Translate

Saturday, 20 September 2014

Hack Windows Explorer For Efficiency Boosts


Windows Explorer — known as File Explorer on Windows 8 — is an application that you probably spend a good amount of time in. Even Windows geeks that avoid using any other Microsoft program tend to use Windows Explorer instead of a third-party file manager. But, while we spend time customizing our browser with extensions, we often don’t think about hacking our file manager. There are a lot of ways you can customize Windows Explorer to make your file management experience faster and more efficient.
We won’t dwell on Windows Explorer’s built-in options here — just the most interesting ways you can go off the beaten track and do things that aren’t obvious.

Add Copy To Folder And Move To Folder

With a quick registry hack, you can add “Copy to Folder” and “Move to Folder” entries to your Windows Explorer context menu. You’ll be able to right-click on files or folders and select the Copy To Folder or Move To Folder options. Selecting either option will open a window where you can choose your preferred destination folder, simplifying the file copying and moving process.
To do this, simply download the .reg file for your preferred option from the Seven Forums website — either Add_Copy_To_Folder.reg or Add_Move_To_Folder.reg — and double-click it. Windows will add the information to your registry and display the options in your context menu.

Edit Your Send To Menu

The Send To menu allows you to right-click files or folders and easily perform an operation on them. By default, you can send a document to your desktop, compress it, email it to someone, and more. But you aren’t just limited to the options hat appear here by default. Your Send To menu is actually just a folder, and you can open it to easily add your own custom shortcuts and delete the shortcuts that already exist there.
To open the Send To folder on Windows 7 or 8, press Windows Key + R to open the Run dialog, type shell:sendto, and press Enter. After you’ve opened the folder, copy shortcuts you want to use to the folder. If you want to remove shortcuts from the Send To menu, just delete them from the folder.

Customize Your Context Menu

Windows Explorer’s context menu, or right-click menu, becomes cluttered over time as you install more and more software. You can normally uninstall the associated programs to get rid of their right-click menu entries, but what if you’d prefer to leave them installed? You can use a tool like CCleaner to remove options you don’t use from your right-click menu, making it more minimal and less cluttered.
CCleaner doesn’t list all context menu entries.
If you’d rather add custom shortcuts to your context menu, you can do that by using a program like FileMenu Tools.

Change Your Default Folder

On Windows 7, Windows Explorer opens to your Libraries folder whenever you open it. But maybe you don’t use libraries, or perhaps you just use a different folder more often instead.
Microsoft doesn’t make this option obvious, but you can easily change the default Windows Explorer folder to your preferred folder by editing your taskbar’s Windows Explorer shortcut. Whenever you launch Windows Explorer, you’ll see the folder you chose. We like making the Downloads folder the default folder, giving you easy access to your recently downloaded files, but you should choose whatever folder you use most.
To do this, right-click the Windows Explorer (or File Explorer) shortcut on your taskbar, right-click Windows Explorer in the jump list that appears, and select Properties. Add the path of your preferred folder to the end of the Shortcut box.

Add Tabs

Apple’s Finder is getting tabs in OS X Mavericks, and Linux file managers have had tabs for a long time. But Windows Explorer is still without tabs, even on Windows 8. Internet Explorer was the last big browser to get tabs, and it seems that Windows Explorer will be the last big file manager to get tabs — if it ever does.
While you can replace Windows Explorer with tabbed file managers, you don’t have to switch to a new file manager just for this small feature. Third-party tools like QTTabBar can add tabs to Windows Explorer, giving you the ability to have several folders open in the same file browsing window.

Improve File Copying

The file-copy dialog on Windows 7 and previous versions of Windows isn’t very good. It’s slow, has trouble dealing with file conflicts, and doesn’t allow you to pause file operations. If there’s a file conflict or another problem, the file-copy dialog will stop in its tracks and wait for your input rather than continuing and dealing with conflicts later. Windows 8 improved on this, but you don’t have to upgrade to Windows 8 just to get a better file-copying experience.
To get an improved file-copy dialog, just install TeraCopy and enable its Explorer integration options. Whenever you copy or move files in Windows Explorer — either with drag and drop or copy and paste — TeraCopy will leap into action and perform the file-copying instead. This effectively rips out Windows’ poor file-copy dialog and gives you a much better one. You can disable the integration in the future if you’d like to use the standard file-copy dialog.
TeraCopy also adds itself to your context menu as an option, so you can launch it only when you want it and use the standard file-copy dialog most of the time, if you prefer.

Do you have any other useful tips for hacking away at Windows Explorer? Leave a comment and share them!

History Of Hacking - A Review Of Term "Hacking"




Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years.

Early 1960s

University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do.

Early 1970s

John Draper John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle "Captain Crunch," is arrested repeatedly for phone tampering throughout the 1970s.


Yippie social movement starts YIPL/TAP (Youth International Party Line/Technical Assistance Program) magazine to help phone hackers (called "phreaks") make free long-distance calls.

Two members of California's Homebrew Computer Club begin making "blue boxes," devices used to hack into the phone system. The members, who adopt handles "Berkeley Blue" (Steve Jobs) and "Oak Toebark" (Steve Wozniak), later go on to found Apple Computer.

Early 1980s

Author William Gibson coins the term "cyberspace" in a science fiction novel called Neuromancer.

In one of the first arrests of hackers, the FBI busts the Milwaukee-based 414s (named after the local area code) after members are accused of 60 computer break-ins ranging from Memorial Sloan-Kettering Cancer Center to Los Alamos National Laboratory.

Comprehensive Crime Control Act gives Secret Service jurisdiction over credit card and computer fraud.

Two hacker groups form, the Legion of Doom in the United States and the Chaos Computer Club in Germany.

2600: The Hacker Quarterly is founded to share tips on phone and computer hacking.

Late 1980s

The Computer Fraud and Abuse Act gives more clout to federal authorities.

Computer Emergency Response Team is formed by U.S. defense agencies. Based at Carnegie Mellon University in Pittsburgh, its mission is to investigate the growing volume of attacks on computer networks.

At 25, veteran hacker Kevin Mitnick secretly monitors the e-mail of MCI and Digital Equipment security officials. He is convicted of damaging computers and stealing software and is sentenced to one year in prison.

First National Bank of Chicago is the victim of a $70-million computer heist.

An Indiana hacker known as "Fry Guy" -- so named for hacking McDonald's -- is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of Doom hackers known by the handles "Prophet," "Leftist" and "Urvile."

Early 1990s


After AT&T long-distance service crashes on Martin Luther King Jr. Day, law enforcement starts a national crackdown on hackers. The feds nab St. Louis' "Knight Lightning" and in New York grab Masters of Deception trio "Phiber Optik," " Acid Phreak" and "Scorpion." Fellow hacker "Eric Bloodaxe" is picked up in Austin, Texas.

Operation Sundevil, a special team of Secret Service agents and members of Arizona's organized crime unit, conducts raids in 12 major cities, including Miami.

A 17-month search ends in the capture of hacker Kevin Lee Poulsen ("Dark Dante"), who is indicted for stealing military documents.

Hackers break into Griffith Air Force Base, then pewwwte computers at NASA and the Korean Atomic Research Institute. Scotland Yard nabs "Data Stream," a 16-year-old British teenager who curls up in the fetal position when seized.

A Texas A&M professor receives death threats after a hacker logs on to his computer from off-campus and sends 20,000 racist e-mail messages using his Internet address.

Kevin Mitnick [photo / AP ]In a highly publicized case, Kevin Mitnick is arrested (again), this time in Raleigh, N.C., after he is tracked down via computer by Tsutomu Shimomura at the San Diego Supercomputer Center.

Late 1990s

Hackers break into and deface federal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others.

Report by the General Accounting Office finds Defense Department computers sustained 250,000 attacks by hackers in 1995 alone.

A Canadian hacker group called the Brotherhood, angry at hackers being falsely accused of electronically stalking a Canadian family, break into the Canadian Broadcasting Corp. Web site and leave message: "The media are liars." Family's own 15-year-old son eventually is identified as stalking culprit.

Hackers pierce security in Microsoft's NT operating system to illustrate its weaknesses.

Popular Internet search engine Yahoo! is hit by hackers claiming a "logic bomb" will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. "There is no virus," Yahoo! spokeswoman Diane Hunt said.

1998

Anti-hacker ad runs during Super Bowl XXXII. The Network Associates ad, costing $1.3-million for 30 seconds, shows two Russian missile silo crewmen worrying that a computer order to launch missiles may have come from a hacker. They decide to blow up the world anyway.

In January, the federal Bureau of Labor Statistics is inundated for days with hundreds of thousands of fake information requests, a hacker attack called "spamming."

Hackers break into United Nation's Children Fund Web site, threatening a "holocaust" if Kevin Mitnick is not freed.

Hackers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists.

The U.S. Justice Department unveils National Infrastructure Protection Center, which is given a mission to protect the nation's telecommunications, technology and transportation systems from hackers.

Hacker group L0pht, in testimony before Congress, warns it could shut down nationwide access to the Internet in less than 30 minutes. The group urges stronger security measures.

Hacker Ethic is a term that was first used in Hackers: Heroes of the Computer Revolution written by American journalist Steven Levy in 1984. The ideology behind hacker ethics came from the values of the hackers at the MIT Artificial Intelligence Laboratory.

"Access to computers - and anything which might teach you something about the way the world works - should be unlimited and total. Always yield to the Hands-on Imperative!"

"All information should be free."
Mistrust authority- promote decentralization."

"Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position."

"You can create art and beauty on a computer."


"Computers can change your life for the better."

Basic Backtrack 5 Commands For Beginners


Hi Guys,Now A Days I Was Planning To Write Some Tutorial On Backtrack But Then I Think Of Newbies It Will Be Difficuilt For Them To
Get What’s Going.So, In This Post I Will Be Telling You About Backtrack Basic Commands.

I Have Divided Them Into Some Categories I Suggest You To Learn Them Because They Are Very UseFul If You Have Any Problem Just Leave A Comment We Will Help You Soon:))

 File Operations

pwd                  Print Name Of Current/Working Directory
cd                     Changing The Working Directory
cp                     Copy Files Or Directory
rm                    Remove Files And Directory
ls                       List Of Directory Contents
mkdir                 Make Directory
cat                    Concatenate Files And Print On Standard Output
mv                    Move Files
chmod              Change Files Permissions

Know Your System

uname            Print System Information
who                Show Who Is Logged On
cal                    Displays Calculator
date                 Print System Date And Time
df                      Report File System Disk Space Usage
du                     Estimate File Space Usage
ps                     Displays Information Of Current Active Processes
kill                    Allows To Kills Process
clear                Clear The Terminal Screen
cat /proc/           cpuinfo Display CPU Information
cat /proc/meminfo                 Display Memory Information

Compression

tar                     To Store And Extract Files From An Archive File Known As Tar File
gzip                  Compress Or Decompress Named Files

Network
ifconfig            To Config Network Interface
ping                  Check The Other System Are Reachable From The Host System
wget                 Download Files From Network
ssh                    Remote Login Program
ftp                     Download/Upload Files From/To Remote System
last                   Displays List Of Last Logged In User
telnet                Used To Communicate With Another Host Using THe Telnet Protocol

Searching Files

grep                 Search Files(s) For Specific Text
find                  Search For Files In A Directory Hierarchy
locate              Find Files By Name

Hope You Like It.Give Your Valuable Feedback At ..........

Amazing Google Facts You Probably Didn’t Know


American Dialect Society members voted ‘google’ to be the most useful word of the year in 2012. And Google is probably still one of the most useful and influential companies in the world. Let’s learn something about this fantastic phenomenon of our modern world in this infographic from Promodo.


Google Is Bigger Than You Realize -Indepth Server Comparison


Gizmodo has posted a visual representation from Intac showing the approximate number of dedicated servers that major tech companies own. When you speak in terms of numbers, it becomes hard to comprehend just how large these server farms have become. Intel, for example, is estimated to have around 100,000 servers in its arsenal, while Facebook, AT&T, and Time Warner Cable, all fall between 20,000 and 30,000. Without being able to see these server farms with your own eyes, these statistics are merely tossed aside as nothing more than interesting facts.

It's no secret that Google is a giant. But, do people realize just how big they really are? Companies like Microsoft, Amazon, and eBay all have over 50,000 servers, though their exact numbers aren't made public. Google, by comparison, is estimated to have over 1,000,000 dedicated servers, accounting for over 2% of the servers in the world. The graphical representation below allows one to truly understand just how unbelievably huge Google is (especially compared to the other major tech giants). Get your scroll-wheel ready and take a look.