Category: Computer

  • EaseUS ToDo Backup Free 3.5 Review

    Seeing that many of you mentioned about EaseUS ToDo Backup Free on the backup strategy that I used with Acronis True Image Home, I’ve decided to test it out. In fact I’ve written a review on EaseUS ToDo Backup Free when they were at their first version 2 years ago. Looking back at the graphical user interface of EaseUS ToDo v1 and they looked so outdated. At least it didn’t them very long to switch to a new user interface after v1.

    If you haven’t heard of EaseUS ToDo Backup and don’t know what it does, it is a software that backs up entire system state including the operating system and installed applications and save it to an image file. The image file can be saved to a CD, DVD, external hard drive, a different partition, or even a network drive and be used to restore back to the state when the image was created. It works like Norton Ghost and Acronis True Image.

    EaseUS Todo Backup Free 3.5 review
    EaseUS ToDo Backup Free 3.5 User Interface


    I always think that the emergency disk or bootable rescue media is an important feature, more important than EaseUS ToDo’s PreOS, Acronis Startup Recovery Manager or Norton Ghost’s LightsOut because if Windows cannot be booted up or the MBR has been erased, you can use the rescue media as a final resort to boot up the dead computer and perform the restoration. So this is the first feature that I put ToDo Backup to test.

    EaseUS ToDo Backup Free 3.5 is able to create 2 different types of bootable disk which is Linux and WinPE. To create the WinPE bootable recovery disk, EaseUS ToDo Backup requires Windows Automated Installation Kit (AIK) to be installed where the KB3AIK_EN.iso file is 1.7GB in size. From Windows 7 Ultimate 64-bit, I wasn’t able to to create a working bootable emergency disk to an empty USB flash drive. Creating the WinPE bootable disk to USB seemed successful with any errors but booting up the USB shows the error “BOOTMGR is missing. Press any key to restart“. The Linux version failed with the error “Failed to read sector” during creation itself.

    Failed to read sector

    I did not give up so I re-image my test system to Windows 7 32bit, reinstalled EaseUS ToDo Backup Free 3.5 and Windows AIK. No problems in creating a linux bootable disk and booting it up. However do note that the Linux version of bootable disk can only be used to restore while the backup feature is disabled. When tried creating the WinPE, this time it failed with the message “Failed to create a bootable disk, please export ISO file and burn it with third party burning software, such as BurnAware.

    Failed to create a bootable disk

    Finally, I tested the Export ISO option where EaseUS ToDo Backup creates the emergency disk and saves it to an ISO file which can be used to burn to a CD/DVD. I am able to burn the WinPE ISO to a CD and boot up the computer with it to perform a backup. Remember that Linux emergency disk can only restore while the WinPE emergency disk supports backup.

    As for backup, normally you cannot create the backup archive file on the same partition that you are going to backup because you are taking a huge risk in overwriting the files that you want to backup. Symantec Ghost and Acronis has this restriction but weirdly EaseUS ToDo allows this. Meaning you can create a backup image of C drive and save it to C drive. Either ToDo is smart enough to detect that there is enough free space to store the backup image on the same partition OR they forgotten to include this restriction. Either way, I think this is a risky decision.

    Mounting a backup image is easy and fast. Simply double click on the .PDB image file and you can access the backup files with the option of opening the file, recover or copy.

    I also tried enabling the PreOS startup item but it failed with the error “Disk or partition space not enough, please change destination or clear useless data to try again”.

    Disk or partition space not enough, please change destination or clear useless data to try again

    If I open My Computer, C drive shows 286GB free of 305GB while the D drive shows 240GB free of 290GB. There are still a lot of free space left so what went wrong? This problem has got to do with the hidden System Reserved partition not having enough space. Simply follow the instructions from this article and you will be able to enable the PreOS option after that.

    I have not tested the “Recover to dissimilar hardware” feature or in another words Universal Restore as found in Acronis True Image Home Plus Pack but I read from EaseUS forum that there are limitations such as if the source boot partition and system partition locates on two different hard disks then you won’t be able to restore to dissimilar hardware.

    EaseUS ToDo Backup Free offers a good alternative to commercial paid imaging software but the stability is no where near Acronis which has a solid 10 years background. Don’t get me wrong, EaseUS ToDo Backup works and can still do image backup with restoration but it comes together with a few hiccups.

    [ Download EaseUS ToDo Backup Free 3.5 ]

  • How To Uninstall and Remove Toolbar

    Toolbars are best known for adding functionality and ease-of-use options to the end user. While the browser itself handles basic browsing navigation (Back, Stop, Reload, etc), toolbars often add additional functionality to browsers (additional search fields, form-fill, links back to popular sites. etc) Having a lot of toolbars installed is not very good because it slows down your computer. I recommend to install only 1 toolbar. Let’s say you use Yahoo services very often, then install Yahoo toolbar. As for me, I always use Google services, so I only have Google toolbar installed.

    I’ve seen one of my friend’s computer that has 5 toolbars installed. When I asked my friend whether he uses all the toolbar functions, he said he didn’t know how did it even get there! Usually toolbar is bundled together with a software. Most of the time when installing software, we’ll blindly click on the “AGREE” button. That allows the software to install the toolbar before installing the software. So take an extra second to look carefully on what you’re agreeing. An example is when installing Nero Burning Rom. Just after running the setup file, you’ll be presented with a screen asking whether you’d like to install Ask toolbar. Will you immediately click the “Next” button or will you be very careful and select the non-default option “Install Nero Software without the Ask Toolbar“? Sometimes it’s tricky and we can be careless…
    Remove ASK toolbar

    The best thing to do is to uninstall and remove the toolbar from computer if you don’t use it. Here’s how to do it.


    You can uninstall a toolbar by using Add or Remove Programs from Control Panel. If you’re unable to remove toolbar from Add or Remove Programs, try using this free tool.

    The Toolbar Uninstaller is a freeware program to get rid of unwanted toolbars. As time progresses, there are now more then 10000 different toolbars and counting. Toolbar Uninstaller (TbU for short) will be able to find some of them to be able to remove them.
    Remove Toolbar Spyware

    The following is a list (could be outdated) of the toolbars that TbU is able to detect:

    Internet Explorer
    * Google Toolbar
    * FearFM Toolbar
    * MyWebSearch

    Firefox
    * Google Toolbar
    * Yahoo Toolbar
    * Alexa Toolbar
    * Skype Toolbar
    * Groowebar
    * Coolstreaming Toolbar
    * Stumbleupon Toolbar
    * MX5 Club Toolbar
    * Facebook Toolbar
    * NetCraft Toolbar
    * FearFM Toolbar
    * McAfee SiteAdvisor
    * eBay Toolbar
    * Firefox Companion for eBay
    * Clustybar
    * ChaCha Toolbar
    * Ask Toolbar
    * IMVU Toolbar
    * Oracle DBA Toolbar
    * RankQuest SEO Toolbar
    * RPoints Toolbar for Firefox
    * Okapiland Search Toolbar
    * Sheetmusicdirect.com Search Toolbar
    * BigSite Toolbar
    * Metawishlist Toolbar
    * H*R Toolbar
    * Kai3 Toolbar
    * Bibleserver.com Toolbar
    * The Music Hutch Toolbar
    * Slavehack Toolbar
    * PimpFish Basic Toolbar
    * Quiz Addicts’ Toolbar
    * Vertippdich Search Toolbar
    * BlinkList Toolbar
    * BanglaCricket Toolbar
    * Faved Toolbar
    * Neopets Toolbar
    * Radio Paradise Toolbar
    * AOL Toolbar
    * [Unofficial] MySpace Toolbar
    * Renkoo Toolbar
    * WordLearner Toolbar
    * ToolbarMS (The MySpace) Toolbar
    * Calorie-Count.com Toolbar
    * BzPower Toolbar
    * Shaastra Toolbar
    * Monalo Toolbar
    * MyCountry.co.uk Toolbar
    * The AustLII Toolbar
    * eMusic Toolbar
    * Cypher Toolbar
    * Torrent Finder Toolbar

    Toolbar Uninstaller has a very useful feature which is able to update the detection signature file. So make sure you check for latest detection signature file before using it to uninstall toolbars.

    It is free, small and very useful tool to easily remove multiple toolbar. Although it requires installation, you can copy the Toolbar Uninstaller folder from Program Files to your USB flash drive and bring it everywhere with you.

    [ Download Toolbar Uninstaller ]

  • Feedburner Email Newsletter Subject as Post Title

    I’ve been using two service (Feedburner and Feedblit) as email subscription for this blog site. Actually both of it does the same thing which is to email my subscribers whenever I posted something for the day but I can’t really remember how did I ended up with two. All this while Feedblitz has one advantage over Feedburner that is to use the article’s topic as the email subject and it is enabled by default. However for Feedburner, I can only set a static subject which is “The Latest from Raymond.CC Blog”.
    feedburner title
    Feedburner is something that I set and forget so I don’t really log in to check what’s new. Thanks to PrinceOfAndalus, he informed me that I can now configure my Feedburner account to use today’s topic as the subject. This is certainly a good news to over 80,000 subscribers who has been putting up with the crappy subject for years.


    I remembered emailing to Feedburner many years ago requesting them to improve the subject on the newsletter but they wasn’t able to do it. Then Google bought over Feedburner and slowly improved until we can now insert our latest post’s title into the Subject/Title of email.

    To make the changes, here’s what you need to do:

    1. Login to your Feedburner account.
    2. Click on the Feed Title to access the Feed Stats Dashboard
    3. Click the Publicize tab
    4. Click the Email Subscriptions
    5. Click Email Branding
    6. At the Email Subject/Title, use the tag ${latestItemTitle}. Do take note that there are no spaces in between the 3 words. You can insert anything before and after the tag.
    feedburner title as subject
    7. Click Save button.

    I posted an article yesterday regarding the free PC Tools File Recover license and got an email an hour later with the subject “Raymond.CC Blog – Free File Recover 7.5 License Key To Restore Deleted Files Worth $29.95″.
    feedburner title

    Good job Google!

  • Top Rated FREE and Powerful Malware Cleaner

    Spywares, virus and trojans that has infected a computer must have an autostartup entry somewhere either on the registry, Windows services, startup folder and etc… There are far too many places that a malware can plant on so that it can be ran whenever Windows is starting up. Manually analyzing all startup methods is nearly impossible. That’s why there is HiJackThis and also HiJackFree, both with similar powerful capabilities for analyzing, detecting and removing malwares.

    What if I tell you there’s an even better tool that covers everything that HiJackFree, HiJackThis, Autoruns and Silentrunners has to offer? That’s why it’s being rated as TOP free malware cleaner!


    RunScanner is a completely free windows system utility which scans your system for all configured running programs.
    Top Rated Malware Detector
    You can use RunScanner to detect autostart programs, spyware, adware, homepage hijackers, unverified drivers and other problems.

    RunScanner Features
    1. Scanning of 80+ hijack locations
    2. HOSTS file editor
    3. Process Killer
    4. Online Malware/Whitelist Analysis.
    5. FREE

    I know that startup analyzer utilities are hard to use for novice computer users but this one is easier because it has online malware analysis, MD5 hash calculation of files + online file rating and online lookup of scanned entries. All this makes RunScanner easier to determine which entries are likely to be malicious. Unlike HiJackThis, when I newly used it, I accidentally removed an important file and I wasn’t able to boot in to Windows the next time.

    RunScanner can be used in Beginner or Expert mode. Expert mode is for advanced users for tweaking startups, scanning, reporting, filtering and delete features are made available. As for Beginner mode, it is for users with little computer knowledge that want to do scan and upload their results to a forum or send their results to a malware specialist.
    RunScanner Run Mode
    If you don’t know which forum to go to, RunScanner has round up a list of English, Français, Nederlands and Deutch forums that is able to help you analyze your results.

    Another great feature that can be found in RunScanner is, you can scan your computer, export it to .run file and then send it to a malware specialist. The specialist can MARK certain items that need review and send the .run file back to the user. Marking of files does not fix the items, it only changes the color in the .run file.

    In my opinion, RunScanner is the most powerful startup analyzer compared to the rest. Use it with care and do not simply uncheck and remove anything you don’t know.

    [ Download RunScanner ]

  • Blocking PING Response in Windows to Prevent Hackers from Finding You

    You’re having problem connecting to a computer in a network, first thing you should do is to PING the computer. Ping is a computer network tool used to test whether a particular host is reachable across an IP network. It is also used to self test the network interface card of the computer, or as a speed test. It works by sending ICMP “echo request” packets to the target host and listening for ICMP “echo response” replies.
    block icmp ping
    Although Ping is useful for network administrators, computer hackers also use Ping to find potential victims on the Internet. By pinging a specific IP address and receiving a response from the IP address, a hacker can determine that something of interest might be there. If you can configure your computer to block ping response, it should heightens the level of security for your computer. I’ve researched on this before but never posted it because thinking that no one would be interested. Yesterday one of our forum member cybercop asked how to block ping, so here it is.


    Some routers can be configured not to respond to an ICMP Ping (ping to the WAN port). Like my Belkin N1 Wireless router, it can be set up so it will not respond to an ICMP Ping from the outside. Simply checking the “Block ICMP Ping” checkbox would turn off the ping response.
    block icmp ping router
    But if your router doesn’t support blocking ping, there is nothing you can do on your computer because your router automatically respond to ping request.

    If you have a direct connection, there are a few ways to block PING. Third party firewall should help you to block ping. I remembered I wasn’t able to ping the computer on a local network when the McAfee Firewall is enabled. As for the built in Windows Firewall, enabling it doesn’t block PING.

    Another method to block PING on a single computer is to use IPSec by creating a policy element that will tell the computer to block all the specific IP traffic. The step is pretty long, you can refer to the article written by Petri IT Knowledgebase.

    Finally, if you want a simple way to block PING with a click, you should check out Plax Network Suite. Plax Network Suite is an easy to use collection of network tools which give you full control over the internet activity of your computer. You can easily enable or disable Windows Firewall, block all internet traffic and block ping with ONE click.
    Plax block PING
    It even have a port scanner and a visual report of all open TCP/IP and UDP ports and the mapping to the owning application. This can be used to quickly identify unknown open ports and their associated applications.

    [ Download Plax Network Suite ]

  • Unlimited download hack for RapidShare

    Rapidshare logo
    RapidShare is definately one of the best and biggest free unlimited file hosting around the internet today.
    There are others which offers bigger file uploads but the download speed is slow, or some even offer to keep the uploaded files for more than 6 months if there’s no downloaders, but their download speed is also slow…

    RapidShare has the best in download speed as they have two mirrors that is very fast, Berlin and Zephyr. RapidShare offers the best “tweaked” limitations and the only downside I can think of is hourly-based traffic-limitations. After you’ve downloaded an amount of MB from RapidShare, you’ll have to wait for nearly an hour or more to download the next files.
    Of course, this can be easily bypassed by disconnect and reconnect your internet IF your ISP offers you dynamic IP address.
    Sometimes it’s just too troublesome to do that all the time just to download a few files.

    A lot of RapidShare hack programs available today are mostly using Proxy address to download more files from RapidShare. If you do not have a fast Proxy address, your download is going to be slow and if the connection is unstable, your download will stop in the middle of download where you’ll have to start all over again!

    I’ve found another method where you can download from RapidShare using proxy address to bypass the download limitations and also a lot of other features.


    The concept is the same as what you can do on your computer when you use any RapidShare hack program but it runs on your UNIX based webserver. You can use a RapidShare hack PHP script to download unlimited files from RapidShare automatically for you using proxy and the files will be available on your UNIX webserver for you to download whenever you want to.
    The best part is you don’t even need to enter the random CAPTCHA code and the download starts immediately without waiting.
    You can also perform a lot of other commands such as:
    • FTP the downloaded files from RapidShare to another webserver
    • Renaming the downloaded files from RapidShare
    • Deleting the downloaded files from RapidShare
    • Email the downloaded files form RapidShare to another person without configuration
    • Mass Email the downloaded files to multiple users
    • Split files
    • Puck files
    Imagine all the features above are done in your UNIX webserver and not on your computer.

    The RapidShare hack PHP script name used to be Rapidget Pro but now the author, Checkmate and Pramod has renamed it to RapidKill Pro starting from version 5.5 because the core version has been updated a lot to support other sites rather than just Rapidshare.
    RapidKill is a PHP based application, primarily used to get the files on Rapidshare.de. It is also work with: filefactory.com, rapidupload.com, momoshare.com, megaupload.com, sexuploader.com, upload2.net, mytempdir.com, sendspace.com, getfile.biz, webfile.ru, slil.ru, zalil.ru, turboupload.com, up-file.com, depositfiles.com and ultrashare.net.

    RapidKill Pro installation
    1. Download RapidKill Pro from the link at the end of this post
    2. Extract the RAR file with WinRAR or PowerArchiver
    3. Create a folder in your UNIX webserver such as RapidKill folder and upload all the files.
    4. Open your browser and type the link to the RapidKill folder (eg: http://www.rapidshare.com/rapidkill)

    This is the main page of RapidKill.
    RapidShare unlimited download

    The options of RapidKill. You can use Proxy to have unlimited download from RapidShare.
    RapidShare hack

    When downloading from RapidShare using RapidKill, there is a status bar that shows the progress of the download. After completed downloading from RapidShare, RapidKill also shows the average speed and total time used to download the file.
    RapidShare hack

    Click on RapidKill’s Files, it will show you the list of files that RapidKill has downloaded from RapidShare.
    RapidShare hack
    From here, you will be presented with the options to email, mass submits, split files, FTP file, puck files, rename and delete files.
    RapidShare hack

    Have fun RapidKilling RapidShare! 😉

    [ Download RapidKill 5.6 Pro ]

  • Activate Free 6 Months Kaspersky Anti-Virus 2009 Chinese Key Code on English Setup

    A week ago Kino, a member of the forum from China shared a tip on how to obtain a free 6 months Kaspersky Antivirus 2009 key. Honestly I didn’t know how I missed that thread but I got to know about it when someone posted a comment on this blog. The deal is Kaspersky is giving out 50000 license key everyday and you’ll have to activate the license before 1st of April 2009.

    The steps to get the activation code is very simple. Just enter your email address in the form, click submit and the code will be instantly delivered to your email. Problem is the code can only be used on Chinese version of Kaspersky AntiVirus 2009 (kav8.0.0.506sch.exe or KAV8.0.0.506sch.zip). If you try to activate the code on the English version of KAV 2009, you’ll get an error saying “Activation code is not compatible with this application. It is impossible to activate Kaspersky Anti-Virus using the activation code for another application. Please, check your product.
    Activation code is not compatible with this application. It is impossible to activate Kaspersky Anti-Virus using the activation code for another application. Please, check your product

    You can of course download the Chinese language of Kaspersky and hit Shift + F12 to change the interface to English (which will be reverted back to Chinese after reboot) but today I will show you how to get the genuine kaspersky key, and how easy it is to do the “impossible” by activating any language of KAV 2009 using the activation code that is meant for Chinese version.


    Follow the steps below to get your free 6 months Kaspersky Anti-Virus 2009 activation code:

    1. Go to http://li.kaba365.com/

    2. Enter your email at the form and click the button.
    Kaspersky Key 6 Months

    3. Type the exact verification code that you see and click the button on the bottom left.
    Kaspersky Key Verification Code

    4. Click Cancel if you receive a popup that looks like the image below.
    Kaspersky Key Cancel Button

    5. Check your email address that you’ve entered in step 2. You should receive an email from noreply@pcstars.com.cn with the subject 赠送给您的卡巴斯基反病毒2009(半年卡)‏. Note down the 25 digit Kaspersky activation code.
    Kaspersky Activation Code

    If you haven’t install Kaspersky Anti-Virus 2009, you download it from here. After installation, make sure you select “Activate later” when asked to activate the application. Finish up the configuration and restart your computer.

    To activate the chinese activation code on English version of Kaspersky Antivirus 2009.

    1. Right click at Kaspersky icon at the icon at the notification area and select Settings.
    Right Click Kaspersky Tray Icon

    2. Go to Options and “uncheck” Enable Self-Defense. Click OK to close the settings window.
    Disable Kaspersky Self Defense

    3. Right click at Kaspersky icon at the notification area and select Exit.

    4. Go to C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2009\Skin\loc and rename the folder from en to sch.

    5. Go to Start > Run , type regedit and click OK.

    6. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\KasperskyLab\protected\AVP8\environment

    7. Look for the Localization name and double click on it. Change the value data from en to sch. Close the Registry Editor.
    Kaspersky Localization

    8. Run Kaspersky Antivirus either from desktop or start menu and you’ll be prompted to activate the application.

    9. Select Activate online and enter the 25 digit activation code that you got earlier.

    10. Voila! You should see that it’s sending the data to Kaspersky server and will then tell you that the key is successfully installed with the expiration date 6 months ahead.
    Activated Kaspersky Anti-Virus 2009

    Well, it is amazing that Kaspersky is giving out 50,000 activation codes everyday but unfortunately those keys are “trial” keys and not commercial. There is one drawback on trial key which is IF you’ve previously activated the 30 days trial or other promotional trial license, you won’t be able to use this license. Kaspersky application only allows you to activate the trial license ONCE. Uninstalling and reinstalling won’t allow you to activate trial license more than once unless you know how to do kaspersky trial reset by deleting some registry keys which won’t be discussed here.

  • Monitoring Vista ReadyBoost Read and Write Speed Effeciency

    Windows Vista includes a new feature called ReadyBoost that allows you to use a USB key as virtual memory in order to enhance performance. Most of the new desktop today comes with a lot of RAM and also a standard 7200RPM hard drive and you wouldn’t really see any speed improvements after enabling ReadyBoost. However for laptops, the laptop memory are being priced relatively higher than the for desktop systems and many laptops are still using the slow 4200RPM or 5200RPM hard drives. I’ve also read that ReadyBoost can increase laptop battery life by reducing hard drive access, allowing the hard drive to spin down.

    Enable ReadyBoost in Vista

    To speed up Vista system using ReadyBoost, all you need to do is to plug in your USB flash drive that is ReadyBoost capable, select “Speed up my system using Windows ReadyBoost” from the autoplay window and you’re all set. You can then go to the drive’s properties where a ReadyBoost tab will be made available for you to configure the available space to use for ReadyBoost. Matt Ayers, who is the Program Manager in the Microsoft Windows Client Performance group and basically owns the ReadyBoost feature recommends a 1:1 ratio of flash to system memory at the low end and as high as 2.5:1 flash to system memory. Higher than that and you won’t see much benefit.

    After enabling ReadyBoost, all we see is the LED light at USB flash drive blinking all the time and how do you know if it is working or not? Well here are 2 tools that you can use to monitor the read and write cache which gives you an idea of how well ReadyBoost is working.


    The first one that I found was ReadyBoost Monitor by Area 71.
    Monitor ReadyBoost read and write
    It is only a 56KB free portable tool that you can use to monitor the ReadyBoost read and write speed, the cache and compressed size. This tool can be minimized to the notification area (system tray) and moving your mouse cursor over the icon will conveniently show you a popup on the current read and write speed. It also has a nice small graph to show you the activity of the ReadyBoost.

    [ Download ReadyBoost Monitor ]

    The second one is also called ReadyBoost Monitor and it is created by the developers of popular “The Cleaner”.
    ReadyBoost Monitor Moosoft
    About 10 years ago when antivirus could only detect virus but not trojans, The Cleaner was very popular and is the only tool that could detect and clean trojans. Their free ReadyBoost monitoring tool is able to show ReadyBoost Hits, ReadyBoost Reads, Physical disk and the efficiency in percentage. This tool is free, portable, only 24KB and they even provide the complete source code for the ReadyBoost Monitor.

    [ Download ReadyBoost Monitor by MooSoft ]

    After enabling ReadyBoost on my laptop running Vista Business for about 10 minutes, I could already feel that the USB flash drive is getting pretty hot and thought that this could shorten the life span of my pen drive. Microsoft is aware of the lifecycle issues with flash drives and are smart about how and when they do their writes to the device. According to Microsoft, the drive should be able to operate for at least ten years. I guess I will be using ReadyBoost from today onwards until I add in another 2GB DDR3 RAM.

    If you have any questions regarding ReadyBoost or to know more about it, please read the Q&A interview with Matt Ayers.

  • List of Google Search Strings for Finding MP3

    This How-To will teach you how to use Google to find mp3s. This How-To will be highly pragmatic and will focus on the hows and not the wherefores of the various search strings. This info is taken from a website hosted in Geocities. I really liked the knowledge and information being shared. Since it is hosted on Geocities for free, I’m just afraid that one day this website will be gone and the whole article won’t exist for reference anymore! Moreover, free Geocities account only allow 3GB transfer per month. So if the website exceeds 3GB data transfer, the website will be inaccessible.

    Note: This info works just great for ebooks as well just change mp3 to pdf, djvu, ps, etc…


    ———————————————————————-
    = Index
    ———————————————————————-

    0) Key
    1) Directories
    2) Xitami Servers
    3) Directory Listing
    4) Andromeda Servers (depricated)
    5) Zina Artists (depricated)
    6) Apache mp3 Servers
    7) Individual Songs
    8 ) Saving Shoutcasts
    9) Social Bookmarking

    ———————————————————————-
    = Section 0 – KEY
    ———————————————————————-

    This are just some definitions I will use below.

    [Directory String] can be any of the following :
    1) “index of”
    2) “last modified”
    3) “parent of”

    [file type] can be any of the following :
    1) “mp3″
    2) “shn”
    3) “wma”

    [mp3 name] can be any of the following :
    1) the name of the album in quotes
    2) the name of the artist in quotes
    3) be daring and leave it blank and have lots of links
    4) be creative!

    [limitors]
    1) -html -htm -php -asp -txt -pls

    (inurl:) is optional and may be omitted and in fact most be omitted if not using a search tool other than google.

    (intitle:) can be used in place of (inurl:) and has a similar effect again you must be useing google.

    (-filetype:txt) adding this to the end of your search string can filter some false positives.

    (-playlist) adding this to the end of your search string can filter some false positives.

    ———————————————————————-
    = Section 1 – Directories
    ———————————————————————-

    These are the most common way that mp3s are stored on the www, you should try these strings first.

    String Format :
    Type 1 : [Directory String] + (inurl:)[file type] + [mp3 name]
    Type 2 : [Directory String] + (intitle:)[file type] + [mp3 name]
    Type 3 : [Directory String] + [file type] + [mp3 name] + [limitors]

    Example Strings :
    – intitle:index.of + mp3 + “grandaddy” -html -htm -php -asp -txt -pls
    – “index of” + “mp3″ + “radiohead” -html -htm -php
    – “index of” + mp3 + “grandaddy”
    – “index of” + inurl:mp3 + “beatles” -txt -pls
    – “index of” + intitle:mp3 + beatles
    – “last modified” + “shn” + “dylan”
    – “last modified” + inurl:shn + “bob dylan”
    – “parent of” + inurl:wma + “grandaddy”

    Suggestions :
    – Try (intitle:index.of + “mp3″ + “band name” -htm -html -php -asp) first it is usually the most effective.

    Another Little Trick:
    – If you have been getting alot of results on google but the pages don’t seem to be there try adding dates and the “apache” string to your search i.e.

    – intitle:index.of + mp3 + “grandaddy” -html -htm -php -asp apache feb-2005
    – intitle:index.of + mp3 + “grandaddy” -html -htm -php -asp apache 2005

    or if you just want a big list of mp3′ doing a search like this every month
    – intitle:index.of + mp3 + -html -htm -php -asp apache mar

    or if you want to condense the search try
    – intitle:index.of + (mp3|ogg) + “grandaddy” -(html|php|asp) +apache mar-2007

    ———————————————————————-
    = Section 2 – Xitami Servers
    ———————————————————————-

    String Format :
    Type 1 : “xitami web server” + (inurl:)[file type] + [mp3 name]
    Type 2 : “xitami web server” + (intitle:)[file type] + [mp3 name]

    Example Strings :
    – “xitami web server” + “mp3″ + “radiohead”
    – “xitami web server” + intitle:shn + “beatles”
    – “xitami web server” + inurl:mp3 + “magnetic fields”

    ———————————————————————-
    = Section 3 – Directory Listing
    ———————————————————————-

    String Format :
    Type 1 : “directory listings” + (inurl:)[file type] + [mp3 name]
    Type 2 : “directory listings” + (intitle:)[file type] + [mp3 name]
    Type 3 : “directory listings of” + (inurl:)[file type] + [mp3 name]
    Type 4 : “directory listings of” + (intitle:)[file type] + [mp3 name]

    Example Strings
    – “directory listings” + “mp3″ + “radiohead”
    – “directory listings” + intitle:shn + “beatles”
    – “directory listings” + inurl:mp3 + “magnetic fields”
    – “directory listings of” + “mp3″ + “radiohead”
    – “directory listings of” + intitle:shn + “beatles”
    – “directory listings of” + inurl:mp3 + “magnetic fields”

    ———————————————————————-
    = Section 4 – Andromeda Servers
    ———————————————————————-

    String Format :
    Type 1 : “scott matthews” + andromeda + [mp3 name]
    Type 2 : “scott matthews” + andromeda + [file type] + [mp3 name]
    Type 3 : “powered by andromeda” + [mp3 name]
    Type 4 : “powered by andromeda” + [file type] + [mp3 name]
    Type 5 : inurl:andromeda.php + [mp3 name]
    Type 6 : inurl:anromeda.php + [file type] + [mp3 name]
    Type 7 : “scott matthews”
    Type 8 : “powered by andromeda”
    Type 9 : inurl:andromeda.php

    Examples :
    – “scott matthews” + andromeda + “radiohead”
    – “scott matthews” + andromeda + “mp3″ + “fitter”
    – “powered by andromeda” + “gradaddy”
    – “powered by andromeda” + “mp3″ + “just like women”
    – inurl:andromeda.php + “shn”
    – inurl:anromeda.php + “wma” + “dylan”
    – “scott matthews”
    – “powered by andromeda”
    – inurl:andromeda.php

    ———————————————————————-
    = Section 5 – Zina Artists
    ———————————————————————-

    String Format :
    Type 1 : “zina artists”

    Examples :
    – “zina artists”

    ———————————————————————-
    = Section 6 – Apache mp3 Servers
    ———————————————————————-

    String Format :
    Type 1 : “stream all” + apache + [mp3 name]
    Type 2 : “stream all” + apache
    Type 3 : “shuffle all” + apache + [mp3 name]
    Type 4 : “shuffle all” + apache

    Examples :
    – “stream all” + apache
    – “stream all” “shuffle all” mp3
    – “stream all” + apache + radiohead
    – “shuffle all” + beatles

    ———————————————————————-
    = Section 7 – Individual Songs
    ———————————————————————-

    Format : [mp3 name].mp3 -playlist -filetype:txt

    Examples :
    – “ok_computer_live.mp3″ -playlist -filetype:txt
    – “*ok_computer*.mp3″ -playlist -filetype:txt
    – kid*a.mp3 -playlist -filetype:txt

    ———————————————————————-
    = Section 8 – Shoutcasts
    ———————————————————————-

    0) Streamripper is a free shoutcast recorder

    1) Find a shoutcast that you would like to save.

    2) Download and open the .pls file, to discover the stream url
    File1=http://example.site:80/stream/1074

    3) Open up a terminal (DOS or xterm)

    4) break up the url into its parts (site,port,locations) so here we have
    site: example.com
    port: 80
    location: /stream/1074

    5) Uset telnet to Send HTTP GET message and redirect output. The request is

    prompt$ telnet site port > output.mp3
    GET location HTTP/1.0
    PRESS_ENTER_KEY PRESS_ENTER_KEY

    so in the example above

    prompt$ telnet example.site 80 > output.mp3
    GET /stream/1074 HTTP/1.0

    ———————————————————————-
    = Section 9 – Social Bookmarking
    ———————————————————————-

    Social Bookmarks sites, are site where people can leave links to other interesting sites given a certain “tag.” Tags are sort of like search terms and categories combined. Searching anyone of these bookmark sites for the type or music or band you like is almost sure to bring up lots of links to free mp3s. There are two links at the top of this page digg and del.ici.us, I use and there are others. If you do join a site make sure to give me a thanks by adding a link to this site!

    Source: http://www.geocities.com/my_haz_runs/

  • Free Remote Computer Control Solution

    Here are a few question you need to answer before you proceed reading this post. If any of the answer is “YES“, then continue reading… Well, not really, if you’re interested to learn more about computer, please continue reading as well…

  • Need access to your computer from a restrictive work internet connection?
  • Tired of drawn out phone calls helping people with computer problems?
  • Need a remote conferencing and demonstration platform that doesn’t cost the earth?
  • Find other remote control solutions clumsy and slow?
  • Want a no-ads, no-spyware FREE solution to all of the above?


  • SimpleDesktop by Moog Software has developed and generously offered a genuinely free, no ads, no spyware, no time limits, no feature limits remote computer control software!
    Free remote computer control with SimpleDesktop

    SimpleDesktop Features:
    * Revolutionary interface makes navigating a remote computer completely natural
    * Cross Platform – works on Windows, MacOS X, Linux, BSD, Solaris … and many others
    * Secure – up to 576 bit strong encryption of the entire session
    * Seamlessly serves clients connecting through an HTTP proxy
    * Scheduled upload of local machine IP address or Router IP
    * Multi-Platform Client Download (1.2M) from your SimpleDesktop server via any standard web browser
    * View the remote computer in a window or full screen
    * Secure background FTP file and clipboard transfer
    * Easily manage user accounts with rich permissions
    * Chat to other connected users and to the server host
    * Share whiteboards with other users
    * Draw on the whiteboard or directly on to the remote screen
    * Server side filtering by hostname or ip address
    * Unlimited TCP port ranges served by a single server
    * No monthly subscription
    * Can be optimised for LAN , ASDL/Cable , Modem Dialup or any other network
    * Stable, robust and secure server
    * Full Featured Browser Web Client (no client download required)

    This is so worth it! I know there are many free remote control softwares developed using open source VNC. This is another alternative which offers extra functionality such as whiteboard and file transfer. Most VNC doesn’t support file transfer and whiteboard. You can even suggest new features you’d like to see in SimpleDesktop via their Feedback Form. Who knows one day their remote computer control software will be very complete and stable, then they’ll start charging for it.

    [ Download SimpleDesktop ]

  • Encrypt Files and Folders With Pictures and Not Passwords

    Encryption is a method which allows information to be hidden so that it cannot be read without special knowledge or tools. To encrypt a file, you’ll usually need a software that is able to encrypt the file and then you’ll also need to create a key which only you and the person who needs to decode the file will know. Just like you putting important documents or money in a safe box which is then locked with a key or secret code. You can never let other people have the key or the secret code because that will allow other people to open your safe and steal whatever its in there.

    Same with computer. Today I found a very interesting encryption software which is able to encrypt files and folders without using password. Instead, it uses pictures or images as the key to perform encryption and decryption. Very innovative! Using pictures or images as key might be a good idea because nowadays people have not one, but dozens of passwords. It can be hard to remember them, and you might lose precious data when you forget them.


    PixelCryptor lets you choose a picture and use it to combine your files into a package. The pixel data is used to encrypt your data. The combinations are endless and hard to break. Currently there is no backdoor or workarounds. Once encrypted, it cannot be unlocked without the correct picture file.

    To encrypt a file with PixelCryptor:

    1. Download and install PixelCryptor.

    2. Click Encode Files button.
    Encode files with PixelCryptor

    3. You can click Add Folder or Add File to add the files that you want to encrypt. Drag and drop is also possible.
    Add file or folder to encrypt

    4. Click at the place where it says “Click here to select an image”, and browse the picture that you would like to use as a key.
    Select picture as encryption key

    5. Click on the small browse icon to select where you’d like to save the CGP encrypt file. Once the encryption is done, all files and folders that you selected just now will be packed into one CGP file.

    That was really easy! What I really like about PixelCryptor is it’s very user friendly. PixelCryptor is portable. You can copy PixelCryptor folder from C:\Program Files\CodeGazer\ to your USB flash drive and run it on another computer. However, PixelCryptor requires Microsoft .NET 2.0 or newer to be installed in order to run. As for the picture file, I’d advice that you use the picture that you upload yourself and not from some website. Reason is if the website is down, you won’t be able to decode your file. Or maybe the website decided to enhance the picture, it can’t be used to decrypt your file too.

    There are even more powerful, proven to be strong encryption tool than PixelCryptor, but it’s a good alternative for basic users who just want to encrypt files without using passwords.

    [ Download PixelCryptor ]

  • Changing Remote Desktop Listening Port Updates

    Nearly 5 months ago, I posted a tip on how to change the listening port of Microsoft Remote Desktop Connection.
    This tip involves changing some values in your registry. Beginners can find it hard to mess with their Registry because one wrong modification, you won’t be able to boot up your Windows.

    Here’s a much easier way on how you can change the listening port for Microsoft Remote Desktop Connection.


    Again, IntelliAdmin has released a free tool where you can easily change the Remote Desktop listening port on your local computer and also on another computer across the LAN.
    Change Remote Desktop port

    As you can see, it’s so easy to use. Just select Local System if you’re changing the listening port on your own computer, and set the port number you desire at where it says Port Number and click Submit button. If you want to change the listening port on a computer in a LAN, just select Remote Computer, type in the computer name/ip address or you can click on the “…” button to browse for the computer. For some computer, you’ll need to authenticate using another account.

    One small thing which I don’t understand about this tool is I see a small text saying “Upgrade To Pro” at the bottom left. I clicked on it but couldn’t find anything about Pro version for this tool. Perhaps there will be one at a later time.

    [ Download IntelliAdmin Remote Desktop Port Change ]

  • Easy access to information on network with Free LAN Remote Administration

    Local and wide area networks are difficult and stressful to manage, especially in organizations that have practically non-existent IT support. Even there’s an IT support, it’s not easy for him alone to manage hundreds of computers in terms of getting to know if the user has installed any pirated softwares, running any spywares or trojans in services that could jeopardize the whole network by spreading it and etc…

    N37dev has developed a freeware that could be the answer to your network administration needs. Designed to make remote administration a breeze, it is ideally suited for implementations which require remote network administration such as corporate networks, cyber cafés, exhibition centres, hotels and many other types of network.


    LanTool Remote Administration Suite is an advanced network administration environment that incorporates a compact design, yielding a low memory footprint, for unmatched speed and performance. It allows easy access to information on your network which consists of Windows 2000, XP and Server 2003 computers.
    LanTool Remote Administration

    You can restart, shutdown, hibernate, suspend and lock any computer on your network, without the need to physically be there. LanTool reduces the time you spend walking around, and increases your productivity. In seconds, you can ascertain which hardware is connected to a particular machine, how long the computer has been running for, or who’s connected without having to yell or pick up the phone. Detailed information, on any machine running on your network, is just a click away.

    Features and benefits of LanTool:

  • Remotely power-on, shutdown or power-off remote computers
  • Remotely lock a session or log-off users
  • Check if a computer is still on the network by monitoring its ‘heartbeat’, a regular signal sent by the remote computer.
  • Send files to remote computers, bypassing the operating system’s default methods, allowing faster transfer initializations, higher throughput due to on-the-fly compression, more accurate estimates for transfer time, error recovery and other programming tricks to ensure reliability and usability
  • Determine network issues using the Network bandwidth test feature, ascertaining the line speed between two points on the network and pinpointing any issues with the network.
  • Test the quality of a network connection by running TCP or UDP line tests to determine if there’s a problem with transfer rates.
    Kill processes remotely or change process priority remotely.
  • Dual core ready – due to the heavily multi-threaded design, which not only improves response times on single core CPUs (due to less wait states), but will also utilize the extra hardware of newer generation of microprocessors.
  • Other great benefits of employing LanTool include lowering the sound volume of a remote computer. This is especially useful in cases where the user is playing music that is disrupting other users and simple verbal requests are not achieving peace and tranquillity.

    This remote administration tool is like the smaller brother of the popular “DameWare NT Utilities“. Compared to the big brother, its still lacking a lot of remote features but it’s FREE and perhaps could help you easily access information remotely on your network. So it’s worth trying it if you have a network to maintain.

    [ Download LanTool v0.2.1 ]

  • Testing, Decoding and Analyzing Regular Expressions or RegEx

    Have you ever wonder how does people easily extract emails or some part of information from a file or website? An example is whenever I organize a software giveaway, one email is considered as one entry. I can’t be copying and pasting thousand over emails one by one, so what I did was use regular expressions to search for an email string and extract it to a file.

    A regular expression (regex or regexp for short) is a special text string for describing a search pattern. You can think of regular expressions as wildcards on steroids. You are probably familiar with wildcard notations such as *.txt to find all text files in a file manager. The regex equivalent is .*\.txt$.

    Regular expressions can be also used in online forms to make sure you submit the correct information. You can write a regular expressions to check for the correct email format, phone number where it uses all digits/numbers and etc. I was trying to fill up a form but no matter how I tried, the form wouldn’t accept the phone number format. When I viewed the HTML source code, I found that it uses regular expressions to check for the valid phone number format. Sounds easy but analyzing how regular expression works is not easy. After a little research, I found 2 ways that is able to decode and explain the analyzed regular expressions.


    Below is an example of regular expressions. I am sure you are now scratching your head like what I did when I saw this. I couldn’t understand a thing about regex syntax below. I didn’t want to waste my time in learning about regular expressions syntax because I seldom use it and I will end up forgetting them some day.

    ^0(6[\\s-]?[1-9]\\d{7}|[1-9]\\d[\\s-]?[1-9]\\d{6}|[1-9]\\d{2}[\\s-]?[1-9]\\d{5})$

    What I need is an analyzer that is able to analyze regular expressions and let the computer decode the expression to display its elements in plain English. You can either use the online Regular Expressions Analyzer which don’t require downloading or installing any software. Just paste the regular expression syntax to the box and click Parse. The parser will parse it on the fly and produce a tree like representation.

    online regular expressions analyzer

    Another method is to use Expresso, a free regular expression development tool that includes an Analyzer. Expresso displays this analysis in the Regex Analyzer as an expandable tree structure. The Analyzer updates automatically whenever the Regex changes. By selecting a node in the tree, you will highlight that portion of the regular expression. In addition to helping you understand the expression, this can be used to highlight text that you want to modify with the Builder or to run a Partial Match.

    Expresso Regular Expression Analyzer

    Expresso is free but you’ll have to register in order to remove the reminders to register your copy. Registration is free. Just enter your name and email and you’ll get your personalized User Name and Registration Code. I am sure you will now be able to understand the regular expressions more easily with Expresso and online regular expression analyzer without actually learning it.

    [ Download Expresso v3.0 ]

  • Raymond.CC website inaccessible – Migration

    Raymond.CC site was inaccessible for nearly 6 hours due to my current hosting Integricity can no longer able to support it.
    I host raymond.cc website on a shared hosting which is very cheap but quite fast. However, the activity and bandwidth was too high for their servers to manage in a shared environment resulting them freezing this site.

    I’ve now transferred this site to a server in United States, WebhostingBuzz and hopefully it is able to support this site. WebHostingBuzz is one of the highest rated web host in US. They claim to provide top-notch customer support and competitive pricing.. I do agree on the competitive pricing and as for customer support, so far so good. They did helped me with the transfer in just a few hours eventhough our timezone are so far apart.

    Migrating wordpress blog sites can be very easy if you have shell access. You need to backup all your files and folders while retaining the permissions and also your database.
    This is how I migrated raymond.cc to a new web host within an hour.


    1. Backup files and folders while retaining permissions.
    SSH to your current web host and run the following tar command from your website root.
    tar -cpzf filename.tar.gz *
    You should now have the file called filename.tar.gz on your website root.
    Download and upload filename.tar.gz to your new webhost. You can connect to your new webhost FTP by their IP address. Consult your webhost about the IP address.
    SSH to your NEW web host and run the following command to extract the tarball.
    tar -xzf filename.tar.gz
    Now you have all your files and folders with permissions on your new webhost.

    2. Backup MySQL database.
    Again, SSH to your old web host and run the following command
    mysqldump –opt -u dbusername -p dbname > dbname.bak.dump
    Download dbname.bak.dump to your computer from your website.
    You can use phpMyAdmin that use to administer MySQL database to restore the database.
    Before restoring the database, you need to create the exact same database name and user for MySQL.
    After doing that, on phpMyAdmin, click on the database name that you’ve just created on the left hand side and then click on SQL tab on top.
    backup and restore mysql database using phpMyAdmin
    You will just need to click on the Browse… button to locate the dump file which you downloaded to my computer.
    Click Go, wait for a few minutes to upload and restore the database and it’s done migrating!