Recover Deleted Outlook Items Manually

Recover Deleted Outlook Items Manually Using REGEDIT

Using the registry editing you can recover the deleted emails or other items which has been deleted permanently,ie by using SHIFT+DELETE or SHIFT+Button image . If you use the registry editor incorrectly, you might cause serious problems that might require you to reinstall your operating system. Use the registry editor at your own risk.
  1. Exit Outlook.
  2. Open the Windows registry editor.
  3. Browse to My Computer\HKEY_LOCAL_MACHINE\Software\Microsoft\Exchange\Client\Options.
  4. On the Edit menu, point to New, and then click DWORD Value.
  5. Type the name DumpsterAlwaysOn.

    Note Do not type any spaces in the name.

  6. Set the DWORD value to 1.
  7. Restart Outlook.

The Tools menu now has the Recover Deleted Items command for every Outlook folder.Enjoy. :)

Transfer Mail From One Account To Another

Transfer Mail From One Account To Another

It is possible to transfer emails from one account to another email account like Yahoo (only if you are a Yahoo! Mail Plus subscriber), Hotmail etc. to your new Gmail account then Gmail has the easiest option for you.

In your new Gmail account

  • Click Settings
  • Go to the Accounts tab
  • Click on Add another mail account link found at Get mail from other accounts
  • In the pop up – enter your old email address and click Next Step
  • Enter your username and password and click Add Account
  • You can set your old email address as a custom email address if you wish

Once you are done with the above steps, Gmail will start retrieving mails from your old account and transfer them to the new account. This may take several minutes so have some patience and take a walk around till its done.

As you can see, you do not really have to go to the trouble of using an email client like Outlook or Thunderbird to transfer your mails to a new Gmail account.

Basic Linux VI Command

Basic Linux VI Command

Moving the Cursor

*j or
[or down-arrow]
move cursor down one line
*k [or up-arrow]move cursor up one line
*h or
[or left-arrow]
move cursor left one character
*l or
[or right-arrow]
move cursor right one character
*0 (zero)move cursor to start of current line (the one with the cursor)
*$move cursor to end of current line
wmove cursor to beginning of next word
bmove cursor back to beginning of preceding word
:0 or 1Gmove cursor to first line in file
:n or nGmove cursor to line n
:$ or Gmove cursor to last line in file

Adding, Changing, and Deleting Text

*iinsert text before cursor, until hit
Iinsert text at beginning of current line, until hit
*aappend text after cursor, until hit
Aappend text to end of current line, until hit
*oopen and put text in a new line below current line, until hit
*Oopen and put text in a new line above current line, until hit
*rreplace single character under cursor (no needed)
Rreplace characters, starting with current cursor position, until hit
cwchange the current word with new text,
starting with the character under cursor, until hit
cNwchange N words beginning with character under cursor, until hit;
e.g., c5w changes 5 words
Cchange (replace) the characters in the current line, until hit
ccchange (replace) the entire current line, stopping when is hit
Ncc or cNcchange (replace) the next N lines, starting with the current line,
stopping when is hit
*xdelete single character under cursor
Nxdelete N characters, starting with character under cursor
dwdelete the single word beginning with character under cursor
dNwdelete N words beginning with character under cursor;
e.g., d5w deletes 5 words
Ddelete the remainder of the line, starting with current cursor position
*dddelete entire current line
Ndd or dNddelete N lines, beginning with the current line;
e.g., 5dd deletes 5 lines
yycopy (yank, cut) the current line into the buffer
Nyy or yNycopy (yank, cut) the next N lines, including the current line, into the buffer
pput (paste) the line(s) in the buffer into the text after the current line

How to Configure User Rights

How to Configure User Rights

If the right to log on as a service is revoked for the specified user account, restore the right by performing the following steps:

Domain Controller

If the user is in an Active Directory domain:

  1. Start the Active Directory Users and Computers Microsoft Management Console (MMC) snap-in.
  2. Right-click the Organizational Unit (OU) in which the user right to log on as a service was granted. By default, this is in the Domain Controllers OU.
  3. Right-click the container, and then click Properties.
  4. On the Group Policy tab, click Default Domain Controllers Policy, and then clickEdit. This starts Group Policy Manager.
  5. Expand the Computer Configuration object by clicking the plus sign (+) next to the policy object. Under the Computer Configuration object, expand Windows Settings, and then expand Security Settings.
  6. Expand Local Policies, and then click User Rights Assignment.
  7. In the right pane, right-click Log on as a service, and then click Security.
  8. Add the user to the policy, and then click OK.
  9. Quit Group Policy Manager, close Group Policy properties, and then close the Active Directory Users and Computers MMC snap-in.

Difference between Cohesion & Coupling

Difference between Cohesion & Coupling

A first-order principle of software architecture is to increase cohesion and reduce coupling.

Cohesion (interdependency within module) strength/level names : (from worse to better, high cohesion is good)

  • Coincidental Cohesion : (Worst) Module elements are unrelated
  • Logical Cohesion : Elements perform similar activities as selected from outside module, i.e. by a flag that selects operation to perform (see also CommandObject).
    • i.e. body of function is one huge if-else/switch on operation flag
  • Temporal Cohesion : operations related only by general time performed (i.e. initialization() or FatalErrorShutdown?())
  • Procedural Cohesion : Elements involved in different but sequential activities, each on different data (usually could be trivially split into multiple modules along linear sequence boundaries)
  • Communicational Cohesion : unrelated operations except need same data or input
  • Sequential Cohesion : operations on same data in significant order; output from one function is input to next (pipeline)
  • Informational Cohesion: a module performs a number of actions, each with its own entry point, with independent code for each action, all performed on the same data structure. Essentially an implementation of an abstract data type.
    • i.e. define structure of sales_region_table and its operators: init_table(), update_table(), print_table()
  • Functional Cohesion : all elements contribute to a single, well-defined task, i.e. a function that performs exactly one operation
    • get_engine_temperature(), add_sales_tax()

Coupling (interdependence between modules) level names: (from worse to better, high coupling is bad)

  • Content/Pathological Coupling : (worst) When a module uses/alters data in another
  • Control Coupling : 2 modules communicating with a control flag (first tells second what to do via flag)
  • Common/Global-data Coupling : 2 modules communicating via global data
  • Stamp/Data-structure Coupling : Communicating via a data structure passed as a parameter. The data structure holds more information than the recipient needs.
  • Data Coupling : (best) Communicating via parameter passing. The parameters passed are only those that the recipient needs.
  • No data coupling : independent modules.

How to Find the Broadcast Address of a Subnetted Network

How to Find the Broadcast Address of a Subnetted
We need two things to find the broadcast address of a subnetted network: an IP address, and the subnet mask. The process is simple: find the inverse of the subnet mask. Then take the result, and logically OR it with the IP address to get the broadcast address.

Of course, we can convert the above binary result to decimal and get the broadcast address of If you aren’t familiar with the OR process, it’s rather simple. If there is a 1 in either the IP or subnet field, then the result will always be a 1. (Otherwise, the result is 0)

Now we know how to find the broadcast address and how it works- but what is it used for?

What are private IP addresses

What are private IP addresses?

The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private internets (local networks): - - -

Also, IP addresses in the range of - are reserved for Automatic Private IP Addressing.

These IP's should not be used on the Internet.

I usually use,, etc. and a subnet mask of when assigning static IP addresses to computers on a small Local Area Networks (LANs). If a DHCP server is also on the LAN it's scope (range of IP addresses that it can assign to computers on the LAN set to obtain their IP addresses automatically) should be adjusted so it does not interfere with locally assigned static IP addresses.

How to remove stored passwords in Internet Explorer

Instructions to remove stored passwords in Internet Explorer
Step 1: From the Tools menu, select Internet Options.
Step 2: Click the Content tab, and then click the AutoComplete (button)
Step 3:To remove stored passwords, click Clear Passwords.To clear stored data that you have entered into forms, click Clear Forms.
Step 4: Click OK

Find Stored Password In Chrome

Google chrome stores the password saved by the user in its cookies.We can see this password as follows.

1) Click on tools button.

2) Click on options.

3) Click on tab 'MinorTweaks '.

4) Click the button 'Show saved Passwords'.

Hacking USB Flash Drive

Hacking USB Flash Drive
Well, ThinkGeek.com brings you one more gadget, that will definitely add fun to your day.USB flash drive can be cleverly used to hack into the computers.This flash drive of 2 GB capacity is compatible with all the popular operating systems, Mac, Windows and Linux. All you have to do is use it to freak people out.

This USB flash drive is disguised as a USB cable cut off at the end, which will definitely make people wonder what you are up to, while all you are doing is innocently going about your own business. It gives a very literal wireless gadget look, so you use to play pranks on people and convince them that is a wireless cable of sorts.The scariest would be, that it loads viruses onto the computer via a wireless mode, or hacks into computers and drains it of everything, the OS and the data, and even you do not know where all of it goes! All in all, a clever disguise for a simple USB flash drive, and a definite wanna have gadget.

Hackers Declared Britney Dead

Hackers said Britney as Dead
The Hackers used the third-party Twitter plug-in to incorrectly announce that Spears had died. Twitpic issued a statement telling readers to disregard the message. Since last few weekend two high-profile celebrities--Britney Spears and Ellen DeGeneres--had their Twitpic accounts hacked.
Now Twitter Verified Account feature is all well and good, but it doesn't do much to protect celebrities from seemingly inevitable account hacking

Live Demo Of Bluetooth Hacking

Thierry Zoller and Kevin Finistere @ 23C3 In Berlin (Germany). Remote Root Exploit over Bluetooth on MacOSX

Operation WhiteBerry

Operation WhiteBerry
Operation Whiteberry was developed in response to solve multiple problems
found within the wireless data transfer systems of Wireless Application Protocol
(WAP) and Blackberry Mobile Messaging system. Due to the security issues
surrounding these protocols, Operation Whiteberry is built upon to compete
against those industries that promote closed and proprietary solutions such as
RIM’s Blackberry. Instead of reviewing the complete project, the issue of security
that Operation Whiteberry promotes should better help to see the problems that
Blackberry faces.
It would be wise to understand the concept of end-to-end in RIM’s definition
instead of the logical definition. Operation W hiteberry is a project that defines
end-to-end as messaging from the point of origin to the point of destination or
from the blackberry to the intended email address. It is an important “point of
view” difference when related to security. RIM’s definition of end-to-end is
defined as messaging from the point of origin to the point of corporate email
redirection or from the blackberry device to the corporate mail system. Operation
Whiteberry also takes into account the proprietary or closed nature of its
messaging architecture, as this prevents the use of other independent or third
party security mechanisms.
All of these are important points. If the user or customer thinks that the
Blackberry wireless device provides security from the handheld to the receiver of
the email, they are only partially correct. Blackberry was built to be used by other
email servers, thus the security Blackberry provides is from handheld to the point
of decryption at the corporate mail system. After that, the email is sent using the
corporate mail system to the intended receiver, without any encryption, through the
Last, Blackberry users have the ability to send electronic messages to other
blackberry users without connecting to the email system. This “direct-connect”
feature does not support full encryption and thus the information being sent and
received wirelessly is more easily accessible. It is important to remove this ability
or add a statement to your wireless policy revealing this information, and that no
confidential or corporate information be passed in this fashion.

During the terrorist attacks of September 11, 2001, while other lines of
communication failed, cell phones, pagers, telephones and such, Blackberry
didn’t. In fact, it has been getting rave reviews for its performance during those
horrible times. Remarkable stories have poured out from Blackberry users that
used the technology to stay in touch of loved ones, evacuate employees, or save
informational assets when no other source of communication was available.
On the day of those attacks, Congressman Robert Ney, R-Ohio used his
Blackberry to communicate with his assistants and family. As a result, he
ordered 435 Blackberry devices for each member of the House so those
representatives could communicate to their assistants and families during
emergencies. As an indirect result reports Congressman Ney, they have become
more productive throughout their normal workload.
If it’s good enough for the government, is it good enough for you? The answer
may be yes, if the correct policies and procedures are in place to maximize the
security benefits that Blackberry provides. The key to any secure environment,
wireless devices included, is to maximize the security features that each device
has available. Following these procedures and policies, as well as auditing users
to make sure these practices are followed should mitigate the risk that wireless
devices apply. Of course, not having these at all would be the optimal choice for
security, but that is not always possible. Wireless devices have an extremely far
distance to travel to be considered secure, but at least The Blackberry by
Research in Motion has been shown to be more secure than most wireless
devices currently in production.

BlackBerry Security

BlackBerry Security
Top 5 Blackberry Security Recommendations
1. Disable pin-to-pin messaging
2. Enable password-
protection on the device (strong passwords, expiration)
3. Disable the install
ation of 3rd party applications
4. Make user aware that data on the device is at risk (awareness)

5. Communicate the procedure for loss of device and emergency
shutdown of

Blackberry mobile units are wireless email devices designed and produced by
Research in Motion Ltd (RIM).

Blackberry uses multi
ple different backbones to deliver the required information
packets over the wireless network. These backbones include, Microsoft’s
Exchange Server,
Lotus Notes Domino as well as Internet Only Email systems.
Microsoft Excha
nge Server

At the center of the backbone is RIM’s proprietary Desktop Manager. This
software package stores the configuration information and synchronizes the
handheld to a docking station connected through a serial connection to the users
main desktop computer. The synchronization process includes tasks, contacts,
calendar, email, time, as well as the initial encryption key that will be detailed out
later in this report. After the initial synchronization, the Blackberry will link up to
the Blackberry Enterprise server to monitor the user’s inbox for new mail,
compress and encrypt the message to deliver them to the Blackberry handheld
or decompress and decrypt messages originating from the handheld. These two
software packages then integrate into the Microsoft’s Exchange Server and
Outlook for email delivery to the recipient. The figure 1 illustration shows the
path that the information moves through the computer network for the Microsoft
Exchange Server backbone. Please keep in mind that this is a two way diagram,
the email starts at the mobile unit, moves through network to the blackberry
desktop and out again to the recipient.

Blackberry also uses two other server:
1)Lotus Domino Server
2)Internet Only Architecture Overview
Both of this architecture are similar to that of microsoft.

III. Blackberry Security Features
Wireless devices have now become an essential component to a corporate
executives or technical workers arsenal. Due to the information that is now being
transmitted and literally falling out of the sky, the term end-to-end security is no
longer a selling point, rather a requirement. Because of this increased security,
Research in Motion developed the Blackberry architecture to ensure multiple
different security objectives. These objectives include:
1. Protecting data on the handheld
2. Securing the wireless link
3. Minimal user impact
Information Security individuals have been inundated with wireless devices that
promise security outwardly, but have little to show for it. Security Issues that
surround the wireless device include eavesdropping, physical theft of equipment
and information, viruses, DoS attacks, and spoofing and hijacking. The following
list of security features will be sorted by RIM’s stated objectives and compared to
the issues and vulnerabilities surrounding wireless networks.

Passwords Targeted By Conficker

Passwords Targeted By Conficker

Acquiring the list of usernames from the targeted computer using NetUserEnum API, then attempting to log on to the targeted computer using the existing user accounts and one of the following passwords:

• [username]

• [username][username]

• [reverse_of_username]

• 00000

• 0000000

• 00000000

• 0987654321

• 11111

• 111111

• 1111111

• 11111111

• 123123

• 12321

• 123321

• 12345

• 123456

• 1234567

• 12345678

• 123456789

• 1234567890

• 1234abcd

• 1234qwer

• 123abc

• 123asd

• 123qwe

• 1q2w3e

• 22222

• 222222

• 2222222

• 22222222

• 33333

• 333333

• 3333333

• 33333333

• 44444

• 444444

• 4444444

• 44444444

• 54321

• 55555

• 555555

• 5555555

• 55555555

• 654321

• 66666

• 666666

• 6666666

• 66666666

• 7654321

• 77777

• 777777

• 7777777

• 77777777

• 87654321

• 88888

• 888888

• 8888888

• 88888888

• 987654321

• 99999

• 999999

• 9999999

• 99999999

• a1b2c3

• aaaaa

• abc123

• academia

• access

• account

• Admin

• admin

• admin1

• admin12

• admin123

• adminadmin

• administrator

• anything

• asddsa

• asdfgh

• asdsa

• asdzxc

• backup

• boss123

• business

• campus

• changeme

• cluster

• codename

• codeword

• coffee

• computer

• controller

• cookie

• customer

• database

• default

• desktop

• domain

• example

• exchange

• explorer

• files

• foobar

• foofoo

• forever

• freedom

• games

• home123

• ihavenopass

• Internet

• internet

• intranet

• killer

• letitbe

• letmein

• Login

• login

• lotus

• love123

• manager

• market

• money

• monitor

• mypass

• mypassword

• mypc123

• nimda

• nobody

• nopass

• nopassword

• nothing

• office

• oracle

• owner

• pass1

• pass12

• pass123

• passwd

• Password

• password

• password1

• password12

• password123

• private

• public

• pw123

• q1w2e3

• qazwsx

• qazwsxedc

• qqqqq

• qwe123

• qweasd

• qweasdzxc

• qweewq

• qwerty

• qwewq

• root123

• rootroot

• sample

• secret

• secure

• security

• server

• shadow

• share

• student

• super

• superuser

• supervisor

• system

• temp123

• temporary

• temptemp

• test123

• testtest

• unknown

• windows

• work123

• xxxxx

• zxccxz

• zxcvb

• zxcvbn

• zxcxz

• zzzzz

So if you have any one of the above password change it and choose some strong password.