WHATS NEW: * Generador 8.0 alpha (x86) * NodLogin 9.9 alpha (x86/x64) * NodEnabler 2.81 (x86/x64) improved * MiNODLogin 2.4.0.1 (x86/x64) * TNOD User & Password Finder 1.0.0 BETA (x86) * SuperGetValid V2 rev4 (x86) * NodGEN 3.0 (x86/x64) * Eset Login Viewer 1.3 * Licencia gratuita 30 dias
NOTE: ESET kept detecting nodlogin & generdor as Win32/Packed.Autoit.Gen. It is a false threat. Download: http://rapidshare.com/files/209524663/Ulisess_Seguridad_9.91.www.dl4all.com.rar Password: www.dl4all.comHome » Posts filed under Security
Ulisess Seguridad 9.91 [Updated]
Avira AntiVir Premium 9.0.0.420 - K€y 2011
Security package with virus scanner, email protection, Personal Firewall, AntiSpyware, AntiPhishing, ...; - Very easy to install; - One click configuration with individual selection between standard and expert configuration; - Extremely high performance and detection capacity by using the latest standards (AHeAD technology); - Extremely small program and signature updates make sure that the protection against attackers is always up-to-date; - Take control of your inbox with Avira's advanced antispam technology. - AntiSpam, AntiPhishing and Rootkit Protection; New: - Virus check of every file and archive access; - Protection of active processes against undesired breakups; - Perfect for game tasks through the "Game mode" Premium Protection: AntiVir AntiAd/Spyware AntiPhishing AntiRootkit WebGuard AntiDrive-by AntiBot RescueSystem EmailScanner
Download: http://rapidshare.com/files/210731452/Avira_AntiVir_Premium_9.0.0.420_-_Key_2011_www.dl4all.com.rarAdvanced System Protector 2.0.323.1836 [ENG & RUS]
Norton Internet Security 2009 16.5.0.135
Key Technologies: • Antivirus • Spyware protection • Two-way firewall • Identity protection • Antiphishing • Network monitoring • Bot protection • Rootkit detection • Browser protection • Internet worm protection • Intrusion prevention • OS and application protection • Web site authentication • Pulse updates • Norton™ Insight • SONAR™ behavioral protection • Antispam • Parental Controls & confidential information blocking Key Benefits: • Proven fastest, lightest security suite available—Spend more time using your computer and less time waiting for your security software to perform. • Pulse updates for up-to-the-minute protection—Delivered every 5 to 15 minutes to detect and eliminate new threats. NEW • Intelligence-driven for faster, fewer, shorter scans—By leveraging a unique online intelligence system, Norton™ Insight technology targets only those files at risk. NEW • Stops viruses, worms, spyware, bots, and more—Keeps your system protected against all types of malicious threats. • Prevents virus-infected emails and instant messages from spreading—Feel secure while you keep in touch. • Blocks browser exploits and protects against infected Web sites—Surf the Internet with confidence. • Blocks online identity theft—Buy, bank, and browse online wherever and whenever you want. IMPROVED • Secure network connections—Monitor your home network and more safely connect to Wi-fis. IMPROVED • Blocks threats and hackers—Two-way firewall automatically makes security decisions for you. IMPROVED Features: Engineered for Speed * New! Proven fastest, lightest security suite available * New! Intelligence-driven Norton™ Insight technology targets only those files at risk for faster, fewer, shorter scans * New! Installs in under one minute on average, requires less than 10 MB of memory, and only 100 MB of disk space plus definitions Up-to-the-minute Protection * New! Delivers up-to-the-minute protection with rapid pulse updates every 5 to 15 minutes. * New! The Norton™ Protection System provides multilayered protection technologies that work in concert to stop threats before they impact you. † * New! Real-time SONAR (Symantec™ Online Network for Advanced Response) helps prevent bots from taking control of your PC. * Improved! Prevents threats from entering or leaving your firewall. * Detects and automatically removes online threats. * Improved! Defends against Web-based attacks with patent-pending technology. * Automatically detects and removes spyware, viruses, Trojans, bots and Internet worms * New! Boots and repairs badly infected PCs. * New! Specialized deep-cleaning technology delivers our most complete scan possible to repair heavily infected computers. Norton Identity Safe * Improved! Keeps your online identity safer than ever when you buy, bank, browse, and game online. * Advanced phishing protection keeps your personal identification out of the hands of fraudulent Web sites. * Stores and encrypts your passwords and other confidential data. * Improved! Fills in online forms at your request to save time and protect you from keystroke loggers. Control without disruptions * Puts every element of your security at your fingertips * New! Schedules resource intensive tasks for when you’re not using your PC. * New! Review the security status of every process on your PC. * New! Silent mode suspends alerts and updates to avoid interrupting or slowing games and movies. * Smart two-way firewall automatically makes security decisions for you. Secure Networking * Improved! Helps you secure your home network. * Conceals and secures your PC on public Wi-Fi networks. Parental Controls * New! Create individual user profiles with enhanced parental controls. Spam Blocking * Filters spam better than ever. Microsoft® Windows Vista® Home Basic/Home Premium/Business/Ultimate Microsoft® Windows® XP with Service Pack 2 Home/XP Pro/XP Media Center Edition * 300 MHz or faster processor * 256 MB of RAM (*512 MB RAM required for the Recovery Tool) * 200 MB of available hard disk space * Standard Web browser Email scanning supported for POP3- and SMTP-compatible email clients. Support for AntiSpam feature: * Microsoft Outlook® 97 or later * Microsoft Outlook Express 6.0 or later Supported instant messaging clients: * AOL® * Yahoo!® * Microsoft® * Trillian™ Browser support for Browser Defense and Phishing Protection features: * Microsoft Internet Explorer® 6.0 (32-bit only) and later * Mozilla Firefox® 2.0 and later
Homepage - http://www.symantec.com/norton/internet-security Download: 66.3 MB http://spftrl.digitalriver.com/pub/symantec/tbyb/NAM/NIS09EN.exe Trial Reset V1.5: 2.52 MB http://rapidshare.com/files/211884463/NOO9TR32_s22_www.dl4all.com.rar Mirror1: http://www.easy-share.com/1904127524/NOO9TR32_s22_www.dl4all.com.rar Mirror2: http://www.megaupload.com/?d=1GATRXRX Password: www.dl4all.comNorton AntiVirus 2009 16.5.0.134
Key Technologies: • Antivirus software • Spyware remover • Bot protection • Browser protection • Internet worm protection • Intrusion prevention • OS and application protection • Rapid pulse updates • Recovery tool • Rootkit detection • Norton™ Insight • SONAR™ behavioral protection Key Benefits: • Stops viruses, worms, spyware, bots, and more—Keeps your system protected against all types of malicious threats. • Norton™ Insight—Delivers innovative intelligence-driven technology for faster, fewer, shorter scans. • Rapid pulse updates every 5 to 15 minutes—provides up-to-the-minute protection. • Prevents virus-infected emails and instant messages from spreading—Feel secure while you keep in touch. • Blocks browser exploits and protects against infected Web sites—Surf the Internet with confidence. Norton AntiVirus Features: Engineered for Speed * New! Proven fastest, lightest security suite available. * New! Scans only files and processes at risk using Norton™ Insight. * New! Installs in under one minute on average, requires less than 10 MB of memory, and only 100 MB of disk space plus definitions. Up-to-the-minute Protection * New! Delivers up-to-the-minute protection with rapid pulse updates. * Improved! Provides multilayered security through the Norton™ Protection System. * New! Prevents bots from taking control of your PC. * Detects and automatically removes malicious threats. * Improved! Defends against Web-based attacks. * Automatically detects and removes spyware, viruses, Trojans, bots and Internet worms. * New! Boots and repairs badly infected PCs. * New! Delivers our most complete, deep cleaning scan possible. Control without disruptions * New! Automatically schedules scans and updates to occur while PC is idle.† * New! Review the security status of every process on your PC. * New! Ensures movies and games are never interrupted. * Microsoft® Windows Vista® Home Basic/Home Premium/Business/Ultimate * Microsoft® Windows® XP with Service Pack 2 Home/XP Pro/XP Media Center Edition * 300 MHz or faster processor * 256 MB of RAM * 150 MB of available hard disk space. Email scanning supported for POP3 - and SMTP-compatible email clients. Browser support for Browser Protection feature: * Microsoft Internet Explorer® 32-bit 6.0 or higher * Mozilla Firefox® 2.0 or higher Supported instant messaging clients: * AOL® * Yahoo!® * Microsoft® * Trillian™
Homepage - http://www.symantec.com/ Download: 60.5 MB http://spftrl.digitalriver.com/pub/symantec/tbyb/NAM/NAV09EN.exe Trial Reset V1.5: 2.5 MB http://rapidshare.com/files/211884463/NOO9TR32_s22_www.dl4all.com.rar Mirror1: http://www.easy-share.com/1904127524/NOO9TR32_s22_www.dl4all.com.rar Mirror2: http://www.megaupload.com/?d=1GATRXRX Password: www.dl4all.comSuperAntiSpyware Professional v4.26.1000 BETA Multilanguage Incl. Keygen & patch
SUPERAntiSpyware Professional v4.25.1012 FEATURES: * Smart Definitions to detect zero-day threats * SmitFraud Detection Enhancements * Enhanced Diagnostic System to detect rootkits / malware cloak * Improved rootkit removal technology to handle rootkits that disable security applications * Numerous technology additions to the scanning engine * Updated Direct Registry Access (DRA) Technology * Updated DDA (Direct Disk Access) - faster and more reliable. Note: If u Find Virus in keygen.....den its not a new thing.........so plz disable the antivirus for few sec & run the keygen.........& get the activation.......& then if u 've any doubt..run the virus......scan... & all the viruses will be deleted........... so plz 've sum common sense..........
Download: http://www.easy-share.com/1904209655/SA.Prof.v4.26.1000.BETA_Incl.Keygen&patch.rar Mirror: http://rapidshare.com/files/213986213/SA.Prof.v4.26.1000.BETA_Incl.Keygen_patch_www.dl4all.com.rar Pass: www.dl4all.comDifference between Web & Windows in simple terms
1) Windows is .exe & Web is .dll
2) Performance wise windows (.exe) take more time for execution.
Every page is a dll in .net so when a website is loaded then only one page is executed and rest pages are dynamically linked .
3) Web appl always needs a web server(i.e. IIS,Apache etc.) for ececuting.
4) Security - Websites are not secure.
5) User friendly - Windows appl is very user friendly. As there are ppl who dnt know about internet so not possible to use while windows somewat can be used.
Kaspersky Mobile Security v8.0
Kaspersky Mobile Security v8.0
Kaspersky Mobile Security 8.0 is designed to ensure complex protection of mobile devices.
The product provides the following functionality to the user:
1. File system scan for viruses or other malicious programs by user’s demand or according to the schedule
2. On-access anti-virus file scan
3. Opportunity to quarantine infected objects and disinfect some of them
4. Anti-virus databases update by user’s demand or according to the schedule via GPRS, Wi-Fi, EDGE or ActiveSync (for Windows Mobile version)
5. Blocking unsolicited SMS messages and calls (Good Filtering Capablity)
6. Opportunity to block the user data in case the device is lost or stolen
7. Opportunity to delete user data in case the device is lost or stolen
8. Device protection against network attacks via TCP/IP
9. Opportunity to create a folder for saving files in the encrypted form
10. Opportunity to identify the phone location remotely (if the device is equipped with a GPS receiver) (Function like Guardian Platinum)
11. Opportunity to block outgoing calls and messages to the specified numbers. (Very nice)
The product has a user-friendly and intuitive interface.
The product can be installed to the main memory of the mobile device only.
Product components:
Kaspersky Mobile Security 8.0 comprises the following components:
* Anti-Virus
* Anti-Spam
* Anti-Theft
* Firewall
* Encryption
* Parental control
System requirements:
The product runs only on mobile devices that support SMS receipt and sending and work under the following operating systems:
* Symbian OS 9.1, 9.2, 9.3 Series 60 (Nokia smartphones only).
* Windows Mobile 5.0, 6.0, 6.1.
The product has been tested on the following mobile devices:
* Nokia: E61, 5500, N95, 3250, E50, E60, N71, N80, E71, N96, N78, 6220, 6110
* HTC: 710S
* HTC: S620
* HP: iPaq 514
* HP: S100
* HP: HW 6915
* Eten: m600
* Eten: x800
* Toshiba: G900
* ASUS P750
* Samsung SGH i200
* HTC Touch Diamond
Code:
www.mediafire.com/?m4qyzdjzxhm
Show/Hide Drives in My Computer
There are times when you might want to hide one or more of your windows drives because of security reasons (children getting up on the system and messing up everything or if the computer is in use by multiple people). For theses reasons, you would just prefer to hide your data in a safe place and if one of your drives is full of sensitive information, you would rather hide the drive from My Computer.
There are two ways of doing it, one from the group policy editor and the second from registry editor. I will explain both of them here:
1-Hiding drives using Group Policy Editor
Go to Start –> Run –> gpedit.msc
The group policy editor will open. Go to the following node:
User Configuration –> Administrative Templates –> Windows Components –> Windows Explorer
Now go to the right hand window and double click the value “Hide these specified drives in My Computer”, select enable and select the drives from the drop down menu.
This is restrictive in the sense that it only specifies drives up to D drive. Or all the drives can be hidden.
2-Hiding the drives using Registry Editor
To open the registry editor Go to Start –> Run –> regedit
Go to HKEY_LOCAL_MACHINE\SOFTWARE \Microsoft\Windows\CurrentVersion\policies\Explorer
In the right hand pane, right click –> new –> DWORD Value Rename it to “NoDrives” (without quotes)
To calculate the value, add together the numbers for the drives you want to hide, using the formula: A=1, B=2, C=4, D=8, E=16, F=32, G=64, H=128, I=256 and so on. Put the result in the NoDrives key value. Remember to select decimal instead of HEX from the NoDrives key. For Example if I want to hide C and F drives, C+F = 4+32 = 36. Put the value 36 in NoDrives key.
Alternatively, you can use NoDrives!!! (NT Drive Calculator) for calculating the drive values. It’s a lot easier than calculating by hand.
Note: Always use the registry editor with caution because, if used inappropriately, it can mess up the whole system. I recommend creating a restore point before getting your hands on the registry editor.
How To Set Password For Hard Disk
There is a builtin ultimate security option for computer data in hard disk drives. You may have tried Main-board (BIOS or CMOS) password and windows password protection. I am going to tell you that there is a way you can password protect your hard disk drive.
It is not a very well known fact, but all hard disks have a very strong hardware password capability build in. This password is usually stored both in a chip on the HD controller (the printed circuit board on the hard disk) and on the hard disk itself in a special hidden sector.
For security/protection conscious geeks, it is possible to lock your hard disk with password. A lot of newer laptops will set the HD password together with the BIOS password, completely locking all the hardware for security measures.
It has nothing to do with the machine. All protection is on HD. To set the Password on HD; Go to BIOS. Go to Security and select HD Password. The only way to remain secure is to remember your HD password. If forgotten, that HD even will not be able to show data under slave mode. Data protection by locking down your HD is ultimate and even when you loose HD somehow, nobody can get your data but its very risky.
P.S. If you forget your HD password, there is no way you can retrieve data back or reset the password. You will have to send the hard disk to the data recovery company or the vendors for unlocking, but not all data recovery companies could or would unlock a password protected HD. Never ever try to play with your HD password if you are not sure what you are doing.
5 Tips On Keeping Your PC Safe While Surfing Online
1. Update Windows Microsoft regularly releases free downloads to fix security problems with Windows, Internet Explorer and other Microsoft software such as Office.
2. Install A Firewall A good firewall such as ZoneAlarm will prevent programs from accessing the Internet without your permission, and block access to your PC from intruders.
4. Remove Spyware Spyware is malicious code that tracks your movements on the Internet and can even affect your PC's performance. Read Remove Spyware which explains how to get rid of malicious spyware and adware.
5. Browse More Safely The latest web browsers such as Internet Explorer 7 and Firefox 2 offer security features like pop-up blockers and phishing filters to keep you safe when visiting web sites.
Speed Up Computer - Clear System Memory
Here is how you can clear up system memory to boost up computer performance. Running multiple applications simultaneously for long periods leads to a gradual decrease in system performance over time. Often the only option is a restart. Even if you close the application in the Task Manager, the tasks/threads associated with the application are not released completely, depleting the systems memory resources making the system unstable and sluggish. The following tip is designed to offer fast relief.
- Right-click on your desktop and select New -> Shortcut
- In the text box enter the command %windir%\system32\rundll32.exe advapi32.dll,ProcessIdleTasks
- Click Next. In the next screen, name the shortcut: for example, Clear Memory
- Click on Finish
Whenever you feel that the system is sluggish you can double click on this shortcut and it will take care of the idle tasks by removing them. This can be used before you resort to restarting/rebooting the system.
Download File
Computer Windows Admin Account Access Protection
Have you ever experienced that after you installed windows and set your user name and giving it a password someone managed to log into the computer.
Well here is a precaution to avoid that. While installing windows always give password to administrator account. While installation it asks for administrator password and many guys ignore it and when installation is done they set a windows user and start doing work.
Still there is an administrator account with blank password.
And if someone just press Ctrl+Alt+Del twice at welcoem screen it asks for default administrator account access and there he can enter with blank password and change your user password or access your files as an administrator.
Always set default account (administrator) password.
100 Percent Security - Go Secret Online
While you're enjoying your latte and a bagel, some hacker might be accessing your passwords, credit card numbers, sensitive company data and much more. And standard antivirus software won't protect you. That's why AnchorFree is pleased to offer Hotspot Shield. This free security software keeps your Internet connection secure at public hotspots, home or work.
100% Security Through a VPN
Hotspot Shield creates a virtual private network (VPN) between your laptop and the wireless router. This impenetrable tunnel prevents snoopers and hackers from viewing your email, instant messages, credit card information or anything else you send over a wireless network. Which means you remain anonymous and protect your privacy.
Hotspot Shield security software is free to download, employs the latest VPN technology, and is easy to install and use. So go ahead - Get behind the Shield.
Hotspot Shield runs on:
- Windows Vista
- Windows XP
- Windows 2000
- Mac OS X (10.5 Leopard)
- Mac OS X (10.4 Tiger)
Here is how it does something with your online presence. I am in Pakistan but You can see my location and IP which are different then origional in image below.
Change Your Dynamic IP Address
This is suppposed to change your dynamic IP Address.
Open notepad and type
ipconfig /flushdns
ipconfig /refresh
ipconfig /renew
ipconfig /all>newip.txt
end
then save as (select all file types) --- ip.bat
this is now a batch file rather than a txt file. Simply hit run on the file and watch the progress.
If you want to print out the results then add this line into the same file befoe "END"
ipconfig /all>filename. txt
A report will be saved in the same directory as your batch file, detailing your new ip and a bit more...
Resource Hacker - Customize Your Own PC Resources
Change the PC resources in the way you like it. Thats what 'Resource Hacker' is all about. If you like to play tricks with your PC and like to tweak it a bit then 'Resource hacker' is a good choice out there and it is absolutely free and easy to use.
Resource Hacker is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Win95, Win98, WinME, WinNT, Win2000 and WinXP operating systems.
Viewing Resources: Cursor, Icon, Bitmap, GIF, AVI, and JPG resource images can be viewed. WAV and MIDI audio resources can be played. Menus, Dialogs, MessageTables, StringTables, Accelerators, Delphi Forms, and VersionInfo resources can be viewed as decompiled resource scripts. Menus and Dialogs can also be viewed as they would appear in a running application.
Saving Resources: Resources can be saved as image files (*.ico, *.bmp etc), as script files (*.rc), as binary resource files (*.res), or as untyped binary files (*.bin).
Modifying Resources: Resources can be modified by replacing the resource with a resource located in another file (*.ico, *.bmp, *.res etc) or by using the internal resource script compiler (for menus, dialogs etc). Dialog controls can also be visually moved and/or resized by clicking and dragging the respective dialog controls prior to recompiling with the internal compiler.
Adding Resources: Resources can be added to an application by copying them from external resource files (*.res).
Deleting Resources: Most compilers add resources into applications which are never used by the application. Removing unused resources can reduce an application's size.
Is your website secure?
XSS attacks (Cross Site Scripting) provides hackers access to your website content and database. If web applications are not secure, then your entire database of sensitive information is at serious risk.
Hackers are on the lookout for Cross Site Scripting (XSS) vulnerabilities in YOUR web applications. Shopping carts, forms, login pages, dynamic content are easy targets. Beat them to it and scan your web applications with Acunetix Web Vulnerability Scanner:
- Acunetix WVS automatically checks your web applications for XSS, SQL Injection & other vulnerabilities
- Firewalls, SSL and locked-down servers are futile against web application hacking
- Acunetix checks your web applications for coding errors that result in Cross Site Scripting vulnerabilities
- Acunetix also checks for other vulnerabilities in popular web applications such as Joomla, PHPbb, Wordpress etc.
- Acunetix identifies files with XSS vulnerabilities allowing you to fix them BEFORE the hacker finds them!
Audit your web site security with Acunetix Web Vulnerability Scanner. The best part about this software: Its free version is also available.
Download Link
http://www.acunetix.com/cross-site-scripting/scanner.htm
website scanner
Why Choose a Strong Password?
PCs Personal data, emails, online storage accounts are guarded by username and password. username are sometimes filled in when we access a website and in case of a computer user, there is always a user name before you logon to your computer. All you have to do it to guess the password to hack in to the system. There are some booters, brute force attacks, dictionary attacks and hacks which can easily guess common words used in passwords to penetrate into the system. To secure yourself you have just one choice. Choose as much strong password as you can.
Strong password should be difficult to detect by both humans and computer programs, effectively protecting data from unauthorized access. A strong password should consist of at least six characters and combination of both uppercase and lowercase letters, numbers and symbols (@ # $ % ` ~ ! ^ & * ( ) _ + - = { } | [ ] \ : " ; ' < > ? , . /) if allowed.
Tips on how to choose a strong password and make it safe
- Don't use any part of your username, full name, birth date, spouse names, favorite thing or any other personal info e.g. 'what you like'! in passwords.
- Choose long password. Longer the password, the better.
- Don't use old passwords or same for all applications you use.
- If you suspect that someone else knows your password, change it immediately.
- Use substitute word and numbers for letters. For example, DEVIL could become D3VIL, COFFEE could become C0FF33 and NARNIA could become N@RNI@.
- Do not use a plain word at all.
- Make a habit to change password regularly.
- Do not use repeated characters such as aa, nnn etc.
- Do not use alphabetic sequences, such as abc or xyz.
- Password should contain uppercase letters, lowercase letters, and numbers.
- If it is easy for you, use ASCII characters (which you can access by holding down Alt and typing on the number pad).
- Do not use numeric sequences, such as 123 or 321.
- Do not use a common dictionary word.
- Never disclose your passwords to anyone else ever.
- Don't enter your password when others can see what you are typing.
- Don’t write passwords down anywhere.
- Don’t send your password by email.
- Use any encryption utility to store your passwords if needed.
- Get creative with mixing numbers, symbols, and uppercase letters in your own way.
- Every popular website, which requires sign-up gives a password strength utility which tells you about your password strength while filling the form. Follow its direction.
- Create a unique acronym.
- Include phonetic replacements, such as 'Luv2chat' for 'Love to Chat'.
- Do not use any password generator tool. Just get help or idea and be creative in your own way.
Keyboard Shortcuts
• CTRL+C (Copy) • CTRL+X (Cut) • CTRL+V (Paste) • CTRL+Z (Undo) • DELETE (Delete) • SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin) • CTRL while dragging an item (Copy the selected item) • CTRL+SHIFT while dragging an item (Create a shortcut to the selected item) • F2 key (Rename the selected item) • CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word) • CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word) • CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph) • CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph) • CTRL+SHIFT with any of the arrow keys (Highlight a block of text) • SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document) • CTRL+A (Select all) • F3 key (Search for a file or a folder) • ALT+ENTER (View the properties for the selected item) • ALT+F4 (Close the active item, or quit the active program) • ALT+ENTER (Display the properties of the selected object) • ALT+SPACEBAR (Open the shortcut menu for the active window) • CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously) • ALT+TAB (Switch between the open items) • ALT+ESC (Cycle through items in the order that they had been opened) • F6 key (Cycle through the screen elements in a window or on the desktop) • F4 key (Display the Address bar list in My Computer or Windows Explorer) • SHIFT+F10 (Display the shortcut menu for the selected item) • ALT+SPACEBAR (Display the System menu for the active window) • CTRL+ESC (Display the Start menu) • ALT+Underlined letter in a menu name (Display the corresponding menu) • Underlined letter in a command name on an open menu (Perform the corresponding command) • F10 key (Activate the menu bar in the active program) • RIGHT ARROW (Open the next menu to the right, or open a submenu) • LEFT ARROW (Open the next menu to the left, or close a submenu) • F5 key (Update the active window) • BACKSPACE (View the folder one level up in My Computer or Windows Explorer) • ESC (Cancel the current task) • SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing) • CTRL+SHIFT+ESC (Open Task Manager)
Dialog box keyboard shortcuts If you press SHIFT+F8 in extended selection list boxes, you enable extended selection mode. In this mode, you can use an arrow key to move a cursor without changing the selection. You can press CTRL+SPACEBAR or SHIFT+SPACEBAR to adjust the selection. To cancel extended selection mode, press SHIFT+F8 again. Extended selection mode cancels itself when you move the focus to another control. • CTRL+TAB (Move forward through the tabs) • CTRL+SHIFT+TAB (Move backward through the tabs) • TAB (Move forward through the options) • SHIFT+TAB (Move backward through the options) • ALT+Underlined letter (Perform the corresponding command or select the corresponding option) • ENTER (Perform the command for the active option or button) • SPACEBAR (Select or clear the check box if the active option is a check box) • Arrow keys (Select a button if the active option is a group of option buttons) • F1 key (Display Help) • F4 key (Display the items in the active list) • BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box) Microsoft natural keyboard shortcuts • Windows Logo (Display or hide the Start menu) • Windows Logo+BREAK (Display the System Properties dialog box) • Windows Logo+D (Display the desktop) • Windows Logo+M (Minimize all of the windows) • Windows Logo+SHIFT+M (Restore the minimized windows) • Windows Logo+E (Open My Computer) • Windows Logo+F (Search for a file or a folder) • CTRL+Windows Logo+F (Search for computers) • Windows Logo+F1 (Display Windows Help) • Windows Logo+ L (Lock the keyboard) • Windows Logo+R (Open the Run dialog box) • Windows Logo+U (Open Utility Manager) Accessibility keyboard shortcuts • Right SHIFT for eight seconds (Switch FilterKeys either on or off) • Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off) • Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off) • SHIFT five times (Switch the StickyKeys either on or off) • NUM LOCK for five seconds (Switch the ToggleKeys either on or off) • Windows Logo +U (Open Utility Manager) Windows Explorer keyboard shortcuts • END (Display the bottom of the active window) • HOME (Display the top of the active window) • NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder) • NUM LOCK+Plus sign (+) (Display the contents of the selected folder) • NUM LOCK+Minus sign (-) (Collapse the selected folder) • LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder) • RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder) Shortcut keys for Character Map After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts: • RIGHT ARROW (Move to the right or to the beginning of the next line) • LEFT ARROW (Move to the left or to the end of the previous line) • UP ARROW (Move up one row) • DOWN ARROW (Move down one row) • PAGE UP (Move up one screen at a time) • PAGE DOWN (Move down one screen at a time) • HOME (Move to the beginning of the line) • END (Move to the end of the line) • CTRL+HOME (Move to the first character) • CTRL+END (Move to the last character) • SPACEBAR (Switch between Enlarged and Normal mode when a character is selected) Microsoft Management Console (MMC) main window keyboard shortcuts • CTRL+O (Open a saved console) • CTRL+N (Open a new console) • CTRL+S (Save the open console) • CTRL+M (Add or remove a console item) • CTRL+W (Open a new window) • F5 key (Update the content of all console windows) • ALT+SPACEBAR (Display the MMC window menu) • ALT+F4 (Close the console) • ALT+A (Display the Action menu) • ALT+V (Display the View menu) • ALT+F (Display the File menu) • ALT+O (Display the Favorites menu) MMC console window keyboard shortcuts • CTRL+P (Print the current page or active pane) • ALT+Minus sign (-) (Display the window menu for the active console window) • SHIFT+F10 (Display the Action shortcut menu for the selected item) • F1 key (Open the Help topic, if any, for the selected item) • F5 key (Update the content of all console windows) • CTRL+F10 (Maximize the active console window) • CTRL+F5 (Restore the active console window) • ALT+ENTER (Display the Properties dialog box, if any, for the selected item) • F2 key (Rename the selected item) • CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console) Remote desktop connection navigation • CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box) • ALT+PAGE UP (Switch between programs from left to right) • ALT+PAGE DOWN (Switch between programs from right to left) • ALT+INSERT (Cycle through the programs in most recently used order) • ALT+HOME (Display the Start menu) • CTRL+ALT+BREAK (Switch the client computer between a window and a full screen) • ALT+DELETE (Display the Windows menu) • CTRL+ALT+Minus sign (-) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.) • CTRL+ALT+Plus sign (+) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.) Microsoft Internet Explorer navigation • CTRL+B (Open the Organize Favorites dialog box) • CTRL+E (Open the Search bar) • CTRL+F (Start the Find utility) • CTRL+H (Open the History bar) • CTRL+I (Open the Favorites bar) • CTRL+L (Open the Open dialog box) • CTRL+N (Start another instance of the browser with the same Web address) • CTRL+O (Open the Open dialog box, the same as CTRL+L) • CTRL+P (Open the Print dialog box) • CTRL+R (Update the current Web page)