All Run Commands In Windows XP

Listing Up Most of the Run Commands In Windows XP!

You can go to Run by Clicking Start & Run or by Clicking Windows button + R !




  1. SQL Client Configuration - cliconf
  2. System Configuration Editor - sysedit

  3. System Configuration Utility - msconfig

  4. System File Checker Utility (Scan Immediately)- sfc /scannow

  5. System File Checker Utility (Scan Once At Next Boot)- sfc /scanonce

  6. System File Checker Utility (Scan On Every Boot) - sfc /scanboot

  7. System File Checker Utility (Return to Default Setting)- sfc /revert

  8. System File Checker Utility (Purge File Cache)- sfc /purgecache

  9. System File Checker Utility (Set Cache Size to size x)-sfc/cachesize=10

  10. System Information - msinfo32.

  11. Task Manager – taskmgr

  12. System Properties - sysdm.cpl

  13. Task Manager – taskmgr

  14. TCP Tester - tcptest

  15. Telnet Client - telnet

  16. Tweak UI (if installed) - tweakui

  17. User Account Management- nusrmgr.cpl

  18. Utility Manager - utilman

  19. Windows Address Book - wab

  20. Windows Address Book Import Utility - wabmig

  21. Windows Backup Utility (if installed)- ntbackup

  22. Windows Explorer - explorer

  23. Windows Firewall- firewall.cpl

  24. Windows Magnifier- magnify

  25. Windows Management Infrastructure - wmimgmt.msc

  26. Windows Media Player - wmplayer

  27. Windows Messenger - msmsgs

  28. Windows Picture Import Wizard (need camera connected)- wiaacmgr

  29. Windows System Security Tool – syskey

  30. Windows Update Launches - wupdmgr

  31. Windows Version (to show which version of windows)- winver

  32. Windows XP Tour Wizard - tourstart

  33. Wordpad - write

  34. Password Properties - password.cpl

  35. Performance Monitor - perfmon.msc

  36. Phone and Modem Options - telephon.cpl

  37. Phone Dialer - dialer

  38. Pinball Game - pinball

  39. Power Configuration - powercfg.cpl

  40. Printers and Faxes - control printers

  41. Printers Folder – printers

  42. Private Character Editor - eudcedit

  43. Quicktime (If Installed)- QuickTime.cpl

  44. Real Player (if installed)- realplay

  45. Regional Settings - intl.cpl

  46. Registry Editor - regedit

  47. Registry Editor - regedit32

  48. Remote Access Phonebook - rasphone

  49. Remote Desktop - mstsc

  50. Removable Storage - ntmsmgr.msc

  51. Removable Storage Operator Requests - ntmsoprq.msc

  52. Resultant Set of Policy (XP Prof) - rsop.msc

  53. Scanners and Cameras - sticpl.cpl

  54. Scheduled Tasks - control schedtasks

  55. Security Center - wscui.cpl

  56. Services - services.msc

  57. Shared Folders - fsmgmt.msc

  58. Shuts Down Windows - shutdown

  59. Sounds and Audio - mmsys.cpl

  60. Spider Solitare Card Game - spider

  61. Malicious Software Removal Tool - mrt

  62. Microsoft Access (if installed) - access.cpl

  63. Microsoft Chat - winchat

  64. Microsoft Excel (if installed) - excel

  65. Microsoft Frontpage (if installed)- frontpg

  66. Microsoft Movie Maker - moviemk

  67. Microsoft Paint - mspaint

  68. Microsoft Powerpoint (if installed)- powerpnt

  69. Microsoft Word (if installed)- winword

  70. Microsoft Syncronization Tool - mobsync

  71. Minesweeper Game - winmine

  72. Mouse Properties - control mouse

  73. Mouse Properties - main.cpl

  74. Nero (if installed)- nero

  75. Netmeeting - conf

  76. Network Connections - control netconnections

  77. Network Connections - ncpa.cpl

  78. Network Setup Wizard - netsetup.cpl

  79. Notepad - notepad

  80. Nview Desktop Manager (If Installed)- nvtuicpl.cpl

  81. Object Packager - packager

  82. ODBC Data Source Administrator- odbccp32.cpl

  83. On Screen Keyboard - osk

  84. Opens AC3 Filter (If Installed) - ac3filter.cpl

  85. Outlook Express - msimn

  86. Paint – pbrush

  87. Keyboard Properties - control keyboard

  88. IP Configuration (Display Connection Configuration) - ipconfi/all

  89. IP Configuration (Display DNS Cache Contents)- ipconfig /displaydns

  90. IP Configuration (Delete DNS Cache Contents)- ipconfig /flushdns

  91. IP Configuration (Release All Connections)- ipconfig /release

  92. IP Configuration (Renew All Connections)- ipconfig /renew

  93. IP Configuration(RefreshesDHCP&Re-RegistersDNS)-ipconfig/registerdns

  94. IP Configuration (Display DHCP Class ID)- ipconfig/showclassid

  95. IP Configuration (Modifies DHCP Class ID)- ipconfig /setclassid

  96. Java Control Panel (If Installed)- jpicpl32.cpl

  97. Java Control Panel (If Installed)- javaws

  98. Local Security Settings - secpol.msc

  99. Local Users and Groups - lusrmgr.msc

  100. Logs You Out Of Windows - logoff.....

  101. Accessibility Controls - access.cpl

  102. Accessibility Wizard - accwiz

  103. Add Hardware - Wizardhdwwiz.cpl

  104. Add/Remove Programs - appwiz.cpl

  105. Administrative Tools control - admintools

  106. Adobe Acrobat (if installed) - acrobat

  107. Adobe Designer (if installed)- acrodist

  108. Adobe Distiller (if installed)- acrodist

  109. Adobe ImageReady (if installed)- imageready

  110. Adobe Photoshop (if installed)- photoshop

  111. Automatic Updates - wuaucpl.cpl

  112. Bluetooth Transfer Wizard – fsquirt

  113. Calculator - calc

  114. Certificate Manager - certmgr.msc

  115. Character Map - charmap

  116. Check Disk Utility - chkdsk

  117. Clipboard Viewer - clipbrd

  118. Command Prompt - cmd

  119. Component Services - dcomcnfg

  120. Computer Management - compmgmt.msc

  121. Control Panel - control

  122. Date and Time Properties - timedate.cpl

  123. DDE Shares - ddeshare

  124. Device Manager - devmgmt.msc

  125. Direct X Control Panel (If Installed)- directx.cpl

  126. Direct X Troubleshooter- dxdiag

  127. Disk Cleanup Utility- cleanmgr

  128. Disk Defragment- dfrg.msc

  129. Disk Management- diskmgmt.msc

  130. Disk Partition Manager- diskpart

  131. Display Properties- control desktop

  132. Display Properties- desk.cpl

  133. Display Properties (w/Appearance Tab Preselected)- control color

  134. Dr. Watson System Troubleshooting Utility- drwtsn32

  135. Driver Verifier Utility- verifier

  136. Event Viewer- eventvwr.msc

  137. Files and Settings Transfer Tool- migwiz

  138. File Signature Verification Tool- sigverif

  139. Findfast- findfast.cpl

  140. Firefox (if installed)- firefox

  141. Folders Properties- control folders

  142. Fonts- control fonts

  143. Fonts Folder- fonts

  144. Free Cell Card Game- freecell

  145. Game Controllers- joy.cpl

  146. Group Policy Editor (XP Prof)- gpedit.msc

  147. Hearts Card Game- mshearts

  148. Help and Support- helpctr

  149. HyperTerminal- hypertrm

  150. Iexpress Wizard- iexpress

  151. Indexing Service- ciadv.msc

  152. Internet Connection Wizard- icwconn1

  153. Internet Explorer- iexplore

  154. Internet Setup Wizard- inetwiz

  155. Internet Properties- inetcpl.cpl

Hacking Methods :-

1 Phishing
2 Fake Login Hack
3 Cookie Steal Hack
4 Brute Force Hack
5 Web Mail Hack

1 Phishing :-
Phishing is the method that you are familiar with. You create a Fake Account and ID in yahoo and fool your friends by telling them to send the victim's ID, their own ID and their own Password in your Fake Account

DEFINITION- Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well known and trustworthy Web sites. Web sites that are frequently spoofed by phishers include Paypal, eBay, MSN, Yahoo, BestBuy, and America Online. A phishing expedition, like the fishing expedition it's named for, is a speculative venture: the phisher puts the lure hoping to fool at least a few of the prey that encounter the bait.

Phishers use a number of different social engineering and e-mail spoofingploys to try to trick their victims. In one fairly typical case before the Federal Trade Commission (FTC), a 17-year-old male sent out messages purporting to be from America Online that said there had been a billing problem with recipients' AOL accounts. The perpetrator's e-mail used AOL logos and contained legitimate links. If recipients clicked on the "AOL Billing Center" link, however, they were taken to a spoofed AOL Web page that asked for personal information, including credit card numbers, personal identification numbers (PINs), social security numbers, banking numbers, and passwords. This information was used for identity theft.

Types of Hackers :-

White Hat Hacker- Also referred as Ethical Hacker or sometimes called as Sneakers. A
White Hat Hacker mainly focuses on securing corporate Network from outsider threat. They are with good intention who fight against Black Hat.


Grey Hat Hacker- They are Skilled Hacker who sometimes act legally and sometime not.
In simple word you may call a Grey Hat hacker as Hybrid between White Hat and Black Hat hacker


Black Hat Hacker- Also referred as Cracker. A Black Hat Hacker's intention is to break
into others Network, and wish to secure his own machine. They often uses different techniques forbreaking into systems which can involve advanced programming skills and social engineering..

History of Hackers :-

Kevin Mitnick, often incorrectly called by many God of hackers, broke into the computer systems of the World's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Micro systems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.November 2002Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a fast-track extradition to the US where he is a Wanted man. The next hearing in the case is slated for today.

Introduction to Hacking!

Introduction to Hacking :-

"Hacking" is the word that shakes everyone whenever it is said or heard by someone. Everyone born in this world with attitude wants to be a Hacker. But it is not a job of a new born baby or an old grown lady. A Hacker needs a brilliant mind to hack anything. His skills should be so powerful that no other hacker can hack him. A Hacker doesn't need a software to hack. There are many rules that he should learn to become an Ethical Hacker. These rules include knowledge of HTML, JavaScripts, Computer Tricks, Cracking & Breaking etc.etc. So, don't fool around anyone saying that "I am a Hacker!".And Remember ---> Hacking Is Not A Crime!
 

wibiya widget

About Us

wibiya widget

Web Gk- Creating Your Smile Copyright © 2009 Community is Designed by Sacha Blogger Template

CSS done by Link building