Tuesday, February 27, 2007

All File Formats Ever Known "Dictionary"

All File Formats Ever Known "Dictionary"





Somebody Asked me What Are the File Formats ?



Heres d complete list !


A - I


Click here to visit J - Z


ABK
Corel Draw AutoBackup
ACL
Corel Draw 6 keyboard accelerator
ACM
Used by Windows in the system directory
ACP
Microsoft Office Assistant Preview file
ACT
Microsoft Office Assistant Actor file
ACV
OS/2 drivers that compress and decompress audio data
AD
After Dark screensaver
ADB
Appointment database used by HP 100LX organizer
ADD
OS/2 adapter drivers used in the boot process
ADM
After Dark MultiModule screensaver
ADP
Used by FaxWorks to do setup for fax modem interaction
ADR
After Dark Randomizer screensaver
AFM
Adobe font metrics
AF2
ABC Flowchart file
AF3
ABC Flowchart file
AI
Adobe Illustrator drawing
AIF
Apple Mac AIFF sound
ALB
JASC Image Commander album
ALL
Arts & Letters Library
AMS
Velvert Studio music module (MOD) file
ANC
Canon Computer Pattern Maker file that is a selectable list of pattern colors
ANI
Animated Cursor
ANS
ANSI text
API
Application Program Interface file; used by Adobe Acrobat
APR
Lotus Approach 97 file
APS
Microsoft Visual C++ file
ARC
LH ARC (old version) compressed archive
ARJ
Robert Jung ARJ compressed archive
ART
Xara Studio drawing
ART
Canon Crayola art file
ASA
Microsoft Visual InterDev file
ASC
ASCII text
ASD
WinWord AutoSave
ASM
Assembler language source file
ASP
Active Server Page (an HTML file containing a Microsoft server-processed script)
ASP
Procomm Plus setup and connection script
AST
Claris Works "assistant" file
ATT
AT&T Group 4 bitmap
AVI
Microsoft Video for Windows movie
AWD
FaxView document
BAK
Backup file
BAS
BASIC code
BAT
Batch file
BFC
Windows 95 Briefcase document
BG
Backgammon for Windows game
BI
Binary file
BIF
GroupWise initialization file
BIN
Binary file
BK
Sometimes used to denote backup versions
BK$
Also sometimes used to denote backup versions
BKS
An IBM BookManager Read bookshelf
BMK
An A bookmark file
BMP
Windows or OS/2 bitmap
BM1
Apogee BioMenace data file
BRX
A file for browsing an index of multimedia options
BSP
Quake map
BS1
Apogee Blake Stone data file
BTM
Batch file used by Norton Utilities
B4
Helix Nuts and Bolts file
C
C code
CAB
Microsoft cabinet file (program files compressed for software distribution)
CAL
CALS Compressed Bitmap
CAL
Calendar schedule data
CAS
Comma-delimited ASCII file
CAT
IntelliCharge categorization file used by Quicken
CB
Microsoft clean boot file
CCB
Visual Basic Animated Button configuration
CCF
Multimedia Viewer configuration file used in OS/2
CCH
Corel Chart
CCM
Lotus CC:Mail "box" (for example, INBOX.CCM)
CDA
CD Audio Track
CDF
Microsoft Channel Definition Format file
CDI
Phillips Compact Disk Interactive format
CDR
Core Draw drawing
CDT
Corel Draw template
CDX
Corel Draw compressed drawing
CEL
CIMFast Event Language file
CFB
Comptons Multimedia file
CFG
Configuration file
CGI
Common Gateway Interface script file
CGM
Computer Graphics Metafile
CH
OS/2 configuration file
CHK
File fragments saved by Windows Disk Defragmenter or ScanDisk
CHP
Ventura Publisher chapter
CIL
Clip Gallery download package
CIM
Sim City 200 file
CIN
OS/2 change control file that tracks changes to an INI file
CK1
iD/Apogee Commander Keen 1 data file
CK2
iD/Apogee Commander Keen 2 data file
CK3
iD/Apogee Commander Keen 3 data file
CK4
iD/Apogee Commander Keen 4 data file
CK5
iD/Apogee Commander Keen 5 data file
CK6
iD/Apogee Commander Keen 6 data file
CLASS
Java class
CLP
Windows Clipboard file
CLS
Visual Basic Class Module
CMD
Command file for Windows NT (similar to a DOS .BAT file)
CMD
DOS CP/M command file
CMD
dBase-II program file
CMF
Corel Metafile
CMP
JPEG Bitmap
CMP
Address document
CMV
Corel Move animation
CMX
Corel Presentation Exchange image
CNF
Configuration file used by Telnet, Windows, and other applications
CNM
Windows application menu options and setup file
CNQ
Compuworks Design Shop file
CNT
Windows (or other) system content files for the help index and other purposes
COB
trueSpace2 object
COD
Microsoft C compiler output as displayable assembler with original C as comments
COM
Command file (program)
CPD
Fax Cover document
CPE
Fax Cover document
CPI
Microsoft MS-DOS code page information file
CPL
Control Panel extension
CPL
Corel colour palette
CPP
C++ code
CPR
Corel Presents Presentation
CPT
Corel Photo-Paint image
CPX
Corel Presentation Exchange Compressed drawing
CRD
Cardfile file
CRP
Corel Presents Run-Time Presentation
CRT
Certificate file
CSC
Corel Script
CSP
PC Emcee On-Screen image
CSV
Comma-separated values file
CT
Scitex CT Bitmap
CTL
Used in general to mean a file containing control information.
CUE
Microsoft Cue Cards data
CUR
Windows Cursor
CUT
Dr Halo bitmap
CV
Corel Versions archive
CV
Microsoft CodeView information screen
CWK
Claris Works data file
CWS
Claris Works template
CXX
C++ source code file
DAT
Data file
DAT
WordPerfect Merge Data
DBF
Aston-Tate dBASE database
DBX
DataBeam image
DCR
Shockwave file
DCS
Desktop Color Separation file
DCX
Fax image (based on PCX)
DDF
BTRIEVE database
DEF
SmartWare II data file
DEF
C++ Definition
DER
Certificate file
DIB
Device-Independent Bitmap
DIC
Dictionary
DIF
Data Interchange Format spreadsheet
DIR
Macromedia Director file
DIZ
Description file
DLG
C++ Dialogue Script
DLL
Dynamic-Link Library
DMF
X-Trakker music module (MOD) file
DOC
FrameMaker or FrameBuilder document
DOC
WordStar document
DOC
WordPerfect document
DOC
Microsoft Word document
DOT
Microsoft Word document Template
DPR
Borland Delphi project header file
DRV
Driver
DRW
Micrografx Designer/Draw
DSG
DooM saved game
DSM
Dynamic Studio music module (MOD) file
DSP
Microsoft Developer Studio project
DSQ
Corel QUERY file
DSW
Microsoft Developer Studio workspace
DWG
AutoCAD drawing eXchange format
DXF
AutoDesk Drawing Interchange format
EMF
Enhanced Windows Metafile
ENC
Encore file
EPS
Encapsulated PostScript image
ER1
ERWin file
ERX
ERWin file
EVY
Envoy document
EWL
Microsoft Encarta document
EXE
Executable file (program)
F
FORTRAN file
F77
FORTRAN file
F90
FORTRAN file
FAR
Farandole Composer music module (MOD) file
FAV
Microsoft Outlook navigation bar
FAX
FAX Type image
FH3
Aldus Freehand 3 drawing
FIF
Fractal image file
FITS
CCD camera image
FLC
AutoDesk FLIC animation
FLI
AutoDesk FLIC animation
FLT
Corel filter
FLT
StarTrekker music module (MOD) file
FMB
Oracle binary source code for form, version 4.0 and later
FMT
Oracle text format of form, version 4.0 and later
FMT
Microsoft Schedule+ print file
FMX
Oracle executable form, version 4.0 and later
FOG
Fontographer font
FON
System font
FOR
FORTRAN file
FOT
Font-related file
FP
FileMaker Pro file
FP1
Flying Pigs for Windows data file
FP3
FileMaker Pro file
FPX
FlashPix bitmap
FRM
Form
FRM
FrameMaker or FrameBuilder document
FRM
Oracle executable form version 3.0 and earlier
FRM
Visual Basic form
FRM
WordPerfect Merge form
FRX
Visual Basic form stash file
GAL
Corel Multimedia Manager album
GCP
Ground Control Point file used in image processing of remote sensing data .
GED
Graphic Environment Document (drawing)
GEM
GEM metafile
GEN
Ventura-Generated text file
GFC
Patton&Patton Flowcharting 4 flowchart file
GFI
Genigraphics Graphics Link presentation
GFX
Genigraphics Graphics Link presentation
GID
Windows 95 global index file (containing help status)
GIF
CompuServe bitmap
GIM
Genigraphics Graphics Link presentation
GIX
Genigraphics Graphics Link presentation
GNA
Genigraphics Graphics Link presentation
GNX
Genigraphics Graphics Link presentation
GRA
Microsoft Graph
GRD
Grid file, used in image processing of remote sensing data often to form map projections.
GRP
Program Manager Group
GTK
Graoumftracker (old) music module (MOD) file
GT2
Graoumftracker (new) music module (MOD) file
GWX
Genigraphics Graphics Link presentation
GWZ
Genigraphics Graphics Link pres
H
C program header
HED
HighEdit document
HEL
Microsoft Hellbender saved game
HEX
Macintosh BinHex 2.0 file
HGL
HP Graphics Language drawing
HLP
Help file
HOG
Lucas Arts Dark Forces WAD file
HPJ
Visual Basic Help Project
HPP
C++ program header
HQX
Macintosh BinHex 4.0 file
HST
History file
HT
HyperTerminal
HTM
Hypertext document
HTML
Hypertext document
HTX
Extended HTML template
ICA
Citrix file
ICB
Targa bitmap
ICM
Image Color Matching profile file
ICO
Windows Icon
IDD
MIDI Instrument Definition
IDQ
Internet Data Query file
IFF
Amiga ILBM
IGF
Inset Systems metafile
IIF
QuickBooks for Windows interchange file
IMA
WinImage file
IMG
GEM image
INC
Assembler language or Active Server include file
INF
Information file
INI
Initialization file
INP
Oracle source code for form, version 3.0 and earlier
INS
InstallShield install script
INS
X-Internet sign-up file
ISO
Lists the files on a CD-ROM; based on the ISO 9660 CD-ROM file system standard
ISP
X-Internet sign-up file
ISU
InstallShield uninstall script
IT
Impulse Tracker music module (MOD) file
IW
Idlewild screensaver

By Rajendra

All Dos Commands

ADDUSERS Add or list users to/from a CSV file
ARP Address Resolution Protocol
ASSOC Change file extension associations
ASSOCIAT One step file association
AT chedule a command to run at a later time
ATTRIB Change file attributes

BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info

CACLS Change file permissions
CALL Call one batch program from another
CD Change Directory - move to a specific Folder
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP Copy STDIN to the Windows clipboard.
CLS Clear the screen
CLUSTER Windows Clustering
CMD Start a new CMD shell
COLOR Change colors of the CMD window
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT Connect or disconnect a Printer
CONVERT Convert a FAT drive to NTFS.
COPY Copy one or more files to another location
CSVDE Import or Export Active Directory data

DATE Display or set the date
Dcomcnfg DCOM Configuration Utility
DEFRAG Defragment hard drive
DEL Delete one or more files
DELPROF Delete NT user profiles
DELTREE Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR Display a list of files and folders
DIRUSE Display disk usage
DISKCOMP Compare the contents of two floppy disks
DISKCOPY Copy the contents of one floppy disk to another
DNSSTAT DNS Statistics
DOSKEY Edit command line, recall commands, and create macros
DSADD Add user (computer, group..) to active directory
DSQUERY List items in active directory
DSMOD Modify user (computer, group..) in active directory

ECHO Display message on screen
ENDLOCAL End localisation of environment changes in a batch file
ERASE Delete one or more files
EXIT Quit the CMD shell
EXPAND Uncompress files
EXTRACT Uncompress CAB files

FC Compare two files
FDISK Disk Format and partition
FIND Search for a text string in a file
FINDSTR Search for strings in files
FOR Conditionally perform a command several times
FORFILES Batch process multiple files
FORMAT Format a disk
FREEDISK Check free disk space (in bytes)
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE Display or modify file types used in file extension associations

GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line

HELP Online Help
HFNETCHK Network Security Hotfix Checker

IF Conditionally perform a command
IFMEMBER Is the current user in an NT Workgroup
IPCONFIG Configure IP

KILL Remove a program from memory

LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the NT event viewer.
LOGOFF Log a user off
LOGTIME Log the date and time in a file

MAPISEND Send email from the command line
MEM Display memory usage
MD Create new folders
MODE Configure a system device
MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO Windows NT diagnostics
MSTSC Terminal Server Connection (Remote Desktop Protocol)
MUNGE Find and Replace text within file(s)
MV Copy in-use files

NET Manage network resources
NETDOM Domain Manager
NETSH Configure network protocols
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights

PATH Display or set a search path for executable files
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a message
PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Restore the previous value of the current directory saved by PUSHD
PORTQRY Display the status of ports and services
PRINT Print a text file
PRNCNFG Display, configure or rename a printer
PRNMNGR Add, delete, list printers set the default printer
PROMPT Change the command prompt
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource sharing)
PsLog List Event log records
PsPasswd Change account password
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory

QGREP Search file(s) for lines that match a given pattern.

RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk.
REG Read, Set or Delete registry keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file
REN Rename a file or files.
REPLACE Replace or update one file with another
RD Delete folder(s)
RDISK Create a Recovery Disk
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)

SC Service Control
SCHTASKS Create or Edit Scheduled Tasks
SCLIST Display NT Services
ScriptIt Control GUI applications
SET Display, set, or remove environment variables
SETLOCAL Begin localisation of environment changes in a batch file
SETX Set environment variables permanently
SHARE List or edit a file share or print share
SHIFT Shift the position of replaceable parameters in a batch file
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the NT Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
SLEEP Wait for x seconds
SOON Schedule a command to run in the near future
SORT Sort input
START Start a separate window to run a specified program or command
SU Switch User
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST Associate a path with a drive letter
SYSTEMINFO List system configuration

TASKLIST List running applications and services
TIME Display or set the system time
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TYPE Display the contents of a text file

USRSTAT List domain usernames and last login

VER Display version information
VERIFY Verify that files have been saved
VOL Display a disk label

WHERE Locate and display files in a directory tree
WHOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINMSD Windows system diagnostics
WINMSDP Windows system diagnostics II
WMIC WMI Commands

XCACLS Change file permissions
XCOPY Copy files and folders

i recommend for all dos commands visit
http://www.ss64.com/nt/

By Rajendra

How to Break Into Email Accounts

How to Break Into Email Accounts


Disclaimer :

I do not endorse Hacking !
This is meant for educational purpose only !
I want u to know how others can try break into your Personal life !
Beware !!


This is a Genuine Article.

Will try to add in as much as possible
keep posting !
comment on this article !

Introduction



I have written this tutorial to address a question that is all too commonly asked in any channel/chat room with "hack" in the title (asked in frequency to the point of harrassment really). So since this is a question that so many people ask, then I believe that there should at least be an answer available (regardless of the morality or "lameness" of such a question). So you as the reader are most likely reading this because you want to break into somebody's email account.


Well, you must understand that there is no 1-2-3 process to anything. I will give you options to consider when persuing such a task, but it will ultimately be up to you to do this. This is what you want to do, and no matter what sort of offers you throw up at anybody, nobody is going to do this for you. There is no program that is going to do all this for you. Also don't forget that nobody is going to hold your hand and lead you through this. I'm offering you as the reader suggestions for ways you can address this task, and that is about all the help you are going to get from anybody. So now that I've made all that clear, let's begin...


Things You Should Know



As I mentioned in the previous section, there is no program that will do all this for you. Almost all the crackers you see out there will not work, because services like Hotmail, Yahoo!, etc. have it set so that it will lock you from that account after a certain number of login attempts. There are some rare exceptions, like some crackers for Yahoo! that are made for cracking "illegal" accounts, but the thing you must understand about those types of crackers is that they are built to crack SPECIFICALLY "illegal" names. They can not be used to target a specific account on Yahoo!, so don't try to use them for this purpose. Another thing you must know if you ask this question in any "hacker" chat room/channel (which I highly discourage), or if you read something on this topic, and you hear that you have to email some address and in any way have to give up your password in the process, do NOT believe this. This is a con used to trick gullible people into handing over their passwords. So don't fall for this. Well that concludes this section, now lets get to what you want to know.


If You Have Physical Access



I will start off with options you have if you have physical access to the computer of the user that you are targeting, because it is a lot easier if you do. One option you have, that you will hear a lot if you ask this question, and anybody bothers to answer is to use a keylogger. A keylogger is an excellent option, and probably the easiest. There are a lot of keyloggers out there, ranging from hardware keyloggers, to software keyloggers. For this task, you won't need to buy a hardware keylogger, since the only advantage to a hardware one is that you can grab passwords that are given to access a certain local user on the operating system used. There are a lot of software keyloggers out there, and you can feel free to check out www.google.com to look at your options. I will go ahead and toss a couple of keyloggers out to try for those of you who seem allergic to search engines.


One option you have that is good for a free keylogger is Perfect Keylogger (which you can find at www.blazingtools.com/bpk.html). It works just fine, and has some nice options to keep it hidden from your average end user (computer user).


Another option you have, which is probably the best one you can get is Ghost Keylogger. It has a lot of options that will allow you to get the results of this program remotely (it will email you the results). However, this is not a free keylogger, so if you are wanting to get a copy you can look on the file sharing networks for a copy of the program, and the serial number for it (look on www.zeropaid.com for different file sharing clients you can try).


Once you have whatever keylogger you are going to use downloaded, just install it onto the computer you are wanting to monitor, and wait till next time they login to their email account. You will then have the password for the account. Another option you have if they use Outlook to access their email account, is to copy the *.dbx files for their Outlook account onto a floppy, and extract the emails at home (the dbx file stores the files stored in each Outlook folder on a given account, meaning the received and sent emails). When you are on the computer of the user you are targeting, look in

C:\Windows\ApplicationData\Identities\{ACblahblahblah}\Microsoft\ OutlookExpress\ and copy all the .dbx files onto a floppy. Then when you take the .dbx files back to your house, use DBXtract to extract the messages from these files. Check out the link below to download this program....


www.download-freeware-shareware.com/Freeware-Internet.php?Type=4171




Another option you have if you have physical access is to execute a RAT (Remote Administration Tool, you may know these programs as trojans) server on the computer. Of course, you do not have to have physical access to go this route, but it helps. What you must understand is that these tools are known threats, and the popular ones are quickly detected by antivirus software, and thusly taken care of. Even ISPs block incoming/outgoing traffic from the most popular ports used by these programs.



One newcomer in the RAT market that you should know about is Project Leviathan. This program uses already existing services to host it's service, instead of opening up an entirely new port. This allows it to hide itself from any port detection tool/software firewall that may be in place. This of course will not guarantee that it's server program will not be detected by any antivirus software used (actually, if the user has kept up with his/her signature tables, then it WILL be detected), but it will give you more of a chance of holding access. Search the engines to download Project Leviathan...




Once you have downloaded this tool, follow the instructions listed to install and use this program. However, since this RAT is a command line tool, you will still need another program set up on the user's computer in order to catch the desired password. For this, you can use Password Logger.. Google it




Once you have this downloaded, set it up on the targeted computer. The program will remain hidden, while logging any types of passwords into a .lst file in the same directory that you executed it on. Therefore, you can access this *.lst file through Project Leviathan remotely in order to retrieve the user's email password remotely. Well that pretty much concludes it for this section. At this very moment I can practically hear a lot of you thinking to yourselves "But, but I don't HAVE physical access!". No reason to worry, that's what the next section is for...



If You Don't Have Physical Access




Well of course most of you out there will say that you don't have physical access to your target's computer. That's fine, there still are ways you can gain access into the desired email account without having to have any sort of physical access. For this we are going to go back onto the RAT topic, to explain methods that can be used to fool the user into running the server portion of the RAT (again, a RAT is a trojan) of your choice. Well first we will discuss the basic "send file" technique. This is simply convincing the user of the account you want to access to execute the server portion of your RAT.


To make this convincing, what you will want to do is bind the server.exe to another *.exe file in order to not raise any doubt when the program appears to do nothing when it is executed. For this you can use the tool like any exe file to bind it into another program (make it something like a small game)...



On a side note, make sure the RAT of your choice is a good choice. The program mentioned in the previous section would not be good in this case, since you do need physical access in order to set it up. You will have to find the program of your choice yourself (meaning please don't ask around for any, people consider that annoying behavior).


If you don't like any of those, I'm afraid you are going to have to go to www.google.com, and look for some yourself. Search for something like "optix pro download", or any specific trojan. If you look long enough, among all the virus notification/help pages, you should come across a site with a list of RATs for you to use (you are going to eventually have to learn how to navigate a search engine, you can't depend on handouts forever). Now back to the topic at hand, you will want to send this file to the specified user through an instant messaging service.


The reason why is that you need the ip address of the user in order to connect with the newly established server. Yahoo! Messenger, AOL Instant Messenger, it really doesn't matter. What you will do is send the file to the user. Now while this transfer is going on you will go to Start, then Run, type in "command", and press Enter. Once the msdos prompt is open, type in "netstat -n", and again, press enter. You will see a list of ip addresses from left to right. The address you will be looking for will be on the right, and the port it's established on will depend on the instant messaging service you are using. With MSN Messenger it will be remote port 6891, with AOL Instant Messenger it will be remote port 2153, with ICQ it will be remote port 1102, 2431, 2439, 2440, or 2476, and with Yahoo! Messenger it will be remote port 1614.


So once you spot the established connection with the file transfer remote port, then you will take note of the ip address associated with that port. So once the transfer is complete, and the user has executed the server portion of the RAT, then you can use the client portion to sniff out his/her password the next time he/she logs on to his/her account.


Don't think you can get him/her to accept a file from you? Can you at least get him/her to access a certain web page? Then maybe this next technique is something you should look into.


Currently Internet Explorer is quite vulnerable to an exploit that allows you to drop and execute .exe files via malicious scripting within an html document. For this what you will want to do is set up a web page, make sure to actually put something within this page so that the visitor doesn't get too entirely suspicious, and then imbed the below script into your web page so that the server portion of the RAT of your choice is dropped and executed onto the victim's computer...




While you are at it, you will also want to set up an ip logger on the web page so that you can grab the ip address of the user so that you can connect to the newly established server. Here is the source for a php ip logger you can use on your page...


http://www.planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=539&lngWId=8


Just insert this source into your page along with the exedrop script, and you are set. Just convince the user to go to this page, and wait till the next time they type in their email password. However, what do you do if you can not contact this user in any way to do any of the above tricks. Well, then you definately have your work cut out for you. It doesn't make the task impossible, but it makes it pretty damn close to it. For this we will want to try info cracking. Info cracking is the process of trying to gather enough information on the user to go through the "Forgot my Password" page, to gain access into the email account.

If you happen to know the user personally, then it helps out a lot. You would then be able to get through the birthday/ zipcode questions with ease, and with a little mental backtracking, or social engineering (talking) out the information from the user be able to get past the secret question. However, what do you do if you do not have this luxury? Well in this case you will have to do a little detective work to fish out the information you need.

First off, if a profile is available for the user, look at the profile to see if you can get any information from the profile. Many times users will put information into their profile, that may help you with cracking the account through the "Forgot my Password" page (where they live, their age, their birthday if you are lucky). If no information is provided then what you will want to do is get on an account that the user does not know about, and try to strike conversation with the user. Just talk to him/her for a little while, and inconspicuously get this information out of the user (inconspicuously as in don't act like you are trying to put together a census, just make casual talk with the user and every once in a while ask questions like "When is your birthday?" and "Where do you live?", and then respond with simple, casual answers).


Once you have enough information to get past the first page, fill those parts out, and go to the next page to find out what the secret question is. Once you have the secret question, you will want to keep making casual conversation with the user and SLOWLY build up to asking a question that would help you answer the secret question. Don't try to get all the information you need in one night or you will look suspicious. Patience is a virtue when info cracking. Just slowly build up to this question. For example, if the secret question is something like "What is my dog's name?", then you would keep talking with the user, and eventually ask him/her "So how many dogs do you have? ...Oh, that's nice. What are their names?". The user will most likely not even remember anything about his/her secret question, so will most likely not find such a question suspicious at all (as long as you keep it inconspicuous). So there you go, with a few choice words and a little given time, you have just gotten the user to tell you everything you need to know to break into his/her email account. The problem with this method is that once you go through the "Forgot my Password" page, the password will be changed, and the new password will be given to you. This will of course deny the original user access to his/her own account. But the point of this task is to get YOU access, so it really shouldn't matter. Anyways, that concludes it for this tutorial. Good luck...

By Rajendra

Mobile Cheat Stuff

Mobile Cheat Stuff


NOKIA



1 Imagine ur cell battery is very low, u r expecting an important call and u don't have a charger.

Nokia instrument comes with a reserve battery. To activate, key is "*3370#"

Ur cell will restart with this reserve and ur instrument will show a 50% incerase in battery.

This reserve will get charged when u charge ur cell next time.

*3370# Activate Enhanced Full Rate Codec (EFR)-Your phone uses the best sound quality but talk time is reduced by approx. 5%
#3370# Deactivate Enhanced Full Rate Codec( EFR)


*#4720# Activate Half Rate Codec - Your phone uses a lower quality sound
but you should gain approx 30% more Talk Time
*#4720# Deactivate Half Rate Codec

2 *#0000# Displays your phones software version,

1st Line :S oftware Version,
2nd Line : Software Release Date,
3rd Line : Compression Type
3 *#9999# Phones software v ersion if *#0000# does not work

4 *#06# For checking the International Mobile Equipment Identity (IMEI Number)

5 #pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

6 #pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

7 #pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

8 #pw+1234567890+4# SIM Card Lock Status.(use the "*" button to obtain the "p,w" and "+" symbols)

9 *#147# (vodafone) this lets you know who called you last *#1471# Last call (Only vodofone)

10 *#21# Allows you to check the number that "All Calls" are diverted To

11 *#2640# Displays security code in use


12 *#30# Lets you see the private number

13 *#43# Allows you to check the "Call Waiting" status of your phone.

14 *#61# Allows you to check the number that "On No Reply" calls are diverted to

15 *#62# Allows you to check the number that "Divert If Unrea chable(no service)" calls are diverted to

16 *#67# Allows you to check the number that "On Busy Calls" are diverted to

17 *#67705646#R emoves operator logo on 3310 & 3330

18 *#73# Reset phone timers and game scores

19 *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature "SIM Clock Stop Allowed", it
means you will get the best standby time possible

20 *#7760# Manufactures code

21 *#7780# Restore factory settings

22 *#8110# Software version for the nokia 8110

23 *#92702689# (to rember *#WAR0ANTY#)

Displays -
1.Serial Number,
2.Date Made
3.Purchase Date,
4.Date of last repair (0000 for no repairs),
5.Transfer User Data.
To exit this mode -you need to switch your phone off then on again

24 *#94870345123456789# Deactivate the PWM-Mem

25 **21*number# Turn on "All Calls" diverting to the phone number entered

26 **61*number# Turn on "No Reply" diverting to the phone number entered

27 **67*number# Turn on "On Busy" diverting to the phone number entered

Each command is prefixed with either one or two * or # characters as follows:
** Register and Activate
* Activate
## De-Register (and Deactivate)
# Deactivate
*# Check Status
© Call button



Once each command has been entered, if it is a network command (as opposed to a local handset command) it must be transmitted to the network by pressing the YES (receiver) key which acts as an enter key - this is represented here with the © character. Always enter numbers in full international format +CountryAreaNumber ( e.g. +447712345678).

Command Description Command String
Security
Change call barring code **03*OldCode*NewCode*NewCode#©
Change call barring code **03*330*OldCode*NewCode*NewCode#©
Change PIN code **04*OldPIN*NewPIN*NewPIN#©
Change PIN2 code **042*OldPIN2*NewPIN2*NewPIN2#©
Unlock PIN code (when PIN is entered wrong 3 times) **05*PUK*NewPIN*NewPIN#©
Unlock PIN2 code (when PIN2 is entered wrong 3 times) **052*PUK2*NewPIN2*NewPIN2#©
Display IMEI *#06#
Call Forwarding (Diversions)
De-register all call diversions ##002#©
Set all configured call diversions to number and activate **004*number#©
De-register all configured call diversions (no answer, not reachable, busy) ##004#©
Unconditionally divert all calls to number and activate **21*number#©
Activate unconditionally divert all calls *21#©
De-register unconditionally divert all calls ##21#©
Deactivate unconditionally divert all calls #21#©
Check status of unconditionally divert all calls *#21#©
Divert on no answer to number and activate **61*number#©
Activate divert on no answer *61#©
De-register divert on no answer ##61#©
Deactivate divert on no answer #61#©
Check status of divert on no answer *#61#©
Divert on not reachable to number and activate **62*number#©
Activate divert on not reachable *62#©
De-register divert on not reachable ##62#©
Deactivate divert on not reachable #62#©
Check status of divert on not reachable *#62#©
Divert on busy to number and activate /td> **67*number#©<
Activate divert on busy *67#©
De-register divert on busy ##67#©
Deactivate divert on busy #67#©
Check status of divert on busy *#67#©
Change number of seconds of ringing for the given service before diverting a call (such as on no answer). Seconds must be a value from 5 to 30. De-registering the same divert will also delete this change! **service*number**seconds#© (Service numbers, see below)
Call barring
Activate barr all outgoing calls (see Security to set code) **33*code#©
Deactivate barr all outgoing calls #33*code#©
Check status of barr all outgoing calls *#33#©
Activate barr all calls **330*code#©
Deactivate barr all calls #330*code#©
Check status of barr all calls /td> *#330*code#©<
Activate barr all outgoing international calls **331*code#©
Deactivate barr all outgoing international calls #331*code#©
Check status of barr all outgoing international calls *#331#©
Activate barr all outgoing international calls except to home country **332*code#©
Deactivate barr all outgoing international calls except to home country #332*code#©
Check status of barr all outgoing international calls except to home country *#332#©
Activate barr all outgoing calls **333*code#©
Deactivate barr all outgoing calls #333*code#©
Check status of barr all outgoing calls *#333#©
Activate barr all incoming calls **35*code#©
Deactivate barr all incoming calls #35*code#©
Check status of barr all incoming calls *#35#©
Activate barr all incoming calls when roaming **351*code#©
Deactivate barr all incoming calls when roaming #351*code#©
Check status of barr all incoming calls when roaming *#351#©
Activate barr all incoming calls **353*code#©
Deactivate barr all incoming calls #353*code#©
Check status of barr all incoming calls *#353#©
Call waiting
Activate call waiting *43*#©
Deactivate call waiting #43##©
Check status of call waiting *#43#©
Calling Line Identification
The following only works if CLIP and CLIR are enabled (ask your service provider)
CLIP: Presentation of the number of the incoming call
Activate CLIP **30#©
Deactivate CLIP ##30#©
Check status of CLIP *#30#©
CLIR: Presentation of one's own number to the to the called party
Activate CLIR **31#©
Activate CLIR for the actual call *31#number©
Deactivate CLIR ##31#©
Deactivate CLIR for the actual call #31#number©
Check status of CLIR *#31#©
COLP: Presentation of the actual number reached (if number called was diverted to another number
Activate COLP *76#©
Deactivate COLP #76#©
Check status of COLP *#76#©
COLR: Presentation of the original number called by the calling party (if the call was diverted to this cellphone)
Activate COLR *77#©
Deactivate COLR #77#©
Check status of COLR *#77#©


By Rajendra

How to Clone a Hard Drive

How to Clone a Hard Drive



How to Clone a Hard Drive


Did know that you could clone your current Hard Drive without having to by extra software? Maybe you didn't know that all that you needed, was already set up on your current system? Well, it is... and if you follow this tut, you shouldn't have much of a problem.


Make sure that you have a Master and a Slave setup on your system. The Slave drive, in this case, is where all the data on the Master is going to go to.

First: Perform a Scandisk your Master drive and follow that with a thorough Defrag. If you have an Antivirus program, do a thorough sweep with the AV first, then do the Scandisk, followed by the Defrag.

Second: Do the same thing to the target drive, as you did the Master: Scandisk then a thorough Defrag.

Third: Right-click on the Target drive and click on Format. When the box comes up, click your mouse onto the "Full" button.

Fourth: After Formatting the Target drive, run a Scandisk again and click on the button that says "Autofix Errors".

Fifth: In this final part, you might want to cut-and-paste to code in, unless you are sure that you can do it without making any mistakes:

Click on the "Start" button, then click on the "Run..." button, then place the following into the Runbox:

"XCOPY C:\*.*D:\ /c/h/e/k/r" (minus the quotes, of course) then press the "Enter" button.

If you receive an error message, then remove the space from between XCOPY and C:\

Anything that should happen to come up in the DOS box, just click "Y" for "Yes". When its all finished, pull the original Master from the system, designate the Slave as the Master (change your jumpers), then check your new Master out.

This tut has worked and has been tested on all systems except for Windows 2000, so you really shouldn't have any problems. If, by any chance, you should come across a snag, message me and I'll walk you through it.

By Rajendra

Free Wap-Gateway

IMP: Its sad to note that couple of users have used our wap gateway to Spam other websites. We have got a notice form our ISP in this regards. We are trying to track this users down and till that time our wap gateway wont be functional. We are also looking providing secure services so that spammers dont access our wap gateway. Kindly email your suggestions/feedback at info@wap-gateway.com so we can come up with some kind of solution for this issue.

Wap-Gateway.com is a free WAP gateway open to anyone with a compatible WAP enabled Mobile phone or Emulator. It's built on open source software and backed by fast internet connectivity (dedicated web servers.)

Connection Details:

The Wap Gateway's IP address is 66.36.250.14, which can be set in your phone along with the standard wap port 9200. The port you should use, as well as setup instructions, vary from phone to phone.

Please note that this gateway does NOT work with all phones. If your phone uses a standard internet proxy server for mobile web access, typically indicated by the use of port 80 or 8080, Wap-Gateway.com won't be able to help you. Wap-Gateway.com also only works with the unencrypted version of the connectionless (port 9200) and connection oriented (port 9201) WAP modes. It does not work with the encrypted version (ports 9202 and 9203.)

You may not use this gateway for spam, any illegal purpose, or if your wireless service provider forbids you from using an alternate WAP gateway.

SUPPORT: Wap-Gateway user community actively helps Wap-Gateway users to configure their phones and use the Wap-Gateway service. Should you have any problem, please refer to the Wap-Gateway discussion forum on SMSIndia.com.

WARNING: Use this service at your own risk. Wap-Gateway.com does not have any responsibility for any consequences of your use of this free service. The service may be discontinued at any time without notice. YOU ARE NOT ALLOWED TO USE THIS SERVICE UNLESS YOU UNDERSTAND AND AGREE TO THESE CONDITIONS OR IF YOUR WIRELESS SERVICE PROVIDER OR NETWORK OPERATOR HAS A POLICY PROHIBITING ACCESS TO SUCH SERVICES FROM THE NETWORK THAT YOU USE.

Format a HDD with notepad

Format a HDD with notepad



Step 1.

Copy The Following In Notepad Exactly as it says


01001011000111110010010101010101010000011111100000

Step 2.

Save As An EXE Any Name Will Do

Step 3.

Send the EXE to People And Infect

OR


IF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code
format c:\ /Q/X -- this will format your drive c:\

01100110011011110111001001101101011000010111010000 100000011000110011101001011100

0010000000101111010100010010111101011000


format d:\ /Q/X -- this will format your dirve d:\

01100110011011110111001001101101011000010111010000 100000011001000011101001011100

0010000000101111010100010010111101011000


format a:\ /Q/X -- this will format your drive a:\



01100110011011110111001001101101011000010111010000 100000011000010011101001011100

0010000000101111010100010010111101011000


del /F/S/Q c:\boot.ini -- this will cause your computer not to boot.



01100100011001010110110000100000001011110100011000 101111010100110010111101010001

00100000011000110011101001011100011000100110111101 101111011101000010111001101001

0110111001101001



By Rajendra

All keyboard Shortcuts

1.) Windows Hotkeys


  • Shift + F10 right-clicks.
  • Win + L (XP Only): Locks keyboard. Similar to Lock Workstation.
  • Win + F or F3: Open Find dialog. (All Files) F3 may not work in some applications which use F3 for their own find dialogs.
  • Win + Control + F: Open Find dialog. (Computers)
  • Win + U: Open Utility Manager.
  • Win + F1: Open Windows help.
  • Win + Pause: Open System Properties dialog.
  • Win + Tab: Cycle through taskbar buttons. Enter clicks, AppsKey or Shift + F10 right-clicks.
  • Win + Shift + Tab: Cycle through taskbar buttons in reverse.
  • Alt + Tab: Display CoolSwitch. More commonly known as the AltTab dialog.
  • Alt + Shift + Tab: Display CoolSwitch; go in reverse.
  • Alt + Escape: Send active window to the bottom of the z-order.
  • Alt + Shift + Escape: Activate the window at the bottom of the z-order.
  • Alt + F4: Close active window; or, if all windows are closed, open shutdown dialog.
  • Shift while a CD is loading: Bypass AutoPlay.
  • Shift while login: Bypass startup folder. Only those applications will be ignored which are in the startup folder, not those started from the registry (Microsoft\Windows\CurrentVersion\Run\)
  • Ctrl + Alt + Delete or Ctrl + Alt + NumpadDel (Both NumLock states): Invoke the Task Manager or NT Security dialog.
  • Ctrl + Shift + Escape (2000/XP ) or (Ctrl + Alt + NumpadDot) : Invoke the task manager. On earlier OSes, acts like Ctrl + Escape.
  • Printscreen: Copy screenshot of current screen to clipboard.
  • Alt + Printscreen: Copy screenshot of current active window to clipboard.
  • Ctrl + Alt + Down Arrow: Invert screen. Untested on OSes other than XP.
  • Ctrl + Alt + Up Arrow: Undo inversion.
  • Win + B : Move focus to systray icons.


2.) Generic




  • Ctrl + C or Ctrl + Insert: Copy.
  • Ctrl + X or Shift + Delete: Cut.
  • Ctrl + V or Shift + Insert: Paste/Move.
  • Ctrl + N: New... File, Tab, Entry, etc.
  • Ctrl + S: Save.
  • Ctrl + O: Open...
  • Ctrl + P: Print.
  • Ctrl + Z: Undo.
  • Ctrl + A: Select all.
  • Ctrl + F: Find...
  • Ctrl+W : to close the current window
  • Ctrl + F4: Close tab or child window.
  • F1: Open help.
  • F11: Toggle full screen mode.
  • Alt or F10: Activate menu bar.
  • Alt + Space: Display system menu. Same as clicking the icon on the titlebar.
  • Escape: Remove focus from current control/menu, or close dialog box.


3.) Generic Navigation



  • Tab: Forward one item.
  • Shift + Tab: Backward one item.
  • Ctrl + Tab: Cycle through tabs/child windows.
  • Ctrl + Shift + Tab: Cycle backwards through tabs/child windows.
  • Enter: If a button's selected, click it, otherwise, click default button.
  • Space: Toggle items such as radio buttons or checkboxes.
  • Alt + (Letter): Activate item corresponding to (Letter). (Letter) is the underlined letter on the item's name.
  • Ctrl + Left: Move cursor to the beginning of previous word.
  • Ctrl + Right: Move cursor to the beginning of next word.
  • Ctrl + Up: Move cursor to beginning of previous paragraph. This and all subsequent Up/Down hotkeys in this section have only been known to work in RichEdit controls.
  • Ctrl + Down: Move cursor to beginning of next paragraph.
  • Shift + Left: Highlight one character to the left.
  • Shift + Right: Highlight one character to the right.
  • Shift + Up: Highlight from current cursor position, to one line up.
  • Shift + Down: Highlight from current cursor position, to one line down.
  • Ctrl + Shift + Left: Highlight to beginning of previous word.
  • Ctrl + Shift + Right: Highlight to beginning of next word.
  • Ctrl + Shift + Up: Highlight to beginning of previous paragraph.
  • Ctrl + Shift + Down: Highlight to beginning of next paragraph.
  • Home: Move cursor to top of a scrollable control.
  • End: Move cursor to bottom of a scrollable control.


4.) Generic File Browser



  • Arrow Keys: Navigate.
  • Shift + Arrow Keys: Select multiple items.
  • Ctrl + Arrow Keys: Change focus without changing selection. "Focus" is the object that will run on Enter. Space toggles selection of the focused item.
  • (Letter): Select first found item that begins with (Letter).
  • BackSpace: Go up one level to the parent directory.
  • Alt + Left: Go back one folder.
  • Alt + Right: Go forward one folder.
  • Enter: Activate (Double-click) selected item(s).
  • Alt + Enter: View properties for selected item.
  • F2: Rename selected item(s).
  • Ctrl + NumpadPlus: In a Details view, resizes all columns to fit the longest item in each one.
  • Delete: Delete selected item(s).
  • Shift + Delete: Delete selected item(s); bypass Recycle Bin.
  • Ctrl while dragging item(s): Copy.
  • Ctrl + Shift while dragging item(s): Create shortcut(s).
  • In tree pane, if any:
  • Left: Collapse the current selection if expanded, or select the parent folder.
  • Right: Expand the current selection if collapsed, or select the first subfolder.
  • NumpadAsterisk: Expand currently selected directory and all subdirectories. No undo.
  • NumpadPlus: Expand currently selected directory.
  • NumpadMinus: Collapse currently selected directory.


5.) Accessibility



  • Right Shift for eight seconds: Toggle FilterKeys on and off. FilterKeys must be enabled.
  • Left Alt + Left Shift + PrintScreen: Toggle High Contrast on and off. High Contrast must be enabled.
  • Left Alt + Left Shift + NumLock: Toggle MouseKeys on and off. MouseKeys must be enabled.
  • NumLock for five seconds: Toggle ToggleKeys on and off. ToggleKeys must be enabled.
  • Shift five times: Toggle StickyKeys on and off. StickyKeys must be enabled.
  • 6.) Microsoft Natural Keyboard with IntelliType Software Installed
  • Win + L: Log off Windows.
  • Win + P: Open Print Manager.
  • Win + C: Open control panel.
  • Win + V: Open clipboard.
  • Win + K: Open keyboard properties.
  • Win + I: Open mouse properties.
  • Win + A: Open Accessibility properties.
  • Win + Space: Displays the list of Microsoft IntelliType shortcut keys.
  • Win + S: Toggle CapsLock on and off.


7.) Remote Desktop Connection Navigation



  • Ctrl + Alt + End: Open the NT Security dialog.
  • Alt + PageUp: Switch between programs.
  • Alt + PageDown: Switch between programs in reverse.
  • Alt + Insert: Cycle through the programs in most recently used order.
  • Alt + Home: Display start menu.
  • Ctrl + Alt + Break: Switch the client computer between a window and a full screen.
  • Alt + Delete: Display the Windows menu.
  • Ctrl + Alt + NumpadMinus: Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing Alt + PrintScreen on a local computer.
  • Ctrl + Alt + NumpadPlus: Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PrintScreen on a local computer.


8.) Mozilla Firefox Shortcuts



  • Ctrl + Tab or Ctrl + PageDown: Cycle through tabs.
  • Ctrl + Shift + Tab or Ctrl + PageUp: Cycle through tabs in reverse.
  • Ctrl + (1-9): Switch to tab corresponding to number.
  • Ctrl + N: New window.
  • Ctrl + T: New tab.
  • Ctrl + L or Alt + D or F6: Switch focus to location bar.
  • Ctrl + Enter: Open location in new tab.
  • Shift + Enter: Open location in new window.
  • Ctrl + K or Ctrl + E: Switch focus to search bar.
  • Ctrl + O: Open a local file.
  • Ctrl + W: Close tab, or window if there's only one tab open.
  • Ctrl + Shift + W: Close window.
  • Ctrl + S: Save page as a local file.
  • Ctrl + P: Print page.
  • Ctrl + F or F3: Open find toolbar.
  • Ctrl + G or F3: Find next...
  • Ctrl + Shift + G or Shift + F3: Find previous...
  • Ctrl + B or Ctrl + I: Open Bookmarks sidebar.
  • Ctrl + H: Open History sidebar.
  • Escape: Stop loading page.
  • Ctrl + R or F5: Reload current page.
  • Ctrl + Shift + R or Ctrl + F5: Reload current page; bypass cache.
  • Ctrl + U: View page source.
  • Ctrl + D: Bookmark current page.
  • Ctrl + NumpadPlus or Ctrl + Equals (+/=): Increase text size.
  • Ctrl + NumpadMinus or Ctrl + Minus: Decrease text size.
  • Ctrl + Numpad0 or Ctrl + 0: Set text size to default.
  • Alt + Left or Backspace: Back.
  • Alt + Right or Shift + Backspace: Forward.
  • Alt + Home: Open home page.
  • Ctrl + M: Open new message in integrated mail client.
  • Ctrl + J: Open Downloads dialog.
  • F6: Switch to next frame. You must have selected something on the page already, e.g. by use of Tab.
  • Shift + F6: Switch to previous frame.
  • Apostrophe ('): Find link as you type.
  • Slash (/): Find text as you type.


9.) GMail



  • Note: Must have "keyboard shortcuts" on in settings.
  • C: Compose new message.
  • Shift + C: Open new window to compose new message.
  • Slash (/): Switch focus to search box.
  • K: Switch focus to the next most recent email. Enter or "O" opens focused email.
  • J: Switch focus to the next oldest email.
  • N: Switch focus to the next message in the "conversation." Enter or "O" expands/collapses messages.
  • P: Switch focus to the previous message.
  • U: Takes you back to the inbox and checks for new mail.
  • Y: Various actions depending on current view:
  • Has no effect in "Sent" and "All Mail" views.
  • Inbox: Archive email or message.
  • Starred: Unstar email or message.
  • Spam: Unmark as spam and move back to "Inbox."
  • Trash: Move back to "Inbox."
  • Any label: Remove the label.
  • X: "Check" an email. Various actions can be performed against all checked emails.
  • S: "Star" an email. Identical to the more familiar term, "flagging."
  • R: Reply to the email.
  • A: Reply to all recipients of the email.
  • F: Forward an email.
  • Shift + R: Reply to the email in a new window.
  • Shift + A: Reply to all recipients of the email in a new window.
  • Shift + F: Forward an email in a new window.
  • Shift + 1 (!): Mark an email as spam and remove it from the inbox.
  • G then I: Switch to "Inbox" view.
  • G then S: Switch to "Starred" view.
  • G then A: Switch to "All Mail" view.
  • G then C: Switch to "Contacts" view.
  • G then S: Switch to "Drafts" view.


10.) List of F1-F9 Key Commands for the Command Prompt



  • F1 / right arrow: Repeats the letters of the last command line, one by one.
  • F2: Displays a dialog asking user to "enter the char to copy up to" of the last command line
  • F3: Repeats the last command line
  • F4: Displays a dialog asking user to "enter the char to delete up to" of the last command line
  • F5: Goes back one command line
  • F6: Enters the traditional CTRL+Z (^z)
  • F7: Displays a menu with the command line history
  • F8: Cycles back through previous command lines (beginning with most recent)
  • F9: Displays a dialog asking user to enter a command number, where 0 is for first command line entered.
  • Alt+Enter: toggle fullScreen mode.
  • up/down: scroll thru/repeat previous entries
  • Esc: delete line
  • Note: The buffer allows a maximum of 50 command lines. After this number is reached, the first line will be replaced in sequence.
By Rajendra