Thursday, July 30, 2009

For IT Engineers appreciation

An IT Engineer unpacked the server from its box, installed an operating system, patched it for security, made sure the power and air conditioning was working in the server room, monitored it for stability, set up the software, and kept backups in case anything went wrong.

An IT Engineer installed the routers, laid the cables, configured the networks, set up the firewalls, and watched and guided the traffic for each hop of the network that runs over copper, fiber optic glass, and even the air itself to bring the Internet to your computer. All to make sure the webpage found its way from the server to your computer.

An IT Engineer makes sure your network connection is safe, secure, open, and working. A IT Engineer makes sure your computer is working in a healthy way on a healthy network. A IT Engineer takes backups to guard against disaster both human and otherwise, holds the gates against security threats and crackers, and keeps the printers going no matter how many copies of the tax code someone from Accounting prints out.

An IT Engineer worries about spam, viruses, spyware, but also power outages, fires and floods. When the email server goes down at 2 AM on a Sunday, your IT Engineer is called, wakes up, and goes to work.

An IT Engineer is a professional, who plans, worries, hacks, fixes, pushes, advocates, protects and creates good computer networks, to get you your data, to help you do work -- to bring the potential of computing ever closer to reality.

So if you can read this, thank your IT Engineer -- and know he or she is only one of dozens or possibly hundreds whose work brings you the email from your aunt on the West Coast, the instant message from your son at college, the free phone call from the friend in Australia, and this webpage.

Show your appreciation

Friday, July 31, 2009, is the 10th annual IT Engineer Appreciation Day. On this special international day, give your IT Engineer something that shows that you truly appreciate their hard work and dedication. (All day Friday, 24 hours, your local timezone).

Let's face it, IT Engineers get no respect 364 days a year. This is the day that all fellow IT Engineers across the globe, will be showered with expensive sports cars and large piles of cash in appreciation of their diligent work. But seriously, we are asking for a nice token gift and some public acknowledgement. It's the least you could do.

Consider all the daunting tasks and long hours (weekends too.) Let's be honest, sometimes you don't know your IT Engineers as well as they know you. Remember this is one day to recognize your IT Engineer for their workplace contributions and to promote professional excellence. Thank them for all the things they do for you and your business.

And Donot even dare to forget Me in this appreciation.

Wednesday, July 29, 2009

When your ISP's DNS is down

This for all my Pakistani friends who are using PTCL DSL. Usually People who are using PTCL complains that there DSL link is sync but still they are facing problem in browsing a web site. What they have to do is just first ping their gateway then the DNS. If gateway is pinging but the DNS is not use the following solution.

Before we start firstly we have to understand the work of DNS. When you type an address like in your browser address bar, the computer doesn’t know where points and it will therefore ask the DNS server.

The job of a DNS server is to translate this human-readable web address (like into a computer-readable number also known as an IP address ( Once your computer knows the IP location of a web domain name, it opens the website in your browser.

DNS is such an integral part of our Internet life working behind the scenes every time we connect to a website. In most situations, our Internet Service Provider specifies the DNS Server address that we key into the browser network settings or the router.

Now back to our problem. To solve this problem, we look at a simple and reliable service called OpenDNS that speeds up your Internet connection and also handles some other very important issues. There are no software to install, it’s very easy to set up and the price is just right - $0.

To use OpenDNS, all you have to do is open your Network Connections or Router’s settings page and update the default DNS server to point to the OpenDNS nameservers that are and

Unlike the DNS servers of your less reliable ISP, OpenDNS servers store the IP addresses of millions of websites in their cache so it would take less time to resolve your requests. So if you have asked for an IP address of a website that has been previously requested by another OpenDNS user, you will get the reply instantly.

Another huge advantage of using OpenDNS is that it blocks phishing websites from loading on your computer. It uses data from Phishtank, a community site that is also used by Yahoo! Mail to determine if some particular website is part of any online phishing scam.

OpenDNS also takes care of any typos that you commit while typing the name of popular websites. For instance, if you type omitting the additional “o” by mistake, OpenDNS will open the main site automatically.

If you are a parent worried about kids visiting adult websites on the home computer, you can configure OpenDNS to block any adult website from loading on the computer. In fact, quite a few business places use OpenDNS to block social sites like MySpace and Facebook on employee computers.

Power users can assign abbreviations or OpenDNS Shortcuts to access their favourite websites more quickly.

For instance, you can set “mail” as a shortcut for or something like “a” for - just type the shortcut to access the site. A good alternative for browser based bookmarks and it works across all computers where you have logged in to your OpenDNS account.

So enjoy...........

Tuesday, July 28, 2009

How to change Windows XP's administrator Password

Dear readers, I am here with an amazing trick. Most of my friends ask me that how can they change their Windows XP forgotten password. So here is the solution.

1. Place your Windows XP CD in your cd-rom and start your computer (it’s assumed here that your XP CD is bootable – as it should be - and that you have your bios set to boot from CD)

2. Keep your eye on the screen messages for booting to your cd Typically, it will be “Press any key to boot from cd”

3. Once you get in, the first screen will indicate that Setup is inspecting your system and loading files.

4. When you get to the Welcome to Setup screen, press ENTER to Setup Windows now

5. The Licensing Agreement comes next - Press F8 to accept it.

6. The next screen is the Setup screen which gives you the option to do a Repair.

It should read something like “If one of the following Windows XP installations is damaged, Setup can try to repair it”

Use the up and down arrow keys to select your XP installation (if you only have one, it should already be selected) and press R to begin the Repair process.

7. Let the Repair run. Setup will now check your disks and then start copying files which can take several minutes.

8. Shortly after the Copying Files stage, you will be required to reboot. (this will happen automatically – you will see a progress bar stating “Your computer will reboot in 15 seconds”

9. During the reboot, do not make the mistake of “pressing any key” to boot from the CD again! Setup will resume automatically with the standard billboard screens and you will notice Installing Windows is highlighted.

10. Keep your eye on the lower left hand side of the screen and when you see the Installing Devices progress bar, press SHIFT + F10. This is the security hole! A command console will now open up giving you the potential for wide access to your system.

11. At the prompt, type NUSRMGR.CPL and press Enter. Voila! You have just gained graphical access to your User Accounts in the Control Panel.

12. Now simply pick the account you need to change and remove or change your password as you prefer. If you want to log on without having to enter your new password, you can type control userpasswords2 at the prompt and choose to log on without being asked for password. After you’ve made your changes close the windows, exit the command box and continue on with the Repair (have your Product key handy).

13. Once the Repair is done, you will be able to log on with your new password (or without a password if you chose not to use one or if you chose not to be asked for a password). Your programs and personalized settings should remain intact.

I tested the above on Windows XP Pro with and without SP1/2/3 and also used this method in a real situation where someone could not remember their password and it worked like a charm to fix the problem. This security hole allows access to more than just user accounts. You can also access the Registry and Policy Editor, for example. And its gui access with mouse control. Of course, a Product Key will be needed to continue with the Repair after making the changes, but for anyone intent on gaining access to your system, this would be no problem.

And in case you are wondering, NO, you cannot cancel install after making the changes and expect to logon with your new password.

Cancelling will just result in Setup resuming at bootup and your changes will be lost.

Ok, now that your logon problem is fixed, you should make a point to prevent it from ever happening again by creating a Password Reset Disk. This is a floppy disk you can use in the event you ever forget your log on password. It allows you to set a new password.

Here's how to create one if your computer is NOT on a domain:

Go to the Control Panel and open up User Accounts.
Choose your account (under Pick An Account to Change) and under Related Tasks, click "Prevent a forgotten password".
This will initiate a wizard.
Click Next and then insert a blank formatted floppy disk into your A: drive.
Click Next and enter your logon password in the password box.
Click Next to begin the creation of your Password disk.
Once completed, label and save the disk to a safe place
How to Log on to your PC Using Your Password Reset Disk

Start your computer and at the logon screen, click your user name and leave the password box blank or just type in anything. This will bring up a Logon Failure box and you will then see the option to use your Password Reset disk to create a new password. Click it which will initiate the Password Reset wizard. Insert your password reset disk into your floppy drive and follow the wizard which will let you choose a new password to use for your account.

Monday, July 27, 2009

Now Recover your files with ZAR

Folks, it some times put you in hell when a disaster strikes to your computer. Data can be lost due to many different reasons. Accidental reformatting, power spikes, virus attacks and hardware malfunction are some of the scenarios where you will find yourself looking for a data recovery solution.

But now we don't need to worry about it alot, Zero Assumption Recovery provides a suite of highly effective and thorough data recovery software for Microsoft® Windows™ operating systems. ZAR is suitable for home users and small businesses who need a powerful data recovery solution for FAT16/FAT32/NTFS file systems. The default settings are reliable and thorough, but more technical users can benefit from a wealth of optional configurations.


The main features of our Windows data recovery software are:

Runs on Windows NT/2000/XP/2003/Vista
Supported filesystems are FAT16, FAT32 and NTFS (all versions)
Provides limited ext2 (Linux filesystem) support
Support for partition recovery
Support for hardware RAID0 and RAID5 recovery
Long and national file names are supported
Native NTFS compression is supported

What makes ZAR different?

There are three main reasons:

Firstly, it is easy to use. You can recover the data yourself as long as you are reasonably familiar with computers. ZAR is ideal for the home user who knows what a hard drive is and how many there are in his system - but more technically minded users can also benefit from a wide range of configuration options.

Secondly, it takes its time. When you are trying to recover critical data, you need to be persistent and painstakingly thorough. ZAR slowly and methodically crawls through your disk, checking and cross-checking everything and recovering as much data as possible. Faster programs may skip though your disk in seconds and come out empty-handed. ZAR persists, and succeeds.

Thirdly, it is more powerful than most. We know that you are trying to recover important data, and that every single piece that you retrieve could be vital. With Zero Assumption Recovery, nothing is assumed - ZAR never relies on anything located on the damaged disk. If incoherencies are discovered, thorough checks and cross-checks are used to derive the necessary information. The algorithms are built to withstand a severe pounding, which means that ZAR can recover data even when things seem hopeless.

ZAR 8.4 system requirements and demo version restrictions

Windows 2000/XP/2003/Vista.
Additional media to recover data to (never save files to the volume you are recovering, for this may cause further damage to the volume!)
Damaged drive must be physically functional. It should be at least detected by BIOS. Multiple bad sectors can be handled (but the data they contained is lost forever), but controller failures are beyond any software repair.
Supported filesystems:

FAT16 (Used in Windows 95) and FAT32 (used in Windows 95 OSR2, 98, ME, 2000 and XP)
NTFS versions 1.2 (Windows NT 4.0), 3.0 (Windows 2000), and 3.1 (Windows XP/2003/Vista).
Limited ext2 (Linux filesystem) support
Digital image recovery function operates regardless of the filesystem type.
Supported RAID layouts:

Hardware RAID0 and RAID5 with any number of member disks.
It is possible to recover Windows 2000 Server, Windows 2003 server software RAID0 and RAID5 if the RAID members occupy the entire physical disk.
There are the following limitations in the evaluation version of ZAR 8.4:

Only (up to) four directories can be recovered in the demo version of our computer data recovery software.
The demo version is unable to load the scan result file. However, it does save these files to avoid having to rescan the disk when you got the full version.
In digital image recovery mode program operates as freeware with no functional limitations. List of known compatible digital camera models and image formats is available Known camera compatibility list here.

Zmeil 2.1 system requirements and demo version restrictions

Windows NT, 2000, XP, 2003 or Vista.
Internet Explorer 5.0 or later.
Plenty of a free disk space to store the recovered files. It is recommended to have a at least twice the size of the damaged email database available.
The evaluation version of Zmeil 2.1 only recovers 9 messages maximum per the database.

Zlon 1.0 system requirements and demo version restrictions

Windows NT, 2000, XP, or 2003.
The evaluation version of Zlon 1.0 expires in 14 days. If you want to use it past the expiration you will need to order the unlock code from us.

Zero Assumption Disk Space Visualizer 1.2 system requirements

Zero Assumption Disk Space Visualizer 1.2 runs generally on any machine Windows runs on, with the exception of the original (pre-OSR2) Windows 95 release and Windows NT 3.51.

You can download it from here

Firefox is not opening HTTPS pages

Dear Folks some of my readers queried me about a problem that firefox is not supporting HTTPS or not opening HTTPS Web pages. So don't worry the solution is very easy, You just have to define gateway IP in SSL Proxy. Now browse whatever SSL pages.

Monday, July 20, 2009

MAC OSX Terminal commands

Friends here are some of the MAC OSX commands which you can run through Terminal (same as Command Prompt in Windows).

alias=> Create an alias •
alloc=> List used and free memory
awk=> Find and Replace text within file(s)
basename=> Convert a full pathname to just a folder path
bash=> Bourne-Again SHell
bg=> Send to background •
bind=> Display readline key and function bindings •
bless=> Set volume bootability and startup disk options.
break=> Exit from a For, While, Until or Select loop •
builtin=> Execute a shell builtin •
cal=> Display a calendar
caller=> Return the context of a subroutine call •
case=> Conditionally perform a command •
cat=> Display the contents of a file
cd=> Change Directory •
chflags=> Change a file or folder's flags
chgrp=> Change group ownership
chmod=> Change access permissions
chown=> Change file owner and group
chroot=> Run a command with a different root directory
cksum=> Print CRC checksum and byte counts
clear=> Clear terminal screen
cmp=> Compare two files
comm=> Compare two sorted files line by line
command=> Run a command (not a function) •
complete=> Edit a command completion [word/pattern/list] •
continue=> Resume the next iteration of a loop •
cp=> Copy one or more files to another location
cron=> Daemon to execute scheduled commands
crontab=> Schedule a command to run at a later date/time
cut=> Divide a file into several parts
date=> Display or change the date & time
dc=> Desk Calculator
dd=> Data Dump - Convert and copy a file
declare=> Declare variable & set attributes •
defaults=> Set preferences
df=> Display free disk space
diff=> Display the differences between two files
diff3=> Show differences among three files
dig=> DNS lookup
dirname=> Convert a full pathname to just a path
dirs=> Display list of remembered directories •
diskutil=> Disk utilities - Format, Verify, Repair
disown=> Unbind a job from the current login session •
ditto=> Copy files and folders
dot_clean=> Remove dot-underscore files
drutil=> Interact with CD/DVD burners
dscacheutil=> Query or flush the Directory Service/DNS cache
dscl=> Directory Service command line utility
du=> Estimate file space usage
echo=> Display message on screen •
ed=> A line-oriented text editor (edlin)
enable=> Enable and disable builtin shell commands •
env=> Set environment and run a utility
eval=> Evaluate several commands/arguments •
exec=> Execute a command •
exit=> Exit the shell •
expand=> Convert tabs to spaces
expect=> Programmed dialogue with interactive programs
Also see AppleScript
export=> Set an environment variable •
expr=> Evaluate expressions
false=> Do nothing, unsuccessfully
fc=> Fix command (history)
fdisk=> Partition table manipulator for Darwin UFS/HFS/DOS
fg=> Send job to foreground •
find=> Search for files that meet a desired criteria
fmt=> Reformat paragraph text
fold=> Wrap text to fit a specified width
for=> Loop command •
fsck=> Filesystem consistency check and repair
fsaclctl=> Filesystem enable/disable ACL support
fs_usage=> Filesystem usage (process/pathname)
ftp=> Internet file transfer program
GetFileInfo=> Get attributes of HFS+ files
getopt=> Parse positional parameters
getopts=> Parse positional parameters •
goto=> Jump to label and continue execution
grep=> Search file(s) for lines that match a given pattern
groups=> Print group names a user is in
gzip=> Compress or decompress files
hash=> Refresh the cached/remembered location of commands •
head=> Display the first lines of a file
hdiutil=> Manipulate iso disk images
history=> Command History •
hostname=> Print or set system name
id=> Print user and group names/id's
if=> Conditionally perform a command •
info=> Help info
install=> Copy files and set attributes
jobs=> List active jobs •
join=> Join lines on a common field
kextfind=> List kernel extensions
kill=> Stop a process from running
l=> List files in long format (ls -l)
last=> Indicate last logins of users and ttys
launchctl=> Load or unload daemons/agents
ll=> List files in long format, showing invisible files (ls -la)
less=> Display output one screen at a time
let=> Evaluate expression •
lipo=> Convert a universal binary
ln=> Make links between files (hard links, symbolic links)
local=> Set a local (function) variable •
locate=> Find files
logname=> Print current login name
login=> log into the computer
logout=> Exit a login shell (bye) •
lpr=> Print files
lprm=> Remove jobs from the print queue
lpstat=> Printer status information
ls=> List information about file(s)
lsregister=> Reset the Launch Services database
lsbom=> List a bill of materials file
lsof=> List open files
man=> Help manual
mdfind=> Spotlight search
mdutil=> Manage Spotlight metadata store
mkdir=> Create new folder(s)
mkfifo=> Make FIFOs (named pipes)
more=> Display output one screen at a time
mount=> Mount a file system
mv=> Move or rename files or directories
net=> Manage network resources
netstat=> Show network status
networksetup=> Network and System Preferences
nice=> Set the priority of a command
nohup=> Run a command immune to hangups
ntfs.util=> NTFS file system utility
onintr=> Control the action of a shell interrupt
open=> Open a file/folder/URL/Application
osacompile=> Compile Applescript
osascript=> Execute AppleScript
passwd=> Modify a user password
paste=> Merge lines of files
pbcopy=> Copy data to the clipboard
pbpaste=> Paste data from the Clipboard
pico=> Simple text editor
ping=> Test a network connection
pkgutil=> Query and manipulate installed packages
plutil=> Property list utility
pmset=> Power Management settings
popd=> Restore the previous value of the current directory •
pr=> Convert text files for printing
printenv=> Print environment variables
printf=> Format and print data •
ps=> Process status
pushd=> Save and then change the current directory
pwd=> Print Working Directory •
quota=> Display disk usage and limits
rcp=> Copy files between machines
read=> Read one line from standard input •
readonly=> Mark a variable or function as read-only •
reboot=> Stop and restart the system
return=> Exit a function •
rev=> Reverse lines of a file
rm=> Remove files
rmdir=> Remove folder(s)
rpm=> Remote Package Manager
rsync=> Remote file copy - Sync file tree (also RsyncX)
say=> Convert text to audible speech
screen=> Multiplex terminal, run remote shells via ssh
screencapture=> Capture screen image to file or disk
sdiff=> Merge two files interactively
security=> Administer Keychains, keys, certificates and the Security framework
sed=> Stream Editor
select=> Generate a list of items •
set=> Set a shell variable = value •
setfile=> Set attributes of HFS+ files
shift=> Shift positional parameters •
shopt=> Set shell options •
shutdown=> Shutdown or restart OS X
sleep=> Delay for a specified time
softwareupdate=> System software update tool
sort=> Sort text files
source=> Execute commands from a file •
split=> Split a file into fixed-size pieces
stop=> Stop a job or process
su=> Substitute user identity
sudo=> Execute a command as another user
sum => Print a checksum for a file
suspend=> Suspend execution of this shell •
sw_vers=> Print Mac OS X operating system version
system_profiler=> Report system configuration
systemsetup=> Computer and display system settings
tail=> Output the last part of files
tar=> Tape ARchiver
tee=> Redirect output to multiple files
test=> Condition evaluation •
textutil=> Manipulate text files in various formats (Doc,html,rtf)
time=> Measure Program Resource Use
times => Print shell & shell process times •
touch => Change file timestamps
tr=> Translate, squeeze, and/or delete characters
trap => Execute a command when the shell receives a signal •
traceroute=> Trace Route to Host
true => Do nothing, successfully
tty=> Print filename of terminal on stdin
type=> Describe a command •
ufs.util=> Mount/unmount UFS file system
ulimit=> limit the use of system-wide resources •
umask=> Users file creation mask
umount=> Unmount a device
unalias=> Remove an alias •
uname=> Print system information
unexpand=> Convert spaces to tabs
uniq=> Uniquify files
units=> Convert units from one scale to another
unset=> Remove variable or function names •
until=> Loop command •
users=> Print login names of users currently logged in
uuencode=> Encode a binary file
uudecode=> Decode a file created by uuencode
uuidgen=> Generate a Unique ID (UUID/GUID)
uucp => Unix to Unix copy
vi => Text Editor
wait=> Wait for a process to complete •
wc => Print byte, word, and line counts
where=> Report all known instances of a command
which => Locate a program file in the user's path
while=> Loop command •
who=> Print all usernames currently logged on
whoami=> Print the current user id and name (`id -un')
write => Send a message to another user
xargs => Execute utility - passing arguments
yes => Print a string until interrupted

Sunday, July 19, 2009

BIOS Beep Codes

Friends It some times put you into hell when you have to do an important assignment and just at that moment your system does not start and start giving beeps. There are two ways to troubleshoot whether you do it by yourself or wait for the technical support from any hardware shop.
As you are the reader of this blog so i do not make you depend on any one. Now after reading this post you will be able to understand the beep codes and you can easily troubleshoot your system with out the help of any technical freak.

Let's Start

When a computer is first turned on, or rebooted, its BIOS performs a power-on self test (POST) to test the system's hardware, checking to make sure that all of the system's hardware components are working properly. Under normal circumstances, the POST will display an error message; however, if the BIOS detects an error before it can access the video card, or if there is a problem with the video card, it will produce a series of beeps, and the pattern of the beeps indicates what kind of problem the BIOS has detected.
Because there are many brands of BIOS, there are no standard beep codes for every BIOS.

The two most-used brands are AMI (American Megatrends International) and Phoenix.

Below are listed the beep codes for AMI systems, and here are the beep codes for Phoenix systems.

AMI Beep Codes

Beep Code Meaning
1 beep DRAM refresh failure. There is a problem in the system memory or the motherboard.
2 beeps Memory parity error. The parity circuit is not working properly.
3 beeps Base 64K RAM failure. There is a problem with the first 64K of system memory.
4 beeps System timer not operational. There is problem with the timer(s) that control functions on the motherboard.
5 beeps Processor failure. The system CPU has failed.
6 beeps Gate A20/keyboard controller failure. The keyboard IC controller has failed, preventing gate A20 from switching the processor to protect mode.
7 beeps Virtual mode exception error.
8 beeps Video memory error. The BIOS cannot write to the frame buffer memory on the video card.
9 beeps ROM checksum error. The BIOS ROM chip on the motherboard is likely faulty.
10 beeps CMOS checksum error. Something on the motherboard is causing an error when trying to interact with the CMOS.
11 beeps Bad cache memory. An error in the level 2 cache memory.
1 long beep, 2 short Failure in the video system.
1 long beep, 3 short A failure has been detected in memory above 64K.
1 long beep, 8 short Display test failure.
Continuous beeping A problem with the memory or video.
BIOS Beep Codes

Phoenix Beep Codes

Phoenix uses sequences of beeps to indicate problems. The "-" between each number below indicates a pause between each beep sequence. For example, 1-2-3 indicates one beep, followed by a pause and two beeps, followed by a pause and three beeps. Phoenix version before 4.x use 3-beep codes, while Phoenix versions starting with 4.x use 4-beep codes. Click here for AMI BIOS beep codes.
4-Beep Codes
Beep Code Meaning
1-1-1-3 Faulty CPU/motherboard. Verify real mode.
1-1-2-1 Faulty CPU/motherboard.
1-1-2-3 Faulty motherboard or one of its components.
1-1-3-1 Faulty motherboard or one of its components. Initialize chipset registers with initial POST values.
1-1-3-2 Faulty motherboard or one of its components.
1-1-3-3 Faulty motherboard or one of its components. Initialize CPU registers.
1-1-3-4 Failure in the first 64K of memory.
1-1-4-1 Level 2 cache error.
1-1-4-3 I/O port error.
1-2-1-1 Power management error.
1-2-1-3 Faulty motherboard or one of its components.
1-2-2-1 Keyboard controller failure.
1-2-2-3 BIOS ROM error.
1-2-3-1 System timer error.
1-2-3-3 DMA error.
1-2-4-1 IRQ controller error.
1-3-1-1 DRAM refresh error.
1-3-1-3 A20 gate failure.
1-3-2-1 Faulty motherboard or one of its components.
1-3-3-1 Extended memory error.
1-3-4-3 Error in first 1MB of system memory.
1-4-2-4 CPU error.
2-1-4-1 BIOS ROM shadow error.
1-4-3-3 Level 2 cache error.
2-1-1-1 Faulty motherboard or one of its components.
2-1-2-1 IRQ failure.
2-1-2-3 BIOS ROM error.
2-1-3-2 I/O port failure.
2-1-3-3 Video system failure.
2-1-2-1 IRQ failure.
2-1-2-3 BIOS ROM error.
2-1-2-4 I/O port failure.
2-2-1-1 Video card failure.
2-2-2-3 Keyboard controller failure.
2-2-3-1 IRQ error.
2-2-4-1 Error in first 1MB of system memory.
2-3-3-3 Extended memory failure.
2-3-2-1 Faulty motherboard or one of its components.
2-3-3-1 Level 2 cache error.
2-3-4-3 Motherboard or video card failure.
2-4-1-1 Motherboard or video card failure.
2-4-1-3 Faulty motherboard or one of its components.
2-4-2-1 RTC error.
2-4-2-3 Keyboard controller error.
2-4-4-1 IRQ error.
3-1-2-3 I/O port error.
3-1-3-3 Faulty motherboard or one of its components.
3-2-1-2 Floppy drive or hard drive failure.
3-2-1-3 Faulty motherboard or one of its components.
3-2-2-1 Keyboard controller error.
3-2-4-1 Faulty motherboard or one of its components.
3-2-4-3 IRQ error.
3-3-1-1 RTC error.
3-3-1-3 Key lock error.
3-3-3-3 Faulty motherboard or one of its components.
3-4-4-4 Faulty motherboard or one of its components.
4-1-1-1 Floppy drive or hard drive failure.
4-2-2-1 IRQ failure.
4-2-4-1 Faulty motherboard or one of its components.
4-2-4-3 Keyboard controller error.
4-3-4-3 Faulty motherboard or one of its components.
4-3-3-4 IRQ failure.
4-3-4-2 Floppy drive or hard drive failure.
3-Beep Codes
Beep Code Meaning
1-1-2 Faulty CPU/motherboard.
1-1-3 Faulty motherboard/CMOS read-write failure.
1-1-4 Faulty BIOS/BIOS ROM checksum error.
1-2-1 System timer not operational. There is a problem with the timer(s) that control functions on the motherboard.
1-2-3 Faulty motherboard/DMA failure.
1-3-1 Memory refresh failure.
1-3-4 Failure in the first 64K of memory.
1-4-1 Address line failure.
1-4-2 Parity RAM failure.
1-4-3 Timer failure.
1-4-4 NMI port failure.
2-_-_ Any combination of beeps after 2 indicates a failure in the first 64K of memory.
3-1-1 Master DMA failure.
3-1-2 Slave DMA failure.
3-1-4 Interrupt controller failure.
3-2-4 Keyboard controller failure.
3-3-2 CMOS error.
3-3-4 Video card failure.
3-4-1 Video card failure.
4-2-1 Timer failure.
4-2-2 CMOS shutdown failure.
4-2-3 Gate A20 failure.
4-2-4 Unexpected interrupt in protected mode.
4-3-1 RAM test failure.
4-3-3 Timer failure.
4-3-4 Time of day clock failure.
4-4-1 Serial port failure.
4-4-2 Parallel port failure.
4-4-3 Math coprocessor.

Thursday, July 16, 2009

Change your Folder Color

iColorFolder enables you to easily customize the color of each WindowsXP folder icons, using one of the standard color choices, or a custom folder skin (Aqua, Mac OS X, Vista and others). iColorFolder is a very light soft, that doesn't stay in memory. It uses a native functionnality of WindowsXP to be more efficient. Discover it's simplicity: with a single right-click on a folder you colorize it ; the necessary and only the necessary. iColorFolder is proudly an Open-Source program. Like the folder icons, iColorFolder makes folder navigation in Windows easier, in this case by letting you assign colors to your folder icons, which is done from the right-click context menu. It also lets you assign custom icons and comes with three different icon skins, but it also works fine if you're already using some icon customization/skin tool. Even better, iColorFolder is open source software and takes up little memory.


Monday, July 13, 2009

How to stop illegal usage of your WIFI

Friends after a long time spending on stressful projects, I am here to tell you some thing really important. As I have discussed in some of my older posts about Wireless hacking and tools which can stop it. Now I am here with an amazing new tool.This tool called Moocher Hunter can help you physically track the users connected in your WiFi network. This tool would come handy for network admins and any personnel who wants to stop unauthenticated use of his wireless router.

1. Its free to use.
2. It can predict the physical location of the computer using the WiFi connection.

The algorithms applied use various signal variables to accurately predict the position of the connected laptop/machine. MoocherHunter™ identifies the location of an 802.11-based wireless moocher or hacker by the traffic they send across the network. If they want to mooch from you or use your wireless network for illegal purposes (e.g. warez downloading or illegal filesharing), then they have no choice but to reveal themselves by sending traffic across in order to accomplish their objectives. MoocherHunter™ enables the owner of the wireless network to detect traffic from this unauthorized wireless client (using either MoocherHunter™’s Passive or Active mode) and enables the owner, armed with a laptop and directional antenna, to isolate and track down the source.

You can download it HERE

Wednesday, July 1, 2009

How to reduce booting time of a PC

Hey folks, I am back with a new tweak so here it is. Today i gonna tell you how to boot up in just 10 seconds but first take backup of your data and registry just for safe side. Now here we go:

1) Press Windows Key and "R" to launch the run command.

2) Type "regedit" inside the input space.

3) Navigate to the registry key


4) Locate the key"Startup Delay" and double click on it.

5) Select Decimal, and change the value to 40000

Enjoy the reduction in startup time and I look forwarding to hearing good news from all of you.