Friday, May 25, 2007

Increase Internet Speed

Open regedit and perform following operations:

1. Go to


2. Create the following DWORD values by right clicking and select

New >> DWORD with the values given








Automatically Backup Firefox Bookmarks

I constantly need to reformat my hard drive to reinstall Windows. This is because I do a lot of software testing. After many installation and uninstallation of softwares, Windows will start to have weird errors and it's performing very slowly. It's nearly impossible to fix and the only way to have a fast system is to perform a clean Windows installation.

Before reformatting my hard drive, the most important task I need to perform is BACKUP. I need to backup my files and email. One thing a lot of people missed backing up is "bookmarks" or "favorites". I browse a lot of websites a day and I bookmark interesting or useful websites for future references. There was once I forgot to backup my bookmarks and it was disastrous! I couldn't find back the websites. Now, I ALWAYS remember to backup my bookmarks. To be on the safe side, here's a good way to AUTOMATICALLY backup your Firefox bookmarks.

he Foxmarks Bookmark Synchronizer is a Firefox extension which automatically synchronizes your bookmarks with foxmark's server. Then Foxmarks works silently in the background to keep your bookmarks up-to-date on all your computers. You only need to install the extension, create an account, and by default it will automatically synchronizes your bookmark whenever you shutdown Firefox. This way, you'll never lose your Firefox bookmarks ever again!

After you've installed Foxmarks, you can access the Foxmarks configuration from Firefox Bookmarks menu. Nothing much to do there because the default settings is perfect.

A very good feature of Foxmarks that is you can access your bookmarks from any computer anytime via

Foxmarks Bookmark Synchronizer slogan is "Simple. Solid. Free. And ready to use" which is very true. Truly a very simple yet powerful extension for Firefox.


Add your photos to My Computer Properties

1. Open Notepad.

2. Type the following:



Model=Aravinth Microsystems

[Support Information]

Line1= Your Ph No

Line2= Your Address


3. Save as "oeminfo.ini" in the System32 folder.(Without Quote)

4. Create a bmp file(Your Photo) and save it the System32 folder as "oemlogo.bmp"(Without Quote).

5. Now Check your My Computer Properties.

Make IE as fast as Firefox

Open registry editor by going to

Start --> Run

Type regedit

Navigate to key

HKEY_CURRENT_USER\Software\microsoft\Windows\ Current Version \InternetSettings

Right click on the right windows > New > DWORD.

Type MaxConnectionsPerServer > You can set value (the more higher the no, the more

good speed eg:99).

Create another DWORD >type MaxConnectionsPer1_0Server.

Then put a high value as mentioned above.

Restart I.E and you are done.

Fun in the Notepad

1. Open Notepad

2. Type the following:

this app can break

3. Save the file and Close.

4. Again Open the file and See the Magic

Increase Bandwidth by 20%

Microsoft reserves 20% of your available bandwidth for their own purposes like
Windows Updates and interrogating your PC etc.

Click Start then Run and type

"gpedit.msc" without quotes.

This opens the Group Policy Editor.

Then go to: Local Computer Policy --> Computer Configuration --> Administrative Templates --> Network --> QOS Packet Scheduler

Then double click LimitReservableBandwidth.

It will say it is not configured, but the truth is under the 'Explain' tab i.e."By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."

So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.

Block USB in Windows XP

1. Start -> Run -> regedit ->Find the Hkey_Local_Machine>System>Current Control set>Services>USBStor.

2. Look at the right pain and find out the Start where value of the start would be 0000000(3) edit the value by double mouse click and type 4 and save.

3. Restart your computer.

How Terrorists Hide Secret Messages in Images Part 2

It's a very cool trick but I believe that terrorist must have used this method to convey messages across the world. I just found out that it is possible to hide TEXT messages in any images file. It can be encrypted and the text can't be viewed easily. Hiding text in images is called Steganography is NOT something new. There are freewares that is capable of doing this and the release date is year 2005. Looks like I am a little outdated to know this technique! Continue reading if you're interested to know how to hide text messages in images.

If you search in Google on "Hide Messages in Images", you'll find a lot of program that can do this. Some are shareware and some are freeware. I've tested a few freewares and only 1 of it works fine in hiding messages inside images.

ImageHide is the one that gives me no problem in hiding text messages inside any image file.

It's very easy to hide text messages in images by using ImageHide. First, load any image you want. At the bottom of ImageHide, you can type your secret text. Once you've done that, click on "Write Data button" to insert the text message into your image. Finally, click on Save Image button to save your image in either BMP or PNG format.

To read the hidden text message, click the Load Image button. If there is text embedded into that image, it'll show the ImageHide version you've used to embed the text message, whether it's encrypted or not and also the data size

The image file size is much smaller if you hide text message instead of hide mp3. If a normal image with small scale has big file size, it can be suspicious. I tried inserting a text "This is a Hidden Message" into a PNG image file, surprisingly the file size is 2kb smaller than the original image file.

Hiding text messages in images is NOT only for terrorist use. If you're a graphic designer and someone used your images without your permission, you can sue them by having this very good proof. The person who ripped your images will have nothing to say if the image he has on his computer or website has hidden text that you placed.


How Terrorists Hide Secret Messages in Images

The process is steganography.Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message; this is in contrast to cryptography, where the existence of the message itself is not disguised, but the content is obscured. Quite often, steganography is hidden in pictures.

The word "Steganography" is of Greek origin and means "covered, or hidden writing". Its ancient origins can be traced back to 440 BC. Herodotus mentions two examples of Steganography in The Histories of Herodotus [1]. Demeratus sent a warning about a forthcoming attack to Greece by writing it on a wooden panel and covering it in wax. Wax tablets were in common use then as re-usable writing surface, sometimes used for shorthand. Another ancient example is that of Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians. Later, Johannes Trithemius's book Steganographia is a treatise on cryptography and steganography disguised as a book on black magic.

Generally, a steganographic message will appear to be something else: a picture, an article, a shopping list, or some other message. This apparent message is the covertext. For instance, a message may be hidden by using invisible ink between the visible lines of innocuous documents.

The advantage of steganography over cryptography alone is that messages do not attract attention to themselves, to messengers, or to recipients. An unhidden coded message, no matter how unbreakable it is, will arouse suspicion and may in itself be incriminating, as in countries where encryption is illegal.[2]

Steganography used in electronic communication include steganographic coding inside of a transport layer, such as an MP3 file, or a protocol, such as UDP.

A steganographic message (the plaintext) is often first encrypted by some traditional means, and then a covertext is modified in some way to contain the encrypted message (ciphertext), resulting in stegotext. For example, the letter size, spacing, typeface, or other characteristics of a covertext can be manipulated to carry the hidden message; only the recipient (who must know the technique used) can recover the message and then decrypt it. Francis Bacon is known to have suggested such a technique to hide messages (see Bacon's cipher).

Download Steganography Tools


The Biggest Secret Book

David Icke's most powerful and explosive book to date includes the astonishing background to the murder of Diana, Princess of Wales. Every man, woman and child on the planet is affected by the stunning information that Icke exposes. He reveals in documented, sourced detail, how the same interconnecting bloodlines have controlled the planet for thousands of years. How they created all the major religions and suppressed the spiritual and esoteric knowledge that will set humanity free from it's mental and emotional prisons.

It includes a devastating expose' of the true origins of Christianity and the other major religions and documents the suppressed science which explains why the world is facing a time of incredible change and transformation.

The Biggest Secret also exposes the true and astonishing background to the British Royal Family and, through enormous research and unique contacts, he reveals how and why Diana, Princess of Wales was murdered in Paris in 1997. This includes information from a close confidant of Diana for nine years which has never before been made public.

The Biggest Secret is a unique book and is quite rightly dubbed, "The book that will change the world". No one who reads it will ever be the same again.

WARNING: There is an enormous amount of challenging information in this book. Please do not continue if you are dependent on your present belief system, or if you feel you cannot cope emotionally with what is really happening in this world.

Download the book

IP Addresses - Contd.

An IP Address does not necessarily have to be represented in the dotted decimal form. There is more than a single way in which one can represent an IP Address. Some of there are as follows-:

1.Decimal System: If an IP Address is being represented in the Decimal system, then it means that it is being represented in the Base 10 system. The normal IP Addresses are represented in the Decimal System. Example:

2.Domain Name System: If an IP Address is being represented in the form of human recognizable characters and names then it is said to be in the form of DNS system. Example:

3.DWORD Format: DWORD is short for double word. It basically consists of two binary
"words" (or lengths) of 16 bits. However, it is almost always represented in the decimal number system i.e. having a base 10. Example: D8736CF5, which when represented in the form of a decimal number system with a Base 10 becomes 3631443189

4.Octal System: If an IP Address is represented in the octal system, then it means that it is being represented in the Base 8. Example: 33034666365

5.Hexadecimal System: If an IP Address is represented in the Hexadecimal System, then it is actually being represented in the Base 16 system.

6.A Cross Breed: If an IP Address is being represented in the mixture of any of the above two systems, then it is said to be a Cross Breed.

All the examples portrayed above are some form or the other of the same address of the same system. What I mean to say by this is that typing any of the following in your browser will take you to the same site:, 3631443189, 33034666365 and The Binary form of this address, which is 11011000011100110110110011110101 may also work with certain applications.

IP Addresses - Introduction

What is an IP Address?

Every system connected to the Internet or connected to a particular network has a unique Internet Protocol Address of an IP Address. Just as in the real world every person has his or her own Home Contact Address, similarly every system connected to the Internet has its own unique IP Address. Your IP Address is the address to which data should be sent to ensure that it reaches your system. The IP Address of a system acts as the system’s unique identity on the net.
Structure of an IP Address:

An Internet Address (IP Address) is a 32-bit address or number, which is normally written as four decimal numbers (of 8 bits each), each separated from the other by a decimal. This standard is known as the dotted-decimal notation.

For Example,

A Typical IP Address would be as follows:
It can be further broken down as:

192 representing the first 8-bits.
168 representing the next 8-bits.
1 representing the third 8-bits.
1 representing the fourth 8-bits.

Thus when considered together represents 32-bits. So basically we can conclude that each decimal in an IP Address represents 1 byte or 8 bits. It is important to note than an IP Address can contain numbers from 0-255.

There are a huge number of IP Addresses in use in the present day wired age. All these IP Addresses have some sort of relation with each other and each individual IP Address can reveal a lot of secrets about the Network, of which it is a part. Before we move on to that, we need to understand the fact that all IP Addresses being used are divided into a number of ranges, which are as follows:

Class Range

A to
B to
C to
D to
E to

We can easily conclude that one can find out the Class to which an IP Address belongs to simply by comparing the numeral before the first decimal of the IP Address with the above table.

For Example,
In The IP Address, the number before the first decimal is 192 and the above table tells us that it belongs to Class C of the range of IP addresses.

The various IP Addresses are divided into the different classes on the basis of the structure of their Network or in other words on the basis of what the various numbers separated by decimals actually stand for. To understand this, let us refer to the following:

Class Information

A It has the first 8-Bits for Netid and the last 24-bits for Hostid
B It has the first 16-Bits for Netid and the last 16-bits for Hostid
C It has the first 24-Bits for Netid and the last 8-bits for Hostid
D It represents a 32-bit multicast Group ID.
E Currently not being used.

The above table will be clearer after reading the following examples:

An IP Address belonging to Class A means that the network ID is 192 and the host ID is 168.1.1

If the Same IP Address belonged to Class B, then the network ID would become 192.168 and the host ID would become 1.1

And if it belonged to Class C then the network ID would become 192.168.1 and the host ID would become 1.
Almost all ISP’s prefer to use a Class B Network. If that is the case then each time you login to your ISP, then the first 2 octets of your IP Address would not change, while the last two are likely to change. However, even if only the last octet changes, and the remaining three remain constant, it is likely that the ISP uses Class B addressing.

How do you find out the IP Address of your own system?

In order to get your own IP Address all you have do is, follow the below process:

1. Connect to the Internet.
2. Launch MSDOS.
3. Type: netstat –n at the prompt.

You will get an output similar to the below:

C:\WINDOWS>netstat -n

Active Connections

Proto Local Address Foreign Address State


The IP Address shown under the Local Address Field denotes the IP address of your system.

An IP Address, which belongs to the Class-A addressing system having a network ID equal to 127, is referred to as the special address. It is actually known as the Loopback Interface. It allows clients and servers on the same system to communicate with each other.

The loopback address, which is commonly used, is Almost all systems have also given the loopback address the special name ‘localhost’.

Look out for the next post for various forms of IP Addresses.......

Read More