Saturday, August 30, 2008

Getting Serious with Win95

GUIDE TO (mostly) HARMLESS HACKING

Microsoft-only version Number 1


____________________________________________________________
by KeyDet89
************************************************************
In this Guide you will learn:
1.  Important files on your system.
2.  My first program.
3.  Getting help.
4.  Finding out about programs.
5.  What can I do with an Internet connection?
************************************************************

Well, you're in luck, the answer is a resounding YES!!
However, there is a very basic step that must first be taken, and that is to
define what is meant by "hacking."  We'll start with what hacking is
not...it's not denial of service (DoS) attacks, nuking, mail bombing, IRC,
or ICQ.  Anyone can run a program, but a hacker learns how things work, and
tries to push them to their limits.  Exposing vulnerabilities is only part
of what a hacker does, and when he finds them, the hacker has the maturity
and sense of responsibility to not use the vulnerability for his own gain.
The Hacker Manifesto clearly states "thou shalt do no harm."

**Historical Note:  If you want a role model for becoming a
hacker, try these names:  Dennis Ritchie, Bob Metcalfe, Steve Wozniak, and
yes, Bill Gates.

With that aside, on with the show.  Past editions of the Guides to (mostly)
Harmless Hacking have talked about how to make modifications to a Win95
system to WOW your friends.  The point of those articles was that you can
begin hacking by learning all there is to know about your system.  I know a
lot of text files out there talk about using Linux and FreeBSD, shell
accounts, Un*x tools, and telnet, but if you don't have any of these
available to you, not to worry.  You can still learn, which is the whole point.

**Note:  Linux and FreeBSD are freeware or commercial (depending upon where
you go) versions of Un*x that run on the Intel platform (a PC computer).
These systems have uses throughout academia and research facilities, but
maybe a bit difficult to get running on your own system unless you know
quite a bit about your system and the operating system. The word "Un*x" uses
the star to refer to the various flavors of
the Unix operating system.

1.  IMPORTANT FILES ON YOUR SYSTEM.

The first thing we'll look at are the important files of the Win95
operating system.  The autoexec.bat, config.sys, win.ini, and
system.ini files are holdovers from DOS, but are also still used.
The config.sys file is used to configure hardware on your system
and the autoexec.bat file is used to load parameters and environment
variables that are needed when your system first starts.

In the next section, we'll discuss how to load environment
variables for specific purposes using batch files.  We'll look
specifically at the autoexec.bat file, as it will lead into
batch file programming in the next section.

To take a look at this file, go to the DOS prompt and type:

c:\>edit autoexec.bat

Your screen will turn blue when the editor opens and the autoexec.bat file
will be loaded automatically, because it's located in the current directory.
If you had typed:

c:\>notepad autoexec.bat

the file would've been opened in NotePad.  Use whichever is easier.

**Note:  This leads us to the subject of paths.  Paths in DOS are
areas where DOS will look on your hard drive for programs that you
type in at the prompt.  You may have the program on your hard drive
but you won't be able to run it from the prompt unless it's in your
path or you are in the directory where the program resides.

One command that should be visible in the autoexec.bat file is the
PATH statement.  It may look something like this:

SET PATH=.;c:\;c:\Windows;c:\windows\command

You don't need much more than this in your path, and you don't want it to
get out of control, so it's best if you leave it like as it is.  The "."
(period) that is in the beginning of the line says to begin the search for
the command in the current working directory.

You can add other tasks in the autoexec.bat file that you want run
upon startup, and you can even include command line parameters, as
necessary.

Now let's change directories at the DOS prompt:

c:\>cd windows

Now open the win.ini file in Notepad, and take a look at it.  We're not
going to make any changes to it, or go into a long explanation
of it's contents.  You can see that it contains different sections
that pertain to different components and applications on your
system.

**************************************************************
Evil Genius\Elite Hacker Tip:  Go to the section of the win.ini
file called "[Extensions]".  One of the first lines should be:

txt=notepad.exe ^.txt

You can use this line to plant messages on your computer.  Simply
change the reference to a batch file that contains some commands
and the line:

notepad %1 %2 %3 %4

...at the end.
***************************************************************

Now, open the system.ini file.

**Note:  To avoid having to type the same commands over and over,
type in "doskey" at the prompt, or edit the autoexec.bat file
to include the command "doskey on".  Then when you are in a DOS
window, you can hit the up and down arrow keys to move amongst
commands you've already typed in.

You'll see that the system.ini file contains sections similar to
the win.ini file.

*****************************************************************
Evil Genius\Elite Hacker Tip:  Go to the "[boot]" section and locate the
line that reads:

shell=Explorer.exe

This is the line that tells Win95 which shell to use for your
system.  The commands that control what colors to use are located
in the win.ini file.  However, you can change shells.  Change the
line to read:

shell=progman.exe

The next time you reboot the computer, the old Win3.1 Program
Manager shell will be loaded.
******************************************************************

2.  MY FIRST PROGRAM.

Most program languages that I have used have all started out
with the ubiquitous "Hello, World" program, so we'll start there.

A batch file is really more of an interpreted file.  The system
reads the file, and executes the commands within the file one at a time.
You can run into problems if the command you put into the file requires
input from the user, but some useful tasks can be accomplished through the
use of batch files.

So, for our first program, type:

@echo off
echo Hello, World!

Save the file as "hello.bat", and at the prompt, type:

c:\>hello

You have now written your first program!

Now, open hello.bat again, and type change the second line to:

echo Hello, %1

Save this, and run the program again, but enter in an argument:

c:\>hello Dave

What the "%1" does is take the first argument ("Dave") and includes it in
the echo statement.

You can use batch file programming to load specific environment
variables, as well.  If you do Java programming, for instance, you can leave
the autoexec.bat file the way it is, but you will need to load specific
environment variables so that you can use your development environment,
specifically the JDK from Sun.  So type:

@echo off
SET PATH=%PATH%;c:\java\;c:\java\bin
SET CLASSPATH=c:\java\lib\classes.zip
SET JAVAHOME=c:\java

Save this file as "java.bat" and whenever you want to do some
development, run the file.  You can even include a reference to the batch
file in the autoexec.bat file.  Notice the "%PATH%" in the second
line...this is an environment variable that exists for the DOS environment.
It refers to the PATH variable, as it exists before you run the new batch
file.  To view the path, type:

c:\>path

3.  GETTING HELP.

It's actually pretty easy to find out about particular things on
your Win95 computer.  The first and easiest way to find anything is to use
the Start -> Help (click on the Start button, then choose Help) feature.
>From there select a topic.  Some of the entries are pretty detailed, with
examples.

A resource that is very often overlooked by folks who are new to
computing in general is your local public library.  DOS has been available
for quite a while, and you will likely find books about DOS and Windows at
the library.  Some books even cover the specifics of batch files or other
aspects of DOS, and will prove to be very useful.  Now, you won't be
interested in sections on EDLIN, but you find lots of valuable information.

After libraries are used bookstores.  Lots of folks would rather
sell their old books rather than donate them to a library.  You can find
many useful books on a wide range of subjects.

Finally, new bookstores, such as Barnes and Noble, Borders, and
especially Computer Literacy are excellent sources of information. If you
can't afford some of the new books, don't worry.  Just drop by the
bookstore, look something up, and put the book back. Many of these
bookstores also carry a wide variety of magazines, many of which are
specific to computer systems.  There are even magazines available for Atari
and Amiga systems!

4.  FINDING OUT ABOUT PROGRAMS.

While in DOS, if you want to get some quick information about a command on
your computer and don't want to go through the steps of opening the online
Help, just type the command, followed by "/?":

c:\>edit /?

This provides a quick explanation of the command and a list of
arguments that can be used with it.  Keep in mind that this
technique works with DOS commands...programs written by folks
outside of Microsoft don't have to provide this functionality.

5.  WHAT CAN I DO WITH AN INTERNET CONNECTION?

So you have an Internet connection, eh?  Well, you already have
a shell account, of sorts.  It's your DOS window.  Yes, you can run commands
from your DOS window, as well as from the GUI.  For example, once you have
connected, try this:

c:\>telnet rs.internic.net

This will open up a telnet window directly to InterNIC.  After the
host, you can even specify a port:

c:\>telnet [host] [port]

This is useful if you want to see if a host has a particular port
open.

Your system also has a command line FTP program.  Just type:

c:\>ftp [host]

and it will attempt to connect you to the host.  You can use
this FTP client to connect to your own ftp sites, or to anonymous
ftp sites such as ftp.microsoft.com.

There are also other commands that you can use in a networked
environment, but they will be covered in another article.

___________________________________________________________
To subscribe to Happy Hacker and receive the Guides to (mostly) Harmless
Hacking, please email hacker@techbroker.com with message "subscribe
happy-hacker" in the body of your message.
Copyright 1998 KeyDet89 <keydet89@yahoo.com>. You may forward or post this
GUIDE TO (mostly) HARMLESS HACKING on your Web site as long as you leave
this notice at the end.

Monday, August 25, 2008

The Magic Of DOS

The key to doing amazing things with XP is as simple as D O S. Yes, that's right, DOS as in MS-DOS, as in MicroSoft Disk Operating System. Windows XP (as well as NT and 2000) comes with two versions of DOS. Command.com is an old DOS version. Various versions of command.com come with Windows 95, 98, SE, ME, Window 3, and DOS only operating systems.

The other DOS, which comes only with the XP, 2000 and NT operating systems, is cmd.exe. Usually cmd.exe is better than command.com because it is easier to use, has more commands, and in some ways resembles the bash shell in Linux and other Unix-type operating systems. For example, you can repeat a command by using the up arrow until you back up to the desired command. Unlike bash, however, your DOS command history is erased whenever you shut down cmd.exe. The reason XP has both versions of DOS is that sometimes a program that won?t run right in cmd.exe will work in command.com

****************
Flame Alert: Some readers are throwing fits because I dared to compare DOS to bash. I can compare cmd.exe to bash if I want to. Nanny nanny nah nah.
****************

DOS is your number one Windows gateway to the Internet, and the open sesame to local area networks. From DOS, without needing to download a single hacker program, you can do amazingly sophisticated explorations and even break into poorly defended computers.

****************
You can go to jail warning: Breaking into computers is against the law if you do not have permission to do so from the owner of that computer. For example, if your friend gives you permission to break into her Hotmail account, that won't protect you because Microsoft owns Hotmail and they will never give you permission.
****************
****************
You can get expelled warning: Some kids have been kicked out of school just for bringing up a DOS prompt on a computer. Be sure to get a teacher's WRITTEN permission before demonstrating that you can hack on a school computer.
****************

So how do you turn on DOS?
Click All Programs -> Accessories -> Command Prompt
That runs cmd.exe. You should see a black screen with white text on it, saying something like this:

Microsoft Windows XP [Version 5.1.2600]
(C) © 1985-2001 Microsoft Corp.

C:\>

Your first step is to find out what commands you can run in DOS. If you type "help" at the DOS prompt, it gives you a long list of commands. However, this list leaves out all the commands hackers love to use. Here are some of those left out hacker commands.

TCP/IP commands:
telnet
netstat
nslookup
tracert
ping
ftp

NetBIOS commands (just some examples):
nbtstat
net use
net view
net localgroup

TCP/IP stands for transmission control protocol/Internet protocol. As you can guess by the name, TCP/IP is the protocol under which the Internet runs. along with user datagram protocol (UDP). So when you are connected to the Internet, you can try these commands against other Internet computers. Most local area networks also use TCP/IP.

NetBIOS (Net Basic Input/Output System) protocol is another way to communicate between computers. This is often used by Windows computers, and by Unix/Linux type computers running Samba. You can often use NetBIOS commands over the Internet (being carried inside of, so to speak, TCP/IP). In many cases, however, NetBIOS commands will be blocked by firewalls. Also, not many Internet computers run NetBIOS because it is so easy to break in using them.

© 2002 Carolyn Meinel. You may forward, print out or post this GUIDE TO (mostly) HARMLESS HACKING on your Web site as long as you leave this notice at the end.

Use NetCat (For Advanced Users)

Oh, here's one last goodie for advanced users. Get netcat for Windows. It's a free program written by Weld Pond and Hobbit, and available from many sites, for example
http://www.atstake.com/research/tools/#network_utilities . It is basically telnet on steroids. For example, using netcat, you can set up a port -- also known as a back door, depending on your motivation -- that will allow people to telnet into a DOS shell. Use this command:

C:\>nc -L -p 5000 -t -e cmd.exe

You can specify a different port number than 5000. Just make sure it doesn't conflict with another port by checking with the netstat
command. Then you and your friends, enemies and random losers can either telnet in or netcat in with the command:

C:\>nc -v [ipaddress of target] [port]

Of course you will probably get hacked for setting up this port. However, if you set up a sniffer to keep track of the action, you can turn this scary back door into a fascinating honeypot. For example, you could run it on port 23 and watch all the hackers who attack with telnet hoping to log in. With some programming you could even fake a unix-like login sequence and play some tricks on your attackers.

© 2002 Carolyn Meinel. You may forward, print out or post this GUIDE TO (mostly) HARMLESS HACKING on your Web site as long as you leave this notice at the end.

Saturday, August 23, 2008

Use Telnet

In this Guide you will learn:

* What is telnet?
* How to telnet
* How to get telnet accounts
* Why you might not want to telnet
* How to install a telnet server on your home Windows computer
* How to turn off a telnet server on your home Linux computer
* How to explore computers using telnet
* Why not use a portscanner instead?


"Where do I type that command?" People ask that all the time when they read my early Guides to (mostly) Harmless Hacking. I wrote those guides back when the Internet was in its infancy and almost everyone in cyberspace used telnet. However, nowadays you might never even hear about telnet, much less use it, unless you are a hacker. So if you are still wondering about telnet, today is your lucky day.

What Is Telnet?

Telnet is a protocol that is most commonly used to log into a remote computer. It also is the single most powerful hacking tool on the planet. With just a telnet client program, you can:

* send email
* download source code from web sites
* send unexpected input to webservers that can give you amazing and sometimes illegal results
* give arbitrary input to many other services on Internet host computers
* probe the services offered by servers, routers and even people's home computers.

How to Telnet

Don't know how to telnet? Click the easy telnet links at http://happyhacker.org/wargame/ and land in the middle of a real hacker wargame! This should work regardless of your computer operating system -- if you have an up to date browser, if your online service provider gives you a true Internet connection, and if your computer is able to telnet at all.

Did those links get you into a telnet session? Were you able to login to a remote computer? If yes, congratulations.

If not, how can you fix the problem? If no telnet program appeared on your monitor when you clicked these links, perhaps your browser is too ancient to allow telnet. Try installing the latest Netscape browser (http://www.netscape.com). Or, perhaps your operating system does not include a telnet program. In that case, install or reinstall Windows 95 or 98. If you own a Mac, get the superb Mac OS X or Linux PPC (http://www.linuxppc.com).

If a telnet program came up and failed to connect, possibly the computer you were trying to telnet into was down or just plain no longer in existence. Or, you may be using America Online (or a similar extremely poor online service). If so, your simplest solution may be to get a better online service provider. Determined to hack using AOL? See http://happyhacker.org/aol.shtml for some ways to make AOL give you a true Internet connection.

OK, so you've managed to telnet for the first time. Presumably you don't want to limit yourself to telnet links on web sites. How do you telnet anywhere you want to go?

If you have Linux or any other type of Unix (BSD, SCO, Solaris, Sun OS, Irix, Ultrix, etc.) telneting is easy. Just bring up "console" or "shell" (or whatever your GUI calls the command line interface). At the prompt type:

telnet

Windows 2000 works pretty much like Unix.

If you have Windows 95, 98 or NT, to telnet, bring up the MS-DOS prompt (Start --> Programs --> MS-DOS).

Click "connect" then "remote system…". In the host name box place the host name or IP address of the computer to which you wish to telnet. Leave the Port and Term Type boxes alone for now.

Here is a really important point. Every day people email me complaining that some computer won't let them telnet into it. They ask what they are doing wrong. They aren't doing anything wrong:

* Maybe the computer they are trying to reach no longer exists.
* Maybe the computer they are trying to reach doesn't allow telnet logins. For example, whois.internic.net no longer allows telnet logins on port 23 (the default port). Click here to learn how to telnet into whois.internic.net on the right port for that particular server.
* Maybe a firewall is blocking them.
* Or maybe they make a telnet connection and the remote computer asks for a user name and password they don't have. Then they email me asking for how to get a login name and password that will work.

Newbie note: The owners or administrators of any Internet host computer decide who gets user names and passwords. Believe it or not, about once a week someone emails me asking what user name and password their own online service provider has assigned them for a telnet login. That's why I'm telling people the obvious -- if you want to telnet into any computer, and you don't have a user name and password, you must ask the owner, administrator of tech support for that system for a user name and password. If they won't give that to you, they don't want you to have it!

You can go to jail warning: If you guess the user name and password, or use a computer breakin technique to get or create them, or if someone other than an owner or administrator or a legitimate user on that system gives you a user name and password, it is against the law to use them. Many computer criminals give out user names and passwords that they obtained illegally.

How to Get Telnet Accounts

OK, so you want to get legal user names and passwords so you can telnet into other computers. Here are some of the best ways:

* See http://happyhacker.org/links2.shtml#shells for organizations that will give you free shell accounts. You can telnet into these.
* Ask Internet Service Providers for shell accounts. Some offer them, although most don't.
* Set up a telnet server on your own computer (see instructions below). Yes, once you are running a telnet server, you can telnet from your computer back into your computer. Simply give the command "telnet 127.0.0.1".
* Make friends with people who run Internet computers with telnet servers.

Why you May Not Want to Telnet

If you love your shell account server, don't ever, ever telnet or ftp into it. I recommend Ssh or Openssh for logging into remote computers? The telnet (and ftp) protocol is a "clear text" transmission. That means that computer on the same LAN as either You or your destination computer, or any computer on any LAN or network path through which your connection passes can steal your login name, password or anything else that goes across your connection. Ssh and OpenSsh encrypt all communications so no one can snoop on you.

How to Install a Telnet Server on your Windows Computer

Usually you can't telnet into a Windows home computer. The reason is, they aren't running telnet servers. Here's how to get a telnet server on your home Windows computers so your friends and you can telnet in and play.

For Windows NT, the Options Pack includes a primitive telnet server.

For Windows 95/98/NT and 2000, you also can install shareware or commercial telnet servers. Check out http://www.winfiles.com, or do a web search.

Of course installing a telnet server makes your computer vulnerable to all sorts of trouble from hackers. It's your funeral, don't come crying top me if a telnet visitor destroys your computer.

How to Turn off a Telnet Server on your Unix-type Computer

If you go online with Linux or other Unix-type computer, a telnet server is the easiest way to ensure you get destroyed by a malicious hacker. Here's how to prevent this. On most of these, the file /etc/inetd.conf launches most of your servers. Edit the file to put a "#" in front of the line that has telnet in it and either reboot your computer or kill and restart inetd.

If your computer doesn't use inetd to launch services, you should be able to find telnetd under /etc/init.d.

Install ssh instead and only use that to log into your shell account.

How to Explore Computers Using Telnet

Even if a computer doesn't have a telnet server, there are lots of fun and even legal things to do to it using telnet. The easiest thing to do is extract "banners" from a victim computer. A banner is a message a computer will often give when you telnet to a port that is running an Internet server of some sort.

For example, most mail sending servers use port 25. To telnet to port 25 from Win 2000 or a Unix shell, simply type:

telnet 25

Windows 95, 98 and NT make it a tiny bit harder. Figure 2 shows how:



If the victim computer is running a mail server, you will see something that looks like this:



Whoa, look at that! The victim computer told us what operating system (Windows NT) and mail server (Mercur) it runs!

A quick search of the Bugtraq archives at http://www.securityfocus.com revealed horrid things a criminal could do to that Mercur mail server. Since I think it is more fun to be nice, I told someone at the company using this mail server about the problems. He invited me to vacation at his beautiful Swiss home, where he and his wife keep horses and take long trail rides in the Alps. Golly, that is much more fun than breaking into a computer!

Right about now some elite ueberhaxorz are probably reading this and saying "What a lamer Meinel is! We can do the same thing by running nmap."

They are right, you can learn the same things by running a port scanning program such as nmap (available at http://www.insecure.org). However, I am quite careful about under what circumstances I run any port scanner. In order to get information on what programs are running on what ports, you must run a port scanner in a mode that will probably convince the owner of the victim computer that you are a criminal. He or she may persuade your online service provider to cancel your account.

The other reason to analyze computers using telnet is that you learn more. It's the difference between eating at McDonalds and learning how to cook.


How to Break into Web Sites Using Telnet

You don't have to use a web browser to access files on a web site. All you need to do is:

telnet 80

Or specify port 80 in a Windows telnet.

If you are using Windows 95/98/NT, whenever you are NOT logging into a telnet account, you should enable local echo. Otherwise whatever you type in (unless you are in a telnet account) will not show on the screen. To enable local echo, click Terminal --> Preferences --> Local Echo.

So how do you send stuff back to the webserver? Try this:

GET / HTTP/1.0


What kinds of commands can you send? The book Hackproofing Your Network (by Ryan Russell of Securityfocus.com and Stance Cunningham) suggests a fun and harmless hack. Create and store a bogus cookie in the location on your web browser that stores cookies. (Find it by searching for the file "cookies.txt".) Name your bogus cookie something like "MyBogusCookie." Then telnet to the victim webserver and give something like this command:

GET / HTTP/1.0
User-Agent: HaveABogusCookieThisIsAJoke 123.4
Cookie: /; MyBogusCookie

The Überhacker! -- How to Break into Computers book details a number of serious attacks you can perform through sending funny input to a webserver. Basically, you need to learn how to write shell programs, and then find ways to get them to be run by the webserver. I'm not going to explain them here, however. These attacks, when carried out against a vulnerable webserver, are so easy that little kids could do them, and I don't want to be responsible for their behavior. It's much harder for little kids to get a hold of Russell's and my books than it is for them to read this GTMHH on the Happy Hacker website.

So are you dying to know what to send a webserver in order to break into it, without having to buy a book? Here are some hints. How to do this will depend on what webserver it is, what operating system it runs on, whether its security weaknesses have been fixed, and whether the web designer has used things such as Common Gateway Interface (CGI) or Server Side Includes (SSIs) that have weaknesses in them.

You will have to research these issues at Web sites that archive vulnerabilities and exploits such as http://www.securityfocus.com and http://packestorm.securify.com. You will need to study web site programming (HTML -- hypertext markup language, CGI and SSIs) and shell programming. You will need to learn webserver commands (documented at http://www.w3.org/hypertext/WWW/markup/Markup.html). You will have to use your brain and be persistent.

But at least if you come across a telnet exploit, now you know the answer to the question "where do I type that command?"

___________________________________________________
Where are those back issues of GTMHHs and Happy Hacker Digests? Check out the official Happy Hacker Web page at http://www.happyhacker.org.
We are against computer crime. We support good, old-fashioned hacking of the kind that led to the creation of the Internet and a new era of freedom of information. But we hate computer crime. So don't email us about any crimes you may have committed!

© 2000 Carolyn Meinel. You may forward, print out or post this GUIDE TO (mostly) HARMLESS HACKING on your Web site as long as you leave this notice at the end.

Friday, August 22, 2008

Add windows inbuilt components to add/remove program

Normally non of windows inbuilt components visible in add/remove programs. So if you hate this and if you want make them visible to add/remove program this may help you to do so. (It will help you to remove unnecessary windows components )

Open sysoc.inf file with text editor(note pad or …………)

You will find it in
C:\Windows\inf\sysoc.inf

And you will see something like this.
---------------------------------------------------------------------------------------

[Version]
Signature = "$Windows NT$"
DriverVer=07/01/2001,5.1.2600.2180

[Components]
NtComponents=ntoc.dll,NtOcSetupProc,,4
WBEM=ocgen.dll,OcEntry,wbemoc.inf,hide,7
Display=desk.cpl,DisplayOcSetupProc,,7
Fax=fxsocm.dll,FaxOcmSetupProc,fxsocm.inf,,7
NetOC=netoc.dll,NetOcSetupProc,netoc.inf,,7
iis=iis.dll,OcEntry,iis.inf,,7
com=comsetup.dll,OcEntry,comnt5.inf,hide,7
dtc=msdtcstp.dll,OcEntry,dtcnt5.inf,hide,7
IndexSrv_System = setupqry.dll,IndexSrv,setupqry.inf,,7
TerminalServer=TsOc.dll, HydraOc, TsOc.inf,hide,2
msmq=msmqocm.dll,MsmqOcm,msmqocm.inf,,6
ims=imsinsnt.dll,OcEntry,ims.inf,,7
fp_extensions=fp40ext.dll,FrontPage4Extensions,fp40ext.inf,,7
msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7
WMAccess=ocgen.dll,OcEntry,wmaccess.inf,,7
RootAutoUpdate=ocgen.dll,OcEntry,rootau.inf,,7
IEAccess=ocgen.dll,OcEntry,ieaccess.inf,,7
OEAccess=ocgen.dll,OcEntry,oeaccess.inf,,7

WMPOCM=ocgen.dll,OcEntry,wmpocm.inf,,7
Games=ocgen.dll,OcEntry,games.inf,,7
AccessUtil=ocgen.dll,OcEntry,accessor.inf,,7
CommApps=ocgen.dll,OcEntry,communic.inf,HIDE,7
MultiM=ocgen.dll,OcEntry,multimed.inf,HIDE,7
AccessOpt=ocgen.dll,OcEntry,optional.inf,HIDE,7
Pinball=ocgen.dll,OcEntry,pinball.inf,HIDE,7
MSWordPad=ocgen.dll,OcEntry,wordpad.inf,HIDE,7
ZoneGames=zoneoc.dll,ZoneSetupProc,igames.inf,,7
TabletPC=tabletoc.dll,TabletSetupProc,Tabletpc.inf,HIDE,7
Freestyle=medctroc.dll,MedCtrOCISetupProc,medctroc.inf,HIDE,7
netfx=netfxocm.dll,UrtOcmProc,netfxocm.inf,hide,7
[Global]
WindowTitle=%WindowTitle%
WindowTitle.StandAlone="*"
[Components]
msnexplr=ocmsn.dll,OcEntry,msnmsn.inf,,7
[Strings]
WindowTitle="Windows Professional Setup"
WindowTitle_Standalone="Windows Components Wizard"

-------------------------------------------------------------------------------------

This list tells us about all installed windows inbuilt components in you r system.

Pinball=ocgen.dll,OcEntry,pinball.inf,HIDE,7

Look at above line .the word HIDE tells to windows don’t display pinball component in add/remove programs.
So eliminate hide
Turn above line to this

Pinball=ocgen.dll,OcEntry,pinball.inf,,7

Do this to all components according to you r choice
Save the sysoc.inf and restart the computer.Thats all. You r choosen windows components now visible in Add/remove Programs.

Hide windows xp user account from logon screen



Would you like to hide your user account from other people ?

If there are multiple user accounts in you computer windows XP normally show all of them in logon screen.

But some people like to hide there user account from other people who share that computer. If you like to make invisible your user account from logon screen this article may help you to do so.


To do this thing we are going to change windows registry settings so I suggest make system restore point before you change registry settings.

1) press win+ R key combination (for run dialog box)

2) type regedit in run dialog box. Click ok to enter registry.

3) Go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\ CurrentVersion\Winlogon\SpecialAccounts\UserList

Click edit new DWORD value

Name that value with name of your user account(what you want to hide)

(in my case I want to hide my user account which name is max )


When value Data set to 0 windows hide you r account. If You like to make it visible change Value Data to 1.Reboot the system. Now look at the logon screen. You hide your user account successfully.