Welcome everybody, Pliz use the chat bar to communicate with us directly and chat with your friends. Keep in touch with us. Thank you
Showing posts with label TUTORIAL. Show all posts
Showing posts with label TUTORIAL. Show all posts

Saturday, 1 September 2012

How to hack into broadband adsl modem router and get the broadband user id and password


Don’t  be excited now I am gonna show you a important topic......thats you can hack ASDL Router or Broadband. If you have any extra creativity than sure you can find many way to hack your broadband or internet .}{}{ 



First connect to your broadband, and goto
 http://whatismyip.com to know your public IP Address.




Now you need Port Scanner software, here I used a free one from RadMIN.You may download angry ipscanner for this work.Open Port Scanner after install and type your IP Range like following figure and set port range from 80 to 81.


Hit Scan button as soon as you finish above steps.



After finish scanning you have to look for the alive IP Addresses those have port 80 opened like following figure.


Here I have found IP Address with port 80 opened. No you have to open that IP Address from internet Explorer like following figure




If everything went fine, It will ask you for user id and password, and out of 10 ADSL Router, at least 6 having default password, coz no one bother to change that default password L .


So, give it a try with following ID and Pass:

ID : admin / Pass : admin (most common)
ID : admin / Pass : admin123
ID : admin / Pass : admin321
ID : root / Pass : root
ID : root / Pass : admin
ID : admin / Pass : root

Wow!! I have got the access⦠Now I can do whatever I want. But I don't want to do anything


You can access any settings on the ADSL Router.





Now you need an Asterisk Key recovery tool to get the broadband user ID and Password. 


Here password recovered successfully in a second. 


Want to get more this type of post then saty connect with us......






Friday, 31 August 2012

Certified Ethical Hacker v7 Complete package



This contains the complete package to the Certified Ethical Hacker course, version 7 (the most recent at the time of this upload).  It contains the lectures (as videos), the study guide, unencrypted copies of the teacher's instructor slides, and all the programs you'll need in the course.  Note that the programs are put in ISO images.  To open the ISOs, you can either burn them to a disk and open them like any other data-containing disk, or you can open them with software such as 7-zip (which is what I prefer, because after all ISOs are only containers).  Along with the tools are animations that explain how to use them (and how to install them).  Also, just because this focuses on "ethical hacking" (or authorized hacking as I prefer to call it) doesn't mean it doesn't teach you black hat methods.

The official Certified Ethical Hacker course costs something like $500, and you can only take the exam once.  If you fail, you have to pay another $500 to retake it.  That's what this torrent is for, studying.  And its not just studying for the CEH exam, its also simply a great way to learn hacking.  Note that this course assumes you have moderate understanding of computers, a computer with Windows (the course is oriented around Windows, but if you have Linux then many of the Windows tools can be run through Wine), and plenty of time on your hands.  You do not need to be a Linux guru or have programming knowledge to learn from this course.

The course is broken up into different sections, called "modules", each teaching a slightly different subject.  The modules are:
-Module 02: Footprinting and Reconnaissance
-Module 03: Scanning Networks
-Module 04: Enumeration
-Module 05: System Hacking
-Module 06: Trojans and Backdoors
-Module 07: Viruses and Worms
-Module 08: Sniffers
-Module 09: Social Engineering
-Module 10: Denial of Service
-Module 11: Session Hijacking
-Module 12: Hacking Webserver
-Module 13: Hacking Web Applications
-Module 14: SQL Injection
-Module 15: Hacking Wireless Networks
-Module 16: Evading IDS, Firewalls, and Honeypots
-Module 17: Buffer Overflows
-Module 18: Cryptography
-Module 19: Penetration Testing


I originally found this torrent on TPB, but it was so tremendously helpful I decided to upload it elsewhere.  Enjoy this torrent, remember to seed, and get hacking!
Category:Other
Size:16.30 GB
Click to see files:
84 files


Torrent FileTorrent File
Torrent File
Direct Download
Direct Download
No client needed
Magnet Link
Magnet Link
Fast search in Other category:    

Downloaded:179 times
Info Hash:01f570c325730973138652e9d482deb1822f192f
Tracker listSeedsLeechersCompleteLast update
udp://tracker.yify-torrents.com:80/announce697316331/08/2012 17:04:13
http://tracker.ccc.de:80/announce687216231/08/2012 16:26:41
http://bt.rghost.net:80/announce677017931/08/2012 18:41:33
udp://tracker.publichd.eu/announce667316431/08/2012 18:05:10
http://tracker.yify-torrents.com:80/announce646716831/08/2012 17:27:57
http://ipv4.tracker.harry.lu/announce646017631/08/2012 16:44:28
http://tracker.publichd.eu/announce495517931/08/2012 18:10:31
http://tracker.torrentbay.to:6969/announce28331931/08/2012 17:52:55
udp://torrentbay.to:6969/announce27341731/08/2012 17:07:57
http://torrentbay.to:6969/announce26441731/08/2012 18:14:44
http://www.h33t.com:3310/announce252913931/08/2012 19:01:17
udp://fr33dom.h33t.com:3310/announce22345531/08/2012 18:28:11
http://fr33dom.h33t.com:3310/announce22295531/08/2012 19:11:05
http://torrento.net:2810/announce23531/08/2012 17:32:34
http://tracker.coppersurfer.tk:6969/announce211031/08/2012 16:09:52


sourav


thanks a trillion frnd...

Tuesday, 21 August 2012

Why do you need to know your IP address



What is IP address ?

If you aren't sure what IP address is, IP (Internet Protocol) address is a unique address that identifies a computer or a device on the Internet. It contains 32 bits or 4 bytes (octets) and is written in four sets of decimal numbers separated by a period (or dot) in between. Each set of decimal numbers represents a byte (i.e. 8 bits) and can not exceed 255, that is when all the eight bits are 1 (or 11111111). Example of IP address: 202.60.80.1
An IP address is comparable to a telephone number that uniquely identifies an individual or a business on the telephone network.

The anatomy of IP address

Every computer or device on the Internet is part of a network (e.g. ISP, corporate, or home network). That's why IP address body (i.e. xxx.xxx.xxx.xxx where x is a decimal number) consists of network identity (ID) and host (i.e. node/device) ID. A subnet mask value which resembles an IP address is usually given along with an IP address to help identify which part of the address refers to network ID or host ID. Subnet is logical grouping of hosts in a network that functions to segregate traffic.
In a class A IP address, the first byte refers to network ID and the last three bytes refer to host ID. In a class B IP address, the first two bytes refer to network ID and the last two bytes refer to host ID. In class C IP address, the first three bytes refer to network ID and the last byte refers to host ID. Class A IP addresses are used by very big networks, class B by medium to large networks, while class C by small networks.

From
To
Default subnet mask
Class A
0.0.0.0
127.255.255.255
255.0.0.0
Class B
128.0.0.0
191.255.255.255
255.255.0.0
Class C
192.0.0.0
223.255.255.255
255.255.255.0

Example, if your computer IP address is 192.168.1.3 (a class C IP address), it must belong to a network (LAN) with this network address 192.168.1.0 and its host ID is 3.

What is my IP address?

A IP address is looks like * *.9 *.2 * 1.* 6 *     ( * means digit )
When your computer (be it a desktop PC, laptop/notebook, netbook, tablet, handheld/PDA, or smart phone) accesses the Internet, it has an IP address that is assigned to it by your ISP or a broadband router in your home or company network. IP address is different with MAC address. A MAC address or physical address was assigned to a device by its manufacturer and stays the same during its lifetime while IP address depends on the network or service provider through which your computer or device gets an Internet connection.
For example, if you use Windows XP, to check your IP address, do one of the following:
1) double-click your Internet connection icon on the taskbar and click the Details tab.
2) open the Command Prompt window and type this command : ipconfig or ipconfig /all. You can go to the Command Prompt through Start > All Programs > Accessories > Command Prompt. [To find Command Prompt in Windows Vista or Windows 7, just click Start button and type cmd in the search box and press Enter.]
3) go to Network Connections folder, click on your Internet connection name, and see your IP address on the Details pane on the bottom left of the folder. You can go to the Network Connections folder through Start > Connect To > Show all connections or through Control Panel. [In Windows Vista or Windows 7, right click a connection icon on the taskbar/system tray, select Network and Sharing Center. On the left pane, selectManage network connections to open Network Connections folder. Right click an active connection, select Status, and click Details.]

Dynamic IP address vs. static IP address

When your computer connects to your ISP, your ISP assigns an IP address to it. In the case of dial-up access over telephone line or broadband access (e.g. DSL or cable modem) using PPPoE/PPPoA that requires log-in, your computer will get a different IP address each time it connects to the ISP and makes an Internet connection through it. This address is called dynamic IP address. The IP address is assigned by a DHCPserver at your ISP. This this the most common case since every ISP has limited IP addresses stock. On the other hand, using an always-on broadband connection, your computer is usually given the same IP address all the time by the ISP. This address is called static IP address.
Dynamic IP address is assigned to your computer by a broadband router (or residential gateway) if your computer is on a LAN (home or office network) and accesses the Internet through a broadband router. But this address is for internal use only, it gets converted to a public IP address when communicating over the Internet. Dynamic IP address assignment is handled by a DHCP server at the router. The DHCP server can be set to reserve an IP address for a computer during a connection or change it periodically at a predefined interval. The router also handles the network address translation (NAT), i.e. converting private IP address assigned by the DHCP to a public IP address assigned by the ISP.
This is your IP address  or you may see your IP in the bottom-left side of our site. Thanks for reading this article ........

collect idea from : www.conniq.com

Friday, 10 August 2012

Introduction to Torrents and Torrent terminology !

Lets begin this post with a brief discussion on how Torrents work.

How does a Torrent works?
Well, a torrent works quite differently as compared to ordinary client-server download module.  A torrent downloads different pieces of the file you want simultaneously from multiple computers.
You download or get a torrent file (essentially a file containing meta data about all the files that are download able, including their names and sizes and check-sums of all pieces in the torrent. It also contains the address of a tracker .)
Torrent client software(like u torrent,bit-comet etc) communicate with a tracker to find other computers running torrent that have the complete file (seed computers) and those with a portion of the file (peers).
the client software with the help of the tracker trades the pieces of the file needed with other computers in the swarm. Thus enabling us to download multiple files simultaneously.




Why to use a Torrent?
Unlike other download methods, Torrent maximizes transfer speed by  downloading the pieces of the files you want simultaneously from people who already have them. This process makes very large files, such as videos and television programs, games download much faster than is possible with other methods.
Which Torrent client to use?
Well, there are a lot of torrent clients available for download and here’s a list of few that I have shortlisted you may choose from the list.
µTorrent : This is perhaps the best choice for Windows, Mac or Linux users as it’s just around 235 KB in size, light on resources and is completely free. Though I love Vuze !
Transmission: This the best torrent client i have come across for Mac users .
SymTorrent: It’s the first and currently only Bit Torrent client for Symbian OS. It supports downloading multiple torrents at the same time, is capable of both downloading and uploading and can save the status of your unfinished torrents.
For a comprehensive list of all available torrent clients you may visit this link: http://en.wikipedia.org/wiki/Comparison_of_BitTorrent_clients
Alright! But What is a Seed, Leech, and all those terms in Torrent:
Well torrent has its own set of terminology.
Seed: A “Seeder” is a user who has successfully downloaded the file and is now sharing it with peers.

Peers: Every person or user who’s downloading. A peer does not have the complete file. Once a peer has completed the download, they can become a seed.
Leech: Quite same as peer except that they don’t share the files once they have completed the downloads.
UD ratio: It’s the Upload to Download Ratio. Since the original principle behind torrents is to share, you try to keep your UD Ratio close to 1.That is you upload what you download.
Tracker: A server that coordinates all of the torrent downloads and users.
Swarm: Anyone and everyone connected to the tracker.

Are Torrents legal to download?
Well that’s something that you will need to understand. Torrent technology is perfectly legal. So why does torrent clients like piratebay and limewire face legal notices from time to time, Well actually its the content that is being downloaded legal or illegal if you tend to download the latest movie released last week then it is perfectly illegal as it promotes piracy. So as long as you know that the content being shared doesn’t breach any laws it’s perfectly safe to use torrents.

How to Choose a Perfect Mouse



Size and Ergonomics

Undoubtedly the most important factor in choosing a mouse is how it feels. If you  have a good mouse that works with you can still make a huge difference. For the most part, this involves two things: size and grip. Size is mostly personal preference (plus how portable you want your mouse to be), but certain mice are better for certain types of grips. The three main grips are:


Palm Grip: With this style of a grip, you lay your entire hand on the mouse, using your palm to move the mouse around. You'll feel this most in your wrist and forearm. It's faster than the other grips, albeit less precise, so not always the best for gamers that require very precise movements. It's also the more comfortable of the two, so if you have RSI problems, you're probably better off with a mouse that encourages this type of grip. Usually these mice have a bigger bump on the back end for your palm to rest. Examples include the Razer Lachesis and the Microsoft IntelliMouse Explorer.


Claw Grip: The claw grip gets its name from the way your hand looks when you hold the mouse—your palm may still rest on the back, but your top fingers are arched in a claw-like fashion, and you may use your thumb, ring finger, and pinky to give you a bit more control over the mouse. It's more precise than the palm grip, but can be a bit more straining too. These mice are usually longer and have lipped edges, so you can pick the mouse up and move it. This is kind of in between the palm and fingertip grip, though, so you can use a ton of different mice with it, depending on where you fall in the spectrum. The Razer DeathAdder and Logitech G9x are popular gaming mice for this grip, while the Logitech Performance Mouse MX (my personal mouse of choice) is great for regular PC users.

Fingertip Grip: This is the complete opposite end of the spectrum of the palm grip. With this, your palm doesn't rest on the end at all, you control the mouse entirely with your fingertips. This is the most precise of all the grips, but can also be the most taxing. Many people find it also has the steepest learning curve (since the palm grip is what most people use naturally), so if you have issues with RSI, you might want to avoid this grip. These mice tend to be smaller and flatter, like the Razer Abyssus or the Logitech Marathon Mouse M705.
The above images are from Razer's mouse ergonomics guide, which I recommend checking out. It's mainly written for gamers, but can apply to anyone. I also recommend checking out NCIX Tech Tips' guide to mouse ergonomics if you want more information on figuring out your grip and what mice are good for it. Note also that the mice listed above are just guidelines. Everyone's hands are different, and you probably use a combination of the above grips, or lie somewhere in between. The size of your hands can also influence which types of mice work with which types of grips. If you have smaller than average hands, for example, don't be afraid to venture outside the above recommendations to see if your claw grip works with a mouse designed for a palm grip. The best advice I can give is go to the store and try them out—these aren't the kinds of things you can tell when ordering a mouse online.


Wired vs. Wireless
One of the other big deciding factors in your mouse decision is going to be whether you want a wireless mouse or one with a cable attached. In general, wireless mice tend to be more convenient, since the cable can't catch on your desk or get in the way. However, wireless mice can also carry some lag (usually about 8ms), which can feel like an hour if you're in the middle of an intense gaming session. Furthermore, they can sometimes interfere with other wireless devices in your home, like a wireless G router, or 2.4 GHz cordless phones. Wireless mice also require batteries, which can be a pain if you forget to charge them or pick up some AAs at the store.
Also keep in mind that if you're going to go wireless, you have a few different choices—namely Bluetooth and RF. RF mice are usually a bit more responsive and have a longer range, but they require a USB receiver, so they'll still take up a USB port on your machine. They're also more likely to interfere with other wireless devices, as I mentioned before. Bluetooth mice are a bit rarer, but will pair with many computers on their own (if your computer has Bluetooth built-in). Finding a good Bluetooth mouse can be hard, since RF is much more common—so unless you're really short on USB ports, I wouldn't recommend being too picky about Bluetooth versus RF.


Extra Buttons
Extra buttons aren't just for gamers anymore, folks. You can map your spare buttons to any function, like back and forward in your browse, or to a function like Mac OS X's Exposé. Some Logitech mice even have an awesome "fast scroll" button that'll make your scroll wheel move fast, smoothly, and with momentum, which is great for scrolling through long pages quickly. I wouldn't base my entire decision on how many buttons a mouse has, but getting something with a few extra buttons on the side can be really nice for those features you use extra often. Have to copy and paste a lot of text in your day? Map those to some of your extra buttons. Switch between a ton of virtual desktops to manage your windows? The arrow buttons on the side of many Logitech mice are perfect for that. You're only limited by your imagination with this, so think of the more painstaking keyboard shortcuts you use and map them right to your mouse buttons. You'd be surprised how much of a difference it can make.


Sensitivity
I briefly mentioned this above, but if you're doing something that requires precise movements—like gaming or image editing—make sure you get a mouse that has relatively high sensitivity. Your mouse's sensitivity determines how small of a movement you need to make for your cursor to move. Perhaps you've noticed that with some mice, your cursor will get "stuck" if you move your mouse to slightly, and you have to jerk it out of place. High sensitivity mice don't have this problem, since slighter movements yield small movements in your cursor.
Sensitivity is calculated in dots per inch (DPI). Most medium- to high-end mice come with high sensitivities, usually 1200 DPI or higher, which should be more than enough. Just make sure that you aren't getting a cheap 400 DPI mouse if you're doing precision-oriented tasks. Some mice even have buttons on them that let you switch between different sensitivities without opening up their control panel, which is great if you want to quickly switch to a high sensitivity for image editing or gaming, then switch back when you go to do normal work.

What We Use
While we encourage you to do your own research and shopping, here are a few of the Lifehacker staff's favorite mice to get you started:
  • At least four of us use the Logitech Performance Mouse MX (formerly known as the MX Revolution), and we're all in love with it. It perfectly contours to your hand, has a few extra buttons that you can remap to whatever you want, and has the amazing momentum scrolling feature I mentioned earlier. While it's designed for more of a palm or claw grip, it'll really work with any grip you want, in my experience. This is a great place to start if you're looking for a good wireless mouse (though it isn't exactly portable, as it's huge).
  • On the other end of the spectrum is the Microsoft Wireless Mouse 5000, which is Dachis' favorite external mouse (he's usually a trackpad kind of guy). It's simple, inexpensive, wireless, and portable enough to carry around with you.
  • For gaming, Jason is currently digging the Razer Naga, who's main draw is a big panel of twelve—count them—thumb buttons. It's designed for massively multiplayer games like World of Warcraft, but you can map them to functions in any game you want (or even on the desktop, if you're the adventurous type).
Don't forget, comfort and health will come first. You possibly spend lots of time sitting your desk with these peripherals, and the more unlikely you are to formulate strain injuries, the better—the rest is definitely a subject of benefit.
So be careful about this ........and keep connect with us<~~~~~~~~~~~~~~







Thursday, 9 August 2012

LIST OF COMMANDS USED IN COMMAND PROMPT

cmd

 

Command Prompt:


Quote:


ANSI.SYS Defines functions that change display graphics, control cursor movement, and reassign keys.
APPEND Causes MS-DOS to look in other directories when editing a file or running a command.
ARP Displays, adds, and removes arp information from network devices.
ASSIGN Assign a drive letter to an alternate letter.
ASSOC View the file associations.
AT Schedule a time to execute commands or programs.
ATMADM Lists connections and addresses seen by Windows ATM call manager.
ATTRIB Display and change file attributes.
BATCH Recovery console command that executes a series of commands in a file.
BOOTCFG Recovery console command that allows a user to view, modify, and rebuild the boot.ini
BREAK Enable / disable CTRL + C feature.
CACLS View and modify file ACL’s.
CALL Calls a batch file from another batch file.
CD Changes directories.
CHCP Supplement the International keyboard and character set information.
CHDIR Changes directories.
CHKDSK Check the hard disk drive running FAT for errors.
CHKNTFS Check the hard disk drive running NTFS for errors.
CHOICE Specify a listing of multiple options within a batch file.
CLS Clears the screen.
CMD Opens the command interpreter.
COLOR Easily change the foreground and background color of the MS-DOS window.
COMP Compares files.
COMPACT Compresses and uncompress files.
CONTROL Open control panel icons from the MS-DOS prompt.
CONVERT Convert FAT to NTFS.
COPY Copy one or more files to an alternate location.
CTTY Change the computers input/output devices.
DATE View or change the systems date.
DEBUG Debug utility to create assembly programs to modify hardware settings.
DEFRAG Re-arrange the hard disk drive to help with loading programs.
DEL Deletes one or more files.
DELETE Recovery console command that deletes a file.
DELTREE Deletes one or more files and/or directories.
DIR List the contents of one or more directory.
DISABLE Recovery console command that disables Windows system services or drivers.
DISKCOMP Compare a disk with another disk.
DISKCOPY Copy the contents of one disk and place them on another disk.
DOSKEY Command to view and execute commands that have been run in the past.
DOSSHELL A GUI to help with early MS-DOS users.
DRIVPARM Enables overwrite of original device drivers.
ECHO Displays messages and enables and disables echo.
EDIT View and edit files.
EDLIN View and edit files.
EMM386 Load extended Memory Manager.
ENABLE Recovery console command to enable a disable service or driver.
ENDLOCAL Stops the localization of the environment changes enabled by the setlocal command.
ERASE Erase files from computer.
EXIT Exit from the command interpreter.
EXPAND Expand a M*cros*ft Windows file back to it’s original format.
EXTRACT Extract files from the M*cros*ft Windows cabinets.
FASTHELP Displays a listing of MS-DOS commands and information about them.
FC Compare files.
FDISK Utility used to create partitions on the hard disk drive.
FIND Search for text within a file.
FINDSTR Searches for a string of text within a file.
FIXBOOT Writes a new boot sector.
FIXMBR Writes a new boot record to a disk drive.
FOR Boolean used in batch files.
FORMAT Command to erase and prepare a disk drive.
FTP Command to connect and operate on a FTP server.
FTYPE Displays or modifies file types used in file extension associations.
GOTO Moves a batch file to a specific label or location.
GRAFTABL Show extended characters in graphics mode.
HELP Display a listing of commands and brief explanation.
IF Allows for batch files to perform conditional processing.
IFSHLP.SYS 32-bit file manager.
IPCONFIG Network command to view network adapter settings and assigned values.
KEYB Change layout of keyboard.
LABEL Change the label of a disk drive.
LH Load a device driver in to high memory.
LISTSVC Recovery console command that displays the services and drivers.
LOADFIX Load a program above the first 64k.
LOADHIGH Load a device driver in to high memory.
LOCK Lock the hard disk drive.
LOGON Recovery console command to list installations and enable administrator login.
MAP Displays the device name of a drive.
MD Command to create a new directory.
MEM Display memory on system.
MKDIR Command to create a new directory.
MODE Modify the port or display settings.
MORE Display one page at a time.
MOVE Move one or more files from one directory to another directory.
MSAV Early M*cros*ft Virus scanner.
MSD Diagnostics utility.
MSCDEX Utility used to load and provide access to the CD-ROM.
NBTSTAT Displays protocol statistics and current TCP/IP connections using NBT
NET Update, fix, or view the network or network settings
NETSH Configure dynamic and static network information from MS-DOS.
NETSTAT Display the TCP/IP network protocol statistics and information.
NLSFUNC Load country specific information.
NSLOOKUP Look up an IP address of a domain or host on a network.
PATH View and modify the computers path location.
PATHPING View and locate locations of network latency.
PAUSE Command used in batch files to stop the processing of a command.
PING Test / send information to another network computer or network device.
POPD Changes to the directory or network path stored by the pushd command.
POWER Conserve power with computer portables.
PRINT Prints data to a printer port.
PROMPT View and change the MS-DOS prompt.
PUSHD Stores a directory or network path in memory so it can be returned to at any time.
QBASIC Open the QBasic.
RD Removes an empty directory.
REN Renames a file or directory.
RENAME Renames a file or directory.
RMDIR Removes an empty directory.
ROUTE View and configure windows network route tables.
RUNAS Enables a user to execute a program on another computer.
SCANDISK Run the scandisk utility.
SCANREG Scan registry and recover registry from errors.
SET Change one variable or string to another.
SETLOCAL Enables local environments to be changed without affecting anything else.
SETVER Change MS-DOS version to trick older MS-DOS programs.
SHARE Installs support for file sharing and locking capabilities.
SHIFT Changes the position of replaceable parameters in a batch program.
SHUTDOWN Shutdown the computer from the MS-DOS prompt.
SMARTDRV Create a disk cache in conventional memory or extended memory.
SORT Sorts the input and displays the output to the screen.
START Start a separate window in Windows from the MS-DOS prompt.
SUBST Substitute a folder on your computer for another drive letter.
SWITCHES Remove add functions from MS-DOS.
SYS Transfer system files to disk drive.
TELNET Telnet to another computer / device from the prompt.
TIME View or modify the system time.
TITLE Change the title of their MS-DOS window.
TRACERT Visually view a network packets route across a network.
TREE View a visual tree of the hard disk drive.
TYPE Display the contents of a file.
UNDELETE Undelete a file that has been deleted.
UNFORMAT Unformat a hard disk drive.
UNLOCK Unlock a disk drive.
VER Display the version information.
VERIFY Enables or disables the feature to determine if files have been written properly.
VOL Displays the volume information about the designated drive.
XCOPY Copy multiple files, directories, and/or drives from one location to another.
TRUENAME When placed before a file, will display the whole directory in which it exists
TASKKILL It allows you to kill those unneeded or locked up applications

Related Posts Plugin for WordPress, Blogger...

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Blogger Templates