PDA

View Full Version : Best Tips Here...



nikita69
09-07-2003, 06:51 AM
For all the noobs who have to search thru each thread to find a really good tip about dl/ul with KL++. So, starting here, is the QUICK, SIMPLE and BEST TIPS u'll see in this forum. Members, please only post BEST tips u can think of in bullit point if possible. thx. n00bs, 99% of the question/"problem" you have has been posted and provided a solution for it. Please go through these tips, the links on my signature and search the forum. If all fails and feel that your question/"problem" is new to this board, then post your question/"problem" case accordingly in the Kazaa Lite Related threads (http://www.klboard.ath.cx/index.php?act=SC&c=2) thx. MODS/ADMINS/MEMBERS, feel free to send me a PM with any correction. thx

HOW TO DOWNLOAD FASTER? (example 1) First and foremost is Tweak: YOUR Windows - <span style='color:green'>95 (http://www.google.com/search?hl=en&lr=&ie=UTF-8&oe=UTF-8&q=%22tweak+windows+95%22), 98 (http://www.google.com/search?hl=en&lr=&ie=UTF-8&oe=UTF-8&q=%22tweak+windows+98%22), 2000 Pro and Server, ME, XP Home & XP Pro (http://www.blkviper.com/Articles/OS/OSguides.htm) (TO GET OPTIMAL ENVIRONMENT USING KaZaa LITE, GET WINDOWS 2000 OR XP. THIS IS BECUASE WINDOWS 95/98 DO NOT HAVE MUCH ROOM TO TWEAK, NOT KL++)
YOUR Firewalls - either check on YOUR firewall's site or and type "tweak firewall" (http://www.dslreports.com/information/siteguide)
YOUR ISP setup - either check on YOU ISP's site or go here and type "tweak dsl" or whichever connection YOU have (http://www.dslreports.com/information/siteguide)
Close any unnecessary program - turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server
</span> Find the highest bandwidth of the file you are looking for and start downloading
Then search for any kind of file with hi-bandwidth, like old madonna songs (3096K bandwidth). download that file and let it be
Now change your search setting to 2 min and search for the file YOU origianlly wanted. don't keep it forever. it could slow YOU down instead (PLEASE NOTE THAT KEEPING AUTO SEARCH ON INDEFINETLY COULD CAUSE MORE HARM THAN GOOD TO SOME USERS WHO DIDN'T FOLLOW THE TWEAKING STEPS)
Once you stop the search, if the file YOU want has a lot of resources, then click on the plus sign
Highlight the highest bandwidth user, right click and click "find more for this user"
NOTE: The time where YOU are not using YOUR PC (like when YOU sleep) is the fastest YOU might notice the optimal speed.
INDEX
KL++ TOP 20 MOST REPEATED QUESTIONS, "PROBLEMS" AND "CONCERNS" KL++ USERS TALK ABOUT, YET MISS/FAIL TO SEARCH THE BOARD TO FIND THE POSTED ANSWERS/FACTS (http://www.klboard.ath.cx/index.php?showtopic=64831&st=15&#entry514485)
HOW TO TROUBLESHOOT YOUR PC? (Guide) (http://www.klboard.ath.cx/index.php?showtopic=64831&st=30&#entry591133)
DEFAULT SETTINGS IN KL++ THAT DO NOT NEED TO BE CHANGED (http://www.klboard.ath.cx/index.php?showtopic=64831&st=15&#entry518384)
HOW TO DOWNLOAD FASTER? (example 1) (http://www.klboard.ath.cx/index.php?showtopic=64831&st=0&#entry476462)
HOW TO DOWNLOAD FASTER? (example 2) (http://www.klboard.ath.cx/index.php?showtopic=64831&st=15&#entry506985)
HOW TO DOWNLOAD FASTER? (example 3) (http://www.klboard.ath.cx/index.php?showtopic=64831&st=15&#entry512094)
HOW TO DOWNLOAD FASTER? (example 4) (http://www.klboard.ath.cx/index.php?showtopic=64831&st=30&#entry562050)
HOW TO TEST WHY YOU CAN ONLY DOWNLOAD FROM ONE USER? (http://www.klboard.ath.cx/index.php?showtopic=64831&st=0&#entry505831)
HOW TO DO A CLEAN INSTALL AFTER EXPERIENCING PROBLEMS WITHOUT SOLUTIONS? (http://www.klboard.ath.cx/index.php?showtopic=64831&st=0&#entry505831)
HOW TO KNOW IF YOUR DOWNLOAD IS A FAKE BEFORE IT FINISHES? (http://www.klboard.ath.cx/index.php?showtopic=64831&st=0&#entry505831)
HOW TO AVOID FAKE MUSIC FILES? (two examples) (http://www.klboard.ath.cx/index.php?showtopic=64831&st=30&#entry555677)
HOW TO RESTART DEAD DOWNLOADS? (http://www.klboard.ath.cx/index.php?showtopic=64831&st=0&#entry481309)
HOW TO RESOLVE CODECS PROBLEMS? (one example) (http://www.klboard.ath.cx/index.php?showtopic=64831&st=0&#entry488945)
HOW TO DELETE STUBBORN FILES? (http://www.klboard.ath.cx/index.php?showtopic=64831&st=0&#entry479871)
HOW TO ELIMINATE BIG PROBLEMS WITH SMALL PROGRAMS? (http://www.klboard.ath.cx/index.php?showtopic=64831&st=0&#entry489994)
HOW TO BLOCK ADS AND MAINTAIN THE SUPERTRICK (hosts file - example 1) (http://www.klboard.ath.cx/index.php?showtopic=64831&st=0&#entry499791)
HOW TO BLOCK ADS AND MAINTAIN THE SUPERTRICK (hosts file - example 2) (http://www.klboard.ath.cx/index.php?showtopic=64831&st=30&#entry567015)
HOW TO BLOCK ADS AND MAINTAIN THE SUPERTRICK (hosts file - example 3) (http://www.klboard.ath.cx/index.php?showtopic=64831&st=45&#entry624191)
HOW TO SPEED-UP YOUR IP RESOLVING IN THE SUPERTRICK (hosts file) (http://www.klboard.ath.cx/index.php?showtopic=64831&st=45&#entry616256)
HOW TO SPEED-UP YOUR WEB SURFING (http://www.klboard.ath.cx/index.php?showtopic=64831&st=45&#entry659009)
HOW TO STOP SPAM VIA WINDOWS MESSENGER SERVICE (http://www.klboard.ath.cx/index.php?showtopic=64831&st=45&#entry644774)
HOW TO TWEAK THE REGISTRY SETTINGS FOR MAXIMUM PROTECTION FROM NETWORK ATTACK (http://www.klboard.ath.cx/index.php?showtopic=64831&st=45&#entry644988)
WHAT IS A WEB BASED PROXY (http://www.klboard.ath.cx/index.php?act=ST&f=4&t=64831&st=45#entry650749)
ONE LINERS THAT CAN HELP YOU RESOLVE/UNDERSTAND YOUR PROBLEM (http://www.klboard.ath.cx/index.php?showtopic=64831&st=15&#entry518103)
HELPFUL LINKS (http://www.klboard.ath.cx/index.php?showtopic=64831&st=0&#entry504812)
RELATING POSTS: comming soon...Also a seperate guide for OS will be included

RESULTS WILL VARY
No matter how good your systems may be, they're only as effective as what you put into them.

CREDIT/OTHER: ALL TIPS WHERE COMPILED FROM POSTS ON THIS BOARD AND MY EXPERIENCE. IN ADDITION, THEY ARE BASED ON YOU USING THE LATEST SOFTWARE VERSION OF THE PROGRAM DISCUSSED
updated

nikita69
09-07-2003, 03:37 PM
HOW TO DO A CLEAN INSTALL AFTER EXPERIENCING PROBLEMS WITHOUT SOLUTIONS? Backup ALL downloaded files, and partially download ".dat" files (I would recommend copying them to your desktop until KL++ is reinstalled)
Close all KL++ related tools (avipreview, kdat, ksig, etc..)
Uninstall KL++ completely through the "Ad/Remove Programs" in Control Panel
Delete the programs folder (usually C:&#092;Program Files&#092;Kazaa Lite or C:&#092;Documents and Settings&#092;user_name&#092;Application Data&#092;Kazaa Lite)
Clean all traces of K-Lite from the registry using a program like RegCleaner
IMPORTANT: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base: 256986 - Description of the Microsoft Windows Registry (http://support.microsoft.com/default.aspx?scid=kb;EN-US;256986)
Do a virus and spyware scan using the latest deffenitions, remove offending files (Spybot) (AdAware)
Download from K-Lite (http://www.klitekpp.com/) - select "Save As" not "Open". DO NOT DOWNLAOD BETA version of Kazaa Lite K++
Make sure nothing else is running on your computer (like other file sharing applications), then install with the settings you like
Select the option of "Delete all Kazaa Lite registry keys before installing [This will reset all settings to DEFAULT]"
Also select the option of "Supertrick [This will block a lot of advertising on websites]"
Copy downloads back to downloads folder (usually C:&#092;My Shared Folder)
That should do it, hopefully....
Start KL++ and enjoy
CORRECTED, thx to Phalkon30 & ShareHolder (http://www.klboard.ath.cx/index.php?showtopic=64831&view=findpost&p=506025)

RELATING POSTS: comming soon...

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.
updated

nikita69
09-08-2003, 09:46 AM
HOW TO DELETE STUBBORN FILES? First, a brief explanation on why this happens. This is usually because an active process has an open handle to the file which prevents it from being deleted. Normally if you close down all running programs you&#39;ll find that most files will then be free to delete, but that&#39;s not always the case, and in some cases it may even be a trojan that&#39;s preventing itself from being deleted.
MoveFileEx - A Windows function that moves an existing file or directoryIMPORTANT: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base: 256986 - Description of the Microsoft Windows Registry (http://support.microsoft.com/default.aspx?scid=kb;EN-US;256986)
The MOVEFILE_DELAY_UNTIL_REBOOT option places an entry under the registry key HKEY_LOCAL_MACHINE&#092;SYSTEM&#092;CurrentControlSet&#092;Control&#092;Session Manager&#092;PendingFileRenameOperations and the file is moved or deleted (if destination NULL) when the system next reboots. Unfortunately as this is not supported under Windows95/98 an application must use entries in WININIT.ini to achieve the same effect.
BOOL MoveFileEx (LPCTSTR pExistingFilePath, LPCTSTR pNewFilePath, DWORD dwFlags) TRUE if function succeededpExistingFilePath.......Source path to an existing file
pNewFilePath............New location for the file
dwFlags....................Optoions controlling the move
Move or rename a file to a new location.
Only meaningfully implemented on NT. Windows95 returns
ERROR_CALL_NOT_IMPLEMENTED, use MoveFile instead.
The source and destination path should be on the same drive as the system can then just change folder entries without actually copying the file contents. If MOVEFILE_COPY_ALLOWED is supplied and the system needs to copy the file it will require the additional disk space for the temporary file, in this case the original file is deleted only after the copy is successful.
The flags allow more control over the move, it can be zero or a combination of the following values :MOVEFILE_REPLACE_EXISTING.......The destination can be overwritten if it exists
MOVEFILE_COPY_ALLOWED.............Allow a copy if destination on a different drive to the source
MOVEFILE_DELAY_UNTIL_REBOOT...The move takes place on reboot (NT only)
MOVEFILE_WRITE_THROUGH...........Do not return until changes flushed to disk (NT only)
OR Using Windows InProcServer32 processIMPORTANT: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base: 256986 - Description of the Microsoft Windows Registry (http://support.microsoft.com/default.aspx?scid=kb;EN-US;256986)
Open notepad, copy and paste the code below. Then save the file as "avifix.inf" without the quotes; Windows XP explorer movie fix.
;
; WARNING - Use this file at your own risk.
;
; Executing this file will remove a registry key which makes explorer load shmedia.dll.
; Simply put, this removes the annoying "permission denied" errors when trying to
; move/copy/delete AVI files.
;
; To use this fix, right-click on the file and select install. Done.
;
; Information about the registry key from multiple sources.
; Inf-file compiled by Moo (2002-03-22).
; Idea by Duxus. Thanks to the kind people of "[BBB] Sweden #01", you know who you are&#33;
;

[version]
signature="&#036;Windows NT&#036;"

[DefaultInstall]
DelReg = Reduce.Reg

[Reduce.Reg]
HKLM, "SOFTWARE&#092;Classes&#092;CLSID&#092;{87D62D94-71B3-4b9a-9489-5FE6850DC73E}&#092;InProcServer32"
Right-click "avifix.inf" and select install
OR Delete the file in DOS mode (99.99% success ratio) Download & install DOS Here (http://user.tninet.se/~fgo483j/files/ch20.zip) (197kb) - "An Explorer Shell Extension to provide easy and quick access to the DOS Prompt in the requested folder"
Open Explorer and go to the directory where the stubborn file resides (DO NOT HIGHLIGHT THE FILE)
Right Click and select "CMD here"
Close all open applications
Open the Task Manager and click on the Processes tab, select "explorer.exe" under Image Name, click "End Process"
You will only have the command prompt and the task manager open
In the Command Prompt, DEL the offending files (DEL *.mpg, DEL mus*.avi, DEL test.wmv, etc.)
The files should now delete without a problem. Now go back to the task manager and click on the Applications tab. Click the "New Task..." button. in the dialog, type explorer.exe and click OK
OR Delete the file association firstIMPORTANT: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base: 256986 - Description of the Microsoft Windows Registry (http://support.microsoft.com/default.aspx?scid=kb;EN-US;256986)
Start >Run >regedit {enter}
Navigate to this key HKEY_CLASSES_ROOT&#092;SystemFileAssociations&#092;.avi&#092;shellex&#092;PropertyHandler
Delete the "Default" key
Close regedit
Follow the above test again, is a simple del doesn&#39;t work
AND Delete the file in DOS mode Start >Run >cmd {enter}
Navigate to the folder the file is in, i.e. if its in c:&#092;folder&#092;anotherfolder&#092;file, type "cd c:&#092;folder&#092;anotherfolder" {enter} The coomand prompt should change to let you know you are in the correct directory.
Type "dir /x" {enter}
The offending file will be listed like (filena~1.xxx)
Type attrib -r -s -a -h filename.extension {enter}
Take note of the name and type "del filena~1.xxx" {enter}
OR Try to take ownership of the file Right click the file
Select the security Tab
Select properties
Select Advanced
Select Owner
Find the User or group you wish to give ownership to and select it
Click apply
now try deleting it.
OR If the file is Media (MP3, MPG, AVI, etc...) Remember the filename (X) and location
Run another file (Y) with the same extension
now Delete the file (X)
This occurs sometimes when windows thinks that the file (X) ur trying to delete is still open, eventhough u closed the app and the file.
OR Try one of these small programs FreeFile (http://www.skrubbeltrang.com/Tools.aspx?Tool=FreeFile) - "FreeFile will free a file by finding the process that holds the lock, and allow you to terminate it"
ZAP (http://helpdesk.kixtart.org/Download/Utils/zap.exe) - "deletes files that are either in use or otherwise cannot be deleted" (works with XP & 2K)
DELLATER (http://www.diamondcs.com.au/downloads/dellater.zip) (3kb) - "DelLater is the ideal program to use when you can&#39;t delete a file, no matter how hard you try" - This tool does the same as above in Option 1
RELATING POSTS: comming soon...

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.
updated

nikita69
09-08-2003, 11:22 PM
HOW TO RESTART DEAD DOWNLOADS? Open KDAT before starting KL++
Select one file and click {Delete} on the sources side
Small windows pops-up, select {Delete all <Not Stored> sources}
Press {Delete}
Tip: Monitor your files for <Not Stored> sources and delete them
RELATING POSTS: comming soon...

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.
updated

nikita69
09-11-2003, 07:33 PM
HOW TO RESOLVE CODECS PROBLEMS? (one possibility) Unistall ALL additional codecs not done by WMP and any video/audio player that might contain CODECS, Reboot if necessary
Uninstalled ALL WMP and Reboot if necessary
Download K-LITE CODEC PACK (http://home.hccnet.nl/h.edskes/finalbuilds.htm) or SLD CODEC PAK (http://hakim85.free.fr/index/en/beta-en.htm)
Install WMP 9 CODECS (http://www.microsoft.com/downloads/details.aspx?FamilyID=06fcaab7-dcc9-466b-b0c4-04db144bb601&displaylang=en)
After the file completed dl, would only start with AVIPrev. - tried fixing the file using 3 programs, all said file is corrupt. so, i dl again from other sources/size and corrected the problem.
For further help on Avi and like files go here Divx-Digest (http://www.divx-digest.com/software/index.html) and here DVD Dr. Help (http://www.dvdrhelp.com)
In some cases, you may need to disable WMP to check for codecs, updates, licenses and soforth. OPTIONS--&#62;PRIVACY--&#62;uncheck "Acquire licenses....", --&#62;PLAYER--&#62;uncheck "Download codecs..." and "Connect to the...."
RELATING POSTS: comming soon...

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.
updated

nikita69
09-12-2003, 04:51 AM
HOW TO ELIMINATE BIG PROBLEMS WITH SMALL PROGRAMS? KL++ RELATED DAT FILE PROBLEM (http://www.geocities.com/ian_l_williams) - Most may not need to go further than here. The results these programs give, speaks for itself. thx ilw
DAT VIEW & RENAMER (http://www.angelfire.com/ego2/idleloop/) - You can view and manage the contents of your Kazaa (*.dat) partially downloaded files
KAZAA CORRUPTION FIXER (KCF) (http://www.geocities.com/drspud11/) (42KB) - "Redownload only the corrupted sections of any completed file" *****
KAZAA DAT EDITOR (KDE) (http://www.devilinc.tk/KazaaDatv0.4.zip) - "Allows you to redownload sections of a corrupted file you&#39;ve downloaded"
KLFU (http://www.kazaalitefilterupdater.tk/) (913B) - "Here is where you can download the newest Kazaa Lite K++ Add-On which blocks allot of Child Pornography and allot of other crap you don&#39;t want on your Kazaa Lite K++.*****
MEDIA SEEK (http://www.mediapeek.com/) (850KB) - "Now it is possible to actually see a preview picture of the movies other users share - *before* you start downloading&#33;" *****
VIDEO LAN (http://www.videolan.org/pub/videolan/vlc/0.6.2/win32/vlc-0.6.2-win32.zip) - "Is a highly portable multimedia player for various audio and video formats (MPEG-1, MPEG-2, MPEG-4, DivX, mp3, ogg, ...) as well as DVDs, VCDs, and various streaming protocols. It can also be used as a server to stream in unicast or multicast in IPv4 or IPv6 on a high-bandwidth network"*****
CONTROL/MONITOR CIS (http://www.cerberus-infosec.co.uk/CIS-5.0.02.zip) - "A free security scanner written and maintained by Cerberus Information Security, Ltd and is designed to help administrators locate and fix security holes in their computer systems. This tool is a must&#33;" To see the checks it does, go HERE (http://www.cerberus-infosec.co.uk/vulndb.txt) - For NT/2K
COOL BEANS SYSTEM INFO (http://dl.winsite.com/files/180/ar1/winxp/sysutil/sysinf02.exe) (820kb) - "A small but powerful program that monitors your computer&#39;s CPU, physical memory, and swap memory usage"
DEPENDENCY WALKER (http://www.dependencywalker.com/depends21_x86.zip) (406KB) - "A free utility that scans any 32-bit or 64-bit Windows module (exe, dll, ocx, sys, etc.) and builds a hierarchical tree diagram of all dependent modules." Can be helpful to identify missing files/dll after installtion of programs
INSTALL SPY (http://freewarearena.org/PHPNuke/modules.php?name=Downloads&d_op=getit&lid=1156) - "A program to help you discover spyware&#33; Track any and all changes to the registry and file system, and also record all shell notification events (e.g. media inserted), when a program is installed, uninstalled, or run. This can warn you of programs trying to install new services, programs that are set to run on reboot, changes to your home page, etc. It&#39;s a highly configurable program that allows you to catch any change to your system. Filtering lets you zoom down to the details that are most important to you"
HHD SRVADMIN (http://www.hhdsoftware.com/Download/srvadmfull.zip) - "A very useful as a replacement to the ordinary NT service and device control panel applets, because it repeats and extends the functionality provided by them. Plus, it allows administrators to perform tasks, which usually not available to them without installing Windows NT Resource Kit." For NT/2K
INSTALL RITE (http://www.epsilonsquared.com/installrite.htm) - "Includes all the features of InstallWatch and provides "application cloning" as opposed to "disk cloning", simplifying software distribution"
INSTALL WATCH (http://www.epsilonsquared.com/installwatch.htm) - "Records modifications made to your PC during the installation of software, hardware, or configuration changes"
NTFS READER for DOS (http://www.ntfs.com/downloads/readntfs.zip) - This is an absolutely essential recovery tool if you use NTFS partitions. Add this 147 KB executable file to your Win9x-based boot floppy and it will let you read any NTFS partition and copy off files to any FAT partition. (Don’t be thrown when the page says “Demo software.” It’s outright freeware.) - For NT/2K/XP ONLY
NTSubst (http://www.hhdsoftware.com/Download/ntsubst.exe) - "Extended version of the NT subst command. NtSubst allows you to assign the drive letter not only to any valid path, but also any valid NT Object Manager path." For NT/2000
POWER PROMPT (http://www.skrubbeltrang.com/Tools.aspx?Tool=PowerPrompt) - "will allow you to run programs as System"
PROCESS EXPLORER (http://www.sysinternals.com/files/procexpnt.zip) (150kb) - "The unique capabilities of Process Explorer make it useful for tracking down DLL-version problems or handle leaks, and provide insight into the way Windows and applications work"
REVELATION (http://www.snadboy.com/RevelationV2.zip) - Discloses passwords that are only displayed as asterisks. I suppose, ultimately, this is a cracker’s tool; but there are practical, legitimate uses for it, so I decided to post the link. - For 9x/2K/XP. Please use it in good faith.
SHUTDOWN (http://aumha.org/downloads/shutdown.zip) - Small commandline utility that makes it a breeze to log off, shutdown, restart, hibernate, or put in stand-by mode your Win XP computer. It’s the only utility I know that shuts down Win XP and then reliably powers off the computer. For XP ONLY.
STARTUP CPL (http://www.mlin.net/files/StartupCPL.zip) - "A nifty control panel applet that allows you to easily configure which programs run when your computer starts."
STARTUP MONITOR (http://www.mlin.net/files/StartupMonitor.zip) - "A small utility that runs transparently (it doesn&#39;t even use a tray icon) and notifies you when any program registers itself to run at system startup. It prevents those utterly useless tray applications from registering themselves behind your back, and it acts as a security tool against trojans like BackOrifice or Netbus."
STORM WINDOW (http://www.cetussoft.com/stormwin.htm) - A great and FREE utility for Windows desktop security
TOTAL UNINSTALL (http://www.geocities.com/ggmartau/download/download.html) (792kb) - " Monitor the installation process or application run and detect the system changes (registry and file system). View and optionally restore the detected changes"
FILE BCWIPE (http://www.jetico.com/download.htm) - "Is intended to give you a confidence that your deleted files cannot be recovered by an intruder" For Linux/FreeBSD/OpenBSD/Solaris/Digital UNIX/Irix/Windows
BEST CRYPT (http://www.jetico.com/download.htm) - "A Data Encryption system provides the most comprehensive and easy-to-use secure data storage and access control facilities available" For Linux/FreeBSD/OpenBSD/Solaris/Digital UNIX/Irix/Windows
CIA UNERASE (http://217.160.136.183/en/Download/down.php?login=1&[email protected]&loginname=tina&status=aktiv&CIA_Unerase=1) - " Is the first product using the CIS technology to recover deleted files. Using CIS, CIA Unerase recovers almost any file you deleted even before you installed CIA Unerase and files where all other solutions on the market failed. CIA Unerase is the smallest, easiest and fastest Unerasing-tool we know"
DELLATER (http://www.diamondcs.com.au/downloads/dellater.zip) (3kb) - "DelLater is the ideal program to use when you can&#39;t delete a file, no matter how hard you try"
DISKSPAN 3 (http://freewarearena.org/PHPNuke/modules.php?name=Downloads&d_op=getit&lid=167) (488kb) - "A simple utility that adds a choice to your SendTo menu allowing you to quickly and automatically move files anywhere on your computer. If you send a file to a disk, and the disk is too small, you can compress and span file(s) across multiple disks with ease. It uses regular in-house zip compression making the file compatible with other compression programs. When you open a Span file, DiskSpan restores your original files quickly. Compatible with ZIP Disks, tape drives and most other media formats"
FC CUTTER (http://www.geocities.com/fsoftdev/fcutter.zip) (29kb) - "A small and very fast utility for cutting big files into small. This lets you to carry big files from one computer to another or backup some big files on the floppies."
HIDE IT (http://www.annoyances.org/downloads/ftp/hideit.zip) - Hide running applications
KILL (http://helpdesk.kixtart.org/Download/Utils/KILL.EXE) - "Shuts down one or more running Windows NT tasks or processes" - For 2K/XP
KILL95 (http://helpdesk.kixtart.org/Download/Utils/kill95.zip) - Shuts down any processes running in memory
ZAP (http://helpdesk.kixtart.org/Download/Utils/zap.exe) - "deletes files that are either in use or otherwise cannot be deleted" - For 2K/XP *****
GRAPHICS CLIPPER (http://mardu.nohik.net/dl.php?down=0) (341kb) - "An easy-to-use screen capture utility which saves your screenshots automatically in JPEG, GIF, PNG or Windows Bitmap format"
GIF CLEAN (http://members.tripod.com/~mharing/gifclean.html) (379kb)- "Some Gif creation and/or animation tools embed comments stating information about the tools and sometimes that the GIF was created with shareware and isn&#39;t registered. These comments and data sections take up space and the smaller the image file the less time it takes to download and display on your web page. Gif Cleaner will remove these extraneous structures, making your GIF files leaner and cleaner"
SCREEN RECORDER (http://abone.turk.net/bulentb27/index.htm#screenrecorder) - "Captures images of the desktop, a window or a user specified region as an AVI file and BMP files. Or &#39;HandyCam&#39; can be used to capture screen"
STRIP FILE (http://www.nuetools.co.uk/download.html) (851kb) - "This innovative new utility strips the redundant information often contained in GIF, JPEG, PNG and HTML files, reducing their size by sometimes as much as 40 or 50%"
INFORMATION ADVISOR (http://www.belarc.com/Programs/advisor.exe) - Displays all your PC info (hardware/software) on one page
SKRUB THE WEB (http://www.skrubbeltrang.com/Tools.aspx?Tool=SkrubTheWeb) - "Search Microsoft Knowledge Base, MSDN, Google and Google Groups in a single click"
INTERNET 42 ALWAYS (http://www.iopus.com/download/42acplug_setup.exe) (389kb) - "ISPs often disconnect their users when there is no activity detected for a certain period of time. This software prevents that disconnection from happening. The “AC-Plug” sends periodic signals that will keep your Internet connection active. The program interface consists mainly of a single ON / OFF switch, it is extremely easy to use and requires no technical knowledge or configuration"
AD-AWARE (http://lavasoft.element5.com/support/download/) (1.7mb) - "Standard Edition is THE award winning, free, multicomponent detection and removal utility that consistently leads the industry in safety, user satisfaction, support and reliability"
AOL HIDER (http://www.simbak2k.net/exes/aolhider104.zip) (475kb) - "Excellent program that simply hides AOL into the task window in the bottom right corner. Makes it look like you have a real internet connection&#33; Compatable with all versions"
CIP (http://www.webattack.com/php/download.php?id=100774)- "Is the XPT&#39;s hosts file manager. It is by far the fastest, the most feature-rich, the most interactive and above all the most powerful product of its kind on the market today"
CLEANER (http://www.moosoft.com/thecleaner/) - "The most powerful trojan detection and removal program in the world. It can detect every known trojan and keep your system from being infected. Unlike anti-virus programs, The Cleaner can also remove trojans already in your computer"
www.freeproxy.ru&#092;download&#092;dns_resolver.exe] (http://h**p:&#092;&#092;DNS RESOLVER[/b] - "This program resolves list of DNS names to IP addresses or lookups IP to DNS"
FAST CACHE (http://www.analogx.com/files/fci.exe) - "Is a caching DNS server that runs on your local machine and handles any DNS request that your computer makes, from Internet Explorer to your favorite FTP client. Once a query is made, FastCache will override the normal timeout for the item with one that you specify, so instead of saving a query for a couple of seconds, it can save it for a couple of days. Now every time you ask for it again while it&#39;s in the cache, it gives it to you instantly"
FAST NET99 (http://www.webattack.com/php/download.php?id=101283) - "Is an advanced HOSTS file manager. It speeds up web surfing by using the Windows HOSTS file to cache IP addresses on your local machine. If the HOSTS file is created, your browser (and all other internet applications) will use it to lookup the DNS before contacting the remote DNS server of your ISP. Since the local lookup is faster, you ll save a few milliseconds with each request that can be resolved locally. FastNet99 can automatically check and update the IP addresses in the local HOSTS file, import your browser bookmarks from IE, Netscape and Opera as well as URLs from the browser cache. In addition, the program provides several useful internet utilities, all integrated with the rest of the features. They include an email checker, port scanner, tracereoute, popup killer, internet application launcher, IP Inspector and more"
FPIPE (http://www.foundstone.com/resources/proddesc/fpipe.htm) - "FPipe is a source port forwarder/redirector. It can create a TCP or UDP stream with a source port of your choice. This is useful for getting past firewalls that allow traffic with source ports of say 23, to connect with internal servers"
FPORT (http://www.foundstone.com/resources/termsofuse.htm?file=fport.zip) - "Reports all open TCP/IP and UDP ports and maps them to the owning application"
MAGIC MAIL MONITOR (http://www.geeba.org/magic/) (71kb) - Tiny POP3 compliant Mail Checker: the best choice for checking one or multiple account quickly, at periodic interval. Fully configurable, nice interface
MAILINATOR (http://www.mailinator.com/mailinator/Welcome.do) - "Have you ever needed an email .. NOW? Have you ever gone to a website that asks for your email for no reason (other than they are going to sell your email address to the highest bidder so you get spammed forever)?"
M&#036; JAVA VM (build 3809) (http://newplanet.org/prosac_upload/tmp/MSJavx86.5.0.3809.0.exe) - For legal reasons, M&#036; is no longer offering M&#036; Java VM and will stop supporting in January 2004
NET LIMITER (http://www.netlimiter.com/) [614KB) - "NetLimiter is an ultimate internet traffic control tool" *****
NESSUS (http://www.nessus.org/download.html) - "A security scanner which will audit remotely a given network and determine whether bad guys (aka &#39;crackers&#39;) may break into it, or misuse it in some way." For Linux ONLY
NETSCAN PRO (http://www.7forces.com/files/ns3setup.exe) (925kb) - "NETSCAN PRO is the real advanced TCP/IP monitoring utility which allows you to monitor all network activity at your computer. NETSCAN PRO 3.3 has a graphical and text interface which makes the program unique in its kind&#33; It&#39;s very easy to use&#33; All you do is run the program and see all established connections and opened ports at your computer"
NO ADS (http://www.simbak2k.net/exes/NASetup.exe) (215kb) - "Popup killing at its best&#33; This nifty utility is great when surfing websites. If a popup appears, open the program that is in the task tray and double click it and its gone. It will then store it and kill it in the future too. It is the first one I&#39;ve seen that supports AOL&#33; Even works great with programs like KaZaA"
PCS NETWORK TOOLS (http://www.learnxgroup.com/software/pcsnt.html) (1150kb) - "The PCS Network Tools is a collection of essential network diagnostic tools. These tools include DNS resolution which provides the IP Address, Hostname, Hostname Alias, Mailhost, and Name Server Records for an entered host. In addition, the following tools are also included: IP Scanner, Traceroute, Ping, Whois, Finger, Time, Quote of the Day, and extensive Localhost information. Local information includes the hostname, alias, IP address, MAC address, username, Primary Domain Controller, NetBIOS, memory, windows version and build, and other vital information"
PING PLOTTER (http://www.pingplotter.com/downloads/pngplt_1.exe) - "This exceptional GUI-based traceroute tool has features I’ve only seen in expensive industrial-strength tools, including dynamic tracking of changes in node response time — great for tracking a network outage across time. It’s also very fast&#33;" - For NT/2K/XP ONLY
PROXIRAMA (http://gaamoa.securibox.net/ProxyramaSetup.exe) (154kb) - "A tool for finding and testing proxy servers. it will test them for anonymity, speed, if it&#39;s a gateway proxy, https support (=chainability) and geographical location. furthermore, it can be used as a local proxy server that redirects your traffic through a arbitrarily long chain of anonymous proxies. it is small, fast, and easy to use"
SPYBOT - SEARCH & DESTORY (http://www.safer-networking.org/index.php?lang=en&page=download) (3.5mb) - "This free program can detect and remove spyware of different kinds from your computer. Spyware is a relatively new kind of threat that common anti-virus applications do not yet cover"
SPYWARE / ADWARE? (http://www.klboard.ath.cx/index.php?showtopic=58636) - Start here*****
TWEAKS ANSWERS THAT WORK (http://www.answersthatwork.com/) - "Through our support service we often come across problems caused primarily by programs running in the background, programs which in most cases start at the same time as Windows. Sometimes these programs are useful and need to be there; quite often, however, they are not needed, and in too many cases they cause severe problems." This is not a program, however it would be a great small utility if packaged.
ERUNT (http://home.t-online.de/home/lars.hederer/erunt/erunt.zip) - "Finally, a tool to back up the Win XP Registry&#33; (Microsoft didn’t include one with Win XP itself.)" - For NT/2K/XP ONLY NTRegOpt is included in the above file - This optimizes the Win NT/2K/XP Registry much as SCANREG /OPT does for Win98/ME.
HIJACK THIS (http://www.tomcoyote.org/hjt/hijackthis.zip) - "HijackThis examines certain key areas of the Registry and Hard Drive and lists their contents. These are areas which are used by both legitimate programmers and hijackers." - USE WITH CAUTION AND AT YOUR RISK
TWEAKUI (http://download.microsoft.com/download/winme/Install/1.0/WinMe/EN-US/Tweakui.exe) - THE BEST OF ALL THE PowerToys&#33; This should be standard on every (pre-XP) Windows computer whatsoever&#33; Many new features added.
XTEQ X (http://www.xteq.com/downloads/index.html#xset) - "It runs on any Windows version (incl. XP), is clutter-free, easy to use, extensible, powerful, covers any aspect of your computer and has more configuration options than any other tweaker"
UTILITIES DOS HERE (http://user.tninet.se/~fgo483j/files/ch20.zip) (197kb) - "An Explorer Shell Extension to provide easy and quick access to the DOS Prompt in the requested folder"
RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.
updated

mystique
09-14-2003, 09:10 AM
:rolleyes: thanks a ton&#33;

poopauline
09-14-2003, 10:21 PM
to nikita, how do we do da firewall settings to improve ervything?

Dapadipz
09-15-2003, 06:12 PM
Nice Set Of Tips There ;)

nikita69
09-15-2003, 09:43 PM
HOW TO BLOCK ADS AND MAINTAIN THE SUPERTRICK (hosts file - example 1) Get the original FILE (http://www.home.no/k-lite/HOSTS.zip) KL++ came with (if u don&#39;t have it)
Get a list of updated Ad sites from ACCS-NET (http://www.accs-net.com/hosts/get_hosts.html), SomeoneWhoCares (http://someonewhocares.org/hosts/), MVPS (http://www.mvps.org/winhelp2002/hosts.txt), Blood Image (http://www.bloodimage.com/hosts_bak), EveryThingIsnt (http://everythingisnt.com/Hosts) and if you want more then always Google here (http://www.google.com/search?hl=en&ie=ISO-8859-1&q=hosts+file) and here (http://www.google.com/search?hl=en&ie=ISO-8859-1&q=windows+hosts+file)
Update file either manually or use HOSTS Manager (http://www.aldostools.com/hosts.html) by simply adding the files from above.
While visiting the sites listed above, enhance your knowledge about HOSTS file and utilize it properly to improve the Ad Blocking on your PC. A sample of an example INFECTED hosts file: # Copyright © 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a &#39;#&#39; symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host

127.0.0.1 localhost
66.159.20.80 moviesheaven.com
66.159.20.80 vidsvidsvids.com
66.159.20.80 my-teensex.com
66.159.20.80 nobullshitmovies.com
66.159.20.80 watch-xxx.com
66.159.20.80 wolrdteenparadise.com
66.159.20.80 www.google.com
66.159.20.80 worldsex-archives.com
66.159.20.80 ww2.link-o-rama.com
66.159.20.80 link-o-rama.com
How to Clean manually - simply remove anthing below "127.0.0.1 localhost" or some people have it "0.0.0.0 localhost": # Copyright © 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a &#39;#&#39; symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host

127.0.0.1 localhost
WINDOWS UPDATE NOTE: Akamai.net is used by Microsoft to host the Windows Update features, known as the "AutoUpdate" and "v4.windowsupdate.microsoft.com [63.209.144.181]". In addition, Akamai.net also hosts others, such as ad/spware websites.

So if either feature of the Windows Update is not working and/or you get "Windows Update Failure - Error Code 0x800A138F". Then close ALL broswers&#39; windows, open hosts file, press {CTRL+F}->look for this address "a248.e.akamai.net [63.251.152.201]", without the brackets, and delete it then save and exit. Now try <span style='color:green'>https://a248.e.akamai.net/v4.windowsupdate.microsoft.com/getmanifest.asp (https://a248.e.akamai.net/v4.windowsupdate.microsoft.com/getmanifest.asp) again. If it works, then go to http://windowsupdate.microsoft.com (http://windowsupdate.microsoft.com)and get your Updates. If it still does not work then your company or your ISP may be blocking this hostname. Or some anti-ad/spy programs may have this address blocked, such as SPYBLOCKER (http://spyblocker-software.com/IPB/index.php?showtopic=420&st=0&#entry1820).

DO NOT DELETE ALL AKAMAI.NET SITES, OTHERWISE YOU WILL END UP WITH AD/SPY SITES POPING BACK.
Below is a small sample of hundreds of the Akamai.net servers that process ad/spy sites: 0.0.0.0 a08.g.akamai.net
0.0.0.0 a1.g.akamai.net
0.0.0.0 a10.g.akamai.net
0.0.0.0 a100.g.akamai.net
0.0.0.0 a100.g.akamaitech.net
0.0.0.0 a1016.g.akamai.net
0.0.0.0 a1028.g.akamai.net
0.0.0.0 a1032.g.akamai.net
0.0.0.0 a104.g.akamai.net
0.0.0.0 a1040.g.akamai.net
0.0.0.0 a1061.g.akamai.net
0.0.0.0 a1066.g.akamai.net
0.0.0.0 a108.g.akamai.net
0.0.0.0 a11.g.akamai.net
0.0.0.0 a1100.g.akamai.net
0.0.0.0 a111.g.akamai.net
0.0.0.0 a1156.g.akamai.net
0.0.0.0 a1168.g.akamai.net
0.0.0.0 a117.g.akamaitech.net
0.0.0.0 a1172.g.akamaitech.net
0.0.0.0 a1180.g.akamai.net
0.0.0.0 a1196.g.akamai.net
0.0.0.0 a12.g.akamai.net
0.0.0.0 a12.g.akamaitech.net
0.0.0.0 a1208.g.akamai.net
0.0.0.0 a1224.g.akamaitech.net
0.0.0.0 a1228.g.akamai.net
0.0.0.0 a1234.g.akamai.net
0.0.0.0 a1240.g.akamaitech.net
0.0.0.0 a1252.g.akamai.net
0.0.0.0 a1261.g.akamai.net
0.0.0.0 a1284.g.akamai.net
0.0.0.0 a13.g.akamai.net
0.0.0.0 a1300.g.akamai.net
0.0.0.0 a1316.g.akamai.net
0.0.0.0 a1356.g.akamai.net
0.0.0.0 a1360.g.akamai.net
0.0.0.0 a1380.g.akamai.net
0.0.0.0 a14.g.akamai.net
<span style='color:red'>FINAL NOTE: If you open the hosts file (C:&#092;WINDOWS&#092;system32&#092;drivers&#092;etc) and see most if not all addresses have an IP addressess other than 127.0.0.1 or 0.0.0.0 then RUN windows update then an Anti-Virus program, then go back to my first point.
The Fortnight virus makes changes in your hosts file: C:&#092;WINDOWS&#092;system32&#092;drivers&#092;etc&#092;hosts or C:&#092;WINNT&#092;system32&#092;drivers&#092;etc&#092;hosts. The Windows hosts file serves to associate host names with IP addresses. The hosts file dropped by this virus contains of a list of URLs, each associated with a bogus IP address.
REFERENCE: Microsoft Security Bulletin MS03-011 (http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-011.asp) and HOSTS file (http://www.klboard.ath.cx/index.php?showtopic=62696)</span></span>
Now continue to example 2 (http://www.klboard.ath.cx/index.php?showtopic=64831&st=30&#entry567015)
RELATING POSTS: comming soon...

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.
updated

javakel
09-16-2003, 06:16 AM
Originally posted by nikita69@7 September 2003 - 00:51

once u stop the search, if the file u want has a lot of resources, the click on the plus sign
highlight the highest bw user, right click and "find more for this user"


nikita,

I was wondering if you could clarify this part a bit: what exactly does "find more for this user" do? I realize that it&#39;s supposed to make things faster somehow, but I don&#39;t understand how it does this.

porjay
09-16-2003, 11:34 AM
don&#39;t be a jackass java he ment find more sources for this Download we should be thanking this person for sharing his knowledge not mock him for his mistype...<_<

Nice work Nikita Keep up the good work &#33;&#33;

nikita69
09-17-2003, 09:47 PM
HELPFUL LINKS:
Please note that sometime you may need to try several of these tips to get to a solution. KL++ RELATED Privacy Protection - IMPORTANT
Are you afraid of the entertainment industry? Does your country have stupid copyright laws? You don&#39;t share because you are afraid you get caught for doing so? The newest versions of Kazaa Lite (2.10 build 3 and newer) have the solution for you&#33; It is now possible to prevent other people from listing your shared files (find more from same user). Go to Options -> More Options. There you can enable the option to prevent people from listing your shared files.
There is just one little downside to this, because it may let people think that you are not sharing any files. But for some people privacy is what counts. Enabling the option doesn&#39;t mean that you don&#39;t share files anymore&#33; People just can&#39;t list your shared files anymore. In fact more people should be able to start sharing because of this. 5 Reasons Not To Be Afraid Of The Riaa (http://www.klboard.ath.cx/index.php?showtopic=45769) - Proxy Servers (http://www.klboard.ath.cx/index.php?showtopic=61101&hl=) (thx PAUL) - For A L L That Use P2p Or Share Files, The Time Is Now - It Must End (EFF) (http://www.klboard.ath.cx/index.php?showtopic=56114&view=findpost&p=401831) - Using Proxies With Kazaa (kl++) (http://www.klboard.ath.cx/index.php?showtopic=62694) thx REALITY
Working Urls For The Main Website (http://www.klboard.ath.cx/index.php?showtopic=67549)
Working Urls for the DOWNLOAD site (http://www.klboard.ath.cx/index.php?showtopic=43801) - IMPORTANT
Forum Rules (http://www.klboard.ath.cx/index.php?act=boardrules) - IMPORTANT
Online KL++ FAQ (http://doa2.host.sk/) - Downloadable F.A.Q (http://doa2.host.sk/faq.chm) (right-click and &#39;save target as&#39;) - IMPORTANT
New(bie) F.a.q (http://www.klboard.ath.cx/index.php?showtopic=66396) - IMPORTANT-thx sharedholder
How To Post Verifieds, Sig2Dat and K-Sig Tutorials (http://www.klboard.ath.cx/index.php?showtopic=3462) - IMPORTANT-thx Paul
Strange Sound, Screeching Songs (http://www.klboard.ath.cx/index.php?showtopic=49358) - IMPORTANT
Can&#39;t Connect? - TRY HERE (http://www.klboard.ath.cx/index.php?showtopic=66157&view=findpost&p=488895), OR HERE (http://www.klboard.ath.cx/index.php?showtopic=65374), OR HERE (http://www.klboard.ath.cx/index.php?showtopic=63829)
Only 1 User Online? - TRY HERE (http://www.klboard.ath.cx/index.php?showtopic=58943)
.dat file problem? - TRY HERE (http://www.geocities.com/drspud11/)
Are there any MAJOR bugs with the latest KL++ version?
- No. If you are having problems, then try all solutions from the problems section of the FAQ and search on the forum for a similar problem, because there is a 99% chance that there already exist a topic about it. From the man himself, PAUL.
http://www.chinkii.com/uploads/album/misc/Nikita69_KaZaA_Lite++Volun.JPG_http://www.chinkii.com/uploads/album/misc/Nikita69_KaZaAVolun.JPG
PC stops responding, shuts down or reboots? TRY HERE (http://www.klboard.ath.cx/index.php?showtopic=64717&hl=freeze), OR HERE (http://www.klboard.ath.cx/index.php?showtopic=64470&hl=freeze), OR HERE (http://www.klboard.ath.cx/index.php?showtopic=63852&hl=freeze), OR HERE (http://www.klboard.ath.cx/index.php?showtopic=63558&hl=freeze), OR HERE (http://www.klboard.ath.cx/index.php?showtopic=67023&hl=shuts+down), OR HERE (http://www.klboard.ath.cx/index.php?showtopic=64353&hl=shut+down), OR HERE (http://www.klboard.ath.cx/index.php?showtopic=66967&hl=reboot)
Did U pay for KL++? TRY HERE (http://doa2.host.sk/subscription.htm)
KL++ and Linux - TRY HERE (http://www.klboard.ath.cx/index.php?showtopic=32279), AND HERE (http://www.apcmag.com/apc/v3.nsf/0/E7003DC6273B392CCA256D890024462A)
ALL TOOLS (http://www.all-nettools.com/) - "The starting point where you can find dozens of the most useful tools available online."
OTHERS RELATED DNS STUFF (http://www.dnsstuff.com) - This site will provide you with DNS Timing, WHOIS Lookup, Abuse Lookup, WHOIS Search, URL deobfuscator, Free E-mail Lookup, Spam database lookup, Reverse DNS lookup, IPWHOIS Lookup, NetGeo IP Lookup, IP Routing Lookup, CIDR/Netmask Lookup, DNS lookup, Tracert, Ping, ISP cached DNS lookup & Decimal IPs
MAILINATOR (http://www.mailinator.com/mailinator/Welcome.do) - "Have you ever needed an email .. NOW? Have you ever gone to a website that asks for your email for no reason (other than they are going to sell your email address to the highest bidder so you get spammed forever)?"
Online JPEG compressor (http://www.chami.com/jc/) - "Can help you to make your pages load faster by reducing the size of your JPEG files. It will display multiple versions of a given image compressed at different levels for you to pick the smallest image at the best possible image quality you require"
PARANOIA REMAILER (https://mixmaster.autistici.org/cgi-bin/mixemail-user.cgi) - "Mail, News, Type2 & SSL Encryption. An anonymous remailer is a computer which has been configured to run remailer software. This software is a specialized kind of email server software. Unlike average email server which goes to great lengths to log all incoming/outgoing traffic and add identifying and traceable info to its outgoing mail (in the form of headers) remailer software ensures that outgoing mail has been STRIPPED CLEAN of any identifying information&#33; Thus the name &#39;anonymous&#39; remailer"
Management of Internet Names and Addresses (http://www.ntia.doc.gov/ntiahome/domainname/6_5_98dns.htm#N_1_)
RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.
updated

nikita69
09-18-2003, 05:52 AM
HOW TO TEST WHY YOU CAN ONLY DOWNLOAD FROM ONE USER? Drop any firewalls, exit completely
Close Peer Guardian and alike
Leave ONLY your Anti-Virus running
Do a port change again in KL++. Go to 65000 for now and see if it helps. It does incredible things for me
Do not block bad IP ranges- this is temporary, for testing purposes
Don&#39;t disable 1214
Change max uploads to 3
Change downloads to 6, increase this slowly if you get results
No extra idle bandwidth
Turn off Auto Search
Now do a search for shania twain- yeah whatever, but there are a million sources&#33;
Let the search run for at least 2 minutes
Stop the search and select a variety of those results with medium bandwidth and bitrate. about 20 different files for now, both video and audio
Open a command prompt with NetScan Pro 3.3 (http://download.com.com/3001-2085-10135267.html) installed
Enable logging in NetScan Pro 3.3
Close and reopen NetScan
Now view logs if there are any active connections showing.
Get any remote IP&#39;s and in the command prompt, type netstat -s 5 to show statistics. do a copy save for future refference
If you&#39;re familiar with ping, use the command prompt. If not, get a copy of PCS Network Tools by O&#39;Reilly (http://www.learnxgroup.com/software/software.html) and enter the IP&#39;s shown in the NetScan Pro logs. try the ping 3 times for each one and record results
If you have NeoTrace (http://download.com.com/3120-20-0.html?qt=neotrace&tg=dl-2001), do a trace route on each IP that connects. record the hops info and ping times, packet loss
If you still aren&#39;t getting connections, It&#39;s time to go into the dats for IP info and follow the ping and traces above
If none of this helps "get" sources, at least you&#39;ll have the stats needed to properly analyze what&#39;s happening and we can go from there.
thx Balamm

RELATING POSTS: comming soon...

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.
updated

sharedholder
09-18-2003, 08:03 AM
HOW TO DO A CLEAN INSTALL AFTER EXPERIENCING PROBLEMS WITHOUT SOLUTIONS?
Close all KL++ related tools (avipreview, kdat, ksig, etc..)
Uninstall KL++
download from www.k-lite.tk - select "Save As" not "Open"
Start installing KL++
Select the option of "Delete all Kazaa Lite registry keys before installing [This will reset all settings to DEFAULT]"
Also select the option of "Supertrick [This will block a lot of advertising on websites]"
Start KL++ and enjoy


You forget some things ,just take a look. ;)

Credit goes to Phalkon30


How to clean install Kazaa Lite K++
Why did I throw this together? I&#39;ve had to explain a clean install so many times lately...so from now on I will just refer to this thread, I suggest others do to to save time, and keep a uniform way of clean installing
---------------------------------------------------------------------------------------
Why clean install? It can fix many problems with kazaa, for instance if you are getting error messages, or kazaa will refuse to start. It is also a good idea to clean install with every new version, you could just install over an older version, but this will sometimes cause problems, I recommend a clean install
---------------------------------------------------------------------------------------
How do I perform a clean install?

1). Back up all downloaded files, and partially downloaded .dat files (I would recommend copying them to your desktop until K-lite is reinstalled)

2). Uninstall kazaa lite completely through the ad/remove programs thing in the control panel

3). Delete the programs folder (usually C:&#092;Program Files&#092;Kazaa Lite)
4). Clean all traces of K-Lite from the registry using a program like RegCleaner (WARNING, editing the registry can be dangerous if you don&#39;t know what you&#39;re doing, make sure to USE YOUR HEAD, if you removed something you didn&#39;t want to, don&#39;t worry, just use the back up in this program)

5). Do a virus and spyware scan using the latest deffenitions, remove offending files (Spybot) (AdAware)

6). Go to www.k-lite.tk and download the latest NON BETA version of Kazaa Lite K++

7). Make sure nothing else is running on your computer (like other file sharing applications), then install with the settings you like

8). Copy downloads back to downloads folder (usually C:&#092;My Shared Folder)
That should do it, hopefully....

nikita69
09-18-2003, 08:21 AM
thx sharedholder, all wise inputs are always welcomed.

[B][O][T]
09-18-2003, 08:36 AM
Great work nikita69, this topic is now pinned.

BOT

nikita69
09-18-2003, 06:31 PM
HOW TO DOWNLOAD FASTER? (example 2) Open KaZaa Lite.
Open KaZuperNodes
Press F6 for Favorites
Highlight ALL IPs and click http://image.uploader.net/uploaded/CI18Q60.jpg "Delete"
Press F5 for KaZaa Supernode List
Click http://www.fasttrackhelp.com/development/ftfakes/kazupernodes/images/check.gif "Check Status"
Upon completion, sort by Status
Highlight ONLY the IPs with "Supernode" status
Press Ctrl+F for "Add to Favorites"
Click http://www.fasttrackhelp.com/development/ftfakes/kazupernodes/images/check.gif "Check Status"
Upon completion, sort by Status
Highlight and delete any IP that does not have "Supernode" status
Sort by "Response Time"
Delete any supernode that has a response time of higher than ZERO
Click http://www.fasttrackhelp.com/development/ftfakes/kazupernodes/images/locate.gif to "Localize"
Sort by Country, State or City
Hold down the Shift key while pressing http://www.fasttrackhelp.com/development/ftfakes/kazupernodes/images/UseSN.jpg "Connect to new Supernode" (this step allows you to switch supernodes without disconnecting your downloads/uploads)
Go back to KaZaa Lite and check the speed of your downloads
If it&#39;s faster, then go to KaZuperNodes, highlight that IP and Press CTRL+L to add to your "SuperList"
Make sure you save the "SuperList" and next time you want to another IP to to that "SuperList", open the file first
If it&#39;s not fast enough for YOU, then jump to another supernode until you find the fastest for YOU
The following steps are another or additional tips to maintain those "Favorite/SuperList" supernodes (please note that it can be tedious to maintain): Add the fastest Supernodes, from above, found from the nearest location to YOU to Favorites or SuperList and export IPs and name them "My Best SN.kzn or .kzf" format
The following day, load "My Best SN" file and check their status
Delete the "Unknown" IPs
Leave the IP&#39;s with "Client" status, because in most cases they will come around again to become "Supernode"
Continue doing the above steps for couple or more days
After that, you would have a list of Supernodes who are in most cases up most if not all the times
Continue to update it every-now-and-then
Note: The following steps are based on the latest KaZupernodes version (http://www.fasttrackhelp.com/development/ftfakes/kazupernodes/)
Note to KaZuperNodes programmers: Use the above steps as an example to eliminate most of these steps by adding them to context menu or shortcut

RELATING POSTS: comming soon...

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.

sharedholder
09-18-2003, 07:17 PM
Originally posted by nikita69@18 September 2003 - 18:31
HOW TO DOWNLOAD FASTER? (example 2)
Open KaZaa Lite.

Open KaZuperNodes

Press F6 for Favorites

Highlight ALL IPs and click http://image.uploader.net/uploaded/CI18Q60.jpg "Delete"

Press F5 for KaZaa Supernode List

Click http://www.fasttrackhelp.com/development/ftfakes/kazupernodes/images/check.gif "Check Status"

Upon completion, sort by Status

Highlight ONLY the IPs with "Supernode" status

Press Ctrl+F for "Add to Favorites"

Click http://www.fasttrackhelp.com/development/ftfakes/kazupernodes/images/check.gif "Check Status"

Upon completion, sort by Status

Highlight and delete any IP that does not have "Supernode" status

Sort by "Response Time"

Delete any supernode that has a response time of higher than ZERO

Click http://www.fasttrackhelp.com/development/ftfakes/kazupernodes/images/locate.gif to "Localize"

Sort by Country, State or City

Hold down the Shift key while pressing http://www.fasttrackhelp.com/development/ftfakes/kazupernodes/images/UseSN.jpg "Connect to new Supernode" (this step allows you to switch supernodes without disconnecting your downloads/uploads)

Go back to KaZaa Lite and check the speed of your downloads

If it&#39;s faster, then go to KaZuperNodes, highlight that IP and Press CTRL+L to add to your "SuperList"

Make sure you save the "SuperList" and next time you want to another IP to to that "SuperList", open the file first

If it&#39;s not fast enough for YOU, then jump to another supernode until you find the fastest for YOU

The following steps are another or additional tips to maintain those "Favorite/SuperList" supernodes (please note that it can be tedious to maintain):
Add the fastest Supernodes, from above, found from the nearest location to YOU to Favorites or SuperList and export IPs and name them "My Best SN.kzn or .kzf" format

The following day, load "My Best SN" file and check their status

Delete the "Unknown" IPs

Leave the IP&#39;s with "Client" status, because in most cases they will come around again to become "Supernode"

Continue doing the above steps for couple or more days

After that, you would have a list of Supernodes who are in most cases up most if not all the times

Continue to update it every-now-and-then

Note: The following steps are based on the latest KaZupernodes version (http://www.fasttrackhelp.com/development/ftfakes/kazupernodes/)

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.
OOOOOOOOOOOOOOOO&#33;&#33;&#33; :o :o :o :o Nikita69,you really rock&#33;&#33;

nikita69
09-18-2003, 07:34 PM
thx shareholder. yet it&#39;s my humble experience and some wise posts that are easily ignored. i tend to always find myself looking at the opposite direction of people. :)

KazaaLiteUser99
09-18-2003, 09:14 PM
Hey nikita69 you have posted some cool tips. I have got a little problem. I have high speed internet and my download speed is very slow. I am downloading a video file and the size is 667630kb. It is taking me over 20 hours to download and i have been trying all of the speed up softwares. The speedup softwares do not work and some of your tips do not work. I was woundering if you could help me buy trying to make the file size - 667630kb smaller?. I would be very grateful if you could help me.

Thanks

nikita69
09-18-2003, 09:24 PM
Originally posted by KazaaLiteUser99@18 September 2003 - 21:14
Hey nikita69 you have posted some cool tips. I have got a little problem. I have high speed internet and my download speed is very slow. I am downloading a video file and the size is 667630kb. It is taking me over 20 hours to download and i have been trying all of the speed up softwares. The speedup softwares do not work and some of your tips do not work. I was woundering if you could help me buy trying to make the file size - 667630kb smaller?. I would be very grateful if you could help me.

Thanks

Noobs, please put ur question in the QUESTIONS sections not here. thx.
thx. please post it in QUESTIONS or send it via PM. btw, did u read these tips?

the_painter
09-19-2003, 09:57 PM
CHEERS MARRA :-) .

nikita69
09-20-2003, 08:31 PM
HOW TO DOWNLOAD FASTER? (example 3)
The following problems may occur in your case unless you make specific configuration changes (PC, KL++, Router and others related): Cable/DSL modem connection will be continually hitting the rate cap, leading to apparent poor bandwidth for KL++
Ping times will look bad
Traceroutes will look bad, even on the very first hop to the local UBR
Online games will show terrible latency when run with KL++ or any P2P
Firewall might detect hundreds or thousands of incoming connection attempts
If your PC is behind a NAT router, the P2P application might not work properly
PC might be acting as a SuperNode server, passing on search requests from other KL++ users
The problem of hitting the rate cap is the same in nature as for on-line gaming. The KL++ sees a network connection via an ethernet or USB interface and assumes a fast network such as a LAN. It may not realize that the Cable/DSL modem connection will impose a rate cap. As soon as KL++ traffic hits the rate cap (especially the upload rate cap), ping times will go through the roof, and other applications will suffer. The general strategy to avoid this is: Configure the internal rate cap found in KL++ Options to be substantially less than the Cable/DSL modem upload rate cap
If it doesn&#39;t, make sure that you can totally close down the any application, such as online games
On a low bandwidth cable/DSL connection (e.g. 32 kbps upload cap or less), you must turn off SuperNode support
KL++ will expect to receive incoming connections from other users
If you run a firewall or a NAT router, you must configure them to accept those connections, otherwise KL++ might not work properly, and/or your firewall log might be inundated with messages about attempted connections
Having said all of that, there isn&#39;t a program, that I&#39;m aware of, that controls your internet traffic better than NETLIMITER (http://www.klboard.ath.cx/index.php?showtopic=64831&view=findpost&p=489994)
TIP: If your Cable or DSL service suddenly have connection problems, slow or failed loading of some webpages, or low upstream/downstream speeds. THEN completely turn off the computer that is connected to your cable modem. Pull out the plug to the cable modem power cord so that no electrical power goes to it. Wait 10 - 15 minutes. Plug the power cord back in. Allow the cable modem 2 - 3 minutes to reset. Turn the computer back on. In most cases, this will restore your cable connection back to normal.Note: The following steps are based on the Cable/DSL connection, further detail can be explained HERE (http://www.klboard.ath.cx/index.php?showtopic=68143&st=0)?. thx Switeck

RELATING POSTS: comming soon...

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.
updated

nikita69
09-21-2003, 05:04 PM
KL++ TOP 20
MOST REPEATED QUESTIONS, "PROBLEMS" AND "CONCERNS" KL++ USERS TALK ABOUT, YET MISS/FAIL TO SEARCH THE BOARD TO FIND THE POSTED ANSWERS/FACTS: KL++ keeps saying "connecting" and doesn&#39;t connect
Why do the songs I download have this screeching noise in it?
Corrupt Download- how to correct corrupt download?
Where Are My Files?
Participation Level-Can it go over 1000?
KL++ has major bugs, I&#39;m sure of that.
Playing Music And Video-files-Kazaa is not playing my files&#33;
Can&#39;t Choose A Supernode&#33;
Only One User?-I am the only user logged on&#33;
Whats The Best Port Connection?
Avi Preview-won&#39;t play the movies
Why Do My Files Never Get Shared?
Can I Search For A User?
Kazaalite.kpp Is Trying To Send Email?
The Red Cross Problem-firewall problem?
I keep getting red x&#39;s in my search results. What does it mean?
What do I do with a .bin file?
I have a high speed internet connection, why are my downloads so slow?
When a file has many sources, why do I end up downloading from only two?
I just activated my Kazaagold, how do I connect?
Note: Links to the above list will be provided soon to better assist you. thx SH, EJ, Lam & MM

RELATING POSTS: Kazaa Lite Board -> Kazaa Lite Related (http://www.klboard.ath.cx/index.php?c=2)

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.

aldo
09-21-2003, 11:09 PM
HOW TO KNOW IF YOUR DOWNLOAD IS A FAKE BEFORE IT FINISHES?
SAVE TIME AND LOT OF BANDWIDTH DETECTING FAKES EARLY. USEFUL ONLY FOR VERY LARGE FILES

1- For video files (AVI, DIVX, MPEG, etc), use AVI Preview+.
- From the Traffic tab, right click on the download and select Preview with -> AVI Preview.
- If AVI Preview doesn&#39;t open the movie, use VideoLAN (http://www.videolan.org) as your second option.
- Include both AVIPreview and VideoLAN in KL Extensions Tools menu.
- If the movie is a fake, stop the player and cancel the download.

2- For ISO images and compressed files (EXE, ZIP, RAR, etc), use KDat and WinRAR.
- Open KDat and find the file name of the .DAT file in "My Shared Folder" for the file that you want to verify.
- Then open "My Shared Folder", select the .DAT file and make a copy of it (copy & paste in the same directory). This step is required, because the .DAT file is still in use by Kazaa Lite.
- Rename the new copy of the .DAT file to VERIFY.RAR and double click on it (it other words, open it with Winrar (http://www.rarlabs.com)).

You probably will be able to read the table of content of the compressed file or ISO, and verify if the file is a fake or not. In some cases you will be able to repair the RAR and extract some files even when the full file haven&#39;t downloaded completely.

This also let you identify if the compressed file has password.

NOTE: Remember to delete VERIFY.RAR

3- For audio files (MP3, WMA, etc), use the internal preview of Kazaa/Kazaa Lite K++.
- If the internal preview doesn&#39;t work, open KDat to identify the file name of the .DAT file in "My Shared Folder" for the file that you want to verify.
- Then open "My Shared Folder", select the .DAT file and make a copy of it (copy & paste in the same directory). This step is required, because the .DAT file is still in use by Kazaa Lite.
- Rename the new copy of the .DAT file to VERIFY.MP3 and open it with Winamp2 (http://classic.winamp.com).

NOTE: Remember to delete VERIFY.MP3

Due audio files are normally small and these steps require a couple of minutes, this last tip is only useful for user with slow connection, MP3 downloading at slow rate or downloads of full albums in a single MP3.

You can skip the KDat step in tips #2 and #3 if you only have one download in progress (a single .DAT in "My Shared Folder"). If have a few downloads you can also guess the .DAT by the size of the file.

___
Aldo Vargas
http://www.aldostools.com

nikita69
09-21-2003, 11:15 PM
Thank you aldo for these tips, i&#39;ve been meaning to cover that topic. great job and please feel free to continue this trend. I&#39;m certain this topic is helping KL++ users enhance their knowledge. :)

nikita69
09-22-2003, 07:16 PM
http://hometown.aol.co.uk/Lynne1977uk/bump.gif

nikita69
09-22-2003, 11:17 PM
ONE LINERS THAT CAN HELP YOU RESOLVE/UNDERSTAND YOUR PROBLEM: When computer crashes while KL++ is running, some if not all downloads became corrupted
Kazaa Lite will delete corrupted download when it starts, because it cannot resume them
http://www.umass.edu/rso/hasa/img/under-construction.gif

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.

nikita69
09-23-2003, 01:09 AM
DEFAULT SETTINGS IN KL++ THAT DO NOT NEED TO BE CHANGED:
The purpose of this list is simple, many new users, for whatever reason they change some of these settings that could affect their download/upload speed or their privacy protection. Username - These are not unique
Email - Fake e-mail address
Country - This setting is not important
Shared Folder - If you change your download location and have some unfinished downloads, move all of them to the new folder, but don&#39;t delete the old folder yet till all have finished downloading
Maximum number of search results - This is the maximum amount of search results returned for a single search. The value should be between 1 and 200 (default)
Do not function as a supernode - If you disable it (default), then you could be a supernode once in a while
Filter file types that can potentially contain a virus - This will filter out ALL filetypes that could possibly contain a virus or other malicious software
Filter out files that I cannot download due to firewalls - This will filter out files from the search results that are shared by people who are behind a firewall that is configured to block uploads
Filter bogus music and video files - This will filter out files that have a file-extension of a video or music file, but aren&#39;t actually real video or music files
Network name - This is what will appear behind the @ after your username
Other users can&#39;t cut in line - This will prevent people with a high PL from booting people with a lower PL out of your uploads. That way you will be uploading at a first come first serve basis. This will result in a higher amount of succesful uploads
Block Bad IP Ranges - It mostly blocks organisations that try to monitor illegal filesharing activity or that try to spread fake files on the network
Users can&#39;t get a list of all your shared files - This will prevent other people from being able to see a list with all of your shared files. This is a very powerful option in the battle against the organisations that try to monitor filesharing activity. It prevents them from acquiring any evidence
Disable port 1214 - This improves your privacy and security. Note that this option only works if you have set a different port as 1214 for incoming connections (firewall tab)
Limits - Here you can set the maximum number of active downloads and uploads Dial-up users should have between 2 and 6 downloads and 2 uploads
Users with basic cable and ADSL variants should have between 4 and 8 downloads and between 3 and 6 uploads
Users with fast cable and ADSL variants should have between 6 and 10 downloads and between 5 and 10 uploads
Users a high speed connection (corporate LAN, university networks) should have between 10a nd 16 downloads and between 10 and 16 uploads
NOTE: It is not a good idea to set the number of uploads to unlimited. This will result in many very slow uploads. It is better to set it at a value of for example 10
REFERENCE: KL++ v2.4.3 FAQ (http://doa2.host.sk/help/faq.htm)

RELATING POSTS: comming soon...

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.
updated

nikita69
09-24-2003, 06:30 PM
BUMP

Rat Faced
09-24-2003, 06:39 PM
Nikita,

the tips are great....but why arent you adding them to your pinned topic?

PM a MOD, when your ready to add them there....

nikita69
09-24-2003, 07:06 PM
I have been doing so, except this was left as is for quick linking to the tips needed for some new users and incase other members wanna add to it and they have. anyways, feel free to close it, if ud like. :)

lazman
10-03-2003, 03:47 AM
hi,

i looked through your whole kazaa tips/problems section and i still can&#39;t find anything related to my problem with the queued files that you responded to a few days back.
i&#39;m wondering why my files automatically go to "queued", i&#39;ve already checked my max # of downloads and i&#39;ve also tried resuming the d/l. my kazaa connection is also connected.
you seem to know what you&#39;re talking about and any help would be appreciated&#33;&#33;&#33;&#33;&#33;&#33;

thanks in advance&#33;

nikita69
10-03-2003, 06:53 AM
I remember, let continue the troubleshoot in the topic u already created. I left u a note there. We&#39;re trying to keep the TIPS section w/o question. thx for understanding. :)

nikita69
10-05-2003, 10:56 PM
HOW TO AVOID FAKE MUSIC FILES? (two examples) VISUAL
http://www.divxland.org/images/FakesDetect.gif

The following are typical characteristics of fake/unwanted music files: The amount of users with the same copy is extremely big.
The file name or title name contains numbers like (1) or whatever between ().
The length/file size is too big (or too small) compared with normal songs, witht the rest of the files, and/or the lenght you suppose it may have.
The same user is repeatedly sharing copies of the same file (typically with altered names).
The length/file size of supposed copies of the same file differs from user to user.
The bandwidth of the file is extremely big compared to the rest. The download is really fast (if you reach a stable 9-10 Kbps with a 56 K modem, this is highly a fake MP3).
When downloading a file, you notice it is restarted at some point (rare).
PROGRAMS MP3 Checker (http://www.geocities.com/ian_l_williams/MP3Checker.zip) - "This program is designed to rapidly scan lots of MP3 for RIAA corruption, the so called "Screechy MP3&#39;s" syndrome, it can be very useful for checking large music collections"
http://www.chinkii.com/uploads/album/misc/mp3_checker_ilw.jpg
MP3 Autoscanner (http://www.geocities.com/ian_l_williams/MP3CheckerCmdLine.zip) - "This small command line program is designed to work with the KLExtension&#39;s file organiser so that as soon as an MP3 is downloaded it is scanned and if bad is sent to a different folder."
http://www.geocities.com/ian_l_williams/autoscansetup.jpg
CREATE CLEAN FILES GUIDE FOR MAKING HIGH QUALITY MP3 FILES (http://www.klboard.ath.cx/index.php?showtopic=22763)
RELATING POSTS: comming soon...

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.

CREDIT/OTHER:Thx to ilw, Gre1, Andrex, cborga1985 and everyone posted <span style='color:green'>HERE (http://www.klboard.ath.cx/index.php?showtopic=62174&st=0) </span>

nikita69
10-08-2003, 06:55 AM
BUMP

EDIT: some error posting a new tip, changed to BUMP

nikita69
10-08-2003, 06:56 AM
HOW TO DOWNLOAD FASTER? (example 4) Limit your upload bandwidth to something SUSTAINABLE for your connection. You may have 256 kilobits/sec (32 KILOBYTES/sec) max upload bandwidth -- but things will go very badly if you try to set uploads to that speed.
Try to limit 1 upload max PER every ~32 kilobits/sec (4 KILOBYTES/sec) you give to uploads. So at 24 or 32 kilobits/sec, it&#39;s best to leave uploads to 1.
1-3 uploads at 64 kilobits/sec (depending on filesize and demand for it.) ~3-5 at 128 kilobits/sec.
~5-10 at 256 kilobits/sec.
You can use MORE uploads at once if almost all of your files are small and can still transfer quickly (like within an hour.) But if you&#39;re sharing 500+ MB movies, uploading at <4 KB/sec PER upload spot means you&#39;ll probably NEVER finish an upload of one of them.
Max downloads seems to have at least a minor influence on how many sources PER download. KL++ WILL try at once if more than 1 download is already going. If you don&#39;t expect lots of sources PER download AND the files you&#39;re looking for is very rare, then you can set max downloads as high as the 50 max IF you have at least a 1 megabit connection. You might also gain some improvement by reducing sources per download to 4-10, because KL++ may have to be using memory based on the POTENTIAL of 20+ sources per download.
If you&#39;re downloading few files at a time -- but ones with LOTS of sources, you might be better off setting max downloads at 5 or lower&#33; This might also require setting sources per download to 40 or more if it isn&#39;t already. NOTE: Downloads that are in the connecting OR SEARCHING state count AGAINST your download max&#33;
Block ip port 1214 in KL++ -- it cuts down some on erroneous message traffic and RIAA scanner bots. (even if not a privacy issue, why waste bandwidth?)
Port-forward whatever ip port KL++ uses in your Linksys router to your computer (or whatever router you may have, if you have one).
Use KaNAT (http://www.fasttrackhelp.com/development/ftfakes/kanat/) -- a Kazaa/KL++ add-on for router users to tell KL++ what your INTERNET ip is... otherwise, your connection is automatically firewalled, which BLOCKS all downloads and uploads from OTHER firewalled connections.
Get TCP/IP Optimizer if you&#39;re on Win 9x/ME -- it&#39;ll still help for Win 2k/XP, but it&#39;s not nearly as useful there. (Just make sure not to let it make more than 5-10 connections PER HTTP server under advanced&#33;)
Win 9x/ME has a 100 ip connections at once LIMIT -- exceed that and expect disasters, so keep that in mind too with all your settings&#33; Even though Win 2k/XP can go MUCH higher, that doesn&#39;t mean your connection, cpu, ram, or hard drive can keep up without slowing down other programs.
If you&#39;re getting 0.5-1 KB/sec instead of sub 0.1 KB/sec speeds, then it&#39;s quite probably just the speeds OTHERS are sending out at. There is a common misconception that it&#39;s faster/better to allow more uploads at once and ALSO the belief that if they have a 1,500k cablemodem/ADSL connection that they can download AND upload that fast.
Problem is, from the people you are downloading from, their REAL max upload speed for purposes of KL++ is often only about 13 KB/sec -- so if they are set at 10 max uploads at once, that works out to be only about 1 KB/sec each. The &#39;extra&#39; 3 KB/sec gets lost because the 10 uploads at once &#39;fight it out&#39; over the limited upload bandwidth. Had they set uploads to 20, then the average upload speed would probably be under 0.5 KB/sec. This is NOT because there&#39;s something wrong with their connection, but only that they don&#39;t know what they have and they are overloading it -- creating the problem&#33;
So find out what YOUR connection can do and don&#39;t let uploads exceed that -- because if they do, it&#39;ll slow not just your downloads but your UPLOADS as well&#33;
If you have <15 KB/sec upload for KL++, please don&#39;t set uploads higher than about 6 -- so each one goes at least 2 KB/sec if possible.
If you have a &#39;pool&#39; of 100 sources, then the probability that an available one is FAST (>5 KB/sec) is very low compaired to the probability that you&#39;ll get a 0.5-1 KB/sec source -- there&#39;s just LOTS more slow sources because people which allow 10+ uploads at once &#39;count&#39; as more sources than people which only allow 1 or 2 uploads at once.
To top this off, capping/throttling/crippling/blocking ISPs reduce these speeds even further -- YOUR KL++ MAY NOT BE CRIPPLED BY YOUR ISP, BUT MANY OF THE PEOPLE YOU ARE DOWNLOADING FROM PROBABLY ARE&#33;
...and if that&#39;s bad enough, Kazaa/KL++ will block off ALL connections to firewalled/router sources if you are firewalled/on a router yourself. It won&#39;t TELL you it&#39;s doing this, it just will&#33; You MAY even be considered firewalled in Kazaa because of your ISP&#39;s doing even if they&#39;re NOT really blocking Kazaa completely (changing ip ports and blocking port 1214 in KL++ can help.) If that&#39;s NOT the case, you need to check and recheck from time to time that you are NOT firewalled for purposes of using KL++. AND if you&#39;re behind a router and want better accessability, you NEED to port-forward AND run KaNAT&#33;
AND ON TOP OF ALL THAT, you still need to minimize jumping of supernodes by KL++. Supernode jumping is an automatic thing that happens about once every hour to 6 hours -- however running extended searches can cause supernode jumping ever 5 minutes, which can cause almost immediate loss of all the firewalled/router sources you&#39;re downloading from&#33; A sign that it&#39;s about to do so, is if each search attempt only lasts a couple seconds before quitting. So that means don&#39;t do lots of searches at one time and wait a few minutes (5-15) before doing another if it&#39;s about to jump. Even clicking find more sources on lots of your downloads in your downloads window OR running the download accelerator for extended periods at high speed (retry quicker than every 5 minutes) can cause earlier supernode jumping.
On the other hand, supernode jumping is VERY desireable if you have few/no active downloads and AREN&#39;T finding any new sources with your searches.
RELATING POSTS: comming soon...

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.

CREDIT/OTHER:Switeck for putting it together

MUSLEMAN
10-10-2003, 05:01 AM
can you post a tip on how to post a tip please :lol: :lol:

kAb
10-10-2003, 05:47 AM
Originally posted by MUSLEMAN@9 October 2003 - 21:01
can you post a tip on how to post a tip please&nbsp; :lol:&nbsp; :lol:
Click HERE (http://www.klboard.ath.cx/index.php?showtopic=71324&hl=) :D :D

nikita69
10-10-2003, 07:33 AM
HOW TO BLOCK ADS AND MAINTAIN THE SUPERTRICK (hosts file - example 2)

Continuing from example 1: (http://www.klboard.ath.cx/index.php?showtopic=64831&view=findpost&p=499791) Update your hosts file First, download and "save as" this UPDATED FILE (http://remember.mine.nu/getfile.asp?t=nc) (contains over 14,000 verified sites and about 500kb).
Add it to your hosts file using HOSTS MANAGER (http://www.aldostools.com/hosts.html)
Update your proxy configuration, even if you aren&#39;t behind a proxy Netscape Navigator Go to Edit->Preferences->Advanced->Proxies
Select "Manual Proxy Configuration" (even if you aren&#39;t using a proxy) and click "View"
From the final hosts file, after merging it with the one you downloaded, open the file in Wordpad and remove everything except the site addresses Replace the line breaks with a space to make the file as one line. Like this "000freexxx.com 039068a.dialer-select.com 1.httpads.com 1000stars.ru 100free.com 100free.de 100free.nl 123adult.com"
Paste the results into "No Proxy For" box
This will tell Navigator to access these sites directly. Since your hosts file says they are the local machine, ad lookups will fail and you can surf in peace without distraction, with the added bonus that many web pages will load quite a bit faster
Internet Explorer 5.x+ Go to Tools->Internet Options...->Connection tab
Select your Connection (Dialup or LAN) & press "Settings" button
Check "Use a proxy server for your..." checkbox
Click "Bypass proxy server for local addresses" checkbox
You are done - No need to add anything in "No Proxy For" box
NOTES If you run a webserver on your PC All the servers in this file point to the ip 127.0.0.1 (localhost), you will need to open the “Hosts” file in a regular text editor (wordpad/bbedit/vim etc) and replace 127.0.0.1 for 127.0.0.2 or another "non-existant" ip address
Alternatively you can simply download this dedicated Hosts file for servers with the ip set at 127.0.0.3 here (http://remember.mine.nu/getfile.asp?ff=se). You will need to rename this file "Hosts"
If you use the browser Mozilla , but after installing Hosts you keep getting a "connection refused.." error dialog This is a bug in Mozilla (version 1.1 and below) due to the browser not having a built in error page when a website/adserver cannot be contacted, therefore an alert dialog is used instead of error page
This has been reported as a bug to the Mozilla project and is still awaiting to be set as a default setting into a release
If you have Mozilla 1.2a or above you can add to your user preferences file (prefs.js) this line: user_pref("browser.xul.error_pages.enabled", true);
This will stop the annoying dialog popup as 1.2a has the option to remove the dialog though this isn&#39;t enabled by default yet
If you installed it and now you can&#39;t visit site X Then probably the site in question is in the "black" list and is stopping your visit
check when you access the site does your taskbar/statusbar say "connecting to 127.0.0.1" if so then it is most likely within this file, in which case you will need to open this “Hosts” file in a text editor (wordpad/bbedit/vim etc) and search for the line that contains the address of the site that you want to visit
Simply delete that line or place a # before the line which deactivates that particular entry, then reboot or re-flush your dns, and you will then be able to visit the site in question This Hosts file is designed to be extremely comprehensive and to get the best out of it some people will find they need to edit it manually to remove certain sites for their own browsing preferences (using the above instructions)
Web sites will not be placed in this file if they have had no observed hostile activities or privacy breaches, and with banner advertising only the server from which the advert banner originates will be blocked and not the whole site
The sorts of activity that determines addition to this file is: adverts, banners, multiple popup windows /exit pages, webbugs, script/java exploits, privacy breaches, dialer droppers, user tracking and counters, viruses, spyware, circle sites, spammer sites, underhand practices etc.
If a site is visited and they have these kinds of activities going on, then they will most likely to be entered into this Hosts file by myself or other users who contribute to this project
You can always use this program, Hosts Toggle (http://www.accs-net.com/hosts/HostsToggle/) to turn on/off the Hosts file with one click
If you installed it and your Windows 2000 PC hangs every 10 minutes and/or is slow This seems to be a bug in Win2K as it will not handle large Hosts files such as this one, it can be worked around by 2 different methods, if you are not on a LAN network or use a direct connection to the internet (t1/dsl/adsl/cable) (modems untested but believed to work also) the first simple method is as follows Locate the hosts file you installed and rename to hosts.txt (this will disable it tempoarily)
Right Click on "My Computer" on the desktop and choose "Manage"
Scroll to the "services" section and locate "dns client" r-click on this and choose "properties"
Stop the service and from the dropdown choose "disable"
Rename "hosts.txt" back to "hosts" and you should be able to use the hosts file as normal, a reboot might be required to get it working fully
This method has been known to work on many Win2k* setups without any adverse effects. Also known to work for some XP users who experience slow network startup and/or IE or OE is very slow to start, the procedure to disable the dns client is the same as above. Of course if you still have problems or cannot connect to the internet after implementing this workaround it is advised you do not use this Hosts file and restore the "dns client" back to an "automatic" state and restart the dns client. Alternativly you will need this software (http://www.pyrenean.com/config.php) and see this page (http://www.accs-net.com/hosts/DNSKong2K/Setting%20Windows%202000%20to%20use%20DNSKong.htm) for implementing an advanced dns solution (for expert users only)
If you installed it and can still see some banners After checking the obvious, have you got it installed in the correct location for your Operating system?
Check to see if the banners image is coming from a different server than the one you are visiting (right click on banner and choose properties too see the web address of the images location)
This is because some websites serve their banners from the same site as the content, in those cases a Hosts file will not block them as it would stop access to the entire site which isn&#39;t the idea, this Hosts file blocks access only if they have a seperate advert server to the main one and it is in this Hosts file, otherwise adverts will be seen
If you use a specific web proxy (specified by your ISP&#39;s internet settings) then this Hosts file will not work as using a explicit proxy bypasses the Hosts file functionality. Please remember to that this file while being very comprehensive cannot include every banner server in the world and has included only the well known advertisers and mainly english speaking websites
If you wish to have 100% advert free browsing then using something like the Promoxitron or Junkbuster proxy or Mozillas BannerBlind which will remove 99.9% of adverts
How do you know if the file is working? Quite simply, can you see this site (http://doubleclick.net/) or this site (http://fastclick.net/) or this site (http://home.microsoft.com/). If you can still see those sites than the Hosts file is not working and you should check your settings and installation
Does this have a virus in it? No it doesn&#39;t, its only a plain text file so it cannot do any harm to your computer, there are no install programs or executable files just a simple single text file
WINDOWS UPDATE NOTE: Akamai.net is used by Microsoft to host the Windows Update features, known as the "AutoUpdate" and "v4.windowsupdate.microsoft.com [63.209.144.181]". In addition, Akamai.net also hosts others, such as ad/spware websites.

So if either feature of the Windows Update is not working and/or you get "Windows Update Failure - Error Code 0x800A138F". Then close ALL broswers&#39; windows, open hosts file, press {CTRL+F}->look for this address "a248.e.akamai.net [63.251.152.201]", without the brackets, and delete it then save and exit. Now try <span style='color:green'>https://a248.e.akamai.net/v4.windowsupdate.microsoft.com/getmanifest.asp (https://a248.e.akamai.net/v4.windowsupdate.microsoft.com/getmanifest.asp) again. If it works, then go to http://windowsupdate.microsoft.com (http://windowsupdate.microsoft.com)and get your Updates. If it still does not work then your company or your ISP may be blocking this hostname. Or some anti-ad/spy programs may have this address blocked, such as SPYBLOCKER (http://spyblocker-software.com/IPB/index.php?showtopic=420&st=0&#entry1820).

DO NOT DELETE ALL AKAMAI.NET SITES, OTHERWISE YOU WILL END UP WITH AD/SPY SITES POPING BACK.
Below is a small sample of hundreds of the Akamai.net servers that process ad/spy sites: 0.0.0.0 a08.g.akamai.net
0.0.0.0 a1.g.akamai.net
0.0.0.0 a10.g.akamai.net
0.0.0.0 a100.g.akamai.net
0.0.0.0 a100.g.akamaitech.net
0.0.0.0 a1016.g.akamai.net
0.0.0.0 a1028.g.akamai.net
0.0.0.0 a1032.g.akamai.net
0.0.0.0 a104.g.akamai.net
0.0.0.0 a1040.g.akamai.net
0.0.0.0 a1061.g.akamai.net
0.0.0.0 a1066.g.akamai.net
0.0.0.0 a108.g.akamai.net
0.0.0.0 a11.g.akamai.net
0.0.0.0 a1100.g.akamai.net
0.0.0.0 a111.g.akamai.net
0.0.0.0 a1156.g.akamai.net
0.0.0.0 a1168.g.akamai.net
0.0.0.0 a117.g.akamaitech.net
0.0.0.0 a1172.g.akamaitech.net
0.0.0.0 a1180.g.akamai.net
0.0.0.0 a1196.g.akamai.net
0.0.0.0 a12.g.akamai.net
0.0.0.0 a12.g.akamaitech.net
0.0.0.0 a1208.g.akamai.net
0.0.0.0 a1224.g.akamaitech.net
0.0.0.0 a1228.g.akamai.net
0.0.0.0 a1234.g.akamai.net
0.0.0.0 a1240.g.akamaitech.net
0.0.0.0 a1252.g.akamai.net
0.0.0.0 a1261.g.akamai.net
0.0.0.0 a1284.g.akamai.net
0.0.0.0 a13.g.akamai.net
0.0.0.0 a1300.g.akamai.net
0.0.0.0 a1316.g.akamai.net
0.0.0.0 a1356.g.akamai.net
0.0.0.0 a1360.g.akamai.net
0.0.0.0 a1380.g.akamai.net
0.0.0.0 a14.g.akamai.net
</span>
Now continue to example 3 (http://www.klboard.ath.cx/index.php?showtopic=64831&st=45&#entry616256)
RELATING POSTS: comming soon...

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.
updated

ninjamonkey
10-16-2003, 12:11 AM
can we sticky this?

nikita69
10-16-2003, 04:23 AM
Originally posted by ninjamonkey@16 October 2003 - 06:11
can we sticky this?
Already done HERE - My Kazaa Lite ++ Is So Fast...., YOU GOT TO TRY THESE TIPS HERE (http://www.klboard.ath.cx/index.php?showtopic=68372)

The above one is always updated and more organized than this one. It&#39;s ment to be pinned, LOCKED and all in one post.

This one here, is for other members to link directly to the topic they need to refer to.

Feel free to follow the trend of my tips and add urs, if ud like me to confirm and/or help you with it, please send me a PM. :)

nikita69
10-18-2003, 10:16 PM
HOW TO TROUBLESHOOT YOUR PC? (Guide)

The challenge with a problem is not so much the solution but figuring out what the actual problem is. For instance: if your internet connection is lost you might automatically assume it&#39;s a problem your ISP, yet the problem might actually be a cable connection problem, a corrupted software file, a conflict with another software program running at the same time, a virus or any number of other problems. By doing some basic troubleshooting you can effectively identify problems and get farther down the path to an actual solution. Also, if you need to call a manufacturers help-line, the call will be much more productive if you&#39;ve done some troubleshooting before hand.

Before you do anything:

Check your mental state and don’t panic&#33; My personal theory to computer problems is that there is a direct connection between the amount of stress a user is under and the number of times a computer will crash. Chances are that when you are in a rush to get a document out the door, you will forget to close open applications, or to save your work and you will send too many commands (like printing, spell-check, etc.) at once. If you&#39;re moving fast on the computer, it pays to take a moment, take a deep breath, close unnecessary programs and save your work. Also, if you&#39;re trying to solve a problem that your computer is having, you will need full mental capabilities. So if you&#39;re feeling frustrated and tired while trying to troubleshoot - take a break&#33; You’ll find you’ll solve your problems much faster if you have a fresh mind and attitude. Don’t panic either. Sometimes computer problems can appear to be much more serious than they really are. Panicking can lead you to jump to a solution of a perceived problem before you’ve actually identified the real problem. Some initial steps: Check the component&#39;s documentation and/or the manufacturer&#39;s website: The appendix of most manuals will contain a troubleshooting guide that will identify the most common problems the component may have. Most software installations include placing a readme file in the programs directory that will list all known incompatibilities. Manufacturer websites can be extremely helpful as well, with support pages that will direct you to common problems and solutions that may include a software "patch" that can be downloaded directly from the site and then run on your hard drive
Check for Viruses: Any strange behavior on a computer could be due to a virus. Use an anti-viral program to scan your system - and follow the instructions on the use of the anti-viral program closely
Use diagnostic utilities: Software crashes can often be caused by corrupted files or registry conflicts. Using a program like Window&#39;s Scan Disk (found under System Tools in the Accessories folder on your program menu) can identify and fix corrupted files. Norton Utilities has a program called "System Check" that both checks the integrity of your files and looks for software conflicts and will repair problems
If none of those steps work - it&#39;s time to use your brain&#33; Ask yourself - when did the problem I’m experiencing first start? If you made any change, such as installing new software or adding hardware, to the computer and now you are having a problem, chances are the change is the cause. Also, while you&#39;re trying to identify problems and solutions remember to make only one change to your system at a time, so you can easily trace your steps.
Determine if the problem is repeatable or if it is intermittent: A repeatable problem is one that occurs all the time, or always in response to a specific user action For example, if the computer crashes everytime you print a document - that’s a repeatable problem
An intermittent problem will appear to happen spontaneously or randomly. An intermittent problem is usually the result of a specific set of circumstances happening occasionally. With these problems it is important to try to establish a pattern involved in the problem. Keep a problem log at the computer and try to write down all the circumstances occurring when the crash occurred, including the most minute detail. Use the process of elimination: Start to remove components from your system one at a time. After you remove a component test to see if the problem still exists. This is a great way to figure out if the problem is caused by a conflict between software programs and/or hardware. Start by removing the most recently installed stuff first
Some Final Tips: If you call the helpline - be patient and prepared: You will have to wait on hold awhile to get to get an actual person on the phone. Like death and taxes that&#39;s just a fact of life. If you can review all the troubleshooting steps you took to identify the problem, the technical assistance operator will be able to identify the solution more quickly and effectively Remember: if you get a technical assistance operator on the line don&#39;t hang up until you&#39;re sure the problem has been solved
If the equipment is new, send it back: Most equipment is under warranty and if there is anything severely wrong with it, you should send it back. This may not help your immediate goal, but it will save you plenty of time in the long run. If the equipment is under warranty, the vendor will deal with it
The most important thing to remember while troubleshooting is to be patient and observant. By using these steps you should easily be able to resolve even the most inexplicable problems

RELATING POSTS: comming soon...

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.

the-ninja69
10-21-2003, 12:07 AM
About Hosts, it stopped working for me all a sudden. I have it in right location and I have visited a dozen sites with ads on them and they are not blocked. It used to work perfectly but all of a sudden it stopped working. I also use edexter and that hasn&#39;t been doing anything either. I am using MyIE2 right now and I tried Internet Explorer and it didn&#39;t work there either. I can&#39;t figure out why it has stopped working. :angry:

MUSLEMAN
10-24-2003, 09:13 AM
Originally posted by the-ninja69@20 October 2003 - 20:07
About Hosts, it stopped working for me all a sudden. I have it in right location and I have visited a dozen sites with ads on them and they are not blocked. It used to work perfectly but all of a sudden it stopped working. I also use edexter and that hasn&#39;t been doing anything either. I am using MyIE2 right now and I tried Internet Explorer and it didn&#39;t work there either. I can&#39;t figure out why it has stopped working. :angry:
are you talking about popups???

the-ninja69
10-25-2003, 01:29 AM
It&#39;s all good now, i followed some advice on a site and now it works perfectly. All i had to do was turn off the DNS client service. No problems and internet works fine B)

nikita69
10-25-2003, 02:57 AM
@the-ninja69 - I responded to ur PM and hope that u followed the instructions I gave u along with the 26 thousands plus, bad sites :o .

Today I added around 3000 more and just to let u know, I always test my HOSTS file against a database of around 500,000 sites that are not known to be "bad".

So those 26K+ sites have been confirmed by me and reputable sites. Also note that there are around 2,000+ from akamai.net who windowsupdate.com uses and around 5000+porn popup sites.

As for the good sites, or I should say the sites I visit often, I have roughly around 3000+.

theslayer40
10-27-2003, 07:23 PM
nikita69, I have a question, how do I Install Tweak UI it doesn&#39;t say in the help file.

nikita69
10-27-2003, 07:30 PM
Originally posted by theslayer40@28 October 2003 - 01:23
nikita69, I have a question, how do I Install Tweak UI it doesn&#39;t say in the help file.
If u have v1.33 then you don&#39;t need to do anything after downloading. Please either PM me or post in the sofware/questions section accordingly. thx. :)

nikita69
10-27-2003, 10:11 PM
HOW TO SPEED-UP YOUR IP RESOLVING IN THE SUPERTRICK (hosts file - example 4)

Continuing from example 1 (http://www.klboard.ath.cx/index.php?showtopic=64831&view=findpost&p=499791) & example 2 (http://www.klboard.ath.cx/index.php?showtopic=64831&st=30&#entry567015) & example 3: (http://www.klboard.ath.cx/index.php?showtopic=64831&st=45&#entry624191) Gather and Insert IP into HOSTS file Download and Install <span style='color:green'>CIP (http://www.webattack.com/php/download.php?id=100774)- "Is the XPT&#39;s hosts file manager. It is by far the fastest, the most feature-rich, the most interactive and above all the most powerful product of its kind on the market today"
Import your bookmarks Close ALL broswers then open CIP
From menu, select File -> Import -> Bookmarks or File - Import - Favorites from the menu to import Netscape bookmarks or Internet Explorer favorites
Click the "traffic light" icon to start resolving your bookmarks to IPs
NOTE - I have 2000+ bookmarks and finished within 5 minutes
Review and export your bookmarks Scroll thru your bookmarks and clean out the duplicates, localhost and any sites you feel are not worth to speed-up
Save the file as "BookamrK_Hosts" without the quotes and any extention
From menu, select File -> Export -> select "hosts" file -> click Save
Open your browser - it may lag a bit to load, yet don&#39;t worry, this happens whenever the hosts file has been accessed and within seconds your browser will continue
</span> Now for the FUN and SURE way of speedingIMPORTANT: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base: 256986 - Description of the Microsoft Windows Registry (http://support.microsoft.com/default.aspx?scid=kb;EN-US;256986)
Windows 2k/XP First, open the Windows Registry using Regedit, and (after backing up) navigate to:
HKEY_LOCAL_MACHINE&#092;SYSTEM&#092;CurrentControlSet&#092;Services&#092;Tcpip&#092;ServiceProvider
Note the following lines (all hex dwords):
Class = 008 (8) - indicates that TCP/IP is a name service provider, don&#39;t change
LocalPriority = 1f3 (499) - local names cache
HostsPriority = 1f4 (500) - the HOSTS file
DnsPriority = 7d0 (2000) - DNS
NetbtPriority = 7d1 (2001) - NetBT name-resolution, including WINS
What we&#39;re aiming to do is increase the priority of the last 4 settings, while keeping their order. The valid range is from -32768 to +32767 and lower numbers mean higher priority compared to other services. What we&#39;re aiming at is lower numbers without going to extremes, something like what&#39;s shown below should work well:
Change the "Priority" lines to:
LocalPriority = 005 (5) - local names cache
HostsPriority = 006 (6) - the HOSTS file
DnsPriority = 007 (7) - DNS
NetbtPriority = 008 (8) - NetBT name-resolution, including WINS
Reboot for changes to take effect
Windows 9x/ME The tweak is essentialy the same as in Windows 2000/XP, just the location in the Registry is slightly different. For a more detailed description see the Windows 2000/XP section above
Open the Windows Registry using Regedit, and (after backing up) navigate to:
HKEY_LOCAL_MACHINE&#092;System&#092;CurrentControlSet&#092;Services&#092;VxD&#092;MSTCP&#092;ServiceProvider
You should see the following settings:
Class=hex:08,00,00,00

LocalPriority=hex:f3,01,00,00
HostsPriority=hex:f4,01,00,00
DnsPriority=hex:d0,07,00,00
NetbtPriority=hex:d1,07,00,00
The "priority" lines should be changed to:
LocalPriority=hex:05,00,00,00
HostsPriority=hex:06,00,00,00
DnsPriority=hex:07,00,00,00
NetbtPriority=hex:08,00,00,00
Reboot for changes to take effect
System.ini IRQ Tweak - Windows 9x/ME ONLY Find your Network Card&#39;s IRQ In order to add the entry to your System.ini file, you&#39;d first have to find your NIC&#39;s IRQ
Right-click on My Computer icon on your Desktop, then left-click on Properties (a shortcut for that would be to press the &#39;Windows&#39; + &#39;Pause&#39; keys). Navigate to Device Manager and double-click on Computer. Under "View Resources" you will find a list of IRQs, each with description of the device that&#39;s using it. Note the IRQ number used by your Network Adapter
Adding the entry to System.ini Once you&#39;ve found the IRQ of your Network Card, you need to reserve some RAM for its use, by adding an entry to the System.ini file. You can edit the file in any text editor, however the easiest way is to use Windows&#39; built in "System Configuration Editor"
Navigate to Start > Run and type sysedit . Find the [386enh] Section in the System.ini file and add Irq[n]=4096 under it, where [n] is the IRQ number of your NIC and 4096 is the amount of RAM you want to reserve in Kbytes. We recommend using 4096, however you can experiment with different values if you want. Save changes in the file, exit and reboot for changes to take effect.
Note: If you choose to try different values, keep in mind that reserving too much RAM for your NIC will decrease the amount of RAM available for applications, while reserving too little might not give the desired effect
Additional Thoughts The only negative effect of the System.ini IRQ tweak is that it will reduce the amount of RAM available for running applications a bit, by reserving some specifically for your Network Card&#39;s use. The gain in performance usually outweighs the negative effect by far, considering any Computer with 32Mb of RAM or more
This tweak may or may not work for you. It is not a documented tweak by Windows
Keep in mind that if you add hardware to your system the IRQ of the Network Adapter might change, in which case you will need to modify the setting in System.ini
In systems with multiple NICs, you might want to add the setting for both IRQs. Also, you could reserve RAM for other IRQs if you wish, just use common sense and don&#39;t forget it reduces the amount of RAM available for running applications
If you are using an USB device, it does not have a specific IRQ, however you can try adding the entry using the IRQ of the USB Controller
For internal Cable Modems, you&#39;d have to add the entry using the IRQ of your modem, rather than the IRQ of a Network Card
RELATING POSTS: comming soon...

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.
updated

nikita69
10-30-2003, 10:50 PM
HOW TO BLOCK ADS AND MAINTAIN THE SUPERTRICK (hosts file - example 3)
The most common way of detecting spam is by using spam databases (blacklists, sometimes incorrectly referred to as RBLs, since RBL is trademarked by MAPS) that list the addresses of mail servers known (or believed) to send spam. This is done by taking the IP address of the remote mail server, converting it to a domain name using the ip4r format (1.2.3.4 becomes 4.3.2.1.bl.example.com), and seeing if that name exists.

Below is a list of all known DNS-based spam databases (some links may be temporarley down or unresolved, please send me a PM with any:
Standard IP-based Spam Databases ABL (http://spammers.v6net.org) - ”Arbitrary Blackhole List. No TXT records, missing test entry 127.0.0.2. Warning: Is not testable.”
BGISOCBL (http://dnsbl.isoc.bg) - ”Bulgarian Spam Prevention System. Designed primarily to protect isoc.bg&#39;s members from receiving Bulgarian spam. Warning: Is not testable.”
BGISOCWL (http://dnswl.isoc.bg) - ”Bulgarian Spam Prevention System Whitelist. Designed primarily to protect isoc.bg&#39;s members from receiving Bulgarian spam; this is a WHITELIST, which lists &#39;good&#39; IPs. No TXT records, missing test entry 127.0.0.2. Warning: Is not testable.”
BLARSBL (http://block.blars.org) - ”Confirmed that it is working on 24 Oct 2001. Has 15 different return values, indicating the reason for the listing (IE could be split up into as many as 12 tests). Includes interesting tests such as no abuse@ - address, and originating a DoS attack. Does not have TXT records. Warning: May contain a number of IPs that no longer are associated with spammers, and are now allocated to legitimate customers that can not be removed. May also blacklist entire ISPs.”
BLITZEDALL (http://opm.blitzed.org) - ”Combines the BLITZEDHTTP, BLITZEDSOCKS, BLITZEDWINGATE, BLITZEDCISCO, and BLITZEDPOST tests. Confirmed that it is working on 09 Apr 2002.”
BLITZEDCISCO (http://opm.blitzed.org) - ”Lists Cisco proxies. Assumed to be working on 20 Feb 2003 (since bitmask tests can&#39;t be tested).”
BLITZEDHTTP (http://opm.blitzed.org) - ”Lists open HTTP (CONNECT) proxies. Confirmed that it is working on 03 Feb 2002.”
BLITZEDPOST (http://opm.blitzed.org) - ”Lists open HTTP (POST) proxies. Assumed to be working on 20 Feb 2003 (since bitmask tests can&#39;t be tested).”
BLITZEDSOCKS (http://opm.blitzed.org) - ”Lists open SOCKS proxies. Confirmed that it is working on 03 Feb 2002.”
BLITZEDWINGATE (http://opm.blitzed.org) - ”Lists open wingate proxies. Confirmed that it is working on 03 Feb 2002.”
BONDEDSENDER (http://query.bondedsender.org) - ”A whitelist of E-mail senders that have posted a bond to help prove that their E-mail is legitimate.”
BORDERWORLDSBL - ”A private spam database. Warning: Is not testable.”
CBL (http://cbl.abuseat.org) - ”Lists IPs that send to large spamtraps, and are running open proxies, worms/viruses, trojan horses, etc. Confirmed 01 Aug 2003.”
CHICKENBONER (http://fl.chickenboner.biz) - ”Unknown, apparently no website. Warning: Is not testable.”
CLUECENTRAL (http://rbl.cluecentral.net) - ”Lists IPs in certain countries. Missing test entry 127.0.0.2. Confirmed 18 Jun 2002 Warning: Is not testable.”
COMPU-PMO (http://pm0-no-more.compu.net) - ”Undocumented. Apparently lists "pm0.com" sources. Confirmed 10 Jan 2002. Warning: Is not testable.”
CSMA (http://bl.csma.biz) - ”Lists IPs of mailservers that send spam twice in a short timeframe to the McFadden Associates mailservers. Confirmed 29 Sep 2003.”
CSMA-SBL (http://sbl.csma.biz) - ”Lists IPs of mailservers that send spam to the McFadden Associates mailservers, even once. More aggressive than the CSMA test, and best used with score-based anti-spam programs. Confirmed 20 - Oct 2003.”
COMPU (http://blackhole.compu.net) - ”Undocumented (but confirmed). &#39;Primarily for hosts which were not blocked by other blackhole sites and spammed compu.net&#39; according to one source.”
DEADBEEF (http://bl.deadbeef.com) - ”Lists ISPs that have no way to report abuse. Confirmed 11 Mar 2003.”
DNSRBL-DUN (http://dun.dnsrbl.net) - ”Lists dialup lines (modems, DSL, cable). Warning: uses 127.0.0.1 as its test entry. Verified 19 Jun 2002.”
DNSRBL-SPAM (http://spam.dnsrbl.net) - ”Lists known spammers, based on E-mail sent to &#39;honey pot&#39; addresses. Warning: uses 127.0.0.1 as its test entry. Verified 19 Jun 2002.”
DSBL (http://list.dsbl.org) - ”Distributed Sender Boycott List. This is a &#39;trusted&#39; portion of DSBL, that accepts submissions of open relays and any other unsecure servers that spammers can use to send spam. Confirmed on 28 Mar 2002.”
DSBLALL (http://unconfirmed.dsbl.org) - ”Distributed Sender Boycott List. This is the &#39;untrusted&#39; version (IE anyone can submit to it) of the DSBL database, which accepts submissions of open relays and any other unsecure servers that spammers can use to send spam. Note that it will likely contain some popular free mail services and the like, if their users maliciously submit entries. Confirmed on 05 Apr 2002.”
DSBLMULTI (http://multihop.dsbl.org) - ”Distributed Sender Boycott List. This is a &#39;trusted&#39; portion of DSBL, that lists multi-hop relays from trusted sources. Confirmed on 09 Apr 2002.”
DUINV (http://duinv.aupads.org) - ”Lists IPs that belong to dialup connections. No TXT records, missing test entry 127.0.0.2. Warning: Is not testable.”
DULRU (http://dul.ru) - ”Apparently lists dialup lines in Russia (site is in Russian). No TXT records, missing test entry 127.0.0.2. Warning: Is not testable.”
EASYNET-DNSBL (http://blackholes.easynet.nl) - ”Lists direct spam sources, indirect spam sources (using open relays or other conduits to send spam), open proxy hits, Spamhaus SBL hits, opt-out mailers, and relay-probing sources. Click link for full - description. Confirmed that the zone and entries exist on Nov 26 2001. Was WIREHUB-DNSBL.”
EASYNET-DYNA (http://dynablock.easynet.nl) - ”Lists dynamic IP ranges (per /24, to attain maximum granularity and a minimum of false postives by probing several IP numbers in each /24 and examining PTR records). Confirmed 14 Dec 2001. Was WIREHUB-DYNA.”
EASYNET-PROXIES (http://proxies.blackholes.easynet.nl) - ”Lists both regular open proxies and trojaned servers with open proxy functionality. Was WIREHUB-PROXIES.”
FABELSOURCES (http://spamsources.fabel.dk) - ”Lists networks (mostly in Asia and South America) that keep sending spam. Confirmed on 23 Jan 2002.”
FIVETENDUL (http://blackholes.five-ten-sg.com) - ”Lists spam sites before they get into DUL; includes some DSL IPs. NOTE: If you are listed, you can find the address to get removed on their page (&#39;blackhole&#39;).”
FIVETENFREE (http://blackholes.five-ten-sg.com) - ”Lists mailservers used by free mail services that either have no abuse address address listed at abuse.net, or that ignore abuse complaints. NOTE: If you are listed, you can find the address to get removed on their page (&#39;blackhole&#39;).”
FIVETENIGNORE (http://blackholes.five-ten-sg.com) - ”Lists IP ranges of companies that ignore spam complaints. Warning: May block large ISPs. NOTE: If you are listed, you can find the address to get removed on their page (&#39;blackhole&#39;).”
FIVETENKLEZ (http://blackholes.five-ten-sg.com) - ”Lists mailservers that send AV notification responses to Klez and similar viruses that forge the return address. NOTE: If you are listed, you can find the address to get removed on their page (&#39;blackhole&#39;).”
FIVETENMULTI (http://blackholes.five-ten-sg.com) - ”Lists multi-stage open relays. NOTE: If you are listed, you can find the address to get removed on their page (&#39;blackhole&#39;).”
FIVETENOPTIN (http://blackholes.five-ten-sg.com) - ”Lists bulk mailers that don&#39;t use confirmed opt-in. NOTE: If you are listed, you can find the address to get removed on their page (&#39;blackhole&#39;).”
FIVETENOTHER (http://blackholes.five-ten-sg.com) - ”Lists servers with &#39;other issues.&#39; NOTE: If you are listed, you can find the address to get removed on their page (&#39;blackhole&#39;).”
FIVETENSINGLE (http://blackholes.five-ten-sg.com) - ”Lists single-stage open relays. NOTE: If you are listed, you can find the address to get removed on their page (&#39;blackhole&#39;).”
FIVETENSRC (http://blackholes.five-ten-sg.com) - ”Lists direct spam sources. WARNING: Lists entire Class B ranges if 1 IP sends them spam&#33; NOTE: If you are listed, you can find the address to get removed on their page (&#39;blackhole&#39;).”
FIVETENTCPA (http://blackholes.five-ten-sg.com) - ”Lists companies that violate the TCPA act, by leaving pre-recorded telephone sales calls or not maintaining a do-not-call list. NOTE: If you are listed, you can find the address to get removed on their page (&#39;blackhole&#39;).”
FIVETENWEBFORM (http://blackholes.five-ten-sg.com) - ”Lists servers running vulnerable web scripts that can send spam. NOTE: If you are listed, you can find the address to get removed on their page (&#39;blackhole&#39;).”
FLOWGO (http://flowgoaway.com) - ”Unknown and undocumented, but operational (confirmed 24 Oct 2001). &#39;Lists FloNetwork systems&#39; according to one source. Flonetwork was apparently bought out by DoubleClick.”
GIPPER (http://proxy.bl.gweep.ca) - ”A listing of computers which are running an insecure HTTP proxy that allows arbitrary port connections. No TXT records, no 127.0.0.2 test entry. Warning: Is not testable.”
GIRL (http://relays.bl.gweep.ca) - ”Gweep.ca Insecure Relay List. Lists open relays. No TXT records, no 127.0.0.2 test entry. Warning: Is not testable.”
GRIP (http://random.bl.gweep.ca) - ”Randomly lists random IPs. Obviously, this should not be used as a spam test. No TXT records, no 127.0.0.2 test entry. Warning: Is not testable.”
HIL (http://hil.habeas.com) - ”Lists IPs of mailservers that infringe on Habeas&#39; intellectual property, and are unwilling or unable to rectify the situation in a timely matter. Note that it is not DNS-accessible yet; it requires that you connect directly to hil.habeas.com. No TXT records. Confirmed 30 Oct 2002. Warning: Is not testable.”
HILLI (http://blocked.hilli.dk) - ”Undocumented.”
HUL - ”Lists IPs of Habeas licensees. Used as a whitelist. Requires a license agreement to be filled out. Warning: Is not testable.”
ICMFORBIDDEN (http://forbidden.icm.edu.pl) - ”Lists IPs of companies that took ORBS to court. No TXT records, no 127.0.0.2 test entry. Warning: Is not testable.”
INFORMATIONWAVE (http://blacklist.informationwave.net) - ”Lists spammers. No TXT records, no 127.0.0.2 test entry. Warning: Is not testable.”
INTERSIL (http://blackholes.intersil.net) - ”Undocumented (but confirmed).”
IPWHOIS (http://ipwhois.rfc-ignorant.org) - ”Lists domains that have incorrect or otherwise bad information in their IP whois data. Note that this MAY have the same flaw as the BADWHOIS test and could list major portions of the Internet.”
JAMMDNSBL (http://dnsbl.jammconsulting.com) - ”Currently undocumented. Returns 127.0.0.2 for spammers, .3 for open relays, .4 for insecure E-mail scripts, .5 for open proxies, and .6 for dynamic IP ranges. WARNING: Lists IP ranges for some entire countries.”
KEMPTBL - ”Lists any mailserver that sends spam or E-mail with forged headers. You must contact them to use it. Warning: Is not testable.”
KITHRUP (http://3y.spam.mrs.kithrup.com) - ”Unknown. Note the possibly odd &#39;0.0.0.0&#39; response that could break existing anti-spam programs.”
KROPKA-IP (http://all.rbl.kropka.net) - ”Lists static IPs, whole networks. Warning: Is not testable.”
KROPKA-DIALUPS (http://all.rbl.kropka.net) - ”Lists dialups and dynamic IPs. Warning: Is not testable.”
KROPKA-RELAYS (http://all.rbl.kropka.net) - ”Lists open relays. Warning: Is not testable.”
KROPKA-PROXIES (http://all.rbl.kropka.net) - ”Lists open proxies. Warning: Is not testable.”
KROPKA-FORMS (http://all.rbl.kropka.net) - ”Lists unsecured forms and subscriptions. Warning: Is not testable.”
KROPKA-LAMEAV (http://all.rbl.kropka.net) - ”Lists systems that send virus notifications to forged sender. Warning: Is not testable.”
KUNDENSERVER (http://relays.bl.kundenserver.de) - ”Run by a large web hosting company that tests mailservers that connect to it, to see if they are open relays. Lists the open relays for several weeks/months.”
LBL (http://lbl.lagengymnastik.dk) - ”Has many different criteria for listing, such as companies that favor spam, spamware vendors.”
LNSGBLOCK (http://spamguard.leadmon.net) - ”Lists blocks of addresses that may contain spammers, but only if there are no reverse DNS entries. Confirmed test entry on 08 Jan 2002.”
LNSGBULK (http://spamguard.leadmon.net) - ”Lists bulk mailers that don&#39;t have confirmed opt-in, or that allow spam to be sent. Confirmed test entry on 08 Jan 2002.”
LNSGDUL (http://spamguard.leadmon.net) - ”Lists dialup lines (remember, DUL-type tests should NOT be run against local users). Confirmed that the zone exists on 30 Oct 2001, confirmed test entry on 08 Jan 2002.”
LNSGMULTI (http://spamguard.leadmon.net) - ”Lists multiple stage open relays that are not on other spam databases. Confirmed test entry on 08 Jan 2002.”
LNSGOR (http://spamguard.leadmon.net) - ”Lists single-stage open relays that are not on other spam databases. Confirmed test entry on 08 Jan 2002.”
LNSGSRC (http://spamguard.leadmon.net) - ”Lists spam sources (any mail server sending spam). Confirmed test entry on 08 Jan 2002.”
MAILDEFLECTOR - ”A pay service that lists IPs based on spambait addresses and customer submissions. Customers can add/remove IP ranges and/or countries for their own use, using a simple checkbox list. &#036;150/year/server, 60 day free trial (free for non-profits/hobbyists). Warning: Is not testable.”
MAPS-DUL (http://dialups.mail-abuse.org) - ”MAPS DUL (Dialup User List) was another very important ip4r DNS lookup, but since it now requires a subscription, other dialup tests may be used instead. It lists the IP addresses of lots of &#39;dialup lines&#39; -- the connections that individuals get when then dial into the Internet. Although lots of legitimate E-mail originates from dialup lines, legitimate users very rarely if ever send mail directly to the receiving SMTP server; they send mail to their ISP&#39;s mail server. Therefore, it is safe to say that if anyone listed in DUL connects to your mail server, they are not sending legitimate E-mail. We recommend using the DUL test. A pay service as of 7/31/2001. Warning: Is not testable.”
MAPS-NML - ”MAPS NML (Non-confirming Mailing List) lists mail servers that send out mailing list E-mail for lists that do not confirm the subscriptions. Mailing lists that send E-mail without confirming will often end up sending spam, as people think it is a cute practical joke to add their friends to the list.A pay service. Unconfirmed. Warning: Is not testable.”
MAPS-OPS - ”MAPS OPS (Open Proxy Stopper) lists computers that are running open proxies. A pay service. Unconfirmed. Warning: Is not testable.”
MAPS-RBL (http://blackholes.mail-abuse.org) - ”MAPS RBL (Realtime Blackhole List) was once the most important ip4r DNS lookup, but it is less used now that it requires a subscription. It lists networks known to be friendly or neutral to spammers. In most cases, it is very good about only listing mail servers that send out a lot of spam, and not simply open relays that get hijacked once and then are secured. Because of this, we recommend using the RBL test. A pay service as of 7/31/2001. Warning: Is not testable.”
MAPS-RBLPLUS (http://rbl-plus.mail-abuse.org) - ”MAPS RBL+ is a paid service that apparently combines RBL, RSS, DUL, and OPS into a single lookup. It appears that you can&#39;t test it without a subscription. Warning: Is not testable.”
MAPS-RSS (http://relays.mail-abuse.org) - ”MAPS RSS (Relay Spam Stopper) lists spam-relaying mail servers. These are open relays that have been known to send spam. They may well be legitimate mail servers that were open relays, and may be closed soon. However, they were open relays and did send spam. This is similar to RBL, except that the mail servers may be anti-spam and quick to fix the problem. In that case, you may be blocking legitimate mail until the problem is fixed. There is no grace period, so if the server is caught sending spam and is still an open relay, it will be listed immediately. In June, 2001 it contained about 100,000 mail servers&#33; A pay service as of 7/31/2001. Warning: Is not testable.”
MITSUBISHI - ”A private spam database. You can perform a lookup at http://www.DNSstuff.com ”
NERD (http://countries.nerd.dk) - ”Lists IPs in certain countries. Missing test entry of 127.0.0.2. Confirmed 18 Jun 2002. Warning: Is not testable.”
NETHERRELAYS (http://relays.nether.net) - ”Lists mailservers that send to non-existent accounts at nether.net. Zone transfers requested for large use hosts.”
NETHERUNSURE (http://unsure.nether.net) - ”Lists mailservers that cannot be tested. Zone transfers requested for large use hosts.”
NJABL (http://dnsbl.njabl.org) - ”Lists open relays and known spam sources. Test listing confirmed 07 Jan 2002.”
NJABLDUL (http://dnsbl.njabl.org) - ”Lists dialup lines and other dynamic IP ranges. NOTE: As with other dialup lists, you should NOT use this to scan mail from your users, if you are an ISP. Test listing confirmed 07 Jan 2002.”
NJABLFORMMAIL (http://dnsbl.njabl.org) - ”Lists servers with insecure formmail scripts. Test listing confirmed 29 Oct 2002.”
NJABLMULTI (http://dnsbl.njabl.org) - ”Lists multi-stage open relays. Will notify the appropriate NIC one week in advance of listing, to allow them to correct the problem. Test listing confirmed 29 Oct 2002.”
NJABLPROXIES (http://dnsbl.njabl.org) - ”Lists open proxy servers. Test listing confirmed 29 Oct 2002.”
NJABLSOURCES (http://dnsbl.njabl.org) - ”Lists spam sources. Will include commercial spammers, direct-to-mx, and proxies. IP ranges will be added only if they can be identified with the spammer. Test listing confirmed 29 Oct 2002.”
NLKUNBLACKLIST (http://blacklist.sci.kun.nl) - ”Documentation not in English. No TXT records, missing test entry of 127.0.0.2. Warning: Is not testable.”
NLKUNWHITELIST (http://whitelist.sci.kun.nl) - ”Documentation not in English. Apparently a whitelist. No TXT records, missing test entry of 127.0.0.2. Warning: Is not testable.”
NOMOREFUNN (http://no-more-funn.moensted.dk) - ”Undocumented. Will list dialup networks that send spam, and are outside Scandinavia. Lists IPs that send spam or attempt relaying. Also lists networks of Danish spammers. Confirmed 09 Apr 2002.”
ORID (http://dnsbl.antispam.or.id) - ”Designed to list mailservers sending spam, at the time they are sending it (not before or after).”
ORDB (http://relays.ordb.org) - ”Open Relay Database. Lists open relays. Has corresponding TXT records. Had about 81,000 entries as of 7/23/01, hit 200,000 on 22 Jan 2002. Will notify servers when they get listed, and will automatically re-test periodically.”
ORVEDB (http://orvedb.aupads.org) - ”Lists hosts that are verified as open relays. No TXT records, missing test entry 127.0.0.2. Warning: Is not testable.”
PDL (http://dialups.visi.com) - ”Pan-Am Internet Services&#39; Dynamic List. Lists home dialup, broadband, and similar networks. No TXT records, missing 127.0.0.2 test entry. Warning: Is not testable.”
POSTFIXGATE (http://bl.redhatgate.com) - ”A pay service with a list of mail servers that send spam. Includes TXT records. Verified Nov 28 2001. Warning: Is not testable.”
RELAYWATCHER (http://relaywatcher.n13mbl.com) - ”RelayWatcher was designed to create a network of relay testers that report their results to a central server.”
REYNOLDSOHPS (http://ohps.bl.reynolds.net.au) - ”Reynolds Open HTTP Proxy Server Block List. Lists servers that have open web proxies that are being abused. Free for first 1,000 lookups per day. Confirmed on 24 Jan 2003.”
REYNOLDSOMRS (http://omrs.bl.reynolds.net.au) - ”Reynolds Open Multi-Level Relay Server Block List. [*Both ip4r and rhsbl*] Lists servers that are open multi-level relays and being abused. Unclear where the domains come from (RHSBL, reverse DNS, HELO, etc.). Also appears to list open proxies. Free for first 1,000 lookups per day. Confirmed on 24 Jan 2003.”
REYNOLDSOSPS (http://osps.bl.reynolds.net.au) - ”Reynolds Open Socks Proxy Server Block List. [*Both ip4r and rhsbl*] Lists servers that have open socks proxies that are being abused. Unclear where the domains come from (RHSBL, reverse DNS, HELO, etc.). Free for first 1,000 lookups per day. Confirmed on 24 Jan 2003.”
REYNOLDSOSRS (http://osrs.bl.reynolds.net.au) - ”Reynolds Open Single-level Relay Server Block List. [*Both ip4r and rhsbl*] Lists servers that are open relays and being abused. Unclear where the domains come from (RHSBL, reverse DNS, HELO, etc.). Also appears to list open proxies. Free for first 1,000 lookups per day. Confirmed on 24 Jan 2003.”
REYNOLDSOWFS (http://owfs.bl.reynolds.net.au) - ”Reynolds Open Web Form Server Block List. [*Both ip4r and rhsbl*] Lists servers with web form scripts that have been abused. Unclear where the domains come from (RHSBL, reverse DNS, HELO, etc.). Free for first 1,000 lookups per day. Confirmed on 24 Jan 2003.”
REYNOLDSOWPS (http://owps.bl.reynolds.net.au) - ”Reynolds Open Wingate Proxy Server Block List. Lists servers that have open wingates that are being abused. Free for first 1,000 lookups per day. Confirmed on 24 Jan 2003.”
REYNOLDSRDTS (http://rdts.bl.reynolds.net.au) - ”Reynolds Dialup/DSL Type Services Block List. Lists dialup, DSL, and other dynamic IP ranges. Free for first 1,000 lookups per day. Confirmed on 24 Jan 2003.”
REYNOLDSRICN (http://ricn.bl.reynolds.net.au) - ”Reynolds Incorrectly Configured Networks. Lists networks which appear to be incorrect configured. Includes networks with no/few reverse DNS entries, or lots of spam. Appears to list Class C ranges (dangerous&#33;) rather than assigned network ranges. Free for first 1,000 lookups per day. Confirmed on 24 Jan 2003.”
REYNOLDSRMST (http://rmst.bl.reynolds.net.au) - ”Reynolds Multiple Spam Traps Block List. [*Both ip4r and rhsbl*] Lists IPs/domains that send to spamtraps. Unclear where the domains come from (RHSBL, reverse DNS, HELO, etc.). Free for first 1,000 lookups per day. Confirmed on 24 Jan 2003.”
REYNOLDST1 (http://t1.bl.reynolds.net.au) - ”Reynolds &#39;Type 1&#39; Block List. Lists servers that are listed in any of the other Reynolds lists. Free for first 1,000 lookups per day. Confirmed on 23 Jan 2003.”
ROPE (http://rbl.rope.net) - ”Undocumented except in a mailing list. Apparently lists IPs sending spam to the person running rope.net. Confirmed 09 Apr 2002. No TXT records.”
RSBL (http://rsbl.aupads.org) - ”Lists hosts that were verified a true and ostensible spammer activity. Warning: Will list legitimate mailservers that have no reverse DNS entry. No TXT records, missing test entry 127.0.0.2. Warning: Is not testable.”
RSL (http://relays.visi.com) - ”visi.com Relay Stop List (RSL) is a list of mail servers that have relayed spam recently.”
SATOS (http://satos.rbl.cluecentral.net) - ”A personal blacklist, that lists IPs of spammers that send to the administrator of cluecentral.net. Warning: Is not testable.”
SBBL (http://sbbl.they.com) - ”Lists IPs of mailservers that send to spambait addresses at they.com. IPs are automatically removed.”
SBL (http://sbl.spamhaus.org) - ”Spamhaus Block List. Lists &#39;known spammers, spam gangs or spam support services&#39;. Confirmed on 21 Mar 2002.”
SCHULTE (http://rbl.schulte.org) - ”Lists mailservers that the administrator of the schulte.org domain doesn&#39;t want to get mail from. No TXT records, missing 127.0.0.2 test entry. Warning: Is not testable.”
SDERB (http://msgid.bl.gweep.ca) - ”Scary Devil Enterprises Realtime Blocklist. Lists IPs of mailservers that have sent mail to bad addresses on SDE mailservers in the past 2 1/2 hours, that are not in several other spam databases. No TXT records, missing 127.0.0.2 test entry. Warning: Is not testable.”
SENDERBASE - ”Keeps track of how much E-mail is being sent from IPs/domains, has information about many of them, and will soon have a DNS lookup service. Warning: Is not testable.”
SERVICESNET (http://korea.services.net) - ”Lists all IPs in South Korea; see URL for details. Unconfirmed 28 Oct 2002 due to no 127.0.0.2 test entry. Warning: Is not testable.”
SORBS-BLOCK (http://dnsbl.sorbs.net) - ”Spam and Open Relay Blocking System. This test lists networks that request never to be tested. Confirmed on 28 Aug 2003. Can also be used with the zone block.dnsbl.sorbs.net.”
SORBS-DUL (http://dnsbl.sorbs.net) - ”Spam and Open Relay Blocking System. This test lists dynamic IP ranges. Confirmed on 28 Aug 2003. Can also be used with the zone dul.dnsbl.sorbs.net.”
SORBS-HTTP (http://dnsbl.sorbs.net) - ”Spam and Open Relay Blocking System. This test lists Open HTTP Proxy servers. Confirmed on 11 Dec 2002. May return multiple A records. Can also be used with the zone http.dnsbl.sorbs.net.”
SORBS-MISC (http://dnsbl.sorbs.net) - ”Spam and Open Relay Blocking System. This test lists open proxy servers not listed in the SORBS-HTTP or SORBS-SOCKS tests. Confirmed on 11 Dec 2002. May return multiple A records. Can also be used with the zone misc.dnsbl.sorbs.net.”
SORBS-SMTP (http://dnsbl.sorbs.net) - ”Spam and Open Relay Blocking System. This test lists open relays. Confirmed on 11 Dec 2002. May return multiple A records. Can also be used with the zone smtp.dnsbl.sorbs.net.”
SORBS-SOCKS (http://dnsbl.sorbs.net) - ”Spam and Open Relay Blocking System. This test lists Open SOCKS Proxy servers. Confirmed on 11 Dec 2002. May return multiple A records. Can also be used with the zone socks.dnsbl.sorbs.net.”
SORBS-SPAM (http://dnsbl.sorbs.net) - ”Spam and Open Relay Blocking System. This test lists hosts that have sent spam to the admins of SORBS. Confirmed on 11 Dec 2002. May return multiple A records. Can also be used with the zone spam.dnsbl.sorbs.net.”
SORBS-WEB (http://dnsbl.sorbs.net) - ”Spam and Open Relay Blocking System. This test lists web servers which have vulnerabilities that can be used by spammers (such as formmail scripts). Confirmed on 11 Dec 2002. May return multiple A records. Can also be used with the zone web.dnsbl.sorbs.net.”
SORBS-ZOMBIE (http://dnsbl.sorbs.net) - ”Spam and Open Relay Blocking System. This test lists networks hijacked from their original owners, some of which are already spamming.. Confirmed on 12 May 2003. Can also be used with the zone zombie.dnsbl.sorbs.net.”
SPAMBAG (http://blacklist.spambag.org) - ”Lists networks that send out spam, perform dictionary attacks, both the direct sources and the networks used by them (and networks used to sell software used by them). Warning: Will list large ISPs that tolerate spamming (IE Sprint). May return codes other than 127.0.0.2. Test listing confirmed 14 Dec 2001.”
SPAMCOP (http://bl.spamcop.net) - ”Lists mail servers that have a high spam-to-legitimate-mail ratio. Catches about the most spam of all tests. Donations are requested.”
SPEWS (http://spews.bl.reynolds.net.au) - ”SPEWS is a list of areas on the Internet which several system administrators deny E-mail from. Warning: Intentionally lists legitimate mailservers that either have IPs close to spammers, or that had problems in the past that have been completely fixed. Should not be used to block mail, although could be used in a weighting system.”
TECHNOVISION (http://bl.technovision.dk) - ”Lists IPs of mailservers that have sent spam to the administrator of technovision.dk.”
TRIUMF (http://rbl.triumpf.ca) - ”Unconfirmable on 09 Apr 2002. Warning: Is not testable.”
TUBERLIN (http://rblmap.tu-berlin.de) - ”Unconfirmable on 09 Apr 2002. No documentation. Warning: Is not testable.”
UCEB (http://blackholes.uceb.org) - ”A hardcore spam list; lists mailservers that have sent spam. Returns multiple A records. Confirmed 29 Oct 2002.”
URBL (http://blocked.secnap.net) - ”Lists every IP address (for the totally clueless: that means that every E-mail from anybody on the Internet will be blocked). Should not be used, of course. This one was included because it has a good point: you REALLY should know what and why a test blocks before using it. Confirmed 09 Apr 2002. Warning: Is not testable.”
US (http://blackholes.us) - ”Lists IPs of about 20 different countries and many ISPs (one zone per country/ISP), including Verio. Confirmed 23 Aug 2002. Warning: Is not testable.”
VOX (http://vox.schpider.com) - ”Lists IPs that phydiux.com and it&#39;s partners have received spam from. Confirmed on 23 Oct 2002.”
WSFF (http://will-spam-for-food.eu.org) - ”Unconfirmable on 09 Apr 2002. No documentation. Warning: Is not testable.”
WYTNIJ (http://spam.wytnij.to) - ”Looks like a valid spam database, but untestable (on 24 Mar 2002). Instruction appear to be in Polish, although it&#39;s a Tonga domain. Warning: Is not testable.”
XBL (http://xbl.selwerd.cx) - ”Extreme spam Blocking List, possibly designed to have every known IP listed. Warning: They include Sprint and uunet IPs, and will not remove non-spammers from the list. Can return 127.0.0.2 as well as the documented 127.0.0.4. Re-confirmed 21 Mar 2002.”
YAMTA-SPAM (http://spamsources.yamta.org) - ”Lists IPs of spammers that have sent spam to the servers of the people that run this test. Confirmed on 30 Jun 2003.”
YAMTA-PROBES (http://spamsources.yamta.org) - ”Lists IPs of spammers that probed the servers of the people that run this test, to see if they are running an open relay. Confirmed on 30 Jun 2003..”
YBL (http://ybl.megacity.org) - ”Lists all known Yahoo (and subsidiaries) netblocks, worldwide. Confirmed on 01 Jun 2002.”
RELATING POSTS: Comming Soon...

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.

nikita69
11-08-2003, 06:04 AM
HOW TO STOP SPAM VIA WINDOWS MESSENGER SERVICE
Below you&#39;ll find many ways (sorted in the most successful ratio first) to stop the Windows Messenger service, depending on your system environment, some may require more than one process. This service is available only on NT, 2K, XP & Server 2003. Administrator Login is REQUIRED

About The Messenger Service Messenger is a Windows Service that runs in the background
Messenger is not the same as MSN Messenger or any other Instant Messaging Program
Messenger does not facilitate two-way chatting
Many Windows Programs, Firewalls, UPS and Antiviruses require the Messenger Service
Antivirus and UPS software, among others, may not work if Messenger is disabled
The Messenger Service is usually turned on by default in most Windows NT, 2K and XP systems
MANUALLY(IMPORTANT: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base: 256986 - Description of the Microsoft Windows Registry (http://support.microsoft.com/default.aspx?scid=kb;EN-US;256986)
Example 1 Click Start, Run and enter the following command:
RunDll32 advpack.dll,LaunchINFSection %windir%&#092;inf&#092;msmsgs.inf,BLC.Remove
NOTE: This will prevent a long delay when opening Outlook Express if you have the Contacts pane enabled
To prevent this, click Start, Run and enter {REGEDIT} Go to:
HKEY_LOCAL_MACHINE&#092;Software&#092;Microsoft&#092;Outlook Express
Right click in the right pane and select New, Dword value
Give it the name Hide Messenger Double click this new entry and set the value to 2
End result should look EXACTLY like this:
System Key: [HKEY_LOCAL_MACHINE&#092;SOFTWARE&#092;Microsoft&#092;Outlook Express]
Value Name: Hide Messenger
Data Type: REG_DWORD (DWORD Value)
Value Data: (2 = remove messenger)
Example 2 Copy and paste the following to Run Command Bar in the Start Menu:
RunDll32.exe advpack.dll,LaunchINFSection
%windir%&#092;inf&#092;msmsgs.inf,BLC.Remove
Example 3 If Example 5 didn&#39;t work, then try this - Many users miss or don&#39;t know of it
Click on Start then go to RUN and type:
C:&#092;WINDOWS&#092;inf&#092;sysoc.inf
Change:
msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7
To:
msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,7
Then use Add/Remove Windows Components to remove Messenger
NOTE: You can also prevent access to Windows Messenger using Group Policy or the Set Program Access and Defaults utility added by default in Windows XP SP1 and Windows 2000 SP3
Example 4 Open Windows Messenger
From the menu, select "Tools" then "Options" then "Preferences" tab
Uncheck "Run this program when Windows starts"
Open Outlook Express
From the menu, select "Tools" then "Options" then "General" tab
Uncheck the option to "Automatically log on", if it&#39;s there
Also in Outlook Express, select "View" then "Layout"
Uncheck the option to "display Contacts" - The program will open a connection and display a list of all Contacts on line if you do not
In "Startup Folder" make sure there is no entry there for Messenger
Open Norton Anti-Virus if you have it installed
Click "Options" then "Instant Messenger"
Unckeck "Windows Messenger (recommended"
NOTE: This list ought to work in disassociate MSN from Outlook Express, so that it&#39;ll only start up if you really want it to
Example 5 2000 Click Start-> Settings-> Control Panel-> Administrative Tools->Services
Scroll down and highlight "Messenger"
Right-click the highlighted line and choose Properties
Click the STOP button
Select Disable in the Startup Type scroll bar
Click OK
XP Home Click Start->Settings ->Control Panel
Click Performance and Maintenance
Click Administrative Tools
Double click Services
Scroll down and highlight "Messenger"
Right-click the highlighted line and choose Properties
Click the STOP button
Select Disable in the Startup Type scroll bar
Click OK
XP Professional Click Start->Settings ->Control Panel
Click Administrative Tools
Click Services
Double click Services
Scroll down and highlight "Messenger"
Right-click the highlighted line and choose Properties.
Click the STOP button.
Select Disable in the Startup Type scroll bar
Click OK
Windows NT Click Start ->Control Panel
Double Click Administrative Tools
Select Services-> Double-click on Messenger
In the Messenger Properties window, select Stop
Then choose Disable as the Startup Type
Click OK
NOTE: If you stop the service and don’t adjust the startup type, the Messenger service will start automatically the next time you reboot. Keep in mind that when you disable the Messenger service, you&#39;ll no longer receive messages about an attached UPS, and you won’t be notified of print job completion, performance alerts, or antivirus activity (from Windows) not the program you&#39;re using for those purposes. Example 6 To disable receipt of messenger pop-ups, verify that your firewall disables inbound traffic on UDP ports 135, 137, and 138, and TCP ports 135 and 139. On a system connected directly to the Internet, you should also disable inbound traffic on TCP port 445. If the system you want to protect is part of a Win2K-based network with Active Directory (AD), don&#39;t block incoming traffic on port 445 - Microsoft Knowledge Base Article - 330904 (http://support.microsoft.com/default.aspx?scid=kb;en-us;330904)
NOTE: You can use the firewall approach only if your system doesn&#39;t communicate with legacy systems that rely on NetBIOS name resolution to locate machines and shared resources. If, for example, you let users running Windows 9x share your printer or scanner, when you disable inbound NetBIOS traffic, users won&#39;t be able to connect to these shared resources. Regardless of the method you choose, you can stop messenger spam
PROGRAMS Example 1 Shoot the Messenger (http://grc.com/files/shootthemessenger.exe)
NOTE: On Oct 15, 2003, Microsoft releases Critical Security Bulletin MS03-043 warning users that the Windows Messenger Service running and exposed by default in all versions of Windows NT, 2000 and XP, contains a "Remote Code Execution" vulnerability that allows any not otherwise secured and protected Windows machine to be taken over and remotely compromised over the Internet
Example 2 Messenger Disable (http://www.dougknox.com/xp/utils/MessengerDisable.zip)
NOTE: If you choose to uninstall Windows Messenger on a system with SP1 installed, you will receive an error message about "un-registering" an OCX file. This is normal, and doest not affect the removal process. Windows Messenger will still be removed
Example 3 MessengerScan (http://www.foundstone.com/resources/termsofuse.htm?file=messengerscan.zip) - a Windows based detection and analysis utility that can quickly and accurately identify Microsoft operating systems that are vulnerable to the messenger service buffer overflow released in the MS03-043 bulletin
TESTS Example 1 Right-click "My Computer"
Select "Manage"
Under "System Tools" right-click on "Shared Folders"
Choose "All Tasks" and select "Send Console Message..."
If you recieve the following error message then the service has been disabled, otherwise confirm that you have disabled it or try another example
"The following error occured while reading the list of sessions from Windows clients:
Error 2114: The Server service is not started."
Example 2 Click Start then "Run"
Type in {cmd.exe}
Type in net send 127.0.0.1 hi
If you get a popup "hi" message, then confirm that you have disabled it or try another example
IF YOU INSIST If you insist on keeping Windows Messenger, then I&#39;d recommend Messenger Manager (http://www.sellertools.com/default.asp?i=MessageManager3.htm) - "Allows you to keep your messenger service running, as is intended and needed by Windows. This ensures that vital system errors and notifications may be sent informing you of Important System Events"
However, as a replacement to Windows Messenger remote control feature, I&#39;d recommend this free tool Virtual Network Computing (http://www.realvnc.com/download.html) - "It is a remote control software which allows you to view and interact with one computer (the "server") using a simple program (the "viewer") on another computer anywhere on the Internet. The two computers don&#39;t even have to be the same type, so for example you can use VNC to view an office Linux machine on your Windows PC at home"
RELATING POSTS: comming soon...

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.
updated

nikita69
11-08-2003, 09:39 AM
HOW TO TWEAK THE REGISTRY SETTINGS FOR MAXIMUM PROTECTION FROM NETWORK ATTACK

The following registry settings will help to increase the resistance of the NT or Windows 2000 network stack to network denial of service attacks. All of the TCP/IP parameters are registry values located under the registry key:

HKEY_LOCAL_MACHINE
&#092;SYSTEM
&#092;CurrentControlSet
&#092;Services:
&#092;Tcpip
&#092;Parameters
(IMPORTANT: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base: 256986 - Description of the Microsoft Windows Registry (http://support.microsoft.com/default.aspx?scid=kb;EN-US;256986) SynAttackProtect Key: Tcpip&#092;Parameters
Value Type: REG_DWORD
Valid Range: 0, 1, 2
0 (no synattack protection)
1 (reduced retransmission retries and delayed RCE (route cache entry) creation if the TcpMaxHalfOpen and TcpMaxHalfOpenRetried settings are satisfied.)
2 (in addition to 1 a delayed indication to Winsock is made.)
Note: When the system finds itself under attack the following options on any socket can no longer be enabled : Scalable windows (RFC 1323) and per adapter configured TCP parameters (Initial RTT, window size). This is because when protection is functioning the route cache entry is not queried before the SYN-ACK is sent and the Winsock options are not available at this stage of the connection.
Default: 0 (False)
Recommendation: 2
Description: Synattack protection involves reducing the amount of retransmissions for the SYN-ACKS, which will reduce the time for which resources have to remain allocated. The allocation of route cache entry resources is delayed until a connection is made. If synattackprotect = 2, then the connection indication to AFD is delayed until the three-way handshake is completed. Also note that the actions taken by the protection mechanism only occur if TcpMaxHalfOpen and TcpMaxHalfOpenRetried settings are exceeded
TcpMaxHalfOpen Key: Tcpip&#092;Parameters
Value Type: REG_DWORD—Number
Valid Range: 100–0xFFFF
Default: 100 (Professional, Server), 500 (advanced server)
Recommendation: default
Description: This parameter controls the number of connections in the SYN-RCVD state allowed before SYN-ATTACK protection begins to operate. If SynAttackProtect is set to 1, ensure that this value is lower than the AFD listen backlog on the port you want to protect(see Backlog Parameters for more information) . See the SynAttackProtect parameter for more details
TcpMaxHalfOpenRetried Key: Tcpip&#092;Parameters
Value Type: REG_DWORD—Number
Valid Range: 80–0xFFFF
Default: 80 (Professional, Server), 400 (Advanced Server)
Recommendation: default
Description: This parameter controls the number of connections in the SYN-RCVD state for which there has been at least one retransmission of the SYN sent, before SYN-ATTACK attack protection begins to operate. See the SynAttackProtect parameter for more details
EnablePMTUDiscovery Key: Tcpip&#092;Parameters
Value Type: REG_DWORD—Boolean
Valid Range: 0, 1 (False, True)
Default: 1 (True)
Recommendation: 0
Description: When this parameter is set to 1 (True) TCP attempts to discover the Maximum Transmission Unit (MTU or largest packet size) over the path to a remote host. By discovering the Path MTU and limiting TCP segments to this size, TCP can eliminate fragmentation at routers along the path that connect networks with different MTUs. Fragmentation adversely affects TCP throughput and network congestion. Setting this parameter to 0 causes an MTU of 576 bytes to be used for all connections that are not to hosts on the local subnet
NoNameReleaseOnDemand Key: Netbt&#092;Parameters
Value Type: REG_DWORD—Boolean
Valid Range: 0, 1 (False, True)
Default: 0 (False)
Recommendation: 1
Description: This parameter determines whether the computer releases its NetBIOS name when it receives a name-release request from the network. It was added to allow the administrator to protect the machine against malicious name-release attacks
EnableDeadGWDetect Key: Tcpip&#092;Parameters
Value Type: REG_DWORD—Boolean
Valid Range: 0, 1 (False, True)
Default: 1 (True)
Recommendation: 0
Description: When this parameter is 1, TCP is allowed to perform dead-gateway detection. With this feature enabled, TCP may ask IP to change to a backup gateway if a number of connections are experiencing difficulty. Backup gateways may be defined in the Advanced section of the TCP/IP configuration dialog in the Network Control Panel. See the "Dead Gateway Detection" section in this paper for details
KeepAliveTime Key: Tcpip&#092;Parameters
Value Type: REG_DWORD—Time in milliseconds
Valid Range: 1–0xFFFFFFFF
Default: 7,200,000 (two hours)
Recommendation: 300,000
Description: The parameter controls how often TCP attempts to verify that an idle connection is still intact by sending a keep-alive packet. If the remote system is still reachable and functioning, it acknowledges the keep-alive transmission. Keep-alive packets are not sent by default. This feature may be enabled on a connection by an application
PerformRouterDiscovery Key: Tcpip&#092;Parameters&#092;Interfaces&#092;
Value Type: REG_DWORD
Valid Range: 0,1,2
0 (disabled)
1 (enabled)
2 (enable only if DHCP sends the router discover option)
Default: 2, DHCP-controlled but off by default.
Recommendation: 0
Description: This parameter controls whether Windows 2000 attempts to perform router discovery per RFC 1256 on a per-interface basis. See also SolicitationAddressBcast
EnableICMPRedirects Key: Tcpip&#092;Parameters
Value Type: REG_DWORD
Valid Range: 0, 1 (False, True)
Default: 1 (True)
Recommendation: 0 (False)
Description: This parameter controls whether Windows 2000 will alter its route table in response to ICMP redirect messages that are sent to it by network devices such as a routers
RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.
updated

nikita69
11-10-2003, 09:55 AM
WHAT IS A WEB BASED PROXY? First of all, let’s start out by defining what a proxy is. A proxy is a machine that is between an originating machine and a destination machine. As you (hopefully) already know, each and every machine on the web has its own unique IP (Internet Protocol) address, which is assigned by the ISP (Internet Service Provider). So, when someone is using a web based proxy, they are the origin. By using a proxy the user will mask their IP from sites that they are visiting, and thereby provide themselves with anonymity. Some proxies cache web pages, thereby increasing load speeds as the page is not downloaded every time it is viewed (they usually update at regular intervals). Example:
http://zeroone.250free.com/01_Proxy_Route.gif
As the above indicates, the destination will not see the user’s IP as the proxy machine is the machine logging into the destination, not the user’s machine.
Authenticating A Proxy Many of the proxies a user will come across will be outdated and dead. Thus, one needs to be able to bypass all the ‘dead’ proxies in order to save time. A program that is very useful for this is MultiProxy™.
Using MultiProxy a user can import a *.txt list of proxies that has been created and then proceed to “Check All Proxies” via the application. Once MultiProxy has completed its check, the user can delete all non-responding proxies, then export the revised proxy list out to a *.txt file to save for a backup if so desired. The remaining proxies should all have green circles next to them, thus indicating a functioning proxy. There is much more to this program, and perhaps I will write a future article on its finer functions.
Never rely on ONE program/site to check the anonimity of each proxy. Use several programs/sites, change the CGI script for more intensive and detailed testing. These tips require a topic of itself, of which I will create soon.
Using a Proxy Most applications that access the internet will have an option to use a proxy somewhere. Once you find it the rest is fairly self explanatory. The proxy’s address goes in the ‘Address’ bar and the port number goes in the ‘Port’ bar.
When finding proxies on the web, most will be displayed in a manner similar to this:IP : Port (without the space in between)
123.456.789.100:8080
And this is how it should appear in the application’s options:
Address: 123.456.789.100
Port: 8080
How To Tell If A Proxy Is Anonymous Note that not all proxies will facilitate the above. Those proxies are commonly known as “Transparent” proxies. This means that they forward some or all of the user’s information to the destination. When striving for anonymity it is important to ensure that you find proxies that are “Anonymous” or defined as “High Anonymity.” Also remember to test these for yourself. Check the test links posted HERE (http://proxys4u.proboards24.com/index.cgi?board=QuesAnon&action=display&num=1067765903). Bear in mind, however, that even if no proxy is detected (meaning it’s an anonymous proxy), it may not be totally anonymous. Sites that run Java or Active/X Scripts can still see through proxies. With a simple code, that I will discuss later, using either VM or SVM
Chaining Proxies
A method that allows for increased security is a technique called “chaining.” In this method there are multiple proxies between a user and a destination. Example:
http://www.chinkii.com/uploads/album/misc/01_Proxy_Route2.GIF
Proxies can be used in chains that are as short or as long as you would like. The generic syntax for chaining proxies is similar to this:[list] Address: 123.456.789.124:80 987.654.321.237
Port: 8000
In the above, there are two proxy addresses and two port numbers. Proxy one is 123.456.789.124 and the port that it is on is port 80
Proxy two is 987.654.321.237 and it is on port 8000
They are separated with a ‘space.’
That is the most typical manner of importing proxies using windows based GUI applications as far as I have seen.
Also, when chaining proxies, remember to pay attention to politics as connecting through countries with political tension will decrease the chance that the requesting government can get the logs within any reasonable time, and if they have to trace multiple hops a proxy may have already deleted its logs before they can get them. If this occurs, odds are, it will end their search.
HowTo: Proxy Chain In Internet Explorer 6.0.29 Under Tools/Internet Options/Connections/LAN
Settings/Proxy Server
In the address bar, type <Proxy IP>:<Port> <Proxy
IP>:<Port>. Make sure you separate each pair with a space. And remember that the last port in the proxy chain string must go in the port box of the IE proxy settings.. Example using the following IPs:
Address: 216.148.246.133
Port: 8000
Address: 128.32.56.100
Port: 8000
Address: 206.105.71.2
Port: 80
Here&#39;s the method for IE (All versions) and probably Netscape: Address: 216.148.246.133:8000 128.32.56.100:8000 206.105.71.2
Port: 80
Notes Remember that setting a proxy in your web browser will only affect your web browser, nothing else. Each program that you wish to operate through a proxy must be set up individually.
From my experience, a user cannot input the proxy(s) and port(s) directly into the URL address bar. It has to be done through the options (this applies for at least Internet Explorer on Windows XP).
Normal proxies and SOCKS proxies are only compatible one way. Thus SOCKS proxies will work where one would input normal proxies, but not vice versa.
Many proxies that I have come across limit navigation to within certain sites. Others have filters on “questionable material.” Simply filter through them and find the good ones, don’t waste too much time trying to get one to work. There are plenty more.
Remember that laws regarding proxy use vary. Be sure to know the laws for where you are.
RELATING POSTS: comming soon...

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.

CREDIT/OTHER: <span style='color:green'>HERE (http://proxys4u.proboards24.com/index.cgi?board=QuesAnon&action=display&num=1067963485&start=0) </span>
new

DL.
11-10-2003, 10:14 AM
Why don&#39;t you just provide the links to this material instead of cut and pasting it here?

http://www.google.ca/search?q=cache:tGo55J...&hl=en&ie=UTF-8 (http://www.google.ca/search?q=cache:tGo55J_6d94J:www.blackcode.com/forums/viewtopic.php%3Ft%3D4187+HowTo:+Proxy+Chain+In+Internet+Explorer+6.0.29&hl=en&ie=UTF-8)


Under Tools/Internet Options/Connections/LAN Settings/Proxy Server
In the address bar, type <Proxy IP>:<Port> <Proxy IP>:<Port>. Make sure you seperate each pair with a space. And remember that the last port in the proxy chain string must go in the port box of the IE proxy settings..

Say I wanted to use the following IPs:

Address: 216.148.246.133
Port: 8000

Address: 128.32.56.100
Port: 8000

Address: 206.105.71.2
Port: 80

Here&#39;s the method for IE (All versions) and probably Netscape:
Give due credit to the author at least <_<

nikita69
11-10-2003, 10:36 AM
read above under credit/other.

nikita69
11-13-2003, 08:42 AM
HOW TO SPEED-UP YOUR WEB SURFING

Continuing from example 1 (http://www.klboard.ath.cx/index.php?showtopic=64831&view=findpost&p=499791) & example 2 (http://www.klboard.ath.cx/index.php?showtopic=64831&st=30&#entry567015) & example 3 (http://www.klboard.ath.cx/index.php?showtopic=64831&st=45&#entry624191) & example 4: (http://www.klboard.ath.cx/index.php?showtopic=64831&st=45&#entry616256)IMPORTANT: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base: 256986 - Description of the Microsoft Windows Registry (http://support.microsoft.com/default.aspx?scid=kb;EN-US;256986) Name Resolution Understand exactly how Name Resolution works and what steps are taken to process your request - below is a simple explanation and HERE (http://www.incognito.com/support/WebHelp/troubleshootingknowledgebase/how_name_lookup_works.htm) is a more detailed explanation NetBIOS Name Cache — A client first queries the local NetBIOS name cache. NetBIOS names and IP addresses are preloaded into the name cache when a #PRE entry for the names and IP addresses appears in the LMHOSTS file
WINS Server — If the unresolved NetBIOS name isn’t found in the name cache, NT tries to locate that name using a WINS server.
Broadcasts within an IP subnetwork — If the name cache and WINS server aren’t available or fail to produce a match, the client typically tries a broadcast to the other computers in the network
LMHOSTS File(s) — If a broadcast fails to resolve the name and “Enable LMHOSTS Lookup” is checked, the client looks at the LMHOSTS file for the entries that weren’t preloaded into the NetBIOS name cache
HOSTS File — If the LMHOSTS file search fails, the client then looks at the HOSTS file
DNS Server — If “Enable DNS for Windows Resolution” is checked, the client queries the DNS server, which returns the IP address
"Knowing the order of name resolution methods will help you optimize access to resources" - Microsoft
Make sure that the value assigned to HOSTS is arithmetically lower than that for DNS and WINS
Other registry to consider tweaking HKEY_LOCAL_MACHINE&#092;SYSTEM&#092;CurrentControlSet&#092;Services&#092;NetBT&#092;Parameters
HKEY_LOCAL_MACHINE&#092;SYSTEM&#092;CurrentControlSet&#092;Services&#092;NBF&#092;Parameters
Last but certainley not least, is adding the IP addresses of the sites you visit often. Remember, without this step, the query to identify/translate the name addresse you typed is initiated
Note: AOL doesn&#39;t use the standard TCP/IP stack (at least not the last time I checked) Quality of Service (QoS)QoS is an industry-wide initiative to provide preferential treatment to certain subsets of data, enabling that data to traverse the Internet or intranet with higher quality transmission service.
QoS in Microsoft® Windows® operating systems is a collection of components that enable differentiation and management of higher quality data transmissions across the network - Quality of Service (QoS) (http://www.microsoft.com/whdc/hwdev/tech/network/qos/default.mspx) & HERE (http://www.google.co.kr/search?q=cache:gRop315_yJsJ:enete.us.es/docu_externa/Whitepapers/Quality_of_Service.doc+%22Windows+QoS%22&hl=ko&ie=UTF-8&inlang=ko)
Click Start, Run and enter {REGEDIT} Go to:
HKEY_LOCAL_MACHINE&#092;SYSTEM&#092;CurrentControlSet&#092;Services&#092;Psched
Right click in the right pane and select New, Dword value
Create a new DWORD value called "AdapterLimit" Double click this new entry and set it to the percentage (in decimal) of bandwidth (0%) to reserve for QoS packets
Restart Windows for the change to take effect
End result should look EXACTLY like this:
System Key: [HKEY_LOCAL_MACHINE&#092;SOFTWARE&#092;Policies&#092;Microsoft&#092;Windows&#092;Psched]
Value Name: AdapterLimit
Data Type: REG_DWORD (DWORD Value)
Value Data: Decimal Percentage (default = 20)
Note: You can change these values on each adapter you may have by following the same steps above in [HKEY_LOCAL_MACHINE&#092;SYSTEM&#092;CurrentControlSet&#092;Services&#092;Psched&#092;Parameters&#092;Adapters&#092;{Adpater-ID}], just rename the Value Name & and change the Value Data if needs to be.

In conclusion, these tips may or may not work for you. It has for me, for many years and with the new addition of NetLimiter, believe it or not - some sites decline my connection "error-connection is too fast". Use with caution and always backup your registry before attempting any kind of change. Helpfull Small Programs CIP (http://www.webattack.com/php/download.php?id=100774)- "Is the XPT&#39;s hosts file manager. It is by far the fastest, the most feature-rich, the most interactive and above all the most powerful product of its kind on the market today"
www.freeproxy.ru&#092;download&#092;dns_resolver.exe] (http://h**p:&#092;&#092;DNS RESOLVER[/b] - "This program resolves list of DNS names to IP addresses or lookups IP to DNS"
FAST CACHE (http://www.analogx.com/files/fci.exe) - "Is a caching DNS server that runs on your local machine and handles any DNS request that your computer makes, from Internet Explorer to your favorite FTP client. Once a query is made, FastCache will override the normal timeout for the item with one that you specify, so instead of saving a query for a couple of seconds, it can save it for a couple of days. Now every time you ask for it again while it&#39;s in the cache, it gives it to you instantly"
FAST NET99 (http://www.webattack.com/php/download.php?id=101283) - "Is an advanced HOSTS file manager. It speeds up web surfing by using the Windows HOSTS file to cache IP addresses on your local machine. If the HOSTS file is created, your browser (and all other internet applications) will use it to lookup the DNS before contacting the remote DNS server of your ISP. Since the local lookup is faster, you ll save a few milliseconds with each request that can be resolved locally. FastNet99 can automatically check and update the IP addresses in the local HOSTS file, import your browser bookmarks from IE, Netscape and Opera as well as URLs from the browser cache. In addition, the program provides several useful internet utilities, all integrated with the rest of the features. They include an email checker, port scanner, tracereoute, popup killer, internet application launcher, IP Inspector and more"
RELATING POSTS: comming soon...

RESULTS WILL VARY
No matter how good your systems may be, they&#39;re only as effective as what you put into them.
new

DL.
11-13-2003, 10:19 AM
CREDIT/OTHER: ALL TIPS WHERE COMPILED FROM POSTS ON THIS BOARD AND MY HUMBLE EXPERIENCE. IN ADDITION, THEY ARE BASED ON YOU USING THE LATEST SOFTWARE VERSION OF THE PROGRAM DISCUSSED


BULLSHIT&#33;&#33;

http://www.windowsitlibrary.com/Content/155/06/2.html



Name Resolution at a Glance
A client computer configured to use WINS, LMHOSTS files, a HOSTS file, and DNS follows this series of steps to resolve a NetBIOS name:
NetBIOS name cache — A client first queries the local NetBIOS name cache. NetBIOS names and IP addresses are preloaded into the name cache when a #PRE entry for the names and IP addresses appears in the LMHOSTS file.
WINS server — If the unresolved NetBIOS name isn’t found in the name cache, NT tries to locate that name using a WINS server.
Broadcasts within an IP subnetwork — If the name cache and WINS server aren’t available or fail to produce a match, the client typically tries a broadcast to the other computers in the network.
LMHOSTS file(s) — If a broadcast fails to resolve the name and “Enable LMHOSTS Lookup” is checked, the client looks at the LMHOSTS file for the entries that weren’t preloaded into the NetBIOS name cache.
HOSTS file — If the LMHOSTS file search fails, the client then looks at the HOSTS file.
DNS server — If “Enable DNS for Windows Resolution” is checked, the client queries the DNS server, which returns the IP address.
Knowing the order of name resolution methods will help you optimize access to resources. For example, because the NetBIOS name cache is queried first, you could consider using a #PRE entry in the LMHOSTS file to statically add the NetBIOS name and IP address of a computer you communicate with often. Similarly, using a WINS server from a local network or a network that has higher bandwidth will help you resolve NetBIOS over TCP/IP more quickly.

Host name resolution is a lot simpler. When an application needs to resolve a host name, the process is quite similar to that in Unix. The HOSTS file is referenced and if an IP address can’t be resolved from the HOSTS file, NT looks for help from a DNS server (if configured in the TCP/IP configuration parameters). As we explain later, DNS servers running on NT can be configured to use WINS servers. If WINS lookup is enabled, the DNS server tries to resolve the name from the WINS server and returns the IP address to the client.


Remarkable similarity don&#39;t you think? <_<

Princessgirls
11-13-2003, 12:09 PM
I tried installing the TWEAKUI tool that u mentioned. It said it needs to run from the control panel...I said OK. now I cant find it. Went to control panel. no sign of it. Tried installing again...got no-where.

nikita69
11-13-2003, 03:51 PM
@DL - obviously u don&#39;t seem to understand the logic behind software in general. Allow me to explain a bit.

When a programmer writes a software to be used for whatever purpose, it contains processes or specific steps to accomplish the request. So when someone wants to explain those steps, 99.9% of the times, there is only one way to do so. Why, because that&#39;s how the programmer wrote it and called LOGIC. If the programmer wrote the software to contain more than one way to accomplish the request, then ud see several ways to explain those steps.

Ususally the 99.9% is called common knowledge, meaning neither I nor the most knowledgeable person of PCs created that info. Whom ever created this or that tip is known, in most cases it&#39;s the programmer or the company that created such software. To reference every single detail anyone writes, then it becomes confusing and tedious.

For example, take the quote and source u provided, it says and I quote "Knowing the order of name resolution methods will help you optimize access to resources". This quote originated from Microsoft, as I highlighted and mentioned them, yet ur source didn&#39;t. Now, did they fail to reference this? No, to add, 90% of this or that software relating to Microsoft, for example, is not thier "specific steps", it&#39;s Microsoft&#39;s.

I do understand ur willingness to "give credit where due", yet remarks and comments such as above, only devert to the actions of ur thoughts. :)

nikita69
11-13-2003, 03:55 PM
@Princessgirls - If ud like, lets take this issue to Software cos the mods here would like to keep the TIP section as clean as possible of questions, concerns or comments. or u can PM me. thx. :) don&#39;t worry there&#39;s a solution.

DL.
11-13-2003, 05:47 PM
Your motives and methods are not exactly honourable or excusable. You are obviously trying very hard to pass yourself off as something more than you really are and this isn&#39;t the first time you&#39;ve been caught is it.
The claim that you were running mac osx on virtual pc for example. An honest mistake? No, pure bullshit that you were caught at. :lol:
But you still haven&#39;t learned that your lies will catch up to you. You are a fraud in the simplest of terms.
You pretend to have first hand knowledge and "humble experience" of things you don&#39;t understand at all. Your act is very weak and transparent to some of us though <_<
A god you are not. An expert you are not. A plagiarizing thief, you are&#33;

Nitrox
11-16-2003, 09:18 PM
u lot musta take ages copyin all dat :o

DL.
11-21-2003, 10:35 PM
Not as long as it would have to learn some of it and write his own version. <_<

test2speed
12-29-2003, 04:59 AM
Wow Peep Come down&#33;&#33;&#33;&#33;&#33; shit , just relax , the only way you can download A file fast is by using speed up, and thats it&#33; no other way&#33;

Its like saying Look at me look at im downloading Need for speed Underground from kazaa lite and it Took me 2 min, fuck no&#33;&#33;, theirs No way&#33; that cod Happen
it takes 3 days at least&#33;

wenze1
12-29-2003, 05:02 AM
Dude you are a nooooooooooooob&#33;&#33;&#33;&#33;&#33;&#33;&#33;

chitowng09
01-03-2004, 09:45 AM
These tips don&#39;t fukkin work

I have a very fast connection which I download files at over 400+ kilobytes per second on the internet. I download files with lots of sources and very high bandwith

through all that, I can&#39;t download a 100+ mb file with any type of speed. What should I do?? :( :( :( :(