phần Automatic).

12. “Windows encountered an error accessing the system Registry. Windows will restart and repair the system Registry for you”.

Registry là cơ sở dữ liệu lưu trữ cấu hình hệ thống và các tham chiếu người dùng, chúng rất nhạy cảm và với bất cứ thao tác nguy hiểm nào cũng khiến cho Windows bị “đổ vỡ”. Chúng ta có thể dùng giải pháp khắc phục sau…

Tạo một không gian trống trên ổ cài đặt Windows (tối thiểu là 10%). Xoá những file cũ không còn dùng tới. Tiếp theo người dùng Windows Me và Windows XP cần khôi phục máy tính và trạng thái ban đầu khi chưa xảy ra sự cố. Mở thanh menu Start à (All) Programs à Accessories à System Tools à System Restore. Khi mở tiện ích System Restore, bạn chọn Restore My Computer To An Early Times, nhấn vào Next, và chọn một thời điểm cần khôi phục (ngày trước khi xảy ra thông báo lỗi); sau đó tuân theo các hướng dẫn.
(Theo Tạp chí Infoworld)

Trouble-Shooting: Outlook Data Backup

Outlook is a Microsoft's premier application that is integrated into Microsoft Office 97, 98, 2000, 2002 and Microsoft Exchange Server. Outlook provides complete integration of e-mail, calendaring, and contact management. Outlook helps you find and organize information so that you can work seamlessly with Office applications, communicate and share information more effectively. Outlook enables you to filter and organize e-mail messages, integrate and manage e-mail from multiple e-mail accounts, personal and group calendars, contacts, folders, and tasks.
Outlook data is usually stored at the following paths:
C:\Documents and Settings\User Name\Application Data\Microsoft\Outlook\
C:\Documents and Settings\User Name\Local Settings\Application Data\Microsoft\Outlook\
C:\Documents and Settings\All Users\Application Data\Microsoft\Outlook\
C:\Windows\Application Data\Microsoft\Outlook\
C:\Windows\
Outlook data is usually comprised of the following items:
· Personal Folders (.pst) files. The most important Outlook files. Your personal folders .pst file contains all of your local Outlook folders, such as Calendar, Inbox, Tasks, Sent Items, Outbox, Deleted Items, and user-created folders. When running, Outlook usuallya keeps its .pst folders partially locked, so it is recommended to close Outlook prior to making a backup.
· Offline Storage (.ost) files.
· Personal Address Book (.pab) files.
· Rules (.rwz) files.
· Nickname (.nick, .nk2) files for AutoComplete.
· Additional Outlook settings files:
· Toolbar and menu (.dat) settings.
· Favorites (.fav) for the Outlook bar.
· AutoSignature (.htm, .rtf, .txt) files.
· Template (.oft) files.

Tuesday, September 9, 2008

Phim: Maika - Co be tu tren troi roi xuong

Phim nay san xuat tu nam 1978, rat duoc thieu nhi thap nien 80 ua thich.

Link download (adrive.com):
CD01
CD02
CD03

(Con tiep...)