Tuesday, September 28, 2010

Easily Boot Window From Pendrive

I have make it easy to follow, there are still some of you having some difficulty in the process. Recently, I have found this little cool application that is able to do all the things covered in the command prompt.

The application that I am talking about is Window7 USB DVD Tool. This is a small application (only 1.08MB) that allows you to convert your Windows installer CD/DVD or ISO File to a bootable USB drive. Not only is it easy to use (nearly idiot-proof and does not require you to have any technical knowledge), it is also fully portable.

Preparation : 
Before you start, here are some stuffs that you need to take note of:

1) You need to have a USB drive of at least 3GB space in order to create a Windows 7 bootable USB drive.

2) The process will format and wipe off all your files in the USB drive. Remember to backup before you proceed.

3) You need to have a Windows 7 installer DVD and an optical drive to read the DVD. If you have only the ISO file (downloaded directly from Microsoft), if you no have ISO file just have Window DVD you can use Power ISO to convert your DVD window to ISO file in your computer.

4) It just a simple program i think you all also will know use it without any tutorial. 

Window7 USB DVD Tool -- download 
Power ISO                        -- download

Thanks for spend your time to read my blog .

DoS Command Using Command Prompt

Long time already no update my blog , because got some problem with internet connection that was very slow and some problem with mediafire file hosting to upload some video tutorial . So today i want to share with all my visitor and reader some DDoS command that can run in Command Prompt . It can run in all window . Me like to DDoS people using command prompt from using software , it because it very easy to do it . So let start our lesson . 


1) Open Command Prompt (CMD) - press start then write in the search box CMD . 
2) Write command in the CMD box , ( ping www.example123.com ) then press enter . After a while then CMD will out the website server IP . 
3) Write this command below the server IP. "ping 123.456.790.123 -t -l 15500" 
  ( make sure that the IP is same with the server IP , then the 15500 is the data that you want  to fold the data )
 If you don understand here are some tutorial that i have upload that will very usefull . click here


Thanks for spend your time to read my blog . 

Saturday, September 18, 2010

The Difference Of DoS vs DDoS

DoS = Denial Of Service
DDoS = Distributed Denial Of Service

Whilst DoS and DDoS sound remarkably similar there are in fact differences between the two :
DoS
- A DoS Attack is a Denial of Service attack.
- This means that one computer and one internet connection is used to flood a server with packets (TCP / UDP).
- The point of such a denial of service attack is to overload the targeted server’s bandwidth and other resources.
- This will make the server inaccessible to others, thereby blocking the website or whatever else is hosted there.
DDoS
- A DDoS Attack is a Distributed Denial of Service Attack.
- In most respects it is similar to a DoS attack but the results are much, much different.
- Instead of one computer and one internet connection the DDoS attack utilises many  computers and many connections.
- The computers behind such an attack are often distributed around the whole world and will be part of what is known as a botnet.

      What Is Botnet ?
  • A large number of computers that have been infected, and effectively hijacked, can be grouped together to achieve a common purpose. This group of hijacked computers is commonly referred to as a ‘botnet’.
  • Cyber criminals, who are often part of global syndicates, can remotely control all of the machines in a botnet whilst retaining almost complete anonymity.Botnets are often utilised for a variety of purposes, all without the user’s knowledge.
  • These nefarious tasks include -
  1. sending huge amounts of spam emails
  2. launching denial of service attacks against targeted websites
  3. spreading viruses
  4. stealing personal information for identity theft attacks
  • Additionally, because botnets are controlled remotely, they can be used to install software, such as keyloggers, which can then be used for monitoring keystrokes on a computer keyboard. This will then typically yield passwords and information about various accounts, such as bank accounts and social networking profiles, allowing the controller(s) of the botnet to commit fraud or propagate the hijacking through other sites.At this moment in time there is no easy method of disabling botnets as those behind them are extremely clever at hiding their work and re-routing information in order to evade detection. There are a large number of botnets in existence across the globe, the most notable of which is probably Waledec which is linked to the notorious Conficker worm, and may have several millions of computers in its network.
    - The main difference between a DDoS attack vs a DoS attack, therefore, is that the target server will be overload by hundreds or even thousands of requests in the case of the former as opposed to just one attacker in the case of the latter.
    - Therefore it is much, much harder for a server to withstand a DDoS attack as opposed to the simpler DoS incursion.

    Wednesday, September 15, 2010

    rDoS and Port Scanner ~ DDOS Application

    Hi all reader , long time no update my blog because got some trouble with mediafire file hosting to upload . It because i want to share some of my hacking application . Today i want to share some of my DDoS application, it is rDoS and Port Scanner .  Every body all ready know right ? what is ddos ? from my last article that have a little bit explain that about ddos and how was ddos working . If you still don know please take a moment to know about DDOS Attack .  

    Here i want to teach how rDoS and Port Scanner working . 
    1) You download it and then extract it . 
    2) Open port scanner > put the victim URL . Example : www.testing123.com > then press enter > after that the victim server ip address will out at the bottom of the URL . 
    3) Open rDos > put in the victim ip address > press enter > then put the value that want the port to flood ip . Default is 80 . You can how much port that you want . 
    4) Wait for the DoS attack done . 
    *** Do it at your Own risk *** 
    My advice is please make some security on your IP before you want to Hacking. 

    >>> Please leave your email at comment for the password of rDos and Port scanner .  Thank .

    Thanks for spend you time to read my post and visit my blog . 

    Thursday, September 9, 2010

    Window 7 Godmode

    Hi to all reader or dear visitor , today i want to share some new trick in window 7 , it called Godmode , it not about GOD , just a God to your computer system only . 

    1) Just go to your desktop > right click > New > Folder . 
    2) Copy this code for the folder name " GodMode.{ED7BA470-8E54-465E-825C-99712043E01C} " , ( just copy the word that i bold ) . 
    3) Make sure your icon will be like this . See below . 

    4) Settle . Now you can enjoy it , use your computer in Godmode that got many shortcut inside there, if you want to change your computer system you don need to go find it 1 by 1 . Enjoy it.

    Thanks for spend your time to read and visit my blog . 

    Tuesday, September 7, 2010

    My SQL injection

    SQL Injection is a hacking technique which attempts to pass SQL commands through a web application for execution against a backend database.SQL Injection is one of the many web attack mechanisms used by hackers to steal data from organisations. It is perhaps one of the most common application layer attack techniques used today.

    Web applications allow legitimate website visitors to submit and retrieve data to/from a database over the Internet using their preferred web browser.

    Databases are central to modern websites – they store data needed for websites to deliver specific content to visitors and render information to customers, suppliers, employees and a host of stakeholders. User credentials, financial and payment information, company statistics may all be resident within a database and accessed by legitimate users through off-the-shelf and custom web applications. Web applications and databases allow you to regularly run your business.

    SQL Injection is the hacking technique which attempts to pass SQL commands through a web application for execution by the backend database. If not santised properly, web applications may result in SQL Injection attacks that allow hackers to view information from the database and/or even wipe it out.

    Such features as login pages, support and product request forms, feedback forms, search pages, shopping carts and the general delivery of dynamic content, shape modern websites and provide businesses with the means necessary to communicate with prospects and customers. These website features are all examples of web applications which may be either purchased off-the-shelf or developed as bespoke programs.

    These website features are all susceptible to SQL Injection attacks.

    (Example of SQL Injection)



    SQL injection : A Simple Example

    Take a simple login page where a legitimate user would enter his username and password combination to enter a secure area to view his personal details or upload his comments in a forum.

    When the legitimate user submits his details, an SQL query is generated from these details and submitted to the database for verification. If valid, the user is allowed access. In other words, the web application that controls the login page will communicate with the database through a series of planned commands so as to verify the username and password combination. On verification, the legitimate user is granted appropriate access.

    Through SQL Injection, the hacker may input specifically crafted SQL commands with the intent of bypassing the login form barrier and seeing what lies behind it. This is only possible if the inputs are not properly sanitised (i.e., made invulnerable) and sent directly with the SQL query to the database. SQL Injection vulnerabilities provide the means for a hacker to communicate directly to the database.

    The technologies vulnerable to this attack are dynamic script languages including ASP, ASP.NET, PHP, JSP, and CGI. All an attacker needs to perform an SQL Injection hacking attack is a web browser, knowledge of SQL queries and creative guess work to important table and field names. The sheer simplicity of SQL Injection has fuelled its popularity.

    Is It Database Got Risk To SQL Injection ???

    SQL Injection is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively easy to protect against SQL Injection, there are a large number of web applications that remain vulnerable.

    According to the Web Application Security Consortium (WASC) 9% of the total hacking incidents reported in the media until 27th July 2006 were due to SQL Injection. More recent data from our own research shows that about 50% of the websites we have scanned this year are susceptible to SQL Injection vulnerabilities.

    It may be difficult to answer the question whether your web site and web applications are vulnerable to SQL Injection especially if you are not a programmer or you are not the person who has coded your web applications.

    Our experience leads us to believe that there is a significant chance that your data is already at risk from SQL Injection.

    Whether an attacker is able to see the data stored on the database or not, really depends on how your website is coded to display the results of the queries sent. What is certain is that the attacker will be able to execute arbitrary SQL Commands on the vulnerable system, either to compromise it or else to obtain information.

    If improperly coded, then you run the risk of having your customer and company data compromised.

    What an attacker gains access to also depends on the level of security set by the database. The database could be set to restrict to certain commands only. A read access normally is enabled for use by web application back ends.

    Even if an attacker is not able to modify the system, he would still be able to read valuable information.

    Impact Of The SQL Injection .

    Once an attacker realizes that a system is vulnerable to SQL Injection, he is able to inject SQL Query / Commands through an input form field. This is equivalent to handing the attacker your database and allowing him to execute any SQL command including DROP TABLE to the database!

    An attacker may execute arbitrary SQL statements on the vulnerable system. This may compromise the integrity of your database and/or expose sensitive information. Depending on the back-end database in use, SQL injection vulnerabilities lead to varying levels of data/system access for the attacker. It may be possible to manipulate existing queries, to UNION (used to select related information from two tables) arbitrary data, use subselects, or append additional queries.

    In some cases, it may be possible to read in or write out to files, or to execute shell commands on the underlying operating system.[break][break]Certain SQL Servers such as Microsoft SQL Server contain stored and extended procedures (database server functions). If an attacker can obtain access to these procedures it.

    Unfortunately the impact of SQL Injection is only uncoveredwhen the theft is discovered. Data is being unwittingly stolen through various hack attacks all the time. The more expert of hackers rarely get caught.

    How To Protect From SQL Injection .

    Firewalls and similar intrusion detection mechanisms provide little defense against full-scale web attacks. Since your website needs to be public, security mechanisms will allow public web traffic to communicate with your databases servers through web applications. Isn’t this what they have been designed to do?

    Patching your servers, databases, programming languages and operating systems is critical but will in no way the best way to prevent SQL Injection Attacks.

    Saturday, September 4, 2010

    Download Free MP3 Song In The Fast Way

    Lazy go free download mp3 website and click 1 by 1 ??? I also lazy to do that , it because many link to pass then just can download a song . In here i want to share the fastest way to download a song . I think this step will be more easy , from we go to Ares and Limewire software that can download also but we still don know how the song quality . Here is the trick that we just can do in GOOGLE search engine , not in yahoo , msn and what else search engine .

    1) Go to GOOGLE
    2) Put the artists name , the song name , file hosting name .
    Example : Eminem Love the way you lie mediafire
    • In here i want to share that i think file hosting that the fastest is mediafire , hotfile , rapidshare , megaupload and somemore also fast but u must to have premium account just can get fast . So if you want this step i teach work in fast please use mediafire file hosting . If you want more fast please use downloader like Orbit Downloader and Internet Download Manager ( IDM ) to feel more fast . I think if you download with browser downloader it will very slow , you can't feel the different . No have downloader ? you can download in Software in my blog .
    3) Done . Enjoy the song .

    This trick 100% working , because i use this way to download song . Easy and Fast .
    Thanks for spend your time to read .

    Turn On Your Notebook And PC In 10 Second

    So you wanna know how to turn the pc and notebook on in 10 seconds (may vary) here's what u have to do to turn ur pc on in 10 seconds

    Click on the start button then press R it will take u to Run well go to RUN
    and type Regedit > press enter > this will open Registery Editor > now look for the key.

    HKEY_LOACAL_MECHINE\SYSTEM\CurrentControlSet\Control\ContentIndex

    now there find the Key Called
    "Startup Delay"
    Double Click On It
    Now where its Base
    Click Decimal
    Now its Default Value Is 4800000 (75300:hexadecimal)
    Change The Value To 40000
    here u go u have done it
    now close the Registery Editor and Restart Your Computer

    You'll See The Result
    This trick is for window XP , not for window vista and window 7 it because in Registry Editor the Startup Delay was no have if have also will no same , for who still use window XP you can enjoy it.

    Thanks for spend your time to read my trick .

    Monday, August 30, 2010

    Know Your Laptop Or Pc Male or Female

    Hi all dear visitor, today i want to share some new trick .
    Do you know your laptop GENDER ??? Do you believe that laptop or pc also got Male or Female ??? In here i want to share some Visual Basic ( VB ) code that can know your laptop or pc gender . I not pro in visual basic . I just a newbie that still learn it .

    1) Open your " notepad "
    2) Then you copy this script :
    { CreateObject("SAPI.SpVoice").Speak"I love YOU" } ( just copy that word i bold )
    3) Then save it , please make sure change your save as type to "ALL FILE" , then save as "i love you.vbs" , make sure that you save it as .vbs , because if u don save it as .vbs that word will be not working .

    ( Make sure you save the file will become like this, if your icon are not like this that i will surely you save the file in wrong format )

    4) After save all you go to place that u save and double click on it , it will out a sound that u can know your laptop or pc gender .

    " If not working please leave a comment that i will try my best to help you "
    Thanks for spend your time to visit and read in my blog .

    Tuesday, August 24, 2010

    Xiao Tian World Famous Hacker


    "Xiao Tian"

    Google's recently expressed readiness to withdraw from China and close all their operations there. The reason, the search engine giant that was no resistance to the wave of hacker attacks launched by the bamboo curtain is the country of origin.

    David Drummond, Senior Vice President, Corporate Development and Chief Legal Officer of Google says, the institute found that there is' a very sophisticated attack "that originated from China on Google's infrastructure.

    "The attacks made us decide to review the feasibility of our business operations in China," said Drummond is Google's official blog, January 12, 2010.

    Google's step back from China who chose to show fierce hacker community in the country.

    Until July 2008, an estimated 4 thousands people there are hackers who are members of various hacker community. One of them is a special group of hackers calling themselves women Cn Girl Security Team.

    Hacker group is led by a girl born in Hunan, 6 September 1989 named Xiao Tian.

    In mind, we might imagine that a hacker is a typical teenager growing up, with modest appearance - if not exactly a bad way - with thick glasses, heavy smoker, unkempt hair unkempt and rarely shower for spending most of his life in front of the computer .

    Apparently not the case with Xiao Tian. Although she mentions often stay up and occasionally smoked, but it looks very slick. At a glance, see the appearance, you may be surprised that she was a leader of a group of hackers whose members reached more than 2,200 women hackers.

    Xiao Tian said, she made the group because she felt that there should be no place for teenage girls like she, who felt left out from the crowded world of hackers hackers hackers man who thinks that women do not have enough skill.

    Slowly but surely, Xiao Tian and hacker group started through the dominance of men in the world of hacking. They target the celebrity status that carried by hackers in China as well as open opportunities 'career' which is available tempting for hackers who have a high reputation.


    Although members of the club hacker Xiao Tian still relatively small compared with the population of hackers in China, but the 'organization' hackernya may be one of the biggest female group of hackers in China.

    Scott Henderson, a retired U.S. soldier who is an observer and author of The Dark Visitor: Inside the World of Chinese Hackers never mentioned in the Indian DNA. "Unique Aspects of China's hackers is a sense of nationalism and collectivism. This contrasts with the western stereotype that hackers are generally independent and work individually in the basement of their residence, "he said.

    However, lately, the trend is happening is 'cyber army' is fragmented and forming a criminal capitalists and start to leave their sense of nationalism.

    Still, Henderson says, a time when there is a conflict involving China, the hacker would have to mobilize their group and engage in cyber war. And when the time comes, 'generals' Xiao Tian will probably be one of the leaders of China's army.

    I hope 1 day i also can be like she ...
    Thanks for spend your time to read and visit my blog .

    Setting Facebook E-Mail Notifications

    When you open your E-Mail account must be many or full with facebook e-mail right ??? But all the e-mail are come from Facebook right ??? u must be boring or lazy to delete it .

    So in this tutorial i will give some tutorial to setting in facebook that not all notifications at facebook are e-mail to you .

    1) Go to Account Setting


    2) Go to Notifications

    Now you just choose all the point that u want only . For me the important is the pdate of the Facebook , that must be got use to read . So, if you no do this setting at your facebook account you just think that Facebook is a spammer at your E-Mail inbox .

    Thanks for spend your time to read my tutorial .

    Friday, August 20, 2010

    DDOS Attack

    DDOS ( Denial Of Service )

    A Denial of Service ( DoS) attack is an attack which attempts to prevent the victim from being able to use all or part of their network connection.

    A denial of service attack may target a user, to prevent them from making outgoing connections on the network. A denial of service may also target an entire organization, to either prevent outgoing traffic or to prevent incoming traffic to certain network services, such as the organizations web page.

    Denial of service attacks are much easier to accomplish than remotely gaining administrative access to a target system. Because of this, denial of service attacks have become very common on the Internet.

    Types of Denial of Service (DOS) attacks

    These are a few of the classic denial of service attacks. Most of these rely upon weaknesses in the TCP/IP protocol. Vendor patches and proper network configuration have made most of these denial of service attacks difficult or impossible to accomplish.

    Flood Attack
    The earliest form of denial of service attack was the flood attack. The attacker simply sends more traffic than the victim could handle. This requires the attacker to have a faster network connection than the victim. This is the lowest-tech of the denial of service attacks, and also the most difficult to completely prevent.

    Ping of Death Attack
    The Ping of Death attack relied on a bug in the Berkeley TCP/IP stack which also existed on most systems which copied the Berkeley network code. The ping of death was simply sending ping packets larger than 65,535 bytes to the victim. This denial of service attack was as simple as: ping -l 86600 victim.org

    SYN Attack
    In the TCP protocol, handshaking of network connections is done with SYN and ACK messages. The system that wishes to communicate sends a SYN message to the target system. The target system then responds with an ACK message. In a SYN attack, the attacker floods the target with SYN messages spoofed to appear to be from unreachable Internet addresses. This fills up the buffer space for SYN messages on the target machine, preventing other systems on the network from communicating with the target machine.

    Teardrop Attack
    The Teardrop Attack uses IP's packet fragmentation algorithm to send corrupted packets to the victim machine. This confuses the victim machine and may hang it.

    Smurf Attack
    In the Smurf Attack, the attacker sends a ping request to a broadcast address at a third-party on the network. This ping request is spoofed to appear to come from the victims network address. Every system within the broadcast domain of the third-party will then send ping responses to the victim.

    Distributed Denial of Service (DDOS) attacks
    A Distributed Denial of Service (DDOS) attack is a denial of service attack which is mounted from a large number of locations across the network.

    DDOS attacks are usually mounted from a large number of compromised systems. These systems may have been compromised by a trojan horse or a worm, or they might have been compromised by being hacked manually.

    These compromised systems are usually controlled with a fairly sophisticated piece of client-server software such as Trinoo, Tribe Flood Network, Stacheldraht, TFN2K, Shaft, and Mstream.

    The Mydoom worm attempted DDOS attacks against SCO and Microsoft from the systems which it infected.

    DDOS attacks can be very difficult to defend against.

    Here are a picture that DDOS working .

    Tuesday, August 17, 2010

    6 Google Secret

    Google got secret . Do you know it ??? maybe still not many people know that google got secret. In here i will give you 6 google secret :

    1. Fill in " googoth " in the google search box , then press "I'm Feeling Lucky". Then u will see a dark search engine by google .
    2. Fill in " ewmew fudd " in the google search box , then press "I'm Feeling Lucky". Then u will see a google search engine version Elmer Fudd from Warner Bros .
    3. Fill in " xx-klingon " in the google search box , then press "I'm Feeling Lucky". Then u will see a google search engine in Quarter Klingon Languese .
    4. Fill in " google bsd " in the google search box , then press "I'm Feeling Lucky". Then u will see a google logo search engine become bsd icon .
    5. Fill in " google linux " in the google search engine , then press "I'm Feeling Lucky". Then u will see google logo change to google linux logo .
    6. Fill in " google easter egg " in the google search engine , then press "I'm Feeling Lucky". Then u will see google search engine in game mode that u also can control and play it .
    Thanks for spend your time to read and visit this blog .

    Monday, August 16, 2010

    Second Password At Login Page

    HI all visitors , today i got some new tutorial about facebook ...
    We know that our facebook account are got many way to a hacker to hack into our facebook so in here i got new tip to now that our facebook have been hack or not , so in this tutorial if our facebook have been open by a hacker oor someone else we can be know , it because at the login page we must enter our computer name or some name that just you know . After you enter it a e-mail from facebook that will go to our e-mail inbox say that our facebook have been open by your selt or someone.

    Here are some tutorial to setting it ...

    1) Just like last facebook tutorial go to account setting .

    2) Find account security .

    3) Choose YES and Submit it.


    4) You will see this box after apply the setting and log out and login it again .

    Thanks for spend your time to read and view my tutorial. If got anything wrong please leave a comment.

    Friday, August 13, 2010

    Speed Up Your Mozilla Firefox

    Made your mozilla firefox loading faster

    For who use mozilla firefox browser you will feel a bit slowly when you playing on internet it because some proxy are cancelled or make your browser abit slowly . So now let we hack in to mozilla firefox browser and make your mozilla faster .
    1. Open Your Mozilla Firefox
    2. Put this "about:config" ( without this symbol " " ) in your browser address bar .
    3. Scrool down and find "network.http.max-connections", double click on it , then put "64" .
    4. Find "network.http.max-connections-per-server" , double click on it , then put "21" .
    5. Find "network.http.max-persistent-connections-per-server" , double click on it , then put "8" .
    6. Double click on "network.http.pipelining" then change it to "true".
    7. Find "network.http.pipelining.maxrequests" , double click on it , then put "100" .
    8. Double click on "network.http.proxy.pipelining" then change it to true .
    9. Last step , Right-click anywhere and select New > Integer. Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before it shows you the information it receives.
    10. DONE !!! Now close the tabs and restart your mozilla firefox browser .

    Alternate Method for Broadband Users

    1. Type “about:config” into the address bar and hit return. Scroll down and look for the following entries:
    • "network.http.pipelining","network.http.proxy.pipelining", "network.http.pipelining.maxrequests" .
    • Normally the browser will make one request to a web page at a time. When you enable pipelining it will make several at once, which really speeds up page loading.
    2. Alter the entries as follows:
    • Set “network.http.pipelining” to “true”
    • Set “network.http.proxy.pipelining” to “true”
    • Set “network.http.pipelining.maxrequests” to some number like 30. This means it will make 30 requests at once.
    3. Lastly right-click anywhere and select New-->Integer. Name it “nglayout.initialpaint.delay” and set its value to “0″. This value is the amount of time the browser waits before it acts on information it receives. If you’re using a broadband connection you’ll load pages MUCH faster now!!!

    Tuesday, August 10, 2010

    107 command prompt command

    1. Accessibility Controls - access.cpl
    2. Accessibility Wizard - accwiz
    3. Add Hardware Wizard - hdwwiz.cpl
    4. Add/Remove Programs - appwiz.cpl
    5. Administrative Tools - control admintools
    6. Automatic Updates - wuaucpl.cpl
    7. Bluetooth Transfer Wizard - fsquirt
    8. Calculator - calc
    9. Certificate Manager - certmgr.msc
    10. Character Map - charmap
    11. Check Disk Utility - chkdsk
    12. Clipboard Viewer - clipbrd
    13. Command Prompt - cmd
    14. Component Services - dcomcnfg
    15. Computer Management - compmgmt.msc
    16. Control Panel - control
    17. Date and Time Properties - timedate.cpl
    18. DDE Shares - ddeshare
    19. Device Manager - devmgmt.msc
    20. Direct X Troubleshooter - dxdiag
    21. Disk Cleanup Utility - cleanmgr
    22. Disk Defragment - dfrg.msc
    23. Disk Management - diskmgmt.msc
    24. Disk Partition Manager - diskpart
    25. Display Properties - control desktop
    26. Display Properties - desk.cpl
    27. Dr. Watson System Troubleshooting Utility - drwtsn32
    28. Driver Verifier Utility - verifier
    29. Event Viewer - eventvwr.msc
    30. Files and Settings Transfer Tool - migwiz
    31. File Signature Verification Tool - sigverif
    32. Findfast - findfast.cpl
    33. Firefox - firefox
    34. Folders Properties - control folders
    35. Fonts - control fonts
    36. Fonts Folder - fonts
    37. Free Cell Card Game - freecell
    38. Game Controllers - joy.cpl
    39. Group Policy Editor (for xp professional) - gpedit.msc
    40. Hearts Card Game - mshearts
    41. Help and Support - helpctr
    42. HyperTerminal - hypertrm
    43. Iexpress Wizard - iexpress
    44. Indexing Service - ciadv.msc
    45. Internet Connection Wizard - icwconn1
    46. Internet Explorer - iexplore
    47. Internet Properties - inetcpl.cpl
    48. Keyboard Properties - control keyboard
    49. Local Security Settings - secpol.msc
    50. Local Users and Groups - lusrmgr.msc
    51. Logs You Out Of Windows - logoff
    52. Malicious Software Removal Tool - mrt
    53. Microsoft Chat - winchat
    54. Microsoft Movie Maker - moviemk
    55. Microsoft Paint - mspaint
    56. Microsoft Syncronization Tool - mobsync
    57. Minesweeper Game - winmine
    58. Mouse Properties - control mouse
    59. Mouse Properties - main.cpl
    60. Netmeeting - conf
    61. Network Connections - control netconnections
    62. Network Connections - ncpa.cpl
    63. Network Setup Wizard - netsetup.cpl
    64. Notepad - notepad
    65. Object Packager - packager
    66. ODBC Data Source Administrator - odbccp32.cpl
    67. On Screen Keyboard - osk
    68. Outlook Express - msimn
    69. Paint - pbrush
    70. Password Properties - password.cpl
    71. Performance Monitor - perfmon.msc
    72. Performance Monitor - perfmon
    73. Phone and Modem Options - telephon.cpl
    74. Phone Dialer - dialer
    75. Pinball Game - pinball
    76. Power Configuration - powercfg.cpl
    77. Printers and Faxes - control printers
    78. Printers Folder - printers
    79. Regional Settings - intl.cpl
    80. Registry Editor - regedit
    81. Registry Editor window32 - regedit32
    82. Remote Access Phonebook - rasphone
    83. Remote Desktop - mstsc
    84. Removable Storage - ntmsmgr.msc
    85. Removable Storage Operator Requests - ntmsoprq.msc
    86. Resultant Set of Policy (for xp professional) - rsop.msc
    87. Scanners and Cameras - sticpl.cpl
    88. Scheduled Tasks - control schedtasks
    89. Security Center - wscui.cpl
    90. Services - services.msc
    91. Shared Folders - fsmgmt.msc
    92. Shuts Down Windows - shutdown
    93. Sounds and Audio - mmsys.cpl
    94. Spider Solitare Card Game - spider
    95. SQL Client Configuration - cliconfg
    96. System Configuration Editor - sysedit
    97. System Configuration Utility - msconfig
    98. System Information - msinfo32
    99. System Properties - sysdm.cpl
    100. Task Manager - taskmgr
    101. TCP Tester - tcptest
    102. Telnet Client - telnet
    103. User Account Management - nusrmgr.cpl
    104. Utility Manager - utilman
    105. Windows Address Book - wab
    106. Windows Address Book Import Utility - wabmig
    107. Windows Explorer - explorer

    This command NOT 100 % work in window 7 . If window XP it may be work 100% because i already try some of it.