β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦15 ways to speed up computer startup by undercode :
Specialy for old windows
Fb.com/UndercodeTesting
It is a common problem for every computer fan that computer startup is too slow. Here are the fifteen tricks to speed up computer startup collected by the hacking team. Some of them have not been tried.
1. Bios optimization settings
On the home page of bios settings, we enter the "advanced bios features" option, move the cursor to the "frist boot device" option, press "pageup" and "pagedown" to select, the default value is "floppy", this It means that the system will first read the boot information from the floppy drive during startup. Doing so will increase the startup time of the machine and shorten the life of the floppy drive. So we have to choose "hdd-0" to boot directly from the hard disk, so that the boot will be fast for a few seconds. In addition, it is recommended to select "disabled" for "above 1mbmemorytest" in the bios settings, and to enable for "quickpoweronselftest".
The settings in the "advanced chipset features" item have a great impact on the acceleration of the machine, please pay more attention. Change "bank 0/1 dram timing" from "8ns / 10ns" to "fast" or "turbo". "Turbo" is faster than "fast", but not very stable, it is recommended to choose "fast". If the quality of the memory is good, you can choose "turbo" to try. If it is unstable, you can change it back to "fast".
It is recommended to set "2" in the "sdram cas latency" option for memory modules with good memory quality, which can speed up the speed.
Newer motherboards support agp4x. If your graphics card also supports agp4x, then activate this option at "agp-4xmode", that is, select "enabled". This will make better use of the capabilities of the graphics card and speed up the system. Start speed.
2. Start DMA mode to increase hard disk speed
The maximum transfer rate of hard disks using udma / 33, 66, 100 technology is 33mb / s, 66mb / s, 100mb / s, which is theoretically the ide hard disk (here refers to the pio mode4 mode, its transfer rate is 16.6mb / s ) The transmission rate is 3 to 6 times, but in the default setting in windows, dma is disabled, so we must turn it on.
The specific method is: open the "Control Panel β System β Device Manager" window, expand the "Disk Drive" branch, double-click the icon of the udma hard disk, enter "Properties β Settings β Options", "β" in front of the "dma" item, then Press OK to close all dialog boxes and restart the computer.
Third, remove the boot logo of windows
First you have to open "Start" β "Settings" β "Binder Options" and check "Show all files" from the "Advanced Settings" list box in the "View" tab. Then open the c drive, find the file msdos.sys, and cancel its "read-only" attribute, open it, add a line of statements under the "option" paragraph: logo = 0, so that the boot logo of windows will not be Loading and running, the boot time can also be shortened by 3 seconds.
Fourth, optimize the "start" group
Computer beginners love to try various software and delete it in a short time, but often because of some inexplicable reasons, these software will still reside in the "startup" project (especially when using some version d software ), Windows will waste a lot of time when it starts. To solve this problem, it is actually very simple, you can open "Start" β "Run", select "msconfig" in the "Open" column of the dialog box that appears, and then click "OK", it will bring up the "System Configuration" "Utilities", click on the "Startup" tab to remove the "β" in front of the program that does not need to load the startup group. In this way, the startup time can be shortened by at least 10 seconds.
5. Organize and optimize the registry
π¦15 ways to speed up computer startup by undercode :
Specialy for old windows
Fb.com/UndercodeTesting
It is a common problem for every computer fan that computer startup is too slow. Here are the fifteen tricks to speed up computer startup collected by the hacking team. Some of them have not been tried.
1. Bios optimization settings
On the home page of bios settings, we enter the "advanced bios features" option, move the cursor to the "frist boot device" option, press "pageup" and "pagedown" to select, the default value is "floppy", this It means that the system will first read the boot information from the floppy drive during startup. Doing so will increase the startup time of the machine and shorten the life of the floppy drive. So we have to choose "hdd-0" to boot directly from the hard disk, so that the boot will be fast for a few seconds. In addition, it is recommended to select "disabled" for "above 1mbmemorytest" in the bios settings, and to enable for "quickpoweronselftest".
The settings in the "advanced chipset features" item have a great impact on the acceleration of the machine, please pay more attention. Change "bank 0/1 dram timing" from "8ns / 10ns" to "fast" or "turbo". "Turbo" is faster than "fast", but not very stable, it is recommended to choose "fast". If the quality of the memory is good, you can choose "turbo" to try. If it is unstable, you can change it back to "fast".
It is recommended to set "2" in the "sdram cas latency" option for memory modules with good memory quality, which can speed up the speed.
Newer motherboards support agp4x. If your graphics card also supports agp4x, then activate this option at "agp-4xmode", that is, select "enabled". This will make better use of the capabilities of the graphics card and speed up the system. Start speed.
2. Start DMA mode to increase hard disk speed
The maximum transfer rate of hard disks using udma / 33, 66, 100 technology is 33mb / s, 66mb / s, 100mb / s, which is theoretically the ide hard disk (here refers to the pio mode4 mode, its transfer rate is 16.6mb / s ) The transmission rate is 3 to 6 times, but in the default setting in windows, dma is disabled, so we must turn it on.
The specific method is: open the "Control Panel β System β Device Manager" window, expand the "Disk Drive" branch, double-click the icon of the udma hard disk, enter "Properties β Settings β Options", "β" in front of the "dma" item, then Press OK to close all dialog boxes and restart the computer.
Third, remove the boot logo of windows
First you have to open "Start" β "Settings" β "Binder Options" and check "Show all files" from the "Advanced Settings" list box in the "View" tab. Then open the c drive, find the file msdos.sys, and cancel its "read-only" attribute, open it, add a line of statements under the "option" paragraph: logo = 0, so that the boot logo of windows will not be Loading and running, the boot time can also be shortened by 3 seconds.
Fourth, optimize the "start" group
Computer beginners love to try various software and delete it in a short time, but often because of some inexplicable reasons, these software will still reside in the "startup" project (especially when using some version d software ), Windows will waste a lot of time when it starts. To solve this problem, it is actually very simple, you can open "Start" β "Run", select "msconfig" in the "Open" column of the dialog box that appears, and then click "OK", it will bring up the "System Configuration" "Utilities", click on the "Startup" tab to remove the "β" in front of the program that does not need to load the startup group. In this way, the startup time can be shortened by at least 10 seconds.
5. Organize and optimize the registry
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
After Windows starts up, the system should read the relevant information in the registry and temporarily store it in the ram (memory). Most of the time that Windows starts up is spent on this. Therefore, it is necessary to organize and optimize the registry. For the optimization of the registry, you can use software such as windows optimization master. Use windows optimization master, click "Registration Information Cleanup" β "Scan", the software will automatically clean up the rubbish in the registry for you. After the scan, a menu will pop up to let you choose whether to back up the registry, it is recommended to choose backup, After backup, click "Clear".
6. Frequent maintenance system
If too many games, too many application software, too many old materials are installed in the system, your computer will run slower and slower, and the boot time will become longer and longer. Therefore, it is best to do a full maintenance of the computer every once in a while. Click "Start" β "Programs" β "Accessories" β "System Tools" β "Maintenance Wizard", and then click "OK" button to perform a comprehensive maintenance of the computer, which will keep your computer in the best state . It is best to do "disk defragmentation" every two weeks for the hard disk, which will significantly speed up the program startup speed, click "System Tools" β "disk defragmentation program". Note that when defragmenting the disk, the disk where the system is located must be defragmented in order to really speed up the startup sequence of windows.
Seven, expand the virtual memory capacity
If your hard disk is large enough, please open the "System" in the "Control Panel", open the "Virtual Memory" in the "Performance" option, select the second item: the user sets the virtual memory settings, pointing to a Use less hard disk, and set the maximum and minimum values ββto a fixed value, about 2 times the size of physical memory. In this way, when using the hard disk in the virtual memory, there is no need to accommodate the large and small differences, and the fixed space is used as the virtual memory to speed up the access speed. The setting of virtual memory is best performed after "disk defragmentation", so that virtual memory is not in a continuous, non-fragmented file space, and can play a better role.
8. Remove fancy settings like "wallpaper" and "screen saver"
These settings take up system resources, not to mention that it also seriously affects the startup sequence of windows. The way to remove them is: click the right mouse button on a blank space on the desktop, select "Properties" in the pop-up menu, select the "Background" and "Screen Saver" tabs in the pop-up dialog box, and change the "Wallpaper" and "Screen" The "Protection Program" can be set to "None".
Nine, delete autoexec.bat and config.sys
The two files autoexec.bat and config.sys in the root directory of the system installation disk are no longer needed for windows, and you can safely delete them, which can speed up the startup speed of windows.
10. Streamline * .ini files, especially the contents of system.ini and win.ini
Many drivers and font files are loaded in the [boot] and [386enh] sections of system.ini, which is the focus of clearing. In particular, note that the shell = explorer.exe in the [boot] field is the hidden loading place that Trojans like. Trojans usually change this sentence to this: shell = explorer.exe file.exe, pay attention to the file here. Exe is the Trojan server program! The loading and running of the Trojan horse not only poses a threat to system security, but also slows down the startup of the computer. Programs loaded after "run" and "load" in win.ini that are not required to run every time can be temporarily removed. , And then click Run when you want to use it in the future. In this way, the related files called by windows during booting will be reduced a lot, and the starting speed will naturally be much faster.
11. Turn off Disk Scan
Open msdos.sys with a text editor and you will see the following:
6. Frequent maintenance system
If too many games, too many application software, too many old materials are installed in the system, your computer will run slower and slower, and the boot time will become longer and longer. Therefore, it is best to do a full maintenance of the computer every once in a while. Click "Start" β "Programs" β "Accessories" β "System Tools" β "Maintenance Wizard", and then click "OK" button to perform a comprehensive maintenance of the computer, which will keep your computer in the best state . It is best to do "disk defragmentation" every two weeks for the hard disk, which will significantly speed up the program startup speed, click "System Tools" β "disk defragmentation program". Note that when defragmenting the disk, the disk where the system is located must be defragmented in order to really speed up the startup sequence of windows.
Seven, expand the virtual memory capacity
If your hard disk is large enough, please open the "System" in the "Control Panel", open the "Virtual Memory" in the "Performance" option, select the second item: the user sets the virtual memory settings, pointing to a Use less hard disk, and set the maximum and minimum values ββto a fixed value, about 2 times the size of physical memory. In this way, when using the hard disk in the virtual memory, there is no need to accommodate the large and small differences, and the fixed space is used as the virtual memory to speed up the access speed. The setting of virtual memory is best performed after "disk defragmentation", so that virtual memory is not in a continuous, non-fragmented file space, and can play a better role.
8. Remove fancy settings like "wallpaper" and "screen saver"
These settings take up system resources, not to mention that it also seriously affects the startup sequence of windows. The way to remove them is: click the right mouse button on a blank space on the desktop, select "Properties" in the pop-up menu, select the "Background" and "Screen Saver" tabs in the pop-up dialog box, and change the "Wallpaper" and "Screen" The "Protection Program" can be set to "None".
Nine, delete autoexec.bat and config.sys
The two files autoexec.bat and config.sys in the root directory of the system installation disk are no longer needed for windows, and you can safely delete them, which can speed up the startup speed of windows.
10. Streamline * .ini files, especially the contents of system.ini and win.ini
Many drivers and font files are loaded in the [boot] and [386enh] sections of system.ini, which is the focus of clearing. In particular, note that the shell = explorer.exe in the [boot] field is the hidden loading place that Trojans like. Trojans usually change this sentence to this: shell = explorer.exe file.exe, pay attention to the file here. Exe is the Trojan server program! The loading and running of the Trojan horse not only poses a threat to system security, but also slows down the startup of the computer. Programs loaded after "run" and "load" in win.ini that are not required to run every time can be temporarily removed. , And then click Run when you want to use it in the future. In this way, the related files called by windows during booting will be reduced a lot, and the starting speed will naturally be much faster.
11. Turn off Disk Scan
Open msdos.sys with a text editor and you will see the following:
[options]
bootmulti = 1
bootgui = 1
autoscan = 1
If you do not want to run the disk scan program after an abnormal shutdown, you can change atuoscan = 1 to autoscan = 0, so that the computer will start faster after an abnormal shutdown (because scandisk is not running).
12. Minimize the duration of the guidance information
Open msdos.sys with a text editor and set bootdelay in [options] to 0.
13. Reduce unnecessary font files
Font files take up a lot of system resources, are slow to boot, and take up a lot of hard disk space. So try to reduce unnecessary font files. But if the wrong font file is deleted, it will make windows abnormal. Therefore, the following "stealing beams and columns" method can be used (the font file can be installed without occupying a lot of disk space): first open the font binder (such as f: \ zk), select all truetype font files, and use the right mouse button Drag them to the c: \ windows \ fonts binder, and select "Create Shortcut at Current Position" in the pop-up menu, so that you can create a shortcut to the font file under the system's font binder. When you need to use these font files, you only need to insert the font disc and remove it when not in use.
14. Delete redundant dll files
There are many dll files in the system subdirectory of the window operating system. These files may be shared by many files, but some do not have a file to use it, which means that these files are useless, in order not to occupy hard disk space and Increase the startup speed, you can delete it.
Fifteen, the "side door left" approach
If the system is suspended, the current system state will be saved after shutdown. After the next startup, the system will directly enter the desktop before the last shutdown. In this way, the startup time can reach 4-5 seconds at the fastest, but not all All of the motherboard bios are supported, and it is a little troublesome to set up.
Open the registry and expand to the hkey_local_machine \ software \ microsoft \ windows \ currentversion \ shareddlls subkey. There are many dll files on the right. If the data is 0, it can be determined that the dll file is not shared by the program. You can delete it.
WRITTEN BY UNDERCODER
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
bootmulti = 1
bootgui = 1
autoscan = 1
If you do not want to run the disk scan program after an abnormal shutdown, you can change atuoscan = 1 to autoscan = 0, so that the computer will start faster after an abnormal shutdown (because scandisk is not running).
12. Minimize the duration of the guidance information
Open msdos.sys with a text editor and set bootdelay in [options] to 0.
13. Reduce unnecessary font files
Font files take up a lot of system resources, are slow to boot, and take up a lot of hard disk space. So try to reduce unnecessary font files. But if the wrong font file is deleted, it will make windows abnormal. Therefore, the following "stealing beams and columns" method can be used (the font file can be installed without occupying a lot of disk space): first open the font binder (such as f: \ zk), select all truetype font files, and use the right mouse button Drag them to the c: \ windows \ fonts binder, and select "Create Shortcut at Current Position" in the pop-up menu, so that you can create a shortcut to the font file under the system's font binder. When you need to use these font files, you only need to insert the font disc and remove it when not in use.
14. Delete redundant dll files
There are many dll files in the system subdirectory of the window operating system. These files may be shared by many files, but some do not have a file to use it, which means that these files are useless, in order not to occupy hard disk space and Increase the startup speed, you can delete it.
Fifteen, the "side door left" approach
If the system is suspended, the current system state will be saved after shutdown. After the next startup, the system will directly enter the desktop before the last shutdown. In this way, the startup time can reach 4-5 seconds at the fastest, but not all All of the motherboard bios are supported, and it is a little troublesome to set up.
Open the registry and expand to the hkey_local_machine \ software \ microsoft \ windows \ currentversion \ shareddlls subkey. There are many dll files on the right. If the data is 0, it can be determined that the dll file is not shared by the program. You can delete it.
WRITTEN BY UNDERCODER
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Novices must master basic DOS commands BY UNDERCODE
The hacker group's article is to write some commands that novices must master. Let's take a look at the novices. After reading it, you will get something.
π¦Novices must master basic DOS commands BY UNDERCODE
The hacker group's article is to write some commands that novices must master. Let's take a look at the novices. After reading it, you will get something.
π¦ One, ping
It is a command used to check whether the network is smooth or the network connection speed. As an administrator or hacker living on the network, the ping command is the first DOS command that must be mastered. The principle it uses is this: machines on the network have uniquely determined IP addresses, and we give the target If the IP address sends a data packet, the other party will return a data packet of the same size. Based on the returned data packet, we can determine the existence of the target host, and can initially determine the operating system of the target host. Let's take a look at some of its commonly used operations. First look at the help, type: ping /? Enter, in the DOS window. The help screen shown. Here, we only need to grasp some basic useful parameters.
-t means to send data packets to the target IP without interruption until we force it to stop. Imagine if you use 100M broadband access and the target IP is a 56K kitten, then it will not take long for the target IP to be dropped because it cannot withstand so much data. Haha, an attack is so simple to achieve.
-l defines the size of the data packet sent, the default is 32 bytes, we can use it to define up to 65500 bytes. Combined with the -t parameter introduced above, there will be better results.
-n defines the number of data packets sent to the target IP, the default is 3 times. If the network speed is slow, 3 times is also a waste of time for us, because now our purpose is only to determine whether the target IP exists, then define it as one time.
Explain that if the -t parameter and the -n parameter are used together, the ping command is based on the parameter that is placed behind, such as "ping IP -t -n 3". Although the -t parameter is used, it is not always pinged. , But only ping 3 times. In addition, the ping command does not necessarily have to ping the IP, you can also directly ping the host domain name, so you can get the IP of the host.
Below we give an example to illustrate the specific usage.
Here time = 2 means that the time taken from sending a data packet to receiving a data packet is 2 seconds, from which you can judge the size of the network connection speed. The return value from TTL can preliminarily judge the operating system of the pinged host. The reason for saying "preliminary judgment" is because this value can be modified. Here TTL = 32 indicates that the operating system may be win98.
(Tips: If TTL = 128, it means that the target host may be Win2000; if TTL = 250, then the target host may be Unix)
As for using the ping command to quickly find LAN faults, you can quickly search for the fastest QQ server, and you can ping other people ... these are all on your own.
It is a command used to check whether the network is smooth or the network connection speed. As an administrator or hacker living on the network, the ping command is the first DOS command that must be mastered. The principle it uses is this: machines on the network have uniquely determined IP addresses, and we give the target If the IP address sends a data packet, the other party will return a data packet of the same size. Based on the returned data packet, we can determine the existence of the target host, and can initially determine the operating system of the target host. Let's take a look at some of its commonly used operations. First look at the help, type: ping /? Enter, in the DOS window. The help screen shown. Here, we only need to grasp some basic useful parameters.
-t means to send data packets to the target IP without interruption until we force it to stop. Imagine if you use 100M broadband access and the target IP is a 56K kitten, then it will not take long for the target IP to be dropped because it cannot withstand so much data. Haha, an attack is so simple to achieve.
-l defines the size of the data packet sent, the default is 32 bytes, we can use it to define up to 65500 bytes. Combined with the -t parameter introduced above, there will be better results.
-n defines the number of data packets sent to the target IP, the default is 3 times. If the network speed is slow, 3 times is also a waste of time for us, because now our purpose is only to determine whether the target IP exists, then define it as one time.
Explain that if the -t parameter and the -n parameter are used together, the ping command is based on the parameter that is placed behind, such as "ping IP -t -n 3". Although the -t parameter is used, it is not always pinged. , But only ping 3 times. In addition, the ping command does not necessarily have to ping the IP, you can also directly ping the host domain name, so you can get the IP of the host.
Below we give an example to illustrate the specific usage.
Here time = 2 means that the time taken from sending a data packet to receiving a data packet is 2 seconds, from which you can judge the size of the network connection speed. The return value from TTL can preliminarily judge the operating system of the pinged host. The reason for saying "preliminary judgment" is because this value can be modified. Here TTL = 32 indicates that the operating system may be win98.
(Tips: If TTL = 128, it means that the target host may be Win2000; if TTL = 250, then the target host may be Unix)
As for using the ping command to quickly find LAN faults, you can quickly search for the fastest QQ server, and you can ping other people ... these are all on your own.
π¦Second, nbtstat
This command uses NetBIOS over TCP / IP to display the protocol statistics and the current TCP / IP connection. Using this command you can get the NETBIOS information of the remote host, such as the user name, the workgroup to which it belongs, and the MAC address of the network card. Here we need to understand a few basic parameters.
-a Use this parameter, as long as you know the machine name of the remote host, you can get its NETBIOS information.
-A This parameter can also get the NETBIOS information of the remote host, but you need to know its IP.
-n List the NETBIOS information of the local machine.
When you get the other party's IP or machine name, you can use the nbtstat command to further obtain the other party's information, which increases the insurance factor of our invasion.
This command uses NetBIOS over TCP / IP to display the protocol statistics and the current TCP / IP connection. Using this command you can get the NETBIOS information of the remote host, such as the user name, the workgroup to which it belongs, and the MAC address of the network card. Here we need to understand a few basic parameters.
-a Use this parameter, as long as you know the machine name of the remote host, you can get its NETBIOS information.
-A This parameter can also get the NETBIOS information of the remote host, but you need to know its IP.
-n List the NETBIOS information of the local machine.
When you get the other party's IP or machine name, you can use the nbtstat command to further obtain the other party's information, which increases the insurance factor of our invasion.
π¦ Three, netstat
This is a command to check the network status, easy to operate and powerful.
-a View all the open ports of the local machine, you can effectively find and prevent Trojans, you can know the information about the services opened by the machine.
Here we can see that the local machine is open with FTP service, Telnet service, mail service, WEB service, etc. Usage: netstat -a IP.
-r List the current routing information, tell us the local machine's gateway, subnet mask and other information. Usage: netstat -r IP.
Four, tracert
Tracking routing information, use this command to find out all the paths through which data is transmitted from the local machine to the target host, which is very helpful for us to understand the network layout and structure.
This shows that the data is transferred from the local machine to the 192.168.0.1 machine without any transfer between them, indicating that the two machines are in the same LAN. Usage: tracert IP.
Five, net
This command is the most important one of the network commands. You must thoroughly understand the usage of each of its subcommands, because its function is too powerful. This is simply the best intrusion tool provided by Microsoft. First let's take a look at the subcommands it has, type net /? Enter
Here, we focus on several commonly used subcommands for intrusion.
net view
Use this command to view all shared resources of the remote host. The command format is net view \\ IP.
net use
Map a shared resource of a remote host as a local drive letter, and the graphical interface is easy to use, huh, huh. The command format is net use x: \\ IP \ sharename. The previous one indicates that the shared directory named magic of 192.168.0.5IP is mapped to the local Z disk. The following means establishing an IPC $ connection with 192.168.0.7 (net use $ "> \\ IP \ IPC $" password "/ user:" name "),
After the IPC $ connection is established, hehe, you can upload files: copy nc.exe $ "> \\ 192.168.0.7 \ admin $, which means that nc.exe in the local directory is transferred to the remote host The other DOS commands can be invaded.
net start
Use it to start services on remote hosts. After you establish a connection with a remote host, what if you find that its service has not been started, and you want to use this service? Just use this command to start it. Usage: net start servername, as shown in Figure 9, successfully started the telnet service.
net stop
What should I do if a service on the remote host is hindered after the invasion? Use this command to stop and it is ok, the usage is the same as net start.
This is a command to check the network status, easy to operate and powerful.
-a View all the open ports of the local machine, you can effectively find and prevent Trojans, you can know the information about the services opened by the machine.
Here we can see that the local machine is open with FTP service, Telnet service, mail service, WEB service, etc. Usage: netstat -a IP.
-r List the current routing information, tell us the local machine's gateway, subnet mask and other information. Usage: netstat -r IP.
Four, tracert
Tracking routing information, use this command to find out all the paths through which data is transmitted from the local machine to the target host, which is very helpful for us to understand the network layout and structure.
This shows that the data is transferred from the local machine to the 192.168.0.1 machine without any transfer between them, indicating that the two machines are in the same LAN. Usage: tracert IP.
Five, net
This command is the most important one of the network commands. You must thoroughly understand the usage of each of its subcommands, because its function is too powerful. This is simply the best intrusion tool provided by Microsoft. First let's take a look at the subcommands it has, type net /? Enter
Here, we focus on several commonly used subcommands for intrusion.
net view
Use this command to view all shared resources of the remote host. The command format is net view \\ IP.
net use
Map a shared resource of a remote host as a local drive letter, and the graphical interface is easy to use, huh, huh. The command format is net use x: \\ IP \ sharename. The previous one indicates that the shared directory named magic of 192.168.0.5IP is mapped to the local Z disk. The following means establishing an IPC $ connection with 192.168.0.7 (net use $ "> \\ IP \ IPC $" password "/ user:" name "),
After the IPC $ connection is established, hehe, you can upload files: copy nc.exe $ "> \\ 192.168.0.7 \ admin $, which means that nc.exe in the local directory is transferred to the remote host The other DOS commands can be invaded.
net start
Use it to start services on remote hosts. After you establish a connection with a remote host, what if you find that its service has not been started, and you want to use this service? Just use this command to start it. Usage: net start servername, as shown in Figure 9, successfully started the telnet service.
net stop
What should I do if a service on the remote host is hindered after the invasion? Use this command to stop and it is ok, the usage is the same as net start.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ View information related to accounts, including creating new accounts, deleting accounts, viewing specific accounts, activating accounts, disabling accounts, etc. This is very beneficial to our invasion, and most importantly, it provides a premise for us to clone the account. Type net user without parameters to view all users, including those that have been disabled. Explained separately below.
1, net user abcd 1234 / add, create a new account named abcd, password 1234, default is a member of the user group.
2. Net user abcd / del, delete the user whose user name is abcd.
3, net user abcd / active: no, disable the user whose user name is abcd.
4, net user abcd / active: yes, activate the user whose user name is abcd.
5, net user abcd, view the situation of the user whose user name is abcd
net localgroup
View all information related to user groups and perform related operations. Type net localgroup without parameters to list all current user groups. During the intrusion process, we generally use it to promote an account to the administrator group account, so that we can use this account to control the entire remote host. Usage: net localgroup groupname username / add.
Now we add the newly created user abcd to the administrator group. At this time, the abcd user is already a super administrator. Ha ha, you can use net user abcd to check his status. come out. But this is too obvious, the network administrator can leak the flaws at a glance, so this method can only deal with the rookie network administrator, but we still have to know. The current method is to use other tools and means to clone a super administrator that the network administrator cannot see. This is a later story.
net time
This command can view the current time of the remote host. If your goal is only to enter the remote host, then this command may not be used. But the simple invasion succeeded, is it just a look? We need to penetrate further. This requires that even the current time of the remote host needs to be known, because time and other means (to be described later) can be used to achieve the regular start of a command and program, laying a foundation for our further invasion. Usage: net time \\ IP.
Six, at
The purpose of this command is to schedule a specific command and procedure to be executed on a specific date or time (know that net time is important?). When we know the current time of the remote host, we can use this command to let it execute a program and command at a later time (such as 2 minutes later). Usage: at time command \\ computer.
It means that at 6:55, let the computer named a-01 start the telnet service (here net start telnet is the command to start the telnet service).
Seven, ftp
Everyone should be familiar with this command, right? There are many ftp hosts open on the network, and a large part of them are anonymous, which means anyone can log in. Now if you scan to a host with open ftp service (usually a machine with port 21 opened), what if you still don't use the ftp command? The basic method of using ftp command is given below.
π¦First type ftp in the command line, the ftp prompt appears, at this time you can type "help" to view the help (any DOS command can use this method to view its help).
You may see, how to use so many commands? In fact, it is not so much used, a few basics are enough.
The first is the login process, which is going to use open. Enter "open host IP ftp port" directly at the ftp prompt and press Enter. The default port is 21 by default and you can not write. The next step is to enter a valid user name and password to log in. Here we introduce anonymous ftp as an example.
The username and password are both ftp, and the password is not displayed. When prompted **** logged in, it means the login is successful. Because it is an anonymous login, the user appears as Anonymous.
Next, we will introduce the use of specific commands.
π¦ View information related to accounts, including creating new accounts, deleting accounts, viewing specific accounts, activating accounts, disabling accounts, etc. This is very beneficial to our invasion, and most importantly, it provides a premise for us to clone the account. Type net user without parameters to view all users, including those that have been disabled. Explained separately below.
1, net user abcd 1234 / add, create a new account named abcd, password 1234, default is a member of the user group.
2. Net user abcd / del, delete the user whose user name is abcd.
3, net user abcd / active: no, disable the user whose user name is abcd.
4, net user abcd / active: yes, activate the user whose user name is abcd.
5, net user abcd, view the situation of the user whose user name is abcd
net localgroup
View all information related to user groups and perform related operations. Type net localgroup without parameters to list all current user groups. During the intrusion process, we generally use it to promote an account to the administrator group account, so that we can use this account to control the entire remote host. Usage: net localgroup groupname username / add.
Now we add the newly created user abcd to the administrator group. At this time, the abcd user is already a super administrator. Ha ha, you can use net user abcd to check his status. come out. But this is too obvious, the network administrator can leak the flaws at a glance, so this method can only deal with the rookie network administrator, but we still have to know. The current method is to use other tools and means to clone a super administrator that the network administrator cannot see. This is a later story.
net time
This command can view the current time of the remote host. If your goal is only to enter the remote host, then this command may not be used. But the simple invasion succeeded, is it just a look? We need to penetrate further. This requires that even the current time of the remote host needs to be known, because time and other means (to be described later) can be used to achieve the regular start of a command and program, laying a foundation for our further invasion. Usage: net time \\ IP.
Six, at
The purpose of this command is to schedule a specific command and procedure to be executed on a specific date or time (know that net time is important?). When we know the current time of the remote host, we can use this command to let it execute a program and command at a later time (such as 2 minutes later). Usage: at time command \\ computer.
It means that at 6:55, let the computer named a-01 start the telnet service (here net start telnet is the command to start the telnet service).
Seven, ftp
Everyone should be familiar with this command, right? There are many ftp hosts open on the network, and a large part of them are anonymous, which means anyone can log in. Now if you scan to a host with open ftp service (usually a machine with port 21 opened), what if you still don't use the ftp command? The basic method of using ftp command is given below.
π¦First type ftp in the command line, the ftp prompt appears, at this time you can type "help" to view the help (any DOS command can use this method to view its help).
You may see, how to use so many commands? In fact, it is not so much used, a few basics are enough.
The first is the login process, which is going to use open. Enter "open host IP ftp port" directly at the ftp prompt and press Enter. The default port is 21 by default and you can not write. The next step is to enter a valid user name and password to log in. Here we introduce anonymous ftp as an example.
The username and password are both ftp, and the password is not displayed. When prompted **** logged in, it means the login is successful. Because it is an anonymous login, the user appears as Anonymous.
Next, we will introduce the use of specific commands.
dir is the same as the DOS command. It is used to view the files on the server. Just hit dir and press Enter to see the files on the ftp server.
cd into a folder.
get Download the file to the local machine.
put upload files to a remote server. It depends on whether the remote ftp server gives you write permission. If you can, huh, huh, not much to say about how to use it. Let's play freely.
delete Delete files on the remote ftp server. This must also ensure that you have write permissions.
bye Quits the current connection.
quit Ibid.
Eight, telnet
Powerful remote login command, almost all intruders like to use it, after many trials. why? It is simple to operate, just like using your own machine, as long as you are familiar with DOS commands, after successfully connecting to the remote machine as administrator, you can use it to do everything you want to do. Here's how to use it, first type telnet to enter, then type help to view its help information.
Then type open IP at the prompt and press Enter. At this time, a login window appears, allowing you to enter a valid user name and password. Any password entered here will not be displayed.
When the user name and password are entered correctly, the telnet connection is successfully established. At this time, you have the same permissions as the user on the remote host. You can use the DOS command to achieve what you want to do. Here I use the super administrator rights to log in.
So far, the introduction of network DOS commands has come to an end. The purpose of the introduction here is just to give the rookie network administrator an impression and let him know the importance of familiarity and mastering the network DOS commands. In fact, the DOS commands related to the network are far more than that, here is just a trick, hoping to help the majority of rookie network administrators. Learning DOS is a great help for being a good network administrator, and is particularly proficient in some network DOS commands.
In addition, everyone should be clear that anyone who wants to enter the system must have a valid user name and password (the input method vulnerability is almost extinct), even if you only have a small permission to the account, you can use it To achieve the final goal. Therefore, to eliminate blank passwords and add a strong password to your account is the best way to prevent weak password intrusion.
Cultivating good security awareness is the most important.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
cd into a folder.
get Download the file to the local machine.
put upload files to a remote server. It depends on whether the remote ftp server gives you write permission. If you can, huh, huh, not much to say about how to use it. Let's play freely.
delete Delete files on the remote ftp server. This must also ensure that you have write permissions.
bye Quits the current connection.
quit Ibid.
Eight, telnet
Powerful remote login command, almost all intruders like to use it, after many trials. why? It is simple to operate, just like using your own machine, as long as you are familiar with DOS commands, after successfully connecting to the remote machine as administrator, you can use it to do everything you want to do. Here's how to use it, first type telnet to enter, then type help to view its help information.
Then type open IP at the prompt and press Enter. At this time, a login window appears, allowing you to enter a valid user name and password. Any password entered here will not be displayed.
When the user name and password are entered correctly, the telnet connection is successfully established. At this time, you have the same permissions as the user on the remote host. You can use the DOS command to achieve what you want to do. Here I use the super administrator rights to log in.
So far, the introduction of network DOS commands has come to an end. The purpose of the introduction here is just to give the rookie network administrator an impression and let him know the importance of familiarity and mastering the network DOS commands. In fact, the DOS commands related to the network are far more than that, here is just a trick, hoping to help the majority of rookie network administrators. Learning DOS is a great help for being a good network administrator, and is particularly proficient in some network DOS commands.
In addition, everyone should be clear that anyone who wants to enter the system must have a valid user name and password (the input method vulnerability is almost extinct), even if you only have a small permission to the account, you can use it To achieve the final goal. Therefore, to eliminate blank passwords and add a strong password to your account is the best way to prevent weak password intrusion.
Cultivating good security awareness is the most important.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 110 K PRE COMBO PROXIES- Gaming, Banking, Shopping, Try Other Sites too. User:Pass @UNDERCODETESTING
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Reasons and treatment methods of computer "freezing" for no reason by undercode
t.me/UndercodeTesting
1. "Death" caused by improper BIOS settings
Each type of hardware has its own default or specific working environment, and it cannot be set beyond its working authority, otherwise it will crash because the hardware fails to meet this requirement. For example: a memory module can only support DDR 266, but it is set to DDR 333 in the BIOS settings. In this way, it will crash because the hardware cannot meet the requirements. If it can be normal in a short time The electronic components will gradually age with the use of time, and the quality problems will also cause the computer to "freeze" frequently.
2. "Crash" caused by hardware or software conflicts
Computer crashes caused by hardware conflicts are mainly caused by conflicts caused by interrupt settings. When hardware conflicts occur, although the hardware can barely coexist in the system, they cannot work at the same time. For example, when you can access the Internet, you cannot listen. Music and so on. Over time, interrupted conflicts will appear frequently, and eventually the system will be overwhelmed and cause "crash".
The same is true of software. As more and more software is developed by different software companies, and these softwares cannot be fully familiar with and cooperate with each other during the development process, therefore, when running these software together, it is easy for everyone to happen At the same time, the same DLL or the same physical address is called, so a conflict occurs. The computer system at this time did not know which request should be processed first, which caused a system disorder and caused the computer to "halt".
3. "Crash" caused by hardware quality and failure
At present, some small-brand computer hardware products are often put on the market without a qualified inspection procedure. Among them, many hardware products of unqualified quality are very concealed under the hood of intact computer hardware, which is not easy for ordinary people to see. of. As far as these hardware products are concerned, the reason why computers often "freeze" has a very direct relationship with them. In addition, some hardware failures are caused by the use of too long. In general, the life of components such as memory modules, CPUs, and hard drives is difficult to guarantee after more than three years, which can also cause many hidden "death" problems.
4. "Death" caused by exhaustion of computer system source
When the computer system executes the wrong program or code, it will form a "dead" cycle inside the system. The originally very limited system resources will be invested in endless repetitive operations. When the operation ends, it will be because of the computer. Too large will exhaust resources and cause a "crash". Another point is that a large number of programs are running in the computer operating system, making the system's memory resources insufficient and causing "death".
5. "Death" caused by damage to system files
System files mainly refer to the files that are critically supported when the computer system is started or run. If they are missing, the entire computer system will not function properly. Of course, "death" is inevitable. There are many reasons for the destruction of system files, and the invasion of viruses and hacker programs is the main reason. In addition, due to wrong operation, novice users delete the system files will also cause such consequences.
6. "Crash" caused by poor heat dissipation inside the computer
Because the main component of the electronic components inside the computer is silicon (this is an element whose working state is greatly affected by temperature). When the computer is working, the temperature of electronic components will increase accordingly, and the phenomenon of electron migration will occur on the surface, thereby changing the current working state, causing the computer to suddenly "freeze" during work.
π¦ Reasons and treatment methods of computer "freezing" for no reason by undercode
t.me/UndercodeTesting
1. "Death" caused by improper BIOS settings
Each type of hardware has its own default or specific working environment, and it cannot be set beyond its working authority, otherwise it will crash because the hardware fails to meet this requirement. For example: a memory module can only support DDR 266, but it is set to DDR 333 in the BIOS settings. In this way, it will crash because the hardware cannot meet the requirements. If it can be normal in a short time The electronic components will gradually age with the use of time, and the quality problems will also cause the computer to "freeze" frequently.
2. "Crash" caused by hardware or software conflicts
Computer crashes caused by hardware conflicts are mainly caused by conflicts caused by interrupt settings. When hardware conflicts occur, although the hardware can barely coexist in the system, they cannot work at the same time. For example, when you can access the Internet, you cannot listen. Music and so on. Over time, interrupted conflicts will appear frequently, and eventually the system will be overwhelmed and cause "crash".
The same is true of software. As more and more software is developed by different software companies, and these softwares cannot be fully familiar with and cooperate with each other during the development process, therefore, when running these software together, it is easy for everyone to happen At the same time, the same DLL or the same physical address is called, so a conflict occurs. The computer system at this time did not know which request should be processed first, which caused a system disorder and caused the computer to "halt".
3. "Crash" caused by hardware quality and failure
At present, some small-brand computer hardware products are often put on the market without a qualified inspection procedure. Among them, many hardware products of unqualified quality are very concealed under the hood of intact computer hardware, which is not easy for ordinary people to see. of. As far as these hardware products are concerned, the reason why computers often "freeze" has a very direct relationship with them. In addition, some hardware failures are caused by the use of too long. In general, the life of components such as memory modules, CPUs, and hard drives is difficult to guarantee after more than three years, which can also cause many hidden "death" problems.
4. "Death" caused by exhaustion of computer system source
When the computer system executes the wrong program or code, it will form a "dead" cycle inside the system. The originally very limited system resources will be invested in endless repetitive operations. When the operation ends, it will be because of the computer. Too large will exhaust resources and cause a "crash". Another point is that a large number of programs are running in the computer operating system, making the system's memory resources insufficient and causing "death".
5. "Death" caused by damage to system files
System files mainly refer to the files that are critically supported when the computer system is started or run. If they are missing, the entire computer system will not function properly. Of course, "death" is inevitable. There are many reasons for the destruction of system files, and the invasion of viruses and hacker programs is the main reason. In addition, due to wrong operation, novice users delete the system files will also cause such consequences.
6. "Crash" caused by poor heat dissipation inside the computer
Because the main component of the electronic components inside the computer is silicon (this is an element whose working state is greatly affected by temperature). When the computer is working, the temperature of electronic components will increase accordingly, and the phenomenon of electron migration will occur on the surface, thereby changing the current working state, causing the computer to suddenly "freeze" during work.
7. "Crash" caused by novice user's wrong operation
For novice users, some wrong operations in the process of using the computer will also cause the system to "freeze". For example, hot-plugging hardware, shaking the computer during operation, deleting files at random, or installing software that exceeds the basic hardware setting standards, etc. can cause a "death".
8. "Crash" caused by other aspects
In addition to the reasons described by the author above, there are many strange reasons that may cause the system to "freeze". For example, the voltage fluctuation is too large, the CD-ROM reading ability of the optical drive is reduced, the quality of the floppy disk is poor, and the virus or hacker program is damaged. In short, there are many reasons for the computer crash.
As can be seen from the above points, computer "death" is not a good thing for the average user, but it is not inevitable. As long as the user operates according to the normal computer, the probability of "death" will be reduced to a minimum. Below, I will introduce some of the experiences I have summarized on the reasons for the computer crash.
Second, the prevention of computer "crash"
1. Ensure correct Bios settings. The settings in Bios must be appropriate. Incorrect Bios settings can cause you to freeze when running Windows.
2. Check the contact of computer accessories frequently. Running with poor card contact will cause the system to crash, so when replacing computer accessories, be sure to allow the card to fully contact the motherboard.
3. Clean the case regularly. Too much dust will cause poor contact between the boards and cause the system to freeze during operation. Therefore, the chassis should be cleaned at any time, and do not allow too much dust to accumulate in the chassis.
4. Insist on serious virus detection. Do not use CDs or floppy disks of unknown origin easily, and check attachments in emails with antivirus software before opening.
5. Shut down in the correct order of operations. Do not turn off the power before the application software ends normally, otherwise system files will be damaged or lost, causing crashes during startup or operation.
6. Avoid multitasking at the same time. Do not run other software while performing disk defragmentation or checking the hard disk with anti-virus software, otherwise it will cause a crash.
7. Don't be overly innovative. Drivers of various hardware do not have to be updated at any time, because the drivers that were developed often have bugs in them, which will cause damage to the system and cause system crashes. The latest ones are not necessarily the best.
8. When uninstalling the software, use the built-in anti-installation program or the installation / uninstallation method in Windows. Do not delete the program folder directly, because some files may be shared by other programs. Once these shared files are deleted, the application software will be unusable. And the crash.
9. When setting up a hardware device, it is best to check for the reserved interrupt (IRQ). Do not allow other devices to use the interrupt number to avoid interrupt conflicts and system crashes.
10. When surfing the Internet, do not open too many browser windows, otherwise it will cause insufficient system resources and cause the system to freeze.
11. If your machine's memory is not very large, don't run programs that take up more memory, such as Photoshop, otherwise it will easily crash when running.
12. For system files or important files, it is best to use implicit attributes, so as not to delete these files due to wrong operations, causing system crashes.
13. When modifying the master boot record of the hard disk, it is best to save the original record first to prevent the original boot record from being unable to be restored due to the modification failure.
For novice users, some wrong operations in the process of using the computer will also cause the system to "freeze". For example, hot-plugging hardware, shaking the computer during operation, deleting files at random, or installing software that exceeds the basic hardware setting standards, etc. can cause a "death".
8. "Crash" caused by other aspects
In addition to the reasons described by the author above, there are many strange reasons that may cause the system to "freeze". For example, the voltage fluctuation is too large, the CD-ROM reading ability of the optical drive is reduced, the quality of the floppy disk is poor, and the virus or hacker program is damaged. In short, there are many reasons for the computer crash.
As can be seen from the above points, computer "death" is not a good thing for the average user, but it is not inevitable. As long as the user operates according to the normal computer, the probability of "death" will be reduced to a minimum. Below, I will introduce some of the experiences I have summarized on the reasons for the computer crash.
Second, the prevention of computer "crash"
1. Ensure correct Bios settings. The settings in Bios must be appropriate. Incorrect Bios settings can cause you to freeze when running Windows.
2. Check the contact of computer accessories frequently. Running with poor card contact will cause the system to crash, so when replacing computer accessories, be sure to allow the card to fully contact the motherboard.
3. Clean the case regularly. Too much dust will cause poor contact between the boards and cause the system to freeze during operation. Therefore, the chassis should be cleaned at any time, and do not allow too much dust to accumulate in the chassis.
4. Insist on serious virus detection. Do not use CDs or floppy disks of unknown origin easily, and check attachments in emails with antivirus software before opening.
5. Shut down in the correct order of operations. Do not turn off the power before the application software ends normally, otherwise system files will be damaged or lost, causing crashes during startup or operation.
6. Avoid multitasking at the same time. Do not run other software while performing disk defragmentation or checking the hard disk with anti-virus software, otherwise it will cause a crash.
7. Don't be overly innovative. Drivers of various hardware do not have to be updated at any time, because the drivers that were developed often have bugs in them, which will cause damage to the system and cause system crashes. The latest ones are not necessarily the best.
8. When uninstalling the software, use the built-in anti-installation program or the installation / uninstallation method in Windows. Do not delete the program folder directly, because some files may be shared by other programs. Once these shared files are deleted, the application software will be unusable. And the crash.
9. When setting up a hardware device, it is best to check for the reserved interrupt (IRQ). Do not allow other devices to use the interrupt number to avoid interrupt conflicts and system crashes.
10. When surfing the Internet, do not open too many browser windows, otherwise it will cause insufficient system resources and cause the system to freeze.
11. If your machine's memory is not very large, don't run programs that take up more memory, such as Photoshop, otherwise it will easily crash when running.
12. For system files or important files, it is best to use implicit attributes, so as not to delete these files due to wrong operations, causing system crashes.
13. When modifying the master boot record of the hard disk, it is best to save the original record first to prevent the original boot record from being unable to be restored due to the modification failure.
14. CPU, graphics card and other accessories are generally not overclocked. If you do need to overclock, pay attention to the temperature of the card after overclocking. CPU and graphics card will automatically restart or crash if they work under abnormal frequency and temperature for a long time. Motherboard.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β