Friday, May 28, 2021

UP Public Service Commission has issued advertisement for many posts under Medical and Health Department

UP Public Service Commission has issued advertisement for many posts under Medical and Health Department.  Accordingly, recruitment will be done on a total of 3620 posts.  For which the process of online application is going to start from May 28.  Detailed advertisement related to recruitment will be released on the website of the Commission on Friday.  With which the application process will start.

 Description of posts
 The posts to be recruited by the Commission are of grade-2 level and specialization.  These include 
Medical Officer,
 Department of Medical and Health Services, Uttar Pradesh (Allopathy), 
Grade-II (Level-II) Gynecologist, 
Anesthetist, 
Pediatrician,
 Radiologist, 
Pathologist, 
General Surgeon, 
General Physician,
 Offethalmologist, 
Orthopedician, 
ENT Specialist,
 Dermatologist,  

There are 3620 posts of Psychiatrist, Microbiologist, Forensic Specialist, Public Health Specialist. 

 How long will you be able to apply

 The application process for this recruitment to be done under the Department of Medical and Health is to start from May 28.  Interested and eligible candidates can submit the online application fee to the bank by 25 June.  At the same time, candidates will only be able to apply online.  The last date for submission of application is June 28.

 More information related to the post and recruitment process will be available only after the detailed notification is released on Friday.  This will include the details of various types of posts and other information related to recruitment.  Candidates should read the recruitment notification carefully before applying.  Here more information related to the post, qualification and application will be given.  Wrong filled form will not be accepted

Tags. 

uppsc notification,uppsc ro aro 2021 notification,uppsc ro aro notification,uppcs 2021 notification,uppsc 2021 notification,uppsc ro aro 2021 notification in hindi,uppsc notification 2021,uppsc,uppsc ro aro notification 2021,uppcs notification 2021,uppsc latest news,uppsc pcs 2020 notification,uppsc pcs 2021 notification,uppsc 2021 notification out,upsssc pet notification 2021,uppsc ro aro 2020 notification,uppsc news,up pcs 2021 notification,uppsc notification out,uppsc new notification

Thursday, May 27, 2021

Automatic Windows Installation, No keypress required!Automatic Windows Installation, No keypress required!Automatic Windows Installation, No keypress required!Automatic Windows Installation, No keypress required!Automatic Windows Installation, No keypress required!Automatic Windows Installation, No keypress required!Automatic Windows Installation, No keypress required!Automatic Windows Installation, No keypress required!

  An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:


CODE


http://unattended.msfn.org



Make your unattended setup now! An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:


CODE


http://unattended.msfn.org



Make your unattended setup now! An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:


CODE


http://unattended.msfn.org



Make your unattended setup now! An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:


CODE


http://unattended.msfn.org



Make your unattended setup now! An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:


CODE


http://unattended.msfn.org



Make your unattended setup now! An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:


CODE


http://unattended.msfn.org



Make your unattended setup now! An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:


CODE


http://unattended.msfn.org



Make your unattended setup now! An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:


CODE


http://unattended.msfn.org



Make your unattended setup now! An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:


CODE


http://unattended.msfn.org



Make your unattended setup now! An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:


CODE


http://unattended.msfn.org



Make your unattended setup now! An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:


CODE


http://unattended.msfn.org



Make your unattended setup now! An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:


CODE


http://unattended.msfn.org



Make your unattended setup now! An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:


CODE


http://unattended.msfn.org



Make your unattended setup now! An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:


CODE


http://unattended.msfn.org



Make your unattended setup now! An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:


CODE


http://unattended.msfn.org



Make your unattended setup now! An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:


CODE


http://unattended.msfn.org



Make your unattended setup now! An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:


CODE


http://unattended.msfn.org



Make your unattended setup now!

can be used by hackers to exploit your computer or can be forwarded to the market research departments of consumer corporations who by tracking your activities on the internet are better equipped to direct more relevant spam at you. Your best defence against this is to use what is known as a proxy server, which will hide revealing information from the web sites you visit, allowing you to surf the web anonymously. These work by altering the way in which your browser retrieves web pages or connects to remote servers. With a proxy server set up, whenever you 'ask' IE or Netscape to look at a web page, the request is first sent through an external server which is completely independent of your ISP's servers. This third party server then does the requesting on your behalf so that it appears that the request came from them rather than you and your real IP address is never disclosed to the sites you visit. There is nothing to download and the whole process takes less than a minute. There are two different ways to use proxy servers and both have their advantages and disadvantages. The first method is to use a web based service. What this involves is visiting the proxy's home page each time you want to browse a web site anonymously. The core component of such a system is the dialog box where you enter the address of the web site you want to visit. Each time you enter the URL of the site you want to browse via the proxy into this box, your personal information, IP address and so on is first encrypted before being sent to the site allowing you to maintain your anonymity. Two of the best examples of this type of web based proxy service are Code: hxxp://www.rewebber.com/ and hxxp://www.anonymizer.com/. Obviously one disadvantage of using a web based service like Rewebber or Anonymizer, however, is that you have to visit the proxies home page each time you want to surf anonymously. You could choose to select this page as your default home page, but it's still quite awkward if you're forever site hopping at the speed of light. The second main 'con' is that you often have to put up with extra adverts on the pages you visit. These are automatically inserted into the pages by the proxy - they have to pay for service somehow. More sophisticated and convenient solutions are also on offer yet they come with a price tag. The second method you can use to protect your privacy via a proxy server involves adjusting the settings of your web browser so that you can surf anonymously without having to visit the home page of your proxy each time. To do this you will first need to know the name of your proxy server and the port number it uses. This information can be gleaned from either a public proxy server list or the FAQ referring to a private subscription based service. Once you have the name of the proxy server you wish to use, select 'Internet Options' from the 'Tools' menu of your browser. Now select 'Connections' followed by 'Settings' and tick the 'use a proxy server' check box. To finish the job all you have to do now is enter the name of the server in the 'address' box, the port which it uses in the 'port' box and go forth and surf anonymously. Free, manual proxy servers as advertised on anonymity sites, if you can find one at all, are likely to be highly oversubscribed, and as a result the speed at which they retrieve web pages can deteriorate. In which case you can go in pursuit of a public proxy server list and select an alternative from it, which can then be set up manually. To locate such a list you can investigate sites such as Code: hxxp://www.proxys4all.com/ however, this method isn't problem free either, so before you get too carried away and go jumping on the anonymity bandwagon there are a few things you should be aware of. It's very easy to use proxies to protect your privacy, but often the disadvantages of using them far out weigh the benefits. You see, the problem is that, like the proxy servers provided Rewebber et al, free, public proxies are nearly all over subscribed and so they can slow down web browsing considerably. Digging out fast reliable proxy servers is an art form in itself and is a skill which takes considerable practice. You could find a list of public proxy servers and then experiment with each one until you find one that runs at a reasonable speed, but this can be very time consuming and frustrating. Instead, your search would be much more efficient if you got a dedicated program to carry out this task for you. There are literally dozens of proxy seeking programs around which can do just that, and many of them are available as freeware. What these do is scan the internet for public proxy servers. These servers are then tested for speed and anonymity (not all of them are truly anonymous, even if they claim to be!) and once you find one which suits your requirements you can select it as your default proxy with the click of a button. One of the most significant advantages of using an automated tool to locate proxy servers is that you do not have to keep editing your proxy settings manually each time you wish to try out a new one. Instead, what you do is enter 'localhost' or '127.0.0.1' into the 'address' box and '8088' into the 'port' box of your browser's proxy settings menu and then forget about it. All future proxy switching is then orchestrated from within your proxy seeking software, which subsequently relays the information to your browser or whatever type of application you are attempting to make anonymous. For those of you who are curious 'localhost' and the IP address '127.0.0.1' are the names by which every computer on the internet refers to itself. Here's a good selection of links, which should help you to get started - Code: hxxp://www.a4proxy.com/ Anonymity 4 Proxy hxxp://www.helgasoft.com/hiproxy/ Hi Proxy hxxp://www.proxy-verifier.com/ Proxy Verifier hxxp://www.photono-software.de/ Stealther. You may find that even when using these programs you have difficulty finding good proxy servers. It is for this reason that many people choose only to use proxy servers temporarily whilst doing something which may land them in trouble with their ISP, or in a worst case scenario with the law. The most obvious example of a situation in which you would want to cover your tracks is when scanning for public FTP servers and subsequently uploading to them. Most other net activities are unlikely to incur serious consequences so under these circumstances you can safely surf the web without a proxy. If you're really serious about protecting your privacy, however, your best bet is probably to invest in a dedicated, stable proxy such as the ones offered by Code: hxxp://www.ultimate-anonymity.com/ Ultimate Anonymity These aren't free, but may be worth the expense if you aren't keen on continuously switching proxy servers. Before splashing out though it may be worth checking if your current ISP has a proxy server of its own which you can use. These aren't there to help you to commit cyber crimes and get away with it, they actually have a legitimate purpose as well - otherwise they wouldn't exist. You see, proxy servers were originally designed to help speed up web page loading times. Proxy servers contain a cache of all the web pages which have been requested via the browsers of the people using the proxy. When someone surfs the web using a proxy, the proxy first checks to see if it already has a copy of the web page stored in its cache. If this version of the page is bang up to date, it is sent to your computer and appears in your browser. If the page found in the cache of the proxy server is older than the one stored on the server hosting the page, a new request to the web server is made and the page is updated in the cache of the proxy before being sent to you. Because these servers use very fast internet connections they can retrieve web pages at much greater speeds than you can via your modest home setup. If these servers are located physically nearer to your home than the web host servers you wish to retrieve web pages from, the speed at which you browse the web will be accelerated. Anonymity - Cookies One last important point you need to be aware of before jumping in with both feet is that different programs have to be setup in different ways before being able to make external connections via a proxy server. For example, you can surf the web anonymously by modifying the settings in Internet Explorer or Netscape Navigator as explained earlier in this tutorial, but this will only affect your browser. If you then used Flash FXP to copy a batch of 0-day releases from one FTP server to another, this isn't going to protect you in the slightest. What you have to do is enter the name of the proxy server into each application you wish to make anonymous before making any external connections. This can usually be done by browsing through the preferences of your program to see if there is a 'use proxy server' option available. If there is, make sure you use it! Cookies: You have little to fear from the edible variety, but the digital ones can be a major threat to your security and privacy. A cookie is a tiny text file (usually less than 1kb in size), which is created and stored on your hard drive whenever you visit a dynamic (or an interactive if you like) web site. These are used to log your personal details so that you can access members only areas of web sites without having to type in a password every time, or to retain your customised settings so that they are available the next time you visit. If you're using a shared computer, anyone who visits the same site that you have previously logged in to can access your accounts. This is particularly worrying if you have entered your credit card details into a form on an e-commerce site. If your browser is set to automatically fill in these details whenever you return to a previously visited site, this information could be clearly visible - you don't need me to explain the problems this could entail. The solution to this problem is to delete any cookies which contain sensitive data once you have completed your transactions. Your cookies will be stored in a different place depending

 Anonymity


I can see you hiding in the shadows over there and so can the logs of all the web sites, FTP servers and other nooks and crannies you visit on the web. The sort of information gathered by these logs and which is available to the webmasters of the sites you visit include the address of the previous site you visited, your IP address, your computer's ID name, your physical location and the name of your ISP along with less personal details such as the operating system you're using and your screen resolution. If someone was snooping through your dustbin to gather information on consumer trends or tracking your every move to see where it is you go everyday you wouldn't be too chuffed would you. Well the web is no different, it's still an invasion of privacy and a threat to security and you don't have to put up with it.


Proxy servers:

Every time you visit a web site, detailed information about your system is automatically provided to the webmaster. This information can be used by hackers to exploit your computer or can be forwarded to the market research departments of consumer corporations who by tracking your activities on the internet are better equipped to direct more relevant spam at you. Your best defence against this is to use what is known as a proxy server, which will hide revealing information from the web sites you visit, allowing you to surf the web anonymously. These work by altering the way in which your browser retrieves web pages or connects to remote servers. With a proxy server set up, whenever you 'ask' IE or Netscape to look at a web page, the request is first sent through an external server which is completely independent of your ISP's servers. This third party server then does the requesting on your behalf so that it appears that the request came from them rather than you and your real IP address is never disclosed to the sites you visit. There is nothing to download and the whole process takes less than a minute.


There are two different ways to use proxy servers and both have their advantages and disadvantages. The first method is to use a web based service. What this involves is visiting the proxy's home page each time you want to browse a web site anonymously. The core component of such a system is the dialog box where you enter the address of the web site you want to visit. Each time you enter the URL of the site you want to browse via the proxy into this box, your personal information, IP address and so on is first encrypted before being sent to the site allowing you to maintain your anonymity. Two of the best examples of this type of web based proxy service are Code:

hxxp://www.rewebber.com/

and hxxp://www.anonymizer.com/.


Obviously one disadvantage of using a web based service like Rewebber or Anonymizer, however, is that you have to visit the proxies home page each time you want to surf anonymously. You could choose to select this page as your default home page, but it's still quite awkward if you're forever site hopping at the speed of light. The second main 'con' is that you often have to put up with extra adverts on the pages you visit. These are automatically inserted into the pages by the proxy - they have to pay for service somehow. More sophisticated and convenient solutions are also on offer yet they come with a price tag.


The second method you can use to protect your privacy via a proxy server involves adjusting the settings of your web browser so that you can surf anonymously without having to visit the home page of your proxy each time. To do this you will first need to know the name of your proxy server and the port number it uses. This information can be gleaned from either a public proxy server list or the FAQ referring to a private subscription based service. Once you have the name of the proxy server you wish to use, select 'Internet Options' from the 'Tools' menu of your browser. Now select 'Connections' followed by 'Settings' and tick the 'use a proxy server' check box. To finish the job all you have to do now is enter the name of the server in the 'address' box, the port which it uses in the 'port' box and go forth and surf anonymously.


Free, manual proxy servers as advertised on anonymity sites, if you can find one at all, are likely to be highly oversubscribed, and as a result the speed at which they retrieve web pages can deteriorate. In which case you can go in pursuit of a public proxy server list and select an alternative from it, which can then be set up manually. To locate such a list you can investigate sites such as Code:

hxxp://www.proxys4all.com/


however, this method isn't problem free either, so before you get too carried away and go jumping on the anonymity bandwagon there are a few things you should be aware of. It's very easy to use proxies to protect your privacy, but often the disadvantages of using them far out weigh the benefits. You see, the problem is that, like the proxy servers provided Rewebber et al, free, public proxies are nearly all over subscribed and so they can slow down web browsing considerably. Digging out fast reliable proxy servers is an art form in itself and is a skill which takes considerable practice. You could find a list of public proxy servers and then experiment with each one until you find one that runs at a reasonable speed, but this can be very time consuming and frustrating. Instead, your search would be much more efficient if you got a dedicated program to carry out this task for you. There are literally dozens of proxy seeking programs around which can do just that, and many of them are available as freeware. What these do is scan the internet for public proxy servers. These servers are then tested for speed and anonymity (not all of them are truly anonymous, even if they claim to be!) and once you find one which suits your requirements you can select it as your default proxy with the click of a button.


One of the most significant advantages of using an automated tool to locate proxy servers is that you do not have to keep editing your proxy settings manually each time you wish to try out a new one. Instead, what you do is enter 'localhost' or '127.0.0.1' into the 'address' box and '8088' into the 'port' box of your browser's proxy settings menu and then forget about it. All future proxy switching is then orchestrated from within your proxy seeking software, which subsequently relays the information to your browser or whatever type of application you are attempting to make anonymous. For those of you who are curious 'localhost' and the IP address '127.0.0.1' are the names by which every computer on the internet refers to itself.

Here's a good selection of links, which should help you to get started - Code:

hxxp://www.a4proxy.com/ Anonymity 4 Proxy

hxxp://www.helgasoft.com/hiproxy/ Hi Proxy

hxxp://www.proxy-verifier.com/ Proxy Verifier

hxxp://www.photono-software.de/ Stealther.


You may find that even when using these programs you have difficulty finding good proxy servers. It is for this reason that many people choose only to use proxy servers temporarily whilst doing something which may land them in trouble with their ISP, or in a worst case scenario with the law. The most obvious example of a situation in which you would want to cover your tracks is when scanning for public FTP servers and subsequently uploading to them. Most other net activities are unlikely to incur serious consequences so under these circumstances you can safely surf the web without a proxy. If you're really serious about protecting your privacy, however, your best bet is probably to invest in a dedicated, stable proxy such as the ones offered by Code:

hxxp://www.ultimate-anonymity.com/ Ultimate Anonymity



These aren't free, but may be worth the expense if you aren't keen on continuously switching proxy servers.


Before splashing out though it may be worth checking if your current ISP has a proxy server of its own which you can use. These aren't there to help you to commit cyber crimes and get away with it, they actually have a legitimate purpose as well - otherwise they wouldn't exist. You see, proxy servers were originally designed to help speed up web page loading times. Proxy servers contain a cache of all the web pages which have been requested via the browsers of the people using the proxy. When someone surfs the web using a proxy, the proxy first checks to see if it already has a copy of the web page stored in its cache. If this version of the page is bang up to date, it is sent to your computer and appears in your browser. If the page found in the cache of the proxy server is older than the one stored on the server hosting the page, a new request to the web server is made and the page is updated in the cache of the proxy before being sent to you. Because these servers use very fast internet connections they can retrieve web pages at much greater speeds than you can via your modest home setup. If these servers are located physically nearer to your home than the web host servers you wish to retrieve web pages from, the speed at which you browse the web will be accelerated.



Anonymity - Cookies

One last important point you need to be aware of before jumping in with both feet is that different programs have to be setup in different ways before being able to make external connections via a proxy server. For example, you can surf the web anonymously by modifying the settings in Internet Explorer or Netscape Navigator as explained earlier in this tutorial, but this will only affect your browser. If you then used Flash FXP to copy a batch of 0-day releases from one FTP server to another, this isn't going to protect you in the slightest. What you have to do is enter the name of the proxy server into each application you wish to make anonymous before making any external connections. This can usually be done by browsing through the preferences of your program to see if there is a 'use proxy server' option available. If there is, make sure you use it!



Cookies:

You have little to fear from the edible variety, but the digital ones can be a major threat to your security and privacy. A cookie is a tiny text file (usually less than 1kb in size), which is created and stored on your hard drive whenever you visit a dynamic (or an interactive if you like) web site. These are used to log your personal details so that you can access members only areas of web sites without having to type in a password every time, or to retain your customised settings so that they are available the next time you visit. If you're using a shared computer, anyone who visits the same site that you have previously logged in to can access your accounts. This is particularly worrying if you have entered your credit card details into a form on an e-commerce site. If your browser is set to automatically fill in these details whenever you

return to a previously visited site, this information could be clearly visible - you don't need me to explain the problems this could entail.


The solution to this problem is to delete any cookies which contain sensitive data once you have completed your transactions. Your cookies will be stored in a different place depending on which operating system you are using so you will have to use your detective skills to find them. As an example, in Windows XP they are located in your 'c:\Documents and Settings\Kylie Minogue\Cookies' directory (that is if your name is Kylie Minogue. Mine isn't in case you're wondering!). If you look in this directory, in some cases it is easy to identify which cookie is associated with which web site, but in other cases it's not so obvious. The cookie which was created when you visited Yahoo.com to check your email may be called kylie minogue@yahoo.txt for example. Unfortunately some cookies refer to the IP address of the site you visited and so look more like kylie minogue@145.147.25.21. These cookies can be selectively deleted one at a time if it's obvious which ones are causing a threat to your security, or you can just wipe out the whole lot in one fell swoop and have them recreated as and when they are required. However, if

you're really struggling to find your cookie jar, you could delete your cookies via your browser's tool bar instead. In Internet Explorer this can be done through the 'Tools' > 'Internet Options' menu items.


If all this sounds like too much hassle, you can always find a labour saving program which will be happy to take the job off your hands. These 'cookie crunching' programs allow you to be more selective when editing, viewing and deleting cookies from your system, and some of them will even prevent cookies from being created in the first place. Yes, I know you're hungry for links so I won't deprive you. Have a look here - Code:

hxxp://www.rbaworld.com/Programs/CookieCruncher/ Cookie

Cruncher

hxxp://www.thelimitsoft.com/ Cookie Crusher

hxxp://www.angove.com/ Cookie Killer

hxxp://www.kburra.com/ Cookie Pal

and

hxxp://www.cookiecentral.com/ Cookie Web Kit.

Automatic Windows Installation, No keypress required!

 An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:

CODE

http://unattended.msfn.org


Make your unattended setup now!

Auto End Tasks to Enable a Proper Shutdown

  Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

 Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.



QUOTE

Windows Registry Editor Version 5.00


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]

"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]

"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]

"WaitToKillServiceTimeout"="1000"



2. Save the file as shutdown.reg

3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.


anti leech hacking tutorial

I was just asking to know if there is some audiance before

here is my methode

for hacking anti leech

we gona use a soft calde proxo mitron

proxomitron is an anti bull script web proxy it' works buy applying some rules to elliuminte pop up and many other thing but for our cas we need to desactive all this filtring first goto

w-w.proxomitron.info

download a copy of the soft

then you need to unselect all the option of the soft

and clik on log window

no go to a anti leech web site

use the plug in and not netpumper

in the plugin

add a proxy

you must put this proxy adress

127.0.0.1 8080 for http

the same for ftp

now select the file to download a click download

watch in proximitron log winodws you will see many internal forwarding

if the file are located in a ftp server

proximitron dont handel them

and you will find an error

in a ftp adress

if it's a http adress

you will find some thing like

get /blablalma/bla/file

site tr.com

and you have foudn the adress

it' tr.com/blabla/fileI was just asking to know if there is some audiance before

here is my methode

for hacking anti leech

we gona use a soft calde proxo mitron

proxomitron is an anti bull script web proxy it' works buy applying some rules to elliuminte pop up and many other thing but for our cas we need to desactive all this filtring first goto

w-w.proxomitron.info

download a copy of the soft

then you need to unselect all the option of the soft

and clik on log window

no go to a anti leech web site

use the plug in and not netpumper

in the plugin

add a proxy

you must put this proxy adress

127.0.0.1 8080 for http

the same for ftp

now select the file to download a click download

watch in proximitron log winodws you will see many internal forwarding

if the file are located in a ftp server

proximitron dont handel them

and you will find an error

in a ftp adress

if it's a http adress

you will find some thing like

get /blablalma/bla/file

site tr.com

and you have foudn the adress

it' tr.com/blabla/file 

Anonymity

 Anonymity


I can see you hiding in the shadows over there and so can the logs of all the web sites, FTP servers and other nooks and crannies you visit on the web. The sort of information gathered by these logs and which is available to the webmasters of the sites you visit include the address of the previous site you visited, your IP address, your computer's ID name, your physical location and the name of your ISP along with less personal details such as the operating system you're using and your screen resolution. If someone was snooping through your dustbin to gather information on consumer trends or tracking your every move to see where it is you go everyday you wouldn't be too chuffed would you. Well the web is no different, it's still an invasion of privacy and a threat to security and you don't have to put up with it.


Proxy servers:

Every time you visit a web site, detailed information about your system is automatically provided to the webmaster. This information can be used by hackers to exploit your computer or can be forwarded to the market research departments of consumer corporations who by tracking your activities on the internet are better equipped to direct more relevant spam at you. Your best defence against this is to use what is known as a proxy server, which will hide revealing information from the web sites you visit, allowing you to surf the web anonymously. These work by altering the way in which your browser retrieves web pages or connects to remote servers. With a proxy server set up, whenever you 'ask' IE or Netscape to look at a web page, the request is first sent through an external server which is completely independent of your ISP's servers. This third party server then does the requesting on your behalf so that it appears that the request came from them rather than you and your real IP address is never disclosed to the sites you visit. There is nothing to download and the whole process takes less than a minute.


There are two different ways to use proxy servers and both have their advantages and disadvantages. The first method is to use a web based service. What this involves is visiting the proxy's home page each time you want to browse a web site anonymously. The core component of such a system is the dialog box where you enter the address of the web site you want to visit. Each time you enter the URL of the site you want to browse via the proxy into this box, your personal information, IP address and so on is first encrypted before being sent to the site allowing you to maintain your anonymity. Two of the best examples of this type of web based proxy service are Code:

hxxp://www.rewebber.com/

and hxxp://www.anonymizer.com/.


Obviously one disadvantage of using a web based service like Rewebber or Anonymizer, however, is that you have to visit the proxies home page each time you want to surf anonymously. You could choose to select this page as your default home page, but it's still quite awkward if you're forever site hopping at the speed of light. The second main 'con' is that you often have to put up with extra adverts on the pages you visit. These are automatically inserted into the pages by the proxy - they have to pay for service somehow. More sophisticated and convenient solutions are also on offer yet they come with a price tag.


The second method you can use to protect your privacy via a proxy server involves adjusting the settings of your web browser so that you can surf anonymously without having to visit the home page of your proxy each time. To do this you will first need to know the name of your proxy server and the port number it uses. This information can be gleaned from either a public proxy server list or the FAQ referring to a private subscription based service. Once you have the name of the proxy server you wish to use, select 'Internet Options' from the 'Tools' menu of your browser. Now select 'Connections' followed by 'Settings' and tick the 'use a proxy server' check box. To finish the job all you have to do now is enter the name of the server in the 'address' box, the port which it uses in the 'port' box and go forth and surf anonymously.


Free, manual proxy servers as advertised on anonymity sites, if you can find one at all, are likely to be highly oversubscribed, and as a result the speed at which they retrieve web pages can deteriorate. In which case you can go in pursuit of a public proxy server list and select an alternative from it, which can then be set up manually. To locate such a list you can investigate sites such as Code:

hxxp://www.proxys4all.com/


however, this method isn't problem free either, so before you get too carried away and go jumping on the anonymity bandwagon there are a few things you should be aware of. It's very easy to use proxies to protect your privacy, but often the disadvantages of using them far out weigh the benefits. You see, the problem is that, like the proxy servers provided Rewebber et al, free, public proxies are nearly all over subscribed and so they can slow down web browsing considerably. Digging out fast reliable proxy servers is an art form in itself and is a skill which takes considerable practice. You could find a list of public proxy servers and then experiment with each one until you find one that runs at a reasonable speed, but this can be very time consuming and frustrating. Instead, your search would be much more efficient if you got a dedicated program to carry out this task for you. There are literally dozens of proxy seeking programs around which can do just that, and many of them are available as freeware. What these do is scan the internet for public proxy servers. These servers are then tested for speed and anonymity (not all of them are truly anonymous, even if they claim to be!) and once you find one which suits your requirements you can select it as your default proxy with the click of a button.


One of the most significant advantages of using an automated tool to locate proxy servers is that you do not have to keep editing your proxy settings manually each time you wish to try out a new one. Instead, what you do is enter 'localhost' or '127.0.0.1' into the 'address' box and '8088' into the 'port' box of your browser's proxy settings menu and then forget about it. All future proxy switching is then orchestrated from within your proxy seeking software, which subsequently relays the information to your browser or whatever type of application you are attempting to make anonymous. For those of you who are curious 'localhost' and the IP address '127.0.0.1' are the names by which every computer on the internet refers to itself.

Here's a good selection of links, which should help you to get started - Code:

hxxp://www.a4proxy.com/ Anonymity 4 Proxy

hxxp://www.helgasoft.com/hiproxy/ Hi Proxy

hxxp://www.proxy-verifier.com/ Proxy Verifier

hxxp://www.photono-software.de/ Stealther.


You may find that even when using these programs you have difficulty finding good proxy servers. It is for this reason that many people choose only to use proxy servers temporarily whilst doing something which may land them in trouble with their ISP, or in a worst case scenario with the law. The most obvious example of a situation in which you would want to cover your tracks is when scanning for public FTP servers and subsequently uploading to them. Most other net activities are unlikely to incur serious consequences so under these circumstances you can safely surf the web without a proxy. If you're really serious about protecting your privacy, however, your best bet is probably to invest in a dedicated, stable proxy such as the ones offered by Code:

hxxp://www.ultimate-anonymity.com/ Ultimate Anonymity



These aren't free, but may be worth the expense if you aren't keen on continuously switching proxy servers.


Before splashing out though it may be worth checking if your current ISP has a proxy server of its own which you can use. These aren't there to help you to commit cyber crimes and get away with it, they actually have a legitimate purpose as well - otherwise they wouldn't exist. You see, proxy servers were originally designed to help speed up web page loading times. Proxy servers contain a cache of all the web pages which have been requested via the browsers of the people using the proxy. When someone surfs the web using a proxy, the proxy first checks to see if it already has a copy of the web page stored in its cache. If this version of the page is bang up to date, it is sent to your computer and appears in your browser. If the page found in the cache of the proxy server is older than the one stored on the server hosting the page, a new request to the web server is made and the page is updated in the cache of the proxy before being sent to you. Because these servers use very fast internet connections they can retrieve web pages at much greater speeds than you can via your modest home setup. If these servers are located physically nearer to your home than the web host servers you wish to retrieve web pages from, the speed at which you browse the web will be accelerated.



Anonymity - Cookies

One last important point you need to be aware of before jumping in with both feet is that different programs have to be setup in different ways before being able to make external connections via a proxy server. For example, you can surf the web anonymously by modifying the settings in Internet Explorer or Netscape Navigator as explained earlier in this tutorial, but this will only affect your browser. If you then used Flash FXP to copy a batch of 0-day releases from one FTP server to another, this isn't going to protect you in the slightest. What you have to do is enter the name of the proxy server into each application you wish to make anonymous before making any external connections. This can usually be done by browsing through the preferences of your program to see if there is a 'use proxy server' option available. If there is, make sure you use it!



Cookies:

You have little to fear from the edible variety, but the digital ones can be a major threat to your security and privacy. A cookie is a tiny text file (usually less than 1kb in size), which is created and stored on your hard drive whenever you visit a dynamic (or an interactive if you like) web site. These are used to log your personal details so that you can access members only areas of web sites without having to type in a password every time, or to retain your customised settings so that they are available the next time you visit. If you're using a shared computer, anyone who visits the same site that you have previously logged in to can access your accounts. This is particularly worrying if you have entered your credit card details into a form on an e-commerce site. If your browser is set to automatically fill in these details whenever you

return to a previously visited site, this information could be clearly visible - you don't need me to explain the problems this could entail.


The solution to this problem is to delete any cookies which contain sensitive data once you have completed your transactions. Your cookies will be stored in a different place depending on which operating system you are using so you will have to use your detective skills to find them. As an example, in Windows XP they are located in your 'c:\Documents and Settings\Kylie Minogue\Cookies' directory (that is if your name is Kylie Minogue. Mine isn't in case you're wondering!). If you look in this directory, in some cases it is easy to identify which cookie is associated with which web site, but in other cases it's not so obvious. The cookie which was created when you visited Yahoo.com to check your email may be called kylie minogue@yahoo.txt for example. Unfortunately some cookies refer to the IP address of the site you visited and so look more like kylie minogue@145.147.25.21. These cookies can be selectively deleted one at a time if it's obvious which ones are causing a threat to your security, or you can just wipe out the whole lot in one fell swoop and have them recreated as and when they are required. However, if

you're really struggling to find your cookie jar, you could delete your cookies via your browser's tool bar instead. In Internet Explorer this can be done through the 'Tools' > 'Internet Options' menu items.


If all this sounds like too much hassle, you can always find a labour saving program which will be happy to take the job off your hands. These 'cookie crunching' programs allow you to be more selective when editing, viewing and deleting cookies from your system, and some of them will even prevent cookies from being created in the first place. Yes, I know you're hungry for links so I won't deprive you. Have a look here - Code:

hxxp://www.rbaworld.com/Programs/CookieCruncher/ Cookie

Cruncher

hxxp://www.thelimitsoft.com/ Cookie Crusher

hxxp://www.angove.com/ Cookie Killer

hxxp://www.kburra.com/ Cookie Pal

and

hxxp://www.cookiecentral.com/ Cookie Web Kit.

Anonymity of Proxy

 Anonymity of Proxy


The exchange of information in Internet is made by the "client - server" model. A client sends a request (what files he needs) and a server sends a reply (required files). For close cooperation (full understanding) between a client and a server the client sends additional information about itself: a version and a name of an operating system, configuration of a browser (including its name and version) etc. This information can be necessary for the server in order to know which web-page should be given (open) to the client. There are different variants of web-pages for different configurations of browsers. However, as long as web-pages do not usually depend on browsers, it makes sense to hide this information from the web-server.


What your browser transmits to a web-server:

a name and a version of an operating system

a name and a version of a browser

configuration of a browser (display resolution, color depth, java / javascript support, ...)

IP-address of a client

Other information


The most important part of such information (and absolutely needless for a web-server) is information about IP-address. Using your IP it is possible to know about you the following:

a country where you are from

a city

your provider?s name and e-mail

your physical address


Information, transmitted by a client to a server is available (accessible) for a server as environment variables. Every information unit is a value of some variable. If any information unit is not transmitted, then corresponding variable will be empty (its value will be undetermined).


These are some environment variables:


REMOTE_ADDR ? IP address of a client


HTTP_VIA ? if it is not empty, then a proxy is used. Value is an address (or several addresses) of a proxy server, this variable is added by a proxy server itself if you use one.


HTTP_X_FORWARDED_FOR ? if it is not empty, then a proxy is used. Value is a real IP address of a client (your IP), this variable is also added by a proxy server if you use one.


HTTP_ACCEPT_LANGUAGE ? what language is used in browser (what language a page should be displayed in)


HTTP_USER_AGENT ? so called "a user?s agent". For all browsers this is Mozilla. Furthermore, browser?s name and version (e.g. MSIE 5.5) and an operating system (e.g. Windows 98) is also mentioned here.


HTTP_HOST ? is a web server?s name


This is a small part of environment variables. In fact there are much more of them (DOCUMENT_ROOT, HTTP_ACCEPT_ENCODING, HTTP_CACHE_CONTROL, HTTP_CONNECTION, SERVER_ADDR, SERVER_SOFTWARE, SERVER_PROTOCOL, ...). Their quantity can depend on settings of both a server and a client.


These are examples of variable values:


REMOTE_ADDR = 194.85.1.1

HTTP_ACCEPT_LANGUAGE = ru

HTTP_USER_AGENT = Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)

HTTP_HOST = www.webserver.ru

HTTP_VIA = 194.85.1.1 (Squid/2.4.STABLE7)

HTTP_X_FORWARDED_FOR = 194.115.5.5


Anonymity at work in Internet is determined by what environment variables "hide" from a web-server.


If a proxy server is not used, then environment variables look in the following way:


REMOTE_ADDR = your IP

HTTP_VIA = not determined

HTTP_X_FORWARDED_FOR = not determined


According to how environment variables "hided" by proxy servers, there are several types of proxies

Transparent Proxies


They do not hide information about your IP address:


REMOTE_ADDR = proxy IP

HTTP_VIA = proxy IP

HTTP_X_FORWARDED_FOR = your IP


The function of such proxy servers is not the improvement of your anonymity in Internet. Their purpose is information cashing, organization of joint access to Internet of several computers, etc.

Anonymous Proxies


All proxy servers, that hide a client?s IP address in any way are called anonymous proxies


Simple Anonymous Proxies


These proxy servers do not hide a fact that a proxy is used, however they replace your IP with its own:

REMOTE_ADDR = proxy IP

HTTP_VIA = proxy IP

HTTP_X_FORWARDED_FOR = proxy IP


These proxies are the most widespread among other anonymous proxy servers.


Distorting Proxies


As well as simple anonymous proxy servers these proxies do not hide the fact that a proxy server is used. However a client?s IP address (your IP address) is replaced with another (arbitrary, random) IP:


REMOTE_ADDR = proxy IP

HTTP_VIA = proxy IP

HTTP_X_FORWARDED_FOR = random IP address

High Anonymity Proxies


These proxy servers are also called "high anonymity proxy". In contrast to other types of anonymity proxy servers they hide a fact of using a proxy:


REMOTE_ADDR = proxy IP

HTTP_VIA = not determined

HTTP_X_FORWARDED_FOR = not determined


That means that values of variables are the same as if proxy is not used, with the exception of one very important thing ? proxy IP is used instead of your IP address.

Summary


Depending on purposes there are transparent and anonymity proxies. However, remember, using proxy servers you hide only your IP from a web-server, but other information (about browser configuration) is accessible!


All mIRC Commands

  All mIRC Commands


/ Recalls the previous command entered in the current window.

/! Recalls the last command typed in any window.

/action {action text} Sends the specifed action to the active channel or query window.

/add [-apuce] {filename.ini} Loads aliases, popups, users, commands, and events.

/ame {action text} Sends the specifed action to all channels which you are currently on.

/amsg {text} Sends the specifed message to all channels which you are currently on.

/auser {level} {nick|address} Adds a user with the specified access level to the remote users

list.

/auto [on|off|nickname|address] Toggles auto-opping of a nick or address or sets it on or off

totally.

/away {away message} Sets you away leave a message explaining that you are not currently paying

attention to IRC.

/away Sets you being back.

/ban [#channel] {nickname} [type] Bans the specified nick from the curent or given channel.

/beep {number} {delay} Locally beeps 'number' times with 'delay' in between the beeps. /channel

Pops up the channel central window (only works in a channel).

/clear Clears the entire scrollback buffer of the current window.

/ctcp {nickname} {ping|finger|version|time|userinfo|clientinfo} Does the given ctcp request on

nickname.

/closemsg {nickname} Closes the query window you have open to the specified nick.

/creq [ask | auto | ignore] Sets your DCC 'On Chat request' settings in DCC/Options.

/dcc send {nickname} {file1} {file2} {file3} ... {fileN} Sends the specified files to nick.

/dcc chat {nickname} Opens a dcc window and sends a dcc chat request to nickname.

/describe {#channel} {action text} Sends the specifed action to the specified channel window.

/dde [-r] {service} {topic} {item} [data] Allows DDE control between mIRC and other

applications.

/ddeserver [on [service name] | off] To turn on the DDE server mode, eventually with a given

service name.

/disable {#groupname} De-activates a group of commands or events.

/disconnect Forces a hard and immediate disconnect from your IRC server. Use it with care.

/dlevel {level} Changes the default user level in the remote section.

/dns {nickname | IP address | IP name} Uses your providers DNS to resolve an IP address.

/echo [nickname|#channel|status] {text} Displays the given text only to YOU on the given place

in color N.

/enable {#groupname} Activates a group of commands or events.

/events [on|off] Shows the remote events status or sets it to listening or not.

/exit Forces mIRC to closedown and exit.

/finger Does a finger on a users address.

/flood [{numberoflines} {seconds} {pausetime}] Sets a crude flood control method.

/fsend [on|off] Shows fsends status and allows you to turn dcc fast send on or off.

/fserve {nickname} {maxgets} {homedirectory} [welcome text file] Opens a fileserver.

/guser {level} {nick} [type] Adds the user to the user list with the specified level and

address type.

/help {keyword} Brings up the Basic IRC Commands section in the mIRC help file.

/ignore [on|off|nickname|address] Toggles ignoring of a nick or address or sets it on or off

totally.

/invite {nickname} {#channel} Invites another user to a channel.

/join {#channel} Makes you join the specified channel.

/kick {#channel} {nickname} Kicks nickname off a given channel.

/list [#string] [-min #] [-max #] Lists all currently available channels, evt. filtering for

parameters.

/log [on|off] Shows the logging status or sets it on or off for the current window.

/me {action text} Sends the specifed action to the active channel or query window.

/mode {#channel|nickname} [[+|-]modechars [parameters]] Sets channel or user modes.

/msg {nickname} {message} Send a private message to this user without opening a query window.

/names {#channel} Shows the nicks of all people on the given channel.

/nick {new nickname} Changes your nickname to whatever you like.

/notice {nick} {message} Send the specified notice message to the nick.

/notify [on|off|nickname] Toggles notifying you of a nick on IRC or sets it on or off totally.

/onotice [#channel] {message} Send the specified notice message to all channel ops.

/omsg [#channel] {message} Send the specified message to all ops on a channel.

/part {#channel} Makes you leave the specified channel.

/partall Makes you leave all channels you are on.

/ping {server address} Pings the given server. NOT a nickname.

/play [-c] {filename} [delay] Allows you to send text files to a window.

/pop {delay} [#channel] {nickname} Performs a randomly delayed +o on a not already opped nick.

/protect [on|off|nickname|address] Toggles protection of a nick or address or sets it on or off

totally.

/query {nickname} {message} Open a query window to this user and send them the private message.

/quit [reason] Disconnect you from IRC with the optional byebye message.

/raw {raw command} Sends any raw command you supply directly to the server. Use it with care!!

/remote [on|off] Shows the remote commands status or sets it to listening or not.

/rlevel {access level} Removes all users from the remote users list with the specified access

level.

/run {c:\path\program.exe} [parameters] Runs the specified program, evt. with parameters.

/ruser {nick[!]|address} [type] Removes the user from the remote users list.

/save {filename.ini} Saves remote sections into a specified INI file.

/say {text} Says whatever you want to the active window.

/server [server address [port] [password]] Reconnects to the previous server or a newly

specified one.

/sound [nickname|#channel] {filename.wav} {action text} Sends an action and a fitting sound.

/speak {text} Uses the external text to speech program Monologue to speak up the text.

/sreq [ask | auto | ignore] Sets your DCC 'On Send request' settings in DCC/Options.

/time Tells you the time on the server you use.

/timer[N] {repetitions} {interval in seconds} {command} [| {more commands}] Activates a timer.

/topic {#channel} {newtopic} Changes the topic for the specified channel.

/ulist [{|}]{level} Lists all users in the remote list with the specified access levels.

/url [-d] Opens the URL windows that allows you to surf the www parallel to IRC.

/uwho [nick] Pops up the user central with information about the specified user.

/who {#channel} Shows the nicks of all people on the given channel.

/who {*address.string*} Shows all people on IRC with a matching address.

/whois {nickname} Shows information about someone in the status window.

/whowas {nickname} Shows information about someone who -just- left IRC.

/wavplay {c:\path\sound.wav} Locally plays the specified wave file.

/write [-cidl] {filename} [text] To write the specified text to a .txt file.


MoViEBoT #xdcc-help /server irc.atomic-irc.net


We strive to make IRC easier for you!

ALL About Spyware

There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.


What is spy-ware?

Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.


Known spywares

There are thousands out there, new ones are added to the list everyday. But here are a few:

Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.


How to check if a program has spyware?

The is this Little site that keeps a database of programs that are known to install spyware.


Check Here: http://www.spywareguide.com/product_search.php


If you would like to block pop-ups (IE Pop-ups).

There tons of different types out there, but these are the 2 best, i think.


Try: Google Toolbar (http://toolbar.google.com/) This program is Free

Try: AdMuncher (http://www.admuncher.com) This program is Shareware


If you want to remove the "spyware" try these.

Try: Lavasoft Ad-Aware (http://www.lavasoftusa.com/) This program is Free

Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.


Try: Spybot-S&D (http://www.safer-networking.org/) This program is Free

Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.


Try: BPS Spyware and Adware Remover (http://www.bulletproofsoft.com/spyware-remover.html) This program is Shareware

Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you'd like to remove.


Try: Spy Sweeper v2.2 (http://www.webroot.com/wb/products/spysweeper/index.php) This program is Shareware

Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.

The best scanner out there, and updated all the time.


Try: HijackThis 1.97.7 (http://www.spywareinfo.com/~merijn/downloads.html) This program is Freeware

Info: HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.



If you would like to prevent "spyware" being install.

Try: SpywareBlaster 2.6.1 (http://www.wilderssecurity.net/spywareblaster.html) This program is Free

Info: SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.


Try: SpywareGuard 2.2 (http://www.wilderssecurity.net/spywareguard.html) This program is Free

Info: SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected.


Try: XP-AntiSpy (http://www.xp-antispy.org/) This program is Free

Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.


Try: SpySites (http://camtech2000.net/Pages/SpySites_Prog...ml#SpySitesFree) This program is Free

Info: SpySites allows you to manage the Internet Explorer Restricted Zone settings and easily add entries from a database of 1500+ sites that are known to use advertising tracking methods or attempt to install third party software.


If you would like more Information about "spyware".

Check these sites.

http://www.spychecker.com/

http://www.spywareguide.com/

http://www.cexx.org/adware.htm

http://www.theinfomaniac.net/infomaniac/co...rsSpyware.shtml

http://www.thiefware.com/links/

http://simplythebest.net/info/spyware.html


Usefull tools...

Try: Stop Windows Messenger Spam 1.10 (http://www.jester2k.pwp.blueyonder.co.uk/j...r2ksoftware.htm) This program is Free

Info: "Stop Windows Messenger Spam" stops this Service from running and halts the spammers ability to send you these messages.


----------------------------------------------------------------------------

All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I myself recommend getting "spyblaster" "s&d spybot" "spy sweeper" & "admuncher" to protect your PC. A weekly scan is also recommended


Free Virus Scan

Scan for spyware, malware and keyloggers in addition to viruses, worms and trojans. New threats and annoyances are created faster than any individual can keep up with.

http://defender.veloz.com// - 15k



Finding . is a Click Away at 2020Search.com

Having trouble finding what you re looking for on: .? 2020Search will instantly provide you with the result you re looking for by drawing on some of the best search engines the Internet has to offer. Your result is a click away!

http://www.2020search.com// - 43k



Download the BrowserVillage Toolbar.

Customize your Browser! Eliminate Pop-up ads before they start, Quick and easy access to the Web, and much more. Click Here to Install Now!

http://www.browservillage.com/ - 36k 

All About Movie Tags (what Is A Dvdrip, Cam Etc.)

 Original Sources


CAM -

A cam is a theater rip usually done with a digital video camera. A mini tripod is sometimes used, but a lot of the time this wont be possible, so the camera make shake. Also seating placement isn't always idle, and it might be filmed from an angle. If cropped properly, this is hard to tell unless there's text on the screen, but a lot of times these are left with triangular borders on the top and bottom of the screen. Sound is taken from the onboard microphone of the camera, and especially in comedies, laughter can often be heard during the film. Due to these factors picture and sound quality are usually quite poor, but sometimes we're lucky, and the theater will be fairly empty and a fairly clear signal will be heard.




TELESYNC (TS) - A telesync is the same spec as a CAM except it uses an external audio source (most likely an audio jack in the chair for hard of hearing people). A direct audio source does not ensure a good quality audio source, as a lot of background noise can interfere. A lot of the times a telesync is filmed in an empty cinema or from the projection booth with a professional camera, giving a better picture quality. Quality ranges drastically, check the sample before downloading the full release. A high percentage of Telesyncs are CAMs that have been mislabeled.




TELECINE (TC) -

A telecine machine copies the film digitally from the reels. Sound and picture should be very good, but due to the equipment involved and cost telecines are fairly uncommon. Generally the film will be in correct aspect ratio, although 4:3 telecines have existed. A great example is the JURASSIC PARK 3 TC done last year. TC should not be confused with TimeCode , which is a visible counter on screen throughout the film.




SCREENER (SCR) -

A pre VHS tape, sent to rental stores, and various other places for promotional use. A screener is supplied on a VHS tape, and is usually in a 4:3 (full screen) a/r, although letterboxed screeners are sometimes found. The main draw back is a "ticker" (a message that scrolls past at the bottom of the screen, with the copyright and anti-copy telephone number). Also, if the tape contains any serial numbers, or any other markings that could lead to the source of the tape, these will have to be blocked, usually with a black mark over the section. This is sometimes only for a few seconds, but unfortunately on some copies this will last for the entire film, and some can be quite big. Depending on the equipment used, screener quality can range from excellent if done from a MASTER copy, to very poor if done on an old VHS recorder thru poor capture equipment on a copied tape. Most screeners are transferred to VCD, but a few attempts at SVCD have occurred, some looking better than others.




DVD-SCREENER (DVDscr) -Same premise as a screener, but transferred off a DVD. Usually letterbox , but without the extras that a DVD retail would contain. The ticker is not usually in the black bars, and will disrupt the viewing. If the ripper has any skill, a DVDscr should be very good. Usually transferred to SVCD or DivX/XviD.




DVDRip - A copy of the final released DVD. If possible this is released PRE retail (for example, Star Wars episode 2) again, should be excellent quality. DVDrips are released in SVCD and DivX/XviD.




VHSRip -Transferred off a retail VHS, mainly skating/sports videos and XXX releases.




TVRip -TV episode that is either from Network (capped using digital cable/satellite boxes are preferable) or PRE-AIR from satellite feeds sending the program around to networks a few days earlier (do not contain "dogs" but sometimes have flickers etc) Some programs such as WWF Raw Is War contain extra parts, and the "dark matches" and camera/commentary tests are included on the rips. PDTV is capped from a digital TV PCI card, generally giving the best results, and groups tend to release in SVCD for these. VCD/SVCD/DivX/XviD rips are all supported by the TV scene.




WORKPRINT (WP) -A workprint is a copy of the film that has not been finished. It can be missing scenes, music, and quality can range from excellent to very poor. Some WPs are very different from the final print (Men In Black is missing all the aliens, and has actors in their places) and others can contain extra scenes (Jay and Silent Bob) . WPs can be nice additions to the collection once a good quality final has been obtained.




DivX Re-Enc -A DivX re-enc is a film that has been taken from its original VCD source, and re-encoded into a small DivX file. Most commonly found on file sharers, these are usually labeled something like Film.Name.Group(1of2) etc. Common groups are SMR and TND. These aren't really worth downloading, unless you're that unsure about a film u only want a 200mb copy of it. Generally avoid.




Watermarks -

A lot of films come from Asian Silvers/PDVD (see below) and these are tagged by the people responsible. Usually with a letter/initials or a little logo, generally in one of the corners. Most famous are the "Z" "A" and "Globe" watermarks.




Asian Silvers / PDVD -

These are films put out by eastern bootleggers, and these are usually bought by some groups to put out as their own. Silvers are very cheap and easily available in a lot of countries, and its easy to put out a release, which is why there are so many in the scene at the moment, mainly from smaller groups who don't last more than a few releases. PDVDs are the same thing pressed onto a DVD. They have removable subtitles, and the quality is usually better than the silvers. These are ripped like a normal DVD, but usually released as VCD.







Formats


VCD -

VCD is an mpeg1 based format, with a constant bitrate of 1150kbit at a resolution of 352x240 (NTCS). VCDs are generally used for lower quality transfers (CAM/TS/TC/Screener(VHS)/TVrip(analogue) in order to make smaller file sizes, and fit as much on a single disc as possible. Both VCDs and SVCDs are timed in minutes, rather than MB, so when looking at an mpeg, it may appear larger than the disc capacity, and in reality u can fit 74min on a CDR74.




SVCD -

SVCD is an mpeg2 based (same as DVD) which allows variable bit-rates of up to 2500kbits at a resolution of 480x480 (NTSC) which is then decompressed into a 4:3 aspect ratio when played back. Due to the variable bit-rate, the length you can fit on a single CDR is not fixed, but generally between 35-60 Mins are the most common. To get a better SVCD encode using variable bit-rates, it is important to use multiple "passes". this takes a lot longer, but the results are far clearer.




XVCD/XSVCD -

These are basically VCD/SVCD that don't obey the "rules". They are both capable of much higher resolutions and bit-rates, but it all depends on the player to whether the disc can be played. X(S)VCD are total non-standards, and are usually for home-ripping by people who don't intend to release them.




KVCD Thanks for lardo4life for the info

KVCD is a modification to the standard MPEG-1 and MPEG-2 GOP structure and Quantization Matrix. It enables you to create over 120 minutes of near DVD quality video, depending on your material, on a single 80 minute CD-R/CD-RW. We have published these specifications as KVCDx3, our official resolution, which produce 528x480 (NTSC) and 528x576 (PAL) MPEG-1 variable bit rate video, from 64Kbps to 3,000Kbps. Using a resolution of 352x240 (NTSC) or 352x288 (PAL), it's possible to encode video up to ~360 minutes of near VCD quality on a single 80 minute CD-R. The mpeg files created will play back in most modern standalone DVD players. You must burn the KVCD MPEG files as non-standard VCD or non-standard SVCD (depends on your player) with Nero or VCDEasy.




DivX / XviD -

DivX is a format designed for multimedia platforms. It uses two codecs, one low motion, one high motion. most older films were encoded in low motion only, and they have problems with high motion too. A method known as SBC (Smart Bit-rate Control) was developed which switches codecs at the encoding stage, making a much better print. The format is Ana orphic and the bit-rate/resolution are interchangeable. Due to the higher processing power required, and the different codecs for playback, its unlikely we'll see a DVD player capable of play DivX for quite a while, if at all. There have been players in development which are supposedly capable, but nothing has ever arisen. The majority of PROPER DivX rips (not Re-Encs) are taken from DVDs, and generally up to 2hours in good quality is possible per disc. Various codecs exist, most popular being the original Divx3.11a and the new XviD codecs.




CVD -

CVD is a combination of VCD and SVCD formats, and is generally supported by a majority of DVD players. It supports MPEG2 bit-rates of SVCD, but uses a resolution of 352x480(ntsc) as the horizontal resolution is generally less important. Currently no groups release in CVD.




DVD-R -

Is the recordable DVD solution that seems to be the most popular (out of DVD-RAM, DVD-R and DVD+R). it holds 4.7gb of data per side, and double sided discs are available, so discs can hold nearly 10gb in some circumstances. SVCD mpeg2 images must be converted before they can be burnt to DVD-R and played successfully. DVD>DVDR copies are possible, but sometimes extras/languages have to be removed to stick within the available 4.7gb.




MiniDVD -

MiniDVD/cDVD is the same format as DVD but on a standard CDR/CDRW. Because of the high resolution/bit-rates, its only possible to fit about 18-21 mins of footage per disc, and the format is only compatible with a few players.







Misc Info


Regional Coding -

This was designed to stop people buying American DVDs and watching them earlier in other countries, or for older films where world distribution is handled by different companies. A lot of players can either be hacked with a chip, or via a remote to disable this.




RCE -

RCE (Regional Coding Enhancement) was designed to overcome "Multiregion" players, but it had a lot of faults and was overcome. Very few titles are RCE encoded now, and it was very unpopular.




Macrovision -

Macrovision is the copy protection employed on most commercial DVDs. Its a system that will display lines and darken the images of copies that are made by sending the VHS signals it can't understand. Certain DVD players (for example the Dansai 852 from Tescos) have a secret menu where you can disable the macrovision, or a "video stabaliser" costs about 30UKP from Maplin (www.maplin.co.uk)




NTSC/PAL -

NTSC and PAL are the two main standards used across the world. NTSC has a higher frame rate than pal (29fps compared to 25fps) but PAL has an increased resolution, and gives off a generally sharper picture. Playing NTSC discs on PAL systems seems a lot easier than vice-versa, which is good news for the Brits An RGB enabled scart lead will play an NTSC picture in full colour on most modern tv sets, but to record this to a VHS tape, you will need to convert it to PAL50 (not PAL60 as the majority of DVD players do.) This is either achieved by an expensive converter box (in the regions of £200+) an onboard converter (such as the Dansai 852 / certain Daewoos / Samsung 709 ) or using a World Standards VCR which can record in any format.




News Sites -

There are generally 2 news sites for film release for p2p and they are:


nforce - VCD Help

Code:

http://www.vcdhelp.com/


Code:

http://www.nforce.nl.





About Release Files


RARset -

The movies are all supplied in RAR form, whether its v2 (rar>.rxx) or v3 (part01.rar > partxx.rar) form.




BIN/CUE -

VCD and SVCD films will extract to give a BIN/CUE. Load the .CUE into notepad and make sure the first line contains only a filename, and no path information. Then load the cue into Nero/CDRWin etc and this will burn the VCD/SVCD correctly. TV rips are released as MPEG. DivX files are just the plain DivX - .AVI




NFO -

An NFO file is supplied with each movie to promote the group, and give general iNFOrmation about the release, such as format, source, size, and any notes that may be of use. They are also used to recruit members and acquire hardware for the group.


SFV -

Also supplied for each disc is an SFV file. These are mainly used on site level to check each file has been uploaded correctly, but are also handy for people downloading to check they have all the files, and the CRC is correct. A program such as pdSFV or hkSFV is required to use these files.







Usenet Information


Access -

To get onto newsgroups, you will need a news server. Most ISPs supply one, but this is usually of poor retention (the amount of time the files are on server for) and poor completition (the amount of files that make it there). For the best service, a premium news server should be paid for, and these will often have bandwidth restrictions in place.




Software -

You will need a newsreader to access the files in the binary newsgroups. There are many different readers, and its usually down to personal opinion which is best. Xnews / Forte Agent / BNR 1 / BNR 2 are amongst the popular choices. Outlook has the ability to read newsgroups, but its recommended to not use that.




Format -

Usenet posts are often the same as those listed on VCDQUALiTY (i.e., untouched group releases) but you have to check the filenames and the description to make sure you get what you think you are getting. Generally releases should come down in .RAR sets. Posts will usually take more than one day to be uploaded, and can be spread out as far as a week.




PAR files -

As well as the .rxx files, you will also see files listed as .pxx/.par . These are PARITY files. Parity files are common in usenet posts, as a lot of times, there will be at least one or two damaged files on some servers. A parity file can be used to replace ANY ONE file that is missing from the rar set. The more PAR files you have, the more files you can replace. You will need a program called SMARTPAR for this.







Scene Tags


PROPER -

Due to scene rules, whoever releases the first Telesync has won that race (for example). But if the quality of that release is fairly poor, if another group has another telesync (or the same source in higher quality) then the tag PROPER is added to the folder to avoid being duped. PROPER is the most subjective tag in the scene, and a lot of people will generally argue whether the PROPER is better than the original release. A lot of groups release PROPERS just out of desperation due to losing the race. A reason for the PROPER should always be included in the NFO.




SUBBED -

In the case of a VCD, if a release is subbed, it usually means it has hard encoded subtitles burnt throughout the movie. These are generally in malaysian/chinese/thai etc, and sometimes there are two different languages, which can take up quite a large amount of the screen. SVCD supports switch able subtitles, so some DVDRips are released with switch able subs. This will be mentioned in the NFO file if included.




UNSUBBED -

When a film has had a subbed release in the past, an Unsubbed release may be released


LIMITED -

A limited movie means it has had a limited theater run, generally opening in less than 250 theaters, generally smaller films (such as art house films) are released as limited.




INTERNAL -

An internal release is done for several reasons. Classic DVD groups do a lot of .INTERNAL. releases, as they wont be dupe'd on it. Also lower quality theater rips are done INTERNAL so not to lower the reputation of the group, or due to the amount of rips done already. An INTERNAL release is available as normal on the groups affiliate sites, but they can't be traded to other sites without request from the site ops. Some INTERNAL releases still trickle down to IRC/Newsgroups, it usually depends on the title and the popularity. Earlier in the year people referred to Centropy going "internal". This meant the group were only releasing the movies to their members and site ops. This is in a different context to the usual definition.




STV -

Straight To Video. Was never released in theaters, and therefore a lot of sites do not allow these.




OTHER TAGS -


*WS* for widescreen (letterbox)

*FS* for Fullscreen.




RECODE -

A recode is a previously released version, usually filtered through TMPGenc to remove subtitles, fix color etc. Whilst they can look better, its not looked upon highly as groups are expected to obtain their own sources.




REPACK -

If a group releases a bad rip, they will release a Repack which will fix the problems.




NUKED -

A film can be nuked for various reasons. Individual sites will nuke for breaking their rules (such as "No Telesyncs") but if the film has something extremely wrong with it (no soundtrack for 20mins, CD2 is incorrect film/game etc) then a global nuke will occur, and people trading it across sites will lose their credits. Nuked films can still reach other sources such as p2p/usenet, but its a good idea to check why it was nuked first in case. If a group realise there is something wrong, they can request a nuke.


NUKE REASONS :: this is a list of common reasons a film can be nuked for (generally DVDRip)


** BAD A/R ** :: bad aspect ratio, ie people appear too fat/thin

** BAD IVTC ** :: bad inverse telecine. process of converting framerates was incorrect.

** INTERLACED ** :: black lines on movement as the field order is incorrect.




DUPE -

Dupe is quite simply, if something exists already, then theres no reason for it to exist again without proper reason.