Sunday, December 30, 2007

Supporting Clients Through Windows XP’s Remote Desktop, Part 2

In Part 1, you saw that there was some prep work that you had to do on the remote machine before you could connect to it. Likewise, there’s also some prep work that must be done on the local machine before you’ll be able to connect to a remote machine. To begin this prep work, click the Start button and then select the All Programs Accessories Communications Remote Desktop Connection commands. When you do, you’ll see a screen that asks you which machine that you want to connect to. This initial connection screen is deceptively simple though.
There are a lot of options that you can set besides just which computer that you want to connect to. In most cases, you can enter the name (or IP address) of the remote system and just go with the default options. However, there may be times when your needs will dictate fine tuning a session.
To set the various options, Click the Options button. When you do, the Remote Desktop Connection screen will expand to reveal an entire properties sheet, filled with connection options. The General tab lets you select a computer to connect to. You can also use this screen to enter a user name, password, and domain for the connection. If you leave this information blank, Windows will prompt you to enter a password after the connection is established. At the bottom of the General tab, there are options that you can use to save all of your settings. This is helpful if you have a remote machine that has special needs, or if you want to set up a custom configuration to use with all of your remote connections.
The next tab that you’ll see is the Display tab. The Display tab is used to control the way that the remote session appears on the local machine. By default, the remote session will take up your entire screen, although you can use the Display tab to reduce its size. You can also select the number of colors that the remote session will appear in. Finally, at the bottom of the screen, there’s an option to display the connection bar when running in full screen mode. I recommend always using this option. When running in Full Screen, the connection bar will provide you with the name of the computer that you’re connected to and the buttons that you’ll need for reducing the session to a window.
The Local Resources tab is typically one of the tabs that requires the most fine tuning. This tab controls the behavior of the remote session. For example, you can control whether sound is transmitted from the remote computer to the local computer or not. Sound consumes a lot of bandwidth, so you may want to disable it. Likewise, the Local Resources tab allows you to determine when you can use keyboard shortcuts, such as Ctrl, Alt, Delete, to control the remote machine. By default, if the remote session is running in full screen mode, then keyboard shortcuts apply to the remote machine, otherwise, they apply to the local machine.
Finally, the Local Resources tab allows you to control whether you want to control the disk drives, printers, and serial ports on the remote machine. By default, you’ll have control of the remote machine’s printers, but not the disk drives or serial ports.
The Programs tab allows you to specify a program that is to run upon connection to the remote machine. For example, you might run System Information upon connecting.
The last tab that you’ll have to deal with is the Experience tab. The basic idea behind this tab is that it allows you to select what amount of bandwidth that you’ll have available during the remote session. By default, Windows assumes that you’ll be connecting via a 56 Kbps modem. Beneath the connection speed option, there are several check boxes that turn various features on or off. For example, during a low speed connection, you probably don’t want to waste bandwidth by displaying the remote machine’s wallpaper.
As you select your connection speed, Windows enables and disables the various options depending on how much bandwidth that you have available. Fortunately, you can override Windows selections and manually enable or disable any setting that you want. For example, I used to know a guy that created a custom wallpaper for each workstation. The wallpaper was an image that told the machine’s basic configuration information. The idea was that anyone who went to work on the machine would have the machine’s vital stats available to them at a glance. If someone were running a wallpaper like this, they wouldn’t want Windows to disable it during a remote session, and would therefore choose to override the default low bandwidth settings. The options that you can enable or disable are Desktop Background, Show Contents of Window While Dragging, Menu and Window Animation, Themes, and Bitmap Caching.
Connecting To A Remote Machine
What actually happens when you connect to the remote machine depends greatly on how you’ve setup the session. If you simply go with the default settings, your remote session will begin by displaying the usual login prompt. Once you’ve entered a password, Windows will lock the remote machine. When this happens, the remote machine will display the same message that the user would see had they pressed CTRL, ALT, Delete and used the Lock Computer option. If the remote user were to press CTRL, ALT Delete and enter a password to unlock their machine, Windows would drop the remote connection.
As for the local user, the remote session behaves exactly as if the local user were sitting at the remote PC (although possibly slower if bandwidth is an issue). The only thing that the local user has to remind them that they are using a remote session is a small bar at the top of the screen that displays the name of the remote PC. This bar also contains the standard minimize, maximize, and close window buttons. These buttons are handy for situations in which the local user needs to access their own machine for a moment. The close window icon can is used to end the remote session, although you can also end the session by reducing the session to a window and then right clicking on the remote session and clicking selecting the Close command from the resulting properties sheet.
Another interesting thing about running a remote session is the way that screen resolution is handled. In my lab, I connected to a machine that was running multiple monitors. Each monitor was running at a much higher resolution than my test machine. When I connected, Windows set up the local machine as if all of the remote machines were running on a single monitor. It also scaled all of the open windows so that they would fit the local machine’s limited display capabilities.
As you can see, Windows XP’s Remote Desktop feature is an extremely valuable helpdesk tool. This is especially true in organizations in which users are geographically dispersed.

Supporting Clients Through Windows XP’s Remote Desktop, Part 1

A few years ago I was working as a network administrator for a chain of healthcare facilities. Because of the low experience level of the end users, user problems almost always meant that I had to either travel to a facility myself or send someone else. On more than one occasion some of the support staff had to drive twelve hours round trip only to look at a machine, do two or three mouse clicks and leave. Of course these trips incurred costs in the way of travel expenses and lost productivity. They could have easily been avoided if the users were able to more accurately describe the problem or if the IT department could have accessed the machines by remote. At that time though, remote access wasn’t a practical solution because none of the remote facilities had significant bandwidth, and the client machines were running a variety of different operating systems, thus making it impossible to implement a standard remote access package.
If that situation happened today though, it could have been easily avoided. Bandwidth is now much more plentiful then it was a few years ago, and Windows XP has remote access capabilities built into the operating system. In this article, I’ll demonstrate how your support staff can reduce costs by taking advantage of Windows XP’s remote desktop feature. As I do, I’ll show you the ins and outs of how remote desktop works.
The Basics
Remote desktop works very similarly to the Windows 2000 Terminal Services. In fact, the local PC actually uses a cosmetically altered version of the Terminal Server Client to access the remote PC. During a remote desktop session, Windows XP uses something called the Display Protocol. This protocol sends keyboard and mouse movements from the local machine to the remote machine, where the remote desktop code acts as if the keyboard and mouse movements were generated locally. The remote machine then sends screen updates to the local machine to display the results of any actions that are being performed remotely. It’s also possible for the remote machine to send sound to the local machine, but I don’t recommend doing so because of the required amount of bandwidth.
Another thing that you should know is that during a remote session, any programs that the local machine initiates are actually being run on the remote machine. This means that it’s possible for the local machine to run programs that aren’t installed on it. It also means that it’s possible for the local machine to run programs that aren’t compatible with it. For example, suppose for a moment that you connected to a remote machine through a Pocket PC. It would be possible for you to run any application that’s installed on the remote machine because you’re actually using the remote machines resources rather than those of the Pocket PC (which isn’t even capable of running most Windows programs).
The last thing that I need to mention before I show you how to implement remote desktop is that not all versions of Windows XP support it. Only Windows XP Professional can host a remote desktop session. The home version ships with the ability to control a remote PC, but can’t host a remote session. This means that you can use the home edition or the professional edition to control a machine that’s running Windows XP professional, but neither version can control a machine that’s running the home edition.
Preparing the Remote Machines
Before you can remotely control a machine, the machine has to be prepared for remote access. If you’re going to be performing a mass Windows XP deployment, you’ll be able to set the remote desktop settings at the same time that you configure all of the other Windows settings. If you’ve already deployed Windows XP though, you’ll have to implement the Remote Desktop settings on an individual basis. There are a few good ways to accomplish this.
One method is to just go around to every machine and turn the feature on. Another method is to enable the feature the first time that each user calls you with a problem. By using this method, you’ll usually end up installing remote desktop on the machines belonging to the users who have the most problems first, and then gradually to the users who call less often.
To implement remote desktop on a workstation, go to the Start Menu and right click on My computer। Now, select the Properties command from the resulting context menu in order to display the system’s properties sheet. At this point, select the properties sheet’s Remote tab. As you can see in Figure A, the Remote tab contains two check boxes. One check box is to allow users to remotely connect to the computer, while the other allows remote assistance invitations to be sent from the computer.



Figure A


Let’s begin by looking at the option for allowing users to connect remotely to the computer. When you select the check box, you receive a warning that some local accounts may not have passwords and that accounts used for remote connections must have passwords. The warning also tells you that if you’re passing through a firewall, such as you would do if you were accessing the machine through the Internet, then the correct port must be opened in the firewall. Typically, remote desktop is set to use port 3389. Click OK to clear the warning, and then click the Select Remote Users button.
Windows will now display the Remote Desktop Users dialog box. Click the Add button to begin adding users to the list. If you’re in the habit of selecting which users can access a network resource, then this screen may look a little funny to you. As you can see in Figure B, Windows is set by default to work with user objects from the local computer. The reason is that the people who developed this portion of Windows XP assumed that most of the time when you access a remote PC in this manner, you won’t be authenticated into a domain. You can select domain users though by clicking the Locations button and selecting a domain from the list. Regardless of whether you’re working with domain users or local users, you won’t be able to select the users from the list. Instead, you’ll have to manually enter the user name and then use the Check Names button to verify that you spelled the user names correctly.
Figure B

As I mentioned, the reason that this particular feature is so strange to setup is that Microsoft intended it to be used for other purposes. They designed it as a way to allow you to access your PC at the office from home or while you’re on the go. Although there’s another option that’s actually intended for tech support, I recommend going ahead and enabling the remote desktop in the manner that I just described. You should also assign a standard account access to all machines. The reason for doing this is that the remote desktop option that’s actually intended for tech support purposes requires a user to send an invitation to someone, asking for help. If the user can’t figure out how to send an invitation, then they won’t be able to get remote assistance. By going ahead and enabling the type of remote access that I just showed you, you’ll be able to help users by remote even if they don’t know how to send an invitation.
That doesn’t mean that the users shouldn’t be able to send an invitation though. I recommend leaving the option for remote assistance invitations enabled. You can however control the length of time that an invitation is valid by clicking the advanced button on the System Properties sheet’s Remote tab. By default, invitations are valid for 30 days.
Right now, you may be wondering what the deal is with a remote assistance invitation. Remote assistance invitations are a method through which end users may ask for help. Typically, users generate an E-mail message that includes an invitation. However, invitations may also be sent through Windows messenger or through a file. Before you implement the ability for users to send remote invitations, keep in mind that there are some very serious security risks associated with doing so. I’ll be addressing these security risks in a separate article series. For now though, it’s just important to understand what remote invitations are and what they do.
As you can see, setting up remote access capabilities provides the support staff with a low cost way of servicing your end users. This technique is especially effective in organizations that are geographically dispersed.

Repairing The Master Boot Record

One of the most important parts of your system’s hard disk is the Master Boot Record. Without a valid Master Boot Record or MBR, it’s impossible to boot the system from the hard disk. Unfortunately, many viruses are designed to attack a system’s MBR. Sure, you can usually disinfect the system and it will begin booting normally, but what do you do if a system still won’t boot after a virus has been removed?
To answer that question, it’s necessary to take a closer look at how this particular type of virus works. Normally, the MBR points at a system’s boot sector. When the system is powered up, the hardware knows to look at the MBR, and then the MBR redirects the system to the boot sector so that the boot process can begin.
Most, but not all, viruses that infect the MBR do so by copying the contents of the boot sector to a different file and then overwriting the boot sector with viral code. When you remove a boot sector virus, the anti virus program is usually smart enough to know where the original boot sector was copied to. It then removes the viral code and moves the boot sector code back to the correct location.
Unfortunately, some viruses don’t backup the boot sector code before altering it. Likewise, there are also legitimate programs that can cause boot problems similar to that of a virus. For example, I was recently using a program called System Commander from VCOM. System Commander alters the boot sector so that your system will boot the System Commander program instead of the normal operating system. The program then displays a menu and allows you to boot to a variety of operating systems. However, I had decided to remove an operating system from a computer and System Commander was damaged in the process.
After the damage occurred, the system was unbootable. The system would try to boot to a nonexistent copy of System Commander. Unfortunately, it was impossible to reinstall System Commander because the system was unbootable. As you can see, in such a case, perfectly legitimate software can function exactly like a boot sector virus. This means that whether your MBR is malfunctioning because of a virus or because of a boot program gone haywire, the repair method is exactly the same.
Obviously, the best repair method is to restore a backup or to use a repair disk such as the one created by Norton’s System Works. However, if you don’t happen to have such a recovery tool, you’ll have to do things the old fashion way. You can also forget about reformatting or repartitioning the drive, as these operations don’t effect the boot sector. The method that you’d use to recover from such a situation depends on the operating system that you’re using.
If your system is running Windows 98, use a separate system to create a bootable floppy disk and copy the FDISK file to it. Now, boot the damaged system from the boot floppy. When you’ve booted the system to a command prompt, enter the following command:
FDISK /MBR
This will repair the Master Boot Record and make the system bootable. If you happen to be using a Windows 2000 system, you can boot from the installation disks and enter the Recovery Console. When the Recovery Console loads, you can use the FIXBOOT or the FIXMBR command to cure the problem.

Using Windows CE to Manage Your Windows 2000 Network


Reprinted by permission from Imagine that you’re in the car driving down a long and desolate interstate, out in the middle of nowhere. Just as you think you’re about to scream from boredom, the phone rings. Someone at your office decided to interrupt your travel to tell you about some terrifying message that’s being displayed on the server. Now, you have two choices, you can either run up your cell phone bill and try to explain to the clueless person on the phone how to fix the problem, or you can pull over, get out the palm top, fix the problem and be on your merry way. Although the idea of having total control of your network from a device that’s small enough to fit into your pocket, all from the comfort of your own car may sound like a fantasy, it really works. In this article, we’ll explain how to use your Windows CE machine to remotely control your Windows 2000 servers.
The requirements
There are some pretty stiff hardware and software requirements for controlling Windows 2000 through Windows CE. First, not just any Windows CE device will work. The PDA style Windows CE machines with no keyboard were never designed for this type of work, and are therefore unsupported. You must have a palm top computer or one of the new pocket PCs. For the purposes of writing this article, we used a Hewlett Packard Jornada 680.
Your Windows CE device must also have some method of connecting to Windows 2000 via TCP/IP. We used a network card in our palm top, but if you’ve got Windows 2000 configured to function as a remote access server (a RAS server), you can dial in and control Windows 2000. The actual connection method is irrelevant as long as you authenticate into the domain that your server is a member of, and connect using TCP/IP.
As we mentioned before, you’ll also need some special software. The server must be configured to run the Terminal services. For the purposes of writing the article, we used Windows 2000 Advanced Server release candidate 2. We also attempted to connect Windows to a computer running Windows 2000 Server beta 3, but had a lot of trouble. That fact is trivial though since there’s a good chance that the final release will be available by the time that you read this.
The Windows CE machine also requires special software. Windows CE must be running the Terminal Server client software to be able to remote control the Windows 2000 server. We’ll tell you how to get this software later on.
Things to consider on the server
Before you set up the server for remote access, there are a few things that you need to consider. The terminal services can take a tremendous toll on the server. The terminal services use memory, the processor, hard disk, and the network card very heavily. The purpose of this article is to explain how to remotely control the server in emergency situations. Therefore, extremely high end hardware isn’t necessarily a requirement. We ran the terminal services on a Windows 2000 Advanced Server with 128 MB of RAM with no problems. However, if anyone else plans on using the terminal server, remember that the amount of power required is directly proportional to the number of remote users, the number of programs that each user runs, and the types of programs that these users run. A generic word processor for example doesn’t require anywhere near the horsepower of a large database or a video game. To run a terminal server for more than emergency administrative purposes, Microsoft recommends 128 MB of RAM with an extra 10 MB to 21 MB of RAM for each user depending on what types of programs that they run. Microsoft also recommends multiple processors, RAID arrays, and fast network connections for multiple terminal server users. There are also many more security issues involved in allowing multiple user access. We’ll publish an article dedicated to allowing multiple users in the future.
Installing the terminal server service
To install the terminal services on the Windows 2000 server, open the Control Panel and double click on the Add / Remove Programs icon. When you see the Add / Remove Programs window, click the Windows Setup button. At this point, the computer may appear to ignore your request. However, if this happens, the Windows Components Wizard has merely opened in the background. Close the Add / Remove Programs window to access the Windows Components Wizard.
When you see the Wizard, select the check box next to Terminal Services and next to Terminal Services Licensing. Click Next and Windows will begin installing the required components. The first question that you are asked is whether you want to install the terminal services in Remote Administration Mode or in Application Server Mode. Select Remote Administration Mode and click the Next button. The next portion of the wizard will ask you about the role and location of the license server. Unless you have a compelling reason to change these options, use the defaults and click Next to continue. At this point, Windows 2000 will ask for the Windows 2000 CD-ROM and begin copying all of the necessary files. When the wizard completes, click Finish. You’ll now be prompted to reboot your server.
Setting up Windows CE
As we mentioned earlier, accessing the Windows 2000 server by remote control requires that you attach to the server through TCP/IP and that you authenticate the Windows CE machine into the Windows 2000 domain. Make sure that you’ve established this ability before continuing. If you have questions about how to do this, check out last month’s article, “Connecting to The World With Windows CE”.
Once you have the ability to connect to the server, use a desktop PC and download the Terminal Server Client for Windows CE. You can download it from
www.microsoft.com/windowsce. Once you’ve downloaded the client, attach the desktop to your palmtop via serial cable or infrared port and run the program that you just downloaded on the desktop machine. The program will install the necessary files on the Windows CE machine.
Once you’ve installed the necessary files, select the Client Connection Wizard command from your Windows CE machine’s Start Programs Terminal Server Client menu. The first screen of the wizard asks for a description of the session and the name of the server that you want to control. Enter anything that you want for the description, but we’ve had better luck entering the server’s IP address than its name into the Server Name field. Click Next to continue.
The next screen that you’ll see allows you to log on automatically. This one is up to you. If you want to log on automatically, select the Log On Automatically check box and then fill in the Username, Password and Domain fields. The only down side to logging in automatically is that if you were ever to lose your palm top, who ever finds it could access your server. When you’ve filled in the necessary information, click Next to continue.
The final screen of the wizard asks whether you want to display the server’s desktop, or automatically launch an application. Since the purpose of this configuration is remote administration, select the Display Desktop radio button and click finish. Windows CE will now place an icon on your desktop that you can use to remotely control your server.
Connecting to the server
At this point, you’re ready to connect Windows CE to your Windows 2000 server. To do so, begin be establishing the communications link, whether by dial up networking or via a network card. Once you’ve logged into your network, double tap on the icon that you created earlier. Doing so will connect to Windows 2000 through your TCP/IP link. The login process should be automatic since you’re already authenticated into the domain.
When you connect, the first thing that you may notice is that the Windows 2000 desktop looks different on your Windows CE device. That’s because of the difference in resolution from Windows 2000 to Windows CE. Because Windows CE can’t display the entire screen, some of the icons are temporarily rearranged to make them fit onto the visible desktop.
The next thing that you may notice is that the icons aren’t as responsive as you would expect. The first time that we configured Windows CE to remotely control Windows 2000, we thought that there was a security option that we neglected to set, because half of the icons wouldn’t work. Instead, the problem was that the terminal server seems to require much more accurate tapping than a standard Windows CE session does. It’s been our experience that when double tapping, if the second tap isn’t in exactly the same spot as the first tap, then it doesn’t work. We found this to be extremely difficult. It’s much easier to simply select the icon that you want to use and then press Enter.
We also noticed that some of the Start menu’s sub menus behaved strangely. For example, when we went to Start Programs Accessories, the menu would freak out and take us into My Documents. The solution to this was simple. All we had to do was to make sure that the point of the stylus never came off of the screen when accessing the menus. For example, we would tap on start and then press the stylus on programs. We would then keep the stylus on the screen while selecting Accessories and what ever choice came next.
The last problem that we encountered was that many times the utility that we wanted to use didn’t completely fit on the Windows CE screen. This wouldn’t be a problem, except that there was no scroll bar to access the bottom portion of the screen. Although it’s not perfect, the display works much better if you disable Active Desktop for terminal server clients. To do so, open the Control Panel on the Windows 2000 computer and double click on the Administrative Tools icon. When you do, you’ll see the Administrative Tools window. Now, double click on the Terminal Services Configuration icon to launch the Terminal Services Configuration utility. Now, click on the Server Settings folder in the column on the left to view the configurable settings on the right. One of the options is for Active Desktop. Now, simply right click on the Active Desktop icon and choose the Disable command from the resulting context menu. The changes won’t take effect until the next time that you connect Windows CE with a new session.
Ending your session
When you’re done using the terminal server session on your Windows CE machine, select the Shut Down command from the Start menu. There are two commands on this menu that need a little explaining. The Log Off command disconnects you from the Terminal Server and restores the normal Windows CE desktop. This is the command that you should normally use to disconnect.
The Disconnect command also returns you to the Windows CE desktop, but leaves your session active on the Terminal Server. This means that even though you’re not using the Terminal Server, server resources are still being wasted on the session. Your programs and files are still opened, exactly in the state that they were in when you disconnected. The next time that you attach to the Terminal Server, you’ll be exactly where you were when you disconnected the last time.
Conclusion
In this article, we’ve discussed a way that you can use your palm top computer to manage your network on the go. As we did, we explained all of the necessary hardware and software requirements for doing so. We also discussed all of the unique aspects that you’ll have to deal with because of Windows CE’s limitations.

Wednesday, December 19, 2007

Mobile Master Professional 6.8.2.2402

Mobile Master is a Cell phone and handset manager for Windows and synchronizes with a few mouse clicks your contacts and appointments between the handset and your computer. Edit and synchronize calendar entries (appointments and tasks).

Send, read, archive SMS Note: the SMS Servant is included in the Mobile Master installation but requires an extra license. Logo-Editor, modify ring tone. Copy Station for transmitting your address book easily from one phone to the other. Mobile Master Agent: reach always the important functions easily and start e.g. Mobile Master automatically as soon as your mobile phone is connected to the PC.

  • One click synchronization solution for your mobile phone, edit all you phones data with the computer. Synchronization of contacts and the calendar, Many filter possibilities, AddIns for Outlook, Lotus Notes, Palm Desktop and Thunderbird
  • Mobile Master synchronizes or just copies all data with/to your mobile phone.Synchronize with: Outlook, Lotus Notes, Novell Groupwise, Palm Desktop, Thunderbird, Tobit David, Eudora, The Bat, Outlook Express, Google calendar, Windows contacts and calendar, iTunes
  • new cell phone: Mobile Master copies the phone/address book from your old to your new one regardless the manufacturer of the phones new phone number, appointment or note: type it in with your PC and send it easily to the cell phone.
  • Many import and export filters, e.g. one click to export to excel or open office. Can import e.g. vcf file with more than one contact and that has unicode format
  • Connection with the phone: serial or USB cable, infrared or Bluetooth, up to COM Port 300 supported.

Features:
- Mobile Master is a handset manager to edit manually or synchronize automatically or on demand
- Quick area for quick and easy access to the main functions
- Comfortable editing of the phone book, calendar and note items
- easy to use user interface
- Setup Wizard for easy configuring
- Copy files, music, photos
- SMS send, archive
- Copy the address book, calendar from one phone to another
- At least one update per month for the phones and devices
- Copy play lists from iTunes and WinAmp to the phone

Supported mobile phones and devices:

- Apple iPod: iPod Video, iPod nano
- LG: KG800 Chocolate, KG320S
- Motorola: RAZR V3r, RAZR V3i, SLVR L7, SLVR L6
- Nokia: Nokia 6233, Nokia 6270, Nokia 6280, Nokia 6230, Nokia 6230i, Nokia 6220, Nokia 6210, Nokia 6200, Nokia 6100, Nokia 6310, Nokia 6310i, Nokia 6820, Nokia 6822
- Sony Ericsson: W880i W880 W710i W710 Z710i Z710 Z610i Z610 K800 K800i K800 W900i W900 W850i W850 W810i W810 W800i W800 W700i W700 W550i W550 W500i W500 W300i W300 D750i D750 K750i K750 K700i K700 K610i K610 K600i K600 K510i K510 K500i K500 K300i K300 F500i F500 S700i S700 T610i T610 V800i V800 V600i V600 Z600i Z600 Z550i Z550 Z520i Z520
- Samsung: Samsung SGH-P310, Samsung SGH-P300, Samsung SGH-D900, Samsung SGH-D830, Samsung SGH-D820, Samsung SGH-D800, Samsung SGH-D600, Samsung SGH-D520, Samsung SGH-D500, Samsung SGH-E900, Samsung SGH-E850, Samsung SGH-E800, Samsung SGH-E770, Samsung SGH-E760, Samsung SGH-E730, Samsung SGH-E720, Samsung SGH-E700, Samsung SGH-E620, Samsung SGH-E610, Samsung SGH-E570, Samsung SGH-E530, Samsung SGH-E500, Samsung SGH-E380, Samsung SGH-E370, Samsung SGH-E350, Samsung SGH-E250, Samsung SGH-X830, Samsung SGH-X820, Samsung SGH-X800, Samsung SGH-X700, Samsung SGH-X670, Samsung SGH-X660, Samsung SGH-X640
- Siemens BenQ: BenQ Siemens EL71, BenQ Siemens E61 , BenQ Siemens S88, BenQ Siemens S68, BenQ Siemens E61 , Siemens S75, Siemens SL75, Siemens CX75, Siemens CF75, Siemens C75, Siemens M75, Siemens ME75, Siemens CX70, Siemens M65, Siemens M56, Siemens S65, Siemens SL65, Siemens SK65, Siemens CX65, Siemens S56, Siemens S55, Siemens M55, Siemens SL55
and more...

Changes in Version 6.8.2 build 2402 - 31.05.07:

*reworked synchronization with motorola handsets:
*added unicode support (contacts and calendar)
*added support for the groups (contacts) and fixed problem
*fixed bug writing phone book and calendar items to the phone
*fixed bug copying phonebook pictures with long filenames
*fixed problem loading backup of a SIM card
*fixed problem reading SMS from some Samsung phones (e.g. E730)
*fixed bug saving the main number to the backup with Nokia phones
*setting of the font size of the calendar view is now possible
*fixed bug in in the last version: in the contact properties dialog sometimes the buttons were not visible
*Samsung D500/D600: sms are now read in text format

Homepage

Size: 13.18 MB

Download

Friday, December 7, 2007

How can I gain access to a Windows NT/2000/XP/2003 computer if I forgot the administrator's password? How can I reset the administrator's password if

Ok, so you say you forgot your Windows administrator's password, huh? Oh well, it doesn't really matter if you did or you just say you did. The fact is that you need to gain access to a computer and you cannot "remember" the administrator's password.

How can you get out of this situation without formatting and re-installing the operating system?

Windows Key by LostPassword.com - Use this easy tool to reset any Windows local or domain controller password in a minute. Money-back guarantee. Download FREE version now!

One method of gaining access to the system is by trying hard to remember the forgotten password, or a password of another user which has the same level of administrative rights. However I don't think this approach will help you, otherwise you wouldn't be sitting here reading article, would you?)

Another method is by trying to restore a backed up System State (in Windows 2000/XP/2003) or a ERD (in NT 4.0) in which you do remember the password. The problem with doing so is that you'll probably lose all of the recently add users and groups, and all the changed passwords for all of your users since the last backup was made.

A third method might be to install a parallel operating system on a different partition on the same computer, then use a simple trick to gain access to the old system. Read more about it on my Forgot the Administrator's Password? - Alternate Logon Trick article.

Note: If you are looking for password cracking tools that can be used for miscellaneous objectives such as password-protected PDF documents, zipped archives, Office documents, BIOS protection and so on then this pages is NOT for you. See some links at the bottom of this page for hints on where to find such tools, but I can tell you right away that Google might be a better choice for you.

The fourth option is by using 3rd party tools that will enable you to reset the lost password and logon with a blank password.

Update: You can also discuss these topics on the dedicated Petri.co.il Forgot Admin Password Forum.

Translations of this article

There are some translations made of this article. Here are the ones I am aware of (do tell me if you know of another, or if you want to create one in your language):

  • Portuguese - HERE is an excellent translation of this article into Portuguese (by Bruno Koga - Thanks!)

  • Serbian - HERE (by Aleksandar Stojilkovic - thanks!)

  • Spanish - HERE (by Victor Pereyra - thanks!)

Freeware Password Recovery Tools

Here are some of these tools:

Free Windows password-cracking tools are usually Linux boot disks that have NT file system (NTFS) drivers and software that will read the registry and rewrite the password hashes for any account including the Administrators. This process requires physical access to the console and an available floppy drive but it works like a charm! I've done it myself several times with no glitch or problem whatsoever.

Beware!!! Resetting a user's or administrator's password on some systems (like Windows XP) might cause data loss, especially EFS-encrypted files and saved passwords from within Internet Explorer. To protect yourself against EFS-encrypted files loss you should always export your Private and Public key, along with the keys for the Recovery Agent user. Please read more about EFS on my What's EFS? page. Out of the following list, the only tool that will no cause any harm to EFS-encrypted files on your hard disk is the Windows Password recovery system.

Here are 5 of these free tools:

  1. Windows Password recovery - Can retrieve forgotten admin and users' passwords in minutes. Safest possible option, does not write anything to hard drive.

  2. Petter Nordahl-Hagen's Offline NT Password & Registry Editor - A great boot CD/Floppy that can reset the local administrator's password.

  3. Openwall's John the Ripper - Good boot floppy with cracking capabilities.

  4. EBCD – Emergency Boot CD - Bootable CD, intended for system recovery in the case of software or hardware faults.

If you happen to know about other free tools please let me know .

Important note for Windows Vista users: At this time there is only one solution for Window Vista and that is Petter Nordahl-Hagen's Offline NT Password & Registry Editor

Note: These password resetting tools are usually good for local users on a stand alone computer. For Domain Admin password resetting procedures please see the Related Articles section at the bottom of this page.

Note: I'd like to put together all the info you have about these issues. If you have any tips, recommended links or any ideas about how to figure out a lost password - please e-mail me and I'll get back to you .

Windows Password recovery

http://www.loginrecovery.com

This site provides a tool to recover lost Windows XP passwords. It works for administrator and user accounts, it doesn't change the password just tells you the old one. It works with encrypted files (EFS) and password hashes. It even works if no passwords at all are known for the machine (as long as you have another computer with internet access to view this website with).

Author claims it also works with Windows NT and Windows Server 2003 and Windows Longhorn, but the BEST thing about it is the fact that it won't reset your passwords, but simply reveal them for you to remember and then use.

Give it a try. The author would like to receive feedback. There is a free service as well as a priority service that will retrieve your passwords within minutes. The fee for the priority service is very cheap, and is really just to cover server costs.

Note: You'll need a blank floppy to run the process.

Update: Author now offers the same tool as a CD image for those of you who do not have a floppy in their computer.

Usage, instructions and additional information can be found at

http://www.loginrecovery.com

Offline NT Password & Registry Editor (v060213 - February 2006)

Petter Nordahl-Hagen has written a Windows NT/2000/XP/Vista offline password editor:

http://home.eunet.no/~pnordahl/ntpasswd

  • This is a utility to (re)set the password of any user that has a valid (local) account on your Windows NT/2000/XP/2003/Vista system, by modifying the encrypted password in the registry's SAM file.

  • You do not need to know the old password to set a new one.

  • It works offline, that is, you have to shutdown your computer and boot off a floppy disk or CD. The boot-disk includes stuff to access NTFS partitions and scripts to glue the whole thing together.

  • Works with syskey (no need to turn it off, but you can if you have lost the key)

  • Will detect and offer to unlock locked or disabled out user accounts!

Caution: If used on users that have EFS encrypted files, and the system is XP or later service packs on W2K, all encrypted files for that user will be UNREADABLE! and cannot be recovered unless you remember the old password again!

Download links:

  • cd070409.zip (~3MB) - Bootable CD image with newer drivers

  • bd050303.zip (~1.1MB) - Bootdisk image, date 050303.

  • sc050303.zip(~1.4MB) - SCSI-drivers (050303) (only use newest drivers with newest bootdisk, this one works with bd050303)

To write these images to a floppy disk you'll need RawWrite2 which is included in the Bootdisk image download. To create the CD you just need to use your favorite CD burning program and burn the .ISO file to CD.

Support and Problems? Don't call me! Talk to the creator of this great tool. He also has a good FAQ set up covering most of the day-to-day questions. Read it right HERE

Author claims that this tool was successfully tested on NT 3.51, NT 4, Windows 2000 (except datacenter), Windows XP (all versions) and Window Server 2003. Notice that it is NOT compatible with Active Directory.

Need to change Windows NT/2000 Domain Admin password? This tool, however useful, will only reset the local administrator's password (e.g. the one found in the local computer's SAM). To reset a password of a domain administrator (or any other user for that matter) you must perform the routine that is described in the following page: Forgot the Administrator's Password? - Reset Domain Admin Password in Windows 2000 AD.

Note: The above trick will probably not work under Windows Server 2003 due to service account security changes. To work around these limitations please read the Forgot the Administrator's Password? - Reset Domain Admin Password in Windows Server 2003 AD page.

John the Ripper (v1.7.0.1)

John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP LM hashes, plus several more with contributed patches.

Read more at http://www.openwall.com/john

Download links:

John the Ripper 1.7.0.1 (1.32mb)

A Pro version also exists on the author's site, however that one costs money.

EBCD – Emergency Boot CD (v0.61 - October 2004)

EBCD is a bootable CD, intended for system recovery in the case of software or hardware faults. It is able to create backup copies of normally working system and restore system to saved state. It contains the best system software ever created, properly compiled and configured for the maximum efficient use.

EBCD will be very useful when you need to:

  • Copy/move files (with long names, not necessary in CP437 encoding) from/to the disk but OS which can handle them (windows, Linux...) cannot boot. In particular, you may create a backup copy of normally installed and configured Windows and later restore Windows from such backup copy. So, in the case of fault OS itself and all software and its settings can be restored in 5-10 minutes.

  • Perform emergency boot of Windows NT / 2000 / XP. When the loader of this OS on the hard disk is damaged or misconfigured, you are able to load OS using another, standalone loader from this CD.

  • Recover master boot record of HDD. This allows to boot OS after incorrect uninstallation of custom loader (LILO, for example), which made all OS on your PC not bootable.

  • Delete, move, copy to file (image) and re-create partition from file. Image transfer over network is also supported: so you may configure one PC and then make contents of hard disks of other PCs same as contents of the hard disk of the first one.

  • Change password of any user, including administrator of Windows NT/2000/XP OS. You do not need to know the old password.

  • Recover deleted file, even file re-deleted from Windows Recycle Bin, and, in contrast, wipe single file or a whole disk so that it will be impossible to recover it in any way.

  • Recover data from accidentally formatted disk. Sometimes it helps to recover data from the disk, damaged by a virus.

  • Recover data from a floppy disk, which is not readable by OS. Format 3.5" disk for 1.7 Mb size.

Also the disk includes full set of external DOS commands, console versions of the most popular archivers/compressors.

Moreover, emergency boot CD includes minimal Linux distribution (Rescue Linux distribution) which may be very useful to a professional user.

how to find fight keyloggers

If your computer is accessed by other people (or even if not) you may want to find if somebody tries to steal your private data. One of the most used ways to do this is by installing a keylogger, a software (or even worse hardware) that captures the user's keystrokes (and that means they can see your passwords, credit card data, private conversations, output e-mails...). Here are a few ways you can use to check if a keylogger is installed on your computer:

1. Use up to date anti virus and/or anti spyware software
Typically a good anti virus software will find most of the commercial keyloggers and maybe more. Keep the software up to date and don't forget to enable advanced detection features for best results (for example check "Potentially unwanted applications" in NOD32).

2. Use a special software tool
There are a bunch of anti-keylogger software on the market and you may get better results with those. I recommend you to use them if you think there is a high possibility to have a keylogger installed. For example I found Cyberhawk to be the only software that detected a custom made keylogger. Kasperky does a good job in this area too. Also check anti-spy.info. More examples:

3. Find it yourself
If you are more like an advanced user you can try finding keyloggers by using a few tools like regedit (registry editor) and/or Process Explorer. It will save you some money but it gets harder and harder to find advanced spyware. You can look here or here for more information about using Process Explorer.
You can also try some hot key combination that are used by this kind of software. Examples: Ctrl + Alt + X or Ctrl + Alt + Wondows Key + X

4. Free tools you can use:
  • PSMAntiKeyLogger
    PSMAntiKeyLogger is a real-time protecting software which protects you against Keyloggers. No scanning is needed.
  • SnoopFree
    Freeware antikeylogger that block hook based keyloggers as well as screen captures. For Windows XP.
  • I Hate Keyloggers
    Freeware antikeylogger that block hook based keyloggers. For Windows 2000 and XP.
  • KL-Detector
    Freeware on demand keylogger scanner.
The best way to protect you against keyloggers is to prevent their installation. You can do this by limiting other Windows users accounts. You can find a good guide here. I advise you to try at least step 1 because you can never know...

12Business Skills You Need To Master

Developing a small business into a successful enterprise demands more than passion. Unfortunately, facts speak for themselves. Over half of new businesses fail mainly because the entrepreneur is unable to translate their passion into practical business skills. Success demands more than hard work, resilience, and expertise in your field. In order to succeed, you need to understand and to become proficient in a set of fundamental business skills.

Running a small business requires that you become a jack-of-all-trades. It is important to know early on which skills that you have and those that you will have to learn or delegate to others. When it comes to the skills that you lack, you can learn these skills over a period of time by yourself, you can hire employees who are strong in specific areas, or you can engage the help of a professional business advisor.

Here are the essential soft skills (people skills or anything that is not a technical skill) that you will need to learn or import to help you to succeed in your business:

• Delegation Skills -- Delegation involves assigning responsibility to other people for the completion of work. The ideal position that you want to obtain is one where your staff carries out all the routine activities of your business. Effective delegation involves achieving the correct balance between effective controls and allowing people to complete their job effectively. The key element is knowing how to make your business work, rather than your business working you!

• Communication Skills -- Communication is an important part of life and is one that is often taken for granted. When you think about it, almost everything you do requires improved communications. To be effective in business, you have to communicate well. When you hire a new employee, good communication skills help you select the right person. When you communicate with your various stakeholders, you need to be clear about your expectations and to be sensitive when dealing with problems. The key is to know how to effectively communicate your vision with passion and conviction.

• Negotiation Skills -- Almost everyone negotiates informally on a daily basis without even being aware of it. Formal negotiation is a skill that can be learned through experience and practice. People who negotiate frequently tend to be more skilled at it than people who have not participated in many formal/informal negotiations. Experienced people are more likely to know what to say, when or when not to say it, or when or when not to make concessions. The key is to know how to develop a win-win approach in negotiations with all parties, but at the same time keeping in mind that you also want to obtain the most favorable outcome possible for yourself.

• Strategic Planning -- Strategic planning is a very important business activity. Strategic planning is a process of defining your company's strategy or direction and making decisions on allocations of resources of capital and people. The key is to know how to project your company's future performance, within a three-to-five year framework or more, supported by your well-defined business plan.

• Leadership Skills -- Leadership is a process of getting things done via people. Leadership, a critical management skill, is the ability to motivate a group of people toward a common goal. Leadership is also the ability to take charge, assemble, mobilize, and motivate teams. The key is to know how to forge long-term relationships with prospects, customers, suppliers, employees, and investors.

• Team Building Skills -- Team-building and teamwork skills are essential for an entrepreneur in today's workplace. People working at their potential in teams generate better solutions and more productivity than individual members working independently. The key is to know how to build teams of employees, partners, advisors, and investors that will help you take your business to the next level.

• Analytical Skills -- Today’s workplace is becoming more technologically advanced and complex. With this rapid increase of technology, the need for analytical thinking also increases. Analytical thinking is the ability to objectively assess the present state of your business, to determine where you want to be in the future, and what to do in order to close the gap between the present and the future growth of your business. The key is to know how to gather, review, and evaluate data that is necessary to formulate and express compelling arguments.

• Sales and Marketing Skills -- Establishing successful sales and marketing methods and policies - from pricing and advertising to sales techniques - are essential in growing your business. The ability to analyze your competition, the marketplace, and industry trends are critical to the development of your marketing strategy. The key is to know how to craft and communicate a compelling message to the right target audience that generates new business, and in turn, builds profitable revenue streams.

• General Management Skills -- Management involves directing and controlling a group of one or more people for the purpose of coordinating activities that will accomplish a goal. Management encompasses the deployment and direction of human resources, financial resources, and technological resources. The key is to know how to develop and implement a workable management system that will manage daily operations, nurture stakeholders, and support business growth.

• Cash flow Management Skills -- Cash flow is generally acknowledged as the single most pressing concern of the small and medium-sized businesses. In its simplest form, cash flow is the movement of money in and out of your business. Cash flow is the life-blood of all growing businesses and is the primary indicator of business health. The effect of cash flow is real, immediate and, if mismanaged, totally unforgiving. The key is to know how to monitor, protect, control, and put cash to work.

Financial Management Skills --The activity of finance is the application of a set of techniques that individuals and businesses use to manage their money, particularly the differences between income and expenditure and the risks of their investments. The need for timely budgeting and reporting of financial performance is of the upmost importance. The key is to know how to interpret and analyze your financial statements, in such a way, as to identify the items that are adversely affecting your profitability.

Time Management Skills -- Time Management is a set of related common-sense skills that help you use your time in the most effective and productive way. Time Management is a very important skill to master. Learning this skill will empower you to achieve more and to use your time wisely. The key is to know how to manage your time efficiently and to focus on the activities most likely to deliver value to your business.

Copyright © 2007 Terry H. Hill You may reprint this article free of charge in your newsletter, magazine, or on your website, provided that the article is unedited, and that the copyright, author's bio, and contact information below appears with each article. Articles appearing on the web must provide a hyperlink to the author's web site.

Use windows xp like pro

If you want your car to perform and look well you have to do some maintenance from time to time: clean it, change the oil, change the tires and so on. Windows XP can be a good performer but, like with the car, you should take care of some things. Most people will tell you that it's performance will degrade over time and you have to do a clean reinstall to get it back. That's not true! Make sure you follow these advices and you'll see.

Things to do only once

  • Make sure you have a big enough system (C:\) partition. This will make file fragmentation less likely to occur.
  • Set your swap file to a fixed size. To do this access "Control Panel > System > Advanced > Performance : Settings > Advanced > Virtual Memory : Change" and enter a custom size. Use the same value for the initial size and maximum size (usually 1.5 x physical memory size). A good practice is to defragment the drive before so that Windows can allocate a contigous space for the pagefile.
  • Disable visual effects. To do this access "Control Panel > System > Advanced > Performance : Settings" and check "Adjust for best performance". This will make Windows XP look a bit uglier but work faster. If you have a new and fast system enjoy the looks and leave the default for this setting.
  • Disable indexing services. To do this go to "Control Panel > Add/Remove Programs > Add/Remove Window Components" and uncheck the Indexing services. Click "Next" to apply.
  • Install a good antivirus and leave Windows Firewall on. This should keep viruses and spyware away but you can never be too careful with those.
  • Disable "last access update notification". Create a new DWORD registry value called ‘NtfsDisableLastAccessUpdate’ in "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\FileSystem" and set value data to 1.

Things to do from time to time
  • Delete temporary files. Usually you can find them in "C:\Documents and Settings\\Local Settings\Temp\".
  • Delete your browser cache. For Internet Explorer go to "Tools > Internet Options... : General" and choose "Delete files > Delete all offline content". For FireFox go to "Tools > Options > Privacy > Clear now..." and make sure "Cache" is checked.
  • Defragment at least your system partition monthly. Make sure you completed the last two steps before and the result should be better.
  • Use Windows Update every week!!! This is very important. Also make sure your antivirus is up to date.
  • Check for newer versions of your drivers and software. Your browser, messenger or email client can be vulnerable to attacks even if the OS is updated. Also, updated drivers often bring good performance enhancements.

Things not to do
  • Do not install applications you don't need. These can bring the most bloat to your system increasing disk space, registry size, number of services, number of DLL's and so on. Make sure you install well-known and supported software. Check this for a list of free software I use.
  • Think twice before installing software from the internet. Twice!
  • Do not use memory defragmentation/cache enhancer software. Memory cache system is a key component of Windows constantly improved in the last 20 years and you simply cannot beat it with a 15$ utility.
This is it! And that's how I used Windows 2000 for 5 years without a single reinstall and Windows XP for the last 2 years.

Things you can do to become good

MOTTO: The greatest discovery of my generation is that a human being can alter his life by altering his attitudes of mind (William James)

Communicate. Employees must be empowered with information so that they can make the best decisions, quickly and without the approval of higher-ups.
Do not think you know everything. Listen to the people around you. Ask for their input when appropriate. Seeking help from individuals with expertise in specific areas is a sign of strength, not weakness.
Delegate. You can't do everything yourself. And even if you could that would not be the most effective use of your time as a manager.
Accept responsibility. A common mistake made by managers is to either delegate blame or simply not accept responsibility for that which happens under their guidance. Eventually, avoiding responsibility will catch up with a manager and usually not bode well for his or her future.
Take time to get to know your people. Learn what makes them excited, how to motivate them, what they fear or worry about. Get to know them as individuals, because that's the only way you can effectively manage them.
Do not try to show everyone who's in charge. Everyone in your group already knows who the new manager is. You don't have to make a big show about being "the boss".
Be human. Just because you are the boss doesn't mean you can't laugh, or show emotion, or make an occasional mistake. Make doing a good job for your company fun.
Protect your people. It's your job to stand up for your people and make sure they are treated as fairly as possible. They will return the loyalty.
Set goals with your employees.
Effective performance starts with clear goals. It is up to you as a manager to meet with your employees to develop attainable goals and guide them in their efforts to achieve those goals.
Make the transition from worker to manager. Becoming a manager requires the development of a whole new set of business skills: people skills. Sometimes it is a tough transition, but with the proper tools and assistance, it will be a satisfying transition.
Learn as more as you can. Today, more than at any other time, managers must be ready to change if the situation changes.
Don't fool yourself that you can stop change.
Instead, concentrate your efforts on taking actions that make a positive difference in your business life. Learn how to adapt to change and use it to your advantage instead of spending your energy fighting it. But do not change everything. Don't re-invent the wheel.
Don’t get out of balance in your life. Our lives are made up of Seven Vital Areas: Health, Family, Financial, Intellectual, Social, Professional, and Spiritual. We will not necessarily spend time every day in each area or equal amounts of time in each area. But if in the long run, we spend a sufficient quantity and quality of time in each area, our lives will be in balance.
Get enough sleep.
For most people, they get the quantity of sleep, but they lack the quality of sleep. If you will plan your day, then work your plan, you will get more done, feel a higher sense of accomplishment, and experience less stress and enjoy a more restful night's sleep.
Take a lunch break.
Many do not take a lunch break, working through that time period in the hopes that it will give them more time to produce results. A lunch break, even a short fifteen minute break, gives us a chance to get our batteries all charged up again to more effectively handle the afternoon's challenges.

If you are not yet a manager pretend you are and use these advices. The results will be surprising!

top10linux problems

Here's an interesting result of a linux a distancia poll. Although there were not too many votes this poll is relevant and even addicted Linux users will agree with some of these problems (like I agree that Windows development process is out of control for example). English (partial) translation:

1. The worse Linux problem: installation of applications
Installation of applications in Linux seems to be its greater problem. People mention problems with the diversity of distributions, dependencies, conflicts with versions, compilation problems, etc.
2. Lack of drivers
Even if drivers exists people have problems in finding the version that corresponds to the distribution which they are using.
3. Deficiency of a standard
In many cases can be a true problem. The people suggested that when they become familiar to a distribution, the next version is totally different. Or when they change the distribution, the files are stored in other locations. Almost all the voters suggest the differences in the interface, differences in the availability of the commands and the differences in the configuration of the applications make difficult the learning of this operating system.
4. Problems with modems
This seems to be the device most complicated to run in Linux.
5. Linux is slow
21 votes mention that Linux is much more slow that Windows XP.
6. “X” applications
17 votes mention the lack of availability of applications for Linux. Particularly they stand out the lack of applications to use for web design, audio production, graphic design, etc. Also there were many commentaries of the type “lack good games for Linux”.
7. The GUI has deficiencies
With 14 votes, problems in the more popular visual interfaces as GNOME and KDE are located in the seventh position. Problems of usability, management, etc. appear in the descriptions of the users. Many people complain that “Linux does not order the icons automatically”.
8. Problems with printers/new hardware
Printer appears like the second device more difficult to use in Linux. Other 13 votes suggest the “new hardware” is practically impossible to install/use in Linux.
9. Linux is seen “ugly”/“is difficult to use”
11 votes suggest Linux is seen “ugly” compared with other operating systems. Other 11 votes suggest simply “is more difficult to use that Windows” without giving too many explanations of the cause.
10. Problems using the scanner/complicated File system
Scanner seem to be another one of the devices most difficult to run in Linux. Finally, 10 votes suggest the Linux file system is “too complicated”.

Thursday, December 6, 2007

developer cheat sheet compilation

Nice compilation of cheat sheets (original post)

Command Line

Databases

Programming

Unix/Linux

Web Development

Miscellaneous Topics