MEMPERCEPAT PERFORMA MODEM KAMU

You can't assume that just because you connected at a speed like 48.3KBps that you will stay there. Today's modems automatically fall back to a lower speed if the line noise is too high to maintain a faster connection, but sometimes they fall back too soon or too far.

Here's how to do it:


Click Start the button.
Select Settings.
Click Control Panel.
Double-click on the Modems icon.
Select your modem.
Click the Properties button.
Click the Connections tab.
Click the Advanced button.
In the "Extra settings" field, type S36=7
Click OK to save your settings.


This will force your modem to try to stay connected at high speeds in two different ways before dropping back to an asynchr
read more “MEMPERCEPAT PERFORMA MODEM KAMU”

HOW TO FIND SERIAL NUMBER IN GOOGLE

ok, this is a little trick that i usually use to find cd keys with google.


if your looking for a serial number for nero (for example) goto google.com and type nero 94FBR and it'll bring it up

this works great in google

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.

1)The pages that are returned are pages dealing specifically with the product you're wantinga serial for.

2)Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.


I hope this trick help you finding your ccd keys easily

Enjoy :)
read more “HOW TO FIND SERIAL NUMBER IN GOOGLE”

KEY BOARD SHORTCUT

Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. I use the following keyboard shortcuts every day:

Windows key + R = Run menu

This is usually followed by:
cmd = Command Prompt
iexplore + "web address" = Internet Explorer
compmgmt.msc = Computer Management
dhcpmgmt.msc = DHCP Management
dnsmgmt.msc = DNS Management
services.msc = Services
eventvwr = Event Viewer
dsa.msc = Active Directory Users and Computers
dssite.msc = Active Directory Sites and Services
Windows key + E = Explorer

ALT + Tab = Switch between windows

ALT, Space, X = Maximize window

CTRL + Shift + Esc = Task Manager

Windows key + Break = System properties

Windows key + F = Search

Windows key + D = Hide/Display all windows

CTRL + C = copy

CTRL + X = cut

CTRL + V = paste

Also don't forget about the "Right-click" key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you've opened up any program.


Keyboard Shortcuts

[Alt] and [Esc] Switch between running applications

[Alt] and letter Select menu item by underlined letter

[Ctrl] and [Esc] Open Program Menu

[Ctrl] and [F4] Close active document or group windows (does not work with some applications)

[Alt] and [F4] Quit active application or close current window

[Alt] and [-] Open Control menu for active document

Ctrl] Lft., Rt. arrow Move cursor forward or back one word

Ctrl] Up, Down arrow Move cursor forward or back one paragraph

[F1] Open Help for active application

Windows+M Minimize all open windows

Shift+Windows+M Undo minimize all open windows

Windows+F1 Open Windows Help

Windows+Tab Cycle through the Taskbar buttons

Windows+Break Open the System Properties dialog box



acessability shortcuts

Right SHIFT for eight seconds........ Switch FilterKeys on and off.

Left ALT +left SHIFT +PRINT SCREEN....... Switch High Contrast on and off.

Left ALT +left SHIFT +NUM LOCK....... Switch MouseKeys on and off.

SHIFT....... five times Switch StickyKeys on and off.

NUM LOCK...... for five seconds Switch ToggleKeys on and off.

explorer shortcuts

END....... Display the bottom of the active window.

HOME....... Display the top of the active window.

NUM LOCK+ASTERISK....... on numeric keypad (*) Display all subfolders under the selected folder.

NUM LOCK+PLUS SIGN....... on numeric keypad (+) Display the contents of the selected folder.

NUM LOCK+MINUS SIGN....... on numeric keypad (-) Collapse the selected folder.

LEFT ARROW...... Collapse current selection if it's expanded, or select parent folder.

RIGHT ARROW....... Display current selection if it's collapsed, or select first subfolder.




Type the following commands in your Run Box (Windows Key + R) or Start Run

devmgmt.msc = Device Manager
msinfo32 = System Information
cleanmgr = Disk Cleanup
ntbackup = Backup or Restore Wizard (Windows Backup Utility)
mmc = Microsoft Management Console
excel = Microsoft Excel (If Installed)
msaccess = Microsoft Access (If Installed)
powerpnt = Microsoft PowerPoint (If Installed)
winword = Microsoft Word (If Installed)
frontpg = Microsoft FrontPage (If Installed)
notepad = Notepad
wordpad = WordPad
calc = Calculator
msmsgs = Windows Messenger
mspaint = Microsoft Paint
wmplayer = Windows Media Player
rstrui = System Restore
netscp6 = Netscape 6.x
netscp = Netscape 7.x
netscape = Netscape 4.x
waol = America Online
control = Opens the Control Panel
control printers = Opens the Printers Dialog


internetbrowser

type in u're adress "google", then press [Right CTRL] and [Enter]
add www. and .com to word and go to it


For Windows XP:

Copy. CTRL+C
Cut. CTRL+X
Paste. CTRL+V
Undo. CTRL+Z
Delete. DELETE
Delete selected item permanently without placing the item in the Recycle Bin. SHIFT+DELETE
Copy selected item. CTRL while dragging an item
Create shortcut to selected item. CTRL+SHIFT while dragging an item
Rename selected item. F2
Move the insertion point to the beginning of the next word. CTRL+RIGHT ARROW
Move the insertion point to the beginning of the previous word. CTRL+LEFT ARROW
Move the insertion point to the beginning of the next paragraph. CTRL+DOWN ARROW
Move the insertion point to the beginning of the previous paragraph. CTRL+UP ARROW
Highlight a block of text. CTRL+SHIFT with any of the arrow keys
Select more than one item in a window or on the desktop, or select text within a document. SHIFT with any of the arrow keys
Select all. CTRL+A
Search for a file or folder. F3
View properties for the selected item. ALT+ENTER
Close the active item, or quit the active program. ALT+F4
Opens the shortcut menu for the active window. ALT+SPACEBAR
Close the active document in programs that allow you to have multiple documents open simultaneously. CTRL+F4
Switch between open items. ALT+TAB
Cycle through items in the order they were opened. ALT+ESC
Cycle through screen elements in a window or on the desktop. F6
Display the Address bar list in My Computer or Windows Explorer. F4
Display the shortcut menu for the selected item. SHIFT+F10
Display the System menu for the active window. ALT+SPACEBAR
Display the Start menu. CTRL+ESC
Display the corresponding menu. ALT+Underlined letter in a menu name
Carry out the corresponding command. Underlined letter in a command name on an open menu
Activate the menu bar in the active program. F10
Open the next menu to the right, or open a submenu. RIGHT ARROW
Open the next menu to the left, or close a submenu. LEFT ARROW
Refresh the active window. F5
View the folder one level up in My Computer or Windows Explorer. BACKSPACE
Cancel the current task. ESC
SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.

Use these keyboard shortcuts for dialog boxes:

To Press
Move forward through tabs. CTRL+TAB
Move backward through tabs. CTRL+SHIFT+TAB
Move forward through options. TAB
Move backward through options. SHIFT+TAB
Carry out the corresponding command or select the corresponding option. ALT+Underlined letter
Carry out the command for the active option or button. ENTER
Select or clear the check box if the active option is a check box. SPACEBAR
Select a button if the active option is a group of option buttons. Arrow keys
Display Help. F1
Display the items in the active list. F4
Open a folder one level up if a folder is selected in the Save As or Open dialog box. BACKSPACE

If you have a Microsoft Natural Keyboard, or any other compatible keyboard that includes the Windows logo key and the Application key , you can use these keyboard shortcuts:


Display or hide the Start menu. WIN Key
Display the System Properties dialog box. WIN Key+BREAK
Show the desktop. WIN Key+D
Minimize all windows. WIN Key+M
Restores minimized windows. WIN Key+Shift+M
Open My Computer. WIN Key+E
Search for a file or folder. WIN Key+F
Search for computers. CTRL+WIN Key+F
Display Windows Help. WIN Key+F1
Lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain. WIN Key+ L
Open the Run dialog box. WIN Key+R
Open Utility Manager. WIN Key+U

accessibility keyboard shortcuts:

Switch FilterKeys on and off. Right SHIFT for eight seconds
Switch High Contrast on and off. Left ALT+left SHIFT+PRINT SCREEN
Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK
Switch StickyKeys on and off. SHIFT five times
Switch ToggleKeys on and off. NUM LOCK for five seconds
Open Utility Manager. WIN Key+U

shortcuts you can use with Windows Explorer:


Display the bottom of the active window. END
Display the top of the active window. HOME
Display all subfolders under the selected folder. NUM LOCK+ASTERISK on numeric keypad (*)
Display the contents of the selected folder. NUM LOCK+PLUS SIGN on numeric keypad (+)
Collapse the selected folder. NUM LOCK+MINUS SIGN on numeric keypad (-)
Collapse current selection if it's expanded, or select parent folder. LEFT ARROW
Display current selection if it's collapsed, or select first subfolder. RIGHT ARROW
read more “KEY BOARD SHORTCUT”

BANDWIDTH EXPLAINED

Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.


Network Connectivity

The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location. It is the size of each network connection that determines how much bandwidth is available. For example, if you use a DSL connection to connect to the internet, you have 1.54 Mega bits (Mb) of bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are grouped in bytes which form words, text, and other information that is transferred between your computer and the internet.

If you have a DSL connection to the internet, you have dedicated bandwidth between your computer and your internet provider. But your internet provider may have thousands of DSL connections to their location. All of these connection aggregate at your internet provider who then has their own dedicated connection to the internet (or multiple connections) which is much larger than your single connection. They must have enough bandwidth to serve your computing needs as well as all of their other customers. So while you have a 1.54Mb connection to your internet provider, your internet provider may have a 255Mb connection to the internet so it can accommodate your needs and up to 166 other users (255/1.54).


Traffic

A very simple analogy to use to understand bandwidth and traffic is to think of highways and cars. Bandwidth is the number of lanes on the highway and traffic is the number of cars on the highway. If you are the only car on a highway, you can travel very quickly. If you are stuck in the middle of rush hour, you may travel very slowly since all of the lanes are being used up.

Traffic is simply the number of bits that are transferred on network connections. It is easiest to understand traffic using examples. One Gigabyte is 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024 megabytes. To put this in perspective, it takes one byte to store one character. Imagine 100 file cabinets in a building, each of these cabinets holds 1000 folders. Each folder has 100 papers. Each paper contains 100 characters - A GB is all the characters in the building. An MP3 song is about 4MB, the same song in wav format is about 40MB, a full length movie can be 800MB to 1000MB (1000MB = 1GB).

If you were to transfer this MP3 song from a web site to your computer, you would create 4MB of traffic between the web site you are downloading from and your computer. Depending upon the network connection between the web site and the internet, the transfer may occur very quickly, or it could take time if other people are also downloading files at the same time. If, for example, the web site you download from has a 10MB connection to the internet, and you are the only person accessing that web site to download your MP3, your 4MB file will be the only traffic on that web site. However, if three people are all downloading that same MP at the same time, 12MB (3 x 4MB) of traffic has been created. Because in this example, the host only has 10MB of bandwidth, someone will have to wait. The network equipment at the hosting company will cycle through each person downloading the file and transfer a small portion at a time so each person's file transfer can take place, but the transfer for everyone downloading the file will be slower. If 100 people all came to the site and downloaded the MP3 at the same time, the transfers would be extremely slow. If the host wanted to decrease the time it took to download files simultaneously, it could increase the bandwidth of their internet connection (at a cost due to upgrading equipment).


Hosting Bandwidth

In the example above, we discussed traffic in terms of downloading an MP3 file. However, each time you visit a web site, you are creating traffic, because in order to view that web page on your computer, the web page is first downloaded to your computer (between the web site and you) which is then displayed using your browser software (Internet Explorer, Netscape, etc.) . The page itself is simply a file that creates traffic just like the MP3 file in the example above (however, a web page is usually much smaller than a music file).

A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for CNN.com is about 200KB (200 Kilobytes = 200,000 bytes = 1,600,000 bits). This is typically large for a web page. In comparison, Yahoo's home page is about 70KB.


How Much Bandwidth Is Enough?

It depends (don't you hate that answer). But in truth, it does. Since bandwidth is a significant determinant of hosting plan prices, you should take time to determine just how much is right for you. Almost all hosting plans have bandwidth requirements measured in months, so you need to estimate the amount of bandwidth that will be required by your site on a monthly basis

If you do not intend to provide file download capability from your site, the formula for calculating bandwidth is fairly straightforward:

Average Daily Visitors x Average Page Views x Average Page Size x 31 x Fudge Factor

If you intend to allow people to download files from your site, your bandwidth calculation should be:

[(Average Daily Visitors x Average Page Views x Average Page Size) +
(Average Daily File Downloads x Average File Size)] x 31 x Fudge Factor

Let us examine each item in the formula:

Average Daily Visitors - The number of people you expect to visit your site, on average, each day. Depending upon how you market your site, this number could be from 1 to 1,000,000.

Average Page Views - On average, the number of web pages you expect a person to view. If you have 50 web pages in your web site, an average person may only view 5 of those pages each time they visit.

Average Page Size - The average size of your web pages, in Kilobytes (KB). If you have already designed your site, you can calculate this directly.

Average Daily File Downloads - The number of downloads you expect to occur on your site. This is a function of the numbers of visitors and how many times a visitor downloads a file, on average, each day.

Average File Size - Average file size of files that are downloadable from your site. Similar to your web pages, if you already know which files can be downloaded, you can calculate this directly.

Fudge Factor - A number greater than 1. Using 1.5 would be safe, which assumes that your estimate is off by 50%. However, if you were very unsure, you could use 2 or 3 to ensure that your bandwidth requirements are more than met.

Usually, hosting plans offer bandwidth in terms of Gigabytes (GB) per month. This is why our formula takes daily averages and multiplies them by 31.


Summary

Most personal or small business sites will not need more than 1GB of bandwidth per month. If you have a web site that is composed of static web pages and you expect little traffic to your site on a daily basis, go with a low bandwidth plan. If you go over the amount of bandwidth allocated in your plan, your hosting company could charge you over usage fees, so if you think the traffic to your site will be significant, you may want to go through the calculations above to estimate the amount of bandwidth required in a hosting plan.
read more “BANDWIDTH EXPLAINED”

8 PEOPLE CAN USE THE SAME MSN DIAL UP

8 People Can Use The Same Msn Dial Up Account

its easy really. want to have an entire family on dial-up with just one bill?

step one. purchase 20 dollar a month subscription to MSN unlimited access dial up. This will include an MSN 9 cd which you will need. With the software installed, fill up your secondary account slots with new users. Make sure you pick @msn if it gives you the choice, hotmail email addresses will not work..

say the secondary account is johnsmith@msn.com type in the Dial up connection

USER : MSN/johnsmith
PASS: ******* (whatever)

connect to your local msn phone number and the other people you gave secondary accounts to will be able to do the same, while you are connected. Its a sweet deal considering everyone is paying about 2 bucks a month for internet access, especially if you cannot get broadband. if you wanted to sell off the access to people you could actually make money doing this.. but i do not suggest it.

I used to be an msn tech and this was a little known secret even to most of the employees.

After you do this you do not need the software any more. I would suggest keeping it on to micromanage everyone else's accounts. and for the simple fact that if they don't pitch in, cut them off HEHEHE

i'm on broadband now so i dont care if i tell you my little secret. anyone else knew of this?
read more “8 PEOPLE CAN USE THE SAME MSN DIAL UP”

COMPUTER ELECTRONIC MAIL AND PRIVACY

COMPUTER ELECTRONIC MAIL AND PRIVACY
====================================

by

Ruel T. Hernandez

801 Cedarbend Way
Chula Vista, California 92010
(619) 421-6517 (voice)
(CompuServe: 71450,3341)
(GEnie Mail: R.HERNANDEZ)

January 11, 1987

Copyright (c) 1986, 1987 by Ruel T. Hernandez


(This is an edited version of a law school seminar paper I wrote at
California Western School of Law. A another version of the paper, entitled
"Electronic Mail - Your Right to Privacy," by Ruel T. Hernandez as told to
Dan Gookin, was published as the cover story in The Byte Buyer, San Diego's
Microcomputer Magazine, volume 4, number 24, December 5, 1986. That version
may also be found on their BBS at 619/226-3304 or 619/573-0359. Note,
citations to the Electronic Communications Privacy Act of 1986 refer to the
final version passed by the House of Representatives on October 2, 1986,
which was passed by the Senate the day before, as listed in the
Congressional Record.)


INTRODUCTION

Two years ago, legislation was introduced into Congress that sought to
provide federal statutory guidelines for privacy protection of computer
communications, such as electronic mail found on commercial computer systems
and on remote computer systems, commonly known as bulletin board systems
(BBS). Old federal wiretap law only gave protection to normal audio
telephonic communications. There was no contemplation of computers or their
operators using telephone lines to communicate. The old federal wiretap law
regulated police interceptions of communications while they are being
transmitted on a telephone line. Before the Electronic Communications
Privacy Act of 1976, the law did not provide guidelines for protecting the
transmitted message once it was stored within a computer system.


QUESTIONS

(1) Whether electronic mail and other intended private material stored
within an electronic computer communication system have Fourth Amendment
privacy protection?

(2) Should private electronic mail and other such material be accorded
the protection guidelines as with telephone communication and the U.S. Mail?


PROBLEM

Law enforcement seeks criminal evidence stored as E-Mail on either a
local, user-supported BBS, or on a commercial computer service, such as
CompuServe, GEnie or The Source. (Note, this situation is equally
applicable to personal, private data stored on a remote system for later
retrieval, as with CompuServe's online disk storage capabilities.)

For instance, a computer user calls up a computer communication system.
Using the electronic mail function, he leaves a private message that can
only be read by an intended recipient. The message is to inform the
recipient of a conspiracy plan to violate a federal or state criminal
statute. Law enforcement gets a tip about the criminal activity and learn
that incriminating evidence may be found on the computer system.

In 1982, such a situation occurred. (Meeks, Brock, "Life at 300 Baud:
Crime on the BBS Network," Profiles, August, 1986, 12-13.) A Detroit
federal grand jury, investigating a million-dollar cocaine ring, issued a
subpoena ordering a commercial service, The Source, to hand over private
subscriber data files. The files were routinely backed up to guard against
system crashes. The grand jury was looking for evidence to show that the
cocaine ring was using The Source as communication base to send messages to
members of the ring. With such evidence, the grand jury could implicate or
indict those suspected to be a part of the cocaine ring. The Source refused
to obey the subpoena. The prosecution argued The Source could not
vicariously assert a subscriber's privacy rights. Constitutional rights are
personal and could only be asserted by the person whose rights are invaded.
Additionally, if the files containing messages were duplicated, any
reasonable expectation of privacy by users would be extinguished. A court
battle ensued. However, before a ruling could be made, the kingpin of the
cocaine ring entered a surprise guilty plea to federal drug trafficking
charges. The case against the Source was discontinued.

Publicly posted messages and other public material may be easily
retrieved by law enforcement. It is the private material, such as E-Mail,
that poses the problem.

Law enforcement's task is then to gather enough evidence to
substantiate a criminal case. Specifically, they would want the E-Mail, or
other private files, transmitted by suspected criminals. A computer
communications service, as keeper and transmitter of private electronic
messages, would not want to turn over the private data.


INADEQUACY OF OLD LAW

Brock Meeks of Profiles magazine noted that as of August, 1986, "no ...
protection exist[ed] for electronic communications. Any law enforcement
agency can, for example, confiscate a local BBS and examine all the message
traffic," including and private files and E-Mail. (Ibid.)

In the next section, case law will be examined and statutory law prior
to the Electronic Communications Privacy Act of 1986 (ECPA) will be noted.
Seemingly applicable statutes, as they stood, provided no guidelines for
privacy protection of electronic computer communication systems, such as
CompuServe, GEnie, and local, user-operated BBSs.

CASE LAW

There is little case law available on computer communications and
Fourth Amendment constitutional problems. (M.D. Scott, Computer Law, 9-9
(1984 & Special Update, August 1, 1984).) If not for the surprise
preemptive guilty plea, the above described Detroit case may have provided
guidance on computer communications and privacy issues.

Of the available cases, Scott noted those that primarily dealt with
financial information found in bank and consumer credit organization
computers. In U.S. v. Davey, 426 F.2d 842, 845 (2 Cir. 1970), the
government had the right to require the production of relevant information
wherever it may be lodged and regardless of the form in which it is kept and
the manner in which it may be retrieved, so long as it pays the reasonable
costs of retrieval. In a California case, Burrows v. Superior Court, 13
Cal. 3d 238, 243, 118 Cal. Rptr. 166, 169 (1974), a depositor was found to
have a reasonable expectation that a bank would maintain the confidentiality
of both those papers in check form originating from the depositor and the
depositor's bank statements and records of those same checks. However, in
U.S. v. Miller, 425 U.S. 435, 440 (1976), customer account records on a
banks' computer were held to not be private papers of the bank customer,
and, hence, there is no Fourth Amendment problem when they are subpoenaed
directly from the bank.

The computer data and information in these cases have more of a
business character in contrast to personal E-Mail found on remote computer
systems such as CompuServe or a local BBS. Under the old law, a prosecutor,
as in the Detroit case, may try to analogize duplicated and backed up E-Mail
to business situations where data on business computer databases are also
backed up. Both types of computer data are stored on a system and then
later retrieved. The provider of the remote computing service or the sysop
would counterargue that the nature of computers always require the
duplication and backup of any computer data, whether the data files are E-
Mail or centrally-based financial or credit data. Duplication does not
necessarily make E-Mail the same as financial or credit data stored in
business computers. Centrally-based business information is more concerned
with the data processing. That information is generally stored and
retrieved by the same operator. E-Mail is more concerned with personal
communications between individuals where the sender transmits a private
message to be retrieved only by an intended recipient. The sender and the
recipient have subjective expectations of privacy that when viewed
objectively is reasonable. Therefore, there is a constitutionally protected
expectation of privacy under Katz v. U.S., 389 U.S. 347, 19 L.Ed. 88 S.Ct.
507 (1967). However, the prosecution would note under California v.
Ciraolo, -- U.S. --, 106 S.Ct. 1809 (1984), the users would have to protect
their electronic mail from any privacy intrusion. The provider or operator
of the remote system has ultimate control of his system. He has complete
access to all areas of the system. He could easily examine the material.
The prosecution would note the user could not reasonably protect his private
data from provider or operator invasion. This "knot-hole" would exclude any
idea of privacy. If there is no privacy, there can be no search and
therefore no Fourth Amendment constitutional violation. Law enforcement can
retrieve the material.

FEDERAL WIRETAP STATUTES

The federal wiretap statutes, before the Electronic Communication
Privacy Act of 1986, protected oral telephone communications from police
interceptions. This protection was made in 1968 in response to electronic
eavesdropping by government. (Cohodas, Nadine, "Congress Races to stay
Ahead of Technology," Congressional Quarterly Weekly Report, May 31, 1986,
1235.) Although E-Mail appears to come under the statute's definition of
"wire communication," under the old law, it was limited to audio
transmissions by wire or cable and does not mention stored computer data.
(18 U.S.C. sec. 2510(1).) The old law required that an interception of a
wire communication be an aural acquisition of the communication. (18 U.S.C.
sec. 2510(4).) Being "aural," the communication must be "heard."
Therefore, a computer communication may come under the old law while being
transmitted. After a caller's message is "sent" on a remote computer
system, the message is then stored within the computer's system. The
communication's conversion into computer stored data, thus no longer in
transmission until retrieved, takes the communication out of the old
statutory protection.

"Eighteen years ago ... Congress could not appreciate - or in some
cases even contemplate - [today's] telecommunications and computer
technology...." (132 Cong. Rec. S7992 (daily ed. June 19, 1986) (statement
of Sen. Leahy).)

CALIFORNIA'S INVASION OF PRIVACY AND WIRETAP STATUTE

California's "invasion of privacy" and wiretap statutes (Cal. Penal
Code sec. 630 et seq.), appears to provide state protection for BBSs.
California Penal Code sec. 637 reads as:

Every person not a party to a telegraphic or telephonic
communication who willfully discloses the contents of a
telegraphic or telephonic message, or any part thereof, addressed
to another person, without the permission of such person, unless
directed so to do by the lawful order of a court, is punishable
by imprisonment in the state prison, or in the count jail not
exceeding one year, or by fine not exceeding five thousand
dollars ($5000), or by both fine and imprisonment.

Again, the question here would be whether "telegraphic or telephonic
messages" include computer communications via modem where a transmitted
message is subsequently stored within a computer awaiting retrieval by its
intended recipient. Again, the storage of the data takes the computer
communications out of the statute. When the statute was passed, the
California legislature, much like the Congress, could not foresee the
technological advances in computer communications.

It should be noted that Assemblywoman Moore introduced legislation in
1985 that would amend have the California state constitution to explicitly
provide state constitutional privacy protection for remote computing
services and their stored information. However, nothing has come out of
this. Aside from political reasons for the lack of further action is one
possible legal consequential argument against the amendment may be if
computer privacy protection is specified in the state constitution, more
litigation may result to tie up the courts in cases deciding whether or not
there is privacy protection for other unspecified matters. Although,
overall, the California state constitution is much more specific than the
United States Constitution, it may be best to not be any more specific with
regard to privacy.

PROTECTION FOR U.S. MAIL

Statutory U.S. Mail protection provides a suggestion for statutory
provisions of privacy protection for E-Mail deposited in electronic
communication systems. The unauthorized taking out of and examining of the
contents of mail held in a "depository for mail matter" before it is
delivered to the mail's intended recipient is punishable by fine,
imprisonment, or both. (18 U.S.C. sec. 1702.)


SOLUTION - THE NEW LAW

There are two methods towards a solution: (1) court decisions; and (2)
new legislated privacy protection.

COURT DECISIONS

Courts may have chosen to read computer communications protection into
the old federal wiretap statute or into existing state law. However, they
were reluctant to do so. Courts "are in no hurry to [revise or make new law
in this area] and some judges are openly asking Congress for help....
[F]ederal Appeals Court Judge Richard Posner in Chicago said Congress needed
to revise current law, adding that 'judges are not authorized to amend
statutes even to bring them up-to-date.'" (Cohodas, Nadine, "Congress Races
to Stay Ahead of Technology," Congressional Quarterly Weekly Report, May 31,
1986, p. 1233.)

NEW STATUTE

Last October 21, 1986, President Reagan signed the Electronic
Communications Privacy Act of 1986 amending the federal wiretap law. The
new Act (P.L. 99-508) would not take immediate effect until three months
after the signing - presumably January 21, 1986. (18 U.S.C. secs. 111 and
202.)

When the new law does take effect, it would first provide privacy
protection for any

'electronic communication' ... [by] any transfer of signs,
signals, writing, images, sounds, data or intelligence of any
nature transmitted in whole or in part by a wire, radio,
electromagnetic, photoelectronic or photooptical system that
affects interstate or foreign commerce...."

(18 U.S.C. sec. 2510(10).)

Second, and more importantly for this discussion, ECPA would protect
"stored wire and electronic communications," i.e. E-Mail stored and backed
up on disk or tape on an electronic computer communication system. (18
U.S.C. sec. 2701(a)(1) and (2).) The legislation makes it a federal
criminal offense to break into any electronic system holding copies of
messages or to exceed authorized access to alter or obtain the stored
messages. (Ibid.)

The legislation would protect electronic computer communication systems
from law enforcement invasion of user E-Mail without a court order. (18
U.S.C. sec. 2703.) Although the burden of preventing invasion of the E-Mail
is placed on the subscriber or user of the system, the government must give
him notice allowing him fourteen days to file a motion to quash a subpoena
or to vacate a court order seeking disclosure of his computer data. (18
U.S.C. sec. 2704(b).) However, the government may give delayed notice when
there are exigent circumstances as listed by the Act (18 U.S.C. sec. 2705.)

The legislation gives a civil cause of action to the provider or
operator, subscriber, customer or user of the system aggrieved by an
invasion of private material stored in the system in violation of ECPA. (18
U.S.C. sec. 2702; see also 18 U.S.C. sec. 2520.) If the provider or
operator has to disclose information stored on his system due to a court
order, warrant, subpoena, or certification under ECPA, there can be no cause
of action against him by any person aggrieved by such disclosure. (18
U.S.C. sec. 2703(e); see also sec. 2702(b).)

The electronic communications, under this new Act, must be sent by a
system that "affects interstate or foreign commerce." (18 U.S.C. sec.
2510(12).) The "electronic communications" may practically be limited to
electronic communications sent by common carrier telephone lines.

There may be some question as to whether or not ECPA is confined to
commercial systems and does not cover user-operated bulletin board systems.
That would be similar to arguing the old federal wiretap law was confined to
long distance communications and not to local telephone calls. The House
report (H.R. No. 647, 99th Cong. (1986)), indicates user-operated BBSs are
intended to be covered by the Act. The House noted a difference between
commercial subscription systems and user-operated BBSs readily accessible by
the public. However, it also noted the different levels of security found
on user-operated BBSs, i.e. the difference between system areas containing
private electronic mail and other areas containing public information.
Electronic communications that the operator attempts to keep confidential
would be protected by ECPA, while there would be no liability for access to
features configured to be readily accessible by the general public.
Language in the Act also refers to "the person or entity providing the wire
or electronic communication service." Such language may be seen to indicate
the inclusion of individuals who operate a BBS. (18 U.S. secs. 2701(c)(1)
and 2702(a)(1) and (b).) Additionally, a remote computing service was
defined in the Act as an electronic communications system that provides
computer storage or processing services to the public. (18 U.S.C. sec.
2710(2).) This would certainly be applicable to a user-operated BBS that
is easily accessible to public with the simple dialing of a telephone number
by a modem-equipped computer. On the political side, Senator Leahy, a
principal sponsor of the Act was reported to have been "soliciting [users
and operators' of BBSs] comments and encourage sensitivity to the needs of
BBS's in the legislation.... They are ... willing to listen to our side of
things." (BBSLAW02.MSG, dated 07/24/85, information from Chip Berlet,
Secretary, National Lawyers Guild Civil Liberties Committee, transmitted by
Paul Bernstein, SYSOP, LAW MUG, Chicago, Illinois 312/280-8180, regarding
Federal Legislation Affecting Computer Bulletin Boards, deposited on The
Legacy Network 213/553-1473.)


CONCLUSION

Electronic mail stored on computer communication systems have Fourth
Amendment constitutional privacy protection. Unfortunately, before the
Electronic Communications Privacy Act of 1986, such protection was not
articulated by federal or state statutory guidelines. Case law also did
not provide any helpful guidance. The peculiarities of computers and
computer storage posed problems which were not addressed by the old wiretap
laws. They were also problems overwhelmed by constitutional privacy law as
defined by the United States Supreme Court. A legislative solution was
required and was provided for by ECPA.

[For more information on ECPA, see 132 Cong. Rec. H8977 (daily ed.
October 2, 1986) or "Major Provisions of 1986 Electronic Privacy Act,"
Congressional Quarterly Weekly Report, October 11, 1986, 2558.]
read more “COMPUTER ELECTRONIC MAIL AND PRIVACY”

ALL ABOUT SPYWARE

here are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.

What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.

Known spywares
There are thousands out there, new ones are added to the list everyday. But here are a few:
Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.

How to check if a program has spyware?
The is this Little site that keeps a database of programs that are known to install spyware.

Check Here: http://www.spywareguide.com/product_search.php

If you would like to block pop-ups (IE Pop-ups).
There tons of different types out there, but these are the 2 best, i think.

Try: Google Toolbar (http://toolbar.google.com/) This program is Free
Try: AdMuncher (http://www.admuncher.com) This program is Shareware

If you want to remove the "spyware" try these.
Try: Lavasoft Ad-Aware (http://www.lavasoftusa.com/) This program is Free
Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.

Try: Spybot-S&D (http://www.safer-networking.org/) This program is Free
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.

Try: BPS Spyware and Adware Remover (http://www.bulletproofsoft.com/spyware-remover.html) This program is Shareware
Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you'd like to remove.

Try: Spy Sweeper v2.2 (http://www.webroot.com/wb/products/spysweeper/index.php) This program is Shareware
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.
The best scanner out there, and updated all the time.

Try: HijackThis 1.97.7 (http://www.spywareinfo.com/~merijn/downloads.html) This program is Freeware
Info: HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.


If you would like to prevent "spyware" being install.
Try: SpywareBlaster 2.6.1 (http://www.wilderssecurity.net/spywareblaster.html) This program is Free
Info: SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.

Try: SpywareGuard 2.2 (http://www.wilderssecurity.net/spywareguard.html) This program is Free
Info: SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected.

Try: XP-AntiSpy (http://www.xp-antispy.org/) This program is Free
Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

Try: SpySites (http://camtech2000.net/Pages/SpySites_Prog...ml#SpySitesFree) This program is Free
Info: SpySites allows you to manage the Internet Explorer Restricted Zone settings and easily add entries from a database of 1500+ sites that are known to use advertising tracking methods or attempt to install third party software.

If you would like more Information about "spyware".
Check these sites.
http://www.spychecker.com/
http://www.spywareguide.com/
http://www.cexx.org/adware.htm
http://www.theinfomaniac.net/infomaniac/co...rsSpyware.shtml
http://www.thiefware.com/links/
http://simplythebest.net/info/spyware.html

Usefull tools...
Try: Stop Windows Messenger Spam 1.10 (http://www.jester2k.pwp.blueyonder.co.uk/j...r2ksoftware.htm) This program is Free
Info: "Stop Windows Messenger Spam" stops this Service from running and halts the spammers ability to send you these messages.

----------------------------------------------------------------------------
All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I myself recommend getting "spyblaster" "s&d spybot" "spy sweeper" & "admuncher" to protect your PC. A weekly scan is also recommended

Free Virus Scan
Scan for spyware, malware and keyloggers in addition to viruses, worms and trojans. New threats and annoyances are created faster than any individual can keep up with.
http://defender.veloz.com// - 15k


Finding . is a Click Away at 2020Search.com
Having trouble finding what you re looking for on: .? 2020Search will instantly provide you with the result you re looking for by drawing on some of the best search engines the Internet has to offer. Your result is a click away!
http://www.2020search.com// - 43k


Download the BrowserVillage Toolbar.
Customize your Browser! Eliminate Pop-up ads before they start, Quick and easy access to the Web, and much more. Click Here to Install Now!
http://www.browservillage.com/ - 36k
read more “ALL ABOUT SPYWARE”

RAPIDSHARE TIMELIMITS

Directions
Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day. To get around this, you need to show the rapidshare server, a different IP address. You can do this one of multiple ways.

Requesting a new IP address from your ISP server.

Here's how to do it in windows:
1. Click Start
2. Click run
3. In the run box type cmd.exe and click OK
4. When the command prompt opens type the following. ENTER after each new line.


ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit


5. Erase your cookies in whatever browser you are using.
6. Try the rapidshare download again.
Frequently you will be assigned a new IP address when this happens. Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work. To be honest, I do not know how to do this in linux/unix/etc. If this works for you, you may want to save the above commands into a batch file, and just run it when you need it.
read more “RAPIDSHARE TIMELIMITS”

HOW TO STOP SPAM

How To Stop Spam

Change Mcft to microsoft

HOW TO STOP SPAM VIA WINDOWS MESSENGER SERVICE
Below you'll find many ways (sorted in the most successful ratio first) to stop the Windows Messenger service, depending on your system environment, some may require more than one process. This service is available only on NT, 2K, XP & Server 2003. Administrator Login is REQUIRED

About The Messenger Service


* Messenger is a Windows Service that runs in the background
* Messenger is not the same as MSN Messenger or any other Instant Messaging Program
* Messenger does not facilitate two-way chatting
* Many Windows Programs, Firewalls, UPS and Antiviruses require the Messenger Service
* Antivirus and UPS software, among others, may not work if Messenger is disabled
* The Messenger Service is usually turned on by default in most Windows NT, 2K and XP systems


1. Manually

1. Example 1

1. Click Start, Run and enter the following command:
RunDll32 advpack.dll,LaunchINFSection %windir%\inf\msmsgs.inf,BLC.Remove
NOTE: This will prevent a long delay when opening Outlook Express if you have the Contacts pane enabled
2. To prevent this, click Start, Run and enter {REGEDIT} Go to:
HKEY_LOCAL_MACHINE\Software\Mcft\Outlook Express
3. Right click in the right pane and select New, Dword value
4. Give it the name Hide Messenger Double click this new entry and set the value to 2
5. End result should look EXACTLY like this:
System Key: [HKEY_LOCAL_MACHINE\SOFTWARE\Mcft\Outlook Express]
Value Name: Hide Messenger
Data Type: REG_DWORD (DWORD Value)
Value Data: (2 = remove messenger)

2. Example 2

1. Copy and paste the following to Run Command Bar in the Start Menu:
RunDll32.exe advpack.dll,LaunchINFSection
%windir%\inf\msmsgs.inf,BLC.Remove

3. Example 3

1. If Example 5 didn't work, then try this - Many users miss or don't know of it
2. Click on Start then go to RUN and type:
C:\WINDOWS\inf\sysoc.inf
3. Change:
msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7
4. To:
msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,7
5. Then use Add/Remove Windows Components to remove Messenger
NOTE: You can also prevent access to Windows Messenger using Group Policy or the Set Program Access and Defaults utility added by default in Windows XP SP1 and Windows 2000 SP3

4. Example 4

1. Open Windows Messenger
2. From the menu, select "Tools" then "Options" then "Preferences" tab
3. Uncheck "Run this program when Windows starts"
4. Open Outlook Express
5. From the menu, select "Tools" then "Options" then "General" tab
6. Uncheck the option to "Automatically log on", if it's there
7. Also in Outlook Express, select "View" then "Layout"
8. Uncheck the option to "display Contacts" - The program will open a connection and display a list of all Contacts on line if you do not
9. In "Startup Folder" make sure there is no entry there for Messenger
10. Open Norton Anti-Virus if you have it installed
11. Click "Options" then "Instant Messenger"
12. Unckeck "Windows Messenger (recommended"
NOTE: This list ought to work in disassociate MSN from Outlook Express, so that it'll only start up if you really want it to

5. Example 5

1. 2000

* Click Start-> Settings-> Control Panel-> Administrative Tools->Services
* Scroll down and highlight "Messenger"
* Right-click the highlighted line and choose Properties
* Click the STOP button
* Select Disable in the Startup Type scroll bar
* Click OK

2. XP Home

* Click Start->Settings ->Control Panel
* Click Performance and Maintenance
* Click Administrative Tools
* Double click Services
* Scroll down and highlight "Messenger"
* Right-click the highlighted line and choose Properties
* Click the STOP button
* Select Disable in the Startup Type scroll bar
* Click OK

3. XP Professional

* Click Start->Settings ->Control Panel
* Click Administrative Tools
* Click Services
* Double click Services
* Scroll down and highlight "Messenger"
* Right-click the highlighted line and choose Properties.
* Click the STOP button.
* Select Disable in the Startup Type scroll bar
* Click OK

4. Windows NT

* Click Start ->Control Panel
* Double Click Administrative Tools
* Select Services-> Double-click on Messenger
* In the Messenger Properties window, select Stop
* Then choose Disable as the Startup Type
* Click OK
NOTE: If you stop the service and don’t adjust the startup type, the Messenger service will start automatically the next time you reboot. Keep in mind that when you disable the Messenger service, you'll no longer receive messages about an attached UPS, and you won’t be notified of print job completion, performance alerts, or antivirus activity (from Windows) not the program you're using for those purposes.

6. Example 6

1. To disable receipt of messenger pop-ups, verify that your firewall disables inbound traffic on UDP ports 135, 137, and 138, and TCP ports 135 and 139. On a system connected directly to the Internet, you should also disable inbound traffic on TCP port 445. If the system you want to protect is part of a Win2K-based network with Active Directory (AD), don't block incoming traffic on port 445 - Mcft Knowledge Base Article - 330904
Code:
http://support.Mcft.com/default.aspx?scid=kb;en-us;330904

NOTE: You can use the firewall approach only if your system doesn't communicate with legacy systems that rely on NetBIOS name resolution to locate machines and shared resources. If, for example, you let users running Windows 9x share your printer or scanner, when you disable inbound NetBIOS traffic, users won't be able to connect to these shared resources. Regardless of the method you choose, you can stop messenger spam

2. Program

1. Example 1

NOTE: On Oct 15, 2003, Mcft releases Critical Security Bulletin MS03-043 warning users that the Windows Messenger Service running and exposed by default in all versions of Windows NT, 2000 and XP, contains a "Remote Code Execution" vulnerability that allows any not otherwise secured and protected Windows machine to be taken over and remotely compromised over the Internet
1. Shoot the Messenger
Code:
http://grc.com/files/shootthemessenger.exe


2. Example 2

1. Messenger Disable
Code:
http://www.dougknox.com/xp/utils/MessengerDisable.zip

NOTE: If you choose to uninstall Windows Messenger on a system with SP1 installed, you will receive an error message about "un-registering" an OCX file. This is normal, and doest not affect the removal process. Windows Messenger will still be removed

3. TEST

1. Example 1

1. Right-click "My Computer"
2. Select "Manage"
3. Under "System Tools" right-click on "Shared Folders"
4. Choose "All Tasks" and select "Send Console Message..."
5. If you recieve the following error message then the service has been disabled, otherwise confirm that you have disabled it or try another example
"The following error occured while reading the list of sessions from Windows clients:
Error 2114: The Server service is not started."

2. Example 2

1. Click Start then "Run"
2. Type in {cmd.exe}
3. Type in net send 127.0.0.1 hi
4. If you get a popup "hi" message, then confirm that you have disabled it or try another example

4. IF YOU INSIST

1. If you insist on keeping Windows Messenger, then I'd recommend Messenger Manager - "Allows you to keep your messenger service running, as is intended and needed by Windows. This ensures that vital system errors and notifications may be sent informing you of Important System Events"
Code:
http://www.sellertools.com/default.asp?i=MessageManager3.htm

2. However, as a replacement to Windows Messenger remote control feature, I'd recommend this free tool Virtual Network Computing - "It is a remote control software which allows you to view and interact with one computer (the "server") using a simple program (the "viewer") on another computer anywhere on the Internet. The two computers don't even have to be the same type, so for example you can use VNC to view an office Linux machine on your Windows PC at home"
Code:
http://www.realvnc.com/download.html



RESULTS WILL VARY
No matter how good your systems may be, they're only as effective as what you put into them.
read more “HOW TO STOP SPAM”

HOW TO SETUP YOUR OWN DNS (DOMAIN NAME SERVER)

How To Setup Your Own Dns (Domain Name Server)

This is only a quick tutorial, there are literally hundreds of little tricks you can do with a DNS, but this will get your basics up and running. I'm assuming you want to setup a windows DNS server, but the principals will work for most servers.

You will need..

1) A domain name over which you have full control
2) DNS server software(Windows server always comes with one of these)
3) At least one fixed IP address, allthough two is highly desirable
4) An idea of what services you want on your server

The first thing you need to do is create your new domain entry. In windows this is called a "Zone" and you will have one for every domain name you have. Add your main domain in the forward lookup zone as a Primary zone, which will be in the format "Domainname.com", or .co.uk, or whatever, you shouldn't need any more details for this bit. Do *not* allow dynamic updates unless this is a local network DNS. Once it is created you will have 2 entry's under your new domain, "SOA"(Or Start of Authority) and "NS"(Or Name server). If you want a 100% compliant DNS then you should now follow the same process but adding a domain as a reverse lookup zone. Any changes you make to the forward lookup should have the "Update Reverse Lookup" option ticked if its available, if not you must update the reverse zone manually(This is very important).

Now edit the "NS" entry in your forward zone to "NS0.DomainName.Com", and set it to the relevant IP address. Add another (NS) record and set it to "NS1.DomainName.Com". If using 2 IP address, try to make NS0 the first IP. Now you need to configure the SOA entry in the forward lookup zone. The serial number should be changed to a date followed by a number in this format "YYYYMMDDnn", this is not required, but is advised by RIPE. The primary server will be the "NS0.domainname.com" entry you just made and the responsible person should be left for now. The refresh interval should be set somewhere between 1200 to 43200 seconds, the retry should be between 120-7200 seconds and the expires after should be around 2-4 weeks(I'll let you work out the seconds for that). The minimum TTL is quite important, and depending on what you are going to do with the domain, you might need to tweak this a bit. Typically a value between 1-3 hours should be used. Now go to your "Name server" settings in your SOA record(In windows this is a tab in the same window) remove the defaults, and add your two Name servers that you just setup. We will come back to the SOA record later, but for now we need to do some more stuff.

If you want a website, then your going to want the WWW. setting up. We will set it up as an "A" record, which means it is a separate top level record and will be populated separately from other entries. So add an "A" to your forward lookup zone and put the entry as "WWW", and set the IP address to wherever you want the website to be. This will be where the domain always goes, and it could be anywhere. Just make sure there is a web server waiting there for it. If you want FTP, then setup the same thing but with "FTP" in the entry. You will now also have to setup "A" records for the NS0 and NS1 name servers that you added previously, just make them the same as WWW and FTP, but make sure the IP addresses match the ones used for setting up the "NS" records. Also add a blank "A" record, this will make sure that "domainname.com" works as well as "www.domainname.com".

Now you should decide whether or not you want to have mail on this domain. It is Hegel advisable that you set one up, even if it just to catch domain mail about abuse or potential problems that might occur. You can find plenty of high quality free mail servers out there, but I would recommend "Mail Enable", its free and provides everything you would want, but if you want webmail you do have to pay something extra for it. We will now configure the MX records. Add an "A" name for your mail server, you can add 2 if you want, but for simplicity I would advise staying with 1. We will call ours "Mail.domainname.com", and point it to one of our IP addresses. Now add an "MX" record in the Forward Lookup zone, giving it the full "A" record you just entered "Mail.domainname.com", and do not setup a host or child domain, just leave it blank.

This next step isn't needed, but is again highly recommended.

Now to finish the SOA you need to add two more records. A "RP" entry, which is a Responsible Person, and they will be the contact point for domain complaints and a "MB" entry, which is a mailbox entry. The "MB" should just be pointed to the mail server domain name "Mail.domainname.com", and the "RP" should have the host or domain set to the name of your mail box. So for this server it will be "Tony.Domainname.com", and the mailbox will be set to the "MB" record you just made. Don't worry about the RP address having no "@" in it, this is the expected format for an "RP" entry. You will now have to go back into the SOA and change the responsible person to the new "RP" record you just made.

And thats it, your done! You can add as many "A" records as you like to point to other web servers, or a multitude of FTP sites. And you can add "CNAME" records to basically point to another name, usually an "A" record, like an alias.

Now before you switch your domain on, you need to check that the server is performing properly. So go to www.dnsreport.com, and run the report on your domain "domainname.com", and it will give you a very detailed report of any problems, and even a short description of how to fix the problems. If all is OK, then you are ready to go live. If your domain name is new, or not currently hosted anywhere then the first thing you should do is re-point the domain at your new server. You will typically do this with the provider who owns the domain, and it will be different with all hosts. But the basic settings are the same. You will be asked for at least 2 name servers and ip addresses to go with them. Just put in "NS0.domainname.com" and "NS1.domainname.com" and put in the correct IP addresses. Make sure you do not mess this up, as changes to your main NS servers could potentially take several days to straighten themselves out. Update these settings, and then sit back and wait. You can do a whois on the main DNS server of your domain provider to check if the settings have worked, but again this doesn't always work. For the big 3 domains(.com .net .org) you can do a whois on the network associates site to see the changes instantly. You can also track the progress of the domain changes by doing an NSLookup in dos, like this...

c:\nslookup ns0.domainname.com NS0.yourprovidersdns.com

That will give you the entries your domain provider has

c:\nslookup www.domainname.com ns0.domainname.com

And this will tell you if the changes for your domain have gone through to your ISPs DNS yet. It should give you back the IP address of your new DNS server.

You should always make sure your server is backed up, and that you refresh or update the DNS when you are making changes.
read more “HOW TO SETUP YOUR OWN DNS (DOMAIN NAME SERVER)”

HOW TO HACK YOUR XP BOOT SCREEN

How to hack/change your Windows XP Boot Screen



HACKING THE XP BOOT SCREEN





This is a very simple trick to do if you have done the same for the logon screen and the start button. There are 2 ways to do this trick that I know about one is doing it manually and the other is using a program called bootxp. I am going to tell you the manual way to do it, but if you want to know the other way just let me know, so I can do an update to the guide. Now once you have downloaded your ntoskrnl.exe file save it a general location so that you will have easy access to it, like my folder.



Once you have ntoskrnl.exe file in an easy access folder, restart your pc into safe mode. Once into safe mode go to the folder where your files are located.



Now that you are there copy the file that you want to change your boot screen too. Once you have copied that file, hit the window key + r or type %windir%\system32 in the run command, so that folder as follows.



Once there paste your new file into the folder and overwrite the existing folder.



Now that you have your new file in the folder restart your pc as you normally would and your new boot screen should appear. You can download this bootscreen here.



ALWAYS BACKUP EVERYTHING YOU EDIT OR DELETE. I'M NOT RESPONSIBLE IF YOU MESS YOUR COMPUTER UP BY DOING THIS HACK OR ANY TYPE OF HACK. DO IT AT YOUR OWN RISK.

Image and ntoskrnl.exe files provided by www.themexp.org

or
u can go to

code:

http://www.overclockersclub.com/guides/hackxpbootscreen.php
read more “HOW TO HACK YOUR XP BOOT SCREEN”

CAUGH A VIRUS

Caught A Virus?

If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.


Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.

You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.

It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.

For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."

Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.

Is Your PC "Owned?"

I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program's presence. People who write commercial software put icons all over your desktop. Who's going to work harder to go unnoticed?

Other indicators that may, in fact, indicate that there's nothing that you need to worry about, include:

* An automated e-mail telling you that you're sending out infected mail. E-mail viruses and worms typically come from faked addresses.
* A frantic note from a friend saying they've been infected, and therefore so have you. This is likely a hoax. It's especially suspicious if the note tells you the virus can't be detected but you can get rid of it by deleting one simple file. Don't be fooled--and don't delete that file.

I'm not saying that you should ignore such warnings. Copy the subject line or a snippet from the body of the e-mail and plug it into your favorite search engine to see if other people have received the same note. A security site may have already pegged it as a hoax.

Sniffing Out an Infection

There are signs that indicate that your PC is actually infected. A lot of network activity coming from your system (when you're not actually using Internet) can be a good indicator that something is amiss. A good software firewall, such as ZoneAlarm, will ask your permission before letting anything leave your PC, and will give you enough information to help you judge if the outgoing data is legitimate. By the way, the firewall that comes with Windows, even the improved version in XP Service Pack 2, lacks this capability.

To put a network status light in your system tray, follow these steps: In Windows XP, choose Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check "Show icon in notification area when connected," and click OK.

If you're interested in being a PC detective, you can sniff around further for malware. By hitting Ctrl-Alt-Delete in Windows, you'll bring up the Task Manager, which will show you the various processes your system is running. Most, if not all, are legit, but if you see a file name that looks suspicious, type it into a search engine and find out what it is.

Want another place to look? In Windows XP, click Start, Run, type "services.msc" in the box, and press Enter. You'll see detailed descriptions of the services Windows is running. Something look weird? Check with your search engine.

Finally, you can do more detective work by selecting Start, Run, and typing "msconfig" in the box. With this tool you not only see the services running, but also the programs that your system is launching at startup. Again, check for anything weird.

If any of these tools won't run--or if your security software won't run--that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect themselves.

What to Do Next

Once you're fairly sure your system is infected, don't panic. There are steps you can take to assess the damage, depending on your current level of protection.

* If you don't have any antivirus software on your system (shame on you), or if the software has stopped working, stay online and go for a free scan at one of several Web sites. There's McAfee FreeScan, Symantec Security Check, and Trend Micro's HouseCall. If one doesn't find anything, try two. In fact, running a free online virus scan is a good way to double-check the work of your own local antivirus program. When you're done, buy or download a real antivirus program.
* If you have antivirus software, but it isn't active, get offline, unplug wires-- whatever it takes to stop your computer from communicating via the Internet. Then, promptly perform a scan with the installed software.
* If nothing seems to be working, do more research on the Web. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses--if manual removal is possible--or a free removal tool if it isn't. Check out GriSOFT's Virus Encyclopedia, Eset's Virus Descriptions, McAffee's Virus Glossary, Symantec's Virus Encyclopedia, or Trend Micro's Virus Encyclopedia.

A Microgram of Prevention

Assuming your system is now clean, you need to make sure it stays that way. Preventing a breach of your computer's security is far more effective than cleaning up the mess afterwards. Start with a good security program, such Trend Micro's PC-Cillin, which you can buy for $50.

Don't want to shell out any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (a personal firewall), and Ad-Aware SE (an antispyware tool).

Just make sure you keep all security software up to date. The bad guys constantly try out new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates isn't worth your money or your time.

Speaking of updating, the same goes for Windows. Use Windows Update (it's right there on your Start Menu) to make sure you're getting all of the high priority updates. If you run Windows XP, make sure to get the Service Pack 2 update. To find out if you already have it, right-click My Computer, and select Properties. Under the General tab, under System, it should say "Service Pack 2."

Here are a few more pointers for a virus-free life:

* Be careful with e-mail. Set your e-mail software security settings to high. Don't open messages with generic-sounding subjects that don't apply specifically to you from people you don't know. Don't open an attachment unless you're expecting it.
* If you have broadband Internet access, such as DSL or cable, get a router, even if you only have one PC. A router adds an extra layer of protection because your PC is not connecting directly with the Internet.
* Check your Internet ports. These doorways between your computer and the Internet can be open, in which case your PC is very vulnerable; closed, but still somewhat vulnerable; or stealthed (or hidden), which is safest. Visit Gibson Research's Web site and run the free ShieldsUP test to see your ports' status. If some ports show up as closed--or worse yet, open--check your router's documentation to find out how to hide them.
read more “CAUGH A VIRUS”

CASH PB GRATIS

NHE CARA CASH PB(POINT BLANK) GRATIS....

1.MASUK KE
http://www.komisiGRATIS.com/?id=penyox

2.GABUNG PROGRAM TERSEBUT...GRATIS!! GAK USAH BAYAR

3.AJAK JUGA TEMEN-TEMEN KAMU BUAT JOIN DI PROGAM TERSEBUT BIAR DUIT KAMU BANYAK

4.DUIT TINGGAL DITRANSFER DEH KE REKENING KAMU ATAU PAKE WESEL...TINGGAL DI BELIKIN CASH POINT BLANK....

SELAMAT MENCOBA...!!!
read more “CASH PB GRATIS”

Devildice

Formed in 1997 in the middle of sins and happenings of Kuta (Bali), Devildice was put together by Jerinx (guitar/vocal) and Kuzz (bass), and formerly used the name Culture On Fire, which chose to be cover version of Social Distortion, their favorite punk old skool band. With the help of friends in drum and guitar, Culture On Fire entertained the Bali underground music scene.

With Jerinx as the drummer and songwriter of Superman Is Dead (SID), gave this band the impression of a ‘halfhearted band’ and comfortable with the status of cover version band.

In 2002, Jerinx realized that he had many wrote many songs, which were not the character of SID songs but he could use them as songs of Culture On Fire, which was more dark than SID. He, then decided to be more serious in running his second band. After, there were few personnel changes and the rename of the band to be “Devildice”, eventually Jerinx and his friends released their first album ‘In The Arms Of The Angels’ in 2004. This album was produced independently with their own cash and label.

Now (2009), with the formation of Jerinx (vocal/guitar), Kuzz (bass), Cash (guitar), T.R (drum), and Dr.F (trumpet), Devildice has performed in variety of music festivals, charity concerts, skate, surf, tattoos, and bike competitions at stadiums, beach, courts, bars, clubs in Bali.

Devildice has also been involved in few environment campaign projects, compilation album, skate video, surf video and many more.

In making music, Devildice is influenced by old ganster/mafia movies, kustome kulture, and the exotic of tropical punk.
read more “Devildice”

Football: England's Webb to referee World Cup final

JOHANNESBURG, France (AFP) - England's Howard Webb will referee Sunday's World Cup final between the Netherlands and Spain at Johannesburg's Soccer City, FIFA said on Thursday.

The 39-year-old from Rotherham, has been a FIFA-listed referee since 2005 and the former policeman regularly keeps law and order amongst the top stars of England's Premier League.

Webb is widely-regarded as one of Europe's top referees and took charge of May's Champions League final between Inter Milan and Bayern Munich in Madrid.

At the World Cup, he refereed Spain's 1-0 defeat to Switzerland in a group match and then oversaw Slovakia's stunning 3-2 victory over Italy which confirmed the first round exit of the defending champions.

He was also the focus of film-makers when a Belgian documentary team recorded his movements at Euro 2008 for a film called "The Referees".

Webb, the son of a referee, began officiating matches at the age of 18 and made his English Premier League debut in 2003 with match between Fulham and Wolverhampton Wanderers.

In 2005 he presided over the FA Community Shield game between Arsenal and Chelsea, whilst in November that year he took charge of his first national team encounter, a friendly between Northern Ireland and Portugal in Belfast.

In 2007 he was placed in charge of the League Cup final between Arsenal and Chelsea, refereed his first Champions League tie and took part in the FIFA U-20 World Cup in Canada, presiding over five matches including the semi-final between Austria and the Czech Republic.

At Euro 2008, Webb covered two first-round matches and three matches at the Confederations Cup 2009 in South Africa.

Webb is the fourth English referee in the Final, the first being George Reader in 1950 followed by William Ling four years later and John Taylor in 1974.

Mexico's Benito Archundia will take charge of Saturday's third-place play-off between Germany and Uruguay in Port Elizabeth.

read more “Football: England's Webb to referee World Cup final”

Strange creatures found in Atlantic Association

Scientists from the UK and 16 other countries have just completed a scientific expedition in the Atlantic ocean floor that has never touched before.

Rather than see the bottom of the sea without life, the researchers actually took pictures of living creatures in the depths of the sea, which had never known existed.

Research conducted in the area dokus Mid-Atlantic Ridge - underwater mountain range which divides the sea into two, east and west. The landscape there is dominated rocks, steep cliffs and open plains.

In the area of 'barren' was found at least 10 creatures which allegedly represents a new species during a six-week expedition British Research Ship, James Cook.

Scientists send exploration vehicles, Isis to dive into the ocean floor for 30 hours at depths of up to 3600 meters.

Isis, equipped with 10 cameras and sophisticated superkuat lights illuminate the darkness of the seabed. It was there, the van-sized vehicle to take pictures of strange Foro species that are interacting with their natural habitat.

Some creatures that attract attention are the three new species enteropneust - a kind of sea worm - brightly colored. Small invertebrates, measuring 10 centimeters along the previously only found in the Pacific Ocean.

Aberdeen University Marine Laboratory Director, Professor Monty Priede says, this is the first pink enteropneust they see.

"This momentum is exciting. Ah, we're the first person to see this!," Priede said, such as pages loaded LiveScience.

Currently animal samples were cut into pieces to be studied further. However, he said, the best moment is when the team saw worm-like creature swimming toward them.

"Animals are floating in the water, curl up, and swept away by currents." But, when he felt the presence of Isis, his tail straight straight straight shot into the water, like a human being to dive, "he added.

The discovery of new species of worms that have important meaning. Priede said, this creature is the "foundation of the evolutionary chain.

"Though they are not missing evolutionary chain, they at least close to it," he added.

Expedition Cook, Priede added, is part of an international census of marine life - to improve our understanding of marine populations.

"There are a lot of real estate in the middle." "We realize there are far more habitat out there than we realize."
read more “Strange creatures found in Atlantic Association”

FIFA's probelm about waka-waka

Johannesburg (AFP) - The Organization of International Football (FIFA), parties who have urination World Cup, did not ask permission from the owner of the song "Waka Waka" before making it an official song for the 2010 World Cup in South Africa.

The song, with original title "Zangalewa", belongs to Golden Sound bands from Cameroon, and in the World Cup in 2010 was changed to "Waka Waka" sung by a singer from Colombia, Shakira, collaborating with South African group Freshly Ground.

Ze Bell Jean Pau, one group member cited the Golden Sound like the Sunday Times, Sunday, admitted that they had never been contacted by Fifa before the song recorded by Shakira


"I do not know if Waka Waka became FIFA's official song. I heard we would get royalties. But it would take so long to get it," said Pau
read more “FIFA's probelm about waka-waka”

Speed playing part 4

The last speed playing is going to be more of a catalogue of excerises to play ,some will include small tips and tricks to help you but mainly these are going to be varying and technical skills that hopefully will help you in your guitar playing. This lesson will be divided up into 5 sections:

1. Sweep picking/sweep tapping
2. Tapping
3. String skipping
4. Alternative picking
5. Legato

==================================================================

Sweep Picking/Sweep Tapping

Ok I won't go over the tips but I'll go over all the shapes so you know them and can easily construct them.

1. Standard Major - The root is always on the A string and the note on the B string.

E|----------12-15----------14-17------0-3----------16-19----------
B|--------13-------------15----------1-----------17---------------
G|------12-------------14-----------0----------16-----------------
D|----14-------------16------------2---------18-------------------
A|--15-------------17-------------3--------19---------------------
E|----------------------------------------------------------------
C D C E

2. Alternative Major - Same as above, but these require 3 string finger rolls and the root is the last high E note. Remeber to get the very tip of your finger and roll down as you pick, play slow and watch both hands as you do it.

E|-------------12-17-------------15-20---------6-11---------------
B|-----------14----------------17-------------8-------------------
G|---------14----------------17--------------8--------------------
D|-------14----------------17---------------8---------------------
A|--12h16-------------15h19-------------6h10----------------------
E|----------------------------------------------------------------
A C D#

3. Standard Minor - Root note is always the A and high E last note, these have a 2 finger roll in them, so be careful, remeber to emphasise the intial downpicked note and up picked pull off.

E|-------------12-17--------7-12--------------17-22---------------
B|-----------13------------8----------------18--------------------
G|---------14-------------9---------------19----------------------
D|-------14--------------9--------------19------------------------
A|--12h15------------7h10----------17h20--------------------------
E|----------------------------------------------------------------
A E D

4. Alternative Minor - A bit like the standard major, but we shift the 2nd note of the arpeggio down half a step (1 fret).

E|----------11-15----------15-19---------8-12---------------------
B|--------13-------------17------------10-------------------------
G|------12-------------16-------------9---------------------------
D|----13-------------17-------------10----------------------------
A|--15-------------19-------------12------------------------------
E|----------------------------------------------------------------
C E A

5. Standard diminished - These are same as your standard arpeggios but have a minor second and third giving them a dark sound. The initial G string and last high E string note are the same root note.

E|---------7-10-----------10-13-----------13-16-------------------
B|-------9-------------12--------------15-------------------------
G|--7h10---------10h13-----------13h16----------------------------
D|----------------------------------------------------------------
A|----------------------------------------------------------------
E|----------------------------------------------------------------
D F G#

6. Alternative diminished - Exactly the same as above but we miss out the first note making them quite easy arpeggios.

E|-------7-10--------11-14--------16-19-------------------------
B|-----9----------13-----------18-------------------------------
G|--10---------14-----------19----------------------------------
D|--------------------------------------------------------------
A|--------------------------------------------------------------
E|--------------------------------------------------------------
D F# B

7. Major sweep tap - Always tap the root of the arpeggio on the high E string, remeber to position your hand slightly closer, also some people like to tap with their pick but ultimatly this will make your arpeggios sloppy and noisey, use that third finger if you can.

                   T             T                 T
E|----------12-15-20-------7-10-15----------16-19-24-------------------
B|--------13--------------8---------------17---------------------------
G|------12---------------7--------------16-----------------------------
D|----14----------------9-------------18-------------------------------
A|--15----------------10------------19---------------------------------
E|---------------------------------------------------------------------
C G E

7. Minor string sweep - With minor sweep taps always tap the second note of the arpeggio, so A minor, tap C and G minor, tap A#.

                      T                    T                    T
E|-------------12-17-20-------------10-15-18-------------14-19-22-------
B|-----------13-------------------11-------------------15---------------
G|---------14-------------------12-------------------16-----------------
D|-------14-------------------12-------------------16-------------------
A|--12h15----------------10h13----------------14h17---------------------
E|----------------------------------------------------------------------

You don't always have to tap the root note on majors and the second note and minors, they just usually sound better, here a list of sweep excersises you can practice.
8.

E|------17h22p17-----17h20------15h18p15------13h17p13------11h15p11---
B|----18-----------17---------15------------15------------13-----------
G|--19-----------17---------15------------14------------12-------------
D|---------------------------------------------------------------------
A|---------------------------------------------------------------------
E|---------------------------------------------------------------------

9.

E|--19p15--------------------15h19-10p7-------------7h10--17p14-----------
B|-------17----------------17----------8-----------8-----------15---------
G|---------16------------16-------------7---------7--------------14-------
D|-----------17--------17----------------9-------9-----------------16-----
A|-------------19-14h19-------------------10-7h10--------------------17---
E|------------------------------------------------------------------------

10.

                   T                   T                   T
E|----------12h15h20p15p12------12h15h20p15p12------12h15h20p15p12----
B|--------13--------------13--13--------------13--13------------------
G|------12------------------12------------------12--------------------
D|----14--------------------------------------------------------------
A|--15----------------------------------------------------------------
E|--------------------------------------------------------------------

11.

         (slide with tapping finger)
T T T T
E|----------11h14h19/21/19------11h14h19h21p19p14p11--------------
B|--------12--------------12--12--------------------12------------
G|------11------------------11------------------------11----------
D|----13------------------------------------------------13--------
A|--14----------------------------------------------------14------
E|----------------------------------------------------------------

12.

E|----------13h17p13------11h14p11-----7h10p7---7h10p7---7h10p7h10p7-----
B|--------15--------15--13--------13--9------9-8------8-8-----------8----
G|------14------------14------------10--------7--------7-------------7---
D|----15-----------------------------------------------------------------
A|--17-------------------------------------------------------------------
E|-----------------------------------------------------------------------

==================================================================

Tapping

I think I covered most about tapping in my other lesson but heres a few people have asked me which is better to tap with. Pick or finger? Well personally I use my third finger, theres not really a particular better one but finger tapping gives you accuracy, usefull when sweeping or playing with pick, gives a thicker, rounder soung. Using a pick is mainly for trill tapping, it lets you tap really fast but thats about it to be honest but its entirely up to you, play how you want.

1.
(Tr = Trill tap) (Bend as tapping)
Tr Tr Tr Tr Tr Tr
E|----------------12h15p12----------------------------------------
G|---------7h10p7----------12h15p12-----------10b(12)h14p10-------
B|--7h10p7-------------------------12h14p12-----------------------
D|----------------------------------------------------------------
A|----------------------------------------------------------------
E|----------------------------------------------------------------

2.

T T T T T T T
E|--12h19p15--------------------------10h17p14-----------------
G|-------------------------------------------------------------
B|----------11h16p11---------11h16p12----------9h16p12---------
D|-------------------------------------------------------------
A|-------------------10h17p14--------------------------7h12p9--
E|-------------------------------------------------------------

3.

T T T T T T T T
E|--0h12p2p0h12p4p0h12p5p0h12p7p0h12p9p0h12p11p0h12p2p0h12---
G|-----------------------------------------------------------
B|-----------------------------------------------------------
D|-----------------------------------------------------------
A|-----------------------------------------------------------
E|-----------------------------------------------------------

4.

T T T T T T
E|--14p13p11p9---------------------------------------------------------
G|-------------11p10p7p6-----------------------------------------------
B|-----------------------10p8p6p4--------------------------------------
D|---------------------------------------------------------------------
A|---------------------------------------------------------------------
E|---------------------------------1h2h6p2p1h4/6h7h11p9p7p6/4h9p2p1----

5.

T T T T T T T Tr
E|-----------------7p5-----------------------------
G|---------------------14p12-----------------------
B|------------2p1------------16p14-----------------
D|---------4p2-------------------------------------
A|------5p4------------------------12h14p12--------
E|--7p5--------------------------------------------

==================================================================

String Skipping

Here we jsut take notes from scales or arpeggios and use them a bit like we did in the tapping lesson I did, alternative picking is qutie useful here because if you get your hand into that motion you don't have to focus too much on picking the notes, remeber to mute the lower strings with your palm right after playing them.

Here a few Paul Gilbert style skips:

1.

E|------------7--------------------10------------------5--------
G|--------------------------------------------------------------
B|-----7h9h10---10p9p7----10h14h16----16p14p12---5h7h9---9p7p5--
D|--------------------------------------------------------------
A|--10-----------------14----------------------8----------------
E|--------------------------------------------------------------

2.

E|----------12------------------8------------------13-----------
G|--------------------------------------------------------------
B|----12h16----16p12-------8h12---12p8-------13h17----17p13-----
D|--14---------------14-10-------------10-15----------------15--
A|--------------------------------------------------------------
E|--------------------------------------------------------------

3.

E|--------5-7-8-7-5-----------------------------------------8-7-5--
G|--------------------------------------------6-7-10---------------
B|--5-7-9-----------5-7-9-7-5-----------5-7-9--------7-9-10--------
D|-----------------------------------------------------------------
A|----------------------------5-7-8-7-5----------------------------
E|-----------------------------------------------------------------

4. Diminshed String Skips

E|-15-12-9------------------------------9-12-15-18-15-12------------------
G|------------------------------------------------------------------------
B|---------15-12-9---------------9-12-15----------------18-15-12----------
D|------------------------------------------------------------------------
A|-----------------16-13-10-13-16--------------------------------19-16-13-
E|------------------------------------------------------------------------

5.

E|---------------8-------------------------8-----------------------
G|-------------------------------------------12-10-----------------
B|----------9-10---10-9---------------9-10-------------------------
D|-------------------------------------------------12-10-9---------
A|--8-10-12-------------12-10-8-10-12------------------------------
E|---------------------------------------------------------8-10-12-

6.

E|-14p10------------10---------------------15p12------------12--------------
G|--------------------14p10-----------10h14--------------------15p12--------
B|------14p11--11h14----------------------------16p12--12h16----------------
D|-----------12------------14p11-11h14---------------14-------------16p12---
A|------------------------------12---------------------------------------14-
E|--------------------------------------------------------------------------

==================================================================

Alternative Picking



1.

E|----------8-10-12-10-8---------------8-10-12-13-12-10-8----------
G|--8-10-12--------------12-10-8-10-12--------------------12-10-8--
B|-----------------------------------------------------------------
D|-----------------------------------------------------------------
A|-----------------------------------------------------------------
E|-----------------------------------------------------------------

2.

E|--13-12-10----------------------------------------------------------
G|-----------13-12-10-------------------------------------------------
B|----------------------------12-10-9---------------------------------
D|--------------------12-10-9------------------------------12-10-9----
A|------------------------------------10-9-7--------10-9-7------------
E|-------------------------------------------10-9-7-------------------

3.

E|--17-14----------------------------------17-14-15-12-------------------
G|--------16-13----------------------13-16-------------14-11-------------
B|--------------15-12----------12-15-------------------------13-10-------
D|--------------------14-12-14-------------------------------------12-10-
A|-----------------------------------------------------------------------
E|-----------------------------------------------------------------------

4.

E|-------------------------------------------------------------------
G|-------------------------------------------------------------------
B|----------------------------------------------------------10-12-14-
D|----------------------------------9---------------9-10-12----------
A|----------8---------------8-10-12---12-10-9-10-12------------------
E|--8-10-12---12-10-8-10-12------------------------------------------

5.

E|--14-19-14----------14-19-14----------14-19-22-19-14----------14-17-19-
G|-----------14-17-14----------14-17-14----------------14-17-14----------
B|-----------------------------------------------------------------------
D|-----------------------------------------------------------------------
A|-----------------------------------------------------------------------
E|-----------------------------------------------------------------------


6.

E|--22-20-19----19--------------------------------------------------------
G|-----------20----20-18-17----17-----------------------------------------
B|--------------------------18----18-17-15----15--------------------------
D|-----------------------------------------17----17-15-14----14-----------
A|--------------------------------------------------------15----15-13-12--
E|------------------------------------------------------------------------

7.

E|----8-7-8-5-8-7-8-5---12-11-12-9-12-11-9----15-14-15-14-12-15-14-12-
G|--5-----------------9--------------------12-------------------------
B|--------------------------------------------------------------------
D|--------------------------------------------------------------------
A|--------------------------------------------------------------------
E|--------------------------------------------------------------------

==================================================================

Legato



1.

E|--------------------------------------------------------------------12--
G|--------------------------------------------------10-13p10----10h13-----
B|-----------------------------------9-12p9----9h12----------12-----------
D|--------------------7-10p7----7h10--------10----------------------------
A|------7-10p7---7h10--------10-------------------------------------------
E|--5h8--------8----------------------------------------------------------

2.

E|---------------------------------------------------
G|---------------------------------------------------
B|---------------------------------------------------
D|--6h7p6-6h7p6-6h7h9p7p6----11h12p11---11h12p11-----
A|-------9-----9---------9/12--------12--------------
E|---------------------------------------------------

3.

T
E|--------------------------------------------------------
G|--11h12h14p12p11h12p11/16h17p16/12p11h12h14h20p16p14----
B|--------------------------------------------------------
D|--------------------------------------------------------
A|--------------------------------------------------------
E|--------------------------------------------------------

4.

E|----------------------------------------------------------------------
G|----------------------------------------------------------------------
B|-------9---------9------9----9-10p9---------7-------7-------7---7-9p7-
D|--7h10---10-7h10---7h10---10--------10--6h9---9-6h9---9-6h9---9-------
A|----------------------------------------------------------------------
E|----------------------------------------------------------------------

5.

E|----------------------------------5h7p5h8p5h7p5h8------------------------
G|-------------------------------------------------------------------------
B|--2h4p2h5p2h4p2h5---------------------------------4/14h16p14h17p14h16p14-
D|-------------------------------------------------------------------------
A|------------------0h2p0h3p0h2p0h3----------------------------------------
E|-------------------------------------------------------------------------
read more “Speed playing part 4”