Showing posts with label DOS. Show all posts
Showing posts with label DOS. Show all posts

Thursday, 18 October 2012

How to Create Ms-Dos BootCD ?

How to Create Ms-Dos BootCD (Hiren's Bootable CD)?

Tools Used:
bfi.exe (Build Floppy Image - to create bootable image from files)
mkisofs.exe (a tool to create/build the CDRom ISO image file)
build-iso.cmd (batch file to create floppy and iso image)
We will need some files from Windows ME or Windows XP startup disk
io.sys (Dos Input Output System file)
msdos.sys (Dos system file)
command.com (MS-Dos mode command line interpreter)
himem.sys (An extended memory manager that is included with DOS and Windows)
mscdex.exe (Microsoft CD-Rom Extension)
oakcdrom.sys (Generic CD-Rom driver, work with the most of all IDE CD-ROM drives)
xmsdsk.exe (Adjustable XMS RAMdisk Driver - Freeware)
ctmouse.exe (Mouse Driver For Dos - also works on USB Mouse - Freeware) or mouse.com

All the necessary files are included in bootcd.zip Download (468KB)

AUTOEXEC.BAT
@ECHO OFF
MSCDEX.EXE /D:CDDRIVER /L:X
XMSDSK.EXE 51200 R: /t /y
CTMOUSE.EXE
PATH=A:\;R:\
GOTO %CONFIG%

:TESTDISK
COPY X:\TESTDISK\*.* R:
R:\TESTDISK.EXE
GOTO DOS

:GHOST
COPY X:\GHOST\GHOST.EXE R:
R:\GHOST.EXE
GOTO DOS

:NTFS
COPY X:\NTFS\*.* R:
R:\NTFS4DOS.EXE
GOTO DOS

:RPM
COPY X:\RPM\*.* R:
R:\RPM.EXE
GOTO DOS

:DOS
ECHO  X: CD DRIVE
ECHO  R: RAM DRIVE

CONFIG.SYS
[MENU]
menuitem=DOS, Dos
menuitem=TESTDISK, TestDisk
menuitem=GHOST, Ghost
menuitem=NTFS, Ntfs
menuitem=RPM, Partition Manager

[DOS]
DEVICE=OAKCDROM.SYS /D:CDDRIVER /L:X

[TESTDISK]
include=DOS

[GHOST]
include=DOS

[NTFS]
include=DOS

[RPM]
include=DOS

[COMMON]
LASTDRIVE=Z

You can add your favorite Programs in the bootcd,
All you need to do is Edit autoexec.bat and config.sys and add all the required files in the folder and double click on build-iso and you are ready to burn bootcd.iso

Example: You want to add Mcafee Antivirus in the bootcd, all you do is create a folder MCAFEE in the folder CD
and add a line in config.sys menu
menuitem=MCAFEE, McAfee Antivirus

add two more lines in config.sys

[MCAFEE]
include=DOS


and add 4 lines in autoexec.bat
:MCAFEE
COPY X:\MCAFEE\*.* R:
R:\scanpm.exe /adl /all /clean
GOTO DOS

when you start your computer with this bootcd, you will get to menu where you can choose which program you want to run. In this example we will create 50Mb Ram Disk (You will have Minimum of 64Mb Memory)

 Microsoft Windows Startup Menu
 ‗‗‗‗‗‗‗‗‗‗‗‗‗‗‗‗‗‗‗‗‗‗‗‗‗‗‗‗‗‗‗‗

    1. Dos
    2. TestDisk
    3. Ghost
    4. Ntfs
    5. Partition Manager
    
6. McAfee Antivirus Enter a choice: 1
You can easily create bootable cd,
all you have to do is add few lines in autoexec.bat and config.sys
and copy files in
CD folder and double click on build-iso.cmd
and it creates a iso file
BootCD.iso
You can add as many items in the list but you are limited to 9 per screen
to add more items simply add submenu=MORE, More... (under [MENU] block)
and add [MORE] in config.sys and you can add more menuitem there

Tuesday, 16 October 2012

Formatting an HDD, when FDISK won't work

 This was originally posted by andro11meda in Hardware and Networking Support. It worked so well for me on a problem-computer that I was working on that I had to post it in tutorials. Thanks andro11meda!!


***
This is my favorite way to wipe it clean:

CAUTION: This debug script is for advanced users only. Its Purpose is to remove all formatting and partitioning information from your hard disk when FDISK is unable to do so. THIS WILL REMOVE ALL DATA AND PROGRAMS FORM THE DRIVE.

1. Create a MSDOS bood disk with Debug

2. At DOS command prompt type the following: Debug[Enter] (Where enter is to press the enter key once)


-F 200 L1000 0 [Enter]
-A CS:100 [Enter]
xxxx:0100 MOV AX,301 [Enter]
xxxx:0103 MOV BX,200 [Enter]
xxxx:0106 MOV CX,1 [Enter]
xxxx:0109 MOV DX,80 [Enter]

NOTE: ( --- "80" for hd0, "81" for hd1)

xxxx:010c INT 13 [Enter]
xxxx: 010e INT 20 [Enter]
xxxx: 0110 [Enter]

-G [Enter]
"Program terminated normally"

3. Turn off the computer. On the next startup the hard drive will need to be partitioned and formatted.
***

Sunday, 29 July 2012

how to--Unlimited Rapidshare Downloads

Unlimited Rapidshare Downloads

Its very easy to fool Rapid Share server if your IP address is assigned by your ISP. Just follow these simple steps:

clean up IE or netscape cookie( In this case the one that belong to rapidshare website)
On Command prompt
type -----> ipconfig /flushdns <---Enter
type -----> ipconfig /release <---Enter
type -----> ipconfig /renew <---Enter
type -----> exit <--------Enter

Or save these commands in a bat file and run it everytime you need to fool Rapidshare server.Remember to clean up rapidshare cookie in your temp Internet files folder.

Now you should be ready to download as many files as you want from their server.

And there is this cool link: paste it in the browser and see
CODE
http://www.google.com/search?lr=&as_qdr=all&q=+.rar+OR+.zip+OR+.pdf+OR+.exe+site%3Arapidshare.de

Tuesday, 17 July 2012

CHECK FOR DOS, CHECK TO SEE IF YOU ARE INFECTED

When you first turn on you computer (BEFORE DIALING INTO YOUR ISP),
open a MS-DOS Prompt window (start/programs MS-DOS Prompt).
Then type netstat -arn and press the Enter key.
Your screen should display the following (without the dotted lines
which I added for clarification).

-----------------------------------------------------------------------------
Active Routes:

  Network Address          Netmask  Gateway Address        Interface  Metric
        127.0.0.0        255.0.0.0        127.0.0.1        127.0.0.1      1
  255.255.255.255  255.255.255.255  255.255.255.255          0.0.0.0      1

Route Table

Active Connections

  Proto  Local Address          Foreign Address        State

--------------------------------------------------------------------------------

If you see anything else, there might be a problem (more on that later).
Now dial into your ISP, once you are connected;
go back to the MS-DOS Prompt and run the same command as before
netstat -arn, this time it will look similar to the following (without
dotted lines).

-------------------------------------------------------------------------------------

Active Routes:

  Network Address          Netmask  Gateway Address        Interface  Metric
          0.0.0.0          0.0.0.0    216.1.104.70    216.1.104.70      1
        127.0.0.0        255.0.0.0        127.0.0.1        127.0.0.1      1
      216.1.104.0    255.255.255.0    216.1.104.70    216.1.104.70      1
    216.1.104.70  255.255.255.255        127.0.0.1        127.0.0.1      1
    216.1.104.255  255.255.255.255    216.1.104.70    216.1.104.70      1
        224.0.0.0        224.0.0.0    216.1.104.70    216.1.104.70      1
  255.255.255.255  255.255.255.255    216.1.104.70    216.1.104.70      1

Route Table

Active Connections

  Proto  Local Address          Foreign Address        State
  TCP    0.0.0.0:0              0.0.0.0:0              LISTENING
  TCP    216.1.104.70:137      0.0.0.0:0              LISTENING
  TCP    216.1.104.70:138      0.0.0.0:0              LISTENING
  TCP    216.1.104.70:139      0.0.0.0:0              LISTENING
  UDP    216.1.104.70:137      *:*      

--------------------------------------------------------------------------------

What you are seeing in the first section (Active Routes) under the heading of
Network Address are some additional lines. The only ones that should be there
are ones belonging to your ISP (more on that later). In the second section
(Route Table) under Local Address you are seeing the IP address that your ISP
assigned you (in this example 216.1.104.70).

The numbers are divided into four dot notations, the first three should be
the same for both sets, while in this case the .70 is the unique number
assigned for THIS session. Next time you dial in that number will more than
likely be different.

To make sure that the first three notation are as they should be, we will run
one more command from the MS-DOS window.
From the MS-DOS Prompt type tracert /www.yourispwebsite.com or .net
or whatever it ends in. Following is an example of the output you should see.

---------------------------------------------------------------------------------------

Tracing route to /www.motion.net [207.239.117.112]over a maximum of 30 hops:
1  128 ms  2084 ms  102 ms  chat-port.motion.net [216.1.104.4]
2  115 ms  188 ms  117 ms  chat-core.motion.net [216.1.104.1]
3  108 ms  116 ms  119 ms  www.motion.net [207.239.117.112]
Trace complete.

------------------------------------------------------------------------------------------

You will see that on lines with the 1 and 2 the first three notations of the
address match with what we saw above, which is a good thing. If it does not,
then some further investigation is needed.

If everything matches like above, you can almost breath easier. Another thing
which should you should check is programs launched during startup. To find
these, Click start/programs/startup, look at what shows up. You should be
able to recognize everything there, if not, once again more investigation is
needed.

-------------------------------------------------------------------------------------------

Now just because everything reported out like we expected (and demonstrated
above) we still are not out of the woods. How is this so, you ask? Do you use
Netmeeting? Do you get on IRC (Internet Relay Chat)? Or any other program
that makes use of the Internet. Have you every recieved an email with an
attachment that ended in .exe? The list goes on and on, basically anything
that you run could have become infected with a trojan. What this means, is
the program appears to do what you expect, but also does just a little more.
This little more could be blasting ebay.com or one of the other sites that
CNNlive was talking about.

What can you do? Well some anti-virus software will detect some trojans.
Another (tedious) thing is to start each of these "extra" Internet programs
one at a time and go through the last two steps above, looking at the routes
and connection the program uses. However, the tricky part will be figuring
out where to tracert to in order to find out if the addresses you see in
step 2 are "safe" or not. I should forewarn you, that running tracert after
tracert, after tracert might be considered "improper" by your ISP. The steps
outlined above may not work exactly as I have stated depending upon your ISP,
but with a true ISP it should work. Finally, this advise comes with NO
warranty and by following my "hints' you implicitly release me from ANY and
ALL liability which you may incur.


 Other options

Display protocol statistics and current TCP/IP network connections.
Netstat [-a] [-e] [-n] [-s] [-p proto] [-r] [intervals]

-a.. Display all connections and listening ports.
-e.. Display Ethernet statistics. This may be combined with the -s option.
-n.. Diplays address and port numbers in the numerical form.
-p proto..Shows connections for the protocol specified by proto; proto may be
TCP or UDP. If used with the -s option to display per-protocol statistics,
proto may be TCP, UDP, of IP.
-r.. Display the routing table.
-s.. Display per-protocol statistics. By default, statistics are shown for TCP
UDP and IP; the -p option may be used to specify a subset of the default
interval..Redisplay selected statistics, pausing intervals seconds between each
display. If omitted. netstat will print the current configuration information
once