Wednesday, January 19, 2011

Different Ways to Lock Windows XP

 
These methods apply to both Windows XP Home and Windows XP Pro.
There are several ways to lock your Windows XP computer, but all of them use the same command line. The method you choose is a matter of personal preference.
  1. via the keyboard
    The easiest way to lock Windows XP is by simply pressing the Windows logo key and the letter L (for Lock) on a Microsoft Natural Keyboard or any other compatible keyboard that includes the Window key. Doing so will pop up the Unlock Computer Password box.
  2. via a Shortcut.
    If you don't have a keyboard with a Window key or simply don't like the keyboard method, then here's how you can make a desktop shortcut to lock your computer.

    Right
    click an empty area of your desktop, choose New/Shortcut and enter this line as the command line:

               rundll32.exe user32.dll, LockWorkStation

    Click Next. Name the shortcut whatever you prefer and click Finish. That's it.

    If you'd like to change the icon, just right click the shortcut and go to Properties/Shortcut/Change Icon.
  3. via the command line
    The above command line can also be used at a DOS prompt to lock your computer. One simple way you can do it would be by clicking Start/Run, typing CMD and then entering the command and pressing Enter.
via a bat file
This is similar to a Windows shortcut method. But it's a DOS version. If you've never 



  1. created a bat (batch) file, but would like to try this method, simply open a new text file (such as with Notepad) and type the following commands:

              @echo off
              rundll32.exe user32.dll, LockWorkStation
              cls
     
    Save the file with a .bat extension, such as Lock.bat, and you're done. Double click to make the file run.
Those are the basic methods to lock XP, but there are some other relating factors of which you should be aware.
Password
It should go without saying that if you don't use a password to log on to your computer, then anyone can access your computer and unlock it. If you want to use the lock feature, then set a password by going to User Accounts in the Control Panel and then click Create Password.
Fast User Switching
Fast User Switching allows multiple login sessions at the same time. Whether you have this feature enabled or disabled will make a big difference in how your locked computer can be accessed and on the behavior of your shortcuts when executed.
If enabled, executing any of the above locking methods will bring up the Welcome screen and other users will be able to log on to the computer, as is the norm for Fast User Switching. So, you really don't get much security at all this way, if your intention is to lock your machine. With Fast User Switching, only your profile is locked, not the ability for other users to log into your system. Any other user can just log on to your computer and use it.
If Fast User Switching is disabled, you will have to enter a password to unlock the computer. Double clicking your shortcut will bring up the Unlock Computer password dialog box. This is the same lock method that Windows NT and 2000 uses.

If you're not sure whether or not you have Fast User Switching enabled or disabled, go to User Accounts in the Control Panel and click the Change the way users log on or off tab. There you will see your status for Fast User Switching.


Welcome Screen
Whether the Welcome screen is enabled or disabled also has an effect on the way your computer can be locked.
If the Welcome screen is enabled, you can also lock your computer in Task Manager (Ctrl+Alt+Delete) by clicking the Lock Computer option in the Shutdown menu list. This option will only appear if the Welcome screen is enabled—without Fast User Switching being enabled.
Note! In order to use Fast User Switching, the Welcome screen must be enabled. You cannot select Fast User Switching if the Welcome screen option is unchecked.
If the Welcome screen is disabled, you can lock the computer by pressing Ctrl+Alt+Delete and then clicking the Lock Computer tab in the Windows Security dialog box that comes up.
For more information on Windows security, check out my ABC article, "Windows File and Folder Security"
http://personal-computer-tutor.com/abc2/v14/vic14.htm

Amitabh Kumar (9811006683,9015123133)

An A-Z Index of the Windows NT/XP command line

 
ADDUSERS Add or list users to/from a CSV file
ARP      Address Resolution Protocol
ASSOC    Change file extension associations
ASSOCIAT One step file association
AT       Schedule a command to run at a later time
ATTRIB   Change file attributes
BOOTCFG  Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info
CACLS    Change file permissions
CALL     Call one batch program from another
CD       Change Directory - move to a specific Folder
CHANGE   Change Terminal Server Session properties
CHKDSK   Check Disk - check and repair disk problems
CHKNTFS  Check the NTFS file system
CHOICE   Accept keyboard input to a batch file
CIPHER   Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP     Copy STDIN to the Windows clipboard.
CLS      Clear the screen
CLUSTER  Windows Clustering
CMD      Start a new CMD shell
COLOR    Change colors of the CMD window
COMP     Compare the contents of two files or sets of files
COMPACT  Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT  Connect or disconnect a Printer
CONVERT  Convert a FAT drive to NTFS.
COPY     Copy one or more files to another location
CSVDE    Import or Export Active Directory data 
DATE     Display or set the date
Dcomcnfg DCOM Configuration Utility
DEFRAG   Defragment hard drive
DEL      Delete one or more files
DELPROF  Delete NT user profiles
DELTREE  Delete a folder and all subfolders
DevCon   Device Manager Command Line Utility 
DIR      Display a list of files and folders
DIRUSE   Display disk usage
DISKCOMP Compare the contents of two floppy disks 
DISKCOPY Copy the contents of one floppy disk to another
DNSSTAT  DNS Statistics
DOSKEY   Edit command line, recall commands, and create macros
DSADD    Add user (computer, group..) to active directory
DSQUERY  List items in active directory
DSMOD    Modify user (computer, group..) in active directory
ECHO     Display message on screen
ENDLOCAL End localisation of environment changes in a batch file
ERASE    Delete one or more files
EXIT     Quit the CMD shell
EXPAND   Uncompress files
EXTRACT  Uncompress CAB files
FC       Compare two files
FDISK    Disk Format and partition
FIND     Search for a text string in a file
FINDSTR  Search for strings in files
FOR /F   Loop command: against a set of files
FOR /F   Loop command: against the results of another command
FOR      Loop command: all options Files, Directory, List
FORFILES Batch process multiple files
FORMAT   Format a disk
FREEDISK Check free disk space (in bytes)
FSUTIL   File and Volume utilities
FTP      File Transfer Protocol
FTYPE    Display or modify file types used in file extension associations
GLOBAL   Display membership of global groups
GOTO     Direct a batch program to jump to a labelled line
HELP     Online Help
HFNETCHK Network Security Hotfix Checker 
IF       Conditionally perform a command
IFMEMBER Is the current user in an NT Workgroup
IPCONFIG Configure IP
KILL     Remove a program from memory
LABEL    Edit a disk label
LOCAL    Display membership of local groups
LOGEVENT Write text to the NT event viewer. 
LOGOFF   Log a user off
LOGTIME  Log the date and time in a file
MAPISEND Send email from the command line
MEM      Display memory usage
MD       Create new folders
MODE     Configure a system device
MORE     Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE     Move files from one folder to another
MOVEUSER Move a user from one domain to another
MSG      Send a message
MSIEXEC  Microsoft Windows Installer
MSINFO   Windows NT diagnostics
MSTSC    Terminal Server Connection (Remote Desktop Protocol)
MUNGE    Find and Replace text within file(s)
MV       Copy in-use files 
NET      Manage network resources
NETDOM   Domain Manager
NETSH    Configure network protocols
NETSVC   Command-line Service Controller
NBTSTAT  Display networking statistics (NetBIOS over TCP/IP)
NETSTAT  Display networking statistics (TCP/IP)
NOW      Display the current Date and Time 
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights 
PATH     Display or set a search path for executable files
PATHPING Trace route plus network latency and packet loss
PAUSE    Suspend processing of a batch file and display a message
PERMS    Show permissions for a user
PERFMON  Performance Monitor
PING     Test a network connection
POPD     Restore the previous value of the current directory saved by PUSHD
PORTQRY  Display the status of ports and services
PRINT    Print a text file
PRNCNFG  Display, configure or rename a printer 
PRNMNGR  Add, delete, list printers set the default printer
PROMPT   Change the command prompt
PsExec     Execute process remotely
PsFile     Show files opened remotely
PsGetSid   Display the SID of a computer or a user
PsInfo     List information about a system
PsKill     Kill processes by name or process ID
PsList     List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource sharing)
PsLogList  Event log records
PsPasswd   Change account password
PsService  View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend  Suspend processes
PUSHD    Save and then change the current directory
QGREP    Search file(s) for lines that match a given pattern.
RASDIAL  Manage RAS connections
RASPHONE Manage RAS connections
RECOVER  Recover a damaged file from a defective disk.
REG      Read, Set or Delete registry keys and values
REGEDIT  Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI   Change Registry Permissions
REM      Record comments (remarks) in a batch file
REN      Rename a file or files.
REPLACE  Replace or update one file with another
RD       Delete folder(s)
RDISK    Create a Recovery Disk
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE    Manipulate network routing tables
RUNAS    Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)
SC       Service Control
SCHTASKS Create or Edit Scheduled Tasks 
SCLIST   Display NT Services
ScriptIt Control GUI applications
SET      Display, set, or remove environment variables
SETLOCAL Control the visibility of environment variables 
SETX     Set environment variables permanently 
SHARE    List or edit a file share or print share
SHIFT    Shift the position of replaceable parameters in a batch file
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the NT Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
SLEEP    Wait for x seconds
SOON     Schedule a command to run in the near future
SORT     Sort input
START    Start a separate window to run a specified program or command
SU       Switch User
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST    Associate a path with a drive letter
SYSTEMINFO List system configuration 
TASKLIST List running applications and services
TIME     Display or set the system time
TIMEOUT  Delay processing of a batch file
TITLE    Set the window title for a CMD.EXE session
TOUCH    Change file timestamps    
TRACERT  Trace route to a remote host
TREE     Graphical display of folder structure
TYPE     Display the contents of a text file
 
USRSTAT  List domain usernames and last login
 
VER      Display version information
VERIFY   Verify that files have been saved
VOL      Display a disk label
WHERE    Locate and display files in a directory tree
WHOAMI   Output the current UserName and domain
WINDIFF  Compare the contents of two files or sets of files
WINMSD   Windows system diagnostics
WINMSDP  Windows system diagnostics II
WMIC     WMI Commands
XCACLS   Change file permissions
XCOPY    Copy files and folders
Microsoft Help pages: Windows XP - 2003 Server
Links to other Sites, books etc...
Amitabh Kumar(9015123133,9811006683)

Tuesday, January 18, 2011

Little more detail.

Bit: A Bit is the smallest unit of data that a computer uses. It can be used to represent two states of information, such as Yes or No.

Byte: A Byte is equal to 8 Bits. A Byte can represent 256 states of information, for example, numbers or a combination of numbers and letters. 1 Byte could be equal to one character. 10 Bytes could be equal to a word. 100 Bytes would equal an average sentence.

Kilobyte: A Kilobyte is approximately 1,000 Bytes, actually 1,024 Bytes depending on which definition is used. 1 Kilobyte would be equal to this paragraph you are reading, whereas 100 Kilobytes would equal an entire page.

Megabyte: A Megabyte is approximately 1,000 Kilobytes. In the early days of computing, a Megabyte was considered to be a large amount of data. These days with a 500 Gigabyte hard drive on a computer being common, a Megabyte doesn't seem like much anymore. One of those old 3-1/2 inch floppy disks can hold 1.44 Megabytes or the equivalent of a small book. 100 Megabytes might hold a couple volumes of Encyclopedias. 600 Megabytes is about the amount of data that will fit on a CD-ROM disk.

Gigabyte: A Gigabyte is approximately 1,000 Megabytes. A Gigabyte is still a very common term used these days when referring to disk space or drive storage. 1 Gigabyte of data is almost twice the amount of data that a CD-ROM can hold. But it's about one thousand times the capacity of a 3-1/2 floppy disk. 1 Gigabyte could hold the contents of about 10 yards of books on a shelf. 100 Gigabytes could hold the entire library floor of academic journals.

Terabyte: A Terabyte is approximately one trillion bytes, or 1,000 Gigabytes. There was a time that I never thought I would see a 1 Terabyte hard drive, now one and two terabyte drives are the normal specs for many new computers. To put it in some perspective, a Terabyte could hold about 3.6 million 300 Kilobyte images or maybe about 300 hours of good quality video. A Terabyte could hold 1,000 copies of the Encyclopedia Britannica. Ten Terabytes could hold the printed collection of the Library of Congress. That's a lot of data.

Petabyte: A Petabyte is approximately 1,000 Terabytes or one million Gigabytes. It's hard to visualize what a Petabyte could hold. 1 Petabyte could hold approximately 20 million 4-door filing cabinets full of text. It could hold 500 billion pages of standard printed text. It would take about 500 million floppy disks to store the same amount of data.

Disk Storage

· 1 Bit = Binary Digit
· 8 Bits = 1 Byte
· 1000 Bytes = 1 Kilobyte
· 1000 Kilobytes = 1 Megabyte
· 1000 Megabytes = 1 Gigabyte
· 1000 Gigabytes = 1 Terabyte
· 1000 Terabytes = 1 Petabyte
· 1000 Petabytes = 1 Exabyte
· 1000 Exabytes = 1 Zettabyte
· 1000 Zettabytes = 1 Yottabyte
· 1000 Yottabytes = 1 Brontobyte
· 1000 Brontobytes = 1 Geopbyte

This is based on the IBM Dictionary of computing method to describe disk storage - the simplest.


Processor or Virtual Storage

Processor or Virtual Storage
· 1 Bit = Binary Digit
· 8 Bits = 1 Byte
· 1024 Bytes = 1 Kilobyte
· 1024 Kilobytes = 1 Megabyte
· 1024 Megabytes = 1 Gigabyte
· 1024 Gigabytes = 1 Terabyte
· 1024 Terabytes = 1 Petabyte
· 1024 Petabytes = 1 Exabyte
· 1024 Exabytes = 1 Zettabyte
· 1024 Zettabytes = 1 Yottabyte
· 1024 Yottabytes = 1 Brontobyte
· 1024 Brontobytes = 1 Geopbyte

Processor or Virtual Storage

Processor or Virtual Storage
· 1 Bit = Binary Digit
· 8 Bits = 1 Byte
· 1024 Bytes = 1 Kilobyte
· 1024 Kilobytes = 1 Megabyte
· 1024 Megabytes = 1 Gigabyte
· 1024 Gigabytes = 1 Terabyte
· 1024 Terabytes = 1 Petabyte
· 1024 Petabytes = 1 Exabyte
· 1024 Exabytes = 1 Zettabyte
· 1024 Zettabytes = 1 Yottabyte
· 1024 Yottabytes = 1 Brontobyte
· 1024 Brontobytes = 1 Geopbyte

Processor or Virtual Storage

Basic info: Megabytes, Gigabytes, Terabytes

Basic info: Megabytes, Gigabytes, Terabytes

These terms are usually used in the world of computing to describe disk space, or data storage space, and system memory. For instance, just a few years ago we were describing hard drive space using the term Megabytes. Today, Gigabytes is the most common term being used to describe the size of a hard drive. In the not so distant future, Terabyte will be a common term. But what are they? This is where it gets quite confusing because there are at least three accepted definitions of each term.

According to the IBM Dictionary of computing, when used to describe disk storage capacity, a megabyte is 1,000,000 bytes in decimal notation. But when the term megabyte is used for real and virtual storage, and channel volume, 2 to the 20th power or 1,048,576 bytes is the appropriate notation. According to the Microsoft Press Computer Dictionary, a megabyte means either 1,000,000 bytes or 1,048,576 bytes. According to Eric S. Raymond in The New Hacker's Dictionary, a megabyte is always 1,048,576 bytes on the argument that bytes should naturally be computed in powers of two. So which definition do most people conform to?

When referring to a megabyte for disk storage, the hard drive manufacturers use the standard that a megabyte is 1,000,000 bytes. This means that when you buy an 80 Gigabyte Hard drive you will get a total of 80,000,000,000 bytes of available storage. This is where it gets confusing because Windows uses the 1,048,576 byte rule so when you look at the Windows drive properties an 80 Gigabyte drive will report a capacity of 74.56 Gigabytes and a 250 Gigabyte drive will only yield 232 Gigabytes of available storage space. Anybody confused yet? With three accepted definitions, there will always be some confusion so I will try to simplify the definitions a little.

The 1000 can be replaced with 1024 and still be correct using the other acceptable standards. Both of these standards are correct depending on what type of storage you are referring.