Download Super Compressing Software

Author: @k$h@y // Category:

Alochol Blu-Ray 120%
Compress File Of 4GB To 800 Kb

Download This Software To Compress File Of 4GB To 800 Kb
Download



Dont Believe It
Here Is The Proof(The File Of 4 Gb Compressed To 800 kb)

Download



PASSWORD FOR FILES IS -
www.coolmobileandpc.blogspot.com


It Doesnt Take The Files To Decompress Too Just About 6 min
*********How To Run The Files **********
1)Run Alcohol
2)Select An Virtual Drive And Mount The .mdf File
3)Check The Size Of The Virtual Drive
4)Surprized Its Massive 4 GB

Hacking 3

Author: @k$h@y // Category:
Before you can change your IP you need some information. This information includes your IP range, subnet mask, default gateway, dhcp server, and dns servers.1. Getting your IP range - Getting information about your IP range is not difficult, I recommend using Neo Trace on your own IP. But for my test just look at your IP address, say it's 24.193.110.13 you can definitely use the IP's found between 24.193.110.1 < [new IP] < 24.193.110.255, don't use x.x.x.1 or x.x.x.255. To find your IP simply open a dos/command prompt window and type ipconfig at the prompt, look for "IP Address. . . . . . . . . . . . : x.x.x.x".2. Subnet Mask, Default Gateway, DHCP Server - These are very easy to find, just open a dos/command prompt window and type 'ipconfig /all' without the ' '. You should see something like this:
Windows IP Configuration:Host Name . . . . . . . . . . . . . . : My Computer Name HerePrimary Dns Suffix . . . . . . . . . :Node Type . . . . . . . . . . . . . . .: UnknownIP Routing Enabled. . . . . . . . . : NoWINS Proxy Enabled. . . . . . . . : NoEthernet adapter Local Area Connection:Connection-specific DNS Suffix . . . . . . .: xxxx.xx.xDescription . . . . . . . . . . . . . . . . . . . . : NETGEAR FA310TX Fast Ethernet Adapter (NGRPCI)Physical Address. . . . . . . . . . . . . . . . . : XX-XX-XX-XX-XX-XXDhcp Enabled. . . . . . . . . . . . . . . . . . . : YesAutoconfiguration Enabled . . . . . . . . . : YesIP Address. . . . . . . . . . . . . . . . . . . . . : 24.xxx.xxx.xxSubnet Mask . . . . . . . . . . . . . . . . . . . .: 255.255.240.0Default Gateway . . . . . . . . . . . . . . . . . : 24.xxx.xxx.xDHCP Server . . . . . . . . . . . . . . . . . . . .: 24.xx.xxx.xxDNS Servers . . . . . . . . . . . . . . . . . . . . : 24.xx.xxx.xxx24.xx.xxx.xx24.xx.xxx.xxxLease Obtained. . . . . . . . . . . . . . . . . . .:Monday, January 20, 2003 4:44:08 PMLease Expires . . . . . . . . . . . . . . . . . . . .:Tuesday, January 21, 2003 3:43:16 AMThis is all the information you will need for now, I suggest you either keep your dos/command prompt window open or copy & paste the information somewhere, to copy right click the window and select text and click once.III. Changing your IP AddressTo change your IP address first pick any IP you like out of your IP range and remember it or write it down. It is usualy a good idea to make sure the IP is dead (except for what we are going to do later on) so just ping it via "ping x.x.x.x" and if it times out then you can use it. Now go to My Computer, then Control Panel. In Control Panel select Network Connections and pick your active connection, probably Local Area Connection or your ISP name. Open that connection by double clicking on the icon in Network Connections, then select Properties under the General Tab. In the new window that pops up select Internet Protocol (TCP/IP) and click properties, it's under the general tab. In this new window select the General tab and choose "Use the following IP address" and for the IP address enter the IP you would like to use (the one you picked from your subnet earlier) and for the Subnet Mask enter the subnet mask you got when your ran ipconfig /all, same goes for the Default Gateway. Now select "Use the following DNS server addresses" and enter the information you got earlier. Now just click OK. Test that it worked, try to refresh a website and if it works you know everything is okay and you are connected. To make sure the change worked type ipconfig again and the IP address should have changed to your new one.IV. DDoS & DoS ProtectionIf your firewall shows that you are being DDoSed, this is usually when you are constantly getting attempted UDP connections several times a second from either the same IP address or multiple IP addresses (DDoS), you can protect your self by changing your IP address via the method I described above.V. Web servers & Other ServicesIf you know someone on your IP range is running a web server and he or she has pissed you off or you just like messing around you can "steal" their IP address so any DNS going to that IP will show your site instead because you would be running a web server yourself.To "steal" an IP is to basically use the changing IP address method above and picking an IP that someone that is running a web server has in use. Often you will be able to keep that IP at least for some time, other times you wont be able to use it so just keep trying until it works. You your self will need to have a web server on the same port with your message. You can do this with other services too. You can also DoS or DDoS the IP address you are trying to steal to kick him off the net, but I don't recommend as its pretty illegal, an your ISP will get pissed ;)

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
@k$H@Y
www.coolmobileandpc.blogspot.com

Hacking 2

Author: @k$h@y // Category:
Telnet: the Number One Hacker Tool

In this Guide you will learn:
What is telnet?
How to telnet
How to get telnet accounts
Why you might not want to telnet
How to install a telnet server on your home Windows computer
How to turn off a telnet server on your home Linux computer
How to explore computers using telnet
Why not use a portscanner instead?
How to break into web sites using telnet
"Where do I type that command?" People ask that all the time when they read my early Guides to (mostly) Harmless Hacking. I wrote those guides back when the Internet was in its infancy and almost everyone in cyberspace used telnet. However, nowadays you might never even hear about telnet, much less use it, unless you are a hacker. So if you are still wondering about telnet, today is your lucky day.
What Is Telnet?
Telnet is a protocol that is most commonly used to log into a remote computer. It also is the single most powerful hacking tool on the planet. With just a telnet client program, you can:
send email
download source code from web sites
send unexpected input to webservers that can give you amazing and sometimes illegal results
give arbitrary input to many other services on Internet host computers
probe the services offered by servers, routers and even people's home computers.
How to Telnet
Don't know how to telnet? Click the easy telnet links at happyhacker.com and land in the middle of a real hacker wargame! This should work regardless of your computer operating system -- if you have an up to date browser, if your online service provider gives you a true Internet connection, and if your computer is able to telnet at all.
Did those links get you into a telnet session? Were you able to login to a remote computer? If yes, congratulations.
If not, how can you fix the problem? If no telnet program appeared on your monitor when you clicked these links, perhaps your browser is too ancient to allow telnet. Try installing the latest Netscape browser (). Or, perhaps your operating system does not include a telnet program. In that case, install or reinstall Windows 95 or 98. If you own a Mac, get the superb Mac OS X or Linux PPC ().
If a telnet program came up and failed to connect, possibly the computer you were trying to telnet into was down or just plain no longer in existence. Or, you may be using America Online (or a similar extremely poor online service). If so, your simplest solution may be to get a better online service provider. Determined to hack using AOL? See http://happyhacker.org/aol.shtml <../aol.shtml> for some ways to make AOL give you a true Internet connection.
OK, so you've managed to telnet for the first time. Presumably you don't want to limit yourself to telnet links on web sites. How do you telnet anywhere you want to go?
If you have Linux or any other type of Unix (BSD, SCO, Solaris, Sun OS, Irix, Ultrix, etc.) telneting is easy. Just bring up "console" or "shell" (or whatever your GUI calls the command line interface). At the prompt type:
telnet
More on Telnet: the Number One Hacker Tool
Windows 2000 works pretty much like Unix. See Figure 1 for an example of a Win 2000 telnet login. Not shown on the screen was the command "telnet 10.0.0.10", which I gave at the Command (MS-DOS) prompt.
Figure 1: Telnet using Windows 2000
If you have Windows 95, 98 or NT, to telnet, bring up the MS-DOS prompt (Start --> Programs --> MS-DOS). Click "connect" then "remote system…". In the host name box place the host name or IP address of the computer to which you wish to telnet. Leave the Port and Term Type boxes alone for now.
Here is a really important point. Every day people email me complaining that some computer won't let them telnet into it. They ask what they are doing wrong. They aren't doing anything wrong:
Maybe the computer they are trying to reach no longer exists.
Maybe the computer they are trying to reach doesn't allow telnet logins. For example, whois.internic.net no longer allows telnet logins on port 23 (the default port). Click here to learn how to telnet into whois.internic.net on the right port for that particular server. <../whois.shtml>
Maybe a firewall is blocking them.
Or maybe they make a telnet connection and the remote computer asks for a user name and password they don't have. Then they email me asking for how to get a login name and password that will work.
Newbie note: The owners or administrators of any Internet host computer decide who gets user names and passwords. Believe it or not, about once a week someone emails me asking what user name and password their own online service provider has assigned them for a telnet login. That's why I'm telling people the obvious -- if you want to telnet into any computer, and you don't have a user name and password, you must ask the owner, administrator of tech support for that system for a user name and password. If they won't give that to you, they don't want you to have it!
You can go to jail warning: If you guess the user name and password, or use a computer breakin technique to get or create them, or if someone other than an owner or administrator or a legitimate user on that system gives you a user name and password, it is against the law to use them. Many computer criminals give out user names and passwords that they obtained illegally.
More on Telnet: the Number One Hacker Tool
How to Get Telnet Accounts
OK, so you want to get legal user names and passwords so you can telnet into other computers. Here are some of the best ways:
See http://happyhacker.org/links2.shtml#shells <../links2.shtml> for organizations that will give you free shell accounts. You can telnet into these.
Ask Internet Service Providers for shell accounts. Some offer them, although most don't.
Set up a telnet server on your own computer (see instructions below). Yes, once you are running a telnet server, you can telnet from your computer back into your computer. Simply give the command "telnet 127.0.0.1".
Make friends with people who run Internet computers with telnet servers.
Why you May Not Want to Telnet
If you love your shell account server, don't ever, ever telnet or ftp into it. I recommend Ssh or Openssh for logging into remote computers? The telnet (and ftp) protocol is a "clear text" transmission. That means that computer on the same LAN as either You or your destination computer, or any computer on any LAN or network path through which your connection passes can steal your login name, password or anything else that goes across your connection. Ssh and OpenSsh encrypt all communications so no one can snoop on you.
How to Install a Telnet Server on your Windows Computer
Usually you can't telnet into a Windows home computer. The reason is, they aren't running telnet servers. Here's how to get a telnet server on your home Windows computers so your friends and you can telnet in and play.
For Windows NT, the Options Pack includes a primitive telnet server.
For Windows 95/98/NT and 2000, you also can install shareware or commercial telnet servers. Check out http://www.winfiles.com, or do a web search.
Of course installing a telnet server makes your computer vulnerable to all sorts of trouble from hackers. It's your funeral, don't come crying top me if a telnet visitor destroys your computer
More on Telnet: the Number One Hacker Tool
How to Turn off a Telnet Server on your Unix-type Computer
If you go online with Linux or other Unix-type computer, a telnet server is the easiest way to ensure you get destroyed by a malicious hacker. Here's how to prevent this. On most of these, the file /etc/inetd.conf launches most of your servers. Edit the file to put a "#" in front of the line that has telnet in it and either reboot your computer or kill and restart inetd.
If your computer doesn't use inetd to launch services, you should be able to find telnetd under /etc/init.d.
Install ssh instead and only use that to log into your shell account.
How to Explore Computers Using Telnet
Even if a computer doesn't have a telnet server, there are lots of fun and even legal things to do to it using telnet. The easiest thing to do is extract "banners" from a victim computer. A banner is a message a computer will often give when you telnet to a port that is running an Internet server of some sort.
For example, most mail sending servers use port 25. To telnet to port 25 from Win 2000 or a Unix shell, simply type:
telnet 25
Windows 95, 98 and NT make it a tiny bit harder.

More on Telnet: the Number One Hacker Tool
If the victim computer is running a mail server, you will see something that looks like this:
Whoa, look at that! The victim computer told us what operating system (Windows NT) and mail server (Mercur) it runs!
A quick search of the Bugtraq archives at revealed horrid things a criminal could do to that Mercur mail server. Since I think it is more fun to be nice, I told someone at the company using this mail server about the problems. He invited me to vacation at his beautiful Swiss home, where he and his wife keep horses and take long trail rides in the Alps. Golly, that is much more fun than breaking into a computer!
Right about now some elite ueberhaxorz are probably reading this and saying "What a lamer Meinel is! We can do the same thing by running nmap."
They are right, you can learn the same things by running a port scanning program such as nmap (available at ). However, I am quite careful about under what circumstances I run any port scanner. In order to get information on what programs are running on what ports, you must run a port scanner in a mode that will probably convince the owner of the victim computer that you are a criminal. He or she may persuade your online service provider to cancel your account.
The other reason to analyze computers using telnet is that you learn more. It's the difference between eating at McDonalds and learning how to cook.

More on Telnet: the Number One Hacker Tool
A quick search of the Bugtraq archives at revealed horrid things a criminal could do to that Mercur mail server. Since I think it is more fun to be nice, I told someone at the company using this mail server about the problems. He invited me to vacation at his beautiful Swiss home, where he and his wife keep horses and take long trail rides in the Alps. Golly, that is much more fun than breaking into a computer!
Right about now some elite ueberhaxorz are probably reading this and saying "What a lamer Meinel is! We can do the same thing by running nmap."
They are right, you can learn the same things by running a port scanning program such as nmap (available at ). However, I am quite careful about under what circumstances I run any port scanner. In order to get information on what programs are running on what ports, you must run a port scanner in a mode that will probably convince the owner of the victim computer that you are a criminal. He or she may persuade your online service provider to cancel your account.
The other reason to analyze computers using telnet is that you learn more. It's the difference between eating at McDonalds and learning how to cook.
How to Break into Web Sites Using Telnet
You don't have to use a web browser to access files on a web site. All you need to do is:
telnet 80
Or specify port 80 in a Windows telnet.
If you are using Windows 95/98/NT, whenever you are NOT logging into a telnet account, you should enable local echo. Otherwise whatever you type in (unless you are in a telnet account) will not show on the screen. To enable local echo, click Terminal --> Preferences --> Local Echo.
So how do you send stuff back to the webserver? Try this:
GET / HTTP/1.0
What kinds of commands can you send? The book Hackproofing Your Network <../bookstore/general.shtml> (by Ryan Russell of Securityfocus.com and Stance Cunningham) suggests a fun and harmless hack. Create and store a bogus cookie in the location on your web browser that stores cookies. (Find it by searching for the file "cookies.txt".) Name your bogus cookie something like "MyBogusCookie." Then telnet to the victim webserver and give something like this command:
GET / HTTP/1.0User-Agent: HaveABogusCookieThisIsAJoke 123.4Cookie: /; MyBogusCookie
The Überhacker! -- How to Break into Computers <../uberhacker/index.shtml> book details a number of serious attacks you can perform through sending funny input to a webserver. Basically, you need to learn how to write shell programs, and then find ways to get them to be run by the webserver. I'm not going to explain them here, however. These attacks, when carried out against a vulnerable webserver, are so easy that little kids could do them, and I don't want to be responsible for their behavior. It's much harder for little kids to get a hold of Russell's and my books than it is for them to read this GTMHH on the Happy Hacker website.
So are you dying to know what to send a webserver in order to break into it, without having to buy a book? Here are some hints. How to do this will depend on what webserver it is, what operating system it runs on, whether its security weaknesses have been fixed, and whether the web designer has used things such as Common Gateway Interface (CGI) or Server Side Includes (SSIs) that have weaknesses in them.
You will have to research these issues at Web sites that archive vulnerabilities and exploits such as and . You will need to study web site programming (HTML -- hypertext markup language, CGI and SSIs) and shell programming. You will need to learn webserver commands (documented at ). You will have to use your brain and be persistent.
But at least if you come across a telnet exploit, now you know the answer to the question "where do I type that command?"

Author: @k$h@y // Category:
There are many ways to defeat java-script protected web
sites. S ome are very simplistic, such as hitting ctl-alt-del
when the password box is displayed, to simply turning off
java capability, which will dump you into t he default page.
You can try manually searching for other directories, by
typing the directory name into the url address box of your
browser, ie: you w ant access to www.target.com . Try typing
www.target.com/images .(almost ever y web site has an images
directory) This will put you into the images directo ry,
and give you a text list of all the images located there.
Often, the t itle of an image will give you a clue to the
name of another directory. ie: in www.target.com/images,
there is a .gif named gamestitle.gif . There is a g ood
chance then, that there is a 'games' directory on the site,
so you wou ld then type in www.target.com/games, and if it is
a valid directory, you aga in get a text listing of all thefiles available there.
For a more automated a pproach, use a program like WEB SNAKE
from anawave, or Web Wacker. These pro grams will create a
mirror image of an entire web site, showing all director ies,
or even mirror a complete server. They are indispensable for
locating hidden files and directories.
What do you do if you can't get past an openin g "Password
Required" box? First do an WHOIS Lookup for the site. In our
example, www.target.com . We find it's hosted by www.host.com
at 100.100.100. 1. We then go to 100.100.100.1, and then launch \
Web Snake, and mirror the e ntire server. Set Web Snake to NOT
download anything over about 20K. (not ma ny HTML pages are
bigger than this) This speeds things up some, and keeps yo u
from getting a lot of files and images you don't care about.
This can take a long time, so consider running it right before bed time.
Once you have an image of the entire server, you look through
the directories listed, and find /target. When we open that
directory, we find its contents, and all of i ts sub-directories listed.
Let's say we find /target/games/zip/zipindex.html . This would be the index
page that would be displayed had you gone through the
password procedure, and allowed it to redirect you here.
By simply typ ing in the url
www.target.com/games/zip/zipindex.html you will be on
the index page and ready to follow the links for downloading.

Hacking 1

Author: @k$h@y // Category:
There are many ways to defeat java-script protected web
sites. S ome are very simplistic, such as hitting ctl-alt-del
when the password box is displayed, to simply turning off
java capability, which will dump you into t he default page.
You can try manually searching for other directories, by
typing the directory name into the url address box of your
browser, ie: you w ant access to www.target.com . Try typing
www.target.com/images .(almost ever y web site has an images
directory) This will put you into the images directo ry,
and give you a text list of all the images located there.
Often, the t itle of an image will give you a clue to the
name of another directory. ie: in www.target.com/images,
there is a .gif named gamestitle.gif . There is a g ood
chance then, that there is a 'games' directory on the site,
so you wou ld then type in www.target.com/games, and if it is
a valid directory, you aga in get a text listing of all thefiles available there.
For a more automated a pproach, use a program like WEB SNAKE
from anawave, or Web Wacker. These pro grams will create a
mirror image of an entire web site, showing all director ies,
or even mirror a complete server. They are indispensable for
locating hidden files and directories.
What do you do if you can't get past an openin g "Password
Required" box? First do an WHOIS Lookup for the site. In our
example, www.target.com . We find it's hosted by www.host.com
at 100.100.100. 1. We then go to 100.100.100.1, and then launch \
Web Snake, and mirror the e ntire server. Set Web Snake to NOT
download anything over about 20K. (not ma ny HTML pages are
bigger than this) This speeds things up some, and keeps yo u
from getting a lot of files and images you don't care about.
This can take a long time, so consider running it right before bed time.
Once you have an image of the entire server, you look through
the directories listed, and find /target. When we open that
directory, we find its contents, and all of i ts sub-directories listed.
Let's say we find /target/games/zip/zipindex.html . This would be the index
page that would be displayed had you gone through the
password procedure, and allowed it to redirect you here.
By simply typ ing in the url
www.target.com/games/zip/zipindex.html you will be on
the index page and ready to follow the links for downloading.

Hacking 1

Author: @k$h@y // Category:
There are many ways to defeat java-script protected web
sites. S ome are very simplistic, such as hitting ctl-alt-del
when the password box is displayed, to simply turning off
java capability, which will dump you into t he default page.
You can try manually searching for other directories, by
typing the directory name into the url address box of your
browser, ie: you w ant access to www.target.com . Try typing
www.target.com/images .(almost ever y web site has an images
directory) This will put you into the images directo ry,
and give you a text list of all the images located there.
Often, the t itle of an image will give you a clue to the
name of another directory. ie: in www.target.com/images,
there is a .gif named gamestitle.gif . There is a g ood
chance then, that there is a 'games' directory on the site,
so you wou ld then type in www.target.com/games, and if it is
a valid directory, you aga in get a text listing of all thefiles available there.
For a more automated a pproach, use a program like WEB SNAKE
from anawave, or Web Wacker. These pro grams will create a
mirror image of an entire web site, showing all director ies,
or even mirror a complete server. They are indispensable for
locating hidden files and directories.
What do you do if you can't get past an openin g "Password
Required" box? First do an WHOIS Lookup for the site. In our
example, www.target.com . We find it's hosted by www.host.com
at 100.100.100. 1. We then go to 100.100.100.1, and then launch \
Web Snake, and mirror the e ntire server. Set Web Snake to NOT
download anything over about 20K. (not ma ny HTML pages are
bigger than this) This speeds things up some, and keeps yo u
from getting a lot of files and images you don't care about.
This can take a long time, so consider running it right before bed time.
Once you have an image of the entire server, you look through
the directories listed, and find /target. When we open that
directory, we find its contents, and all of i ts sub-directories listed.
Let's say we find /target/games/zip/zipindex.html . This would be the index
page that would be displayed had you gone through the
password procedure, and allowed it to redirect you here.
By simply typ ing in the url
www.target.com/games/zip/zipindex.html you will be on
the index page and ready to follow the links for downloading.

Optimize BroadBand

Author: @k$h@y // Category:
These settings allow you to boost the speed of your broadband Internet connection when using a Cable Modem or DSL Router with Windows 2000 and Windows XP.

*********************************************************************************************************************
Open your registry and find the key below.
Create the following DWORD values, as most of these values will not already exist you will need to create them by clicking on 'Edit -> New -> DWORD Value' and then set the value as shown below.
DefaultTTL = "80" hex (or 128 decimal)
Specifies the default time to live (TTL) for TCP/IP packets. The default is 32.
EnablePMTUBHDetect = "0"
Specifies whether the stack will attempt to detect Maximum Transmission Unit (MTU) routers that do not send back ICMP fragmentation-needed messages. The default is 0.
EnablePMTUDiscovery = "1"
Specifies whether the TCP/IP stack will attempt to perform path MTU discovery as specified in RFC 1191. The default is 1.
GlobalMaxTcpWindowSize = "7FFF" hex (or 32767 decimal)
Specifies the system maximum receive window size advertised by the TCP/IP stack.
TcpMaxDupAcks = "2"
Determines the number of duplicate ACKs that must be received for the same sequence number of sent data before "fast retransmit" is triggered.
SackOpts = "1"
Enables support for selective acknowledgements as documented by Request for Comment (RFC) 2018. Default is 0.
Tcp1323Opts = "1"
Controls RFC 1323 time stamps and window scaling options. Possible values are: "0" = disable RFC 1323 options, "1" = window scale enabled only, "2" = time stamps enabled only and "3" = both options enabled.
TcpWindowSize = "7FFF" hex (or 32767 decimal)
Specifies the receive window size advertised by the TCP/IP stack. If you have a latent network you can try increasing the value to 93440, 186880, or 372300.
Exit your registry and restart Windows for the changes to take effect.

*********************************************************************************************************************
If you don’t want to edit the registry, here's a little TCP utility that is ideal...

http://www.broadbandreports.com/front/doctorping.zip

*********************************************************************************************************************
@K$H@Y
www.coolmobileandpc.blogspot.com

Format Hdd Advanced Way

Author: @k$h@y // Category:
Format An Badly Virus Affected Hard Disk
Many Of The Advanced Internet Users Who Sit About 4-5 hrs On Internet
And Download Vaious StuffFrom Here And There
They Have A Chance Of Getting Their System Getting Affected By Viruses,BackDoors,Trojans Etc
And Even Many Of Them Come To A Stage That They Cant Even Format Their HDD
So Here Is A Nice Solution For U
***
This is my favorite way to wipe it clean:
CAUTION: This debug script is for advanced users only. Its Purpose is to remove all formatting and partitioning information from your hard disk when FDISK is unable to do so. THIS WILL REMOVE ALL DATA AND PROGRAMS FORM THE DRIVE.
1. Create a MSDOS bood disk with Debug
2. At DOS command prompt type the following: Debug[Enter] (Where enter is to press the enter key once)

-F 200 L1000 0 [Enter]
-A CS:100 [Enter]
xxxx:0100 MOV AX,301 [Enter]
xxxx:0103 MOV BX,200 [Enter]
xxxx:0106 MOV CX,1 [Enter]
xxxx:0109 MOV DX,80 [Enter]
NOTE: ( --- "80" for hd0, "81" for hd1)
xxxx:010c INT 13 [Enter]
xxxx: 010e INT 20 [Enter]
xxxx: 0110 [Enter]
-G [Enter]
"Program terminated normally"
3. Turn off the computer. On the next startup the hard drive will need to be partitioned and formatted.
@K$H@Y
www.coolmobileandpc.blogspot.com
***

FTP Explained

Author: @k$h@y // Category:
Setting Up A Ftp:
Well, since many of us have always wondered this, here it is. Long and drawn out. Also, before attempting this, realize one thing; You will have to give up your time, effort, bandwidth, and security to have a quality ftp server.
That being said, here it goes. First of all, find out if your IP (Internet Protocol) is static (not changing) or dynamic (changes everytime you log on). To do this, first consider the fact if you have a dial up modem. If you do, chances are about 999 999 out of 1 000 000 that your IP is dynamic. To make it static, just go to a place like h*tp://www.myftp.org/ to register for a static ip address.
You'll then need to get your IP. This can be done by doing this:
Going to Start -> Run -> winipcfg or www.ask.com and asking 'What is my IP?'
After doing so, you'll need to download an FTP server client. Personally, I'd recommend G6 FTP Server, Serv-U FTPor Bullitproof v2.15 all three of which are extremely reliable, and the norm of the ftp world.
You can download them on this site: h*tp://www.liaokai.com/softw_en/d_index.htm
First, you'll have to set up your ftp. For this guide, I will use step-by-step instructions for G6. First, you'll have to go into 'Setup -> General'. From here, type in your port # (default is 21). I recommend something unique, or something a bit larger (ex: 3069). If you want to, check the number of max users (this sets the amount of simultaneous maximum users on your server at once performing actions - The more on at once, the slower the connection and vice versa).
The below options are then chooseable:
-Launch with windows
-Activate FTP Server on Start-up
-Put into tray on startup
-Allow multiple instances
-Show "Loading..." status at startup
-Scan drive(s) at startup
-Confirm exit
You can do what you want with these, as they are pretty self explanatory. The scan drive feature is nice, as is the 2nd and the last option. From here, click the 'options' text on the left column.
To protect your server, you should check 'login check' and 'password check', 'Show relative path (a must!)', and any other options you feel you'll need. After doing so, click the 'advanced' text in the left column. You should then leave the buffer size on the default (unless of course you know what you're doing ), and then allow the type of ftp you want.
Uploading and downloading is usually good, but it's up to you if you want to allow uploads and/or downloads. For the server priority, that will determine how much conventional memory will be used and how much 'effort' will go into making your server run smoothly.
Anti-hammering is also good, as it prevents people from slowing down your speed. From here, click 'Log Options' from the left column. If you would like to see and record every single command and clutter up your screen, leave the defaults.
But, if you would like to see what is going on with the lowest possible space taken, click 'Screen' in the top column. You should then check off 'Log successful logins', and all of the options in the client directry, except 'Log directory changes'. After doing so, click 'Ok' in the bottom left corner.
You will then have to go into 'Setup -> User Accounts' (or ctrl & u). From here, you should click on the right most column, and right click. Choose 'Add', and choose the username(s) you would like people to have access to.
After giving a name (ex: themoonlanding), you will have to give them a set password in the bottom column (ex: wasfaked). For the 'Home IP' directory, (if you registered with a static server, check 'All IP Homes'. If your IP is static by default, choose your IP from the list. You will then have to right click in the very center column, and choose 'Add'.
From here, you will have to set the directory you want the people to have access to. After choosing the directory, I suggest you choose the options 'Read', 'List', and 'Subdirs', unless of course you know what you're doing . After doing so, make an 'upload' folder in the directory, and choose to 'add' this folder seperately to the center column. Choose 'write', 'append', 'make', 'list', and 'subdirs'. This will allow them to upload only to specific folders (your upload folder).
Now click on 'Miscellaneous' from the left column. Choose 'enable account', your time-out (how long it takes for people to remain idle before you automatically kick them off), the maximum number of users for this name, the maximum number of connections allowed simultaneously for one ip address, show relative path (a must!), and any other things at the bottom you'd like to have. Now click 'Ok'.
**Requested**

From this main menu, click the little boxing glove icon in the top corner, and right click and unchoose the hit-o-meter for both uploads and downloads (with this you can monitor IP activity). Now click the lightning bolt, and your server is now up and running.
Post your ftp info, like this:
213.10.93.141 (or something else, such as: 'f*p://example.getmyip.com')
User: *** (The username of the client)
Pass: *** (The password)
Port: *** (The port number you chose)
So make a FTP and join the FTP section
*******************************************************************************************************************
Listing The Contents Of A Ftp:
Listing the content of a FTP is very simple.
You will need FTP Content Maker, which can be downloaded from here:
ht*p://www.etplanet.com/download/application/FTP%20Content%20Maker%201.02.zip
1. Put in the IP of the server. Do not put "ftp://" or a "/" because it will not work if you do so.
2. Put in the port. If the port is the default number, 21, you do not have to enter it.
3. Put in the username and password in the appropriate fields. If the login is anonymous, you do not have to enter it.
4. If you want to list a specific directory of the FTP, place it in the directory field. Otherwise, do not enter anything in the directory field.
5. Click "Take the List!"
6. After the list has been taken, click the UBB output tab, and copy and paste to wherever you want it.

If FTP Content Maker is not working, it is probably because the server does not utilize Serv-U Software.
If you get this error message:
StatusCode = 550
LastResponse was : 'Unable to open local file test-ftp'
Error = 550 (Unable to open local file test-ftp)
Error = Unable to open local file test-ftp = 550
Close and restart FTP Content Maker, then try again.

***********************************************************************************************************************
error messages:
110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm Where yyyy is User-process data stream marker, and mmmm server's equivalent marker (note the spaces between markers and "=").
120 Service ready in nnn minutes.
125 Data connection already open; transfer starting.
150 File status okay; about to open data connection.
200 Command okay.
202 Command not implemented, superfluous at this site.
211 System status, or system help reply.
212 Directory status.
213 File status.
214 Help message. On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.
215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.
220 Service ready for new user.
221 Service closing control connection. Logged out if appropriate.
225 Data connection open; no transfer in progress.
226 Closing data connection. Requested file action successful (for example, file transfer or file abort).
227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).
230 User logged in, proceed.
250 Requested file action okay, completed.
257 "PATHNAME" created.
331 User name okay, need password.
332 Need account for login.
350 Requested file action pending further information.
421 Too many users logged to the same account
425 Can't open data connection.
426 Connection closed; transfer aborted.
450 Requested file action not taken. File unavailable (e.g., file busy).
451 Requested action aborted: local error in processing.
452 Requested action not taken. Insufficient storage space in system.
500 Syntax error, command unrecognized. This may include errors such as command line too long.
501 Syntax error in parameters or arguments.
502 Command not implemented.
503 Bad sequence of commands.
504 Command not implemented for that parameter.
530 Not logged in.
532 Need account for storing files.
550 Requested action not taken. File unavailable (e.g., file not found, no access).
551 Requested action aborted: page type unknown.
552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).
553 Requested action not taken. File name not allowed.
**********************************************************************************************************************
Active FTP vs. Passive FTP, a Definitive Explanation
Introduction
One of the most commonly seen questions when dealing with firewalls and other Internet connectivity issues is the difference between active and passive FTP and how best to support either or both of them. Hopefully the following text will help to clear up some of the confusion over how to support FTP in a firewalled environment.
This may not be the definitive explanation, as the title claims, however, I've heard enough good feedback and seen this document linked in enough places to know that quite a few people have found it to be useful. I am always looking for ways to improve things though, and if you find something that is not quite clear or needs more explanation, please let me know! Recent additions to this document include the examples of both active and passive command line FTP sessions. These session examples should help make things a bit clearer. They also provide a nice picture into what goes on behind the scenes during an FTP session. Now, on to the information...
**********************************************************************************************************************
The Basics
FTP is a TCP based service exclusively. There is no UDP component to FTP. FTP is an unusual service in that it utilizes two ports, a 'data' port and a 'command' port (also known as the control port). Traditionally these are port 21 for the command port and port 20 for the data port. The confusion begins however, when we find that depending on the mode, the data port is not always on port 20.
**********************************************************************************************************************
Active FTP
In active mode FTP the client connects from a random unprivileged port (N > 1024) to the FTP server's command port, port 21. Then, the client starts listening to port N+1 and sends the FTP command PORT N+1 to the FTP server. The server will then connect back to the client's specified data port from its local data port, which is port 20.
From the server-side firewall's standpoint, to support active mode FTP the following communication channels need to be opened:
FTP server's port 21 from anywhere (Client initiates connection)
FTP server's port 21 to ports > 1024 (Server responds to client's control port)
FTP server's port 20 to ports > 1024 (Server initiates data connection to client's data port)
FTP server's port 20 from ports > 1024 (Client sends ACKs to server's data port)

In step 1, the client's command port contacts the server's command port and sends the command PORT 1027. The server then sends an ACK back to the client's command port in step 2. In step 3 the server initiates a connection on its local data port to the data port the client specified earlier. Finally, the client sends an ACK back as shown in step 4.
The main problem with active mode FTP actually falls on the client side. The FTP client doesn't make the actual connection to the data port of the server--it simply tells the server what port it is listening on and the server connects back to the specified port on the client. From the client side firewall this appears to be an outside system initiating a connection to an internal client--something that is usually blocked.
**************************************************************************************************************************
Active FTP Example
Below is an actual example of an active FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (192.168.150.80), a linux box running the standard FTP command line client, to testbox2.slacksite.com (192.168.150.90), a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.
There are a few interesting things to consider about this dialog. Notice that when the PORT command is issued, it specifies a port on the client (192.168.150.80) system, rather than the server. We will see the opposite behavior when we use passive FTP. While we are on the subject, a quick note about the format of the PORT command. As you can see in the example below it is formatted as a series of six numbers separated by commas. The first four octets are the IP address while the second two octets comprise the port that will be used for the data connection. To find the actual port multiply the fifth octet by 256 and then add the sixth octet to the total. Thus in the example below the port number is ( (14*256) + 178), or 3762. A quick check with netstat should confirm this information.
testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2
Connected to testbox2.slacksite.com.
220 testbox2.slacksite.com FTP server ready.
Name (testbox2:slacker): slacker
---> USER slacker
331 Password required for slacker.
Password: TmpPass
---> PASS XXXX
230 User slacker logged in.
---> SYST
215 UNIX Type: L8
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> ls
ftp: setsockopt (ignored): Permission denied
---> PORT 192,168,150,80,14,178
200 PORT command successful.
---> LIST
150 Opening ASCII mode data connection for file list.
drwx------ 3 slacker users 104 Jul 27 01:45 public_html
226 Transfer complete.
ftp> quit
---> QUIT
221 Goodbye.
********************************************************************************************************************
Passive FTP
In order to resolve the issue of the server initiating the connection to the client a different method for FTP connections was developed. This was known as passive mode, or PASV, after the command used by the client to tell the server it is in passive mode.
In passive mode FTP the client initiates both connections to the server, solving the problem of firewalls filtering the incoming data port connection to the client from the server. When opening an FTP connection, the client opens two random unprivileged ports locally (N > 1024 and N+1). The first port contacts the server on port 21, but instead of then issuing a PORT command and allowing the server to connect back to its data port, the client will issue the PASV command. The result of this is that the server then opens a random unprivileged port (P > 1024) and sends the PORT P command back to the client. The client then initiates the connection from port N+1 to port P on the server to transfer data.
From the server-side firewall's standpoint, to support passive mode FTP the following communication channels need to be opened:
FTP server's port 21 from anywhere (Client initiates connection)
FTP server's port 21 to ports > 1024 (Server responds to client's control port)
FTP server's ports > 1024 from anywhere (Client initiates data connection to random port specified by server)
FTP server's ports > 1024 to remote ports > 1024 (Server sends ACKs (and data) to client's data port)


In step 1, the client contacts the server on the command port and issues the PASV command. The server then replies in step 2 with PORT 2024, telling the client which port it is listening to for the data connection. In step 3 the client then initiates the data connection from its data port to the specified server data port. Finally, the server sends back an ACK in step 4 to the client's data port.
While passive mode FTP solves many of the problems from the client side, it opens up a whole range of problems on the server side. The biggest issue is the need to allow any remote connection to high numbered ports on the server. Fortunately, many FTP daemons, including the popular WU-FTPD allow the administrator to specify a range of ports which the FTP server will use. See Appendix 1 for more information.
The second issue involves supporting and troubleshooting clients which do (or do not) support passive mode. As an example, the command line FTP utility provided with Solaris does not support passive mode, necessitating a third-party FTP client, such as ncftp.
With the massive popularity of the World Wide Web, many people prefer to use their web browser as an FTP client. Most browsers only support passive mode when accessing ftp:// URLs. This can either be good or bad depending on what the servers and firewalls are configured to support.
******************************************************************************************************************
Passive FTP Example
Below is an actual example of a passive FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (192.168.150.80), a linux box running the standard FTP command line client, to testbox2.slacksite.com (192.168.150.90), a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.
Notice the difference in the PORT command in this example as opposed to the active FTP example. Here, we see a port being opened on the server (192.168.150.90) system, rather than the client. See the discussion about the format of the PORT command above, in the Active FTP Example section.
testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2
Connected to testbox2.slacksite.com.
220 testbox2.slacksite.com FTP server ready.
Name (testbox2:slacker): slacker
---> USER slacker
331 Password required for slacker.
Password: TmpPass
---> PASS XXXX
230 User slacker logged in.
---> SYST
215 UNIX Type: L8
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> passive
Passive mode on.
ftp> ls
ftp: setsockopt (ignored): Permission denied
---> PASV
227 Entering Passive Mode (192,168,150,90,195,149).
---> LIST
150 Opening ASCII mode data connection for file list
drwx------ 3 slacker users 104 Jul 27 01:45 public_html
226 Transfer complete.
ftp> quit
---> QUIT
221 Goodbye.
**********************************************************************************************************************
Summary
The following chart should help admins remember how each FTP mode works:
Active FTP :
command : client >1024 -> server 21
data : client >1024 <- server 20
Passive FTP :
command : client >1024 -> server 21
data : client >1024 -> server >1024
A quick summary of the pros and cons of active vs. passive FTP is also in order:
Active FTP is beneficial to the FTP server admin, but detrimental to the client side admin. The FTP server attempts to make connections to random high ports on the client, which would almost certainly be blocked by a firewall on the client side. Passive FTP is beneficial to the client, but detrimental to the FTP server admin. The client will make both connections to the server, but one of them will be to a random high port, which would almost certainly be blocked by a firewall on the server side.
Luckily, there is somewhat of a compromise. Since admins running FTP servers will need to make their servers accessible to the greatest number of clients, they will almost certainly need to support passive FTP. The exposure of high level ports on the server can be minimized by specifying a limited port range for the FTP server to use. Thus, everything except for this range of ports can be firewalled on the server side. While this doesn't eliminate all risk to the server, it decreases it tremendously.


@K$H@Y
www.coolmobileandpc.blogspot.com

IP Address Explained

Author: @k$h@y // Category:
IP ADDRESS STRUCTURE:

*********************************************************************************************************************
Note: the terms multicast address and MSB are explained at the end.


Every station on a PSN (packet switched network) that is based on the TCP/IP
protocol (your computer is one, for example. Yes, we're referring to a host
that is connected to the net) must have an IP address, so it can be identified,
and information can be relayed and routed to it in an orderly fashion.


An IP address consists of a 32 bit logical address. The address is divided
into two fields:
*********************************************************************************************************************
1) The network address:

Assigned by InterNIC (Internet Network Information Center).
In fact most ISPs (internet service providers) purchase a number of addresses
and assign them individually.

*********************************************************************************************************************
2) The host address:

An address that identifies the single nodes throughout the network. It can be assigned
by the network manager, by using protocols for it such as DHCP, or the workstation itself.


[The IP networking protocol is a logically routed protocol, meaning that address 192.43.54.2
will be on the same physical wire as address 192.43.54.3 (of course this is not always true. It depends on the
subnet mask of the network, but all of that can fill a text of its own)

IP address structure:

---.---.---.---
^ ^

network host
Every " --- " = 8 bits.
The first bits ===> network address
The last bits ===> host address.
with 8 bits you can present from 0-255 . (binary=(2 to the power of 8)-1)
Example:
11000010.01011010.00011111.01001010 (binary)
194.90.31.74 (decimal)
IP address CLASSES :
We can classify IP addreses to 5 groups. You can distinguish them by comparing the "High Order" bits (the first four bits on the
left of the address):
type model target MSB addr.range bit number max.stations
groups net./hosts
----------------------------------------------------------------
A N.h.h.h ALL 0 1.0.0.0 24/7 16,777,214
ACCEPT to
HUGE 127.0.0.0
CORPS
-----------------------------------------------------------------------
N.N.h.h TO ALL 10 128.1.00 16/14 65,543
B LARGE to
CORPS 191.254.00
-----------------------------------------------------------------------
N.N.N.h TO ALOT 110 192.0.1.0 8/22 254
C OF to
SMALL 223.225.254
CORPS
-----------------------------------------------------------------------
D NONE MULTI-CA1110 224.0.0.0 NOT FOR UNKNOWN
ST ADDR. to USUAL
RFC-1112 239.255.255.255 USE
-----------------------------------------------------------------------
E NOT FOREXPERIME1,1,1,1 240.0.0.0 NOT FOR NOT FOR USE
USE NTAL to USE
ADDR. 254.255.255.255
-----------------------------------------------------------------------
N=NETWORK , h=HOST .


Notice the address range 127.X.X.X.
These addresses are assigned to internal use to the network device, and are
used as an application tool only. For example: 127.0.0.1, the most common one,
is called the loopback address - everything sent here goes directly back to
you, without even traveling out on the wire.
Also, some IPs are reserved for VPNs - Virtual Private Networks. These are
local area networks over wide area networks that use the Internet Protocol to
communicate, and each computer inside the network is assigned with an IP
address. So, suppose a certain computer wants to send a data packet to
another host on the network with the IP 'x', but there's also another host on
the Internet that has the same IP - what happens now? So this is why you
cannot use these and other forms of reserved IPs on the Internet.
EXTRA:
Distinguishing different groups:
You have to compare the first byte on the left in the address as follows:



Type First byte MSB
in decimal
----------------------------
A 1-127 0
----------------------------
B 128-191 10
----------------------------
C 192-223 110
----------------------------
D 224-239 1110
----------------------------
E 240-254 1111
----------------------------


*********************************************************************************************************************

Weird shit (newbie note):
1) Multicast: (copied from RFC 1112)
IP multicasting is the transmission of an IP datagram to a "host
group", a set of zero or more hosts identified by a single IP
destination address. A multicast datagram is delivered to all
members of its destination host group with the same "best-efforts"
reliability as regular unicast IP datagrams, i.e., the datagram is
not guaranteed to arrive intact at all members of the destination
group or in the same order relative to other datagrams.
The membership of a host group is dynamic; that is, hosts may join
and leave groups at any time. There is no restriction on the
location or number of members in a host group. A host may be a
member of more than one group at a time. A host need not be a member
of a group to send datagrams to it.
A host group may be permanent or transient. A permanent group has a
well-known, administratively assigned IP address. It is the address,
not the membership of the group, that is permanent; at any time a
permanent group may have any number of members, even zero. Those IP
multicast addresses that are not reserved for permanent groups are
available for dynamic assignment to transient groups which exist only
as long as they have members.
Internetwork forwarding of IP multicast datagrams(ip packets)is handled by
"multicast routers" which may be co-resident with, or separate from,
internet gateways. A host transmits an IP multicast datagram as a
local network multicast which reaches all immediately-neighboring
members of the destination host group. If the datagram has an IP
time-to-live greater than 1, the multicast router(s) attached to the
local network take responsibility for forwarding it towards all other
networks that have members of the destination group. On those other
member networks that are reachable within the IP time-to-live, an
attached multicast router completes delivery by transmitting the
datagram(ip packet) as a local multicast.
*if you donot understand the above do not worry, it is complicated and dry
but reread it and read it again get a dictionary if it helps.
Hacking is not easy.

*********************************************************************************************************************
2) MSB: Most Significent Bit:
In set numbers the first number on the left is the most important because it
holds the highest value as opposed to the LSB=> least significent bit, it
always holds the the smallest value.

*********************************************************************************************************************
@K$H@Y
www.coolmobileandpc.blogspot.com

Adv Tweaks In Xp

Author: @k$h@y // Category:
Win XP Tweaks Advanced
-----------
STARTUP
-----------

Windows Prefetcher
******************
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Session Manager \ Memory Management \ PrefetchParameters]
Under this key there is a setting called EnablePrefetcher, the default setting of which is 3. Increasing this number to 5 gives the prefetcher system more system resources to prefetch application data for faster load times. Depending on the number of boot processes you run on your computer, you may get benefits from settings up to 9. However, I do not have any substantive research data on settings above 5 so I cannot verify the benefits of a higher setting. This setting also may effect the loading times of your most frequently launched applications. This setting will not take effect until after you reboot your system.

Master File Table Zone Reservation
**********************************
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ FileSystem]
Under this key there is a setting called NtfsMftZoneReservation, the default setting of which is 1. The range of this value is from 1 to 4. The default setting reserves one-eighth of the volume for the MFT. A setting of 2 reserves one-quarter of the volume for the MFT. A setting of 3 for NtfsMftZoneReservation reserves three-eighths of the volume for the MFT and setting it to 4 reserves half of the volume for the MFT. Most users will never exceed one-quarter of the volume. I recommend a setting of 2 for most users. This allows for a "moderate number of files" commensurate with the number of small files included in most computer games and applications. Reboot after applying this tweak.

Optimize Boot Files
*******************
[HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Dfrg \ BootOptimizeFunction]
Under this key is a text value named Enable. A value of Y for this setting enables the boot files defragmenter. This setting defragments the boot files and may move the boot files to the beginning (fastest) part of the partition, but that last statement is unverified. Reboot after applying this tweak.
Optimizing Startup Programs [msconfig]
**************************************
MSConfig, similar to the application included in Win9x of the same name, allows the user to fine tune the applications that are launched at startup without forcing the user to delve deep into the registry. To disable some of the applications launched, load msconfig.exe from the run command line, and go to the Startup tab. From there, un-ticking the checkbox next to a startup item will stop it from launching. There are a few application that you will never want to disable (ctfmon comes to mind), but for the most part the best settings vary greatly from system to system.
As a good rule of thumb, though, it is unlikely that you will want to disable anything in the Windows directory (unless it's a third-party program that was incorrectly installed into the Windows directory), nor will you want to disable anything directly relating to your system hardware. The only exception to this is when you are dealing with software, which does not give you any added benefits (some OEM dealers load your system up with software you do not need). The nice part of msconfig is that it does not delete any of the settings, it simply disables them, and so you can go back and restart a startup application if you find that you need it. This optimization won't take effect until after a reboot.
Bootvis Application
*******************
The program was designed by Microsoft to enable Windows XP to cold boot in 30 seconds, return from hibernation in 20 seconds, and return from standby in 10 seconds. Bootvis has two extremely useful features. First, it can be used to optimize the boot process on your computer automatically. Second, it can be used to analyze the boot process for specific subsystems that are having difficulty loading. The first process specifically targets the prefetching subsystem, as well as the layout of boot files on the disk. When both of these systems are optimized, it can result in a significant reduction in the time it takes for the computer to boot.
Before attempting to use Bootvis to analyze or optimize the boot performance of your system, make sure that the task scheduler service has been enabled – the program requires the service to run properly. Also, close all open programs as well – using the software requires a reboot.
To use the software to optimize your system startup, first start with a full analysis of a fresh boot. Start Bootvis, go to the Tools menu, and select next boot. Set the Trace Repetition Settings to 2 repetitions, Start at 1, and Reboot automatically. Then set the trace into motion. The system will fully reboot twice, and then reopen bootvis and open the second trace file (should have _2 in the name). Analyze the graphs and make any changes that you think are necessary (this is a great tool for determining which startup programs you want to kill using msconfig). Once you have made your optimizations go to the Trace menu, and select the Optimize System item. This will cause the system to reboot and will then make some changes to the file structure on the hard drive (this includes a defragmentation of boot files and a shifting of their location to the fastest portion of the hard disk, as well as some other optimizations). After this is done, once again run a Trace analysis as above, except change the starting number to 3. Once the system has rebooted both times, compare the charts from the second trace to the charts for the fourth trace to show you the time improvement of the system's boot up.
The standard defragmenter included with Windows XP will not undo the boot optimizations performed by this application.


-----------------------------------
General Performance Tweaks
-----------------------------------

IRQ Priority Tweak
******************
[HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ Control \ PriorityControl]
You will need to create a new DWORD: IRQ#Priority (where # is the number of the IRQ you want to prioritize) and give it a setting of 1. This setting gives the requisite IRQ channel priority over the other IRQs on a software level. This can be extremely important for functions and hardware subsystems that need real-time access to other parts of the system. There are several different subsystems that might benefit from this tweak. Generally, I recommend giving either the System CMOS or the video card priority. The System CMOS generally has an IRQ setting of 8, and giving it priority enhances the I/O performance of the system. Giving priority to the video card can increase frame rates and make AGP more effective.
You can give several IRQs priority, but I am not entirely certain how the system interacts when several IRQs are given priority – it may cause random instabilities in the system, although it is more likely that there's a parsing system built into Windows XP to handle such an occurrence. Either way, I would not recommend it.
QoS tweak
*********
QoS (Quality of Service) is a networking subsystem which is supposed to insure that the network runs properly. The problem with the system is that it eats up 20% of the total bandwidth of any networking service on the computer (including your internet connection). If you are running XP Professional, you can disable the bandwidth quota reserved for the system using the Group Policy Editor [gpedit.msc].
You can run the group policy editor from the Run command line. To find the setting, expand "Local Computer Policy" and go to "Administrative Templates" under "Computer Configuration." Then find the "Network" branch and select "QoS Packet Scheduler." In the right hand box, double click on the "Limit Reservable Bandwidth." From within the Settings tab, enable the setting and then go into the "Bandwidth Limit %" and set it to 0%. The reason for this is that if you disable this setting, the computer defaults to 20%. This is true even when you aren't using QoS.
Free Idle Tasks Tweak
*********************
This tweak will free up processing time from any idle processes and allow it to be used by the foreground application. It is useful particularly if you are running a game or other 3D application. Create a new shortcut to "Rundll32.exe advapi32.dll,ProcessIdleTasks" and place it on your desktop. Double-click on it anytime you need all of your processing power, before opening the application.
Windows Indexing Services
Windows Indexing Services creates a searchable database that makes system searches for words and files progress much faster – however, it takes an enormous amount of hard drive space as well as a significant amount of extra CPU cycles to maintain the system. Most users will want to disable this service to release the resources for use by the system. To turn off indexing, open My Computer and right click on the drive on which you wish to disable the Indexing Service. Enter the drive's properties and under the general tab, untick the box for "Allow the Indexing Service to index this disk for fast file searching."
Priority Tweak
**************
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ PriorityControl]
This setting effectively runs each instance of an application in its own process for significantly faster application performance and greater stability. This is extremely useful for users with stability problems, as it can isolate specific instances of a program so as not to bring down the entire application. And, it is particularly useful for users of Internet Explorer, for if a rogue web page crashes your browser window, it does not bring the other browser windows down with it. It has a similar effect on any software package where multiple instances might be running at once, such as Microsoft Word. The only problem is that this takes up significantly more memory, because such instances of a program cannot share information that is in active memory (many DLLs and such will have to be loaded into memory multiple times). Because of this, it is not recommended for anyone with less than 512 MB of RAM, unless they are running beta software (or have some other reason for needing the added stability).
There are two parts to this tweak. First is to optimize XP's priority control for the processes. Browse to HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ PriorityControl and set the "Win32PrioritySeparation" DWORD to 38. Next, go into My Computer and under Tools, open the Folder Options menu. Select the View tab and check the "Launch folder windows in separate process" box. This setting actually forces each window into its own memory tread and gives it a separate process priority.
Powertweak application
**********************
xxx.powertweak.com
Powertweak is an application, which acts much like a driver for our chipsets. It optimizes the communication between the chipset and the CPU, and unlocks several "hidden" features of the chipset that can increase the speed of the system. Specifically, it tweaks the internal registers of the chipset and processor that the BIOS does not for better communication performance between subsystems. Supported CPUs and chipsets can see a significant increase in I/O bandwidth, increasing the speed of the entire system. Currently the application supports most popular CPUs and chipsets, although you will need to check the website for your specific processor/chipset combo – the programmer is working on integrating even more chipsets and CPUs into the software.
Offload Network Task Processing onto the Network Card
*****************************************************
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ Tcpip \ Parameters]
Many newer network cards have the ability of taking some of the network processing load off of the processor and performing it right on the card (much like Hardware T&L on most new video cards). This can significantly lower the CPU processes needed to maintain a network connection, freeing up that processor time for other tasks. This does not work on all cards, and it can cause network connectivity problems on systems where the service is enabled but unsupported, so please check with your NIC manufacturer prior to enabling this tweak. Find the DWORD "DisableTaskOffload" and set the value to 0 (the default value is 1). If the key is not already available, create it.
Force XP to Unload DLLs
***********************
[HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer]
"AlwaysUnloadDLL"=dword:00000001
XP has a bad habit of keeping dynamic link libraries that are no longer in use resident in memory. Not only do the DLLs use up precious memory space, but they also tend to cause stability problems in some systems. To force XP to unload any DLLs in memory when the application that called them is no longer in memory, browse to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer and find the DWORD "AlwaysUnloadDLL". You may need to create this key. Set the value to 1 to force the operating system to unload DLLs.
Give 16-bit apps their own separate processes
*********************************************
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ WOW]
"DefaultSeparateVDM"="Yes"
By default, Windows XP will only open one 16-bit process and cram all 16-bit apps running on the system at a given time into that process. This simulates how MS-DOS based systems viewed systems and is necessary for some older applications that run together and share resources. However, most 16-bit applications work perfectly well by themselves and would benefit from the added performance and stability of their own dedicated resources. To force Windows XP to give each 16-bit application it's own resources, browse to HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ WOW and find the String "DefaultSeparateVDM". If it is not there, you may need to create it. Set the value of this to Yes to give each 16-bit application its own process, and No to have the 16-bit application all run in the same memory space.
Disable User Tracking
*********************
[HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer]
"NoInstrumentation"=dword:00000001
The user tracking system built into Windows XP is useless to 99% of users (there are very few uses for the information collected other than for a very nosy system admin), and it uses up precious resources to boot, so it makes sense to disable this "feature" of Windows XP. To do so, browse to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer and find the DWORD "NoInstrumentation". You may need to create this key if it is not there. The default setting is 0, but setting it to 1 will disable most of the user tracking features of the system.
Thumbnail Cache
***************
[HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced]
"DisableThumbnailCache"=dword:00000001
Windows XP has a neat feature for graphic and video files that creates a "thumbnail" of the image or first frame of the video and makes it into an oversized icon for the file. There are two ways that Explorer can do this, it can create them fresh each time you access the folder or it can load them from a thumbnail cache. The thumbnail caches on systems with a large number of image and video files can become staggeringly large. To disable the Thumbnail Cache, browse to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced and find the DWORD "DisableThumbnailCache". You may need to create this key. A setting of 1 is recommended for systems where the number of graphic and video files is large, and a setting of 0 is recommended for systems not concerned about hard drive space, as loading the files from the cache is significantly quicker than creating them from scratch each time a folder is accessed.


*********************************************************************************************************************
@K$H@Y
www.coolmobileandpc.blogspot.com

Final Fantasy 7 for PC

Author: @k$h@y // Category:
Zack isn't new to the franchise, but he was a mere flashback in Final Fantasy VII, which may not make him seem like the best choice of leading man for a prequel to one of the best RPGs ever created. Yet he's as interesting as any Square Enix star, and transcends the usual spiky-haired heroism and teenage angst with an uncommon maturity that develops as the game continues. Revealing almost any plot point could be a spoiler; the Gaia world is rich with mythology and complex character motivation. What's important is how the characters interact, change, and grow. Scenes between Zack and Cloud are both effortless and poignant, and stem directly out of Zack's most impressive character traits: trust and loyalty. As each plot thread twists together and the game reaches its inevitable conclusion, your heart will soften and you may shed a few tears. Crisis Core tells a memorable and exciting tale, but more importantly, it makes you care about its characters, even if you are new to the lore. The game's final scenes are amazing and heartfelt, and one sequence in particular that brilliantly mingles gameplay with narrative is one of the most incredible and moving moments in role-playing history.

The game's stunning cutscenes have an immeasurable effect on the emotionally resonant story. There is a harmonious mix of prerendered cinematics and in-engine cutscenes, and both were created with precision. Dramatic camera angles frame Crisis Core's greatest moments, from earth-shaking soliloquies to the quiet pauses Zack and Aerith share. There is a standout scene in which Sephiroth comes into deep focus using a cinematography technique familiar to Alfred Hitchcock fans. This kind of range is rare in cutscenes, even in RPGs, yet it's never forced or overdone here. The quality is further enhanced by incredible voice acting. Past Final Fantasies have sometimes suffered from awkward English voice-overs, but each actor here delivers the right degree of emotion at the right time, which in turn gives weight to the story. As Zack matures, you can hear the newfound confidence replace his adolescent arrogance; when Angeal tells Zack that he's just a little more important than his sword, you can hear a subtle grin in his deep, commanding baritone.

If you enjoyed Final Fantasy VII, this kind of attention to detail won't come as a surprise. However, you may be startled at how the combat works. Crisis Core is an action RPG. Granted, it does have many of the same elements as FFVII: materia, limit breaks, and so on. However, it plays nothing like its inspiration, which may irritate some fans. This doesn't make it better or worse, but it does make it different, and once you get used to it, it's a lot of fun. Battles are almost exclusively random, with the exception of those that end your side missions (more on those later). When combat begins, you are limited to a contained area, but you can move freely within it. To target an enemy, you simply face in its direction, and to attack, you hit X. It's not quite real-time, but rather a series of quick turns that give you a smidgen of time in-between to select a different spell or attack. You can switch among different options and spells on the fly using the shoulder buttons. If you're familiar with the Tales series (Tales of the Abyss, and so on), you'll have a rough idea of how the combat works in Crisis Core.



Combat is exciting but on the easy side.


You can also guard and evade oncoming attacks, though doing so spends action points. A number of special attacks, such as assault twister, also use action points. Other attacks, like spells, use up magic points. To perform them, you need to possess and equip the corresponding materia. Zack can't use an unlimited number of materia in battle; he's limited to a certain number at a time, so you'll want to choose wisely before you head into late-game combat, especially if you know a boss fight is imminent. You can also fuse materia together to make new spells or enhanced attacks, such as the impressive Thundara Blade. There are times when you'll need to take advantage of your materia and dodge oncoming attacks. Nevertheless, for the first half of the game, Crisis Core is remarkably easy, and a lot of battles come down to mashing on the X button. There is no shortage of potions and gil (the series' currency), either, and given that you can purchase items at any save point, there's no reason not to be fully stocked.







Password: Warez-bb
Download Part 1 | Part 2 | Part 3.

Fifa 03 compressed

Author: @k$h@y // Category:
As we've seen both in 1998 and this year, EA Sports generally tries to take full advantage of the World Cup, and how much interest it generates in the sport of soccer, by releasing not one, but two soccer games in a year. And now, just five months after 2002 FIFA World Cup comes FIFA Soccer 2003. The latest edition of this decade-old franchise is perhaps the most intriguing in some time, highlighting the tactical battles of the real-life sport and at least partially abstaining from the slam-bang superhuman action of past versions. Make no mistake, the pace can still be inordinately fast unless you choose to slow it down, but this may well be the FIFA that hard-core fans have been waiting for.


After each goal, FIFA 2003 superimposes the team logos and current score onto the pitch.
Presumably since EA Sports has already covered international competition in its earlier game, 2002 FIFA World Cup, FIFA Soccer 2003 focuses on club competition. However, its scope is absolutely huge, encompassing 450 teams from around the world and more than 10,000 individual players, each modeled after real-life counterpart. You can choose from globally renowned powerhouses such as Real Madrid, North American Major League Soccer teams such as the San Jose Earthquakes, or somewhat less-renowned franchises like Korea's Pusan Icons.

The game also features the complete 40-squad international roster from this year's World Cup competition, more than two-dozen gorgeous and purportedly accurate stadiums, and a full allotment of home and away uniforms (and additional "alternate" kits where applicable) for each and every team. Play modes include one-off skirmishes, league seasons, and authentic and custom cup competitions and tournaments. Skilled players have an opportunity to unlock even more tourneys and stadiums by proving themselves worthy on the pitch.

This time around, EA Sports has opted for a deceptively minimalist user interface that makes it easy for rookies to jump right in without being assaulted by a barrage of information screens and choices, but the interface seems poorly designed for veterans who feel the need to tweak and customize. Furthermore, most menus tend to look comparatively rough, with little of the flash and high-end options you might expect from an EA Sports game. Particularly frustrating are the small arrow-shaped icons used to advance forward and move back; they're difficult to locate and hard to activate once you do see them. It's not a completely minor issue either, because these annoying little arrows are used throughout all of FIFA 2003, even for the in-game menu system.

One interesting amenity that you won't even find in the game but can download free of charge is the official "FIFA creation center," a nifty utility that lets you create new players, customize their physical attributes and soccer skills, concoct new kits with predesigned or personalized artwork, modify competitions, and even construct your own logos and banners. It's certainly great, but it should have been included in the game right out of the box.

But FIFA 2003's most important feature is its increased focus on a realistic playing experience. In that respect, EA has significantly tweaked a number of gameplay elements to reward those who calculate their movements in advance, devise pass-based attacks, and use every single button and button combination at their disposal. It has also devised a game with substantially fewer offside calls, and that's good news for everybody.

In FIFA 2003, you can't always rely on the good old speed-burst option to pull you through. In fact, speed bursts are nothing like they were previously. When you hit the jets, your players will take a moment or two just to get up to speed. They'll also take at least that long to slow down again at the end of the burst, and they'll also have a lot less control over the ball while they're in the process of speeding. To make matters worse, the defender marking your runner will dog him every step of the way, most often closing ground simply because he doesn't have to worry about dribbling a soccer ball. Clearly, the speed burst is much more realistic than it was in previous games.

Scoring a goal in FIFA 2003 is similarly more challenging. You'll no longer pull off amazing on-target blasts by simply touching the shoot button and letting go of your movement key or gamepad. Now, you're forced to point your striker directly at the net and punch the shoot button in precisely the right spot or face a string of missed opportunities. Snapping one wide from even a scant 20 feet out is a distinct possibility. In addition, goaltenders now stray well off their lines to cover the entire penalty area, and they sometimes go beyond. It doesn't help that the game still tends to direct too many shots toward goalposts just to keep the score close, though in FIFA 2003, you'll get less of a sense that the game has decided the final score in advance than in previous games.


With the aid of FIFA's new metering system, Roberto Carlos lines up a potentially dangerous free kick.
FIFA 2003 is certainly a more difficult game to master than its predecessor was. More players touch the ball via deflections, bump passes, blocks, and missed passes, and that calls for quicker reactions and better planning. Even gathering in a high ball on the touchline involves more precision and skill. Fortunately, EA Sports has included a number of complex advanced maneuvers and aids designed for those who want to take the time to master them.

The most obvious of these new features is FIFA's metering system. Though it's used for different purposes in different situations, FIFA 2003's meter works much like the swing meter in a PC golf game; it indicates the velocity or direction of your upcoming pass or shot and ultimately gives you more control over the proceedings. Advanced players will also want to experiment with the game's new freestyle control feature, which, when used properly, coaxes a variety of unique and often thrilling signature moves from star performers.









Download FIFA 03.

Cruise Liner Tycoon

Author: @k$h@y // Category:
Build your own cruise line in Carnival Cruise Lines Tycoon for the PC.





Download Criuse Linear Tycoon.

Blizard(torrent)

Author: @k$h@y // Category:
ANAHEIM, Calif.--Day two of BlizzCon is in full swing, and judging by the length of the line to get in this morning, there are even more attendees here than there were yesterday. Most of them seemed to find their way into today's first panel discussion in the main hall, which focused on World of Warcraft's player-versus-player content.

When the Wrath of the Lich King expansion pack is released a little over a month from now, it'll bring with it a number of new PVP features, including two new arenas, at least one new battleground, and a new objective-based PVP zone. We had a chance to see all of these demoed on a beta server today, while members of the design team discussed some of the locales' unique features.

First up was an arena located inside the Horde city of Orgrimmar named The Ring of Valor. Evidently the design team at Blizzard has gone to great lengths to make sure that the new arenas feel very different from existing ones, because this one brings a number of new features to the table. For one thing, when you enter the arena on platforms that raise up out of the floor, you'll be right next to the opposing team rather than across the arena from it. You'll also be flanked on both sides by dynamic fire hazards--vents in the floor that run all the way across the arena and spew flames at regular intervals. If the flames hit you, you'll take damage for the next 10 seconds or so, so you'll have to decide if running through them to reach or escape from an enemy is really worthwhile. Furthermore, there are four square pillars in the arena that rise up out of the ground and sink back down again pretty regularly--these can interfere with your line of sight for ranged attacks and heals, and if you're playing a class with ranged attacks, they can make for excellent (though temporary) vantage points.

The second arena being introduced in Wrath of the Lich King is Dalaran Sewers, which, as its name suggests, is situated beneath the new central city of Dalaran. This arena will be one of the smallest in the game and takes place in a circular room with a raised platform in the middle that can be reached only via one of two sets of steps. The starting areas are at opposite sides of the arena and take the form of large pipes a few feet from the floor that water is flushed through every now and then to prevent players from camping out in them. Water also falls down into the center of the arena at regular intervals, creating a dynamic line-of-sight obstruction and knocking back any players who are too close to it. Because this arena is small, you won't be able to use mounts in it.

Download Torrent.

Star Craft (torrent)

Author: @k$h@y // Category:
Passing judgment on the most eagerly anticipated game of the last few years is no easy task; it's difficult to set aside prejudices that would sway one's opinion either way. Let's face it: Starcraft comes with a great deal of anticipatory baggage, and it would be easy to say that it's either a huge disappointment or the greatest thing since real-time strategy became a household phrase. Truth is, it's neither. Weighed on its own merits, Starcraft is an extremely well-crafted game, albeit one with a few notable problems. It doesn't stray far from the blueprint created by its predecessors (namely the Warcrafts and Command & Conquers), but it is, without a doubt, the best game to ever adhere to that formula.

Starcraft offers a lengthy single-player campaign featuring ten missions for its three diverse races, totaling 30 single-player missions in all (there's also an unsupported veteran campaign included as part of the campaign editor). The story is compelling enough to make playing through all three worthwhile, and the campaign difficulty is tiered so that each is more challenging than the last. While this may seem like an uninteresting point, it helps Starcraft to avoid the problem that has plagued every other game in the genre: Each side is not the same. You don't have to go through a set of training missions once you've already mastered one side. The missions themselves mainly stick to the "gather, build, and conquer" philosophy, but there are a few innovative missions thrown in, and Blizzard has added some narrative elements to the missions themselves that help to keep things interesting. With the exception of the installation missions (in which you are given a handful of units to raid an enemy base, an attempt to break from the mold that is only occasionally successful), the missions are well designed. The solo player also has the option of skirmish missions, though the computer opponents have the annoying ability to see everything you are doing and defend accordingly, making the dreaded "rush" tactic one of the only viable means of emerging victorious.

Starcraft offers an equally nice suite of options on the multiplayer side: There's head-to-head and up to eight-player battles over LAN or Internet (though Internet play is only available over Blizzard's Battle.net server, which includes a ranking list and seems to be as lag-free as it gets nowadays). There is a good variety of multiplayer game types, and you can easily download new maps. Multiplayer has its own set of negatives, the major one being the predominance of rushing. Like it or not, creating a horde of the most basic units and attacking the enemy immediately is an effective tactic. Only a heavily defended base will survive an early rush of Terran Marines or Protoss Zealots. Starcraft has a built-in safeguard to discourage rushing, but it's one of the game's most problematic areas.

This safeguard is in the interface, which only allows you to select 12 units at a time. This isn't especially effective, considering six Zealots will smoke a base early in the game. The selectable unit cap does make rushing more difficult, but it also becomes frustrating at times, especially for those used to the ability to select unlimited units at once. Often, selecting the chosen units from a large group becomes a time-consuming effort. During battle, it can be an exercise in frustration. You can assign groups to hotkeys quite easily, however, lessening the frustration of the selectable unit cap - but this system isn't nearly as good as in Total Annihilation or Dark Reign, and units aren't marked by their group number like in said games. Multiplayer battles can often be decided by who has the best manual dexterity and can overcome the built-in limitations of the interface the most quickly.

Recent real-time innovations regarding unit control are included, with mixed results. Each production facility can have up to five units queued at once. There's a waypoint system, patrolling, and the like - but many of these options aren't particularly well implemented, and some of the options seem tacked on. On the other hand, pathing is great, with only occasional glitches (where a unit will run around in cute little circles). Starcraft most notably lacks the ability to define unit behavior (as in Dark Reign or Total Annihilation), leading to much micromanagement.

What Starcraft does have, though, is personality. Playing any of the three races is a notably different experience. You have the Terrans, "space trailer trash" with moving buildings; the frightening, insect-like Zerg who can burrow underground; and the hi-tech Protoss who can easily construct many buildings at a time. Each race features totally different units, often with no equivalents on the other side, differing construction and repair principles, and even different (though equally effective) interface art. Blizzard has managed to keep it well balanced despite the great diversity. One of the greatest things about Starcraft is that no unit is ever rendered obsolete during the course of a game. Each unit is key in certain situations, and you'll still be relying on your most basic ground units in the endgame.

Aesthetically, Starcraft is impressive. Graphically, it stands alongside Age of Empires as the best-looking 2D strategy game around. What it lacks in visual innovation it makes up for in style; the unit and building animations are highly detailed and imaginative. There are some nice translucency effects, such as the flickering shields on Protoss units. The tilesets and maps are varied and interesting, and the unit portraits are expressive and realistic. And the cinematics, of which there are many, are outstanding. The only real complaints about the visuals are that the viewing area is a little small (the bottom quarter of the screen is occupied by the interface), and the minimap presents only rudimentary information. The music, apart from some new-agey Terran tunes, is appropriately melodic and dark, the sound effects are believable and distinct, and the voice acting is great, bringing the characters to life.

Starcraft's personality goes a long way towards rendering its minor shortcomings obsolete. The game has so much life in it - whether in the great, narrative-driven single-player campaign or the multitude of multiplayer options - you won't grow tired of it anytime soon. And even if you blow through it all, there's an incredibly versatile editor that allows you to create your own full-featured campaigns, right down to spoken introductions and triggered events within missions. It all comes down to this: Starcraft may not do anything particularly new, but it does the real-time thing as well or better than any game before it. If you're willing to give the formula another go, Starcraft is highly recommended.









Download Star Craft (Torrent).