Thursday, February 28, 2008

Clean UnInstall Norton 2004

As you have seen once Norton 2004 Products have been install and a wrong key has been entered, Norton Products aren't able to run, even if you uninstall and reinstall them, well here is the registry entries that you have to delete as well as the folders

The registry files you need to delete
HKEY_CLASSES_ROOT and delete all Symatec Entries (there is alot of entries so dont panic just delete all of them)

Second you need to delete the following

Finally delte the folders call Symantec
C:\Program Files\Symantec
C:\Program Files\Common Files\Symantec Shared
And the hidden one thats is at (Must enable "Show hidden files and folders" under the file option menu)
C:\Documents and Settings\All Users\Application Data\Symantec

After reboot, install a fresh copy of Norton

Wednesday, February 27, 2008

Update Windows Anonymously

Would you like to use the Windows Update feature without being forced to register with Microsoft? OK then, this is what you can do:

Launch Regedit.
  1. Go down to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion.
  2. Look for a value named RegDone.
  3. If it isn't there create a new value with that name.
  4. Right click the new value and choose Modify. Make the value 1.
  5. Close Regedit.

All mIRC Commands

/ Recalls the previous command entered in the current window.
/! Recalls the last command typed in any window.
/action {action text} Sends the specifed action to the active channel or query window.
/add [-apuce] {filename.ini} Loads aliases, popups, users, commands, and events.
/ame {action text} Sends the specifed action to all channels which you are currently on.
/amsg {text} Sends the specifed message to all channels which you are currently on.
/auser {level} {nick|address} Adds a user with the specified access level to the remote users list.
/auto [on|off|nickname|address] Toggles auto-opping of a nick or address or sets it on or off totally.
/away {away message} Sets you away leave a message explaining that you are not currently paying attention to IRC.
/away Sets you being back.
/ban [#channel] {nickname} [type] Bans the specified nick from the curent or given channel.
/beep {number} {delay} Locally beeps 'number' times with 'delay' in between the beeps.
/channel Pops up the channel central window (only works in a channel).
/clear Clears the entire scrollback buffer of the current window.
/ctcp {nickname} {ping|finger|version|time|userinfo|clientinfo} Does the given ctcp request on nickname.
/closemsg {nickname} Closes the query window you have open to the specified nick.
/creq [ask | auto | ignore] Sets your DCC 'On Chat request' settings in DCC/Options.
/dcc send {nickname} {file1} {file2} {file3} ... {fileN} Sends the specified files to nick.
/dcc chat {nickname} Opens a dcc window and sends a dcc chat request to nickname.
/describe {#channel} {action text} Sends the specifed action to the specified channel window.
/dde [-r] {service} {topic} {item} [data] Allows DDE control between mIRC and other applications.
/ddeserver [on [service name] | off] To turn on the DDE server mode, eventually with a given service name.
/disable {#groupname} De-activates a group of commands or events.
/disconnect Forces a hard and immediate disconnect from your IRC server. Use it with care.
/dlevel {level} Changes the default user level in the remote section.
/dns {nickname | IP address | IP name} Uses your providers DNS to resolve an IP address.
/echo [nickname|#channel|status] {text} Displays the given text only to YOU on the given place in color N.
/enable {#groupname} Activates a group of commands or events.
/events [on|off] Shows the remote events status or sets it to listening or not.
/exit Forces mIRC to closedown and exit.
/finger Does a finger on a users address.
/flood [{numberoflines} {seconds} {pausetime}] Sets a crude flood control method.
/fsend [on|off] Shows fsends status and allows you to turn dcc fast send on or off.
/fserve {nickname} {maxgets} {homedirectory} [welcome text file] Opens a fileserver.
/guser {level} {nick} [type] Adds the user to the user list with the specified level and address type.
/help {keyword} Brings up the Basic IRC Commands section in the mIRC help file.
/ignore [on|off|nickname|address] Toggles ignoring of a nick or address or sets it on or off totally.
/invite {nickname} {#channel} Invites another user to a channel.
/join {#channel} Makes you join the specified channel.
/kick {#channel} {nickname} Kicks nickname off a given channel.
/list [#string] [-min #] [-max #] Lists all currently available channels, evt. filtering for parameters.
/log [on|off] Shows the logging status or sets it on or off for the current window.
/me {action text} Sends the specifed action to the active channel or query window.
/mode {#channel|nickname} [[+|-]modechars [parameters]] Sets channel or user modes.
/msg {nickname} {message} Send a private message to this user without opening a query window.
/names {#channel} Shows the nicks of all people on the given channel.
/nick {new nickname} Changes your nickname to whatever you like.
/notice {nick} {message} Send the specified notice message to the nick.
/notify [on|off|nickname] Toggles notifying you of a nick on IRC or sets it on or off totally.
/onotice [#channel] {message} Send the specified notice message to all channel ops.
/omsg [#channel] {message} Send the specified message to all ops on a channel.
/part {#channel} Makes you leave the specified channel.
/partall Makes you leave all channels you are on.
/ping {server address} Pings the given server. NOT a nickname.
/play [-c] {filename} [delay] Allows you to send text files to a window.
/pop {delay} [#channel] {nickname} Performs a randomly delayed +o on a not already opped nick.
/protect [on|off|nickname|address] Toggles protection of a nick or address or sets it on or off totally.
/query {nickname} {message} Open a query window to this user and send them the private message.
/quit [reason] Disconnect you from IRC with the optional byebye message.
/raw {raw command} Sends any raw command you supply directly to the server. Use it with care!!
/remote [on|off] Shows the remote commands status or sets it to listening or not.
/rlevel {access level} Removes all users from the remote users list with the specified access level.
/run {c:\path\program.exe} [parameters] Runs the specified program, evt. with parameters.
/ruser {nick[!]|address} [type] Removes the user from the remote users list.
/save {filename.ini} Saves remote sections into a specified INI file.
/say {text} Says whatever you want to the active window.
/server [server address [port] [password]] Reconnects to the previous server or a newly specified one.
/sound [nickname|#channel] {filename.wav} {action text} Sends an action and a fitting sound.
/speak {text} Uses the external text to speech program Monologue to speak up the text.
/sreq [ask | auto | ignore] Sets your DCC 'On Send request' settings in DCC/Options.
/time Tells you the time on the server you use.
/timer[N] {repetitions} {interval in seconds} {command} [| {more commands}] Activates a timer.
/topic {#channel} {newtopic} Changes the topic for the specified channel.
/ulist [{|}]{level} Lists all users in the remote list with the specified access levels.
/url [-d] Opens the URL windows that allows you to surf the www parallel to IRC.
/uwho [nick] Pops up the user central with information about the specified user.
/who {#channel} Shows the nicks of all people on the given channel.
/who {*address.string*} Shows all people on IRC with a matching address.
/whois {nickname} Shows information about someone in the status window.
/whowas {nickname} Shows information about someone who -just- left IRC.
/wavplay {c:\path\sound.wav} Locally plays the specified wave file.
/write [-cidl] {filename} [text] To write the specified text to a .txt file.

Spyware ???????????????????

What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.

Known Spywares
There are thousands out there, new ones are added to the list everyday. But here are a few:
Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.

Monday, February 25, 2008

Brain Eating Amoeba

A killer amoeba living in lakes enters the body through the nose and attacks the brain where it feeds until you die.

Even though encounters with the microscopic bug are extraordinarily rare, it’s killed six boys and young men last year. The spike in cases has health officials concerned, and they are predicting more cases in the future.

This is a heat-loving amoeba. As water temperatures go up, it does better. In future decades, as temperatures rise, we’d expect to see more cases.

According to the CDC, the amoeba called Naegleria fowleri (nuh-GLEER-ee-uh FOWL’-erh-eye) killed 23 people in the United States, from 1995 to 2004. This year health officials noticed a spike with six cases — three in Florida, two in Texas and one in Arizona. The CDC knows of only several hundred cases worldwide since its discovery in Australia in the 1960s.

Though infections tend to be found in southern states, Naegleria lives almost everywhere in lakes, hot springs, even dirty swimming pools, grazing off algae and bacteria in the sediment.

The amoeba entered the victims bodies through the nose and destroys tissue as it makes its way up into the brain, where it continues the damage, basically feeding on the brain cells.

People who are infected tend to complain of a stiff neck, headaches and fevers. In the later stages, they’ll show signs of brain damage such as hallucinations and behavioral changes.

Once infected, most people have little chance of survival. Some drugs have stopped the amoeba in lab experiments, but people who have been attacked rarely survive.

Sunday, February 24, 2008

How To Add Recent Comment on Blogger

Just copy this "" (without quotation mark and change the with your blog url)

How To Add Recent Post on Blogger

It's so simple to show Recent Post on your blog.

The steps are:

  1. Login to your Account

  2. Choose Layout of your blog

  3. Click on Add a Page Element and choose Feed

  4. Enter your feeds url, example: (if your using the default feeds on blogger)

  5. If your using another feeds just goto Setting-Site Feed and copy the Post Feed Redirect URL content.

Easily Find Serial Number on Google

let's pretend you need a serial number for windows xp pro.

in the search bar type in just like this - "Windows XP Professional" 94FBR

the key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of 'fake' porn sites that trick you.

or if you want to find the serial for winzip 8.1 - "Winzip 8.1" 94FBR

just try it out, it's very quick and it works nicely..

Doom 3 Speed Up


First, open your doom3\base folder. Doubleclick on the pak000.pk4 file. In the "window can't open this file .. .bla bla" dialog, go on and associate the file with an app like WinRar. With this file open in WinRar, go to the glprogs directory in the file. In there you'll find the shaders. The interaction.vfp file seems to be the main rendering shader. Altering this shader to output a constant color turns most objects into that constant color, except for stuff like computer screens etc.

So doubleclick the interaction.vfp file to open it (you may have to associate the .vfp extension with a text editor like notepad or wordpad first since we're going to edit the file). Scroll down to the fragment shader. You'll find these rows:


PARAM subOne = { -1, -1, -1, -1 };
PARAM scaleTwo = { 2, 2, 2, 2 };

Add this right below them:


PARAM specExp = { 16, 0, 0, 0 };

Now scroll down to this:


# perform a dependent table read for the specular falloff
TEX R1, specular, texture[6], 2D;

Comment out that line by adding a "#" to it, and add another line that will do the same thing with math instead, so it should look like this:


# perform a dependent table read for the specular falloff
# TEX R1, specular, texture[6], 2D;
POW R1, specular.x, specExp.x;

Save the file and close your text editor. WinRar will ask if you want to update the file in the archive, select yes. Close WinRar and enjoy about 40% higher performance in Doom3.

Wednesday, February 20, 2008

Microsoft Excel Flaw

A new flaw has opened up in Microsoft Excel, which could allow an attacker to compromise a remote user's computer. Users who open an infected file would be subject to having their computer compromised.

Users would need to download and open a malicious file for it to have any effect. Once opened, though, the attacker has the ability to remotely access the victim's PC, exposing personal data and other documents. This makes it a serious problem especially for businesses.

The vulnerability affects the following versions of Excel: 2000, 2002, Viewer 2003, 2003 Service Pack 2, and Mac Excel 2004.

Google Discovery

Google is painting a scary scenario about potentially dangerous websites on the Internet: More than 1.3% of all search queries are now directing users to at least one malware site – and only seven out of ten threats are caught by the best security applications available today.

Google limited its research to pages that contain so-called drive-by download web pages, which are installing and running malware on client PCs without user action. According to the company, such drive-by downloads are now hiding in more than 3.4 million URLs on more than 181,000 web sites. The research results also suggest that more and more search results provided by Google point to malware sites: While less than 0.3% of search queries contained a link to at least one malware site one year ago, the rate has gone up to about 1.3% at the end of the year.

From the top 1 million web site addresses listed in search results, Google found about 6000 to be malicious – which means that, on average, 0.6% of the most popular web pages in Google search can lead to malware exposure. The most popular malicious web page has a rank of 1588 of 1 million. Most malware sites (67%) are hosted in China, followed by sites in the U.S. (15%), Russia (4%), Malaysia (2.2%) and Korea (2.0%).

The company’s researchers also found that antivirus software may not be sophisticated enough to reliably protect users from web threats: Google found a 70% malware detection rate for the best anti-virus engine with the latest set of definitions. “These results are disturbing as they show that even the best anti-virus engines in the market fail to cover a significant fraction of web malware,” the reports states.

“Merely avoiding the dark corners of the Internet” will not protect users from malware exposure, Google believes. “State-of-the-art anti-virus engines are lacking in their ability to protect against drive-by downloads. While this is to be expected, it does call for more elaborate defense mechanisms to curtail this rapidly increasing threat.”

Google said it examined about 66.5 million URLs for this report.


Image Based Search Engine

VizSeek is one of the first search engines on the Internet to use a photograph, a 2D image, or a 3D model and transform it into a 3D shape. The search can be narrowed with additional information. The image-seeking search engine produces search results in a matter of seconds.

Whether you need a bolt, a motor, a belt or a tool, finding the perfect, hard-to-describe part can be like finding a needle in a haystack. But now, engineers have put together a computer program that can track down just about anything you need -- even if you don't know what it's called!

When it comes to making repairs, replacing parts or finding a tool, a new visual search engine can help you find exactly what you're looking. Created by mechanical engineers, VizSeek uses pattern recognition to take a doodle, sketch or photo and find out exactly what it is.

Right now, VizSeek is used for manufacturers to track down parts or find suppliers but in the near future, it could help anyone track down just about any part they need.

Imaginestics also hopes to have stores catalog which parts they have. You would no longer have to take the part into the store and try and match it. Instead, you would just print out the barcode from your computer, take that in and have the salesperson find it for you.

You can access VizSeek at

Laser Detect Potential Diseases

By blasting a person's breath with laser light, scientists from the National Institute of Standards and Technology and the University of Colorado at Boulder have shown that they can detect molecules that may be markers for diseases like asthma or cancer.

When breathing, people inhale a complex mixture of gases, including nitrogen, oxygen, carbon dioxide, water vapor and traces of other gases like carbon monoxide, nitrous oxide and methane. Exhaled breath contains less oxygen, more carbon dioxide and a rich collection of more than a thousand types of other molecules, most of which are present only in trace amounts.

Just as bad breath can indicate dental problems, excess methylamine may signal liver and kidney disease, ammonia may be a sign of renal failure, elevated acetone levels can indicate diabetes and nitric oxide levels can be used to diagnose asthma.

When many breath molecules are detected simultaneously, highly reliable, disease-specific information can be collected. Asthma, for example, can be detected much more reliably when carbonyl sulfide, carbon monoxide and hydrogen peroxide are all detected simultaneously with nitric oxide.

This new technique has the potential to be low-cost, rapid and reliable, and is sensitive enough to detect a much wider array of biomarkers all at once for a diverse set of diseases.

Laser light can detect and distinguish specific molecules because different molecules vibrate and rotate at certain distinct resonant frequencies that depend on their composition and structure.

Monday, February 18, 2008

Fight Hospital Infections

You go there for help, but millions of people get sick in hospitals. Hospital infections are growing to epidemic proportions because they're passed from person to person. Now, researchers are working to wipe out these infections with a new bacteria-killing bandage.

Gary Smithson was hit head-on by a drunk driver. The accident put him in a wheelchair, but that is not what keeps him there. It's what happened in the ER -- hours after the crash -- that has made the past 10 years unbearable. During a routine check, doctors found an infection.

Gary is one of 20,000 Americans that leave the hospital each year with an infection they didn't come in with. Gregory Schultz, a biochemist at the University of Florida in Gainesville, is part of a team working to wipe out these super bugs. They've created a microbicidal coating that can kill the most harmful bacteria.

"The microbicidal agent -- that's the thing that kills the bacteria -- is permanently bonded on the surface of the fibers of the dressing," Schultz says.

Chris Batich, a biomaterials expert at the University of Florida, says, "What we wound up with is a surface that you can wash. And whenever it touches bacteria, it kills the bacteria ... and keeps on killing them."

The microbicidal coating can also be used on hospital gowns and bed sheets, which will help reduce the risk of infection to all hospital patients and staff.

The bacteria-fighting agent can be used outside the hospital for soldiers in the field to help stop athletes foot. The cost of putting this agent on a bandage is about one cent.

Machines Will Achieve Human-Level Artificial Intelligence in 2029

The engineer believes machines and humans will eventually merge through devices implanted in the body to boost intelligence and health.

Machines were already doing hundreds of things humans used to do, at human levels of intelligence or better, in many different areas.

Humans and machines would eventually merge, by means of devices embedded in people's bodies to keep them healthy and improve their intelligence.

Just like Ray Kurzweil told on BBC News, "I've made the case that we will have both the hardware and the software to achieve human level artificial intelligence with the broad suppleness of human intelligence including our emotional intelligence by 2029. We're already a human machine civilization; we use our technology to expand our physical and mental horizons and this will be a further extension of that."

He even said that, "We'll have intelligent nanobots go into our brains through the capillaries and interact directly with our biological neurons, to make us smarter"

Mr Kurzweil is one of 18 influential thinkers chosen to identify the great technological challenges facing humanity in the 21st century by the US National Academy of Engineering.

Wednesday, February 13, 2008

Bil Gates Off From FaceBook

Microsoft Chairman, Bill Gates has deleted his account membership in a popular social networking site called Facebook. This was forced to be done because of the millionaire felt occupied with so many fans and getting more than 8,000 friend requests a DAY, and spotted weird fan sites about him.

Paypal To Register

Sign up for PayPal and start accepting credit card payments instantly.

About Me

My photo
Please be often to visit and subscribe for my blog, because that would be really helpful for me. Thank you to read all of my post. If you don't mind come and have a chat with me. ^_^