Monday, November 29, 2010

Shadow Cruiser Fun Finder Camper

PROGRAM SATURDAY 27 NOVEMBER 2010

PHOTO: the ineffable King George and all its magic. Courtesy Chiara Rosso.



"NoTanDistintos" 209
Driving Program: Alberto "Tano"
Rosso and Blanco Guillermo Alvarado
technical operation: Alexis Naus

Date: Saturday November 27, 2010
hours: 18:00 to 21:00
radio: FM FLORES 90.7
internet:
http://www.radiofmflores.net/

LISTENING

BLOCK 1: Introduction and Blues - LISTEN
BLOCK 2: Interview and Blues - LISTEN
BLOCK 3: Live Music - LISTEN
BLOCK 4: Interview and Blues -
LISTEN BLOCK 5: Agenda and Jazz - LISTEN
BLOCK 6: Interview and Blues - LISTEN
BLOCK 7: Farewell and Blues - LISTEN

MUSICAL PROGRAMMING

Jimmi Hendrix "Wipe the Sweat"
DISC: Two Great Experiences (1965)
MUSICIANS: Jimi Hendrix (guitar) Lenny
Youngblood (tenor sax) John Winfield (organ)
Hank Anderson (bass) Jimmy May (drums)


David M'ore "Shame Shame Shame (author Kenny Wayne Shephard)
DISCO: From the Other Side of the River (2009)
MUSICIANS: David M'ore (vocals, guitar)
Kirk Bowman (bass) Wade Olson (drums)


David M'ore "Foxy Lady" (author Jimmi Hendrix)
DISCO: From the Other Side of the River (2009)
MUSICIANS: David M'ore (vocals, guitar)
Edgard San Gabriel (bass) Wade Olson (drums)


David M'ore "Sweet Little Angel" (author BB King)
In Vivo Studies in FM FLORES 90.7 (27 / 11 / 2010 )
MUSICIANS: David M'ore (vocals, guitar)


David M'ore "You Are Not So Good"
DISCO: From the Other Side of the River (2009)
MUSICIANS: David M 'ore (vocals, guitar)
Kirk Bowman (bass) Wade Olson (drums)


David M'ore "The Sun Is Shining"
DISCO: From the Other Side of the River (2009)
MUSICIANS: David M'ore (vocals, guitar)
Alex Diaz (bass) Wade Olson (drums)


Federico Bozas "Little Wing" (author Jimmi Hendrix)
Live in Thailand (2005)
MUSICIANS: Federico Bozas (vocals, guitar)
Javier Viñas (guitar), Silvio R. Marzolini (piano)
Rodrigo Barrientos (alto saxophone) Jorge Oss (bass) Bozas Willy (drums)


Marcus Bonfanti "Will Not Play Your Game"
DISCO: What Good Am I to You (2010)
MUSICIANS: Marcus Bonfanti (vocals, guitar)
Elizabeth Brown (vocals), Paddy Milner (keyboards) Scott
Wiber (bass) Alex Reeves (drums)


Robert Cray "Anytime"
DISCO: Cookin 'in Mobile (2010)
MUSICIANS: Robert Cray (vocals, guitar)
Jim Pugh (keyboards) Richard Cousins \u200b\u200b(bass) Tony Braunagel
(drums)


Hoochie Coochie Girls "It Hurts me Too " (author Tampa Red).
Recorded Live on the Radio (20 / 11 / 2010)
MUSICIANS: Jessica County (vocals, bass) Pamela Smith (guitar)
Ximena Monzón (harmonica)


Grant Green Jr & Reuben Wilson "Sweet Home Chicago" (author Robert Johnson)
ALBUM: The Godfathers Of Groove (2007)
MUSICIANS: Grant Green Jr. (guitar), Reuben Wilson (organ)
Jerry Jemmott (bass) Bernard Purdie (drums)


King George "Blues Gonna Get You"
DISCO: Afrobeat (2000 )
MUSICIANS: King George (vocals, guitar) Jim
Addler (guitar) Back Brothers (sax, piano)
Neucler Caroline (bass) Abdul Ali (drums) Johan Eboule (percussion)


King George " Help me "
DISCO: Afrobeat (2000)
MUSICIANS: King George (vocals, guitar) Jim
Addler (guitar) Back Brothers (sax, piano) Caroline
Neucler (bass) Abdul Ali (drums) Johan Eboule (percussion)


King George medley
In Vivo Studies in FM FLORES 90.7 (27 / 11 / 2010)
MUSICIANS: King George (vocals, guitar)

Is Brewers Yeast Good For Acne

GUEST: David M'ore

PHOTO: the amazing David M'ore and guitar fire. Courtesy Rosso Chiara



Another fantastic double bill, the last Saturday in "NoTanDistintos" two international presences. First, we were visited by Argentine singer and guitarist David M'ore residing in the San Francisco, California for over 20 years and there has developed an important career as a musician, that salient point is the recent edition of his second solo album "From the Other Side of the River "where he mixes influences of Jimi Hendrix, Ritchie Blackmore, Albert King and others, resulting in an excellent work that nevertheless has a very personal. Of that, about their experiences having played with the likes of Izzy Stradling, Johnny Nitro, Tommy Castro, Johnny "Guitar" Knox and many more and other topics we talked during the interview, just before his guitar to surprise us with a explosive version "Sweet Little Angel" by BB King. Brilliant ...
Moreover, and as if all this were not enough, he went again for the program, the ineffable King George Clemons, the Sweden-based American bluesman who played with Hendrix, Ike Turner, Buddy Guy, Albert Collins, Don Cherry and Dexter Gordon and others to tell lots of stories, many of them musicalized by his guitar and even the odd horn that goes everywhere lately. Great ...


David M'ore "Sweet Little Angel"

Saturday, November 27, 2010

Where Are Cruising Areas In Perth

Remote Computers With Win XP

computer remotely defined here is controlling the remote computer with a different computer. So we can do activities to use the mouse and keyboard with a different computer locations. Suppose you want to control the office computer from your computer / laptop at home. But that will be discussed here we use only the LAN network to facilitate the intent and purpose of writing. Remote Administrator application program
or PC Anywhere,
usually used to this computer remotely. But here I do not discuss the two applications mentioned above, but use the facilities provided Windows XP. Suppose you have two computers that is connected dijaringan. Assuming computer A and computer B. And you want to take over the whole control computer A from computer B. So computer A computer is an object that will be our target. To make it easier to understand steps that must be done:



Should all A computer firewall is turned off first, either the default Windows XP firewall as well as from outside.

To turn off the firewall, click the button start -> Control Panel -> Security Center -> windows firewall on windows firewall
then select the General tab, then turn off (off) firewall.


Password Enable Users in

Sometimes computer users enter windows did not activate his password, so that the time of entry arrested a computer directly without a password question. To activate it Click Start-> Control Panel -> User Accounts -> User Accounts again -> select the user you use -> Create a Password . Once completed you first log off and log in again with a new password contrived again, this just convince your login and password has been actively working. After the above steps have been done, here is how to romete settings on windows XP.
Click Start-> Right Click My Computer -> Properties Then select the tab
Remote Display which appears as follows:

In Remote Assistance -> Allow Remote Assistance ... .. should be checked. Remote Desktop -> Allow users ... .... also in a state checked. Then click Select Remote Users
Select
Add button, click the button again continue Advanced

Forwarded click the Find button, Display to be shown as follows:

Select your user name can use to remotely.
Select
OK button to complete all . Now we have settings to Computer A that became our target object for the computer remotely.
Next you try to go to computer B to take over control of computer A to computer A requirement should not be doing the activity altogether.
From Computer B as a computer for makers over the control, click Start-> All Programs-> Accessories> Communications> Remote Desktop Connection.
views as follows:


Fill with the computer name (computer name) of the computer that became the target object. Next will come the demand for user and password, you must fill in accordance with the User and Password that computer A. Good luck ... ... ... ... ... ....

Tuesday, November 23, 2010

Antifa Film Streaming

PROGRAM SATURDAY, NOVEMBER 20, 2010

PHOTO: the Tano and Guille with Mariano Di Lernia and Federico Rodriguez of the Buenos Ayres Blues Band. Courtesy Silvia Barria.



"NoTanDistintos" 208
Driving Program: Alberto "Tano"
Rosso and Blanco Guillermo Alvarado
technical operation: Alexis Naus

date: Saturday November 20, 2010
hours: 18.00 to 21.00
radio: FM FLORES 90.7
internet:
http://www.radiofmflores.net/

TO LISTEN
BLOCK 1: Introduction and Blues - LISTEN
BLOCK 2: Interview and Blues -
LISTENING SESSION 3: Interview and Blues - LISTEN
BLOCK 4: Live Music - LISTEN
BLOCK 5: Agenda and Jazz - LISTEN
BLOCK 6: News and Jazz - LISTEN


MUSICAL PROGRAMMING

Grateful Dead Blues For Allah "
DISCO: Blues For Allah (1975)
MUSICIANS: Jerry Garcia (vocals, guitar) Bob Weir (guitar)
Keith Godchaux (keyboards) Phil Lesh (bass)
Mickey Hart (drums)


Buddy Guy BB King & "Stay Around A Little Longer"
DISCO: Living Proof (2010)
MUSICIANS: Buddy Guy (vocals, guitar) BB King (vocals, guitar)
Reese Wynans (keyboards), Michael Rhodes (bass )
Tom Hambridge (drums)


James Cotton "Buried Alive With the Blues"
DISCO: Giant (2010)
MUSICIANS: James Cotton (harmonica) Slam Allen (vocals, guitar)
Tom Holland (guitar) Ronnie Webber (keyboards)
Noel Neal (bass) Ray Kenny Neal Jr. (drums)


RimanBloom "Trasnoche Blues"
DISCO: Tao - not yet published (2010)
MUSICIANS: Rinaldo Rafanelli (vocals, bass) Diego Schneerson (guitar)
Macrett Matthias (drums)


Kenny Neal "Down in the Swamp"
DISCO: Hooked on Your Love (2010)
MUSICIANS: Kenny Neal (vocals, guitar)
Frederick Neal (keyboards) Darnell Neal (bass)
Ray Kenny Neal Jr. (drums)


Alejandro Medina "Love is Love"
DISCO: I Am (2010)
MUSICIANS: Alejandro Medina (vocals, bass)
Lola Medina (vocals), Claudio Rodríguez (guitar )
Javier Boleda (drums)


Blusera Memphis "In All Cities"
DISCO: Alma Bajo la Lluvia (1984)
MUSICIANS: Adrian Otero (voice) Daniel Beiserman (bass)
Emilio Villanueva (tenor sax) Gustavo Villegas (piano) Leon Almar (harmonica) Reuben
Alfano (guitar) Eddy Vallejos (guitars) Raul Lafuente (drums)


Buenos Ayres Blues Band "Idle"
DISCO: Escondido (2009)
MUSICIANS: Maximilian Hermann (vocals, guitar) Federico Rodriguez (harmonica)
Dilernia Mariano (piano) Matthias Mazzuco ( ssxo)
Julian Marquez (bass) Alex Moore (drums)


Buenos Ayres Blues Band "I invite you to Dance"
DISCO: Escondido (2009)
MUSICIANS: Maximilian Hermann (vocals, guitar) Federico Rodriguez (harmonica)
Dilernia Mariano (piano) Matthias Mazzuco (ssxo)
Julian Marquez (bass) Alex Moore (drums)


Hoochie Coochie Girls & Federico Rodriguez "Walter's Boogie" (author Big Walter Horton)
In Vivo Studies in FM FLORES 90.7 (20 / 11/2010)
MUSICIANS: Jessica County (vocals, bass) Pamela Smith (guitar)
Ximena Monzón (harmonica) Federico Rodriguez (harmonica)


Hoochie Coochie Girls & Federico Rodriguez "Finding Form "
In Vivo Studies in FM FLORES 90.7 (20 / 11 / 2010)
MUSICIANS: Jessica County (vocals, bass) Pamela Smith (guitar)
Ximena Monzón (harmonica) Federico Rodriguez (harmonica)


Hoochie Coochie Girls "It Hurts me Too" (author Tampa Red)
Live Studies in FM FLORES 90.7 (20 / 11 / 2010)
MUSICIANS: Jessica County (vocals, bass) Pamela Smith (guitar)
Ximena Monzón (harmonica)


Diego Schissi "Liquid 5"
DISCO: Tonga (2010)
MUSICIANS: Diego Schissi (piano)
Santiago Segret (bandoneon) Guillermo Rubino (violin)
Ismael Grossman (guitar) John Paul Navarro (contrabajo)


Dino Saluzzi "Minguito"
DISCO: Rivers (1995)
musicians: Dino Saluzzi (bandoneon)
David Friedman (marimba) Anthony Cox (contrabajo)


Nat Adderley "Work Song"
DISC: Work Song (1960)
musicians: Nat Adderley (cornet) Bobby Timmons
(piano) Wes Montgomery (guitar)
Percy Heath (contrabajo) Louis Hayes ( battery)

Friday, November 19, 2010

Chi Straightner Lifetime Warranty

Steps How to Fix Bad Sector



Before performing these steps, make sure your data is safe. You can back them up first with the way combined with a normal hard drive, do not forget jumpernya diposisi Slave setting.
Make the process of LLF (Low Level Format), can with MaxLLF Program and DiskManager or HDD Regenerator. (Perhatian! Make sure you backup data first).
Do Partitions with one partition. Perform Command Format / c (to check the location where there are bad sectors). Type: " Format C: / c" and then ENTER (option / c to do the command checks if there is bad sectors, this inspection occurs when the formatting is in progress).
If the process of finding bad sectors will appear the message: "Trying to recover allocation unit to" followed by the number appended to it, namely the numbers indicate the position of bad sectors. For example, if kerusaka occur in the following processes : "Formating 2,202.01 M Trying to recover allocation unit 750,000". Note the position of the bad sectors, meaning the damage occurred in the percentage to 34% 750 000 / 2,202,010 X100% = 34%. Make a recording of the position of the damage as above (in percentage), when there are other defects.
For example, if the damage occurs in two places, namely at position 34% and 65%, it can be concluded: 0% - 33% Plater still in normal circumstances. Position Plater 34% on bad sectors occur
Outstanding 35% - 64% Plater still in normal circumstances 65%
Position Position bad sector 66% - 100% Plater still in normal circumstances. Do repartition according to the percentage which found bad sectors, create a primary partition with "Drive C" and according to the conditions of partition exetended Bad sectors. Note the mapping image below: Remove the partition containing
Bad sectors
In a damaged condition as described above, contains the primary drive "C" is made of 33%, a bad sector 34% -35%. While the Extended Partition is made for 67%, the next partition: E: UNKNOWN 45% F: FAT 16 2%
G: FAT 16
Damage mapped to drive D and F were each given 2%, this partition will be discarded because there are bad sectors, while the E and G is the drive that will be used. To do the elimination of partition / drive that you want ill do Partition Repeat; select the menu "3. Delete Partition "and you follow the instructions, do not forget to delete the partition / drive is bad sectornya. Seteleh finished did reformat the drive that left With the above steps hard drive capacity will be reduced because there are cuts

Weddings Ceremony Language Non Religious

Entry Into Other Computers In One LAN Network Flooding


How to Go Into Other Computers In One LAN
computer you want enter your friends in a LAN? can view the entire contents of hard disk
your friends, create a directory, create files, delete files or
anything? It is easy, all the way here.

First you must know the 2 programs are important and then download the Internet Maniac (Internet Maniac.exe) ... Download Interenet Maniac
Serves to know the ip addreas client through the computer name / hostname
KaHT (KaHt.exe) ... Download the program hacker KaHT
Serves as a program to break into a server or client computer
Remember only the 2 programs above then you get ready to master cafe / campus / office and so forth, you know how? hehe first time you first check your network by looking at the hostname
in 2 ways. Remember
only with 2 programs above then you get ready to master cafe / campus / office and so forth, you know how? hehe After 2 courses above to download the program first ekstractlah
, either use WinZip or use what.
If it then extract the first time you first check with your network see the hostname in 2 ways. For Windows XP
How First Go to Start then Search, then select the computers or people then
select A computer on the network and then immediately click search it will soon appear computer-connected computer in the network. For Windows 95/98/Me/2000 (if you find an open port 135 on this OS)
:)
How to First Go to Start then Search For Files or Folders And then on Search for other menu items select the computers, and will Search for computer appears, then immediately click the Search Now button then the names of the computers will appears
(Alternative quick way to click on My Network Place / Network
Neighboure only) dapetin Once you want on the target computer enter / diremote loe then immediately wrote a program run Internet Maniac
Go to Host Lookup and then type the computer name / hostname then click
resolvable, here you will get the ip address of the computer. With this ip number then you already know the target computer that will be attending. Once that's done then we leave the Internet Maniac program, we will continue with the program
KaHT, this program will didetect as a Trojan by
antivirus, but ignore it, do not be deleted / if detected in quarantine, if necessary del aja antivirus, another one, the program KaHT work in MS-DOS mode so here your ability to use the DOS is very important, without the ability
DOS then you can not do much. How to enter DOS mode
For Windows XP: Go to Start, All programs, Accessories and then Command Prompt For Windows 95/98/ME/NT/2000

Go to Start, Programs, Accessories then MS-DOS Prompt Upon successful DOS entry in the directory then go KaHT program, the seh could forget last diextract program where, hehe, (Example: You extract the
C: \\ Kah) then type "CD \\ KaHT" and so on.
If you have, it's time? Type "KaHT sebelum_no_ip_komputer_sasaran no_ip_komputer_sasaran. that could confuse this way: "KaHT IP1 IP2"
IP1: initial ip scanned
IP2: ip scanned Last post example was his ip 192.168.0.1 after the Internet Maniac
pakek detect earlier that you know.
Then just type "KaHT 192.168.0.0 192.168.0.1" and enter Well here later wrote the program will work automatically. After the scan is complete if it later turns out port 135 in a state of open so you will automatically
in computer objectives / targets, to be more exact you
will be in "c: \\ windows \\ system" computer belongs goals / targets after pen-scan- the finish. you can be free on the target computer, want to edit or delete any can, hehe
Nah kalo udah so we can creative:
Pingin our cafe cheaper cost? aja easy entry in the billing server, type Time, change aja time, but do not be a lot less later discovered minus ama warnetnya operator, hehe.
spy on children who were chatting in a cafe pakek mIRC / campus /
office / other, find the mIRC program used in existing computers, seh usually in C: \\ Program Files \\ mIRC, open the file MiRC.INI, then log IRC in On her alone and if you want to see the contents of our friends was enough chattingan through
"/ logs" means that earlier in the C: \\ program Files \\ mIRC program just go MiRCnya then
wrote in C: \\ Program Files \\ mIRC \\ Logs later there is the log files chattingan results he is online although he recorded tetep aja, hehe, kalo want mastiin what he makek nick, could very easily run aja MiRCnya
or check in MiRC.INI, gampangkan. Moreover
ya, Make the computer was broken, better not, but could sebenere lho, aja delete the files system, hehe. Above cuman little creations aja, aja loe can use it far more useful than the above

The purpose of this tutorial for those of you who frequently use computers with Windows 2000 and XP dijaringan to be more wary of nosy actions of parties who are not responsibility ..
5.Membuat Windows administrator access to us through another computer
We want to create an administrator Windows XP/2000 on another computer through LAN ? very easy, how to go to the destination computer with a program that has been taught kaht above, then we will try some tricks. Viewing
guest and administrator access in Windows
Type: net user guest Viewing least active in Windows Type: net user guest guest access
Creating an Administrator with the command:
Type: net localgroup Guest Administrators / add Create own administrator access: 1. Type: net user / add
2. Type: net localgroup Administrators / add
Removing administrator access Type: net localgroup Users / delete
Note: * Any errors
error / damage on the computer and the like are your responsibility! * All that you learn and you have to do is entirely your responsibility
without exception.

What's A Proper Tip For A Brazilian Wax




Network Flooding


flood, flooder

,

Network, LAN ,
Software



Flooding means flood, so this technique to flood the network with data that is not useful so that a network becomes slow alias ga abysmally slow heheheh, can be tried in the cafe was atao anywhere, but ye ... own risk.
Download here

used such tools.
Well now immediately wrote prakteklah.



1. Open the files lan attacker who had downloaded



continue to directly click install ... well if you've finished the new install click attack
2. after open the program and click scan




3. then click option - adapters for setting how big that file would be sent to the target computer
4.nah dah completed the configuration settings we immediately wrote floodin coincidence that would target computer isengin ane No. 4 with ip 192.168.1.14
after it checked the ip continues right click then click

flood

5. then see the results of computer
victim


Congratulations try ..


Thursday, November 18, 2010

What Shirt Goes With A Black Vest

Basic Commands Command Prompt Tricks



Basic Commands Command Prompt Command prompt



,

tips aja Jump

you open a command prompt you ...


Select Start> Run ...> on the Run ... type cmd window.
Figure 1: Run dialog box




Then press [Enter].


So now we will know some basic commands CMD







ORDERS ORDERS IN COMMAND PROMPT



Date

Order Date function to display date or to set the date.





Vol [drive]

Serves to display the label of a drive and serial numbernya.





Time [/ T]
Time without parameter / T will display the current time and sets with the new. Time with the parameter / T will display the time. Title [string] Functions to change the name on the window title with the new.
Ver Serves to display the version of Windows that is used.
CLS
Serves to clean up screen. . Attr: the parameters for the color. Attr consists of 2 hexadecimal value, the first value to determine
Color [attr] Function to change the color of the background and foreground in the command prompt
background color and the second to determine the color of the foreground. Sign in color as follows: 0 = Black 1 = Blue 2 = Green 3 = Aqua
4 = Red 5 = purple 6 = yellow remote1
7 = White 8 = Gray 9 = Light Blue A = Light Green B = Light Aqua C = Light Red D = Light Purple E = Light Yellow F = Bright White
Example: remote2






Combined: remote3


ORDER-ORDER TO FILE MANAGEMENT

Below the commands for file management, such as to create folders, folder or file copy, rename, and so forth.

Md

Works to create examples directory

Md \\
computer will create a folder in the root folder named computer.
Md \\ computer \\ blog will
create a folder inside a folder named computer and the computer will be created a folder called blog




Cd

Serves to move from one directory to another directory.
Example f: / cd komputerblog


above command will move from drive f to folder komputerblog
What if want to switch drives? at the command prompt type the drive that
want addressed.

dir [drive:] [path] [filename] [/ A [[:] attributes]] [/ B] [/ C] [/ D] [/ L] [/ O [[:] sortorder]]

[/ P] [/ Q] [/ S] [/ T [[:] timefield]] [/ W] [/ X] [/ 4]

Serves to display files and subdirectories contained in the directory.
dir command has several attributes, their description as follows:
/ A: function to display the files that have the attribute directory, hidden files, file system, read only files and archiving files. In short with
add this attribute then all files in the directory will be displayed.




/ B: only displays the file name only.




/ D: display files horizontally




/ L: displays the file name in lowercase




/ N: display files with the name of the long format, without / N
folder name "Program files" to "progra ~ 1".



/ o [attr]: displays the files in the order.
-N: Sort files by name (alphabetic)
-E: Sort files based on extension (alphabetic)
-G: Sort files according to the group
-S: Sort files based on file size (starting from the smallest)
-D: Serial file appropriate time (starting from the longest)



/ P: pause when the layer command prompt is full.
/ Q: Displays the name of the owner of the file.


/ S: Displays the folder and its subdirectori and files contained in it.
/ W: Displays a horizontal file



Copy [source] [destination]

Function to copy a file from one location to another location.
Example:
Copy c: / f laporan.doc:
This command will copy a file laporan.doc located on drive c to drive f.
Copy c: / *. doc f:
This command will copy all the *. doc file into drive berextensi f.


Del [file]

Function to delete the file.
Example:
Del c: / buku.txt
This command will delete the files in drive c. buku.txt
Del c: / *. txt
Order This will delete all *. txt files berextensi in drive c.


Erase [file] Same as

del command, function to delete the file.
Example:
erase c: / buku.txt
This command will delete the files in drive c. buku.txt
erase c: / *. txt
This command will delete all *. txt files berextensi in drive c.


Rd [folder]

This command serves to remove a directory.
Sample Rd
games
This command will delete the folder named games.


Rddir [folder]

Similar rd command, namely to delete the directory.
Example
Rddir game_lama
This command will delete the folder named game_lama



Ren [filename] [namabaru]

Functions to change the name of a file.
Example:
Ren kinta.doc kuliah.doc
This command will rename kinta.doc with kuliah.doc



Rename [filename] [namabaru]

Just like ren, serves to change the name of a file.
Example: Rename
kinta.doc kuliah.doc
This command will rename kinta.doc with kuliah.doc
berfomat Functions to display text files (*. txt)

or other files that are supported by dos.

Example: Type tentangku.txt TREE [drive:] [path] [/ F] [/ A]
image / F: By adding this option, then the files that are in
folder will be displayed. / A: Using ASCII format in displaying characters. Example: Type
f:
This command displays the directory tree that is on drive f.
Tree f: / f image This command displays the folders and files located on drive f.


image
Edit Text editor for dos.


image Supplement: image attrib external command. To view / change file attributes
internal COPY command. To copy files

DEL internal command. To delete a file

internal command DIR. To see a list of files / folders in the folder / directory MD certain internal command. To create a directory / folder internal command RD. To delete a folder (empty folder)
REN internal command. To rename a file / folder
    TYPE internal command. To view the content of external commands fileEDIT. To edit a text file (interactive)

  • external command FDISK. To view / change / create hard disk partitions image FORMAT external command. To format a floppy / hard disk
  • MORE To prevent the appearance of continuous rolling
  • External SYS what yes internal? What is clear to make a floppy / hard drive to be bootable DEBUG external command. To view / modify the contents of a file in hexadecimal format
REG external command. To view / change / delete key / value registry
taskkill external command. To stop / kill a process that is underway tasklist External command. To see a list of the ongoing process
ORDERS-ORDER BATCH


SEE LIST OF FILE: "DIR"
  • command "DIR" function to view the list of files / folders that are in directories or folders. Actually the command DIR command has many parameters that we can use to limit the list of files / folders that we want. Among others, these parameters we can use to specify files, folders or files and folders we wish to see in the directory / folders, and then determine whether we will display the files that are hidden or not, then sort by name, date, size, and forth. For a list of parameters and how to use it, type "DIR /?" And press Enter.
View a list of files / folders in the directory / folders 1
DIR (without parameters)
View a list of files only 2 DIR / ad
  • View a list of folders just
3 DIR / ad
  • View a list of hidden files
DIR / a-dh 4
    View a list of hidden folders
DIR / ADH 5
View a list of files / folders are hidden
  • DIR / ah

  • KNOW / MODIFY FILE ATTRIBUTES: "attrib"

For a list of parameters to the command "attrib", type "attrib /?".



Viewing attributes of files / folders


general format: attrib filename
Example: attrib readme.txt
To view the attributes of multiple files / folders, use the wildcard character (*) in the filename.



Change attributes of files / folders


daftaratribut attrib filename



List of valid attributes: H, R, S

Use the '-' in front of the code attribute to disable a specific attribute, use the '+' to enable a particular attribute. 6 Example usage: Change the README.TXT file attributes to be hidden attrib + h README.TXT 7 8 Enabling the hidden attribute as well as attributes of the system in the README.TXT file 9 attrib + h + s README.TXT

Disabling hidden attributes, read-only and system on all files in current directory (current directory). The combination of these attributes can be used to retrieve the files that are 'hidden', such as the impact of computer virus infection: 10 attrib-h-r-s *.* 11


Automatic Pet Wet Food

change pirated Windows XP into Genuine (Genuine) 3 BA



Tricks alter pirated Windows XP into Genuine (Genuine) 3
  • OS
,
Software
,
Valid
,
Validation OS
, 12 Xp

Blog-walking emang really useful, I met another interesting article. Trick to change Windows XP to be Original, previously I've been posting.
Tricks Windows XP pirated change into Genuine (Genuine) image [Version Serial number].
Tricks Windows XP pirated change into Genuine (Genuine) 2
[Software Version]. Now change the Windows XP Tricks pirated into Genuine (Genuine) 3 will discuss how to make XP to be original with different tricks, Direct aja deh .. read the full article
image This guide is intentionally made to me
LEGAL
  • the Windows XP OS in
proportional, not piracy loh. So this guide is to make OS Wndows XP on a number of our PCs that were previously using the installer that comes from a variety of versions so that we
MUST LEGAL

her or make her

BE LEGAL IN ACCORDANCE WITH THE LICENSE VLK we have. So here need 13 License VLK Official we buy in
LEGAL
also ... 14 VLK = Volume License Key

. Read more at: 15 http://en.wikipedia.org/wiki/Vlk

But even this can be done in the context 16 CRACKING (SN using VLK
circulating on the Internet), if you do this then there are 3 things to note and ponder it well:
1. Do we NOT ABLE to buy License 17 these? 2. Do we
NOT WANT License
buy them?
3. Are we indeed had Intention

using pirated software
...? 19 So ... please your own responsibility ...
Step By Step to make OS Windows XP we become LEGAL:

18 Pertamax:
Open the link below and download the Windows Genuine Advantage Tool

.
  • http://www.microsoft.com/genuine





Second:
Launch Application
    legitcheck.hta
  • that we downloaded it.



Third:
After installation is complete, it turns out my PC was detected as the OS is not genuine aka pirated. Weleh ... I so remember this if my PC Install Windows XP SP3 Vienna
7
, so obviously this reply tho
    XP version HACKER
  • ...
  • So ... just calm, I have prepared
SN VLK

we've bought since 2003
. Before there was
IPR loh
I already have a VLK as proof that we are able to appreciate
COPYRIGHT
    OTHERS, not for fear of sweeping
  • or in
obrak
loh. Hehehe ... the term Obrak'an kayak or Transvestite prostitutes Razia wrote ...


  • Fourth:
Then we can use the Tools

SN
to change their Windows XP
us with VLK SN
    that we have had using
  • Key Tool Finder, KeyReader, XP Key Reader
  • ,
Registry settings manually
OOBE and others.


http://www.4shared.com/file/113187648/361d3f09/Win_Key_Finder.html
http://www.4shared.com/file/113187657/bfb913d9/XP_Key_Reader.html







image

Fifth:
We can check the results SN
    substitute VLK
  • what if it was successful or not using
    Microsoft Genuine Advantage Diagnostic Tool
    can we download
here. OS Windows XP
    we have
  • Valid
  • . Good luck ...
image