Pages

Tuesday 30 October 2012

Trick to Apply your Face as your mouse Cursor


In this post i m gonna tell you how you can insert your own Face or any image as your mouse Cursor 
Well, the software IconArt dont let you insert a bigger size image, only what you can insert is icon with extension .ico , cursors with extension .cur or an image of an icon size.
hmmm..... So how you can insert your image in it and make your Face as Cursor..... for that follow these simple steps:


1. First you need to convert your image(jpeg, gif etc.) into an Icon. For that go to site http://www.favicon.co.uk/ , upload your pic there, to which you want to convert into Icon, then download that Pic.

 



2. Now open that icon..which u hv just converted.... with the software IconArt.... now cut the extra part if any....  check the screen shot below:




3. Now when you complete with it, just save it....File> Save frame as Cursor. And yes, your Curser is ready!!!!

How to hack any account by phishing attack: step by step Guide

   
Step by step Procedure:

1. First of all you will require Fake login Page of any web account you want to hack. For eg: If you want to hack yahoo account then you will need a yahoo fake login page.
Here i m providing you some built Fake login page. In my further posts i will teach you how to create fake login page.
Download Phishing pages
Note:
These phishing pages are hided behind an image. so see my post http://www.techbyte4u.com/2010/06/trick-to-hide-files-behind-images.html to know how to get these pages from that image file.

2. Now see, each Fake login page has 2 filees..... one is index.html and another one is login.php. you have to upload it on any free hosting site. I am recommend you t35.com. For this Go to t35.com and sign up for a free host account.


Note: t3.com is now not available for free, you can create account on http://www.000webhost.com/473091.html .To know how to create account there, check post "How to create a FREE webhosting Account"




3. After creating account go to control pannel and upload both the files there.








4. Now send the link of your this fake site to your victim. as soon as they login, A file named log.txt will store in your t35.com with passwords of your victim. And the fake login page will redirect to real yahoo login page...which will say your victim to verify password... So your victim if not aware by phishing then could know know about this HACK!!!!










Hurray..... you hacked An Account!!!!!

Save RAM Memory Usage just by minimizing Applications


Do you know you can save your Ram memory space just by minimizing the applications???
Its surprising that when you minimize any application than you can decrease minimum 1/3 memory usage of ur system....

Lets test it....
1. Open any application lets say calculator or  anything u wish....

2. Now open task manager by pressing ctrl+ alt + delete

3. Now in applicatios tab, right click the application that you have opened for testing.... then click on "go to precess"



4. Ok, Now in process tab check the memory usage by that application... 
 


5. Now minimize the application and again check the memory usage.... 
 



Got the difference???? So always keep applications minimize that is not being used currently....

6. Not only this..... if you maximize the application after minimize it first then also the memory usage will be very much less than before...
So always do minimize applications for once after opening to save memory

How to Create keyboard shortcuts to open applications


You can create keyboard shortcuts to open programs or applications, which can often be simpler than opening programs using your mouse or other pointing device. Just directly press the keys assigned.... and the application will open.
To assign shortcuts to programs/applications.. Follow the process...
  1. Right click on the shortcut to the program for which you want to create a keyboard shortcut and then click Properties.
  2. In the  Shortcut tab, click in the Shortcut key text box. The Shortcut key box will display None until you select the key.
  3. Now Press the key on your keyboard that you want to use in combination with CTRL+ALT (keyboard shortcuts automatically start with CTRL+ALT), and then click OK.
    You can also use function keys(F1-F12) to assign keyboard shortcut without any combination of ctrl/alt or with the combination of only CTRL/ALT also.
    You can now use this keyboard shortcut to open the program when you're using the desktop. The shortcut will also work while using some programs, though it might not work with some programs that have their own keyboard shortcuts.

Notes

    Notes
  • You cannot use the ESC, ENTER, TAB, SPACEBAR, PRINT SCREEN, SHIFT, or BACKSPACE keys to create a keyboard shortcut.
  • Before completing these steps, always verify that if combinations of keys you want to assign has assigned before to any other program.

Monday 29 October 2012

How to create bootable USB



You do not have a CD / DVD and you want to try a  Live bootable CD via USB. Or say You want to make a bootable USB.
WinToFlash starts a wizard that will help pull over the contents of a CD or DVD or a disc image in ISO format and prepare the USB drive to become a bootable replacement for the optical drive.
  • It Supports Windows XP, Vista and Win 7.
  • Freeware
  • Easy to Use
How to use it:

1. Download and install and Run it.


2. Now choose any operation from the list. and press Run.


3. Select the Location of iso file in Source and also select Usb Drive's Location and press run.

How to Block/Bypass Survey Pop-ups




While reading any article on any website popping up any Survey is one of the most annoying thing.
Anyway, there is a very simple trick, a java script to block those surveys...
  • Go to webpage of XJZ Survey Remover, copy the script from there... and
    Whenever any survey  pop up on any webpage, just paste that script in your Browser's address bar...
Note: this java script works only with Firefox and Chrome Web Browser.

Download Videos From Any Site!..


In this Tutorial i m giving detail description about a firefox Addon Flash and video Download about which i have also told in my last post.....


Using this Addon you can download any video from any site..... I have check it out for many sites.... and it worked for all :)

how to use this Addon:

1. First of all, download this addon and install it in Firefox...... and restart firefox

After installing the addon an icon will be appear in most bottom right corner of firefox..... like this:


2. Now open any video which you want to download using any site like: Youtube, Metacafe, Daily motion... etc. etc.


3. Once the Video start Playing, you will see the download link of that video in the icon of this Addon.
Just click on the proper file, and save it on right location, the video will be start downloading :)

Undo accidentally closed tab in firefox and chrome


Have you ever been surfing the web with the chrome or Firefox web browser and Accidentally closed an important tab before you done with it.... and thought that its gone forever or u do try to get it from history....

Today i m gonna give you a small but useful tip for Undo accidentally closed tab in firefox or chrome....

well, its very much simple to access the closed tabs...

1. Using keyboard shortcuts:
just press ctrl + shift + T on your keyboard to open last closed tab....

Like this you can open all the recently closed tabs.... for that repeat  pressing ctrl + shift + T and all your closed tab will open one by one in manner last closed first open ;)

2. Using right Click option:
 you can also undo closed tabs by right click on any tab> reopen closed tab(for chrome)/ Undo close tab(for firefox)

Enjoy

Internet Download Manager 6.05 Registration Serial Number




Internet Download Manager(also known as Idman) is an excellent internet download accelerator that will care of all your downloads from the moment you install it on your PC.
If you want to increase download speed, this tool can help you to increase download speeds by up to 5 times, resume and schedule downloads.
High speed internet connections are common these days, Even if you have the fastest router in the neighborhood, take a look at Internet Download Manager , because it really has a lot to offer.




Download IDM 6.05




Internet Download manager is not available for free of cost. But here are the serial key of IDM by that u can register is for free.




First name : MerCuRy
Last Name :1560985
Email : mercury1560985@gmail.com
Serial: 7G7QY-NZWKQ-23KRA-RAMQ4




How to  Register IDM:


1. First of all Disconnect internet
2. Now go to C:/Windows/System32/Drivers/Etc and open hosts file with notepad... and save after adding following lines in last




127.0.0.1 http://internetdownloadmanager.com
127.0.0.1 www.internetdownloadmanager.com


3. Now install the appliaction or if u have previously installed then go to step 4
4. Now enter registration keys


Note: Never Update ur IDM after registering using this key.


5. Now go to Windows Firewall > inbound rule > new > Choose Custom in Rule Type > Enter Next > Now in Program give the path of ur IDM's exe file in this program path > Enter next till you are on Action > now choose Block the connection > next > next > now give name and save it.http://www.techbyte4u.com/


6. Finish, Now you will not get any fake serial message ever.

How to Recover Deleted Partitions?




If the partition is deleted, your vital and important data stored on those partitions may become inaccessible which may create many hardships to the persons who are depending on those data. Is there a way to recover deleted partition or recover data in the deleted partition?
The answer is Yes. If you accidentally deleted a partition, partition recovery software EASEUS Partition Recovery can recover deleted or lost partitions. If a partition is deleted, the program will analyze the disk and recover the deleted partitions.





Features of EASEUS Partition Recovery Software



  • Free for both home and commercial users.
  • Use it with ease: a wizard interface walks you through all the partition recovery process.
  • Recover deleted or lost partition quickly and easily.
  • Offer several optional scan areas helps locate the lost partition quickly.
  • Support FAT, NTFS, Ext2/Ext3 file system.
  • Support IDE / ATA / SATA / SCSI drives.
  • Support Windows 2000, XP, 2003, Vista, 2008, 7.

How to recover deleted partitions with EASEUS Partition Recovery?

EASEUS Partition Recovery is a free partition recovery software to recover deleted or lost partitions.
1. Download this software from here, install it.
2. After -installing Run EASEUS Partition Recovery, and then you will see the following window. Click "Next" to continue.
EASEUS Partition Recovery main interface
3. Please choose a disk where you want to recover lost partitions and click "Next" to continue.
4. Choose a specified area to search for the lost partitions and click "Next" to continue.
5. Please choose a search method to start partition recovery. (There are two search methods: Fast and Complete.)
6. EASEUS Partition Recovery starts searching the deleted or lost partitions.
Search lost partitions
7. After the search is completed, choose the deleted or lost partitions to recover.
8. Click "Proceed" to execute the operations.

Tuesday 23 October 2012

Make an Heart sign on Facebook and other special characters ? ? ?


Signs like ?, ¤, ? make the typeface less monotonous. But how can you add these characters, emoticons and symbols to your status updates, comments and chats? Check it out:


Characters by key sequences (ALT-Symbols)





For example:
Alt + 1 ☺
Alt + 2 ☻
Alt + 3 ♥
Alt + 4 ♦
Alt + 5 ♣
Alt + 6 ♠
Alt + 7 •
Alt + 8 ◘
Alt + 9 ○
Alt + 10 ◙
Alt + 11 ♂
Alt + 12 ♀
Alt + 13 ♪
Alt + 14 ♫
Alt + 15 ☼
Alt + 16 ►
Alt + 17 ◄
Alt + 18 ↕
Alt + 19 ‼
Alt + 20 ¶
Alt + 21 §
Alt + 22 ▬
Alt + 23 ↨
Alt + 24 ↑
Alt + 25 ↓
Alt + 26 →
Alt + 27 ←
Alt + 28 ∟
Alt + 29 ↔
Alt + 30 ▲
Alt + 31 ▼


Enjoy And have fun with your friends on facebook..

Boost and Increase your Internet Speed


Speed is usually the feature that many of us value most for Internet connectivity. It’s not only the connection speed that your provider brings to your modem but also the TCP (Transmission Control Protocol) settings on your workstation.

Optimizing TCP/IP settings

This  tweak is going to require a piece of freeware called SG TCP Optimizer. This little utility will optimize the manner in which your PC sends and receives data packets, which will as a result speed up your connection.
Step 1:
Download SG TCP Optimizer  You don’t need to install it, just double-click and it will run. Once you run it, you should be looking at this :
SG TCP Optimizer
Basically there are two tuning options for you, you can either let the program to decide optimized registry settings for you by providing some info (optimal settings), or do customized tuning (custom settings) if you are adventurous enough. I’m a bit lazy now, so I will show you simple way of optimizing.
Step 2:
Before doing any tweaking Please test your Internet speed by using SG Speed Test. If you want to do the speed test, please stop all applications that eat the network bandwidth, such as P2P application, online gaming, video streaming, etc. Here is the Internet speed test result, you can see the download speed is 359 Kbps and upload speed is 137 Kbps.
test-result-before
Step 3:
OK… Let’s start to use this TCP optimizer to improve Internet speed. Under the “General Settings” tab drag the slider to match your connection’s download speed (Kbps), which is your Maximum Download Speed. If you do not know what it is, contact your ISP and ask them. Make sure the value you get is in Kbps. In my case maximum Internet speed is 512 Kbps (512 Kbps download, 128 Kbps upload). tune-itStep 4:
Then, at the bottom of the same window, select the “Optimal Settings” radio button and click “Apply Changes”.
Step 5:
You will now be looking at a window like the one below. Make sure that the “Backup” tick box is ticked and then click OK.registry
Step 6:
Before applying the changes, you can always go to File  and select backup current settings, so that you can have options to restore backup settings or Restore Windows Default settings later.backupStep 7:
All that’s left is to reboot your system, in order to apply the changes. You will be prompted to do so.
Step 8:
Once your system has rebooted, let’s do the similar Internet speed test again. In this case, there is improvement on download Internet speed (359Kbps -> 489Kbps) but not much change when doing uploading (137Kbps -> 138Kbps).
test-result-after
Step 9:
If for whatever reason you feel your connection has been affected negatively, for the changes you made can be undone. Start SG TCP Optimizer, click File and choose Restore backed up settings & Select your backup file then click OK and reboot. Your original settings are now restored.
Why SG TCP Optimizer?
There are commercial programs that will do much the same thing but TCP Optimizer does it just as well and is totally free. The only minus is the lack of in-program help, however, you’ll find a useful FAQ at the Speed Guide website.

NOTE: Users of Windows Vista or Windows 7 should note that any changes they make will only last until the next system restart. Microsoft has decided to take control of these settings.
There you have it. Your connection is now tweaked and ready to go! Any questions, post a comment!

Saturday 20 October 2012

HOW TO Gain Access To Blocked Websites


In our schools and offices, some sites specially social networking websites like MySpace and facebook are often blocked. While visiting these blocked websites on the Internet, your IP address is being logged with each file you download with your web browser.

1. Web proxies
Many free online services allow you to access blocked websites through a proxy server. An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable. It accesses the Internet on the user’s behalf, protecting personal information by hiding the source computer’s identifying information. There are literally thousands of anonymous proxy servers out there. Like; Proxy.org, HideMyAss.com, Vtunnel.com, Anonymouse.org. See the Master List of all Web Proxy Servers by Proxy.org

3. Hide IP software

These are easy to use and even if the main functionality is to hide IP address and unblock websites, there are applications that can provide you more than that – like cleaning online tracks, testing proxies, manually adding proxy etc. Usually if you choose a free software, then this will provide you a minimal number of proxies and no other features than hiding IP address. Among Free IP Hiding tools, UltraSurf, NotMyIP, IPHider are most popular ones.

4. Firefox add-ons

FoxyProxy is a small add-on for Firefox that allows users to access blocked sites. Offcourse (above discussed) IP hiding software are there which you can use to access blocked website but when you are in an office environment or school where you are restricted to install a program and you need to access certain blocked sites, then this add-on to the browser is a quick solution.
You may also check other similar addons, like SwitchProxy or AutoProxy.

6. Google cache
Google takes a snapshot of each (indexed) webpage examined as it crawls the web and caches these as a back-up in case the original page is unavailable. If you search anything on Google and click on the “Cached” link (below each search results) on the search results page, you will see the web page as it looked when Google last indexed it.
So, you can use cached pages of website that is blocked to you.
In the Google search field type cache: before the URL of the blocked website. For example type cache:http://www.tipsotricks.com

7. Internet Archive

Internet Archive allows you to view blocked websites through the Wayback Machine. This will retrieve all pages of a specific website indifferent if the website is blocked. Open Wayback Machine, put the desired address and view the old and indexed pages of websites.

9. Change the http of an URL into https
This is probably the easiest way to access blocked websites. Offcourse, this might not work every time but still this is the fastest one.
Just put the address of the blocked website like:
https://www.yourdomain.com

10. IP address of the website instead of URL


To use the IP address of a website instead of URL, you must first find its IP. To do this open command prompt and type: “ping domain.com”, you’ll get the IP address of the website. Note the IP and put that in browser’s address bar. This method has relatively higher chances of getting access to blocked sites.


TRy IT...ENJOY IT .........AND break the rules of colleges and campus......





 

Sunday 14 October 2012

Setting Up GMAIL on your NOKIA Mobile



    Enable IMAP in your Gmail settings
    Select ‘Messaging’ > ‘Options’ > ‘Settings’ > ‘E-mail’ > ‘Mailboxes.’
    If you have never set up email on your phone before, select ‘Yes’ to define a new mailbox. If you aready have other mailboxes, select ‘Options’ and then ‘New mailbox.’
    Select ‘Start’ to begin the setup wizard
    Select ‘IMAP4' and then ‘Next.’
    Enter your full email address (including ‘@gmail.com’) as the email address and select ‘Next.’ Google Apps users, enter your full address in the format ‘username@your_domain.com.’
    Enter ‘imap.gmail.com’ as the incoming mail server and select ‘Next.’
    Enter ‘smtp.gmail.com’ as the outgoing mail server and select ‘Next.’
    Select the appropriate access point and then ‘Next.’
    Enter a descriptive name for the email account mailbox name
    Once your mailbox is set up, select it from the email mailbox settings screen
    Select ‘Connection settings’ > ‘Incoming e-mail.’
    Enter your address (including ‘@gmail.com’ or ‘@your_domain.com’) and password
    Select ‘SSL/TLS’ for your security (ports) and define your port as ’993.’
    Select ‘Back.’
    Select ‘Outgoing e-mail.’
    Enter your email address (including ‘@gmail.com’ or ‘@your_domain.com’) and password
    Select ‘StartTLS’ for your security (ports) and define your port as ’587.’
    Select ‘Back’ and change any other settings according to your preferences

Thursday 11 October 2012

A Complete list of DOS Command Index


 ["DOS Command Index
Information about all current DOS commands"]


 APPEND
(External)

APPEND ;
APPEND [d:]path[;][d:]path[...]
APPEND [/X:on|off][/path:on|off] [/E]

Displays or sets the search path for data files. DOS will search the specified path(s) if the file is not found in the current path.

 
ASSIGN
(External)

ASSIGN x=y [...] /sta

Redirects disk drive requests to a different drive.


ATTRIB
(External)

ATTRIB [d:][path]filename [/S]
ATTRIB [+R|-R] [+A|-A] [+S|-S] [+H|-H] [d:][path]filename [/S]

Sets or displays the read-only, archive, system, and hidden attributes of a file or directory.


BACKUP
(External)

BACKUP d:[path][filename] d:[/S][/M][/A][/F:(size)] [/P][/D:date] [/T:time] [/L:[path]filename]

Makes a backup copy of one or more files. (In DOS Version 6, this program is stored on the DOS supplemental disk.)


BREAK
(Internal)

BREAK =on|off

Used from the DOS prompt or in a batch file or in the CONFIG.SYS file to set (or display) whether or not DOS should check for a Ctrl + Break key combination.


BUFFERS
(Internal)

BUFFERS=(number),(read-ahead number)

Used in the CONFIG.SYS file to set the number of disk buffers (number) that will be available for use during data input. Also used to set a value for the number of sectors to be read in advance (read-ahead) during data input operations.


CALL
(Internal)

CALL [d:][path]batchfilename [options]

Calls another batch file and then returns to current batch file to continue.


CHCP
(Internal)

CHCP (codepage)

Displays the current code page or changes the code page that DOS will use.


CHDIR
(Internal)

CHDIR (CD) [d:]path
CHDIR (CD)[..]

Displays working (current) directory and/or changes to a different directory.


CHKDSK
(External)

CHKDSK [d:][path][filename] [/F][/V]

Checks a disk and provides a file and memory status report.


CHOICE
(Internal)

CHOICE [/C[:]keys] [/N][/S][/T[:]c,nn] [text]

Used to provide a prompt so that a user can make a choice while a batch program is running.


CLS (Clear Screen)
(Internal)

CLS

Clears (erases) the screen.


COMMAND
(External)

COMMAND [d:][path] [device] [/P][/E:(size)] [/MSG][/Y [/C (command)|/K (command)]

Starts a new version of the DOS command processor (the program that loads the DOS Internal programs).


COMP
(External)

COMP [d:][path][filename] [d:][path][filename] [/A][/C][/D][/L][/N:(number)]

Compares two groups of files to find information that does not match. (See FC command).


COPY
(Internal)

COPY [/Y|-Y] [/A][/B] [d:][path]filename [/A][/B] [d:][path][filename] [/V]
or
COPY [/Y|-Y][/A][/B] [d:][path]filename+[d:][path]filename[...][d:][path][filename] [/V]

Copies and appends files.


COUNTRY
(Internal)

COUNTRY=country code,[code page][,][d:][filename]

Used in the CONFIG.SYS file to tell DOS to use country-specific text conventions during processing.


CTTY
(Internal)

CTTY (device)

Changes the standard I/O (Input/Output) device to an auxiliary device.


DATE
(Internal)

DATE mm-dd-yy

Displays and/or sets the system date.


DBLSPACE
(External)

DBLSPACE / automount=drives
DBLSPACE /chkdsk [/F] [d:]
DBLSPACE /compress d: [/newdrive=host:] [/reserve=size] [/F]
DBLSPACE /create d: [/newdrive=host:] [/reserve=size] [/size=size]
DBLSPACE /defragment [d:] ]/F]
DBLSPACE /delete d:
DBLSPACE /doubleguard=0|1
DBLSPACE /format d:
DBLSPACE [/info] [d:]
DBLSPACE /list
DBLSPACE /mount[=nnn] host: [/newdrive=d:]
DBLSPACE /ratio[=ratio] [d:] [/all]
DBLSPACE /size[=size] [/reserve=size] d:
DBLSPACE /uncompress d:
DBLSPACE /unmount [d:]

A program available with DOS 6.0 that allows you to compress information on a disk.


DEBUG
(External)

DEBUG [pathname] [parameters]

An MS-DOS utility used to test and edit programs.


DEFRAG
(External)

DEFRAG [d:] [/F][/S[:]order] [/B][/skiphigh [/LCD|/BW|/GO] [/H]
DEFRAG [d:] [/V][/B][/skiphigh] [/LCD]|/BW|/GO] [/H]

Optimizes disk performance by reorganizing the files on the disk.


DEL (ERASE)
(Internal)

DEL (ERASE) [d:][path]filename [/P]

Deletes (erases) files from disk.


DELOLDOS
(External)

DELOLDOS [/B]

Deletes all files from previous versions of DOS after a 5.0 or 6.0 installation.


DELTREE
(External)

DELTREE [/Y] [d:]path [d:]path[...]

Deletes (erases) a directory including all files and subdirectories that are in it.


DEVICE
(Internal)

DEVICE=(driver name)

Used in the CONFIG.SYS file to tell DOS which device driver to load.


DEVICEHIGH
(Internal)

DEVICEHIGH=(driver name)

Like DEVICE, DEVICEHIGH is used in the CONFIG.SYS file to tell DOS which device driver software to use for devices; however, this option is used to install the device driver into the upper memory area.


DIR
(Internal)

DIR [d:][path][filename] [/A:(attributes)] [/O:(order)] [/B][/C][/CH][/L][/S][/P][/W]

Displays directory of files and directories stored on disk.


DISKCOMP
(External)

DISKCOMP [d:] [d:][/1][/8]

Compares the contents of two diskettes.


DISKCOPY
(External)

DISKCOPY [d:] [d:][/1][/V][/M]

Makes an exact copy of a diskette.


DOS
(Internal)

DOS=[high|low],[umb|noumb]

Used in the CONFIG.SYS file to specify the memory location for DOS. It is used to load DOS into the upper memory area and to specify whether or not the upper memory blocks will be used.


DOSKEY
(External)

DOSKEY [reinstall] [/bufsize=size][/macros][/history][/insert|/overstrike] [macroname=[text]]

Loads the Doskey program into memory which can be used to recall DOS commands so that you can edit them.


DOSSHELL
(External)

DOSSHELL [/B] [/G:[resolution][n]]|[/T:[resolution][n]]

Initiates the graphic shell program using the specified screen resolution.


DRIVPARM
(Internal)

DRIVPARM= /D:(number) [/C] [/F:(form factor)] [/H:(number)] [/I][ /N][/S:(number)] [/T:(tracks)]

Used in the CONFIG.SYS file to set parameters for a disk drive.


ECHO
(Internal)

ECHO on|off
ECHO (message)

Displays messages or turns on or off the display of commands in a batch file.


EDIT
(External)

EDIT [d:][path]filename [/B][/G][/H][/NOHI]

Starts the MS-DOS editor, a text editor used to create and edit ASCII text files.


EMM386
(External)

EMM386 [on|off|auto] [w=on|off]

Enables or disables EMM386 expanded-memory support on a computer with an 80386 or higher processor.


EXE2BIN
(External)

EXE2BIN [d:][path]filename [d:][path]filename

Converts .EXE (executable) files to binary format.


EXIT
(Internal)

EXIT

Exits a secondary command processor.


EXPAND
(External)

EXPAND [d:][path]filename [[d:][path]filename[ . . .]]

Expands a compressed file.


FASTHELP
(External)

FASTHELP [command][command] /?

Displays a list of DOS commands with a brief explanation of each.


FASTOPEN
(External)

FASTOPEN d:[=n][/X]

Keeps track of the locations of files for fast access.


FC
(External)

FC [/A][/C][/L][/Lb n][/N][/T][/W][number] [d:][path]filename [d:][path]filename

or (for binary comparisons)
FC [/B][/number] [d:][path]filename [d:][path]filename

Displays the differences between two files or sets of files.


FCBS
(Internal)

FCBS=(number)

Used in the CONFIG.SYS file to specify the number of file-control blocks for file sharing.


FDISK
(External)

FDISK [/status]

Prepares a fixed disk to accept DOS files for storage.


FILES
(Internal)

FILES=(number)

Used in the CONFIG.Sys file to specify the maximum number of files that can be open at the same time.


FIND
(External)

FIND [/V][/C][/I][/N] ÒstringÓ [d:][path]filename[...]

Finds and reports the location of a specific string of text characters in one or more files.


FOR
(Internal)

FOR %%(variable) IN (set) DO (command)

or (for interactive processing)
FOR %(variable) IN (set) DO (command)

Performs repeated execution of commands (for both batch processing and interactive processing).


FORMAT
(External)

FORMAT d:[/1][/4][/8][/F:(size)] [/N:(sectors)] [/T:(tracks)][/B|/S][/C][/V:(label)] [/Q][/U][/V]

Formats a disk to accept DOS files.


GOTO
(Internal)

GOTO (label)

Causes unconditional branch to the specified label.


GRAFTABL
(External)

GRAFTABL [(code page)]
GRAFTABL [status]

Loads a table of character data into memory (for use with a color/graphics adapter).


GRAPHICS
(External)

GRAPHICS [printer type][profile] [/B][/R][/LCD][/PB:(id)] [/C][/F][/P(port)]

Provides a way to print contents of a graphics screen display.


HELP
(External)

HELP [command] [/B][/G][/H][/NOHI]

Displays information about a DOS command.


IF
(Internal)

IF [NOT] EXIST filename (command) [parameters]
IF [NOT] (string1)==(string2) (command) [parameters]
IF [NOT] ERRORLEVEL (number) (command) [parameters]

Allows for conditional operations in batch processing.


INCLUDE
(Internal)

INCLUDE= blockname

Used in the CONFIG.SYS file to allow you to use the commands from one CONFIG.SYS block within another.


INSTALL
(Internal)

INSTALL=[d: ][\path]filename [parameters]

Used in the CONFIG.SYS file to load memory-resident programs into conventional memory.


INTERLINK
(External)

INTERLINK [client[:]=[server][:]]

Connects two computers via parallel or serial ports so that the computers can share disks and printer ports.


INTERSVR
(External)

INTERSVR [d:][...][/X=d:][...] [/LPT:[n|address]] [/COM:[n|address]][/baud:rate] [/B][/V]
INTERSVR /RCOPY

Starts the Interlink server.


JOIN
(External)

JOIN d: [d:path]
JOIN d: [/D]

Allows access to the directory structure and files of a drive through a directory on a different drive.


KEYB
(External)

KEYB [xx][,][yyy][,][d:][path]filename [/E][/ID:(number)]

Loads a program that replaces the support program for U. S. keyboards.

LABEL
(External)

LABEL [d:][volume label]

Creates or changes or deletes a volume label for a disk.

LASTDRIVE
(Internal)

LASTDRIVE=(drive letter)

Used in the CONFIG.SYS file to set the maximum number of drives that can be accessed.

LOADFIX
(Internal)

LOADFIX [d:][path]filename [parameters]

Ensures that a program is loaded above the first 64K of conventional memory, and runs the program.

LOADHIGH
(Internal)

LOADHIGH (LH) [d:][path]filename [parameters]

Loads memory resident application into reserved area of memory (between 640K-1M).


MEM
(External)

MEM [/program|/debug|/classify|/free|/module(name)] [/page]

Displays amount of installed and available memory, including extended, expanded, and upper memory.


MEMMAKER
(External)

MEMMAKER [/B][/batch][/session][/swap:d] [/T][/undo][/W:size1,size2]

Starts the MemMaker program, a program that lets you optimize your computer's memory.


MENUCOLOR
(Internal)

MENUCOLOR=textcolor,[background]

Used in the CONFIG.SYS file to set the colors that will be used by DOS to display text on the screen.


MENUDEFAULT
(Internal)

MENUDEFAULT=blockname, [timeout]

Used in the CONFIG.SYS file to set the startup configuration that will be used by DOS if no key is pressed within the specified timeout period.


MENUITEM
(Internal)

MENUITEM=blockname, [menutext]

Used in the CONFIG.SYS file to create a start-up menu from which you can select a group of CONFIG.SYS commands to be processed upon reboot.


MIRROR
(External)

MIRROR [d:]path [d:] path [...]
MIRROR [d1:][d2:][...] [/T(drive)(files)] [/partn][/U][/1]

Saves disk storage information that can be used to recover accidentally erased files.


MKDIR
(MD) (Internal)

MKDIR (MD) [d:]path

Creates a new subdirectory.



MODE
(External)

MODE n
MODE LPT#[:][n][,][m][,][P][retry]
MODE [n],m[,T]
MODE (displaytype,linetotal)
MODE COMn[:]baud[,][parity][,][databits][,][stopbits][,][retry]
MODE LPT#[:]=COMn [retry]
MODE CON[RATE=(number)][DELAY=(number)]
MODE (device) CODEPAGE PREPARE=(codepage) [d:][path]filename
MODE (device) CODEPAGE PREPARE=(codepage list) [d:][path]filename
MODE (device) CODEPAGE SELECT=(codepage)
MODE (device) CODEPAGE [/STATUS]
MODE (device) CODEPAGE REFRESH

Sets mode of operation for devices or communications.


MORE
(External)

MORE < (filename or command)
(name)|MORE

Sends output to console, one screen at a time.



MOVE
(Internal)

MOVE [/Y|/-Y] [d:][path]filename[,[d:][path]filename[...]] destination

Moves one or more files to the location you specify. Can also be used to rename directories.



MSAV
(External)

MSAV [d:] [/S|/C][/R][/A][/L][/N][/P][/F][/video][/mouse]
MSAV /video

Scans your computer for known viruses.



MSBACKUP
(External)

MSBACKUP [setupfile] [/BW|/LCD|/MDA]

Used to backup or restore one or more files from one disk to another.



MSCDEX
(External)

MSCDEX /D:driver [/D:driver2. . .] [/E][/K][/S][/V][/L:letter] [/M:number]

Used to gain access to CD-ROM drives (new with DOS Version 6).



MSD
(External)

MSD [/B][/I]
MSD [/I] [/F[d:][path]filename [/P[d:][path]filename [/S[d:][path]filename

Provides detailed technical information about your computer.



NLSFUNC
(External)

NLSFUNC [d:][path]filename

Used to load a file with country-specific information.



NUMLOCK
(Internal)

NUMLOCK=on|off

Used in the CONFIG.SYS file to specify the state of the NumLock key.



PATH
(Internal)

PATH;
PATH [d:]path[;][d:]path[...]

Sets or displays directories that will be searched for programs not in the current directory.



PAUSE
(Internal)

PAUSE [comment]

Suspends execution of a batch file until a key is pressed.



POWER
(External)

POWER [adv:max|reg|min]|std|off]

Used to turn power management on and off, report the status of power management, and set levels of power conservation.



PRINT
(External)

PRINT [/B:(buffersize)] [/D:(device)] [/M:(maxtick)] [/Q:(value] [/S:(timeslice)][/U:(busytick)] [/C][/P][/T] [d:][path][filename] [...]

Queues and prints data files.



PROMPT
(Internal)

PROMPT [prompt text] [options]

Changes the DOS command prompt.



RECOVER
(External)

RECOVER [d:][path]filename
RECOVER d:

Resolves sector problems on a file or a disk. (Beginning with DOS Version 6, RECOVER is no longer available ).



REM
(Internal)

REM [comment]

Used in batch files and in the CONFIG.SYS file to insert remarks (that will not be acted on).



RENAME (REN)
(Internal)

RENAME (REN) [d:][path]filename [d:][path]filename

Changes the filename under which a file is stored.



REPLACE
(External)

REPLACE [d:][path]filename [d:][path] [/A][/P][/R][/S][/U][/W]

Replaces stored files with files of the same name from a different storage location.



RESTORE
(External)

RESTORE d: [d:][path]filename [/P][/S][/B:mm-dd-yy] [/A:mm-dd-yy][/E:hh:mm:ss] [/L:hh:mm:ss] [/M][/N][/D]

Restores to standard disk storage format files previously stored using the BACKUP command.



RMDIR (RD)
(Internal)

RMDIR (RD) [d:]path

Removes a subdirectory.



SCANDISK
(External)

SCANDISK [d: [d: . . .]|/all][/checkonly|/autofix[/nosave]|/custom][/surface][/mono][/nosummay]
SCANDISK volume-name[/checkonly|/autofix[/nosave]|/custom][/mono][/nosummary]
SCANDISK /fragment [d:][path]filename
SCANDISK /undo [undo-d:][/mono]

Starts the Microsoft ScanDisk program which is a disk analysis and repair tool used to check a drive for errors and correct any problems that it finds.



SELECT
(External)

SELECT [d:] [d:][path] [country code][keyboard code]

Formats a disk and installs country-specific information and keyboard codes (starting with DOS Version 6, this command is no longer available).



SET
(Internal)

SET (string1)=(string2)

Inserts strings into the command environment. The set values can be used later by programs.


SETVER
(External)

SETVER [d:]:path][filename (number)][/delete][/quiet]

Displays the version table and sets the version of DOS that is reported to programs.



SHARE
(External)

SHARE [/F:space] [/L:locks]

Installs support for file sharing and file locking.



SHELL
(Internal)

SHELL=[d:][path]filename [parameters]

Used in the CONFIG.SYS file to specify the command interpreter that DOS should use.



SHIFT
(Internal)

SHIFT

Increases number of replaceable parameters to more than the standard ten for use in batch files.



SORT
(External)

SORT [/R][/+n] < (filename)
SORT [/R][/+n] > (filename2)

Sorts input and sends it to the screen or to a file.



STACKS
(Internal)

STACKS=(number),(size)

Used in the CONFIG.SYS file to set the number of stack frames and the size of each stack frame.



SUBMENU
(Internal)

SUBMENU=blockname, [menutext]

Used in the CONFIG.SYS file to create a multilevel menu from which you can select start-up options.



SUBST
(External)

SUBST d: d:path
SUBST d: /D

Substitutes a virtual drive letter for a path designation.



SWITCHES
(Internal)

SWITCHES= [/K][/F][/N][/W]

Used in the CONFIG.SYS file to configure DOS in a special way; for example, to tell DOS to emulate different hardware configurations.



SYS
(External)

SYS [source] d:

Transfers the operating system files to another disk.



TIME
(Internal)

TIME hh:mm[:ss][.cc][A|P]

Displays current time setting of system clock and provides a way for you to reset the time.



TREE
(External)

TREE [d:][path] [/A][/F]

Displays directory paths and (optionally) files in each subdirectory.



TYPE
(Internal)

TYPE [d:][path]filename

Displays the contents of a file.



UNDELETE
(External)

UNDELETE [d:][path][filename] [/DT|/DS|/DOS]
UNDELETE [/list|/all|/purge[d:]|/status|/load|/U|/S[d:]|/Td:[-entries]]

Restores files deleted with the DELETE command.



UNFORMAT
(External)

UNFORMAT d: [/J][/L][/test][/partn][/P][/U]

Used to undo the effects of formatting a disk.



VER
(Internal)

VER

Displays the DOS version number.



VERIFY
(Internal)

VERIFY on|off

Turns on the verify mode; the program checks all copying operations to assure that files are copied correctly.



VOL
(Internal)

VOL [d:]

Displays a disk's volume label.



VSAFE
(External)

VSAFE [/option[+|-]...] [/NE][/NX][Ax|/Cx] [/N][/D][/U]

VSAFE is a memory-resident program that continuously monitors your computer for viruses and displays a warning when it finds one.



XCOPY
(External)

XCOPY [d:][path]filename [d:][path][filename] [/A][/D:(date)] [/E][/M][/P][/S][/V][/W][Y\-Y]
Copies directories, subdirectories, and files.



Syntax Notes

To be functional, each DOS command must be entered in a particular way: this command entry structure is known as the command's "syntax." The syntax "notation" is a way to reproduce the command syntax in print.

For example, you can determine the items that are optional, by looking for information that is printed inside square brackets. The notation [d:], for example, indicates an optional drive designation. The command syntax, on the other hand, is how YOU enter the command to make it work.


Command Syntax Elements
1. Command Name

The DOS command name is the name you enter to start the DOS program (a few of the DOS commands can be entered using shortcut names). The DOS command name is always entered first. In this book, the command is usually printed in uppercase letters, but you can enter command names as either lowercase or uppercase or a mix of both.

2. Space

Always leave a space after the command name.

3. Drive Designation

The drive designation (abbreviated in this book as "d:") is an option for many DOS commands. However, some commands are not related to disk drives and therefore do not require a drive designation. Whenever you enter a DOS command that deals with disk drives and you are already working in the drive in question, you do not have to enter the drive designator. For example, if you are working in drive A (when the DOS prompt A> is showing at the left side of the screen) and you want to use the DIR command to display a directory listing of that same drive, you do not have to enter the drive designation. If you do not enter a drive designation, DOS always assumes you are referring to the drive you are currently working in (sometimes called the "default" drive).

4. A Colon

When referring to a drive in a DOS command, you must always follow the drive designator with a colon (:) (this is how DOS recognizes it as a drive designation).

5. Pathname

A pathname (path) refers to the path you want DOS to follow in order to act on the DOS command. As described in Chapter 3, it indicates the path from the current directory or subdirectory to the files that are to be acted upon.

6. Filename

A filename is the name of a file stored on disk. As described in Chapter 1, a filename can be of eight or fewer letters or other legal characters.

7. Filename Extension

A filename extension can follow the filename to further identify it. The extension follows a period and can be of three or fewer characters. A filename extension is not required.

8. Switches

Characters shown in a command syntax that are represented by a letter or number and preceded by a forward slash (for example, "/P") are command options (sometimes known as "switches"). Use of these options activate special operations as part of a DOS command's functions.

9. Brackets

Items enclosed in square brackets are optional; in other words, the command will work in its basic form without entering the information contained inside the brackets.

10. Ellipses

Ellipses (...) indicate that an item in a command syntax can be repeated as many times as needed.

11. Vertical Bar

When items are separated by a vertical bar (|), it means that you enter one of the separated items. For example: ON | OFF means that you can enter either ON or OFF, but not both