POST-TITLE-HERE

Posted by Author On Month - Day - Year

POST-SUMMARY-HERE

POST-TITLE-HERE

Posted by Author On Month - Day - Year

POST-SUMMARY-HERE

POST-TITLE-HERE

Posted by Author On Month - Day - Year

POST-SUMMARY-HERE

POST-TITLE-HERE

Posted by Author On Month - Day - Year

POST-SUMMARY-HERE

POST-TITLE-HERE

Posted by Author On Month - Day - Year

POST-SUMMARY-HERE

NABI IDRIS DAN PEDOMAN HIDUP

Diposting oleh Masakan On 18.16 0 komentar

Nabi Idris a.s adalah keturunan keenam Nabi Adam, putera dari Yazid bin Mihla'iel bin Qoinan bin Anusy bin Syith bin Adam a.s dan dia adalah keturunan pertama yang dikurniakan kenabian setelah Adam dan Syith.
Nabi Idris a.s mengikut sementara riwayat bermukim di Mesir, di mana ia berdakwah untuk agama Allah mengajarkan tauhid dan beribadah menyembah Allah serta memberi beberapa pedoman hidup bagi pengikut-pengikut agar menyelamatkan diri dari siksaan di akhirat dan kehancuran serta kebinasaan di dunia. Ia hidup sampai berusia 82 tahun.

Di antara beberapa nasihat dan kata-kata mutiaranya ialah :-
1. Kesabaran yang disertai iman kepada Allah memebawa kemenangan. 2. Orang yang bahagia adalah orang yang merendah diri dan mengharapkan syafaat dari Tuhannya dengan amal-amal solehnya. 3. Bila kamu memohon sesuatu daripada Allah dan berdoa, maka ikhlaskanlah niatmu. Demikian pula puasa dan sembahnyangmu. 4. Janganlah bersumpah dengan keadaan kamu berdusta dan janganlah menuntut sumpah dari orang yang berdusta agar kamu tidak menyekutui mereka dalam dosa. 5. Bertaatlah kepada raja-rajamu dan tunduklah kepada pembesar-pembesarmu serta penuhilah selalu mulut-mulutmu dengan ucapan syukur dan puji kepada Allah. 6. Janganlah mengiri orang yang mujur nasibnya kerana mereka tidak akan banyak dan lama menikmati kemujuran nasibnya. 7. Barangsiapa melampaui kesederhanaan, tidak suatupun akan memuaskannya. 8. Tanpa membahagi-bahagikan nikmat yang diperolehi, seseorang tidak dapat bersyukur kepada Allah atau nikmat-nikmat yang diperolehinya itu.
| edit post

Outsmarting System File Protection

Diposting oleh Masakan On 18.12 0 komentar
Tested in Windows 2000 sp2, Windows 2000 sp3 with and without IE6 sp1. Should work fine in XP and XPsp1

------------------------------

A lot of people are having troubles with System File Protection (SFP for short). This can be a major pain in the butt unless you know the tricks to it. Having only tweaked Windows 2000 Service Pack 3 I figured out a few things about SFP and replacing files:

1) TaskManger is your best friend when replacing files in 2k/XP.
When you open task manager you can do just about as much as you can do with Explorer just by going File>NewTask(Run..). From here you can either use the Run Dialog to launch programs one at a time, or select 'Browse' and explore. Using right click menu commands to do the bulk of your work (Copy, Paste, Rename). Problem is often times you can't replace items do to the fact that your browse is making calls to things you want to delete.

2) CommandLine or Cmd.exe is like that other friend you have that likes to help out.
One plus this has over TaskMan is you don't use the file you are trying to replace. A minus is that it can be a pain if you aren't an experienced DOS user.

3) Backups are your ace in the hole.
Always back your files up prior to doing anything (sometimes I don't bother and wish I did.). Keep It Simple Stupid applies here. Save yourself a few keystrokes and place your backups in something like C:\back\

4) SafeMode is the rest of the hand.
Windows2000 and XP (I believe) can both be booted into SafeMode. When your computer is first booting up, after your bios screen but before the Windows is Starting screen (I could be slightly wrong here seeing how I don't know the timing for sure.) you hit F4 or F8 to get the SafeMode menu. Select 'SafeMode with CommandPrompt'. Welcome to "DOS" on 2k/XP. Anything that can't be replaced while Windows is running can be replaced here. (url.dll) Syntax would be Copy c:\url.dll "c:\Program Files\Internet Explorer\" quotations allow you to put spaces in the path (I didn't know this)

...

Here we go. System File Protection, of Sytem File Checker is a neato feature of Windows meant to protect Joe Computeruser's PC from being ruined. When a needed System file is being replaced your File Checker says "Wait a minute this isn't mine." While this can be great in the long run, it's not a positive thing in Windows Hacking. The trick is to replace the files it uses to replace files.

...

1) First up you need to find the file you want to hack and then replace. Start>Search>Files and Folders>dllname. It's good to actually search for the file so you can find out all of the locations of all copies. Let the search finish just in case. If you have installed any service packs you will have probably have copies of the file in:

\winnt\servicepackfiles\i386\ (Win2k)
\windows\servicepackfiles\i386\ (XP)

As well as:

\winnt\system32\dllcache\ (hidden folder in Win2k)
\WINDOWS\system32\dllcache\ (hidden folder in XP)
\winnt\system32\ (win2k)
\windows\system32\ (XP)

2) Now that you have all of the locations, write them down on paper or your forehead just to be safe (backwards so it shows up in the mirror).

3) Make a backup (remember K.I.S.S.)

4) Hack your file and save it c:\ for simplicity.

5) Open TaskManger (Right click on your taskbar and select TaskManger)

6) Go to the 'Processes' Tab and find 'Explorer.exe' highlight it and push the 'End Process' button. Say Yeah to the popup.

7) Go to the first tab in TaskManger and select 'File>NewTask>Run>Browse' from this Window navigate to c:\ and higlight your hacked file. Right clic on it and select 'Copy' (don't Cut it.)

8) Nagivate to your Windows directory, open the \servicepackfiles\i386\ folder. Paste your hacked file and replace the copy that is in that folder.

9) Navigate to your respective dllcache folder, paste the file there too.

10) Replace the normail copy in system32 finally (or wherever it might be).

11) Reboot. Don't LogOff , Reboot.

Now chances are this won't go that smoothly. Either the file you want to replace is in use, or your pal and mine SFP will pop-up. It can mess with you in odd ways. I've replaced the servicepackfiles version and the dllcache files, then had SFP grab the normal and replace the other two with it. This can be frustrating. Or maybe the file is in use. This is where the Command Prompt comes into play. If you already replaced the files and rebooted to no change, launch TaskMan again, kill explorer.exe, then go 'File>NewTask>Run>Cmd.exe' Use the DOS commands to try to replace all of the copies of the file in that order using your hacked version in C:\

This is usually where you get the message from SFP telling you it's alive and kicking. You will get a rather urgent looking pop-up telling you that a file that Windows needs is being replaced by a different file. It will then ask you if you want keep the modified files. Say 'yes'. Next it will prompt you to insert your Windows cd to retrieve a copy of the file it needs. Click 'Cancel'. As a good rule of thumb, when you get this message replace what you need then reboot!

If your file still isn't changing, boot into SafeMode with CommandLine. Wait for Windows to take it's sweet time loading. Then just type copy c:\file.dll c:\winnt\servicepackfiles\i386\. Rinse and Repeat. Then reboot. This has worked for me 100% of the time, if followed it will work for you as well.

http://pixelarmy.org
Here you can find how to set up your Outpost firewall. Most of this rules I found on the internet, but some of them are mine. I think that you should be safer.
I used the online tests to test my firewall setings. The links to the this testers are:


CODE

http://scan.sygate.com/probe.html
http://www.auditmypc.com/
http://www.pcflank.com/about.htm
https://grc.com/x/ne.dll?bh0bkyd2
http://scan.sygatetech.com/
http://security1.norton.com/



SYSTEM:

Allow DNS Resolving
Protocol: UDP
Remote Port(s): DNS (53)
Action: Allow It

Allow Outgoing DHCP
Protocol: UDP
Remote Port(s): bootps (67),
bootp (68), dhcpv6-client (546),
dhcpv6-server (547)
Action: Allow It

Allow Inbound Identification
Protocol: TCP
Direction: Inbound
Local Port(s): AUTH (113)
Action: Allow It

Allow Loopback
Protocol: TCP
Remote Host: localhost
(127.0.0.1)
Action: Allow It

Allow GRE Protocol
Protocol: IP and the type is GRE
(IP protocol 47)
Action: Allow It
.
Allow PPTP control connection
Protocol: TCP
Remote Port(s): PPTP
Local Port(s): 1024-65535
Action: Allow It

Block Remote Procedure Call
(TCP)
Protocol: TCP
Direction: Inbound
Local Port(s): DCOM(135)
Action: Reject It

Block Remote Procedure Call
(UDP)
Protocol: UDP
Direction: Inbound
Local Port(s): 135
Action: Reject It

Block Server Message Block
Protocol (TCP)
Protocol: TCP
Direction: Inbound
Local Port(s): Microsoft DS (445)
Action: Reject It

Block Server Message Block
Protocol (UDP)
Protocol: UDP
Direction: Inbound
Local Port(s): Microsoft DS (445)
Action: Reject It

APPLICATION

SVCHOST.EXE

Allowing DHCP
Protocol: UDP
LocalPort: 68
RemotePort: 67
Direction: Inbound
AllowIt

Allowing DNS
Protocol: UDP
LocalPort: 53
AllowIt

Time Synchronizer
connection
Protocol: UDP
RemotePort: 123
AllowIt

Allowing HTTP
connection
Protocol: TCP
RemotePort: 80
Direction:
Outbound
AllowIt

Allowing HTTPS
connection
Protocol: TCP
RemotePort: 443
Direction:
Outbound
AllowIt

Blocking "SSDP
Discovery Service"
and "UPnP device
Host" services
Protocol: UDP
RemotePort: 1900
RemoteHost: 239.255.255.250
Direction: Inbound
Reject It

Blocking "SSDP
Discovery Service"
and "UPnP device
Host" services
Protocol: TCP
RemotePort: 5000
RemoteHost: 239.255.255.250
Direction: Inbound
Reject It

Blocking "SSDP
Discovery Service"
and "UPnP device
Host" services
Protocol: UDP
RemotePort: 5000
RemoteHost: 239.255.255.250
Direction: Inbound
Reject It

Blocking "Remote
Procedure Call"
Protocol: TCP
Local port: 135
Reject It

Web browsers:

Protocol: TCP
Direction: Outbound
Remote Port(s): HTTP(80), 81-83
Action: Allow It

Protocol: TCP
Direction: Outbound
Remote Port(s): HTTPS(443)
Action: Allow It

Protocol: TCP
Direction: Outbound
Remote Port(s):SOCKS (1080)
Action: Allow It

Protocol: TCP
Direction: Outbound
Remote Port(s): 3128,8080, 8088
Action: Allow It

Protocol: TCP
Direction: Outbound
Remote Port(s): FTP(21)
Action: Allow It

Protocol: TCP
Direction: Inbound
Remote Port(s): FTP DATA (20)
Action: Allow It

Protocol: TCP
Direction: Inbound
Local Port(s): 1024- 65535
Direction:Outbound
Remote Port(s): 1024- 65535
Action: Allow It

Protocol: TCP
Direction: Inbound
Remote Port(s): 1375
Action: Allow It

Protocol: UDP
Direction: Inbound
Remote Port(s): 1040-1050
Action: Allow It

E-Mail clients:

Protocol: TCP
Direction: Outbound
Remote Port(s): SMTP (25)
Action: Allow It

Protocol: TCP
Direction: Outbound
Remote Port(s): NNTP (119)
Action: Allow It

Protocol: TCP
Direction: Outbound
Remote Port(s): POP3 (110)
Action: Allow It

Protocol: TCP
Direction: Outbound
Remote Port(s): IMAP (143)
Action: Allow It

Protocol: TCP
Direction: Outbound
Remote Port(s): HTTP (80), 81-
83, HTTPS (443), SOCKS (1080),
3128, 8080, 8088, 11523
Action: Allow It

Antivirus updaters:

Protocol: TCP
Direction: Outbound
Remote Port(s): HTTP (80), 81-
83, HTTPS (443), SOCKS (1080),
3128, 8080, 8088, 11523
Action: Allow It
Symantec LiveUpdate HTTP
KAV Updater HTTP connection
McAfee Update
Update NOD32 virus definitions

Protocol: TCP
Direction: Outbound
Remote Port(s): FTP (21)
Action: Allow It
Symantec LiveUpdate FTP
KAV Updater FTP connection

Protocol: TCP
Direction: Inbound
Remote Port(s): FTP DATA (20)
Action: Allow It
Symantec LiveUpdate FTP DATA
KAV Updater FTP DATA connection

Protocol: TCP
Direction: Outbound
Remote Port(s): POP3 (110)
Action: Allow It
Scan incoming mail for viruses

Downloaders:

Protocol: TCP
Direction: Outbound
Remote Port(s): 80(HTTP), 81-
83,
443(HTTPS), 1080(SOCKS),
3128, 8080, 8088, 11523
Action: Allow It
FlashGet, GerRight, Go!Zilla, ReGet

Protocol: TCP
Direction: Outbound
Remote Port(s): FTP (21)
Action: Allow It
FlashGet, GerRight, Go!Zilla, ReGet

Protocol: TCP
Direction: Inbound
Remote Port(s): FTP DATA (20)
Action: Allow It
FlashGet, GerRight, Go!Zilla, ReGet

Protocol: TCP
Direction: Outbound
Remote Port(s): 1024-65535
Action: Allow It
ReGet PASV FTP connection

Protocol: TCP
Direction: Inbound
Remote Port(s): 1024-65535
Action: Allow It
ReGet PASV FTP connection

Protocol: TCP
Direction: Outbound
Remote Port(s): 80, 3128, 8080,
1080, 11523
Action: Allow It
ReGet Update

Trillian:

Trillian Pro Login
Where the protocol is: TCP
and Where the direction is: Outbound
and Where the remote host is: www.ceruleanstudios.com
and Where the remote port is: HTTP
Action: Allow It

Trillian Pro AOL/ICQ Connection
Where the protocol is: TCP
and Where the direction is: Outbound
and Where the remote port is: 443, 5190
Action: Allow It

Trillian mIRC AUTH Connection
Where the protocol is: TCP
and Where the direction is: Inbound
and Where the local port is: 113
Action: Allow It

Trillian mIRC Connection
Where the protocol is: TCP
and Where the direction is: Outbound
and Where the remote port is: 6667
Action: Allow It

Trillian MSN Connection
Where the protocol is: TCP
and Where the direction is: Outbound
and Where the remote port is: 1863
Action: Allow It

Trillian Yahoo Connection
Where the protocol is: TCP
and Where the direction is: Outbound
and Where the remote port is: 5050
Action: Allow It

Bit Torrent:

Bit Torrent HTTP Connection Rule
Where the protocol is: TCP
and Where the direction is: Outbound
and Where the remote port is: HTTP
Action: Allow It

Bit Torrent HTTPS Connection Rule
Where the protocol is: TCP
and Where the direction is: Outbound
and Where the remote port is: 443
Action: Allow It

Bit Torrent Network TCP Outbound Connection Rule
Where the protocol is: TCP
and Where the direction is: Outbound
and Where the remote port is: 1024 - 65535
Action: Allow It

Bit Torrent Network TCP Inbound Connection Rule
Where the protocol is: TCP
and Where the direction is: Inbound
and Where the local port is: 6881-6999
Action: Allow It

TCP Inbound Coverage Rule
Where the protocol is: TCP
and Where the direction is: Inbound
Action: Reject It

TCP Outbound Coverage Rule
Where the protocol is: TCP
and Where the direction is: Outbound
Action: Reject It

UDP Coverage Rule
Where the protocol is: UDP
Action: Reject It

* If you do not wish to share your files with others on the network you will need set this to Block It or leave it unchecked.
| edit post

Overclocking_Tutorial

Diposting oleh Masakan On 18.07 0 komentar
Overclocking takes on 3 forms:
First, is the casual overclocking, easy, and anyone can do it.
Second, is the right way to overclock, taking into account, everything.
Third, if you want serious power, your gonna need to be savy to what does what.

The casual overclocker gains about 5% increase, and really doesn't see any benefit from this, whilst it makes you feel good, no serious damage can be made, by upping the FSB a little, or changing your multiplier, only thing is, you want more.

The correct way to overclock, is to start looking at your system, check the motherboard specs, PSU, amount of harddrives, CD ROMS etc. (high end systems, including the lastest graphic cards will need serious power).

Lets take a base system like my old system setup:

AMD XP1700+ ( Thoroughbred JIUHB DLT3C )
Core Voltage = 1.50v
Maximum Die Temp = 90c
FSB = 266Mhz
(factory unlocked)

Jetway K266B KT266 chipset
DDR + SDR RAM (not together)
No onboard RAID

DDR RAM = Dane Elec PC2700 DDR (333Mhz)
Not registered

2 Hard drvies
1 CD Writer & 1 DVD ROM drive

2 LAN cards

1 PCI soundcard
(onboard sound turned off).

Now, lets look at what they can do:
The Thoroughbred is still the top processor for overclocking, Thunderbirds are just not upto it, even though they are capable of some really decent speeds, same as the Palamino, not to mention the Barton's (these are not what they have been made up to be).
(for the purpose of space, I'll not go into unlocking your CPU)

As you can see, my Thoroughbred has a core voltage of 1.5v, and as my motherboard is capable of giving my processor anything upto 1.85v, there is score for more there.
The FSB on my motherboard is capable of a max of 200Mhz (this is the magic number).
Die temps to a max of 90c is good (never been near it, yet!).

Now, to work out your Mhz on your system, or to check your multiplier or FSB, there is a little calculation you'll need to remember, and it's easy:

Your Mhz is worked out by your multiplier timed your FSB.
example:

CODE
133x10 = 1.33Ghz


Of course you can devide your Mhz with your known FSB to give you your multiplier etc.

Now for easy, I have the results of my previous unlocking tests handy, so I'll use them, and not the current speeds etc.

Standard Multiplier = 11.0
Overclocked Multiplier = 12.0

Standard Voltage = 1.50v
Overclocked Voltage = 1.52v

Standard FSB = 133Mhz
Overclocked FSB = 136Mhz

Standard Speed = 1467Mhz
Overclocked Speed = 1630Mhz

Standard Temps = CPU = 37c SYSTEM = 32c (idle) CPU = 44c SYSTEM = 36c (under load)
Overclocked Temps = CPU = 34c SYSTEM = 29c (idle) CPU 40c SYSTEM 34c (under load)

As you can see, the system is cooler when overclocked, this is due to having the correct cooling setup, and temps for it when it was standard, was standard cooling setup.

Basically, all I have done, is raised the FSB by 3mhz, the voltage by 0.02v and the multiplier by 1.0, this has given me a 163Mhz increase without over strssing my system, but, here is where it gets teadious:

To achieve this, it took me about a week, and this is how I did it:
I started by lowering the multiplier to 5.0, from there I raised the FSB to its max (at the time, have latest BIOS update for mobo, allowing 200Mhz FSB), 166Mhz, this is the correct way of overclocking.
From there, I started to raise the multiplier one by one, getting it back upto the standard multiplier or higher, checking the stability of the system each time.
(currently I am way passed the 136Mhz FSB, as I am running PC2700 DDR).

One thing to look at though, overclocking using the FSB WILL (unless your system allows you to specify it) mess with your PCI & RAM speeds.
Even raising it by 3Mhz can make your PCI cards to not work, and your RAM to get confused and crash your system.

Now your thinking to yourself 'I can do that' and yes you can, anyone can, but.......
It takes TIME, I can't stress that enough, if your going to try this, then you'll need to run your system for at least 6 hours between changing your multiplier, and as you can imagine, this can take a long time to do.

For your information, I used Hot CPU Tester, SETI & played Vietcong for testing purposes.

Now, for the hard part:

As most experienced overclockers will tell you, heat is your enemy, killing heat is your number 1 aim, don't worry about your speed at first, a 50Mhz increasde isn't gonna make your 3D Mark scream through the roof, actually, you'll probably not even get any better than what you did before.

There are several ways of dispersing heat, and they are:

Aircooling
Pro's: Cheap, effective at lower speeds.
Con's: Noisey, dust collectors, need maintanance.

Watercooling:
Pro's: Can lower your CPU by about 10c easily.
Con's: It has water in it, expensive, hard for some to understand.

Pelter:
Pro's: With watercooling, it's the daddy
Con's: ONLY EXPERIENCED PEOPLE NEED TO APPLY, very complicated, power hungry, NOT for the faint hearted. Stupidly expensive.

Aircooling:
Upgrading your CPU fan is the first step, there are several companies that offer aftermarket fans, which are better than the OEM fans are 2 a penny in todays world, but it's NOT just about your CPU fan, your system needs to breath, you need to get rid of 'hot spots' within your system.

Watercooling:
Its easier than most make out, its a good thing, kit prices can be got from about £120 ($200 US), just make sure they are upgradable, as you might want to add, a Northbridge water block & a GPU water block.
Modern day kits & parts are idiot proof, and will not leak, unless you act like Noah.

Pelter:
Pelter cooling is DANGEROUS, minly for your system, fitting it incorrectly, and you could end up with not only a baked CPU but a system that will end up as a very expensive paperweight.
Ask your local overclocking expert for more info.


Basically, if you can get hold of a decent Thoroughbred cored XP, your in luck (just like me), if its unlocked, then your in business, obviously, its not just down to your CPU, your motherboard and RAM will denote whether you can overclock big style or not.
I'd advise ANYONE thinking of overclocking, to research into it more, weigh up the odds on what they want or need, if your on a buget, DON'T attempt it, things can and do go wrong.
Most of the time, its not about 'mines faster than yours' or massive speed increases, its done by most, cause it can be. 90% of the time, you'd be better off buying a new CPU (as prices are so low), but if you get the urge, then a new world awaits you

great tutorial. this should help the OC noobs. If I can add something like you said know your specs of the mobo....and if you are serious about OC'ing dont go and get some generic NO-NAME ram and some ghetto mobo. to get the best stability go with ASUS and ABIT for the mobo and Crucial, Kingston, mushkin for the ram. A great forum for OC'ing is amdmb.com.


Indeed, if you are serious about your overclocking, its advised you only use serious brand names.
Generic parts are always a lower spec, and can easily destroy themselves with even a little stress aimed towards them.

Memory advice, use the folloing:

Kingston (added because of reviews, personally, I'm not sure about them).
Crucial (for Dual Channel DDR ONLY)
OCZ
Mushkin
Corsair
PNY (for EEC rated)
Samsung
Geil (my choice, when I can afford it)

Motherbord advice, use the following:

Asus A7N8X Deluxe nForce2
Asus A7N8X-VM nForce2
Asus A7N8X-X nForce2
Abit KD7-S KT400
Abit KV7 KT600
Abit NF7 v2.0 nForce2
Abit NF7-S v2.0 nForce2
MSI K7N2 Delta-L Nforce2
MSI KT6 Delta-LSR KT600
Epox 8RDA+ nForce2
Epox 8RGA+ nForce2

Any nForce2 motherboard would be best, they allow more score for overclocking your system.
_________________

Optimize Emule Connection

Diposting oleh Masakan On 18.04 0 komentar
Just start out on Emule and still a beginner.

The speed is really killing me, even configured ports 4662 & 4672. I got high ID but the quene is round up to hundreds before I capable to get any files.

I always keep my upload speed @ 20kbs, but d/l speed still suck. The speed only pick-up after 40minutes but not over 30kbs even there are 300 resource of sharing files.

Gone thru a lot of searches hope to get stuff from emule faster.

And here is one way to optimize the bandwidth for emule, which not on the manual.




CODE
With Windows 2000/XP:

Open "regedit.exe" and do the following:

[HKEY_LOCAL_MACHINESYSTEM]
CurrentControlSet
Services
Tcpip
Parameters
Set as: "GlobalMaxTcpWindowSize"=dword:00007fff

[HKEY_USERS.DEFAULT]
Software
Microsoft
Windows
CurrentVersion
Internet Settings
Set as: "MaxConnectionsPerServer"=dword:00000020
"MaxConnectionsPer1_0Server"=dword:00000020

[HKEY_CURRENT_USER]
Software
Microsoft
Windows
CurrentVersion
Internet Settings
Set as: "MaxConnectionsPerServer"=dword:00000020
"MaxConnectionsPer1_0Server"=dword:00000020




I heard someone mention earlier that BT engine can speed up emule but don't know it's true.
| edit post

Wanita itu sudah tua, namun semangat perjuangannya tetap menyala seperti wanita yang masih muda. Setiap tutur kata yang dikeluarkannya selalu menjadi pendorong dan bualan orang disekitarnya. Maklumlah, ia memang seorang penyair dua zaman, maka tidak kurang pula bercakap dalam bentuk syair. Al-Khansa bin Amru, demikianlah nama wanita itu. Dia merupakan wanita yang terkenal cantik dan pandai di kalangan orang Arab. Dia pernah bersyair mengenang kematian saudaranya yang bernama Sakhr :

"Setiap mega terbit, dia mengingatkan aku pada Sakhr, malang. Aku pula masih teringatkan dia setiap mega hilang dii ufuk barat Kalaulah tidak kerana terlalu ramai orang menangis di sampingku ke atas mayat-mayat mereka, nescaya aku bunuh diriku."
Setelah Khansa memeluk Islam, keberanian dan kepandaiannya bersyair telah digunakan untuk menyemarakkan semangat para pejuang Islam. Ia mempunyai empat orang putera yang kesemuanya diajar ilmu bersyair dna dididik berjuang dengan berani. Kemudian puteranya itu telah diserahkan untuk berjuang demi kemenangan dan kepentingan Islam. Khansa telah mengajar anaknya sejak kecil lagi agar jangan takut menghadapi peperangan dan cabaran.

Pada tahun 14 Hijrah, Khalifah Umar Ibnul Khattab menyediakan satu pasukan tempur untuk menentang Farsi. Semua Islam dari berbagai kabilah telah dikerahkan untuk menuju ke medan perang, maka terkumpullah seramai 41,000 orang tentera. Khansa telah mengerahkan keempat-empat puteranya agar ikut mengangkat senjata dalam perang suci itu. Khansa sendiri juga ikut ke medan perang dalam kumpulan pasukan wanita yang bertugas merawat dan menaikkan semangat pejuan tentera Islam.
Dengarlah nasihat Khansa kepada putera-puteranya yang sebentar lagi akan ke medan perang, "Wahai anak-anakku! Kamu telah memilih Islam dengan rela hati. Kemudian kamu berhijrah dengan sukarela pula. Demi Allah, yang tiada tuhan selain Dia, sesungguhnya kamu sekalian adalah putera-putera dari seorang lelaki dan seorang wanita. Aku tidak pernah mengkhianati ayahmu, aku tidak pernah memburuk-burukkan saudara-maramu, aku tidak pernah merendahkan keturuna kamu, dan aku tidak pernah mengubah perhubungan kamu. Kamu telah tahu pahala yang disediakan oleh Allah kepada kaum muslimin dalam memerangi kaum kafir itu. Ketahuilah bahwasaya kampung yang kekal itu lebih baik daripada kampung yang binasa."

Kemudian Khansa membacakan satu ayat dari surah Ali Imran yang bermaksud, "Wahai orang yang beriman! Sabarlah, dan sempurnakanlah kesabaran itu, dan teguhkanlah kedudukan kamu, dan patuhlah kepada Allah, moga-moga menjadi orang yang beruntung." Putera-putera Khansa tertunduk khusyuk mendengar nasihat bonda yang disayanginya.
Seterusnya Khansa berkata, "Jika kalian bangun esok pagi, insya Allah dalam keadaan selamat, maka keluarlah untuk berperang dengan musuh kamu. Gunakanlah semua pengalamanmu dan mohonlah pertolongan dari Allah. Jika kamu melihat api pertempuran semakin hebat dan kamu dikelilingi oleh api peperangan yang sedang bergejolak, masuklah akmu ke dalamnya. Dan dapatkanlah puncanya ketika terjadi perlagaan pertempurannya, semoga kamu akan berjaya mendapat balasan di kampung yang abadi, dan tempat tinggal yang kekal."

Subuh esoknya semua tentera Islam sudah berada di tikar sembahyang masing-masing untuk mengerjakan perintah Allah iaitu solat Subuh, kemudian berdoa moga-moga Allah memberikan mereka kemenangan atau syurga. Kemudian Saad bin Abu Waqas panglima besar Islam telah memberikan arahan agar bersiap-sedia sebaik saja semboyan perang berbunyi. Perang satu lawan satu pun bermula dua hari. Pada hari ketiga bermulalah pertempuran besar-besaran. 41,000 orang tentera Islam melawan tentera Farsi yang berjumlah 200,000 orang. Pasukan Islam mendapat tentangan hebat, namun mereka tetap yakin akan pertolongan Allah .

Putera-putera Khansa maju untuk merebut peluang memasuki syurga. Berkat dorongan dan nasihat dari bondanya, mereka tidak sedikit pun berasa takut. Sambil mengibas-ngibaskan pedang, salah seorang dari mereka bersyair,
"Hai saudara-saudaraku! Ibu tua kita yang banyak pengalaman itu, telah memanggil kita semalam dan membekalkan nasihat. Semua mutiara yang keluar dari mulutnya bernas dan berfaedah. Insya Allah akan kita buktikan sedikit masa lagi."
Kemudian ia maju menetak setiap musuh yang datang. Seterusnya disusul pula oleh anak kedua maju dan menentang setiap musuh yang mencabar. Dengan semangat yang berapi-api ia bersyair,

"Demi Allah! Kami tidak akan melanggar nasihat dari ibu tua kami Nasihatnya wajib ditaati dengan ikhlas dan rela hati Segeralah bertempur, segeralah bertarung dan menggempur mush-musuh bersama-sama Sehingga kau lihat keluarga Kaisar musnah."
Anak Khansa yang ketiga pula segera melompat dengan beraninya dan bersyair,
"Sungguh ibu tua kami kuat keazamannya, tetap tegas tidak goncang Beliau telah menggalakkan kita agar bertindak cekap dan berakal cemerlang Itulah nasihat seorang ibu tua yang mengambil berat terhadap anak-anaknya sendiri Mari! Segera memasuki medan tempur dan segeralah untuk mempertahankan diri Dapatkan kemenangan yang bakal membawakegembiraan di dalam hati Atau tempuhlah kematian yang bakal mewarisi kehidupan yang abadi."

Akhir sekali anak keempat menghunus pedang dan melompat menyusul abang-abangnya. Untuk menaikkan semangatnya ia pun bersyair,
"Bukanlah aku putera Khansa', bukanlah aku anak jantan Dan bukanlah pula kerana 'Amru yang pujiannya sudah lama terkenal Kalau aku tidak membuat tentera asing yang berkelompok-kelompok itu terjunam ke jurang bahay, dan musnah mangsa oleh senjataku."
Bergelutlah keempat-empat putera Khansa dengan tekad bulat untuk mendapatkan syurga diiringi oleh doa munajat bondanya yang berada di garis belakang. Pertempuran terus hebat. Tentera Islam pada mulanya kebingungan dan kacau kerana pada mulanya tentera Farsi menggunakan tentera bergajah di barisan hadapan, sementara tentera berjalan kaki berlindung di belakang binatang tahan lasak itu. Namun tentera Islam dapat mencederakan gajah-gajah itu dengan memanah mata dan bahagian-bahagian lainnya. Gajah yang cedera itu marah dengan menghempaskan tuan yang menungganginya, memijak-mijak tentera Farsi yang lannya. Kesempatan ini digunakan oleh pihak Islam untuk memusnahkan mereka. Panglima perang bermahkota Farsi dapat dipenggal kepalanya, akhirnya mereka lari lintang-pukang menyeberangi sungai dan dipanah oleh pasukan Islam hingga air sungai menjadi merah. Pasukan Farsi kalah teruk, dari 200,000 tenteranya hanya sebahagian kecil saja yang dapat menyelamatkan diri.

Umat Islam lega. Kini mereka mengumpul dan mengira tentera Islam yang gugur. Ternyata yang beruntung menemui syahid di medan Kadisia itu berjumlah lebih kurang 7,000 orang. Dan daripada 7,000 orang syuhada itu terbujur empat orang adik-beradik Khansa. Seketika itu juga ramailah tentera Islam yang datang menemui Khansa memberitahukan bahwa keempat-empat anaknya telah menemui syahid. Al-Khansa menerima berita itu dengan tenang, gembira dan hati tidak bergoncang. Al-Khansa terus memuji Allah dengan ucapan,

"Segala puji bagi Allah, yang telah memuliakanku dengan mensyahidkan mereka, dan aku mengahrapkan darii Tuhanku, agar Dia mengumpulkan aku dengan mereka di tempat tinggal yang kekal dengan rahmat-Nya!"
Al-Khansa kembali semula ke Madinah bersama para perajurit yang masih hidup dengan meninggalkan mayat-mayat puteranya di medan pertempuran Kadisia. Dari peristiwa peperanan itu pula wanita penyair ini mendapat gelaran kehormatan 'Ummu syuhada yang ertinya ibu kepada orang-orang yang mati syahid."
| edit post
When you open Windows Explorer (by choosing the Window key and "E" simultaneously or by choosing Start, all Programs, Accessories, Windows Explorer), you can change the directory that appears by default. If you choose Start, all Programs, Accessories, and then right-click on Windows Explorer and choose Properties, you can modify the "Target" directory. To go to your C: drive, type simply C:\ in the Target box and choose OK. You can also enter a shortcut key on this screen, telling Windows the character or combination of characters you want to type to automatically open Windows Explorer. You can even change the icon or specify that you always want Explorer to open up in full-screen mode.

Cluster is an allocation unit. If you create file lets say 1 byte in size, at least one cluster should be allocated on FAT file system. On NTFS if file is small enough, it can be stored in MFT record itself without using additional clusters. When file grows beyond the cluster boundary, another cluster is allocated. It means that the bigger the cluster size, the more disk space is wasted, however, the performance is better.

So if you have a large hard drive & dont mind wasteing some space, format it with a larger cluster size to gain added performance.

The following table shows the default values that Windows NT/2000/XP uses for NTFS formatting:

Drive size
(logical volume) Cluster size Sectors
----------------------------------------------------------
512 MB or less 512 bytes 1
513 MB - 1,024 MB (1 GB) 1,024 bytes (1 KB) 2
1,025 MB - 2,048 MB (2 GB) 2,048 bytes (2 KB) 4
2,049 MB and larger 4,096 bytes (4 KB) 8
However, when you format the partition manually, you can specify cluster size 512 bytes, 1 KB, 2 KB, 4 KB, 8 KB, 16 KB, 32 KB, 64 KB in the format dialog box or as a parameter to the command line FORMAT utility.

The performance comes thew the bursts from the hard drive. by having a larger cluster size you affectivly have a larger chunk of data sent to ram rather than having to read multiple smaller chunks of the same data.

No Text Icons

If you would like your desktop Icons to have no text underneath then try this tweak:

Right click the icon and select "Rename"

Now hold the "Alt" key and type "255" and hit Enter

NOTE : It may only work with the keypad numbers and not the number keys on top of the keyboard.

Have you ever wanted a Windows XP CD that would install Windows XP by automatically putting in your name, product key, timezone and regional settings? Followed by silently installing all your favourite applications along with DirectX 9, .Net Framework and then all the Pre-SP2 hotfixes, updated drivers, registry tweaks, and a readily patched UXTheme.dll without any user interaction whatsoever? Then this guide will show you how you can do just that!


What's New:

Changes in Windows XP SP2 Unattended


http://unattended.msfn.org/xp/sp2changes.htm


This page details the changes you may want to add to your Unattended XP CD if you have your copy of XPSP2 Final from WindowsBeta. The guide will be updated globally to SP2 status once XP SP2 is officially released to the public on Microsoft's download servers in the next coming days.

View: MSFN's Official Unattended XP CD Guide


http://unattended.msfn.org/
| edit post

Optimize Broadband & Dsl Connections

Diposting oleh Masakan On 19.02 0 komentar
These settings allow you to boost the speed of your broadband Internet connection when using a Cable Modem or DSL Router with Windows 2000 and Windows XP.

Open your registry and find the key below.

Create the following DWORD values, as most of these values will not already exist you will need to create them by clicking on 'Edit -> New -> DWORD Value' and then set the value as shown below.

DefaultTTL = "80" hex (or 128 decimal)
Specifies the default time to live (TTL) for TCP/IP packets. The default is 32.

EnablePMTUBHDetect = "0"
Specifies whether the stack will attempt to detect Maximum Transmission Unit (MTU) routers that do not send back ICMP fragmentation-needed messages. The default is 0.

EnablePMTUDiscovery = "1"
Specifies whether the TCP/IP stack will attempt to perform path MTU discovery as specified in RFC 1191. The default is 1.

GlobalMaxTcpWindowSize = "7FFF" hex (or 32767 decimal)
Specifies the system maximum receive window size advertised by the TCP/IP stack.

TcpMaxDupAcks = "2"
Determines the number of duplicate ACKs that must be received for the same sequence number of sent data before "fast retransmit" is triggered.

SackOpts = "1"
Enables support for selective acknowledgements as documented by Request for Comment (RFC) 2018. Default is 0.

Tcp1323Opts = "1"
Controls RFC 1323 time stamps and window scaling options. Possible values are: "0" = disable RFC 1323 options, "1" = window scale enabled only, "2" = time stamps enabled only and "3" = both options enabled.

TcpWindowSize = "7FFF" hex (or 32767 decimal)
Specifies the receive window size advertised by the TCP/IP stack. If you have a latent network you can try increasing the value to 93440, 186880, or 372300.

Exit your registry and restart Windows for the changes to take effect.

If you don’t want to edit the registry, here's a little TCP utility that is ideal...


http://www.broadbandreports.com/front/doctorping.zip
| edit post

Temanku Mati Terbakar

Diposting oleh Masakan On 22.46 0 komentar

Abu Abdillah berkata: "Aku tak tahu, bagaimana harus menuturkan kisah ini padamu. Kisah yang pernah ku alami sendiri beberapa tahun silam, sehingga mengubah total perjalanan hidupku. Sebenarnya aku tak ingin menceritakannya, tapi demi tanggung jawab di hadapan Allah, demi peringatan bagi para pemuda yang mendurhakai Allah dan demi pelajaran bagi para gadis yang mengejar bayangan semu, yang disebut cinta, maka kuungkapkan kisah ini.
Ketika itu kami tiga sekawan. Yang mengumpulkan kami adalah kesamaan nafsu dan kesia-siaan. Oh tidak, kami berempat. Satunya lagi adalah setan. Kami pergi berburu gadis-gadis. Mereka kami rayu dengan perkataan manis, hingga mereka takluk. Selanjutnya, kami bawa mereka ke sebuah taman yang jauh terpencil. Di sana, kami berubah menjadi serigala yang tak menaruh belas kasihan mendengar rintihan permohonan mereka. Hati dan perasaan kami sudah mati.

Begitulah keseharian kami di taman, di tenda, atau dalam mobil yang di parkir di pinggir pantai. Sampai suatu hari, yang tak mungkin akan saya lupakan, seperti biasa kami pergi ke taman. Seperti biasa pula, masing-masing kami menyantap satu mangsa gadis, ditemani minuman laknat. Namun, satu hal kami lupa saat itu, makanan.

Segera salah seorang di antara kami bergegas membeli makanan dengan mengendarai mobilnya. Saat ia berangkat, jam menunjukkan pukul enam sore. Beberapa jam berlalu, tapi teman kami itu belum kembali. Pukul sepuluh malam, hatiku mulai tidak enak dan gusar. Maka aku segera membawa mobil untuk mencarinya. Di tengah perjalanan, di kejauhan aku melihat jilatan api. Aku mencoba mendekat. Astaghfirullah, aku hampir tak percaya dengan yang kulihat. Ternyata api itu bersumber dari mobil temanku yang terbalik dan terbakar. Aku panik seperti orang gila. Aku segera mengeluarkan tubuh temanku dari mobilnya yang masih menyala. Aku ngeri tatkala melihat separuh tubuhnya masak terpanggang api. Kubopong tubuhnya lalu kuletakkan di tanah.
Sejenak kemudian, dia berusaha membuka kedua belah matanya, ia berbisik lirih: ‘Api..., api...!’
Aku memutuskan untuk segera membawa ke rumah sakit dengan mobilku. Tetapi dengan suara campur tangis, ia mencegah: ‘Tak ada gunanya.. aku tak akan sampai...!’ Air mataku tumpah, aku harus menyaksikan temanku meninggal dihadapanku. Di tengah kepanikanku, tiba-tiba ia berteriak lemah: ‘Apa yang mesti kukatakan pada-Nya? Apa yang mesti kukatakan pada-Nya?’
Aku memandanginya penuh keheranan. ‘Siapa?’, tanyaku. Dengan suara yang seakan berasal dari dasar sumur yang amat dalam, dia menjawab: ‘Allah!’.Aku merinding ketakutan. Tubuh dan perasaanku terguncang keras. Tiba-tiba temanku itu menjerit, gemanya menyelusup ke setiap relung malam yang gulita, lain kudengar tarikan nafasnya yang terakhir. Innalillaahi wa innaa ilaihi raaji 'uun.

Setelah itu, hari-hari berlalu seperti sedia kala tetapi bayangan temanku yang meninggal, jerit kesakitannya, api yang membakarnya dan lolongannya ‘Apa yang harus kukatakan pada-Nya? Apa yang harus kukatakan pada-Nya?’, seakan terus membuntuti setiap gerak dan diamku.
Pada diriku sendiri aku bertanya: ‘Aku,... apa yang harus kukatakan pada-Nya?’
Air mataku menetes, lain sebuah getaran aneh menjalari jiwaku. Saat puncak perenungan itulah, sayup-sayup aku mendengar adzan Shubuh menggema:
’Allahu Akbar, Allahu Akbar, Asyhadu Anla Ilaaha Illa Allah... Asyhadu Anna Muhammadar RasuluNah... Hayya 'Alash Shalaah...’
Aku merasa bahwa adzan itu hanya ditujukan pada diriku saja, mengajakku menyingkap fase kehidupanku yang kelam, mengajakku pada jalan cahaya dan hidayah. Aku segera bangkit, mandi dan wudhu, menyucikan tubuhku dari noda-noda kehinaan yang menenggelamkanku selama bertahun-tahun.

Sejak saat itu, aku tak pernah lagi meninggalkan shalat. Aku memuji Allah, yang tiada yang layak dipuji selain Dia. Aku telah menjadi manusia lain. Mahasuci Allah yang telah mengubah berbagai keadaan. Dengan seizin Allah, aku telah menunaikan umrah. Insya AIlah aku akan melaksanakan haji dalam waktu dekat, siapa yang tahu? Umur ada di tangan Allah.”
| edit post

KEJUJURAN SEORANG SAUDAGAR PERMATA

Diposting oleh Masakan On 22.38 0 komentar

Pada suatu hari, seorang saudagar perhiasan di zaman Tabiin bernama Yunus bin Ubaid, menyuruh saudaranya menjaga kedainya kerana ia akan keluar solat. Ketika itu datanglah seorang badwi yang hendak membeli perhiasan di kedai itu. Maka terjadilah jual beli di antara badwi itu dan penjaga kedai yang diamanahkan tuannya tadi.
Satu barang perhiasan permata yang hendak dibeli harganya empat ratus dirham. Saudara kepada Yunus menunjukkan suatu barang yang sebetulnya harga dua ratus dirham. Barang tersebut dibeli oleh badwi tadi tanpa diminta mengurangkan harganya tadi. Ditengah jalan, dia terserempak dengan Yunus bin Ubaid. Yunus bin Ubaid lalu bertanya kepada si badwi yang membawa barang perhiasan yang dibeli dari kedainya tadi. Sememangnya dia mengenali barang tersebut adalah dari kedainya. Saudagar Yunus bertanya kepada badwi itu, "Berapakah harga barang ini kamu beli?"

Badwi itu menjawab, "Empat ratus dirham."
"Tetapi harga sebenarnya cuma dua ratus dirham saja. Mari ke kedai saya supaya saya dapat kembalikan wang selebihnya kepada saudara." Kata saudagar Yunus lagi.
"Biarlah, ia tidak perlu. Aku telah merasa senang dan beruntung dengan harga yang empat ratus dirham itu, sebab di kampungku harga barang ini paling murah lima ratus dirham."
Tetapi saudagar Yunus itu tidak mahu melepaskan badwi itu pergi. Didesaknya juga agar badwi tersebut balik ke kedainya dan bila tiba dikembalikan wang baki kepada badwi itu. Setelah badwi itu beredar, berkatalah saudagar Yunus kepada saudaranya, "Apakah kamu tidak merasa malu dan takut kepada Allah atas perbuatanmu menjual barang tadi dengan dua kali ganda?" Marah saudagar Yunus lagi.

"Tetapi dia sendiri yang mahu membelinya dengan harga empat ratus dirham." Saudaranya cuba mempertahankan bahwa dia dipihak yang benar.
Kata saudagar Yunus lagi, "Ya, tetapi di atas belakang kita terpikul satu amanah untuk memperlakukan saudara kita seperti memperlakukan terhadap diri kita sendiri."
Jika kisah ini dapat dijadikan tauladan bagi peniaga-peniaga kita yang beriman, amatlah tepat. Kerana ini menunjukkan peribadi seorang peniaga yang jujur dan amanah di jalan mencari rezeki yang halal. Jika semuanya berjalan dengan aman dan tenteram kerana tidak ada penipuan dalam perniagaan.

Dalam hal ini Rasulullah S.A.W bersabda, "Sesungguhnya Allah itu penetap harga, yang menahan, yang melepas dan memberi rezeki dan sesungguhnya aku harap bertemu Allah di dalam keadaan tidak seorang pun dari kamu menuntut aku lantaran menzalimi di jiwa atau diharga." (Diriwayat lima imam kecuali imam Nasa'i)
| edit post

Nice list of windows shortcuts

Diposting oleh Masakan On 22.37 0 komentar
For Real Windows Newbie's here you go...

CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box Keyboard Shortcuts
CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
Microsoft Natural Keyboard Shortcuts
Windows Logo (Display or hide the Start menu)
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard)
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)
Accessibility Keyboard Shortcuts
Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)
Windows Explorer Keyboard Shortcuts
END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
Microsoft Management Console (MMC) Main Window Keyboard Shortcuts
CTRL+O (Open a saved console)
CTRL+N (Open a new console)
CTRL+S (Save the open console)
CTRL+M (Add or remove a console item)
CTRL+W (Open a new window)
F5 key (Update the content of all console windows)
ALT+SPACEBAR (Display the MMC window menu)
ALT+F4 (Close the console)
ALT+A (Display the Action menu)
ALT+V (Display the View menu)
ALT+F (Display the File menu)
ALT+O (Display the Favorites menu)
MMC Console Window Keyboard Shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
Microsoft Internet Explorer Navigation
CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)
CTRL+O (Open the Open dialog box, the same as CTRL+L)
CTRL+P (Open the Print dialog box)
CTRL+R (Update the current Web page)
CTRL+W (Close the current window)
| edit post

news groups the how to do

Diposting oleh Masakan On 22.36 0 komentar
FOUND ON DIFFRENT FORUM

ok there is a lot to explain and most of it is un needed or more to the point
you wont need it . well at least not to start with . maybe in a few months when you
feel more at home with the world of usenet you may feel the need to look deeper
this tutorial is therefore aimed at the guys who want to use a news group but
have no idea what one is how to install needed items and download the files
you want .

ok news groups = a good place to download the newest movie / game / application / music ect
yer im sure its more than that but do you realy care ? ..

ok needed in order i think best . some files may seem odd but they will make life easy so dont moan
just download them ok Razz..

Code:
1. http://bullbrand.giveit2me4free.com/downloads/nl_setup.exe
2. http://www.nettle.us/quickpar/QuickPar-0.9.1.0.exe
3. http://www.rarlab.com/rar/wrar342.exe
4. http://www.daemon-tools.cc/dtcc/portal/download.php?mode=Download&id=34


1 is the application used to connect to the news groups and download the files
2 is a application made to help fix any files application No 1 fails to download correctly
3 is winrar always use the newest version around as most files posted to the newsgroups
do use the newest versions
4 Daemon Tools is a virtual CDrom DVD drive great for testing any cd's or DVD you download
before burning them to Disks .

1 is a pay for application and in time you may well want to subscribe to it as it is one of the
best applications out there for doing its job. but the link i give you is for the final version 1
and keygens are all over the net for this one .
or check next post down for chicken link
2. smartpar is realy freeware so no need to worry here
3. winrar is always cracked so check out google its your friend Razz ..
4. Daemon Tools is freeware no probs eh!..

ok now you have to do some work that i cant do for you you have to go and find out
what you own ISP's News Server Address is .

Mine is at Pipex =
Code:
nntp.dsl.pipex.com


username and password are required to login to it

NTL users can try any of these
Code:
news.cache.ntlworld.com
news.cache.cable.ntlworld.com
news.ntlworld.com
news.cable.ntlworld.com
newscache.cable.ntlworld.com

newsfep1a-gui.server.ntli.net
newsfep1a-gui.server.ntli.net
newsfep1b-gui.server.ntli.net
newsfep1c-gui.server.ntli.net
newsfep1d-gui.server.ntli.net
newsfep2a-gui.server.ntli.net
newsfep2b-gui.server.ntli.net
newsfep2c-gui.server.ntli.net
newsfep2d-gui.server.ntli.net
newsfep1a-win.server.ntli.net
newsfep1b-win.server.ntli.net
newsfep1c-win.server.ntli.net
newsfep1d-win.server.ntli.net
newsfep2a-win.server.ntli.net
newsfep2b-win.server.ntli.net
newsfep2c-win.server.ntli.net
newsfep2d-win.server.ntli.net

news.tesco.net (yep you can access these from an ntl account)
news.virgin.net (yep you can access these from an ntl account)
Cache servers unreliable but at least accept a connection:

cache1-mant.server.ntli.net
inktomi1-bro.server.ntl.com
inktomi2-bro.server.ntl.com


sorry but there are so many ISP's out there i cant possibly find them .do not install
anything until you have this information without it you cant do jack ..
ok if you have now got the news server info your ISP use's then procced to install
app No 1
on install leave it all on default click ok next yes ok ect til all is done then run it.
on 1st run look at the very top menus and click on OPTIONS
then click DOWNLOADS if needed change the path to the download folder as needed
remember you will be downloading many gigs so make sure the drive has room .
if not edit the path and change the drive make a new folder ect so you have room.

now click on HEADERS and untick " all ways get all headers" and enter 100000 in
both the boxes . this will download if and when required the last 5 days headers
(you may never do it just setting up incase you feel brave Razz // )

now click NZB files . ok click everthing in here except "pretty up subfolder names "
and then apply the settings . now we setup the news server connection info so do
this next.

look at the tabs near the top area the first one is called "Usenet Manager"
click it and you will be able to add a new news server by right clicking in the white area
and selecting ADD NEW SERVER , in this new box enter the details you should have
the SERVER ADDRESS is the news server your ISP gave you to use.
the nick name can be anything you like should be same as the ADDRESS if you typed it in
the number of connections can vary so its trial and error here set it to 1 con and then increase
it untill you see a problem .(normaly says access forbiddon ) when you connect of course
if you require a login (some do some dont) tick the box and enter a user and password
for your news server this will normaly be the same user and password you use to connect
to the ISP's ADSL system . if you dont require a login then un tick the box and enter nothing
in user and password areas . it knows if your on there ADSL network and connects if you are.
again bit of trial and error here ..
once you think its right click OK and then look at the icons at the top click the one flashing with the word
CONNECT and look at the bottom of the display you should see a status of what is going on
if it says "Idle & ready for action" your done .
if it says "Unable to authenticate please check quota and user password ect" you have it wrong
and will need to recheck the user password ect you entered. till it does work if you get totaly
lost here you can always call your ISP support and ask for the dam News Server login needed.
it is not illegal to use this service so you are not breaking any laws.

ok if we all have the "Idle & ready for action" we can close the newsleecher application down
we done setting it up.

ok now install Smartpar and winzip and daemon tools . just use the default settings as they work fine.

ok ready to test this system out then here we go
Code:
Registry Rescue v2.8
http://www.newzbin.com/972728 (1.1MB)
alt.binaries.w***z.ibm-pc.0-day


the above is a tiny part of an email i get every day from a website called newzbin.com
they have a team that look at the main groups and report new posts so lets say
someone posts a new movie there team go and find all the rar files that you need to download
to make the movie work and put all the links to download these files into 1 text file called
a NZB file so when that file is OPENED newsleecher the application we just setup see's
its an NZB file and then opens up it loads the contents of the TEXT file into the app and
connects to your ISP News server and then starts to auto download the movie into the download
folder you setup a few mins ago . now depending on your conection speed and the size of
the files your gona download newsleecher will give you a ETA on time to compleate.

NZB files are the secret here they do all the hard work sites like newzbin create these
NZB files but they also expect you to be a subscriber to there system to be allowed to
get them . newzbin for example costs 0.25p (UK) a week so for 13 pound a year you can
have access to it all . now we know some here cant afford to pay these fee's so i'm having a
new area created so we can have some that can afford the fee to grab some of these NZB
files and UPLOADED them directly to the forum so members can simply click to save these
files so we can all enjoy the power of NG's .

ok so what the hell is smartpar and whats it do..
simple it fixes broken downloads .
ok movie has 50 rar files of 15meg each to make the whole movie up .
on a newsgroup posts are limited to 5000 lines per post .
so what they do is split the 15meg rar files into say 60 files each with
5000 lines per file . the newsleecher then downloads each of the 60 part files
and then glues them all together to remake the 15meg rar file .
but sometimes one or 2 of these 5000 lines posts get lost and the rar file
is then incompleate ie: a bad rar file and it wont ever extract so you just
downloaded a 800meg waste of space set of files that are useless .
or are they Razz you will 99% of the time also see extra files being downloaded
theses have the file extension (.PAR2) these contain information to rebuild
incompleate broken part files so the 15meg rar file can now be made good .
it does have limits but so far in all my time i have only had 1 movie that would not
repair and I had to bin it . a realy good system IMO ..

winrar well its industry standard aint it ..

daemon tools well i use it a lot to save me burning DVDs i can mount a DVD iso file
and watch the Movie on my PC no disks needed . it has a million other uses but thats
one i use it for.

the following post contains a sample of an email i receive from newzbin everyday telling me the latest
release info i normaly click on the item i want it opens the webpage up and members will see a button
marked "GET MESSAGE ID'S " i click that and they send me the needed NBZ file i open it and in mins
im playing that new game / watching that new movie or installing that great application i always wanted
you get the idea im sure ..

downside is depending on your ISP there could be extra costs involved if they limit the amount of data
your allowed to download ie: 5 gigs per moth or something like that.
NZB files can be hard to get if you do not have an account with a service like newzbin.com
(my advice is to subscribe hell you can try it for 8 weeks for £2 UK thats some downloads
lets say you download the first day WINDOWS XP CORP INC Service PACK 2 worth £140 UK
and maybe 3 new PS2 games @ £30 UK each and maybe 2 MOVIES that arnt even out yet
no value you can see that on a daily / weekly cost it is well worth it .
but before anyone here runs off and subscribes to anything please STOP STOP STOP
we will post daily some of the NZB files we may even have a request or something setup
so you can 100% confirm you can run and work with NG's for ZERO costs . if you cant work them , all it cost you was a few mins of your time and you dloaded 4 small files .

good luck guys this is not as compleate as i wanted it to be but those in the group who
know me also know why my time is limited so sorry im selling it shorter than i wanted.
but it has enough clear and simple directions
to get anyone with almost zero knowhow to a NG's downloading pro in less than 10 mins


here are a few file to practise on .
these files have a life expectancy of 5 to 6 days form date of post so DONT complain in 8 days they dont work..

Musicmatch Jukebox Plus v10.00.1025b
http://bullbrand.giveit2me4free.com/downloads/Musicmatch_Jukebox_Plus.nzb

No1 DVD Ripper Se V1.3.39
http://bullbrand.giveit2me4free.com/downloads/No1_DVD_Ripper.nzb

U2 - The Best of 1990-2000
http://bullbrand.giveit2me4free.com/downloads/U2_-_The_Best_of_1990-2000.nzb

click on them and save or open them if you installed newsleecher right they will auto open it and download if they open it and the download does not start check that in OPTIONS / ADVANCED , "auto connect on startup" is ticked or simply click the connect icon when it has opened to start the download ..

if they open as XML pages or when you right click and save as they try and save as .xml pages then download this file
http://bullbrand.giveit2me4free.com/downloads/test_nbz.rar
that is a rar of the 3 files above just extract it and open the nzb files

remember though you dont need to read these files they are just to tell the newsleecher where to go and get what you want

New Way To Relive Some Zinio File

Diposting oleh Masakan On 22.31 0 komentar
In order to be able to read the mags, you have to be connected to the internet when you open them for the first time. It creates an .xml file in a folder called "ContentGuard", located in "C:\Documents and Settings\User\Application Data\ContentGuard". (User is your chosen name!). If you have the .xml file corresponding to a particular issue/mag, then you can read it offline! If you can get hold of the .xml files, theoretically you should be able to read the mag without connecting to the net.

Let's try a littlle experiment!
Download this file: Game Pro December 2003, 37.7 MB + CGGuard2.dll + cgLocal.db + zno4E4.xml

h*tps://s2.yousendit.com/d.aspx?id=900582E9C5A548E8FFEDFB0E13AD8363

Unrar it! (Password: softzone.org)

Then try these!:
First, put only the .xml file into C:\Documents and Settings\YOUR USER NAME\Application Data\ContentGuard
Then try to open and read.
If that doesn't work, put .dll and .db file into the same folder and try again.
If that doesn't work, pray that someone figures out a way soon!!
(Of course you have to have Zinio Reader already installed!)
i open it the .zno file in the same directory of the xml file, and it work, then i move the .zno file to anohter directory without the other files and could not open.

finaly, i copy the xml file to the contentguard directoy and open it the .zno file.

conclusions:

you need the xml file that correspond to the magazine you want to open, and put it in the same directory of the .zno files or in the contentguard folder,

ps. already try about 4 files.. and its seem to work..
but thats only a test..

you triy some of this experiments and post your results..

It works with the file zno***.xml for each magazine,
therefore someone can post a RAR file with all these small files (8k) zno***.xml; of each magazine?

PlZ some one who have read some zinio already , share some file with your Contenguard Folder . So we can relive some zinio file
| edit post

Pembantu Juga Manusia

Diposting oleh Masakan On 05.26 0 komentar

Suatu hari pada acara milad perusahaan di sebuah tempat rekreasi, seorang rekan datang bersama isteri dan anaknya yang lucu. Bersama mereka ikut serta juga seorang wanita muda, yang dari bajunya saya tahu dia adalah seorang pengasuh, pembantu, khadimat atau apalah namanya yang mempunyai tugas membantu pekerjaan-pekerjaan rumah tangga atau mengasuh anak. Saya mengenali jenis baju itu karena rumah saya dulu terletak di perkampungan bersebelahan dengan perumahan mewah dan setiap sore para pembantunya keluar menemani majikan dan anak-anaknya, mengenakan baju seragam yang khas.
Ada pertanyaan menggelitik dalam benak, mengapa harus memakai baju yang berbeda? Apakah hanya karena dia seorang pembantu, seseorang yang tugasnya di suruh-suruh lantas harus juga diperlakukan dengan cara berbeda? Saya tak berhenti menatap wajah perempuan lugu itu dengan baju biru muda bercelana longgar selutut, masih terlihat baju itu baru karena lipatannya yang kaku. Mungkin baju itu khusus dibeli untuk dipakai di acara ini, sangat kontras dia berpakaian seperti itu di tengah-tengah para karyawan yang berpakaian tertutup dan rapi. Saya sedih, hanya karena ingin membedakan status, maka pakaian pembantu harus dibedakan.
Sering kita temui dalam kehidupan sehari-hari, seorang pembantu yang diperlakukan semena-mena oleh majikannya. Contoh yang paling sering kita saksikan adalah perlakuan yang diterima para TKW. Sudah tak terhitung berita tentang perilaku kasar, penganiayaan, pemerkosaan, hingga pembunuhan yang dilakukan majikan kepada pembantunya. Sungguh mereka dalam posisi yang lemah dan tidak berdaya. Itu di luar negeri, tapi tidak menutup kemungkinan terjadi juga di dalam negeri.
Mungkin kita bisa saksikan tetangga, saudara atau bahkan kita sendiri yang bersikap tidak ramah dengan pembantu. Sedikit saja kesalahan seolah-olah dia sudah sangat merugikan kita. Saya pernah melihat seorang rekan yang membentak pembantunya hanya karena dia tidak bisa menemukan barang yang dicari. Kemarahan yang terlontar sesungguhnya tidak sebanding dengan kesalahan kecil yang diperbuat. Meskipun ada juga pembantu yang berbuat kriminal dengan mencuri atau menculik anak majikan, ia tetaplah seorang manusia seperti kita yang memiliki perasaan.
Tetapi ada juga orang yang sangat baik memperlakukan pembantunya. Tetangga ibu saya ada yang meliburkan pembantunya setiap hari minggu. Jadi selama majikan di rumah, dia bebas tugas dan dipersilahkan untuk bersilaturahmi ke rumah teman atau sekedar berjalan-jalan ke pusat kota. Teman saya malah tidak mau menyebutnya sebagai pembantu, setiap mengenalkan kepada orang lain dia selalu bilang, “ ini partner saya atau kenalkan ini asisten saya “ dan pembantu itu dianggap seperti anak sendiri karena usianya yang masih belia. Subhanallah.
Allah menyaksikan apapun yang kita lakukan, termasuk bagaimana perlakuan kita terhadap sesama mahlukNYA.Tidak ada yang pantas merasa paling mulia karena hanya status di dunia, toh Allah tidak juga pernah membandingkan pangkat, status dan jabatan seseorang, yang Dia lihat hanyalah takwanya.
Oleh Rina Setyawati
| edit post
Microsoft's plans to stop people pirating the next version of Windows have suffered a setback.

A German computer magazine has found weaknesses in the piracy protection system built into Windows XP.

The weaknesses could mean that in up to 90% of cases users can circumvent the copy protection system.

But Microsoft said that the protection system would be much stronger and harder to defeat when the final version of XP is released later this year.

Component count

In a bid to combat piracy Microsoft is introducing a product activation system into the XP versions of its software. Activating a product involves contacting Microsoft for an identification number that is then combined with the serial numbers of the components inside your computer to create a unique identifier.



it would be possible to 'activate' nearly 90 percent of home-user machines without Microsoft knowing anything about it

Mike Hartmann, Tec Channel
Big changes to the hardware in a machine could mean that users have to contact Microsoft for a new identification number to re-activate their software.

By tying software to individual machines Microsoft hopes to stop its products being run on more machines than they are licensed for.

But now German computer magazine Tec Channel has analysed the product activation system that is being used in the test, or beta, versions of Windows XP and found that, in many cases, it can be compromised by making simple changes.

File fiddling

When Windows XP is first installed and activated it generates a file called wpa.dbl that stores information about the configuration of your machine.

Changes to any one of the ten components or serial numbers that this file watches are logged. When three changes have been made the wpa.dbl file is deleted forcing the user to contact Microsoft to reactivate the software.

But Mike Hartmann, a journalist at Tec Channel, has found that the ability of the wpa file to spot piracy can be easily compromised.

In tests Mr Hartmann installed and activated XP, then saved a version of the wpa file that was generated. He then changed components on the test machine so XP had to be re-activated. However, copying the old version of the wpa file back in the Windows system directory stopped requests for reactivation.

Piracy problems

The activation was also compromised when XP was fooled into thinking that a desktop PC was a laptop in a docking station, rather than a self-contained machine. In this configuration some components that wpa watches would be in the docking station rather than the portable computer. XP dutifully ignored any changes made to these components.

XP activation items
network card address
graphics card ID number
CPU serial number
SCSI host adapter number
IDE controller number
hard disk serial number
CPU type
Ram size
Volume ID
CD-Rom serial number

In total Mr Hartmann found a way to make the Windows XP activation technology ignore six of the ten components that it monitors. Mr Hartmann said another two can vary in only a small number of ways among all machines making it possible to create a "universal" wpa file that should activate XP on most PCs.

"With some smart tools that do automatic matching of hardware and activation-files it would be possible to 'activate' nearly 90 percent of home-user machines without Microsoft knowing anything about it," Mr Hartmann told BBC News Online.

Mr Hartmann expects to see activation file sites springing up on the web that offer wpa files tied to PCs with particular configurations thus ruining Microsoft's chances of cutting piracy.

"Should Microsoft stick with current version of wpa they will have wasted lots of money for call-center-employees, webservers and the technology itself," he said.

But a spokeswoman for Microsoft said that the version of the activation system that is in the pre-release versions of Windows XP is weaker than that which will ship with the finished version.

"The things that have been highlighted as a way of potentially bypassing activation will not be in the final code," said the spokeswoman. "The final code is going to be very different to what we have now."

"Product activation is not completely fixed in place at this time," she added.


Hacking WindowsXP Product Activation

Basic Issues

The file wpa.dbl in the directory system32 contains information on the system at the time of the Activation. If more than three hardware components are changed, Windows XP will notice it and delete wpa.dbl. With that the user shall be forced to activate XP anew. You do not get another 30 days of time, though, to activate again (in RC1 it is a fortnight). Instead XP takes the date of the installation as a basis. That means you have to activate immediately to run XP again, if the installation took place 30 days ago.

Volume serial number of the system volumes (displayed with dir-command)
MAC address of the network card (displayed with netstat -r -n)
Identification string of the CD ROM drive
Identification string of the displays
CPU serial number
Identification string of the system's hard disk
Identification string of the SCSI host adapter
Identification string of the IDE controller
String of the processor model
RAM size
1 = docking station, 0 = without docking station

First Tests

For a beginning we first of all saved the file wpa.dbl and then replaced the graphics card and the network card. As expected Windows XP was cooperative, so we could work without any disturbance. The first surprise showed up as we replaced the Celeron with a Pentium III: Suddenly Windows XP wanted to activate anew although we only changed three components.
The answer to the riddle is to be found in the serial number of the processor. Replacing the processor did not only change one but already changed two pieces of hardware information. For us that means to restart the computer and to switch off the serial number in the BIOS. Nonetheless XP insists on the Activation. A glance at wpa.dbl shows the reason why: Apparently XP put the file back in a non-activated condition. We again restart the computer, boot into DOS and copy the saved wpa.dbl back into the system directory of XP. With the next start of XP, the demand for Activation has disappeared. Evidently, wpa.dbl is the central authority to decide whether or not Activation already took place.

We re-install Windows XP on our computer from the ground up, using the very same product key. Nevertheless, the computer gets another product ID, as the last three digits are generated randomly. Although the product ID changed, Windows can be activated by copying the saved file wpa.dbl into the appropriate directory. Our next try brings an even bigger surprise: The Activation still works although we use a completely new product key for the installation.

Forged Hardware

These results kept in the back of our minds we try to activate Windows XP on another computer by copying the file wpa.dbl. First of all we adapt the volume ID of the new computer by means of freeware tools. The command line volumeid c: 3333-3333 changes the corresponding coefficient of the new system: The first component of Microsoft's protection is canceled.

With some network cards it is possible to adjust the MAC manually by means of the driver. The corresponding option in the register Advanced is called "Network Address" or "Locally administered Network Address".

So meanwhile we succeeded in switching off two components of the Activation by pretending another network address to the new system. The CPU serial number is switched off anyway, both computers do not have a SCSI host adapter and the memory is of the same size with both of them. With that altogether five sections of the hardware ID are identical.
Six actually, for both computers are not "to be docked". The latter gives us a bold plan...
Notebook of Eight Kilogrammes

What would happen if we tell the operating system that the computer is a notebook? This option can be toggled in the hardware profile of the device manager.

Can Microsoft be tricked that easily? Yes it can! After the next restart of the computer the analysis of the installation ID makes clear that suddenly the graphics card and the IDE/SCSI controller are no longer used to calculate the hardware ID.
So only three more differences in the configuration of the hardware remain:

Identification of the hard disk
Identification of the CPU
Identification of the CD-ROM drive

Because these three components are allowed to be different without XP insisting on a new Activation, this should be sufficient. So we copy the file wpa.dbl into the system32 directory of the second computer and start Windows XP. In the start menu it still says "Activate Windows". But when you call it up, you get your just reward though:

Windows XP enlists ten hardware components to calculate the installation ID, but six of them can be canceled without any problems:

Component To be canceled by
Volume ID Adapted by means of tool
MAC address Tuned by means of driver
Graphics card Switch over to docking station
CPU serial number Switch off in BIOS
SCSI host adapter Switch over to docking station
IDE controller Switch over to docking station

Important: A LAN does not tolerate two computers with the same MAC address.

Only four components are working almost effectively:

Component Size of bit field

Hard disk 7
CPU type 3
CD ROM 7
RAM size 3

Two fields are coded with three bits and two with seven bits. Because in each field the coefficient 0 is impossible, 7*7*127*127=790321 possibilities remain for the file wpa.dbl. As only three components are allowed to change from the moment of Activation onwards, you can take the weakest fixed component for a "Universal Activation".

The CPU type or the RAM size present themselves here as the best solution. It is more than sufficient to only once activate a computer with 128 MBytes of RAM at Microsoft's. With its file wpa.dbl you can then "activate" all other computers of the same memory size.

Conclusion

With its technology of Activation Microsoft wants to thwart the user who occasionally copies software. Up to a certain degree this may still work. But by means of the above described steps nearly everybody can activate his own XP merely by getting a corresponding wpa.dbl file. There certainly will exist some web sites in the near future where the user can comfortably download "his"wpa.dbl.

Should the current procedure of Activation remain, then Microsoft will spend a lot of money like water for technology, web servers and call centers without any considerable success. It would be much more lucrative to drop the Activation and to lower the price for XP.

Microsoft did not comment on the weak points of the Activation until now. But probably their statement goes as follows: "In its final version WPA will look completely different. We did not implement these steps in the RC1 for only one reason, that is not to annoy the testers."

But it definitely is a fact that in-between the Release Candidates and the real Release normally only bugs are rectified. May sharp tongues call the WPA itself a bug, in our opinion it is nothing more but an example of bad programming.


Inside Windows Product Activation

A Fully Licensed Paper

July 2001

Fully Licensed GmbH, Rudower Chaussee 29, 12489 Berlin, Germany

ht*p://www.licenturion.com


>> INTRODUCTION

The current public discussion of Windows Product Activation (WPA) is
characterized by uncertainty and speculation. In this paper we supply
the technical details of WPA - as implemented in Windows XP - that
Microsoft should have published long ago.

While we strongly believe that every software vendor has the right to
enforce the licensing terms governing the use of a piece of licensed
software by technical means, we also do believe that each individual
has the right to detailed knowledge about the full implications of the
employed means and possible limitations imposed by it on software
usage.

In this paper we answer what we think are currently the two most
important open questions related to Windows Product Activation.

* Exactly what information is transmitted during activation?

* How do hardware modifications affect an already activated
installation of Windows XP?

Our answers to these questions are based on Windows XP Release
Candidate 1 (build 2505). Later builds as well as the final version of
Windows XP might differ from build 2505, e.g. in the employed
cryptographic keys or the layout of some of the data
structures.

However, beyond such minor modifications we expect Microsoft to cling
to the general architecture of their activation mechanism. Thus, we
are convinced that the answers provided by this paper will still be
useful when the final version of Windows XP ships.

This paper supplies in-depth technical information about the inner
workings of WPA. Still, the discussion is a little vague at some
points in order not to facilitate the task of an attacker attempting
to circumvent the license enforcement supplied by the activation
mechanism.

XPDec, a command line utility suitable for verifying the presented
information, can be obtained from http://www.licenturion.com/xp/. It
implements the algorithms presented in this paper. Reading its source
code, which is available from the same location, is highly
recommended.

We have removed an important cryptographic key from the XPDec source
code. Recompiling the source code will thus fail to produce a working
executable. The XPDec executable on our website, however, contains
this key and is fully functional.

So, download the source code to learn about the inner workings of WPA,
but obtain the executable to experiment with your installation of
Windows XP.

We expect the reader to be familiar with the general procedure of
Windows Product Activation.

>> INSIDE THE INSTALLATION ID

We focused our research on product activation via telephone. We did
so, because we expected this variant of activation to be the most
straight-forward to analyze.

The first step in activating Windows XP via telephone is supplying the
call-center agent with the Installation ID displayed by msoobe.exe,
the application that guides a user through the activation process. The
Installation ID is a number consisting of 50 decimal digits that are
divided into groups of six digits each, as in

002666-077894-484890-114573-XXXXXX-XXXXXX-XXXXXX-XXXXXX-XX

In this authentic Installation ID we have substituted digits that we
prefer not to disclose by 'X' characters.

If msoobe.exe is invoked more than once, it provides a different
Installation ID each time.

In return, the call-center agent provides a Confirmation ID matching
the given Installation ID. Entering the Confirmation ID completes the
activation process.

Since the Installation ID is the only piece of information revealed
during activation, the above question concerning the information
transmitted during the activation process is equivalent to the
question

'How is the Installation ID generated?'

To find an answer to this question, we trace back each digit of the
Installation ID to its origins.

>>> Check digits

The rightmost digit in each of the groups is a check digit to guard
against simple errors such as the call center agent's mistyping of one
of the digits read to him or her. The value of the check digit is
calculated by adding the other five digits in the group, adding the
digits at even positions a second time, and dividing the sum by
seven. The remainder of the division is the value of the check
digit. In the above example the check digit for the first group (6) is
calculated as follows.

1 | 2 | 3 | 4 | 5 <- position
---+---+---+---+---
0 | 0 | 2 | 6 | 6 <- digits

0 + 0 + 2 + 6 + 6 = 14 (step 1: add all digits)
0 + 6 + 14 = 20 (step 2: add even digits again)

step 3: division
20 / 7 = 2, remainder is 20 - (2 * 7) = 6

=> check digit is 6

Adding the even digits twice is probably intended to guard against the
relatively frequent error of accidentally swapping two digits while
typing, as in 00626 vs. 00266, which yield different check digits.

>>> Decoding

Removing the check digits results in a 41-digit decimal number. A
decimal number of this length roughly corresponds to a 136-bit binary
number. In fact, the 41-digit number is just the decimal encoding of
such a 136-bit multi-precision integer, which is stored in little
endian byte order as a byte array. Hence, the above Installation ID
can also be represented as a sequence of 17 bytes as in

0xXX 0xXX 0xXX 0xXX 0xXX 0xXX 0xXX 0xXX
0x94 0xAA 0x46 0xD6 0x0F 0xBD 0x2C 0xC8
0x00

In this representation of the above Installation ID 'X' characters
again substitute the digits that we prefer not to disclose. The '0x'
prefix denotes hex notation throughout this paper.

>>> Decryption

When decoding arbitrary Installation IDs it can be noticed that the
most significant byte always seems to be 0x00 or 0x01, whereas the
other bytes look random. The reason for this is that the lower 16
bytes of the Installation ID are encrypted, whereas the most
significant byte is kept in plaintext.

The cryptographic algorithm employed to encrypt the Installation ID is
a proprietary four-round Feistel cipher. Since the block of input
bytes passed to a Feistel cipher is divided into two blocks of equal
size, this class of ciphers is typically applied to input blocks
consisting of an even number of bytes - in this case the lower 16 of
the 17 input bytes. The round function of the cipher is the SHA-1
message digest algorithm keyed with a four-byte sequence.

Let + denote the concatenation of two byte sequences, ^ the XOR
operation, L and R the left and right eight-byte input half for one
round, L' and R' the output halves of said round, and First-8() a
function that returns the first eight bytes of an SHA-1 message
digest. Then one round of decryption looks as follows.

L' = R ^ First-8(SHA-1(L + Key))
R' = L

The result of the decryption is 16 bytes of plaintext, which are -
together with the 17th unencrypted byte - from now on interpreted as
four double words in little endian byte order followed by a single
byte as in

name | size | offset
-----+-------------+-------
H1 | double word | 0
H2 | double word | 4
P1 | double word | 8
P2 | double word | 12
P3 | byte | 16

H1 and H2 specify the hardware configuration that the Installation ID
is linked to. P1 and P2 as well as the remaining byte P3 contain the
Product ID associated with the Installation ID.

>>> Product ID

The Product ID consists of five groups of decimal digits, as in

AAAAA-BBB-CCCCCCC-DDEEE

If you search your registry for a value named 'ProductID', you will
discover the ID that applies to your installation. The 'About' window
of Internet Explorer should also yield your Product ID.

>>>> Decoding

The mapping between the Product ID in decimal representation and its
binary encoding in the double words P1 and P2 and the byte P3 is
summarized in the following table.

digits | length | encoding
--------+---------+---------------------------------------
AAAAA | 17 bits | bit 0 to bit 16 of P1
BBB | 10 bits | bit 17 to bit 26 of P1
CCCCCCC | 28 bits | bit 27 to bit 31 of P1 (lower 5 bits)
| | bit 0 to bit 22 of P2 (upper 23 bits)
DDEEE | 17 bits | bit 23 to bit 31 of P2 (lower 9 bits)
| | bit 0 to bit 7 of P3 (upper 8 bits)

The meaning of each of the five groups of digits is documented in the
next table.

digits | meaning
--------+-------------------------------------------------
AAAAA | apparently always 55034 (in Windows XP RC1)
BBB | most significant three digits of Raw Product Key
| (see below)
CCCCCCC | least significant six digits of Raw Product Key
| plus check digit (see below)
DD | index of the public key used to verify the
| Product Key (see below)
EEE | random value

As can be seen, the (Raw) Product Key plays an important role in
generating the Product ID.

>>>> Product Key

The Raw Product Key is buried inside the Product Key that is printed
on the sticker distributed with each Windows XP CD. It consists of
five alphanumeric strings separated by '-' characters, where each
string is composed of five characters, as in

FFFFF-GGGGG-HHHHH-JJJJJ-KKKKK

Each character is one of the following 24 letters and digits:

B C D F G H J K M P Q R T V W X Y 2 3 4 6 7 8 9

Very similar to the decimal encoding of the Installation ID the 25
characters of the Product Key form a base-24 encoding of the binary
representation of the Product Key. Decoding the Product Key yields a
multi-precision integer of roughly 115 bits, which is stored - again
in little endian byte order - in an array of 15 bytes. Decoding the
above Product Key results in the following byte sequence.

0x6F 0xFA 0x95 0x45 0xFC 0x75 0xB5 0x52
0xBB 0xEF 0xB1 0x17 0xDA 0xCD 0x00

Of these 15 bytes the least significant four bytes contain the Raw
Product Key in little endian byte order. The least significant bit is
removed by shifting this 32-bit value (0x4595FA6F - remember the
little endian byte order) to the left by one bit position, resulting
in a Raw Product Key of 0x22CAFD37, or

583728439

in decimal notation.

The eleven remaining bytes form a digital signature, allowing
verification of the authenticity of the Product Key by means of a
hard-coded public key.

>>>> Product Key -> Product ID

The three most significant digits, i.e. 583, of the Raw Product Key's
nine-digit decimal representation directly map to the BBB component of
the Product ID described above.

To obtain the CCCCCCC component, a check digit is appended to the
remaining six digits 728439. The check digit is chosen such that the
sum of all digits - including the check digit - is divisible by
seven. In the given case, the sum of the six digits is

7 + 2 + 8 + 4 + 3 + 9 = 33

which results in a check digit of 2, since

7 + 2 + 8 + 4 + 3 + 9 + 2 = 33 + 2 = 35

which is divisible by seven. The CCCCCCC component of the Product ID
is therefore 7284392.

For verifying a Product Key, more than one public key is available. If
verification with the first public key fails, the second is tried,
etc. The DD component of the Product ID specifies which of the public
keys in this sequence was successfully used to verify the Product Key.

This mechanism might be intended to support several different parties
generating valid Product Keys with different individual private keys.

However, the different private keys might also represent different
versions of a product. A Product Key for the 'professional' release
could then be signed with a different key than a Product Key for the
'server' release. The DD component would then represent the product
version.

Finally, a valid Product ID derived from our example Product Key might
be

55034-583-7284392-00123

which indicates that the first public key (DD = index = 0) matched and
123 was chosen as the random number EEE.

The randomly selected EEE component is the reason for msoobe.exe
presenting a different Installation ID at each invocation. Because of
the applied encryption this small change results in a completely
different Installation ID.

So, the Product ID transmitted during activation will most probably
differ in the last three digits from your Product ID as displayed by
Internet Explorer or as stored in the registry.

>>> Hardware Information

As discussed above, the hardware configuration linked to the
Installation ID is represented by the two double words H1 and H2.

>>>> Bit-fields

For this purpose, the double words are divided into twelve
bit-fields. The relationship between the computer hardware and the
bit-fields is given in the following table.

double word | offset | length | bit-field value based on
------------+--------+--------+----------------------------
H1 | 0 | 10 | volume serial number string
| | | of system volume
H1 | 10 | 10 | network adapter MAC address
| | | string
H1 | 20 | 7 | CD-ROM drive hardware
| | | identification string
H1 | 27 | 5 | graphics adapter hardware
| | | identification string
H2 | 0 | 3 | unused, set to 001
H2 | 3 | 6 | CPU serial number string
H2 | 9 | 7 | harddrive hardware
| | | identification string
H2 | 16 | 5 | SCSI host adapter hardware
| | | identification string
H2 | 21 | 4 | IDE controller hardware
| | | identification string
H2 | 25 | 3 | processor model string
H2 | 28 | 3 | RAM size
H2 | 31 | 1 | 1 = dockable
| | | 0 = not dockable

Bit 31 of H2 specifies, whether the bit-fields represent a notebook
computer that supports a docking station. If docking is possible, the
activation mechanism will be more tolerant with respect to future
hardware modifications. Here, the idea is that plugging a notebook
into its docking station possibly results in changes to its hardware
configuration, e.g. a SCSI host adapter built into the docking station
may become available.

Bits 2 through 0 of H2 are unused and always set to 001.

If the hardware component corresponding to one of the remaining ten
bit-fields is present, the respective bit-field contains a non-zero
value describing the component. A value of zero marks the hardware
component as not present.

All hardware components are identified by a hardware identification
string obtained from the registry. Hashing this string provides the
value for the corresponding bit-field.

>>>> Hashing

The hash result is obtained by feeding the hardware identification
string into the MD5 message digest algorithm and picking the number of
bits required for a bit-field from predetermined locations in the
resulting message digest. Different predetermined locations are used
for different bit-fields. In addition, a hash result of zero is
avoided by calculating

Hash = (Hash % BitFieldMax) + 1

where BitFieldMax is the maximal value that may be stored in the
bit-field in question, e.g. 1023 for a 10-bit bit-field, and 'x % y'
denotes the remainder of the division of x by y. This results in
values between 1 and BitFieldMax. The obtained value is then stored in
the respective bit-field.

>>>> RAM bit-field

The bit-field related to the amount of RAM available to the operating
system is calculated differently. The seven valid values specify the
approximate amount of available RAM as documented in the following
table.

value | amount of RAM available
------+---------------------------
0 | (bit-field unused)
1 | below 32 MB
2 | between 32 MB and 63 MB
3 | between 64 MB and 127 MB
4 | between 128 MB and 255 MB
5 | between 256 MB and 511 MB
6 | between 512 MB and 1023 MB
7 | above 1023 MB

It is important to note that the amount of RAM is retrieved by calling
the GlobalMemoryStatus() function, which reports a few hundred
kilobytes less than the amount of RAM physically installed. So, 128 MB
of RAM would typically be classified as "between 64 MB and 127 MB".

>>>> Real-world example

Let us have a look at a real-world example. On one of our test systems
the hardware information consists of the following eight bytes.

0xC5 0x95 0x12 0xAC 0x01 0x6E 0x2C 0x32

Converting the bytes into H1 and H2, we obtain

H1 = 0xAC1295C5 and H2 = 0x322C6E01

Splitting H1 and H2 yields the next table in which we give the value
of each of the bit-fields and the information from which each value is
derived.

dw & | |
offset | value | derived from
-------+-------+-----------------------------------------------
H1 0 | 0x1C5 | '1234-ABCD'
H1 10 | 0x0A5 | '00C0DF089E44'
H1 20 | 0x37 | 'SCSI\CDROMPLEXTOR_CD-ROM_PX-32TS__1.01'
H1 27 | 0x15 | 'PCI\VEN_102B&DEV_0519&SUBSYS_00000000&REV_01'
H2 0 | 0x1 | (unused, always 0x1)
H2 3 | 0x00 | (CPU serial number not present)
H2 9 | 0x37 | 'SCSI\DISKIBM_____DCAS-34330______S65A'
H2 16 | 0x0C | 'PCI\VEN_9004&DEV_7178&SUBSYS_00000000&REV_03'
H2 21 | 0x1 | 'PCI\VEN_8086&DEV_7111&SUBSYS_00000000&REV_01'
H2 25 | 0x1 | 'GenuineIntel Family 6 Model 3'
H2 28 | 0x3 | (system has 128 MB of RAM)
H2 31 | 0x0 | (system is not dockable)

>>> Using XPDec

XPDec is a utility to be run from the command prompt. It may be
invoked with one of four command line options to carry out one of four
tasks.

>>>> XPDec -i

This option enables you to access the information hidden in an
Installation ID. It decodes the Installation ID, decrypts it, and
displays the values of the hardware bit-fields as well as the Product
ID of your product. Keep in mind that the last three digits of the
Product ID contained in the Installation ID are randomly selected and
differ from the Product ID displayed by Internet Explorer.

The only argument needed for the '-i' option is the Installation ID,
as in

XPDec -i 002666-077894-484890-114573-XXXXXX-XXXXXX-XXXXXX-XXXXXX-XX

>>>> XPDec -p

To help you trace the origin of your Product ID, this option decodes a
Product Key and displays the Raw Product Key as it would be used in a
Product ID.

The only argument needed for the '-p' option is the Product Key, as in

XPDec -p FFFFF-GGGGG-HHHHH-JJJJJ-KKKKK

Note that this option does not verify the digital signature of the
Product Key.

>>>> XPDec -v

This option calculates the hash of a given volume serial number. It
was implemented to illustrate our description of string hashing. First
use '-i' to display the hardware bit-fields. Then use this option to
verify our claims concerning the volume serial number hash.

The only argument needed for the '-v' option is the volume serial
number of your system volume, as in

XPDec -v 1234-ABCD

(The volume serial number is part of the 'dir' command's output.)

>>>> XPDec -m

This option calculates the network adapter bit-field value
corresponding to the given MAC address. Similar to '-v' this option
was implemented as a proof of concept.

The only argument needed for the '-m' option is the MAC address of
your network adapter, as in

XPDec -m 00-C0-DF-08-9E-44

(Use the 'route print' command to obtain the MAC address of your
network adapter.)

>> HARDWARE MODIFICATIONS

When looking at the effects of hardware modifications on an already
activated installation of Windows XP, the file 'wpa.dbl' in the
'system32' directory plays a central role. It is a simple
RC4-encrypted database that stores, among other things like expiration
information and the Confirmation ID of an activated installation,

a) the bit-field values representing the current hardware
configuration,

and

the bit-field values representing the hardware configuration
at the time of product activation.

While a) is automatically updated each time the hardware configuration
is modified in order to reflect the changes, remains fixed. Hence,
can be thought of as a snapshot of the hardware configuration at
the time of product activation.

This snapshot does not exist in the database before product activation
and if we compare the size of 'wpa.dbl' before and after activation,
we will notice an increased file size. This is because the snapshot is
added to the database.

When judging whether re-activation is necessary, the bit-field values
of a) are compared to the bit-field values of , i.e. the current
hardware configuration is compared to the hardware configuration at
the time of activation.

>>> Non-dockable computer

Typically all bit-fields with the exception of the unused field and
the 'dockable' field are compared. If more than three of these ten
bit-fields have changed in a) since product activation, re-activation
is required.

This means, for example, that in our above real-world example, we
could replace the harddrive and the CD-ROM drive and substantially
upgrade our RAM without having to re-activate our Windows XP
installation.

However, if we completely re-installed Windows XP, the information in
would be lost and we would have to re-activate our installation,
even if we had not changed our hardware.

>>> Dockable computer

If bit 31 of H2 indicates that our computer supports a docking
station, however, only seven of the ten bit-fields mentioned above are
compared. The bit-fields corresponding to the SCSI host adapter, the
IDE controller, and the graphics board are omitted. But again, of
these remaining seven bit-fields, only up to three may change without
requiring re-activation.

>> CONCLUSIONS

In this paper we have given a technical overview of Windows Product
Activation as implemented in Windows XP. We have shown what
information the data transmitted during product activation is derived
from and how hardware upgrades affect an already activated
installation.

Looking at the technical details of WPA, we do not think that it is as
problematic as many people have expected. We think so, because WPA is
tolerant with respect to hardware modifications. In addition, it is
likely that more than one hardware component map to a certain value
for a given bit-field. From the above real-world example we know that
the PX-32TS maps to the value 0x37 = 55. But there are probably many
other CD-ROM drives that map to the same value. Hence, it is
impossible to tell from the bit-field value whether it is a PX-32TS
that we are using or one of the other drives that map to the same
value.

In contrast to many critics of Windows Product Activation, we think
that WPA does not prevent typical hardware modifications and,
moreover, respects the user's right to privacy.

>> ABOUT THE AUTHORS

Fully Licensed GmbH is a start-up company focusing on novel approaches
to online software licensing and distribution. Have a look at their
website at

http://www.licenturion.com

for more information.

Their research branch every now and then analyzes licensing solutions
implemented by other companies.

>> COPYRIGHT

Copyright © 2001 Fully Licensed GmbH (www.licenturion.com)
All rights reserved.

You are free to do whatever you want with this paper. However, you
have to supply the URL of its online version

http://www.licenturion.com/xp/

with any work derived from this paper to give credit to its authors.

>>
>> Frequently asked questions and their answers
>> concerning the Fully Licensed WPA paper
>>
>> Fully Licensed GmbH, July 10, 2001
>>

>> 1. Was Microsoft involved in the creation of the paper?

Microsoft was not involved in the creation of the paper in any
way. However, we made a draft version available to Microsoft to give
them a head-start. We consider it to be good etiquette to inform a
vendor of a pending publication related to one his or her products, so
that the vendor is able to prepare an official response.

>> 2. Why should we believe you?

We do not expect you to believe us. That's why we have provided our
complete knowledge about WPA and the XPDec utility. Combine both to
verify our claims.

>> 3. But Thomas Lopatic, one of your managing directors was born in
Unterschleissheim, Germany, which is the town near Munich in
which Microsoft's European headquarters are located.

This is a nice coincidence. It is in a way understandable - and at the
same time highly amusing to us :-) - that this has given rise to
rumors about the whole paper being a cleverly planned Microsoft
conspiracy.

Thomas was actually born in Karlsruhe, Germany. However, he was living
in Unterschleissheim from the 1970s - i.e. long before Microsoft moved
there - until recently, when he moved to Berlin. That's why some
records still list Unterschleissheim as the place where he
lives. Incorrectly interpreting these records led to the rumor that
Thomas was born in Unterschleissheim.

>> 4. Does Microsoft downplay the paper?

No, most definitely not. The paper really IS harmless. It does not
provide any information that would help a pirate circumvent WPA.

>> 5. Why did you release details on Windows Product Activation?

We felt that there is a need for facts in the debate about Windows
Product Activation. Many people suspected that WPA could be abused to
spy on end-users. Our paper, however, shows that insensitive
information is transmitted during product activation. From this, it
can be seen that the facts that we provide really are a necessary
contribution to the ongoing discussion about WPA.

We think that license enforcement mechanisms will be an important part
of the future of software distribution via the Internet. Thus, we do
think that public discussion of technology of this kind must be free
from bias and it must be based on facts and openness.

We hope that the information that we provide positively affects the
current debate. The debate is necessary, but it should be based on
facts and full disclosure of information relevant to the privacy
question.

>> 6. Do you know how to circumvent Windows Product Activation?

No. We provide insight into which information is transmitted to
Microsoft during activation. Our paper is important to help people
understand the impact of WPA on their work and their privacy. We do
not believe that our paper helps in any way to circumvent the license
enforcement provided by WPA.

>> 7. Your paper says that Microsoft will err on the user's side.

What our paper shows is that a) no sensitive information is
transferred to Microsoft and typical hardware upgrades do not
negatively affect an already activated installation of Windows XP.

But, if you either completely re-install Windows XP or modify your
hardware beyond what is tolerated by product activation, you have to
re-activate Windows XP.

The important question now is: How often will Microsoft let you
re-activate? Erring on the user's side would mean that they allow you
to re-activate as often as you like, which seems to be what Microsoft
says they will do.

It is, however, impossible to confirm this policy by means of a
technical analysis.

>> 8. Why doesn't Microsoft know which hardware I use?

Let us consider the case of IDE controllers. In the installation ID
transmitted to Microsoft they are represented by a 4-bit value. The 4
bits are obtained by applying the MD5 message digest algorithm to a
string that uniquely identifies the vendor and model of the IDE
controller, e.g.

'PCI\VEN_8086&DEV_7111&SUBSYS_00000000&REV_01'

and picking 4 bits from fixed locations in the resulting 128-bit
message digest.

With 4 bits, we can represent 16 different values at maximum. However,
there are far more than 16 different models of IDE controllers out
there. So, since there are more models than 4-bit values, the above
hashing procedure must yield the same 4 bits for more than one
model. The more models there are, the more models will map to a given
4-bit value.

In contrast to what Microsoft says, the privacy that WPA provides is
not based on the assumption that it is impossible to invert the
employed message digest algorithm, i.e. MD5. If we used all 128 bits
of the message digest derived from a hardware component's
identification string, this 128-bit value would most probably uniquely
identify the hardware component. If we used 128 bits, each hardware
component on earth would probably map to a different value.

What an attacker would then do is build a list of all hardware
components on this planet and calculate the corresponding 128-bit
values, which are probably all different. Then finding the hardware
component that corresponds to a certain 128-bit value is just a table
lookup away.

Privacy is based on the fact that only a few bits of the resulting
128-bit message digest are considered. Obviously this leads to lots of
collisions, i.e. lots of hardware components mapping to a given
value. If there were 160 different models of IDE controllers, we could
on average expect 160 / 16 = 10 models to map to the same 4-bit value.

Let us, as another example, consider the MAC address of an ethernet
adapter. The discussion is technically not 100% accurate, but it
illustrates the point. The MAC address is a 48-bit value, which means
that it can theoretically be one of 281,474,976,710,656 different
values. However, its 10-bit representation in the Installation ID is
obtained by picking 10 bits from the MD5 hash over an ASCII string
comprised of the 12 hex digits of the 48-bit value. Picking 10 bits
leads to 1,024 different results at maximum.

So, on average, we expect

281,474,976,710,656 / 1,024 = 274,877,906,944

MAC addresses to map to the same 10-bit value. Because of this, nobody
will be able to obtain the actual MAC address from the 10-bit value,
since there are 274,877,906,944 candidate MAC addresses from which the
10-bit value could have been derived.

It is interesting to see that the bit-field that represents the MAC
address is 10 bits in size, while the bit-field representing the IDE
controller only consists of 4 bits. Microsoft probably have assigned a
longer bit-field to a component if they expect more diversity in the
identification string of this component. The number of different IDE
controller models is smaller by orders of magnitude than the number of
different MAC addresses. So, to produce sufficient collisions, they
decided to use a relatively small bit-field for IDE controllers but
could still afford to chose a 10-bit bit-field in the case of MAC
addresses.

>> 9. What are the implications of re-activating after hardware
changes?

This is an interesting issue which is not covered in our paper. We
simply did not think of it. Our mistake. It was brought to our
attention by an article by Greg Falcon on
www.slashdot.org: If you have to re-activate your installation of
Windows XP because of hardware modifications, your new hardware
configuration is embedded in the Installation ID in the form discussed
above. While this does not enable anyone to find out which components
you have, it is trivial to find out which components you have
changed. Just examine which bit-fields have changed their value since
the original activation.


--------------------------------------------
"Windows XP enlists ten hardware components to calculate the installation
ID, but six of them can be canceled without any problems:

Volume ID ---------- Adapted by means of tool
MAC address -------- Tuned by means of driver
Graphics card -------Switch over to docking station
CPU serial number - Switch off in BIOS
SCSI host adapter -- Switch over to docking station
IDE controller ------- Switch over to docking station

Important: A LAN does not tolerate two computers with the same MAC address.
"
-----------------------------------------
(Switching to 'Docking Station' in Device Manager / Performance / File
System settings doesn't mean you actually have a docking station of any kind
so can be used for non-notebook computers that cannot even USE a docking
station!)

If you want WindowsXP on a network, you're stuck (until someone finds
another route around Activation - juding by the speed of this one, that
won't be long!) But then why would anyone want more than one copy of Windoze
XP on a LAN anyway!
---------------------------------------------
"It is more than sufficient to only once activate a computer with 128 MBytes
of RAM. With its file wpa.dbl you can then "activate" all other computers of
the same memory size." [no matter what other hardware is installed as long
as it's set as a notebook and the volume tag etc is set to match].

"Can Microsoft be tricked that easily? Yes it can! After the next restart of
the computer [after changing to docking station] the analysis of the
installation ID makes clear that suddenly the graphics card and the IDE/SCSI
controller are no longer used to calculate the hardware ID. In computers
that can be docked, XP ignores the identification of the graphics card, the
SCSI host adapter and the IDE controller.

So only three more differences in the configuration of the hardware remain:

Identification of the hard disk
Identification of the CPU
Identification of the CD-ROM drive

Because these three components are allowed to be different without XP
insisting on a new Activation, this should be sufficient. So we copy the
file wpa.dbl into the system32 directory of the second computer and start
Windows XP. In the start menu it still says "Activate Windows". But when you
call it up, you get your just reward though:
"Windows Product Activation: Windows is already activated. Click OK to
exit."

"So first of all Tecchannel saved the file then started changing hardware.
Two items OK, but replacing a third - the CPU - triggered the deletion.
Although you'd think the CPU is only one component, it's actually tallied up
as two. Switching off the CPU serial number in the bios and therefore
knocking it down to one doesn't get the earlier wpa.dbl back - this has been
restored in a non-activated state.

Copy the saved version back? That surely shouldn't work - but it does. Next,
Tecchannel tried a completely new installation using the same product key.
This produces a new product ID, but nevertheless copying the wpa.dbl file
back again works.

They also use this file on another computer, altering the computer's volume
ID first, which is easily enough done. They can also use forged network
cards MAC addresses, so now they've taken two parts of the hardware ID out
of the picture. Next, use the hardware profile to tell the computer it's a
notebook with a docking station. This works, and tells WPA to stop counting
the IDE/SCSI controller and the graphics card.

That gets the differences counted down to three, hard disk, CPU and CDROM
ID, which is within the limit, so WPA is effectively toast.

What does this mean? Tecchannel's investigation shows that, at the very
least, you can use the same wpa.dbl file to activate as many computers as
you like, provided the RAM size is the same. A 'universal' file that didn't
even require the same RAM might be a possibility, but it's more likely that
people will simply swap files to get one appropriate for their hardware. "


Hope it enlights some of us to create a unique keygen just to get the confirmation ID generated after putting the Installation ID on the same.

Enjoy!!

    Blog Archive

    About Me