Minggu, 11 Desember 2011
Kamis, 08 Desember 2011
7 ways to Protect ur Windows XP
1. Turn on Automatic Updates in Windows XP
Automatic Updates is a Windows XP utility that allows your computer to download security updates from Microsoft automatically. Turning on Automatic Updates helps to secure your computer since you'll always have the latest critical security updates.
2. Turn on the Free Firewall in Windows XP
If you have Service Pack 2 installed, you have a free firewall that you can use to protect your computer from attacks. However, you must turn the free firewall on.
3. Use Internet Explorer Wisely
Internet Explorer 6 provides four zones for which you can establish seperate security settings. By using the four zones, you'll reduce your chances of being the victim of an attack when you inadvertently visit a malicious Web site.
4. Use Anti-Virus Software
Viruses can reak havoc on your computer. Protect yourself by using antivirus software.
5. Use Spyware and Adware Software
Spyware is software that allows companies to monitor what websites you visit or even access your computer. Adware is software that displays advertisements. Protect your computer by using spyware and adware software.
6. Be Careful What You Click On
Often, attackers must entice you to open an email attachment or visit their Web site in order to attack your computer. If you open the attachment or visit their site, malicious code is executed on your computer. To protect your computer, be careful what you click on.
7. Use Limited Accounts to Better Secure Your Windows XP Computer
It's harder for someone to attack your computer through the Internet if you're using a limited account. Learn why it's best to use limited accounts for daily use and how to create a limited account.
Will Using a Limited Account Help Prevent Attacks?
Windows XP provides two different types of user accounts: limited and administrator. Administrator accounts have unlimited access to the computer, while limited accounts have some restrictions. One significant difference between limited and administrator accounts is the ease with which both types of users can download and install programs.
Since it's easy for you to download and install programs while using an administrator account, it's also easier for attackers to download and install programs to your computer without your knowledge. If an attacker entices you to visit their Web site and you're using an administrator account, the attacker may be able to put programs on your computer that could delete your files, spy on your activity, use your computer to attack others, and more.
In contrast, if you're using a limited account when you visit an attacker's Web site, it's less likely the attacker will be able to download and install the program or file that's necessary to infect your computer.
As a result, using limited accounts in Windows XP for daily use can reduce your risk of being the victim of a computer attack
Automatic Updates is a Windows XP utility that allows your computer to download security updates from Microsoft automatically. Turning on Automatic Updates helps to secure your computer since you'll always have the latest critical security updates.
2. Turn on the Free Firewall in Windows XP
If you have Service Pack 2 installed, you have a free firewall that you can use to protect your computer from attacks. However, you must turn the free firewall on.
3. Use Internet Explorer Wisely
Internet Explorer 6 provides four zones for which you can establish seperate security settings. By using the four zones, you'll reduce your chances of being the victim of an attack when you inadvertently visit a malicious Web site.
4. Use Anti-Virus Software
Viruses can reak havoc on your computer. Protect yourself by using antivirus software.
5. Use Spyware and Adware Software
Spyware is software that allows companies to monitor what websites you visit or even access your computer. Adware is software that displays advertisements. Protect your computer by using spyware and adware software.
6. Be Careful What You Click On
Often, attackers must entice you to open an email attachment or visit their Web site in order to attack your computer. If you open the attachment or visit their site, malicious code is executed on your computer. To protect your computer, be careful what you click on.
7. Use Limited Accounts to Better Secure Your Windows XP Computer
It's harder for someone to attack your computer through the Internet if you're using a limited account. Learn why it's best to use limited accounts for daily use and how to create a limited account.
Will Using a Limited Account Help Prevent Attacks?
Windows XP provides two different types of user accounts: limited and administrator. Administrator accounts have unlimited access to the computer, while limited accounts have some restrictions. One significant difference between limited and administrator accounts is the ease with which both types of users can download and install programs.
Since it's easy for you to download and install programs while using an administrator account, it's also easier for attackers to download and install programs to your computer without your knowledge. If an attacker entices you to visit their Web site and you're using an administrator account, the attacker may be able to put programs on your computer that could delete your files, spy on your activity, use your computer to attack others, and more.
In contrast, if you're using a limited account when you visit an attacker's Web site, it's less likely the attacker will be able to download and install the program or file that's necessary to infect your computer.
As a result, using limited accounts in Windows XP for daily use can reduce your risk of being the victim of a computer attack
Root kit
Many of the basic to intermediate computer users today are very familiar with the terms trojan, virus, adware, spyware, and worm. While many may not understand exactly how these work, most users today are aware of the threat that they pose, and the necessity of having the proper software to detect, delete, and protect against them.
In the last few years, however, another threat has emerged : rootkits. While many may have heard the term, most are still somewhat ignorant to what rootkits are and how they go about detecting and removing them.
---What is a rootkit ?---
The term rootkit has been around for more than 10 years. A rootkit is a "kit" consisting of small and useful programs that allow an attacker to maintain access to "root," the most powerful user on a computer. In other words, a rootkit is a set of programs and code that allows a permanent or consistent, undetectable presence on a computer.
In our definition of "rootkit," the key word is "undetectable." Most of the technology and tricks employed by a rootkit are designed to hide code and data on a system. For example, many rootkits can hide files and directories. Other features in a rootkit are usually for remote access and eavesdroppingâ€â€Âfor instance, for sniffing packets from the network. When combined, these features deliver a knockout punch to security. Unfortunately, they are extremely effective which means that some of you reading this will be infected even though you believe your PC to be totally clean.
---How do rootkits work ?---
Rootkits work using a simple concept called modification. In general, software is designed to make specific decisions based on very specific data. A rootkit locates and modifies the software so it makes incorrect decisions.
There are many places where modifications can be made in software. Here are some of them:.
Patching
Executable code (sometimes called a binary) consists of a series of statements encoded as data bytes. These bytes come in a very specific order, and each means something to the computer. Software logic can be modified if these bytes are modified. This technique is sometimes called patchingâ€â€Âlike placing a patch of a different color on a quilt. Software is not smart; it does only and exactly what it is told to do and nothing else. That is why modification works so well. In fact, under the hood, it's not all that complicated. Byte patching is one of the major techniques used by "crackers" to remove software protections. Other types of byte patches have been used to cheat on video games (for example, to give unlimited gold, health, or other advantages).
Easter Eggs
Software logic modifications may be "built in." A programmer may place a back door in a program she wrote. This back door is not in the documented design, so the software has a hidden feature. This is sometimes called an Easter Egg, and can be used like a signature: The programmer leaves something behind to show that she wrote the program. Earlier versions of the widely used program Microsoft Excel contained an easter-egg that allowed a user who found it to play a 3D first-person shooter game similar to Doom embedded inside a spreadsheet cell.
Spyware Modifications
Sometimes a program will modify another program to infect it with "spyware." Some types of spyware track which Web sites are visited by users of the infected computer. Like rootkits, spyware may be difficult to detect. Some types of spyware hook into Web browsers or program shells, making them difficult to remove. They then make the user's life hell by placing links for new mortgages and Viagra on their desktops, and generally reminding them that their browsers are totally insecure.
Source-Code Modification
Sometimes software is modified at the sourceâ€â€Âliterally. A programmer can insert malicious lines of source code into a program she authors. This threat has caused some military applications to avoid open-source packages such as Linux. These open-source projects allow almost anyone ("anyone" being "someone you don't know") to add code to the sources. Granted, there is some amount of peer review on important code like BIND, Apache, and Sendmail. But, on the other hand, does anyone really go through the code line by line? (If they do, they don't seem to do it very well when trying to find security holes!) Imagine a back door that is implemented as a bug in the software. For example, a malicious programmer may expose a program to a buffer overflow on purpose. This type of back door can be placed on purpose. Since it's disguised as a bug, it becomes difficult to detect. Furthermore, it offers plausible deniability on the part of the programmer! Even the very tools used by security professionals have been hacked in this way.
---Okay, so what do I do ?---
Thankfully there is a new class of security product now available called rootkit detectors that use specialized techniques to detect these dangerous intruders.
Most of these detectors require quite a bit of technical skill to interpret the results but one of the simplest to use are also amongst the most effective. The first is called Panda Anti-Rootkit. It's my top recommendation for any..but if u have any sprogram that u try go....
In the last few years, however, another threat has emerged : rootkits. While many may have heard the term, most are still somewhat ignorant to what rootkits are and how they go about detecting and removing them.
---What is a rootkit ?---
The term rootkit has been around for more than 10 years. A rootkit is a "kit" consisting of small and useful programs that allow an attacker to maintain access to "root," the most powerful user on a computer. In other words, a rootkit is a set of programs and code that allows a permanent or consistent, undetectable presence on a computer.
In our definition of "rootkit," the key word is "undetectable." Most of the technology and tricks employed by a rootkit are designed to hide code and data on a system. For example, many rootkits can hide files and directories. Other features in a rootkit are usually for remote access and eavesdroppingâ€â€Âfor instance, for sniffing packets from the network. When combined, these features deliver a knockout punch to security. Unfortunately, they are extremely effective which means that some of you reading this will be infected even though you believe your PC to be totally clean.
---How do rootkits work ?---
Rootkits work using a simple concept called modification. In general, software is designed to make specific decisions based on very specific data. A rootkit locates and modifies the software so it makes incorrect decisions.
There are many places where modifications can be made in software. Here are some of them:.
Patching
Executable code (sometimes called a binary) consists of a series of statements encoded as data bytes. These bytes come in a very specific order, and each means something to the computer. Software logic can be modified if these bytes are modified. This technique is sometimes called patchingâ€â€Âlike placing a patch of a different color on a quilt. Software is not smart; it does only and exactly what it is told to do and nothing else. That is why modification works so well. In fact, under the hood, it's not all that complicated. Byte patching is one of the major techniques used by "crackers" to remove software protections. Other types of byte patches have been used to cheat on video games (for example, to give unlimited gold, health, or other advantages).
Easter Eggs
Software logic modifications may be "built in." A programmer may place a back door in a program she wrote. This back door is not in the documented design, so the software has a hidden feature. This is sometimes called an Easter Egg, and can be used like a signature: The programmer leaves something behind to show that she wrote the program. Earlier versions of the widely used program Microsoft Excel contained an easter-egg that allowed a user who found it to play a 3D first-person shooter game similar to Doom embedded inside a spreadsheet cell.
Spyware Modifications
Sometimes a program will modify another program to infect it with "spyware." Some types of spyware track which Web sites are visited by users of the infected computer. Like rootkits, spyware may be difficult to detect. Some types of spyware hook into Web browsers or program shells, making them difficult to remove. They then make the user's life hell by placing links for new mortgages and Viagra on their desktops, and generally reminding them that their browsers are totally insecure.
Source-Code Modification
Sometimes software is modified at the sourceâ€â€Âliterally. A programmer can insert malicious lines of source code into a program she authors. This threat has caused some military applications to avoid open-source packages such as Linux. These open-source projects allow almost anyone ("anyone" being "someone you don't know") to add code to the sources. Granted, there is some amount of peer review on important code like BIND, Apache, and Sendmail. But, on the other hand, does anyone really go through the code line by line? (If they do, they don't seem to do it very well when trying to find security holes!) Imagine a back door that is implemented as a bug in the software. For example, a malicious programmer may expose a program to a buffer overflow on purpose. This type of back door can be placed on purpose. Since it's disguised as a bug, it becomes difficult to detect. Furthermore, it offers plausible deniability on the part of the programmer! Even the very tools used by security professionals have been hacked in this way.
---Okay, so what do I do ?---
Thankfully there is a new class of security product now available called rootkit detectors that use specialized techniques to detect these dangerous intruders.
Most of these detectors require quite a bit of technical skill to interpret the results but one of the simplest to use are also amongst the most effective. The first is called Panda Anti-Rootkit. It's my top recommendation for any..but if u have any sprogram that u try go....
23 ways..to speed WIN XP..not only in defrag
Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.
1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.
2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.
3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.
4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.
The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.
Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.
Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.
5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.
6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.
7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.
8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.
9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.
10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.
11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.
12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.
13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.
14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.
15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.
16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.
17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.
18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.
19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.
20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.
21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.
22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.
23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.
Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive :)
1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.
2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.
3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.
4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.
The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.
Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.
Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.
5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.
6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.
7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.
8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.
9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.
10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.
11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.
12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.
13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.
14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.
15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.
16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.
17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.
18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.
19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.
20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.
21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.
22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.
23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.
Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive :)
Change Your Yahoo Sex.
Alright,I fount this on my own so don't go around telling everyone you fount it and take credit for it,if I find out yall have been taking credit for it I wont release anything else.
Okay,lets begin.
First:Goto http://manage.members.yahoo.com/index_listprofiles.html
Second:Click edit on the profile you want to change the sex on
Third:Click edit profile information
Fourth:Right click the page after it loads and view the source
Fifth:Find <option value="male">Male</option>
Six:Change it to <option value="Whatever">Whatever</option>
Seven:Then find /index_ep.html and change it to http://manage.members.yahoo.com/index_ep.html
Eight:Save that page as edit.html
Last:Load that page,put the sex drop down on whatever you put and click save
And your done.
Example: http://profiles.yahoo.com/frisky.owns
Okay,lets begin.
First:Goto http://manage.members.yahoo.com/index_listprofiles.html
Second:Click edit on the profile you want to change the sex on
Third:Click edit profile information
Fourth:Right click the page after it loads and view the source
Fifth:Find <option value="male">Male</option>
Six:Change it to <option value="Whatever">Whatever</option>
Seven:Then find /index_ep.html and change it to http://manage.members.yahoo.com/index_ep.html
Eight:Save that page as edit.html
Last:Load that page,put the sex drop down on whatever you put and click save
And your done.
Example: http://profiles.yahoo.com/frisky.owns
Enabling right click on sites that disable it!
Enabling right click on sites that disable it!
=============================================
Lots of web sites have disabled the right click function of the mouse button... it's really, really annoying. This is done so that you don't steal (via right-click->save picture) their photos or images or any other goodies. Unfortunately, it disables ALL right-click functionality: copy, paste, open in new window.
It's easy to change, assuming your using IE 6:
QUOTE
Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok" a couple of times.
You'll probably want to turn this back to "enable" when your done... 'cause generally the javascript enhances a website.
Enjoy!
=============================================
Lots of web sites have disabled the right click function of the mouse button... it's really, really annoying. This is done so that you don't steal (via right-click->save picture) their photos or images or any other goodies. Unfortunately, it disables ALL right-click functionality: copy, paste, open in new window.
It's easy to change, assuming your using IE 6:
QUOTE
Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok" a couple of times.
You'll probably want to turn this back to "enable" when your done... 'cause generally the javascript enhances a website.
Enjoy!
Yahoo Security Key
A Yahoo Security Key will add an extra layer of protection to keep your Yahoo E-Mail Account and Screen Name safe from hackers and crackers.
What is a Yahoo! Security Key?
A Yahoo! Security Key is a personal access code (like
the PIN you use at the ATM) designed to protect your
most sensitive information displayed on Yahoo!.
First..go to this link:
Code:
http://help.yahoo.com/help/us/skey/skey-01.html
At the upper left hand corner of this page please note the area.."forgot security key".....click here
Now you are presented with a log in page...log in with your Yahoo ID you want to obtain a security key for.
Now..you will be ask once again to verify your password...do so.
You are now presented with a page noting the header:
Yahoo Security Key Sign Up
Choose A Security Key
Now..enter the security key you have chosen and verify it....[ hint..do not use your regular password as your security key ]
Now you are ask to select a secret question....then to supply an answer to the secret question
Please..use this example for security questions and answers:
Security Question..Favorite City
Security Question Answer:I like cheeto's..[ no one is going to guess this type of security question answer ]
Note your default e-mail address...[use a real e-mail address other than Yahoo]
Note your zip code and country..[it does not need to be your real zip code and may be differant than the one you have noted on your Yahoo account ].
Now..print out this page for future reference.
Now simply click the submit button.
Hint:if you get a "page cannot be displayed " message do not worry..simply use the "go back" feature of your browser.
You are now presented with a page asking you to verify your security key to continue..enter your security key and log in.
Here is the trick...You will receive a "page cannot be displayed message".. at this point....Do not worry..simply hit the go back feature of your browser.You will then receive a page asking you to enter your security key to continue.
Do not enter your security key at this time...simply go to the top of the page and click the Yahoo icon.You will now be directed to Yahoo's main page..and as you can see you are still logged in.
Click on the Yahoo Mail icon at the top of the Yahoo page.
Once in your mail account..click the account icon at the top of this page...enter your regular Yahoo password and you are now into your Yahoo account.
Please note at this time the area of this page that says"change password".
Look under this area.
Now you will also have a "Change your Security Key" notation here.
You now have a security key...and your Yahoo Account is for all practical purposes uncrackable and unhackable.
I know this must seem like a lot of work..but after you do it one time..you will see that is is really simple to do..and well worth doing to protect your Yahoo Account.
I do hope this is helpful to those of you who are concerned about the security of your Yahoo Account.Yes..we have played a little trick on Yahoo...but your account is now secure..and you did not need to use a credit card.
What is a Yahoo! Security Key?
A Yahoo! Security Key is a personal access code (like
the PIN you use at the ATM) designed to protect your
most sensitive information displayed on Yahoo!.
First..go to this link:
Code:
http://help.yahoo.com/help/us/skey/skey-01.html
At the upper left hand corner of this page please note the area.."forgot security key".....click here
Now you are presented with a log in page...log in with your Yahoo ID you want to obtain a security key for.
Now..you will be ask once again to verify your password...do so.
You are now presented with a page noting the header:
Yahoo Security Key Sign Up
Choose A Security Key
Now..enter the security key you have chosen and verify it....[ hint..do not use your regular password as your security key ]
Now you are ask to select a secret question....then to supply an answer to the secret question
Please..use this example for security questions and answers:
Security Question..Favorite City
Security Question Answer:I like cheeto's..[ no one is going to guess this type of security question answer ]
Note your default e-mail address...[use a real e-mail address other than Yahoo]
Note your zip code and country..[it does not need to be your real zip code and may be differant than the one you have noted on your Yahoo account ].
Now..print out this page for future reference.
Now simply click the submit button.
Hint:if you get a "page cannot be displayed " message do not worry..simply use the "go back" feature of your browser.
You are now presented with a page asking you to verify your security key to continue..enter your security key and log in.
Here is the trick...You will receive a "page cannot be displayed message".. at this point....Do not worry..simply hit the go back feature of your browser.You will then receive a page asking you to enter your security key to continue.
Do not enter your security key at this time...simply go to the top of the page and click the Yahoo icon.You will now be directed to Yahoo's main page..and as you can see you are still logged in.
Click on the Yahoo Mail icon at the top of the Yahoo page.
Once in your mail account..click the account icon at the top of this page...enter your regular Yahoo password and you are now into your Yahoo account.
Please note at this time the area of this page that says"change password".
Look under this area.
Now you will also have a "Change your Security Key" notation here.
You now have a security key...and your Yahoo Account is for all practical purposes uncrackable and unhackable.
I know this must seem like a lot of work..but after you do it one time..you will see that is is really simple to do..and well worth doing to protect your Yahoo Account.
I do hope this is helpful to those of you who are concerned about the security of your Yahoo Account.Yes..we have played a little trick on Yahoo...but your account is now secure..and you did not need to use a credit card.
Basic HTML tags for all Yahoo spammers
BASIC ELEMENTS
Document Type <HTML></HTML> (beginning and end of file)
Title <TITLE></TITLE> (must be in header)
Header <HEAD></HEAD> (descriptive info, such as title)
Body <BODY></BODY> (bulk of the page)
--------------------------------------------------------------------------------
STRUCTURAL DEFINITION
Heading <H?></H?> (the spec. defines 6 levels)
Align Heading <H? ALIGN=LEFT|CENTER|RIGHT></H?>
Division <DIV></DIV>
Align Division <DIV ALIGN=LEFT|RIGHT|CENTER|JUSTIFY></DIV>
4.0 Defined Content <SPAN></SPAN>
Block Quote <BLOCKQUOTE></BLOCKQUOTE> (usually indented)
4.0 Quote <Q></Q> (for short quotations)
4.0 Citation <Q CITE="URL"></Q>
Emphasis (usually displayed as italic)
Strong Emphasis (usually displayed as bold)
Citation <CITE></CITE> (usually italics)
Code <CODE></CODE> (for source code listings)
Sample Output <SAMP></SAMP>
Keyboard Input <KBD></KBD>
Variable <VAR></VAR>
Definition <DFN></DFN> (not widely implemented)
Author's Address <ADDRESS></ADDRESS>
Large Font Size <BIG></BIG>
Small Font Size
4.0 Insert <INS></INS> (marks additions in a new version)
4.0 Time of Change <INS DATETIME="::
</INS>
4.0 Comments <INS CITE="URL"></INS>
4.0 Delete <DEL></DEL> (marks deletions in a new version)
4.0 Time of Change <DEL DATETIME="::
</DEL>
4.0 Comments <DEL CITE="URL"></DEL>
4.0 Acronym <ACRONYM></ACRONYM>
4.0 Abbreviation <ABBR></ABBR>
--------------------------------------------------------------------------------
PRESENTATION FORMATTING
Bold
Italic
4.0* Underline <U></U> (not widely implemented)
Strikeout <STRIKE></STRIKE> (not widely implemented)
4.0* Strikeout <S></S> (not widely implemented)
Subscript <SUB></SUB>
Superscript <SUP></SUP>
Typewriter <TT></TT> (displays in a monospaced font)
Preformatted <PRE></PRE> (display text spacing as-is)
Width <PRE WIDTH=?></PRE> (in characters)
Center <CENTER></CENTER> (for both text and images)
N1 Blinking <BLINK></BLINK> (the most derided tag ever)
Font Size <FONT SIZE=?></FONT> (ranges from 1-7)
Change Font Size <FONT SIZE="+|-?"></FONT>
Font Color <FONT COLOR="#$$$$$$"></FONT>
4.0* Select Font <FONT FACE="***"></FONT>
N4 Point size <FONT POINT-SIZE=?></FONT>
N4 Weight <FONT WEIGHT=?></FONT>
4.0* Base Font Size <BASEFONT SIZE=?> (from 1-7; default is 3)
MS Marquee <MARQUEE></MARQUEE>
--------------------------------------------------------------------------------
POSITIONING
N3 Multi-Column <MULTICOL COLS=?></MULTICOL>
N3 Column Gutter <MULTICOL GUTTER=?></MULTICOL>
N3 Column Width <MULTICOL WIDTH=?></MULTICOL>
N3 Spacer <SPACER>
N3 Spacer Type <SPACER TYPE=HORIZONTAL|VERTICAL|BLOCK>
N3 Size <SPACER SIZE=?>
N3 Dimensions <SPACER WIDTH=? HEIGHT=?>
N3 Alignment <SPACER ALIGN=LEFT|RIGHT|CENTER>
N4 Layer <LAYER></LAYER>
N4 Name <LAYER ID="***"></LAYER>
N4 Location <LAYER LEFT=? TOP=?></LAYER>
N4 Rel. Position <LAYER PAGEX=? PAGEY=?></LAYER>
N4 Source File <LAYER SRC="***"></LAYER>
N4 Stacking <LAYER Z-INDEX=?></LAYER>
N4 Stack Position <LAYER ABOVE="***" BELOW="***"></LAYER>
N4 Dimensions <LAYER HEIGHT=? WIDTH=?></LAYER>
N4 Clipping Path <LAYER CLIP=,,,></LAYER>
N4 Visible? <LAYER VISIBILITY=SHOW|HIDDEN|INHERIT></LAYER>
N4 Background <LAYER BACKGROUND="$$$$$$"></LAYER>
N4 Color <LAYER BGCOLOR="$$$$$$"></LAYER>
N4 Inline Layer <ILAYER></ILAYER> (takes same attributes as LAYER)
N4 Alt. Content <NOLAYER></NOLAYER>
--------------------------------------------------------------------------------
LINKS, GRAPHICS, AND SOUNDS
Link Something
Link to Location (if in another document)
(if in current document)
4.0* Target Window
4.0* Action on Click (Javascript)
4.0* Mouseover Action (Javascript)
4.0* Mouse out Action (Javascript)
Link to Email
N, MS Specify Subject (use a real question mark)
Define Location <A NAME="***"></A>
Display Image [img]URL[/img]
Alignment [img]URL[/img]
N1 Alignment [img]URL[/img]
Alternate [img]URL[/img] (if image not displayed)
Dimensions [img]URL[/img] (in pixels)
[img]URL[/img] (as percentage of page width/height)
Border [img]URL[/img] (in pixels)
Runaround Space [img]URL[/img] (in pixels)
N1 Low-Res Proxy [img]URL[/img]
Imagemap [img]URL[/img] (requires a script)
Imagemap [img]URL[/img]
MS Movie Clip [img]***[/img]
MS Background Sound <BGSOUND SRC="***" LOOP=?|INFINITE>
Client-Side Map <MAP NAME="***"></MAP> (describes the map)
Map Section <AREA SHAPE="DEFAULT|RECT|CIRCLE|POLY" COORDS=",,," HREF="URL"|NOHREF>
N1 Client Pull <META HTTP-EQUIV="Refresh" CONTENT="?; URL=URL">
N2 Embed Object <EMBED SRC="URL"> (insert object into page)
N2 Object Size <EMBED SRC="URL" WIDTH=? HEIGHT=?>
4.0 Object <OBJECT></OBJECT>
4.0 Parameters <PARAM>
--------------------------------------------------------------------------------
DIVIDERS
Paragraph
</P> (closing tag often unnecessary)
Align Text <P ALIGN=LEFT|CENTER|RIGHT></P>
N Justify Text <P ALIGN=JUSTIFY></P>
Line Break
(a single carriage return)
Clear Textwrap <BR CLEAR=LEFT|RIGHT|ALL>
Horizontal Rule <HR>
Alignment <HR ALIGN=LEFT|RIGHT|CENTER>
Thickness <HR SIZE=?> (in pixels)
Width <HR WIDTH=?> (in pixels)
Width Percent <HR WIDTH="%"> (as a percentage of page width)
Solid Line <HR NOSHADE> (without the 3D cutout look)
N1 No Break <NOBR></NOBR> (prevents line breaks)
N1 Word Break <WBR> (where to break a line if needed)
--------------------------------------------------------------------------------
LISTS
Unordered List <UL><LI>[/list](before each list item)
Compact <UL COMPACT>[/list] Bullet Type <UL TYPE=DISC|CIRCLE|SQUARE> (for the whole list)
Bullet Type <LI TYPE=DISC|CIRCLE|SQUARE> (this & subsequent)
Ordered List
Document Type <HTML></HTML> (beginning and end of file)
Title <TITLE></TITLE> (must be in header)
Header <HEAD></HEAD> (descriptive info, such as title)
Body <BODY></BODY> (bulk of the page)
--------------------------------------------------------------------------------
STRUCTURAL DEFINITION
Heading <H?></H?> (the spec. defines 6 levels)
Align Heading <H? ALIGN=LEFT|CENTER|RIGHT></H?>
Division <DIV></DIV>
Align Division <DIV ALIGN=LEFT|RIGHT|CENTER|JUSTIFY></DIV>
4.0 Defined Content <SPAN></SPAN>
Block Quote <BLOCKQUOTE></BLOCKQUOTE> (usually indented)
4.0 Quote <Q></Q> (for short quotations)
4.0 Citation <Q CITE="URL"></Q>
Emphasis (usually displayed as italic)
Strong Emphasis (usually displayed as bold)
Citation <CITE></CITE> (usually italics)
Code <CODE></CODE> (for source code listings)
Sample Output <SAMP></SAMP>
Keyboard Input <KBD></KBD>
Variable <VAR></VAR>
Definition <DFN></DFN> (not widely implemented)
Author's Address <ADDRESS></ADDRESS>
Large Font Size <BIG></BIG>
Small Font Size
4.0 Insert <INS></INS> (marks additions in a new version)
4.0 Time of Change <INS DATETIME="::
4.0 Comments <INS CITE="URL"></INS>
4.0 Delete <DEL></DEL> (marks deletions in a new version)
4.0 Time of Change <DEL DATETIME="::
4.0 Comments <DEL CITE="URL"></DEL>
4.0 Acronym <ACRONYM></ACRONYM>
4.0 Abbreviation <ABBR></ABBR>
--------------------------------------------------------------------------------
PRESENTATION FORMATTING
Bold
Italic
4.0* Underline <U></U> (not widely implemented)
Strikeout <STRIKE></STRIKE> (not widely implemented)
4.0* Strikeout <S></S> (not widely implemented)
Subscript <SUB></SUB>
Superscript <SUP></SUP>
Typewriter <TT></TT> (displays in a monospaced font)
Preformatted <PRE></PRE> (display text spacing as-is)
Width <PRE WIDTH=?></PRE> (in characters)
Center <CENTER></CENTER> (for both text and images)
N1 Blinking <BLINK></BLINK> (the most derided tag ever)
Font Size <FONT SIZE=?></FONT> (ranges from 1-7)
Change Font Size <FONT SIZE="+|-?"></FONT>
Font Color <FONT COLOR="#$$$$$$"></FONT>
4.0* Select Font <FONT FACE="***"></FONT>
N4 Point size <FONT POINT-SIZE=?></FONT>
N4 Weight <FONT WEIGHT=?></FONT>
4.0* Base Font Size <BASEFONT SIZE=?> (from 1-7; default is 3)
MS Marquee <MARQUEE></MARQUEE>
--------------------------------------------------------------------------------
POSITIONING
N3 Multi-Column <MULTICOL COLS=?></MULTICOL>
N3 Column Gutter <MULTICOL GUTTER=?></MULTICOL>
N3 Column Width <MULTICOL WIDTH=?></MULTICOL>
N3 Spacer <SPACER>
N3 Spacer Type <SPACER TYPE=HORIZONTAL|VERTICAL|BLOCK>
N3 Size <SPACER SIZE=?>
N3 Dimensions <SPACER WIDTH=? HEIGHT=?>
N3 Alignment <SPACER ALIGN=LEFT|RIGHT|CENTER>
N4 Layer <LAYER></LAYER>
N4 Name <LAYER ID="***"></LAYER>
N4 Location <LAYER LEFT=? TOP=?></LAYER>
N4 Rel. Position <LAYER PAGEX=? PAGEY=?></LAYER>
N4 Source File <LAYER SRC="***"></LAYER>
N4 Stacking <LAYER Z-INDEX=?></LAYER>
N4 Stack Position <LAYER ABOVE="***" BELOW="***"></LAYER>
N4 Dimensions <LAYER HEIGHT=? WIDTH=?></LAYER>
N4 Clipping Path <LAYER CLIP=,,,></LAYER>
N4 Visible? <LAYER VISIBILITY=SHOW|HIDDEN|INHERIT></LAYER>
N4 Background <LAYER BACKGROUND="$$$$$$"></LAYER>
N4 Color <LAYER BGCOLOR="$$$$$$"></LAYER>
N4 Inline Layer <ILAYER></ILAYER> (takes same attributes as LAYER)
N4 Alt. Content <NOLAYER></NOLAYER>
--------------------------------------------------------------------------------
LINKS, GRAPHICS, AND SOUNDS
Link Something
Link to Location (if in another document)
(if in current document)
4.0* Target Window
4.0* Action on Click (Javascript)
4.0* Mouseover Action (Javascript)
4.0* Mouse out Action (Javascript)
Link to Email
N, MS Specify Subject (use a real question mark)
Define Location <A NAME="***"></A>
Display Image [img]URL[/img]
Alignment [img]URL[/img]
N1 Alignment [img]URL[/img]
Alternate [img]URL[/img] (if image not displayed)
Dimensions [img]URL[/img] (in pixels)
[img]URL[/img] (as percentage of page width/height)
Border [img]URL[/img] (in pixels)
Runaround Space [img]URL[/img] (in pixels)
N1 Low-Res Proxy [img]URL[/img]
Imagemap [img]URL[/img] (requires a script)
Imagemap [img]URL[/img]
MS Movie Clip [img]***[/img]
MS Background Sound <BGSOUND SRC="***" LOOP=?|INFINITE>
Client-Side Map <MAP NAME="***"></MAP> (describes the map)
Map Section <AREA SHAPE="DEFAULT|RECT|CIRCLE|POLY" COORDS=",,," HREF="URL"|NOHREF>
N1 Client Pull <META HTTP-EQUIV="Refresh" CONTENT="?; URL=URL">
N2 Embed Object <EMBED SRC="URL"> (insert object into page)
N2 Object Size <EMBED SRC="URL" WIDTH=? HEIGHT=?>
4.0 Object <OBJECT></OBJECT>
4.0 Parameters <PARAM>
--------------------------------------------------------------------------------
DIVIDERS
Paragraph
</P> (closing tag often unnecessary)
Align Text <P ALIGN=LEFT|CENTER|RIGHT></P>
N Justify Text <P ALIGN=JUSTIFY></P>
Line Break
(a single carriage return)
Clear Textwrap <BR CLEAR=LEFT|RIGHT|ALL>
Horizontal Rule <HR>
Alignment <HR ALIGN=LEFT|RIGHT|CENTER>
Thickness <HR SIZE=?> (in pixels)
Width <HR WIDTH=?> (in pixels)
Width Percent <HR WIDTH="%"> (as a percentage of page width)
Solid Line <HR NOSHADE> (without the 3D cutout look)
N1 No Break <NOBR></NOBR> (prevents line breaks)
N1 Word Break <WBR> (where to break a line if needed)
--------------------------------------------------------------------------------
LISTS
Unordered List <UL><LI>[/list](before each list item)
Compact <UL COMPACT>[/list] Bullet Type <UL TYPE=DISC|CIRCLE|SQUARE> (for the whole list)
Bullet Type <LI TYPE=DISC|CIRCLE|SQUARE> (this & subsequent)
Ordered List
- <LI>
Compact Numbering Type[list=1] (for the whole list)
Numbering Type <LI TYPE=A|a|I|i|1> (this & subsequent)
Starting Number[list=1] (for the whole list)
Starting Number <LI VALUE=?> (this & subsequent)
Definition List <DL><DT><DD></DL> (<DT>=term, <DD>=definition)
Compact <DL COMPACT></DL>
Menu List <MENU><LI></MENU> (before each list item)
Compact <MENU COMPACT></MENU>
Directory List <DIR><LI></DIR> (before each list item)
Compact <DIR COMPACT></DIR>
--------------------------------------------------------------------------------
BACKGROUNDS AND COLORS
Tiled Bkground <BODY BACKGROUND="URL">
MS Watermark <BODY BGPROPERTIES="FIXED">
Bkground Color <BODY BGCOLOR="#$$$$$$"> (order is red/green/blue)
Text Color <BODY TEXT="#$$$$$$">
Link Color <BODY LINK="#$$$$$$">
Visited Link <BODY VLINK="#$$$$$$">
Active Link <BODY ALINK="#$$$$$$">
--------------------------------------------------------------------------------
SPECIAL CHARACTERS
Special Character &#?; (where ? is the ISO 8859-1 code)
< <
> >
& &
" "
Registered TM ***174;
Registered TM ®
Copyright ***169;
Copyright ©
Non-Breaking Space ;
--------------------------------------------------------------------------------
FORMS
Define Form <FORM ACTION="URL" METHOD=GET|POST></FORM>
4.0* File Upload <FORM ENCTYPE="multipart/form-data"></FORM>
Input Field <INPUT TYPE="TEXT|PASSWORD|CHECKBOX|RADIO|
FILE|BUTTON|IMAGE|HIDDEN|SUBMIT|RESET">
Field Name <INPUT NAME="***">
Field Value <INPUT VALUE="***">
Checked? <INPUT CHECKED> (checkboxes and radio boxes)
Field Size <INPUT SIZE=?> (in characters)
Max Length <INPUT MAXLENGTH=?> (in characters)
4.0 Button <BUTTON></BUTTON>
4.0 Button Name <BUTTON NAME="***"></BUTTON>
4.0 Button Type <BUTTON TYPE="SUBMIT|RESET|BUTTON"></BUTTON>
4.0 Default Value <BUTTON VALUE="***"></BUTTON>
4.0 Label <LABEL></LABEL>
4.0 Item Labelled <LABEL FOR="***"></LABEL>
Selection List <SELECT></SELECT>
Name of List <SELECT NAME="***"></SELECT>
# of Options <SELECT SIZE=?></SELECT>
Multiple Choice <SELECT MULTIPLE> (can select more than one)
Option <OPTION> (items that can be selected)
Default Option <OPTION SELECTED>
Option Value <OPTION VALUE="***">
4.0 Option Group <OPTGROUP LABEL="***"></OPTGROUP>
Input Box Size <TEXTAREA ROWS=? COLS=?></TEXTAREA>
Name of Box <TEXTAREA NAME="***"></TEXTAREA>
N2 Wrap Text <TEXTAREA WRAP=OFF|HARD|SOFT></TEXTAREA>
4.0 Group elements <FIELDSET></FIELDSET>
4.0 Legend <LEGEND></LEGEND> (caption for fieldsets)
4.0 Alignment <LEGEND ALIGN="TOP|BOTTOM|LEFT|RIGHT"></LEGEND>
--------------------------------------------------------------------------------
TABLES
Define Table <TABLE></TABLE>
4.0* Table Alignment <TABLE ALIGN=LEFT|RIGHT|CENTER>
Table Border <TABLE BORDER></TABLE> (either on or off)
Table Border <TABLE BORDER=?></TABLE> (you can set the value)
Cell Spacing <TABLE CELLSPACING=?>
Cell Padding <TABLE CELLPADDING=?>
Desired Width <TABLE WIDTH=?> (in pixels)
Width Percent <TABLE WIDTH=%> (percentage of page)
4.0* Table Color <TABLE BGCOLOR="$$$$$$"></TABLE>
4.0 Table Frame <TABLE FRAME=VOID|ABOVE|BELOW|HSIDES|LHS|RHS|
VSIDES|BOX|BORDER></TABLE>
4.0 Table Rules <TABLE RULES=NONE|GROUPS|ROWS|COLS|ALL></TABLE>
MS Border Color <TABLE BORDERCOLOR="$$$$$$"></TABLE>
MS Dark Border <TABLE BORDERCOLORDARK="$$$$$$"></TABLE>
MS Light Border <TABLE BORDERCOLORLIGHT="$$$$$$"></TABLE>
Table Row <TR></TR>
Alignment <TR ALIGN=LEFT|RIGHT|CENTER|MIDDLE|BOTTOM>
Table Cell <TD></TD> (must appear within table rows)
Alignment <TD ALIGN=LEFT|RIGHT|CENTER VALIGN=TOP|MIDDLE|BOTTOM>
No linebreaks <TD NOWRAP>
Columns to Span <TD COLSPAN=?>
Rows to Span <TD ROWSPAN=?>
4.0* Desired Width <TD WIDTH=?> (in pixels)
N3 Width Percent <TD WIDTH="%"> (percentage of table)
4.0* Cell Color <TD BGCOLOR="#$$$$$$">
Header Cell <TH></TH> (same as data, except bold centered)
Alignment <TH ALIGN=LEFT|RIGHT|CENTER|MIDDLE|BOTTOM>
No Linebreaks <TH NOWRAP>
Columns to Span <TH COLSPAN=?>
Rows to Span <TH ROWSPAN=?>
4.0* Desired Width <TH WIDTH=?> (in pixels)
N3 Width Percent <TH WIDTH="%"> (percentage of table)
4.0* Cell Color <TH BGCOLOR="#$$$$$$">
4.0 Table Body <TBODY>
4.0 Table Footer <TFOOT></TFOOT> (must come before THEAD>
4.0 Table Header <THEAD></THEAD>
Table Caption <CAPTION></CAPTION>
Alignment <CAPTION ALIGN=TOP|BOTTOM|LEFT|RIGHT>
4.0 Column <COL></COL> (groups column attributes)
4.0 Columns Spanned <COL SPAN=?></COL>
4.0 Column Width <COL WIDTH=?></COL>
4.0 Width Percent <COL WIDTH="%"></COL>
4.0 Group columns <COLGROUP></COLGROUP> (groups column structure)
4.0 Columns Spanned <COLGROUP SPAN=?></COLGROUP>
4.0 Group Width <COLGROUP WIDTH=?></COLGROUP>
4.0 Width Percent <COLGROUP WIDTH="%"></COLGROUP>
--------------------------------------------------------------------------------
FRAMES
4.0* Frame Document <FRAMESET></FRAMESET> (instead of <BODY>)
4.0* Row Heights <FRAMESET ROWS=,,,></FRAMESET> (pixels or %)
4.0* Row Heights <FRAMESET ROWS=*></FRAMESET> (* = relative size)
4.0* Column Widths <FRAMESET COLS=,,,></FRAMESET> (pixels or %)
4.0* Column Widths <FRAMESET COLS=*></FRAMESET> (* = relative size)
4.0* Borders <FRAMESET FRAMEBORDER="yes|no"></FRAMESET>
4.0* Border Width <FRAMESET BORDER=?></FRAMESET>
4.0* Border Color <FRAMESET BORDERCOLOR="#$$$$$$"></FRAMESET>
N3 Frame Spacing <FRAMESET FRAMESPACING=?></FRAMESET>
4.0* Define Frame <FRAME> (contents of an individual frame)
4.0* Display Document <FRAME SRC="URL">
4.0* Frame Name <FRAME NAME="***"|_blank|_self|_parent|_top>
4.0* Margin Width <FRAME MARGINWIDTH=?> (left and right margins)
4.0* Margin Height <FRAME MARGINHEIGHT=?> (top and bottom margins)
4.0* Scrollbar? <FRAME SCROLLING="YES|NO|AUTO">
4.0* Not Resizable <FRAME NORESIZE>
4.0* Borders <FRAME FRAMEBORDER="yes|no">
4.0* Border Color <FRAME BORDERCOLOR="#$$$$$$">
4.0* Unframed Content <NOFRAMES></NOFRAMES> (for non-frames browsers)
4.0 Inline Frame <IFRAME></IFRAME> (takes same attributes as FRAME)
4.0 Dimensions <IFRAME WIDTH=? HEIGHT=?></IFRAME>
4.0 Dimensions <IFRAME WIDTH="%" HEIGHT="%"></IFRAME>
--------------------------------------------------------------------------------
SCRIPTS AND JAVA
Script <SCRIPT></SCRIPT>
Location <SCRIPT SRC="URL"></SCRIPT>
Type <SCRIPT TYPE="***"></SCRIPT>
Language <SCRIPT LANGUAGE="***"></SCRIPT>
4.0* Other Content <NOSCRIPT></NOSCRIPT> (if scripts not supported)
Applet <APPLET></APPLET>
File Name <APPLET CODE="***">
Parameters <APPLET PARAM NAME="***">
Location <APPLET CODEBASE="URL">
Identifier <APPLET NAME="***"> (for references)
Alt Text <APPLET ALT="***"> (for non-Java browsers)
Alignment <APPLET ALIGN="LEFT|RIGHT|CENTER">
Size <APPLET WIDTH=? HEIGHT=?> (in pixels)
Spacing <APPLET HSPACE=? VSPACE=?> (in pixels)
N4 Server Script <SERVER></SERVER>
--------------------------------------------------------------------------------
MISCELLANEOUS
Comment (not displayed by the browser)
Prologue <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN">
Searchable <ISINDEX> (indicates a searchable index)
Prompt <ISINDEX PROMPT="***"> (text to prompt input)
Send Search (use a real question mark)
URL of This File <BASE HREF="URL"> (must be in header)
4.0* Base Window Name <BASE TARGET="***"> (must be in header)
Relationship <LINK REV="***" REL="***" HREF="URL"> (in header)
N4 Linked File <LINK TYPE="***" SRC="***"></LINK>
Meta Information <META> (must be in header)
Style Sheets <STYLE></STYLE> (implementations vary)
4.0 Bidirect Off <BDO DIR=LTR|RTL></BDO> (for certain character sets)
How Booters Actually Work
OK so here's everything you wanted to know about Booters but were too afraid to ask.....
First of all, Booters come in TWO flavours.
(Just to confuse you, people (as myself have said) yahoo need to fix this bug, but i no
longer think it's a bug more on that in further down)
Now in order to understand booters, you need to imagine what's going on
think of your house / flat / unit / cardboard box as your Computer, think
of yahoo as a BIG house, like that of a skysc****r, build building...
Your (for argument sake) House is connected to Yahoo, now imagine
your house being connected to yahoo with a piece of STRING, that's right
the same string you used to connect to plastic cups together to talk to
each other on, just like that....
So Your House with a long piece of String connected to Yahoo.
Booter Flavour 1.
These are the old traditional style booters, IT's very easy to comprehend, all
that happens is, a Person at the other end sends lots and lots of Bricks down
the String to Yahoo, Yahoo then Sends all these bricks down that String to You..
Booter ~~~~~~~~~~~~~~~~ Yahoo ~~~~~~~~~~~~~~ You
{them} { Their String} {your string}
~ = STRONG STRING
- = Weak String
Pretty easy, it goes from the Booter To Yahoo and then to you.... Then what?
Take a trained DOG.. you command it, SIT it sits, Roll Over, it rolls over, what if
you told the dog to SIT, ROLL OVER, SIT, ROLL OVER.... either it will look at you
and go, NO or get confused and go to sleep...
Now each thing that gets sent down the line is a COMMAND or INSTRUCTION....
Your computer (eg, client, Yahoo Messenger) can take many commands...
The person requested you to view their webcam.
The person requested to see your cam.
The Person sent you an instant message
The Person sent you an invite
The person requested you to join their conference
As most people know, there's a lot of commands that can be sent from 1 person
to another person....
These commands are ok in Moderation, but what if, 50 people all at the same
time decided to invite you to see their CAM, that would mean 50 popup boxes.
but wait a second, what IF not only you got 50 popup boxes of that, but what
if at the same time you got another 50 Instant message boxes... Then you
got another 50 popup boxes with Invites to go to their room...
Suddenly, hundreds of boxes popup on your screen, and then the Booter decides
to use 200 bots and then ask it all you again, soon you end up with 1000 popup
boxes and instructions to do....
and BANGGGGGG Yahoo Messenger has perfomed an illegal operation, or Windows
decides to terminate it because it's frozen up because it simply CAN'T HANDLE IT ALL...
This is what Chat Client Writers put up with when writing clients that used YCHT, back
then people could only boot you if you could crash the chat client, Yazak
Yahelite, on the whole do a good job faster the computer the more it can "process"
and respond to in time...
So that's how the old style booters work (and still do). you simply crash / stop the client
from working, you can "lag" them lag basically makes the Chat client SOOOO BUSY
that it's not got time to do what you want it to do because it's doing a million other
things because the booter is requesting it to do stuff, so when you type, it gets jerky
and it uses up more and more CPU power, LAG although not the end of the world, is
annoying, the latest Y!mLite (267.6) has routines put in to prevent even lag now...
Booter Flavour 2
Now, same as Booter Flavour 1 with a few key differences.... Remember the String, well in the old days on YCHT before yahoo removed it, this String was made out of steal and nobody could break the string because it was so strong, the only way you could boot someone back then would be to hit the chat client so hard and to confuse it so much it would just either slow down so much or you would just crash it...
So what's the Difference between YCHT and YMSG/CHAT2
It's a Different protocol, which means it's a different string, this string is made out of
String quite literally, it breaks easy and it burns easy...
Booter -------------------- Yahoo ----------------------- You
{them} { Their String} {your string}
This String is different, it works differentl, and this string breaks easily when given
enough of a load..
The D/C Booter (flavour 2)
If you send enough commands and requests, the String Breaks quite literally
and the connection drops, i say that but that's not quite true....
I've been doing some tests with various people who have been willing to boot me
in the aid of chat clients....
The Results were very interesting.... And this is the conclusion i came to, it fits the
theory and would make sense, and is it a BUG on yahoo's behalf? i think not, I think
it's intentional and i'll try and explain it...
So send too much data down the string it breaks on YMSG/DHTML, so why does
the string not break at the booters end? it's quite simple...
Each ID that the booter uses to boot you on has it's own string, collectively each
string can send data to yahoo
------Booter 1
You -----------Yahoo----- Booter 2
------ booter 3
and 70/100/200 more ID's / Bots each with their string sending data out to yahoo
and then yahoo sends it back on to the victim, EG YOU.
Individually, eg 1 BOT can send as much data as it likes, the client with
ease can handle it, 2 bots, the client has to work harder, 3 bots, harder
4 bots harder still, 70 bots, the client has to be pretty good to handle all
this incoming data, now here's how the D/C happens or at least, what we've
discovered...
The Client goes, hey yahoo, got any data for me? Yahoo goes, yes sir, 1 packet
Client goes, give it me...
and we end up with someone posting something on the screen...
The client then goes, GOT ANY MORE? Yahoo replies yeah, here's 2 more
packets, thank you very much, 2 people just imed you, someone said something
on the chat screen...
now here comes a booter ....
Client goes, hey yahoo? got any data? Yahoo goes, sure have, here's 20 packets
client goes, uh oh, deals with it, by this time, the booter has already sent another
30 packets, yahoo goes, here's another 20 (keeping the 10 behind in the buffer)
chat client goes, give me some more....
So here's the factors
Bandwith
CPU Speed
If the client can pull the data FAST enough and deal with the data in time BEFORE
the booter has chance to send more than both you and yahoo can handle, you
should be boot safe...
This is proven because some clients last longer than other chat clients on normal
booters you see in yahoo, they can attack you for 5 minutes before you
get booted, on yaheh, you may only last 1 minute.... WHY???
As i said, it all depends on bandwith and CPU power, if you have a slow connection
you're never going to get the data fast enough from yahoo no matter what, and yahoo
will store the data you don't get until you do get it...
Yahoo[ ]
So this is what i believe is happening....
Booter sends yahoo data
Yahoo[| ]
Client goes yahoo got anything? yes....
Yahoo[ ]
Yahoo's buffer empties...
Booter Sends Data
Yahoo[| ]
Client goes yahoo got anything? yes....
Yahoo[ ]
Yahoo's buffer empties...
Booter Sends Data
Yahoo[|||| ]
Client goes, ok thanks
Yahoo[ ]
but already, the booter just sent a load more packets
Yahoo[|||| ]
Yahoo[|||||||| ]
Chat client goes any more data?
yeah...
Yahoo[|||||||||||]
OH DEAR
Yahoo's buffer's now full, the booter sent more data to yahoo to pass
on to you, but you were never able to get the data fast enough, as
a result yahoo drops your connection...
now then, why is the chat client important for most standard booters?
As yahoo get's sent data, the data you don't get yahoo keeps it in a
buffer, so if you took a booter that never works because it's old
and can't send data fast enough, most clients will laugh at it, it
can get the data fast enough, IF YOU WERE TO FREEZE the chat
client for say 10 or 15 seconds and then resume it , you get instantly
disconnected as tests have shown...
so what's this mean...
Take two chat clients, say YahEh and Yahelite...
YahEh's String routines are typically slower than that of say C
Take the Data (packet) and use it, in YahEh, it could take say 20ms
to perform whatever it has to do, in yahelite, the same routine would
take probably only half the time 10ms...
So if yahelite and yaheh went up against a decent booter, yaheh would get disconnected
at say 7 minutes, yahelite would get disconnected at 14 minutes, faster CPU, maybe
20, with enough CPU power, you could stop the booter from ever booting you, and then
the booter will just get a better booter with more bots to send more data at you...
The buffer slowly starts to fill because the client can't get the data fast enough
to keep the buffer low...
To imagine a buffer, think of a Bucket of Water
[ |
[ |
[~~~ | <
[____ |
...... <
Once the water hits the top, it flows, now the chat client simply
opens the valve at the bottom of the tank, deals with the data
displays some text, shows a pm box/window, and then turns
on the tap again and gets some more data...
if it can do it fast enough before the water gets to the top,
you're not going to be booted...
This is why yaheh and yahelite have different times of being
booted, this is why some booters go on for 5 - 10 minutes
before you get disconnected, the Client's fast enough but
not qute fast enough to get the data out in time..
faster the computer, more boot protection, faster the chat
client the more boot protection... simple as that.
(Incidently, Y!mLite has clever routines and shuts down none essential
parts of the chat client to greatly improve processing time vastly
more faster / superior to that of yahelite)
SO WHY DOES IT GET D/CED ?
Well the very best Booters don't take 5 minutes, they don't even take
5 seconds, they're almost instant why?
Because these booters send soooooooooo much data SOOOO QUICKLY
yahoo's buffer fills up almost instantly and as a result, yahoo disconnects
your connection....
MY First theory is that it's a failsafe, protection...
Similar to like your Electric in your house, jam a metal object into the plug
socket and short it out, the fuse trips and you have to reset it...
I think this happens to prevent yahoo messenger from doing anything bad, on
windows 98, huge amount of packets have been known to cause it to error
so badly it's made Windows Blue Screen, imagine 100 sounds and pm
windows popping up, so by disconnecting you, Yahoo Messenger does not
crash, but you DO get disconnected... annoying..
What can be done about it?
If it's intentional, then nothing it's not a bug, it's a failsafe nothing's going to
change and people will always be booted....
We can only hope yahoo solve this problem by only allowing so many connections
from 1 computer, by doing this, not enough data could be forced on 1 user fast
enough to fill the buffer up so that yahoo disconnects you.
Luckily, not many people have these GOOD d/c programs, just the old
programs that flood you, and Y!mLite is very good at preventing these types
of boots very good, other chat clients not so good and after a few minutes
they fail to get enough data fast enough to keep the water (buffer) down
and as a result they get booted...
People refer to these as "strong" "weak" proection, Y!mLite' currently among if
not the very best with these new routines....
What can you do about it?
Nothing, i think yahoo want to proect yahoo messenger more than they care
about you being disconnected, after all, if someone important was using
yahoo messenger, do you think they would want to see a million PM boxes?
and hundreds of sound bombs? yahoo messenger just disconnects, 5 minutes
later it reconnects and hopefully the booter would have gone.
First of all, Booters come in TWO flavours.
(Just to confuse you, people (as myself have said) yahoo need to fix this bug, but i no
longer think it's a bug more on that in further down)
Now in order to understand booters, you need to imagine what's going on
think of your house / flat / unit / cardboard box as your Computer, think
of yahoo as a BIG house, like that of a skysc****r, build building...
Your (for argument sake) House is connected to Yahoo, now imagine
your house being connected to yahoo with a piece of STRING, that's right
the same string you used to connect to plastic cups together to talk to
each other on, just like that....
So Your House with a long piece of String connected to Yahoo.
Booter Flavour 1.
These are the old traditional style booters, IT's very easy to comprehend, all
that happens is, a Person at the other end sends lots and lots of Bricks down
the String to Yahoo, Yahoo then Sends all these bricks down that String to You..
Booter ~~~~~~~~~~~~~~~~ Yahoo ~~~~~~~~~~~~~~ You
{them} { Their String} {your string}
~ = STRONG STRING
- = Weak String
Pretty easy, it goes from the Booter To Yahoo and then to you.... Then what?
Take a trained DOG.. you command it, SIT it sits, Roll Over, it rolls over, what if
you told the dog to SIT, ROLL OVER, SIT, ROLL OVER.... either it will look at you
and go, NO or get confused and go to sleep...
Now each thing that gets sent down the line is a COMMAND or INSTRUCTION....
Your computer (eg, client, Yahoo Messenger) can take many commands...
The person requested you to view their webcam.
The person requested to see your cam.
The Person sent you an instant message
The Person sent you an invite
The person requested you to join their conference
As most people know, there's a lot of commands that can be sent from 1 person
to another person....
These commands are ok in Moderation, but what if, 50 people all at the same
time decided to invite you to see their CAM, that would mean 50 popup boxes.
but wait a second, what IF not only you got 50 popup boxes of that, but what
if at the same time you got another 50 Instant message boxes... Then you
got another 50 popup boxes with Invites to go to their room...
Suddenly, hundreds of boxes popup on your screen, and then the Booter decides
to use 200 bots and then ask it all you again, soon you end up with 1000 popup
boxes and instructions to do....
and BANGGGGGG Yahoo Messenger has perfomed an illegal operation, or Windows
decides to terminate it because it's frozen up because it simply CAN'T HANDLE IT ALL...
This is what Chat Client Writers put up with when writing clients that used YCHT, back
then people could only boot you if you could crash the chat client, Yazak
Yahelite, on the whole do a good job faster the computer the more it can "process"
and respond to in time...
So that's how the old style booters work (and still do). you simply crash / stop the client
from working, you can "lag" them lag basically makes the Chat client SOOOO BUSY
that it's not got time to do what you want it to do because it's doing a million other
things because the booter is requesting it to do stuff, so when you type, it gets jerky
and it uses up more and more CPU power, LAG although not the end of the world, is
annoying, the latest Y!mLite (267.6) has routines put in to prevent even lag now...
Booter Flavour 2
Now, same as Booter Flavour 1 with a few key differences.... Remember the String, well in the old days on YCHT before yahoo removed it, this String was made out of steal and nobody could break the string because it was so strong, the only way you could boot someone back then would be to hit the chat client so hard and to confuse it so much it would just either slow down so much or you would just crash it...
So what's the Difference between YCHT and YMSG/CHAT2
It's a Different protocol, which means it's a different string, this string is made out of
String quite literally, it breaks easy and it burns easy...
Booter -------------------- Yahoo ----------------------- You
{them} { Their String} {your string}
This String is different, it works differentl, and this string breaks easily when given
enough of a load..
The D/C Booter (flavour 2)
If you send enough commands and requests, the String Breaks quite literally
and the connection drops, i say that but that's not quite true....
I've been doing some tests with various people who have been willing to boot me
in the aid of chat clients....
The Results were very interesting.... And this is the conclusion i came to, it fits the
theory and would make sense, and is it a BUG on yahoo's behalf? i think not, I think
it's intentional and i'll try and explain it...
So send too much data down the string it breaks on YMSG/DHTML, so why does
the string not break at the booters end? it's quite simple...
Each ID that the booter uses to boot you on has it's own string, collectively each
string can send data to yahoo
------Booter 1
You -----------Yahoo----- Booter 2
------ booter 3
and 70/100/200 more ID's / Bots each with their string sending data out to yahoo
and then yahoo sends it back on to the victim, EG YOU.
Individually, eg 1 BOT can send as much data as it likes, the client with
ease can handle it, 2 bots, the client has to work harder, 3 bots, harder
4 bots harder still, 70 bots, the client has to be pretty good to handle all
this incoming data, now here's how the D/C happens or at least, what we've
discovered...
The Client goes, hey yahoo, got any data for me? Yahoo goes, yes sir, 1 packet
Client goes, give it me...
and we end up with someone posting something on the screen...
The client then goes, GOT ANY MORE? Yahoo replies yeah, here's 2 more
packets, thank you very much, 2 people just imed you, someone said something
on the chat screen...
now here comes a booter ....
Client goes, hey yahoo? got any data? Yahoo goes, sure have, here's 20 packets
client goes, uh oh, deals with it, by this time, the booter has already sent another
30 packets, yahoo goes, here's another 20 (keeping the 10 behind in the buffer)
chat client goes, give me some more....
So here's the factors
Bandwith
CPU Speed
If the client can pull the data FAST enough and deal with the data in time BEFORE
the booter has chance to send more than both you and yahoo can handle, you
should be boot safe...
This is proven because some clients last longer than other chat clients on normal
booters you see in yahoo, they can attack you for 5 minutes before you
get booted, on yaheh, you may only last 1 minute.... WHY???
As i said, it all depends on bandwith and CPU power, if you have a slow connection
you're never going to get the data fast enough from yahoo no matter what, and yahoo
will store the data you don't get until you do get it...
Yahoo[ ]
So this is what i believe is happening....
Booter sends yahoo data
Yahoo[| ]
Client goes yahoo got anything? yes....
Yahoo[ ]
Yahoo's buffer empties...
Booter Sends Data
Yahoo[| ]
Client goes yahoo got anything? yes....
Yahoo[ ]
Yahoo's buffer empties...
Booter Sends Data
Yahoo[|||| ]
Client goes, ok thanks
Yahoo[ ]
but already, the booter just sent a load more packets
Yahoo[|||| ]
Yahoo[|||||||| ]
Chat client goes any more data?
yeah...
Yahoo[|||||||||||]
OH DEAR
Yahoo's buffer's now full, the booter sent more data to yahoo to pass
on to you, but you were never able to get the data fast enough, as
a result yahoo drops your connection...
now then, why is the chat client important for most standard booters?
As yahoo get's sent data, the data you don't get yahoo keeps it in a
buffer, so if you took a booter that never works because it's old
and can't send data fast enough, most clients will laugh at it, it
can get the data fast enough, IF YOU WERE TO FREEZE the chat
client for say 10 or 15 seconds and then resume it , you get instantly
disconnected as tests have shown...
so what's this mean...
Take two chat clients, say YahEh and Yahelite...
YahEh's String routines are typically slower than that of say C
Take the Data (packet) and use it, in YahEh, it could take say 20ms
to perform whatever it has to do, in yahelite, the same routine would
take probably only half the time 10ms...
So if yahelite and yaheh went up against a decent booter, yaheh would get disconnected
at say 7 minutes, yahelite would get disconnected at 14 minutes, faster CPU, maybe
20, with enough CPU power, you could stop the booter from ever booting you, and then
the booter will just get a better booter with more bots to send more data at you...
The buffer slowly starts to fill because the client can't get the data fast enough
to keep the buffer low...
To imagine a buffer, think of a Bucket of Water
[ |
[ |
[~~~ | <
[____ |
...... <
Once the water hits the top, it flows, now the chat client simply
opens the valve at the bottom of the tank, deals with the data
displays some text, shows a pm box/window, and then turns
on the tap again and gets some more data...
if it can do it fast enough before the water gets to the top,
you're not going to be booted...
This is why yaheh and yahelite have different times of being
booted, this is why some booters go on for 5 - 10 minutes
before you get disconnected, the Client's fast enough but
not qute fast enough to get the data out in time..
faster the computer, more boot protection, faster the chat
client the more boot protection... simple as that.
(Incidently, Y!mLite has clever routines and shuts down none essential
parts of the chat client to greatly improve processing time vastly
more faster / superior to that of yahelite)
SO WHY DOES IT GET D/CED ?
Well the very best Booters don't take 5 minutes, they don't even take
5 seconds, they're almost instant why?
Because these booters send soooooooooo much data SOOOO QUICKLY
yahoo's buffer fills up almost instantly and as a result, yahoo disconnects
your connection....
MY First theory is that it's a failsafe, protection...
Similar to like your Electric in your house, jam a metal object into the plug
socket and short it out, the fuse trips and you have to reset it...
I think this happens to prevent yahoo messenger from doing anything bad, on
windows 98, huge amount of packets have been known to cause it to error
so badly it's made Windows Blue Screen, imagine 100 sounds and pm
windows popping up, so by disconnecting you, Yahoo Messenger does not
crash, but you DO get disconnected... annoying..
What can be done about it?
If it's intentional, then nothing it's not a bug, it's a failsafe nothing's going to
change and people will always be booted....
We can only hope yahoo solve this problem by only allowing so many connections
from 1 computer, by doing this, not enough data could be forced on 1 user fast
enough to fill the buffer up so that yahoo disconnects you.
Luckily, not many people have these GOOD d/c programs, just the old
programs that flood you, and Y!mLite is very good at preventing these types
of boots very good, other chat clients not so good and after a few minutes
they fail to get enough data fast enough to keep the water (buffer) down
and as a result they get booted...
People refer to these as "strong" "weak" proection, Y!mLite' currently among if
not the very best with these new routines....
What can you do about it?
Nothing, i think yahoo want to proect yahoo messenger more than they care
about you being disconnected, after all, if someone important was using
yahoo messenger, do you think they would want to see a million PM boxes?
and hundreds of sound bombs? yahoo messenger just disconnects, 5 minutes
later it reconnects and hopefully the booter would have gone.
shut down pc fast
TURN ON UR PC IN JUST 10 SECONDS
so u wanna know how to turn the pc on in 10 seconds (may vary) heres what u have to do to turn ur pc on in 10 seconds
Click on the start button then press R it will take u to Run well go to run
n type Regedit
press enter
this will open Registery Editor
now look for the key
HKEY_LOACAL_MECHINE\SYSTEM\CurrentControlSet\Contr ol\ContentIndex
now there find the Key Called
"Startup Delay"
Double Click On It
Now where its Base
Click Decimal
Now its Default Value Is 4800000 (75300:hexadecimal)
Change The Value To 40000
here u go u have done it
now close the Registery Editor and Restart Your Computer
You'll See The Result
so u wanna know how to turn the pc on in 10 seconds (may vary) heres what u have to do to turn ur pc on in 10 seconds
Click on the start button then press R it will take u to Run well go to run
n type Regedit
press enter
this will open Registery Editor
now look for the key
HKEY_LOACAL_MECHINE\SYSTEM\CurrentControlSet\Contr ol\ContentIndex
now there find the Key Called
"Startup Delay"
Double Click On It
Now where its Base
Click Decimal
Now its Default Value Is 4800000 (75300:hexadecimal)
Change The Value To 40000
here u go u have done it
now close the Registery Editor and Restart Your Computer
You'll See The Result
Langganan:
Komentar (Atom)