Tuesday, 3 March 2015

Internet Crime


Internet Crime is on the rise with the culprits coming up up with new ways to misuse the Internet. Here is some more information about Internet crime...

If you think the world is not a safe place anymore and try to seek solace in the virtual world of Internet, you will be disappointed to find out that the Internet is not devoid of crime, debauchery and exploitation. The Internet is not a safe place with the increasing number of virtual criminals that lurk behind the virtual walls awaiting their victims to log on to the net and fall prey to their malicious tactics and easy baits. Here is all the information that you would need to know about Internet crime…

What exactly is Internet crime?

Internet crime is a recently escalating form of crime that started with the rise of the Internet era. Any criminal activity, which is carried out on the Internet or by means of the Internet, is generally termed as Internet crime.

What are the various threats in the cyberspace that I should be aware of ?

There are various ways in which criminal minds can use the power of Internet to abuse and cheat people. Here is a list of some of the most dangerous criminal activities over the Internet:

1. Hacking: The process where someone attempts to exploit the security settings of a computer system is known as hacking. The hackers can hack into several websites or personal accounts and threaten the security on the Internet.

2. Phishing: This is a process where the culprit poses as an official entity and tries to acquire important financial or personal details like credit card number, social security number, home address or telephone number.

3. Internet extortion: Threatening emails exploiting people and blackmailing them on the internet to pay money or other favors is another identity theft, child pornography, password trafficking, spamming, virtual stalking, fake auctions and other internet scams are some of the threatening criminal activities that exist on the Internet.

4. Pornography: Abuse of children for generation of pornographic content over the web is one of the most disgusting cyber crimes. Also misusing personal photographs of people to generate forged pornographic content is also a malicious activity in the Internet crime world.

5. Cyber-terrorism: When people try and break into national and international security system to access undisclosed matters of national and international importance, this accounts to cyber terrorism.

Where should I report an Internet crime?

The Internet Crime Complaint Center, which is a joint initiative of the Federal Bureau of Investigation and the National White Collar Crime Center, aims to serve as a medium to receive, develop, and refer criminal complaints in Internet crime. The Internet Crime Complaint Center also provides the cyber victims an easy-to-use reporting mechanism. Other organizations that could be of help are Department of Homeland Security's National Infrastructure Coordinating Center, U.S. Computer Emergency Readiness Team, National Association of Attorney General's Computer Crime Point of Contact List.

Are there any laws to protect the citizens against Internet crime?

Yes there are several laws that safeguard the interests of the Internet users and have severe penalties for cyber criminals. Here is a list of some important laws:
The Counterfeit Access Device and Computer Fraud and Abuse Act of 1984
The Electronic Communications Privacy Act of 1986
The National Information Infrastructure Protection Act of 1996
The No-Electronic Theft Act of 1997
The Communications Decency Act of 1996
The Child Online Protection Act of 1998
The Protection of Children from Sexual Predators Act of 1998
The Patriot Act of 2001

What are the ways to protect myself from Internet crime?

Safe and anonymous Internet browsing is the key to stay away from cyber crime. One should avoid giving away personal details like credit card number, social security number, home address, telephone number, and account passwords on the Internet. Financial transactions should be carried out over the Internet only when you are assured about the credibility of the website. Online shopping from suspicious websites should be avoided.

Tips and Tricks to Improve Computer Speed


This is an article about my experience in improving my computer speed. It is more focused on the startup process rather than over clocking the system.
A Little Bit of My History

The very first time I have my hands on computer was almost 18 years back or so. It was an Apple computer given by my uncle who thought that I might be interested in it. The computer had no hard drive but with two 5 and a half inches floppy drive. The colors supported were black and green. All I did with the computer is to play games.

Later on, my father bought a 80286 system which came with a DOS system menu. I am particularly interested in games and since we had a DOS system, I started borrowing games from my friends. The computer was not considered fast because there were 80486 in the market at that time. Thus, some of the games are either not compatible or too slow to play a 80286 system.

At that time, I discovered that memory is one of the important components to increase the computer speed. Knowing that it was impossible for me to buy additional RAM to add-on, I started looking at DOS utilities. There was a Memory Maker tools which aimed to increase the memory similar of having a virtual memory but there was no significant improvement or I should say there was no improvement at all.

Later on, my father bought a Pentium 133 system with Windows 95. I upgraded it to Windows 98 myself. I went on to study computing in college and had another Celeron 300A system. I tried over clocking but the system just hangs after 333MHz. An increase of 33MHz did not improve much to the overall speed.

The tools

MSCONFIG

This is one of the most common tools that you can find in all Windows system. Run the tool by typing 'msconfig' from Start Menu --> Run, and a system configuration windows will appear. Click on the startup tab and it contains a list of startup program on your computer. Thus, one of the ways to improve your computer startup speed is to have the least programs to startup automatically with Windows.

Of course, you will want your antivirus to startup together but other than that, I believe that MSN, Skype and other similar tools will slow down your startup tremendously. You might be saying that you will always need to run MSN and Skype but a good practice is to enable them in the startup but prevent them from signing in automatically.

I like my system to startup fast because sometimes I may just want to type some documents or playing games without using other tools. Thus, shortcuts at the desktop are good enough for me as I can choose to launch any programs after startup.

After a fresh installation, the startup tab is normally blank. Hence, you are safe to untick all the programs listed. If you find that your system is not working properly after that, you can always run the system configuration and tick all the startup programs.

Windows Defender

This is a free spyware tool from Microsoft itself. Other than that, it is also a startup manager. Browse through the tools option, and there is a Software Explorer link. It works like a combination of startup manager and task manager. You can view currently running programs, network connected programs, winsock service providers and startup programs. You can choose to remove, disable or enable the programs listed.

However, Windows Defender is available for Windows XP and Vista only.

CCleaner

As time goes by, your copy of Windows may work slower and slower. This is because of the amount of software and games that you have installed in your computer but are not removed properly during uninstallation. During an of software or game, not only the files are installed in the specified folders; several records are also added into Windows registry. Unfortunately, not all the records in the registry are always removed during uninstallation.

"The Windows registry is a directory which stores settings and options for the operating system for Microsoft Windows 32-bit versions, 64-bit versions and Windows Mobile. It contains information and settings for all the hardware, operating system software, most non-operating system software, users, preferences of the PC, etc. Whenever a user makes changes to Control Panel settings, file associations, system policies, or most installed software, the changes are reflected and stored in the registry." - Wikipedia

CCleaner is a piece of freeware which can be used to check any broken links from the registry and thus, offers the option to remove the invalid registry entries. A lot of people are saying that it is dangerous to change registry settings. Indeed, it is dangerous. But I have been using this piece of freeware for quite sometime and I have not encountered any serious problems with it. However, I do notice some improvement in my system speed especially during startup.

As I am using Vista at the moment, I reckon that the software does not work quite well with Vista because some of the options a greyed out. System Mechanic of IOLO Technologies is a piece of software that done a better job than CCleaner. Well, of course because it is not free. If you manage to get hold of a copy of System Mechanic, you will be surprised how it performed and all the functions it has.

Advance System Properties

If you like the fancy appearance of your Windows right now, you may choose not to change any of the settings here. But there are a few options which you might want to disable and it does not affect the overall appearance of your Windows. To go to the Advance System Properties, right click My Computer and click on properties. For Windows XP, click on the Advance tab while Windows Vista users need to click on the Advance System Properties link at the left column.

In the advance tab, there are three frames, Performance, User Profiles and Startup and Recovery. Click on the Settings button in the Performance frame and you will be shown the Visual Effects tab. To choose for the best performance will untick all the options below and mostly likely, you will get better speed when navigating through Windows. However, if you prefer to have the fancy appearance, you may want to just untick the options for fading and sliding or untick everything except the bottom two options to keep the option of having drop shadow for icon labels and visual styles for windows and buttons.

Files in Desktop and User Account

The size of you user account has some effect on the speed of your computer during startup. You can view your user account size from the User Profiles frame mentioned above. Click on the Settings button in the User Profiles frame and you will see a list of users and the size of each of the users.

My own practice is to avoid storing files such as documents and pictures in my user account folders. Even though the user account has come pre-created with different folders for different types of documents such as the musics, pictures, bookmark favorites, documents and saved games, but I have dealt with problems that resulted from corrupted user profiles and the only way to recover the files is to connect the hard drive to another working machine. Well, that is way too troublesome for some people. In addition, some viruses attack through user profiles. Desktop files are stored in User Profiles. The more icons and files stored in the desktop, the slower startup you get. Thus, it will be wise to store the files to another drive or partition which will secure your files and also speed up your system slightly.

Disk Cleanup

Using Disk Cleanup will help you to clean your Internet Temporary Files, Downloaded Program Files, setup Files and compress files. This is another step to clean up your system and it may not help to speed up your system. Well, at least that you know a place to find the files that can be deleted safely. By the way, having enough of free disk space is equally important for your computer to run smoothly.

How To Protect Your Computer From Viruses


Anti-virus software is a necessity today to ensure the security of your computer and personal information. It is essential that you understand how viruses get into your computer and know how to prevent them from getting in.
Unfortunately for us, there are many people out there who get a rise out of writing small programs that find ways onto our computers and in most cases destroy personal file, data or steal out identity. This article explains some steps we can take to defend ourselves.

What is a computer virus?

A computer virus is a small program that piggybacks on legitimate programs. It is called a virus because it shares the traits of a biological virus where is passes from one computer to another in the same manner a biological virus passes from one person to another person. Once a computer virus is running, it can infect other programs and documents.

Types of computer viruses:

There are many types of viruses but the most common are:

- Viruses: a small software program that attaches itself to other programs and/or documents
- E-mail viruses: these viruses move around through email and usually replicates itself by automatically mailing itself to people in the victim's address book
- Trojan horses: this is a computer program that claims to do one thing but instead does another such as erase your hard drive
- Worms: this is a program that finds a small hole in computer network security and replicates itself on to other computers on that network.

How does a virus get into our computer and how do they spread?

Some of the most common ways a virus can get on your computer are:

- Downloading a program from an unknown source and running it
- Opening a file attachment from an e-mail
- Sharing infected files from one computer to another on a floppy disk
- Opening an electronic greeting card, audio and video files

What are the signs of a virus, am I infected?

- Your computer runs slower than normal
- The computer stops or locks up
- Your computer crashes and restart every few minutes
- The computer restarts on its own and does not run properly
- Applications on your computer do not run properly
- Hard drives or disk are not accessible
- Your computer cannot print properly
- Unusual error messages appear
- Menus and dialog boxes are distorted

What kinds of damage can a virus do?

The damage a computer virus can do depends on the type of virus it is. Here are some common threats.

- They can delete or change files. Some viruses will delete all your files or even reformat your hard drive making your computer unusable
- Other viruses will steal personal information like credit card numbers, account numbers and passwords
- Some viruses will slow down your computer dramatically
- Some viruses change security settings allowing hackers to gain access to your computer and steal information
- Other viruses like worms infect computers on a network

What you can do to protect your computer from viruses?

There are number of ways to protect your computer from a virus:
- Do not open any attachments your received in an e-mail even if you know the person who sent it. That person may not be aware they are sending an infected files.
- If you receive an e-mail with an attachment from some one your do not know, DELETE the e-mail right away.
- Before you copy a file to your computer, scan it with an anti-virus program
- If you download a file from the Internet, copy it to your hard drive first, scan it with an anti-virus program before to open the file or run it.
- if some sends you a greeting card or a joke that you have to launch to view, be awry and stay on the safe side and do not open it
- The best defense against computer viruses and to use an anti-virus program that will scan your e-mail, act as a firewall, hard drive and keep up-to-date with the latest viruses. It is reported that there are over 500 new viruses discovered each month.

Fortunately for us, there are a number of software programs available to prevent, detect and kill computer viruses. I recommend the one below, I use it and it is one of the most popular anti-virus programs around.

How to Hack



Hacking can be difficult and there are many different ways to hack and many different exploits to use. Hacking is neither defined nor limited by exploitation or exploration. Hacking into someone else's system may be illegal, so don't do it unless you are sure you have permission from the owner of the system you are trying to hack.

Hacking was primarily used for learning new things about systems and computing in general, 'in the good ol' days'. In recent years it has taken dark connotations and in general has been looked down upon. Likewise, many corporations now employ "hackers" to test the strengths and weaknesses of their own systems. These hackers know when to stop, and it is the positive trust they have built that earn them large salaries.

There is a major difference between a hacker and a cracker. A cracker is motivated by malicious reasons; a hacker is attempting to gain knowledge through exploration.



Steps

Learn a programming language. C++ is very useful, although difficult to learn. Python is much easier to learn, although less flexible. In order to break into web systems, learning server side languages such as PHP will help you immensely. Perl is also a very useful language to learn, as it can be used in many situations, and once you are familiar with the syntax (which is similar to that of C), you will be able to create perl scripts very quickly.
Use Cygwin for Windows or *nix. Plain Windows and DOS are more difficult to work with. The tools in this article can be found for Windows based machines. Nmap particularly, uses WinPCap to run on Windows and does not require Cygwin. However, Nmap works poorly on Windows systems due to the lack of raw sockets. You should also consider using unix or linux, which are both more flexible, more reliable, and more secure. Most linux distributions come with many useful tools preinstalled, including the previously mentioned nmap.

Know your target, the process of gathering information about your target is known as 'enumeration'. Can you reach the remote system? You can use the ping utility (which is included in most operating systems) to see if the target is 'alive', however, you can not always trust the results of the ping utility, as it relies on the ICMP protocol, which can be easily shut off by paranoid system administrators.
Determine the OS (operating system). This is important because how can you gain access to a system if you don't know what the system is? This step involves running a scan of the ports. Try pOf, or nmap from www.insecure.org. nmap runs a port scan, showing you the ports that are open on the machine, the OS, and can even tell you what type of firewall or router they are using so you can plan a course of action. You can activate OS detection in nmap by using the -O switch.
Find some path or open port in the system. Common ports such as FTP (21) and HTTP (80) are often well protected, and possibly only vulnerable to exploits yet to be discovered. Try other TCP and UDP ports that may have been forgotten, such as Telnet and various UDP ports left open for LAN gaming. An open port 22 is usually evidence of an SSH (secure shell) service running on the target, which can sometimes be bruteforced.

Crack the password. There are several methods for cracking a password, including brute force. Using brute force on a password is an effort to try every possible password contained within a pre-defined dictionary of brute force software. Rarely is a password cracked through brute force, because using a password that is a word in any language is poor security practice. Users are often discouraged from using such 'weak' password.
Get super user (su) privileges (if targeting a *nix machine). Most information that will be of vital interest is protected and you need a certain level of authentication to get it. To see all the files on a computer you need super user privileges. This is a user account that is given the same privileges as the "root" user in Linux and BSD operating systems. For routers this is the "admin" account by default (unless it has been changed), for Windows, this is the Administrator account, etc. Just because you have gained access doesn't mean you can access everything, only a super user, the administrator account, or the root account can do this.
Use various tricks. Often to gain super user status you have use tactics such as creating a "buffer overflow" which is basically causing the memory to dump and allowing you to inject a code or perform a task at a higher level then you're normally authorized. Only writing or finding an insecure program that you can execute on their machine will allow you to do this.



Tips

Read books discussing TCP/IP networking.
This article discusses what is known in the hacking world as "cracking". Hackers are those that built the internet, made Linux, and work on open source software. It is advisable to look into hacking, as it is respected and less likely to get you arrested.
Using these tactics on a popular corporate or government computer is asking for trouble unless you're a professional hacker. Keep in mind there are people a bit more knowledgeable than you who are protecting these systems for a living. Once found, they sometimes monitor intruders to let them incriminate themselves first before legal action is taken. This means you might think you have free access after hacking into a system, when in fact, you're being watched, and may be stopped at any moment.



Warnings

Misuse of this information may be a local and/or federal crime. This article is intended to be informational and should only be used for ethical purposes.
Do not delete entire logfiles, instead, just remove the incriminating entries from the file. What do you think would look more suspicious; logs with a few entries missing, or the entire log file destroyed?
Be extremely careful if you think you have found a very easy crack or a crude mistake in security management. An experienced hacker that protects that system maybe have just set up a trap (honeypot) for you.
Stay away from breaking into government networks. If you do find a vulnerability in such a network, the best plan of action is to inform the system administrator, and perhaps help them in patching the vulnerability.



Things You'll Need

A computer with a connection to the internet.
A proxy is always a good idea.

Patience.

How Search Engines Work

In order to assess how search engines work from the viewpoint of how they rank sites we need to examine three areas, how they find pages, what they look for on a page and how they compare different pages against a users search criteria.

Search engines find pages in one of two methods. They generally have an ADDURL link on the home or Help page which allows users to submit either a web page or their siteSome engines ask you to just submit the domain ie. http://www.yourdomain.com/ while others allow individual page submissions. Always read the submission guidelines before submitting as doing it wrong may get a site banned.

Once a page has been submitted, the search engine uses a software SPIDER to look at the site. This program extracts different pieces of information from the site such as MetaTags content, the text on each page, text contained in comment tags, image alt tags and form tags. Each search engine looks for the information they require and each is different. They also look at links on each page and may add those links to their database for spidering at a later date. Spiders prefer text links rather than image maps and redirected links such as those used in redirection scripts. Any links with variable identifiers such as ? will not be followed as these could lead the spider into infinite loops within the site, or to hundreds of different versions of the same page.

The search engine spider examines the code on the page and extracts text from the programming code. The text is then examined to assess the theme of the page. They look at which words appear regulary throughout the page. Words appearing in Metatags, link anchor text and emphasised text such a bold or italic words on the page. These give the engine an indication of the overall theme of the page so that a search for 'cars' will bring back lots of pages with cars appearing in them.

After matching the users search query with those pages in the search engine database, it has to decide which pages are most likely to be of use to the surfer. Each search engine has it's own ALGORITHM or mathematical calculation which gives more importance to words appearing for instance in Metatags than words on the page. Each engine is looking for what they believe is the best match for the user. By grading each page according to their algorithm the engine is able to decide that page A is a closer match than page B for this user.

Engines also look at off-page criteria such as the number of links pointing to a site and whether those linking pages are also relevant to the search. Other factors include the age of the page and whether it is listed in edited directories such as Yahoo and Looksmart.

In order to achieve top ranking pages it is necessary to reverse engineer the algorithm used by each engine by examining top ranking pages in popular searches. So by looking at the top 20 sites for a phrase such as 'LOANS' a pattern will emerge which may give an indication about the different factors that search engine is looking for. Factors such as the number of words on the page (word count). How frequently the keyword appears on the page (keyword density) and how near the start of the page the keyword appears (keyword prominance). By examining more searches and more pages the pattern of results will become clearer.

Unfortunately, some sites are able to hide the real code used by delivering different pages to search engine spiders than the normal user. They achieve this by examining the IP address and User agent of the visitor before serving an appropriate page. A high ranking page may also be swapped for a differently coded page as soon as it appears at the top of the search result by switching the page. Therefore be careful that the page you look at is in fact the same page that got the top position. You will often be able to spot this because the description on the search engine may appear different to that on the page.

Pages which contain little text because of the use of images or flash animation are unlikely to do well on search engines as they give the spider little to read and therefore little to assess what the page is about. Search engines cannot read text contained within an image or animation, Similarily they struggle as words become more deeply buried within lots of tables. Your web site designers may have created a fabulous looking site, but is it search engine friendly?

Text is king for the search engines. Anything which gets in the way of descriptive text about your products will affect the position achievable on the engines. A search engine friendly site consists of plain text with the targeted phrases repeated throughout the page. However, compromise is always necessary in the design. Some techniques though demolish any chance of a top ranking site and the sales this would produce.

It is often worth considering creating a text only version of the site to run alongside the main site so that search engines have a chance of picking up the site content. This should be designed as if for a text only browser such as Linx. Try viewing a page from your site at http://www.delorie.com/web/ses.cgi to see how it looks to a search engine, you may be surprised.


Handle Ever-Heavier Data Loads


As demand for streaming video over the Web, voice over Internet protocol (VoIP) calling services and other forms of Internet-based multimedia communication skyrockets, content creators and consumers are counting on fiber-optic networks to handle these increasing loads quickly and efficiently. One way to ensure this happens is to enhance the ability of such networks, which transmit data over glass or plastic threads, to capture and retain data even for very brief intervals.

Toward that end, a team of researchers from Duke University and University of Rochester's Institute of Optics recently reported in Science that it successfully transferred encoded information from a laser beam to sound waves and back to light waves, a breakthrough that could speed development of faster optical communication networks. Swapping data between optics and acoustics allows it to be stored in pockets of acoustic vibration created when laser beams interact along a short strand of optical fiber.

The research is significant, because it addresses how memory can be created for optical pulses. "The primary thrust is investigating slow light via stimulated Brillouin scattering, where we slow down a pulse as it propagates through an optical fiber," says study co-author Daniel Gauthier, chairman of Duke's department of physics. Brillouin scattering occurs when light traveling through a medium, such as glass, changes its path as it encounters varying densities.

The main goal of the research is to pave the way for better fiber-optic communication systems, which today consist of fiber placed underground and linked by routers. The typical way to send data over an optical network is to break it up into chunks called packets. When a packet comes into a router, its address information is read. The problem with routers is that they each contain a single switch that can only process one packet at a time. As a result, some packets are dropped unless others coming in are buffered (saved) or can wait until it is their turn to be routed. "If you drop the packet, you reduce the throughput of the entire network," Gauthier says. "If you buffer, then the packets are processed one after the other."

As greater demands are placed on telecommunication infrastructures, "it's important to start to investigate parallel technologies," he adds.

Gauthier and his colleagues discovered that when two laser beams of slightly different frequencies are pointed at one another along a piece of glass fiber, they create acoustic vibrations called phonons. When co-author Zhaoming Zhu, Gauthier's postdoctoral research associate, encoded information onto one of these beams, the data could be imprinted on these newly created phonons and retained for 12 billionths of a second, long enough to be transferred back to light again by shining a third laser through the fiber.

"When thinking about how to store light in optical fibers," Zhu says, "we realized that we can convert optical information to acoustic vibration, something that hasn't been done before."

The researchers are seeking ways to create longer storage times and reduce the peak power of the laser beam needed for retaining and reading out the information, a process that will take years before a commercial version of the technology is available.

"There is still a great need for developing new strategies for optimizing the flow of information over the Internet," says Robert Boyd, a professor of optics and physics at the Institute of Optics and a research co-author. "If two data packets arrive at a switch at the same time, you need to store one until the other packet clears the switch, maybe 100 nanoseconds later. Our technique is aimed at … building buffers for high-speed telecommunications."



During the first phase of the project—which is part of the Defense Advanced Research Projects Agency's (DARPA) Defense Sciences Office slow-light program—Zhu says he learned that pulses could be stored and read out at a later time. The second phase was the actual experiment in which data pulses were stored (as acoustic waves in an optical fiber) and retrieved after a certain period of time.

"We really want to demonstrate that methods for storing optical information are much broader than people thought," Gauthier says. "In the current telecommunication systems, you turn the optical signal into an electronic signal and store it in RAM. The optical data pulses are then regenerated by using the electrical signals to turn on and off an auxiliary laser source. But this process generates heat. The faster this is done, the more heat is generated."

For this to work in the real world, the scientists say the communication fibers must be made of a material that provides an acoustic time frame long enough to allow the information to move from optical to sound, then return to optical. One option, Gauthier says, is to work with a new type of glass made from a chalcogenide, which has good semiconductor properties and contains one or more elements from the periodic table's chalcogenide group, also known as the "oxygen family," which includes oxygen, sulfur, selenium and tellurium.


Another option that researchers are exploring is to run the laser beams through a hollow optical fiber filled with gas (such as xenon), which would allow them to use a less powerful laser to induce longer lasting sound waves in the gas. This could potentially create a sound wave 50 times longer and allow the lasers used to be 100 times less powerful—and less energy intensive—thereby delivering more data more quickly at a lower cost.

-By Larry Greenemeier

How to Hack Windows


If you ever needed information on hacking Windows, then here you go. However, keep in mind that this is for learning purposes only.

Steps

When the computer starts up, hold down F8 before you see the "Windows Starting" screen. This will bring you to a screen with choices. Your best bet will be "Safe Mode with Command Prompt". You can then do as you wish.
Dialog will appear: you're going to want to go down to the bottom and select "All Files". Then you are going to name the file: Batch.bat. After that, go to where you saved it, and open it. That will open up Command Prompt.
However, if the computer has notepad blocked, you can easily go to any web page and then go to "View>View Source". That will easily open up Notepad.
After that, you will be able to do as you wish inside command prompt. Here is how to add or delete accounts:
Add Account: C:>net user USERNAME /add
Change Accounts password: C:>net user USERNAME * then you'll be able to enter a new password for the account. If you just press enter without typing anything, the account password will be reset.
Delete Account: C:>net localgroup Administrators# # another way is to open up notepad, (if its not blocked), and type in "command.com". Then goto File->Save As. A USERNAME /ADD


Tips

Don't be dumb and mess up someone else's computer. Only do anything like this if you need access to the root of Windows. It was written for learning only. Also, don't try anything unless you know something about DOS.
Its much more fun to use the Emergency Boot CD... check it out.



Warnings

Doing this stuff on a computer other than yours is illegal, so don't do it on someone else's, unless you have been given the permission to do so.

Don't even think about trying this at school. Really, that's just stupid. Not to mention it's not cool to get expelled because you pulled a dumb hacker stunt.

How to Hack Web Shield at School


Steps

# Ok this is the first way there is to hacking the net
First go into notepad and type in command.com then save it as batch.bat and save it to wherever just as long as u know where it is
Now go into it, It will be called batch
Now that you have done that it’s time to visit whatever site you want. Now, there are many of ways to bypass poorly constructed websites. This one, as far as I know, will never be stopped.

In your command prompt (batch), type

ping wikihow.com
Or anything else you want to visit. Now you should have a load of stuff and info, such as delay times and, most importantly, an IP address for the website. All you need to do is type this IP address into the address bar, after the http://, and there you go, you have by passed the wed shield.



Warnings


This way is easy to trace so delete history ppl

How to Hack Computer Passwords


Here are 2 ways to change passwords on a Windows XP computer if you have forgot or don't know the password.

Steps

Know that if you are still logged on to the Administrator account you can change user profiles using the following steps:
,
Go to the green "Start Button" and click "Run" then in the text box type "cmd" without the quotes.
Type net user then press enter
Then again type "Net user Compaq_owner" then press Enter
To change password press enter 2 times
Reset password to what ever you want.

Now if you are Logged out of the computer and cannot figure out the password at the start up screen, do the following:

Restart the computer and toggle the F5 button.
You will get screen that will ask you if you want to boot with command prompt (that is one way) or boot in safe mode without command prompt.

Notice that the computer will boot in safe mode in a small window and you will see a menu that asks which account you want to access. We know that the other accounts you can't get into but there will be a new account called computer administrator.
Click computer administrator and go to settings/control panel/user accounts.
Remove password.
Print out this page and have on hand for reference if you forget the steps.



Tips
To practice bypassing passwords for speed make a password you know and restart the computer and get the timing right for the boot F5 menu.
Speed, Speed, Speed the faster you can do these simple steps and get in and out the better.
Don't tell people that you can get in their computer, just get in and leave them some goodies of some kind. Be creative and have fun.

Press Ctrl-Alt-Del twice at the login menu to pull up NT style login to bypass the process of booting to a "Safe Mode".

How to Get Rid of Junk Mail


Is your mailbox running over, full of stuff you don't want? Junk mail wastes tremendous amounts of paper. It also piles up on your table, wastes your time, and competes for your attention. With a small investment of time, you can stop the flow at its source. Here's how.

Steps

Write to the mail preference service (US) or the Mailing preference service (UK). These do-not-mail lists are maintained by the major marketing associations that maintain and distribute the major mailing lists, but they do work. The US mail preference service will charge you one dollar ($1) to add your name to their opt-out list.

Get rid of credit card solicitations in the US, by phoning 1-888-5 OPT OUT (or 1-888-567-8688). It is an automated number. Listen to the options carefully. It's well worth calling -- the opt-out is good for 5 years, or you can request to be permanently removed from their lists. This one phone call tells all four major credit reporting agencies to stop sending credit card offers. You can also make the request (5-year and permanent) using their online form.

Call your credit card companies and ask them to stop sending you cash advance checks. Even if they come (conveniently) with your bill each month, cash advances usually start accruing interest immediately, so it's not a good idea to use them. If you do receive them and don't plan to use them, you should destroy them.

Call individual catalog companies and ask them to remove you from their mailing lists. Sometimes it will be the same toll-free number that you would call to make an order; sometimes it will be a separate "customer service" number. Look around on the back cover and the order form. Occasionally, the customer service people will ask why you want to be removed. Simply explain that you are not interested in the products offered. Do have the catalog, or at least the mailing label from it handy when you call. Often they will request a tracking number or other code printed there.

Go after individual senders. Some items are sent in such bulk that they go to every resident on a postal route. These are addressed to "Resident," "Our Friends At," or some variant. Your postal carrier cannot, by law, determine what you consider "junk mail". All "resident" mail must be delivered as addressed. You must contact individual mailers to have your address removed from their database. Look around on mailers for return addresses and phone numbers. Here are quick links to some common ones.

America Online: phone 1-800-605-4297.

ADVO (responsible for the blobs of sales circulars and the little card with the missing children): Follow the link.
Val-Pak coupons: follow the link.

Publisher's Clearinghouse: phone 1-800-645-9242 or email mailto:service@pchmail.com with your full address and instructions to remove from mailing list.

American Family Sweepstakes: phone 1-800-237-2400.

Pennysaver or Potpurri: phone 1-800-422-4116 and leave a detailed message with the full address, including ZIP code, as it appears on the mailer.
Stop all mail not addressed to you:
If you are getting first class mail for a former resident, you can write Return to Sender/Not at this address on the envelope and drop that envelope right in the mail box.

If you are getting bulk mail for a former resident, you may have to follow the above steps.

Place a sign by your mailbox that reads "No Free Papers":
Free Papers are another form of junk mail that often plagues our front lawns. Many of the people who deliver free papers will simply stop once the resident has placed a sign near their mailbox that that reads "No Free Papers".


Tips
It's a good idea to perform the first two steps even if you don't do the rest. They will stop the greatest amount of mail with the smallest investment of time. Besides, having credit card offers sitting in your mailbox invites identity theft. If you do decide someday to apply for a credit card, they're not hard to find even without the junk mail.

Avoid placing your address on surveys, raffles, and product warranty cards. If you do write your address or phone number, write alongside it something like, "Please do not sell or distribute my information, nor add to mailing lists."
When filling out forms online, read privacy policies and watch for opt-out boxes.

Mail-order businesses, especially printing houses that print checks, return address labels, and other stationery, often send other mail and sell the addresses of their customers. If you order from one of these places, clearly state your preference.
If you're curious about how junk mail spreads, intentionally misspell a name on a survey form or something of that nature. You'll get more junk mail, not less, but it's a simple experiment to see who's sharing your information. Keep a record of which misspelling you have given to which company, lest you forget.

It's generally not necessary to send in warranty cards or "register" a warranty for the warranty to be valid, regardless of what the card may imply.
If you do receive junk mail, do one of two things about it. Recycle it immediately, or call or write somebody about getting off the list.
Keep a recycling bin or trash can by your mailbox or wherever you sort mail.
Recognize that most companies sending direct mail are happy to take disinterested people off their lists. It costs them money to send you a thick, shiny catalog.

You may be told that it could take a couple of mailing cycles for mail to stop coming. This is a standard disclaimer you should take at face value.
If you are too busy to do the above steps yourself, you can take a shortcut by hiring a service to do them for you. A service like greendimes.com will remove your name and others in your household from direct mail lists, unsolicited credit card offers, as well as the catalogs that you selectively choose to unsubscribe from. They will revisit the direct mailers to keep you off the lists and plant a tree for you every month. The cost of a Green Dimes membership is a dime a day or $36/year.

Request your name be eliminated from the county tax database. Many companies target specific areas based on neighborhood subdivisions or home values. By making your information confidential in the county and state databases you may eliminate quite a bit of junk mail.



Warnings
You shouldn't have to spend money to get rid of junk mail. The junk mail removal kits you may see for sale generally don't offer anything you can't do on your own.

Sending junk mail back in the reply envelope may feel good, but it is not a particularly effective way to get off mailing lists. It is better simply to request to be removed.

Don't be rude to the person who answers the phone, even if you're mad about receiving something. He or she is paid to answer the phone (and is generally paid very little). This person is not personally responsible for your receiving it. But do, if necessary, be persistent, in addition to being kind.

Any offer that looks too good to be true, probably is. If something seems fishy, read the fine print, research it carefully, or simply pass it by. You may not really have won a million dollars, even if the magazine ordering materials make it seem as though you have.
Always make sure the mail "is" junk.

Customize Multiboot Startup Options in Windows


Edit or create a startup menu that lets you choose which operating system to boot into in multiboot systems, or create a menu that lets you choose different startup options for your single operating system if you have only XP installed.

If you've installed another operating system (in addition to XP) on your system, your PC starts up with a multiboot menu, which allows you to choose which operating system you want to run. The menu stays live for 30 seconds, and a screen countdown tells you how long you have to make a choice from the menu. After the 30 seconds elapse, it boots into your default operating system, which is generally the last operating system you installed.

You can customize that multiboot menu and how your PC starts by editing the boot.ini file, a hidden system file, to control a variety of startup options, including how long to display the menu, which operating system should be the default, whether to use the XP splash screen when XP starts, and similar features. And as you'll see later in this hack, you can also use the file to create a startup menu that will allow you to choose from different versions of your operating system—for example, one that you'll use for tracking down startup problems, and another for starting in Safe Mode.

The boot.ini file is a plain text file found in your root C:\ folder. You might not be able to see it, because it's a system file, and if you can see it, you might not be able to edit it, because it's a read-only file. To make it visible, launch Windows Explorer, choose View > Tools > Folder Options > View and select the radio button "Show Hidden Files and Folders." To make it a file you can edit, right-click on it in Windows Explorer, choose Properties, uncheck the Read-Only box, and click OK.

Editing Files :
To edit the file, open it with a text editor such as Notepad. Following is a typical boot.ini file for a PC that has two operating systems installed on it—Windows XP Home Edition and Windows 2000 Proffessional:

[boot loader]
timeout=30
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home
Edition" /fastdetect
multi(0)disk(0)rdisk(0)partition(2)\WINNT="Windows 2000 Professional" /

Fastdetect :
As you can see, there are two sections in the file: [boot loader] and [operating systems]. To customize your menu and startup options, edit the entries in each section. Before editing boot.ini, make a copy of it and save it under a different name (such as boot.ini.old), so that you can revert to it if you cause problems when you edit the file.

Following are details about how to edit the entries in each section:
[boot loader]
This section controls how the boot process works; it specifies the default operating system and how long a user has to make a selection from a boot menu, if a boot menu has been enabled. The timeout value specifies, in seconds, how long to display the menu and wait for a selection before loading the default operating system. If you want a delay of 15 seconds, for example, enter 15 for the value. Use a value of 0 if you want the default operating system to boot immediately. If you want the menu to be displayed indefinitely and stay onscreen until a selection is made, use a value of -1. The default value specifies which entry in the [operating system] section is the default operating system. (The default value is used even if there is only one operating system in the [operating system] section.) To change the default operating system, edit the setting, in our example, to
default=multi(0)disk(0)rdisk(0)partition(2)\WINNT

So, in our example, if you change the menu settings so that the screen appears for 10 seconds before loading the default operating system, and the default operating system is Windows 2000 Professional, the section reads:
[boot loader]
timeout=10
default=multi(0)disk(0)rdisk(0)partition(2)\WINNT
[operating system]

This section specifies which operating systems are present on the computer, and detailed options for each one. XP uses the Advanced RISC Computing (ARC) path to specify the location of the boot partition. In our example, the ARC path is:
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS

The first parameter, which identifies the disk controller, should be 0. The second parameter, the disk parameter, should also be 0. The rdisk parameter specifies the disk number on the controller that has the boot partition. The numbers start at 0. So, if you have three hard disks installed and the second hard disk has the boot partition, the setting is rdisk(1). The partition parameter identifies the partition number of the boot partition. Partitions start with the number 1. The final section, which in our example is \WINDOWS, specifies the path to the folder where the operating system is installed.
To the right of the ARC path in the example is ="Microsoft Windows XP Home Edition" /fastdetect. The words within quotes are what will appear on the boot menu next to the entry. To customize the text on the menu you can change these words to whatever you wish—for example, "My Favorite Operating System." The /fastdetect switch disables the detection of serial and parallel devices, which allows for faster booting.

Why Does The Cursor Freezes Up On The Computer


The answer is pretty simple. All computer crashing and hanging problems occur because of similar reasons.

Not just the cursor but also windows, programs and everything can crash if your computer is not up to date. Or has a lot of junk files, downloads, pictures and useless information. Or you do not do any computer maintenance. (It does not refer to cleaning your keyboard).

Steps to take now:

Clean the Junk from your computer by following:

Removing temporary internet files using Disk cleanup.

Removing unwanted (you do not use) folders, files, shortcuts, software, games, programs, icons, images, videos, downloads and all you can find on your computer that is useless. However delete only things you that you know they are safe to be removed.

That should not only fix the cursor that hangs but also improve your computer performance. Cleaning your computer, maintaining it in good shape will ensure it never crashes and works at its best.

Your cursor freezes when the computer has problems. If problems occur often it is because your computer is not at its best performance.

In rare cases it can be a spyware/adware or some critical objects. So you need to scan your computer with an anti adware and spyware software and also with an antivirus software.

Temporary Solution

1) Click Start, then Click Control Panel

2) Double Click Mouse

3) Enable the cursor trail

You will be able to see your mouse, even after the original cursor freezes on screen.

Steps that can fix the problem.

This may also solve your problem. ONLY do if you are sure that you know how.

1) Right Click on MyComputer icon. Then Click Properties.

2) Click on Hardware Tab, then Click on Device Manager.

3) Uninstall your mouse AND keyboard. Connect your mouse directly to the USB.

Then reboot your computer (restart) and let the mouse reinstall automatically.

Keep your computer in shape and you will have less problems.

Alternative ways to control your computer


Mac OS X allows you to control your computer in different ways. If you have difficulty using your computer, or want to work in a different way, you can try some of the following:
To select menus, icons, windows, and toolbars using your keyboard, turn on Full Keyboard Access in Keyboard & Mouse preferences.
To speed up or slow down the response time of the keyboard or mouse, set preferences in Keyboard & Mouse preferences.
To press groups of keys as a sequence instead of all at once, turn on Sticky Keys in the Keyboard pane of Universal Access preferences.
To move the pointer using a numeric keypad, turn on Mouse Keys in Keyboard & Mouse preferences.
To use special equipment to control your computer, select "Enable access for assistive devices" in Universal Access preferences.
To control your computer using spoken commands, turn on Speakable Items in Speech preferences.
About Universal Access features


If you are person with a disability or have difficulty seeing, hearing, or controlling your computer, you can use Universal Access preferences to set custom preferences that may make your computer easier to use. Some things you can change include the following:
Switch the screen to black and white, and other contrast enhancements.
Choose to make the screen flash when an alert sound occurs.
Zoom in on the screen image to make it appear larger.
Make the computer read aloud the text on the screen when you move the pointer over an item in the Finder, Dock, or application toolbar.
Make the mouse functions available through the keyboard.
Turn on Sticky Keys or Slow Keys to help you control the keyboard.
Turn on Mouse Keys to control the pointer using your numeric keypad.


In addition, you'll find settings in the Displays, Sound, General, and Speech panes of System Preferences that may help you use your computer.
Enhancing screen contrast


If you have difficulty seeing objects on your computer screen, you can choose different screen contrasts to make the screen easier to view. Choose a screen contrast effect in the Universal Access pane of System Preferences.
Choose Apple menu > System Preferences

Click Universal Access






      Then click Seeing.


To remove colors from the screen, click "Set Display to Grayscale."
To make the computer screen appear as a photonegative (with white text on a black background), click "Switch to White on Black."
Drag the "Enhance contrast" slider to the right to increase the contrast.
Changing alert sounds into screen flashes


If you have trouble hearing your computer's alert sounds, or if you want to use your computer with the sound muted, you can make your computer screen flash instead of hearing a sound when an alert appears.
Choose Apple menu > System Preferences and click Universal Access.


Then click Hearing.

   2.    Select the checkbox labeled "Flash the screen when an alert sound occurs."

To raise or lower your computer's volume, click Adjust Volume and drag the "Output volume" slider.
Making the screen image appear larger


If you have difficulty seeing or reading objects on your screen, you can make items on your screen appear larger by setting zoom options in the Universal Access pane of System Preferences.

To turn on zoom and set zoom options:
Choose Apple menu > System Preferences and click Universal Access. Then click Seeing.


Click Turn On Zoom.




To make the screen image appear larger (zoom in), press Command-Option-+. To make it appear smaller (zoom out), press Command-Option-"-". You can change these shortcut keys in the Keyboard Shortcuts pane of Keyboard & Mouse preferences.



Setting zoom options for viewing your computer screen


You can make the image on your computer screen larger so that objects on the screen are easier to see and read by turning on zoom in Universal Access preferences. Once you turn on zoom, you can set preferences for how you want zoom to work.
In Universal Access preferences, click Seeing and make sure zoom is turned on. (The button at the top of the pane should say Turn Off Zoom.) Then click "Zoom options." A dialog opens.


Drag the Maximum Zoom and Minimum Zoom sliders to set the maximum and minimum magnification that you would like to use when zooming in and out rapidly.
To make a rectangle appear on the screen to indicate the center point of the zoom, select "Show preview rectangle when zoomed out." You can choose the area to zoom in on by dragging to move the rectangle.
Select "Smooth images" to make the zoomed screen images appear smooth.
When you move the pointer around the screen, the zoomed screen image changes. To make the zoomed image shift continuously as you move the mouse, select "Continuously with the pointer." To prevent the zoomed image from moving until you move the pointer to one edge of the screen, select "Only when the pointer reaches an edge." To keep the center point of the screen near the pointer as you move it, select "So the pointer is at or near the center of the image."


To make the screen image appear larger (zoom in), press Command-Option-+. To make it appear smaller (zoom out), press Command-Option-hyphen (-). You can change these shortcut keys in the Keyboard Shortcuts pane of Keyboard & Mouse preferences.



Making the computer speak button and icon names

If you have trouble reading text on your computer screen, you can set up your computer to read aloud the text on the screen when you move the pointer over an item in the Finder, the Dock, or in application toolbars.
Choose Apple menu > System Preferences, and then click Universal Access.
Click Seeing.


Select the checkbox labeled "Enable access for assistive devices."
In the top left corner of the dialog box, click Show all, and then click Speech.


Click the Spoken User Interface button.


Select the checkbox labeled "Text under the mouse."




Changing the way your mouse responds

You can change how fast the onscreen pointer moves and how fast you have to click for the computer to recognize a double-click.
Choose Apple menu > System Preferences and click Keyboard & Mouse.


Click Mouse.


Drag the Tracking Speed slider to select how fast the pointer moves. Drag the Double-Click Speed slider to set how fast you have to double-click.


Double-click the words in the field below the slider to see if the setting is working the way you want it to.

Using the keyboard to perform actions

If you have difficulty using the mouse, you can use your keyboard to perform many of the same actions instead of using the mouse. By turning on Full Keyboard Access in Keyboard & Mouse preferences, you can use your keyboard to select menus; icons in the Finder, Dock, and application toolbars; and items in windows and dialogs.
Choose Apple menu > System Preferences and click Keyboard & Mouse.
Click Keyboard Shortcuts.



   3.    Select the checkbox labeled "Turn on full keyboard access."





Shortcuts for Mouse Keys

If Mouse Keys is on in Universal Access preferences, use these numeric keypad keys to move the mouse. If your computer doesn't have a numeric keypad, press the fn (function) key.

Action                                  Shortcut
Move up                                       8
Move down                               2
Move left                                       4
Move right                               6
Move diagonally                 1, 3, 7, and 9
Click the mouse button               5
Hold down the mouse button       0
Release the mouse button   Period (.)





Quickly turning Sticky Keys and Mouse Keys on or off

If you use the Sticky Keys and Mouse Keys features on your computer only some of the time, you can set them to be easily turned on or off using a keyboard shortcut. You must first enable the keyboard shortcuts that turn the features on and off.

To turn on the Sticky Keys and Mouse Keys keyboard shortcuts:
Choose Apple menu > System Preferences, and then click Universal Access.
To turn on the keyboard shortcut for Sticky Keys, click the Keyboard button, and then select the checkbox labeled "Press the Shift key five times to turn Sticky Keys on or off."


To enable the keyboard shortcut for Mouse Keys, click the Mouse button, and then select the checkbox labeled "Press the Option key five times to turn Mouse Keys on or off."


Once the keyboard shortcuts are enabled, you can turn Sticky Keys on or off by pressing the Shift key five times in a row. Turn Mouse Keys on or off by pressing the Option key five times in a row.

Characters repeat too fast or slow

If you hold down a character key briefly, the character begins to repeat. You can set how long you must hold down the key before the character starts repeating and how fast it repeats once it starts.
Choose Apple menu > System Preferences, and then click Keyboard & Mouse.
Click Keyboard.


Drag the Delay Until Repeat slider to set how long to delay before the character begins repeating.
Drag the Key Repeat Rate slider to set how fast characters repeat.


You can type in the text field to see how the settings work.

Making the keyboard respond more slowly when you press keys

If you have trouble getting your computer to respond properly when you strike keys on your keyboard, you can increase the length of time between when the key is struck and when the computer accepts the keystroke.

To set the keyboard acceptance delay:

   1.   Choose Apple menu > System Preferences and click Universal Access. Then click Keyboard.

   2.Select On next to Slow Keys in the bottom half of the pane.

   3. Drag the Acceptance Delay slider to set how long you want the acceptance delay to be.

   4. To hear a feedback sound each time the computer accepts a keystroke, select "Use click key sounds."

You can also set the delay between repeated keys in the Keyboard & Mouse preferences pane. Click Set Key Repeat Rate, and then drag the Key Repeat Rate slider and the Delay Until Repeat slider to adjust the keyboard repeat response rate.



Accessibility with Web Pages
Preventing fonts from being too small

If you are person who has difficulty seeing, you can prevent fonts in web pages from being too small.

1.Choose Preferences from the Safari menu and click Advanced.

2.Select the checkbox to never use fonts smaller than the selected size.

3.Choose a font size from the pop-up menu.

Some web pages may not look correct if you select this option. This setting does not affect the size of fonts in images.
Using full keyboard access shortcuts with Safari

You can use the standard full keyboard access shortcuts to access and select buttons and menus in Safari. If you choose, you can also use the keyboard to highlight links in web pages.

Full keyboard access may be useful if you are a person with a disability and have difficulty using a mouse.

To turn on full keyboard access, open System Preferences and click Keyboard & Mouse, then click Keyboard Shortcuts. Select the checkbox to turn on full keyboard access.



If you want to highlight links in web pages using the Tab key, choose Preferences from the Safari menu, then click Advanced. Select the option to highlight links using the Tab key.




If you turn on full keyboard access, Safari uses the standard shortcut keys to access menus and windows. Here are a few things to keep in mind:
Press the Tab key to highlight buttons and text boxes in the address bar, bookmarks and bookmark collections in the bookmarks bar and Bookmarks Library, and tabs in the tab bar. You can also highlight buttons in web pages.

Use the Up Arrow or Down Arrow keys to open menus for bookmark collections in the bookmarks bar and for the Back and Forward buttons in the address bar. You can also use the arrow keys to highlight items in these menus.
If you've chosen to highlight links using the Tab key, you can press Option-Tab to select items that are not links. This can be useful if a page has a large number of links.

Press the Space bar to select a highlighted button.

Press Return to open a highlighted link.

Half a Million Computers Infected With 'malware' in Just Seven Days


Internet analysts are warning surfers to be on their guard after a booby-trapped file outbreak
Experts are warning internet users to be on their guard after more than half a million computers were infected with a single piece of malicious software.

In just seven days more than 530,000 instances of a single booby-trapped file have been spotted by analysts at internet security company McAfee, leading them to claim it is the biggest outbreak for several years.

The program works by posing as an ordinary media download, piggybacking on the draw of movies such as the recent St Trinian's film or pop acts such as Girls Aloud. Instead of finding the video or song they are expecting, however, victims are fooled into infecting their computers with a secret program which then bombards them with adverts.

Toralv Dirro, a security strategist at McAfee's Avert Labs, said it was the most successful piece of malicious code in three years - but that things could have been much worse. "We're lucky that this is relatively benign," he said. "We're worried that other people might use the same system to seed a more damaging piece of malware - it may be a precedent that is used by somebody else."

The technique, known as a Trojan horse, is common, but the latest variant appears to have been more successful than many of its counterparts. This could be because it was first planted on huge filesharing networks such as eDonkey and Limewire, which are used by millions of people to share music, movies and video files.

"It's pretty much impossible for us to find out where it was injected into the system, or track it back to find out who is benefiting," admitted Dirro. "At the moment we have no idea who is responsible, and this is data we cannot easily get."

Filesharing sites are a regular haunt for the writers of malicious software, but have also been used by some media companies to catch illegal downloaders in the act.

Last year a US company, MediaDefender, was discovered to be deliberately seeding popular networks with poor-quality videos and decoy music files in an attempt to reduce the popularity of peer-to-peer systems. But Dirro said that there was no indication the latest outbreak was the result of such action. "Most likely it is somebody involved in the advertiser's affiliate program, and they make some small amount of money every time the software is installed," he said.

Computer is running slow/hangs/takes time to boot


This problem can be caused by any of the below possibilities.

1.HDD is short on availabel disk space

2.Many software programs have been installed/uninstalled leaving behind bad files and/or confusing the

3.software.

4.The Data maybe corrupted.

5.Computer(that is your processor) is overheating.

6.Bad Hardware.

Below are some my favorite steps for Microsoft Windows that should help speed up the computer or determine why the computer is running slow.

1.If you have a hard disk drive that is 2GB or smaller, ensure that there is at least 200MB of hard disk drive space free. If you have a hard drive larger than this size, verify that there is at least 500MB of free hard disk space. This available space allows the computer to have room for the swap file to increase in size as well as room for temporary files.

2.Run Scandisk or something equivalent to help ensure that there is nothing physically wrong with the computer hard disk drive.

3.Run Defrag to help ensure that data is arranged in the best possible order.

4.Remove or disable any TSRs or programs that automatically start each time the computer boots.

5.Verify that the device manager has no conflicts, but if conflicts are present, resolve them.

6.If you are using Microsoft Windows 95 or Windows 98 and do not plan on running any MS-DOS programs from MS-DOS, click Start / Run / type
command and press enter. In the MS-DOS window type cd\ to get to C:\> then type "ren autoexec.bat autoexec.ch" and "ren config.sys config.ch". This will rename your autoexec.bat and config.sys and help make sure memory is being optimized through Windows.

7.If you have Windows XP try deleting all files in the prefetch directory. These are prefetch files and can lower sytem resources if loading programs no longer being used. See our prefetch definition for additional information about prefetch.

8.Try running through the basic troubleshooting steps for your operating system. Make sure your computer nd processor is not overheating, excessive heat can cause a significant decrease in computer performance some processors will even lower the speed of the processor automatically to help compensate for the heat related issues.

9.Scan for viruses , yur pc might be infected

10.Finally, if none of the above solutions resolve your issues, it is recommended that you either   reinstall Windows or erase everything and then start over.

Computer Hackers Attack Root Servers of Internet


Hackers last night mounted the most significant attack since 2002 on the computers that direct traffic on the internet, it emerged today.

The hackers, believed to be from Asia, bombarded the 13 computers, or root servers, that serve as the internet's central address books.

But although the assault lasting several hours was the largest in the past five years, it had little effect on internet users.

"It was a significant and concerted attack, but the average internet user would have barely noticed," said Paul Levins, the vice-president of corporate affairs at the Internet Corporation for Assigned Names and Numbers (Icann), the body that oversees the running of the root servers and the net's addressing system.

"Ironically, the system gets stronger and better because of the attacks as we're constantly upgrading the technology," Mr Levins said.

Hackers periodically try to overwhelm the root servers with requests and information, which can slow down the network response.

The servers are distributed throughout the world and, much like an electricity grid system, can redirect their efforts to where demand is highest.

Root servers manage the internet's domain name system (DNS), used to translate web addresses such as guardian.co.uk into the numerical internet protocol (IP) addresses used by machines.

When a person types the name of a website into a web browser it looks up the location of that site by consulting a root server.

Two servers seemed to be the target of yesterday's attack, one operated by the US defence department and the other by Icann.

The US homeland security department confirmed it was monitoring what it called "anomalous" internet traffic.

"There is no credible intelligence to suggest an imminent threat to the homeland or our computing systems at this time," the department said in a statement.

The attacks began last night and lasted as long as 12 hours.

"The main thing is that there was very little impact on the general public, the servers were able to hold up against the attacks. The internet in general was designed to even withstand a nuclear attack," Zully Ramzan, a researcher at Symantec Security Response, told CNET News.com.

Computer Doesn't Know What It Likes But Knows Art


Teaching computers to recognize the works of specific artists is another step toward reliable image recognition. Cynthia Graber reports.

If you’ve spent time in an art museum, you probably learned to appreciate the styles of different artists. You can walk into a room and say, oh, that’s a Matisse.  You may recognize the colors, the brush strokes, the subject choice—even if the artist incorporated other styles into the painting.

Researchers at the University of Haifa in Israel wanted to teach a computer to do the same thing. The scientists developed a system by which the computer breaks down the image and analyzes various aspects of it. People, flowers and other elements get represented with complex mathematics.

After repeatedly analyzing the brush strokes and content of, say, Salvador Dalí paintings, the computer learned his particular style well enough to look at a new image and determine whether Dalí himself painted it. This worked even when the art contained a variety of influences. The program won’t replace professional expert judgment any time soon. But researchers say it’s another step toward teaching computers how to see the world around them.

—Cynthia Graber

Computer Disposal



Have you wondered as to what happened to the computers that were used about 10 years ago? The big white boxes with big monitors and ancient keyboards have been replaced with sleek laptops and flat screen monitors. Yes, those old computer equipments which were a must have for any individual about 5 years ago have become obsolete now. As a matter of fact the United States Environmental Protection Agency (EPA) has estimated that from the year 2005 onwards, 45 million computers will become obsolete annually.

Computer Donations

Before you think about disposing the computer stop and think if donating the computer is a feasible option. If it is in a working condition and you are only thinking of disposing it because you want a newer model, then it is always advisable to donate the computer. Contact a local school or an equivalent organization in your locality and you will be surprised as to how happy they will be to take the old model of the computer from you and you will feel good about it. After all you must have paid plenty of money for it and you will feel happy that indirectly who will be helping someone progress in life. This is an excellent option for large organizations that want to update their models and are left with hundreds of older models at their hands to dispose.

Computer Disposal

I am sure the first thing that comes to your mind when you think about computer disposals is land fills. This was the practice used till a few years ago in many countries but the environmentalists are making all efforts to stop this as it can have a very harmful effect. The main reason behind this the lead that is present in the cathode ray tube monitors.

Fortunately, taking this situation to their advantage many people have formed their own companies that deal with the disposal of computers. You just have to look up for the same on the internet and you will find plenty of leads near you instantly. You will have to pay them nominally for each computer that you want to dispose and they will take care of everything. The main tasks that these companies undertake are:
They take the ownership of your computer that is the equipment becomes their responsibility.
The hard drives are sanitized and destroyed. So you can be assured that any data that you may have forgotten to delete cannot be used anywhere else.
The asset tags that may point to the original owner of the computer are destroyed.
All the equipments that cannot be reused are disposed as per the Federal and State environmental laws.
Another environmental benefit on recycling computers and electronic items is that recycling helps recover valuable materials from the older equipments that can be used to make the new products. This results in the reduction of greenhouse emissions, reduction in pollution and saving the natural resources by extracting fewer materials from the Earth. Further, toxic materials like lead and mercury are removed before disposing the equipments in landfills which will ensure that these toxic materials do not seep into the water tables.

The manufacturers of the computer themselves have extensive recycling programs and you can approach them directly for the disposal of your computer.

I know that it is hard to imagine that disposing a computer can be such a big issue. What is difficult for me to imagine is that the laptop for which I paid an arm and a leg will end up in a bottom of a pit few years from now. And the worst bit is that I will probably have to pay to ensure that the laptop ends up in the bottom of the pit. But, in the end it is my responsibility to ensure that when the laptop does end up in the bottom of the bit, every re-useable component has been removed and all toxic materials have been removed so that the laptop does not harm the environment in any way. It is the individual responsibility of every computer user to ensure safe disposals of obsolete computer models else pretty soon we will not have a conducive environment in which we can use a computer.

Computer Backups


It's clear that many talk about computer backup, but few execute. Pain, suffering and sadness is the result. Learn now how the Halloween day is the worst time for no computer backup.

COMPUTERS AND HALLOWEEN, DO THEY MIX?

Computer backup is so important to your computer that to ignore it is to risk its damnation.

Computers require care and feeding. They require that you attend to their needs. If you don't, then they will most surely be sent to Hell.

Halloween means Hell. What! What do you mean that Halloween means Hell?

Well, if your computer is given the option of trick or treat, which will it accept? Will it accept the trick or the treat? What do you think?

Halloween is the time that computers are subject to tricks or treats. Did you know that more computers fail on Halloween than any other day of the year? That’s right. It’s true (smile). Your computer is in danger! Protect it. Do your computer backups.

Back to the Hell thing. Hell you say? Yep. Well, what do you mean by Hell?

Computer hell is the place for computers without computer backup. The failure to perform hard drive backup means that you are playing Russian Roulette with your data. Data needs your protection. Failure to protect your data may cause your home or business records to be sent to Hell.

Hell in this instance is for the records and files that cannot be resurrected. Resurrected you say, what does that mean?

It means that without computer backup as a source of salvation then the files can safely enjoy eternal oblivion. Oblivion you say, what does that mean? That means they are eternally lost from computer resurrection.

Is there any mercy for my precious files, you ask?

Why yes there is. Would like to know what the mercy for your files is? Yes! Yes! You say.

OK boys and girls listen carefully. The salvation, mercy, resurrection and redemption of your files lies in regular and consistent and persistent computer backup.

If you backup your computer consistently and persistently your files will be resurrected and saved from accidental deletion, hard drive failure and those nasty things like fire, flood, theft, earthquake, hurricanes, tornados and the like!

Computer backup is the key to your data's salvation!

Do your computer backups boys and girls.

Milk and cookies will be served in the pantry.

Trick or treat for your computer backup?

PROJECT ON HOTEL MANAGEMENT


#include<conio.h>
#include<stdio.h>
#include<fstream.h>
#include<string.h>
#include<ctype.h>
#include<dos.h>
#include<stdlib.h>
#include<graphics.h>
#include<process.h>

fstream file;
int count=0;
struct date d;
struct time t;
int search_room(int n);
void facilities( );
int menu( );
void showbill( );
float facilitybill(int);
int see_menu( );
int res_menu( );
int del_menu( );
void booked(char ch[20]);
int empty_room(int n);
void dance(int n);
void seebill(char*,float,int,int,int,int,float,char*,long);
int cal_days(int,int,int,int,int,int,int,int);
void curtain( );
void arun(int n)
 {
  cout<<"\n";
  cout<<"\n";
  textcolor(n);
  cout<<"\t\t*******************************************\n";
  cout<<"\t\t";
  cputs("       PROJECT ON HOTEL MANAGEMENT");
  cout<<"\n\t\t";
  cputs("     MADE BY CHANDRA PRAKASH ");
  cout<<"\n\t\t*******************************************"<<endl;
 }
void arun1( )
 {
  cout<<"\n";
  cout<<"\n";
  cout<<"\n";
  cout<<"\n";
 }
/**********************************************************/
/*********************WELCOME FUNCTION ********************/
void welcome( )
 {
  getch( );
  int gdriver = EGA, gmode = EGAHI, errorcode;
  int color=1, x=60, y=90,mc,style=1,size=5;
  char msg[80];
  initgraph(&gdriver, &gmode, " ");
  errorcode = graphresult( );
  if (errorcode != grOk)
   {
printf("Graphics error: %s\n", grapherrormsg(errorcode));
printf("Press any key to halt:");
getch( );
exit(1);
   }
  mc=getmaxcolor( );
  cleardevice( );
  for(;!kbhit( );color++)
   {
if(color>mc)
 color=1;
delay(500);
setcolor(color);
    style=1;size=5;x=60;y=90;
settextstyle(style, HORIZ_DIR, size);
sprintf(msg, "WELCOME TO HOTEL TAJ");
outtextxy(x, y, msg);
    x=30;y=160;
sprintf(msg, "WE WISH YOU HAPPY STAY.");
outtextxy(x, y, msg);
    style=3;size=1;x=320;y=320;
    settextstyle(style, HORIZ_DIR, size);
    sprintf(msg, "PRESS ANY KEY TO CONTINUE.....");
outtextxy(x, y, msg);
    delay(650);
   }
  closegraph( );
 }
/*************************************************************/
/********************FUNCTION DANCE **************************/
void dance(int n)
 {
  clrscr( );
  arun(n);
  arun1( );
  if(n==1)
   {
    cout<<"\t\t\t\t  o  "<<endl;
    cout<<"\t\t\t\t ^|\\"<<endl;
    cout<<"\t\t\t\t  /\\";
   }
  if(n==2)
   {
    cout<<"\t\t\t\t  o "<<endl;
    cout<<"\t\t\t\t ^|^"<<endl;
    cout<<"\t\t\t\t  >\\";
   }
  if(n==3)
   {
    cout<<"\t\t\t\t  o "<<endl;
    cout<<"\t\t\t\t v|^"<<endl;
    cout<<"\t\t\t\t /< ";
   }
  if(n==4)
   {
    cout<<"\t\t\t\t  o "<<endl;
    cout<<"\t\t\t\t v|^"<<endl;
    cout<<"\t\t\t\t >\\";
   }
  if(n==5)
   {
    cout<<"\t\t\t\t  o "<<endl;
    cout<<"\t\t\t\t |/^"<<endl;
    cout<<"\t\t\t\t /< ";
   }
  if(n==6)
   {
    cout<<"\t\t\t\t  o "<<endl;
    cout<<"\t\t\t\t |-|"<<endl;
    cout<<"\t\t\t\t >\\";
   }
  if(n==7)
   {
    cout<<"\t\t\t\t <o "<<endl;
    cout<<"\t\t\t\t \\|"<<endl;
    cout<<"\t\t\t\t /< ";
   }
  if(n==8)
   {
    cout<<"\t\t\t\t <o>"<<endl;
    cout<<"\t\t\t\t  | "<<endl;
    cout<<"\t\t\t\t >\\";
   }
  if(n==9)
   {
    cout<<"\t\t\t\t  o>"<<endl;
    cout<<"\t\t\t\t \\ "<<endl;
    cout<<"\t\t\t\t /< ";
   }
  if(n==10)
   {
    cout<<"\t\t\t\t  o "<<endl;
    cout<<"\t\t\t\t  x "<<endl;
    cout<<"\t\t\t\t >\\";
   }
  if(n==11)
   {
    cout<<"\t\t\t\t  o "<<endl;
    cout<<"\t\t\t\t </ "<<endl;
    cout<<"\t\t\t\t /< ";
   }
  if(n==12)
   {
    cout<<"\t\t\t\t  o "<<endl;
    cout<<"\t\t\t\t <|>"<<endl;
    cout<<"\t\t\t\t >\\";
   }
  if(n==13)
   {
    cout<<"\t\t\t\t  o "<<endl;
    cout<<"\t\t\t\t </>"<<endl;
    cout<<"\t\t\t\t /< ";
   }
  if(n==14)
   {
    cout<<"\t\t\t\t  o "<<endl;
    cout<<"\t\t\t\t<\\>"<<endl;
    cout<<"\t\t\t\t >\\";
   }
  if(n==15)
   {
    cout<<"\t\t\t\t  o "<<endl;
    cout<<"\t\t\t\t <)>"<<endl;
    cout<<"\t\t\t\t  >>";
   }
  }
/*************************************************************/
/**********************CLASS HOTEL****************************/
class hotel
 {
  public:
         char cth,ctm,cts,cdd,cdm,lth,ltm,lts,ldd,ldm;
         int cdy,ldy;
         char name[50],status,add[100];
         int type, room_no,gno,empty;
         void readdata( );
         void showdata( );
         void modification( );
         void del( );
 };
/**********************************************************/
/******************INPUT DATA FUNCTION*********************/
void hotel::readdata( )
 {
  clrscr( );
  cout<<"\t \t \t ENTER RECORD OF GUEST NO."<<++count;
  gno=count;
  cout<<"\n\t \t \t ENTER THE NAME......";
  gets(name);
  cout<<"\n\t \t \t ENTER ADDRESS.......";
  gets(add);
  la:
  cout<<"\n\t \t \t ENTER THE SUITE TYPE(1, 2, 3, OR 4) ";
  cin>>type;
  cout<<"\n\t \t \t ENTER THE ROOM No........... "
 <<"\n\t \t \t PRESS ANY KEY TO SEE THE LIST OF EMPTY ROOM...";
  getch( );
  empty=empty_room(type);
  if(empty==0)
   {
cout<<"\n SORRY THERE IS NO ROOM VACANT IN THIS SUITE "
<<"\n DO U WANT TO CHANGE THE SUITE "
<<"\n IF YES THEN PRESS Y OTHERWISE PRESS N ";
char ch=getch( );
cout<<ch;
if(ch=='Y'|| ch=='y')
goto la;
else
goto lo;
   }
  getch( );
  cin>>room_no;
  getdate(&d);
  cdy=d.da_year;
  cdd=d.da_day;
  cdm=d.da_mon;
  gettime(&t);
  cth=t.ti_hour;
  ctm=t.ti_min;
  cts=t.ti_sec;
  status=' ';
  lo:
 }
/*************************************************************/
/*****************SHOW DATA **********************************/
void hotel :: showdata( )
 {
  clrscr( );
  cout<<"\t \t \t GUEST NO......";
  cout<<gno;
  cout<<"\n\t \t \t NAME......";
  puts(name);
  cout<<"\n\t \t \t ADDRESS.......";
  puts(add);
  cout<<"\n\t \t \t THE SUITE TYPE......";
  cout<<type;
  cout<<"\n\t \t \t ROOM No. OF GUEST IS......"
 <<room_no;
  cout<<"\n\t \t \t coming date is......";
  printf("%2d:%02d:%02d",cdd,cdm,cdy);
  cout<<"\n\t \t \t arrival time is.....";
  printf("%2d:%02d:%02d",cth,ctm,cts);
  if(status=='*')
   {
cout<<"\n\t \t \t leaving date is......";
printf("%2d:%02d:%02d",ldd,ldm,ldy);
cout<<"\n\t \t \t departureal time is.....";
printf("%2d:%02d:%02d",lth,ltm,lts);
   }
 }
/*************************************************************/
/*****************MODIFICATION FUNCTION***********************/
void hotel::modification ( )
 {
  char nm[20],ad[40];int rono;
  cout<<"\n IF U WANT TO RETAIN OLD NAME AND ADDRESH "
 <<"THEN SIMPLY PRESS ENTER "
 <<"\n TO RETAIN OLD ROOM NO, ENTER 0 "
 <<"\n NAME ";
  gets(nm);
  cout<<"\n addresh ";
  gets(ad);
  cout<<"\n LIST OF EMPTY ROOM IS.........";
  empty=empty_room(type);
  if(!empty)
   {
cout<<"\n SORRY THERE IS NO ROOM ";
rono=0;
goto la;
   }
  cout<<"\n ROOM NO ";
  cin>>rono;
  la:
  if(strlen(nm)!=0)
   strcpy(name,nm);
  if(strlen(ad)!=0)
   strcpy(add,ad);
  if(rono!=0)
   room_no=rono;
 }
/*************************************************************/
/*******************DELETE FUNCTION***************************/
void hotel::del( )
 {
  getdate(&d);
  ldy=d.da_year;
  ldd=d.da_day;
  ldm=d.da_mon;
  gettime(&t);
  lth=t.ti_hour;
  ltm=t.ti_min;
  lts=t.ti_sec;
  status='*';
 }
/*************************************************************/
/*********************STRUCTURE DATE**************************/
struct DA
 {
  int dd,dm,dy;
 };
DA read_date(char *ty);
void ret_amount(DA fg,int ty, int td);
/*************************************************************/
/************************CLASS BAN_CON************************/
class ban_con
 {
  public:
char name[30],add[50],type[20],sta;
int td;
         DA fd,tod;
         ban_con(char*s)
          {
           strcpy(type,s);
          }
void input_data();
         void show( )
 {
           clrscr( );
  cout<<"\n NAME ";
  puts(name);
  cout<<"\n ADDRESS ";
  puts(add);
           cout<<"\n TOTAL DAY "<<td
               <<"\n BOOKING DATE "
               <<"\n FROM ";
           printf("%2d:%02d:%02d",fd.dd,fd.dm,fd.dy);
           if(td>1)
            {
             cout<<"\t TO \t";
             printf("%2d:%02d:%02d",tod.dd,tod.dm,tod.dy);
            }
           cout<<"\n";
           getch( );
          }
         void del( )
          {
           sta='*';
          }
  };
/*************************************************************/
/*********************INPUT DATA FUNCTION*********************/
void ban_con :: input_data( )
 {
  cout<<"\n ENTER YOUR NAME ";
  gets(name);
  cout<<"\n ENTER YOUR ADRESS ";
  gets(add);
  cout<<"\n ENTER TOTAL DAY OF BOOKING ";
  cin>>td;
  cout<<"\n ENTER THE DATE OF BOOKING ";
  fd=read_date(type);
  if(td>1)
   {
    cout<<"\n ENTER THE LAST DATE ";
    tod=read_date(type);
   }
  sta=' ';
 }
/*************************************************************/
/********************FUNCTION READ DATE***********************/
DA read_date(char*ty)
 {
  DA d1; int yy; ban_con b1(ty);
  char ch;
  cout<<"\n BOOKED DATES ARE ";
  booked(b1.type);
  lo:
  cout<<"\n ENTER THE DATE (yyyy/mm/dd) ";
  cin>>d1.dy>>ch>>d1.dm>>ch>>d1.dd;
  getdate(&d);
  yy=d.da_year;
  while(d1.dy<yy||d1.dy>(yy+1))
   {
    cout<<"\n ENTER CORRECT YEAR ";
    cin>>d1.dy;
   }
  if(d1.dm>12)
   {
    cout<<"\n ENTER CORRECT DATE ";
    clrscr( );
    goto lo;
   }
  if(d1.dm==2)
   {
    if(d1.dy%4==0)
     {
      if(d1.dd>29)
       {
        cout<<"\n ENTER CORRECT DATE ";
        clrscr( );
        goto lo;
       }
     }
    else
     {
      if(d1.dd>28)
       {
        cout<<"\n ENTER CORRECT DATE ";
        clrscr( );
        goto lo;
       }
     }
   }
  else
   {
    if(d1.dm==4||d1.dm==6||d1.dm==9||d1.dm==11)
     {
      if(d1.dd>30)
       {
        cout<<"\n ENTER CORRECT DATE ";
        clrscr( );
        goto lo;
       }
     }
    else
     {
      if(d1.dd>31)
       {
        cout<<"\n ENTER CORRECT DATE ";
        clrscr( );
        goto lo;
       }
     }
   }
  return d1;
 }
/*************************************************************/
/***********************FUNCTION BOOKED***********************/
void booked(char type[20])
 {
   fstream fil;  ban_con ba(type);
   char cdd,cdm,*p;
   int dy,dd,dm;
   getdate(&d);
   dy=d.da_year;
   cdd=d.da_day;
   cdm=d.da_mon;
   p=&cdd; dd=atoi(p);
   p=&cdm; dm=atoi(p);
   fil.open("ban&con.dat",ios::out|ios::ate|ios::in|ios::binary);
   if(!fil)
    {
     cout<<"\n file cant be open ";
     getch( );
     exit(0);
    }
   fil.seekg(0,ios::end);
   int f=fil.tellg( );
   int count=f/sizeof(ba);
   if(!count)
    cout<<"\n NOT BOOKED TILL NOW ";
   else
    {
     count=0;
     fil.seekg(0,ios::beg);
     while(fil.read((char*)&ba,sizeof(ba)))
      {
       if((strcmp(type,ba.type)==0)&&ba.sta!='*')
        {
         if(dd<=ba.fd.dd||dm<ba.fd.dm||dy<ba.fd.dy)
          {
           cout<<"\n ";
           printf("%2d:%02d:%02d",ba.fd.dd,ba.fd.dm,ba.fd.dy);
           if(ba.td>1)
            {
             cout<<"\t TO \t";
             printf("%2d:%02d:%02d",ba.tod.dd,ba.tod.dm,ba.tod.dy);
       }
           count++;
          }
         else
          {
           if(ba.td>1)
            {
             if(dd<=ba.tod.dd||dm<ba.tod.dm||dy<ba.tod.dy)
              {
               cout<<"\n ";
               printf("%2d:%02d:%02d",ba.fd.dd,ba.fd.dm,ba.fd.dy);
               cout<<"\t TO \t";
               printf("%2d:%02d:%02d",ba.tod.dd,ba.tod.dm,ba.tod.dy);
         }
            }
          }
        }
      }
     if(!count)
      cout<<"\n NOT BOOKED FOR ANY DAY";
    }
   fil.clear( );
   fil.close( );
   getch( );
  }
/*************************************************************/
/*********************EMPTY ROOM FUNCTION*********************/
int empty_room(int ty)
 {
  int i=0,j=0,flag=0,empty=0;
  fstream fil;
  hotel gues;
  fil.open("record.dat",ios::out|ios::app|ios::in|ios::binary);
  if(ty==1)
   {
i=1;j=101;
   }
  if(ty==2)
   {
i=101;j=251;
   }
  if(ty==3)
   {
i=251;j=451;
   }
  if(ty==4)
   {
i=451;j=700;
   }
  for(;i<j;i++)
   {
fil.seekg(0,ios::beg);
while(!fil.eof( ))
{
 fil.read((char*)&gues,sizeof(gues));
 if(gues.status!='*'&& gues.room_no==i)
  {
flag=0;
fil.seekg(0,ios::end);
  }
 else
  flag=1;
}
if(flag==1)
{
 if(i<10)
  cout<<"0";
 cout<<i;
 if(i<100)
  cout<<"   ";
 else
  cout<<"  ";
 empty=i;
}
fil.clear( );
   }
  return empty;
 }
/*************************************************************/
/***************MAIN FUNCTION*********************************/
void main( )
 {
  clrscr( );  int df=2;
  while(!kbhit( ))
   {
    dance(df);
    gotoxy(15,18);
    cout<<"PRESS ANY KEY TO CONTINUE..............";
    delay(600);
    df++;
    if(df>15)
     df=2;
   }
  hotel guest;
  fstream fil;ban_con ban("banquet hall");
  int choice;ban_con con("conference hall");
  file.open("record.dat",ios::out|ios::ate|ios::in|ios::binary);
  if(!file)
   {
cout<<"\n file cant be open ";
getch( );
    exit(0);
   }
  int offset,temp,flag;
  file.seekg(0,ios::end);
  int file_size=file.tellg( );
  count=file_size/sizeof(guest);
  welcome( );
  cout<<"\n\t \t \t PRESS ENTER TO SEE FACILITIES..........";
  facilities( );
  do
   {
clrscr( );
lo:
choice=menu( );
switch(choice)
 {
  case 1:
 clrscr( );
 int m=res_menu( );
 if(m==1)
  {
cout<<"\n Plz ENTER THE INFORMATION OF GUEST..";
cout<<"\n PRESS ANY KEY.......................";
getch( );
guest.readdata( );
if(guest.empty!=0)
file.write((char*)&guest,sizeof(guest)) ;
  }
              if(m==2||m==3)
               {
                fil.open("ban&con.dat",ios::out|ios::ate|ios::in|ios::binary);
                if(!fil)
                 {
                  cout<<"\n fil cant be open ";
                  getch( );
                  exit(0);
                 }
   if(m==2)
                 {
                  ban.input_data( );
                  fil.write((char*)&ban,sizeof(ban));
                  cout<<"\n\n\n PAYBLE AMOUNT IS Rs. "<<(ban.td*5000);
                  getch( );
                 }
                if(m==3)
                 {
                  con.input_data( );
                  fil.write((char*)&con,sizeof(con));
                  cout<<"\n\n\n PAYBLE AMOUNT IS Rs. "<<(con.td*2500);
                  getch( );
                 }
                fil.close( );
               }
 break;
  case 2:
              m=see_menu( );
              if(m==1)
               {
       clrscr( );
   int n,guestno;
       cout<<"\n\n\n\t\t\t"
       <<"menu"
   <<"\n\n\n\n"
    <<"1.TO SEE RECORD OF ONE GUEST\n"
   <<"2.TO SEARCH THE RECORD OF GUEST (BY NAME)\n"
   <<"3.TO SEE ENTIRE RECORD\n"
   <<"4.TO SEE RECORD OF GEUEST CURRENTLY STAYING IN HOTEL\n"
   <<"ENTRE YOUR CHOICE\n";
   cin>>n;
   if(n==1)
    {
     file.seekg(0);
     cout<<"\n \t ENTER GUEST NO";
 cin>>guestno;
 if(!count|| guestno>count)
  {
   clrscr( );
   cout<<"\n\t THE RECORD DOES NOT EXIT"
   <<"\n\t PRESS ANY KEY TO SEE MENU";
   getch( );
  }
 else
  {
   offset=((guestno-1)*sizeof(guest));
                    file.seekg(offset,ios::beg);
   file.read((char*)&guest, sizeof(guest));
   guest.showdata( );
   getch( );
  }
    }
   if(n==2)
    {
     char na[30];
     cout<<"\n ENTER THE NAME OF GUEST ";
 gets(na);
 file.seekg(0,ios::beg);
 while(file.read((char*)&guest,sizeof(guest)))
  {
   if(na==guest.name)
    guest.showdata( );
   getch( );
  }
 file.clear( );
    }
   if(n==3)
    {
     clrscr( );
 file.seekg(0);
 while(file.read((char*)&guest,sizeof(guest)))
  {
   guest.showdata( );
   getch( );
  }
 file.clear( );
    }
   if(n==4)
    {
     clrscr( );
 file.seekg(0);
 while(file.read((char*)&guest,sizeof(guest)))
  {
   if(guest.status=='*')
   goto la;
   guest.showdata( );
   getch( );
   la:
  }
 file.clear( );
    }
   if(n<1 || n>4)
    {
     clrscr( );
 cout<<"\n\t WRONG CHOICE ENTERED \nPRESS ANY KEY";
 getch( );
    }
               }
              if(m==2||m==3)
               {
                fil.open("ban&con.dat",ios::out|ios::ate|ios::in|ios::binary);
                if(m==2)
                 {
                  int n;
                  char ty[]="banquet hall";
                  cout<<"\n \t\t\t\t****MENU****"
                      <<"\n 1. TO SEE ONLY ONE RECORD "
                      <<"\n 2. TO SEE ENTIRE RECORD "
                      <<"\n 3. TO SEE ONLY CURENT RECORD"
                      <<"\n ENTER YOUR CHOICE ";
                  cin>>n;
                  if(n==1)
                   {
                    char na[30];
       cout<<"\n ENTER THE NAME OF PERSON ";
                    gets(na);
   fil.seekg(0,ios::beg);
       while(fil.read((char*)&ban,sizeof(ban)))
    {
     if(strcmp(na,ban.name)==0&&strcmp(ty,ban.type)==0
                             &&ban.sta!='*')
      ban.show( );
    }
   fil.clear( );
      }
                  if(n==2)
                   {
       clrscr( );
   fil.seekg(0);
   while(fil.read((char*)&ban,sizeof(ban)))
    {
                      if(strcmp(ty,ban.type)==0&&ban.sta!='*')
      ban.show( );
            }
   fil.clear( );
      }
                  if(n==3)
                   {
                    char cdd,cdm,*p;
                    int dy,dd,dm;
                    getdate(&d);
                    dy=d.da_year;
                    cdd=d.da_day;
                    cdm=d.da_mon;
                    p=&cdd; dd=atoi(p);
                    p=&cdm; dm=atoi(p);
                    clrscr( );
   fil.seekg(0);
   while(fil.read((char*)&ban,sizeof(ban)))
    {
                      if(ban.td>1)
                       {
                        if(dd<=ban.tod.dd||dm<ban.tod.dm||dy<ban.tod.dy)
                         {
                          if(strcmp(ty,ban.type)==0&&ban.sta!='*')
          ban.show( );
                         }
                       }
                      else
                       {
                        if(dd<=ban.fd.dd||dm<ban.fd.dm||dy<ban.fd.dy)
                         {
                          if(strcmp(ty,ban.type)==0&&ban.sta!='*')
          ban.show( );
                         }
                       }
            }
   fil.clear( );
      }
                  if(n<1||n>3)
                   {
                    cout<<"\n WRONG CHOICE ENTERED ";
                   }
                 }
                if(m==3)
                 {
                  int n;
                  char ty[]="conference hall";
                  cout<<"\n \t\t\t\t****MENU****"
                      <<"\n 1. TO SEE ONLY ONE RECORD "
                      <<"\n 2. TO SEE ENTIRE RECORD "
                      <<"\n 3. TO SEE ONLY CURENT RECORD "
                      <<"\n ENTER YOUR CHOICE ";
                  cin>>n;
                  if(n==1)
                   {
                    char na[30];
       cout<<"\n ENTER THE NAME OF PERSON ";
       gets(na);
   fil.seekg(0,ios::beg);
   while(fil.read((char*)&con,sizeof(con)))
    {
     if(strcmp(na,con.name)==0&&strcmp(ty,con.type)==0
                              &&con.sta!='*')
      con.show( );
    }
   fil.clear( );
      }
                  if(n==2)
                   {
       clrscr( );
   fil.seekg(0);
   while(fil.read((char*)&con,sizeof(con)))
    {
                      if(strcmp(ty,con.type)==0&&con.sta!='*')
      con.show( );
    }
   fil.clear( );
      }
                  if(n==3)
                   {
                    char cdd,cdm,*p;
                    int dy,dd,dm;
                    getdate(&d);
                    dy=d.da_year;
                    cdd=d.da_day;
                    cdm=d.da_mon;
                    p=&cdd; dd=atoi(p);
                    p=&cdm; dm=atoi(p);
                    clrscr( );
   fil.seekg(0);
   while(fil.read((char*)&con,sizeof(con)))
    {
                      if(ban.td>1)
                       {
                        if(dd<=con.tod.dd||dm<con.tod.dm||dy<con.tod.dy)
                         {
                          if(strcmp(ty,con.type)==0&&con.sta!='*')
          con.show( );
                         }
                       }
                      else
                       {
                        if(dd<=con.fd.dd||dm<con.fd.dm||dy<con.fd.dy)
                         {
                          if(strcmp(ty,con.type)==0&&con.sta!='*')
          con.show( );
                         }
                       }
            }
   fil.clear( );
      }
                  if(n<1||n>3)
                   {
                    cout<<"\n WRONG CHOICE ENTERED ";
                   }
                 }
                fil.close( );
               }
 break;
  case 3:
              int guestno;
 cout<<"\n ENTER THE GUEST NO TO BE UPDATED";
 cin>>guestno;
 if(guestno>count)
  {
cout<<"\n THIS GUEST RECORD DOESNOT EXIST";
getch( );
goto lo;
  }
 else
  {
offset=((guestno-1)*sizeof(guest));
file.seekg(offset,ios::beg);
file.read((char*)&guest, sizeof(guest));
if(guest.status=='*')
{
 cout<<"\n THE GUEST RECORD IS DELETED ";
 getch( );
 goto lo;
}
else
{
 char ch;
 guest.showdata( );
 cout<<"\n DO U WANT TO MODIFY THIS RECORD "
 <<"PRESS Y FOR YES & N FOR NO ";
 ch=getch( );cout<<ch;
 if(ch=='y'|| ch=='Y');
  {
cout<<"\n ENTER NEW DATA ";
file.seekp(offset,ios::beg);
guest.modification( );
file.write((char*)&guest,sizeof(guest));
cout<<"\n NEW DATA REPLACED ";
getch( );
  }
}
  }
 break;
  case 4:
              int n=del_menu( );
              if(n==1)
               {
   char ch;
   cout<<"\n ENTER THE GUEST NO TO BE DELETED";
           cin>>guestno;
   if(guestno>count)
    {
 cout<<"\n THIS GUEST RECORD DOESNOT EXIST";
     getch( );
     goto lo;
    }
   else
    {
 offset=((guestno-1)*sizeof(guest));
 file.seekg(offset,ios::beg);
 file.read((char*)&guest, sizeof(guest));
 if(guest.status=='*')
  {
   cout<<"\n THE GUEST RECORD IS ALREADY DELETED ";
   getch( );
   goto lo;
  }
 else
  {
   guest.showdata( );
   cout<<"\n DO U WANT TO DELETE THIS RECORD "
       <<"PRESS Y FOR YES & N FOR NO ";
   ch=getch( );cout<<ch;
   if(ch=='y'|| ch=='Y');
    {
     file.seekp(offset,ios::beg);
 guest.del( );
 file.write((char*)&guest,sizeof(guest));
    }
  }
 file.seekp(0,ios::end);
    }
               }
              if(n==2||n==3)
               {
                fstream fil;
                fil.open("ban&con.dat",ios::out|ios::ate|ios::in|ios::binary);
                if(!fil)
                 {
                  cout<<"\n fil cant be open ";
                  getch( );
                  exit(0);
                 }
                if(n==2)
                 {
                  char na[30],ch;int co=1,t=0,off;
                  cout<<"\n ENTER THE PERSON NAME ";
                  gets(na);
                  char ty[]="banquet hall";
                  fil.seekg(0,ios::beg);
     while(fil.read((char*)&ban,sizeof(ban)))
      {
                    t++;
   if(strcmp(na,ban.name)==0&&strcmp(ty,ban.type)==0
                               &&ban.sta!='*')
    {
                      ban.show( );
                      cout<<"\n DO U WANT TO DELETE THIS FILE (PRESS Y OR N)";
                      ch=getch( ); cout<<" "<<ch;
                      if(ch=='y'|| ch=='Y')
                       {
                        off= ((t-1)*sizeof(ban));
                        fil.seekp(off,ios :: beg);
                        ban.del( );
                        fil.write((char*)&ban,sizeof(ban));
                        ret_amount(ban.fd,co,ban.td);
                       }
                     }
  }
 fil.clear( );
                 }
                if(n==3)
                 {
                  char na[30],ch;int co=2,t=0,off;
                  cout<<"\n ENTER THE PERSON NAME ";
                  gets(na);
                  char ty[]="conference hall";
                  fil.seekg(0,ios::beg);
     while(fil.read((char*)&con,sizeof(con)))
      {
                    t++;
   if(strcmp(na,con.name)==0&&strcmp(ty,con.type)==0&&con.sta!='*')
    {
                      con.show( );
                      cout<<"\n DO U WANT TO DELETE THIS FILE (PRESS Y OR N)";
                      ch=getch( ); cout<<" "<<ch;
                      if(ch=='y'|| ch=='Y')
                       {
                        off=((t-1)*sizeof(con));
                        fil.seekp(off,ios :: beg);
                        con.del( );
                        fil.write((char*)&con,sizeof(con));
                        ret_amount(con.fd,co,con.td);
                        getch( );
                       }
                     }
  }
 fil.clear();
                 }
                 fil.close( );
               }
 break;
  case 5:showbill( );
 break;
  case 6:clrscr( );
 cout<<"\n\t\t TOTAL ROOM IN HOTEL IS "<<700
 <<"\n\t\t TOTAL ROOM IN SUITE TYPE 1 IS "<<100
 <<"\n\t\t LIST OF EMPTY ROOM IS \n";
 int bn=1;
 int mn=empty_room(bn);
 if(!mn)
  cout<<"\n ALL THE ROOM ARE BOOKED ";
 getch( );
 clrscr( );
 cout<<"\n\t\t TOTAL ROOM IN SUITE TYPE 2 IS "<<150
 <<"\n\t\t LIST OF EMPTY ROOM IS \n";
 bn=2;
 mn=empty_room(bn);
 if(!mn)
  cout<<"\n ALL THE ROOM ARE BOOKED ";
 getch( );
 clrscr( );
 cout<<"\n\t\t TOTAL ROOM IN SUITE TYPE 3 IS "<<200
 <<"\n\t\t LIST OF EMPTY ROOM IS \n";
 bn=3;
 mn=empty_room(bn);
 if(!mn)
  cout<<"\n ALL THE ROOM ARE BOOKED ";
 getch( );
 clrscr( );
 cout<<"\n\t\t TOTAL ROOM IN SUITE TYPE 4 IS "<<250
 <<"\n\t\t LIST OF EMPTY ROOM IS \n";
 bn=4;
 mn=empty_room(bn);
 if(!mn)
  cout<<"\n ALL THE ROOM ARE BOOKED ";
 getch( );
              clrscr( );
              cout<<"\n CONFERENCE HALL IS BOOKED ON ";
              char ty[]="conference hall";
              booked(ty);
              getch( );
              clrscr( );
              cout<<"\n BANQUET HALL IS BOOKED ON ";
              char typ[]="banquet hall";
              booked(typ);
              getch( );
 break;
  case 7:char q;
 clrscr( );
 curtain( );
 delay(500);
 gotoxy(21,6);
 cout<<"\n THANK YOU FOR USING OUR SERVICE";
 gotoxy(20,8);
 cout<<"\n\t WE HOPE IN FUTURE YOU WILL";
 gotoxy(20,10);
 cout<<"\n\t GIVE US OPPERTUNITY TO SERVE YOU"
 <<"\n\t PRESS E TO EXIT";
 q=getch( );
 if(q=='E'||q=='e')
  choice=19;
 break;
  default:
  clrscr( );
  cout<<"\n \t WRONG CHOICE ENTERED \n"
  <<"PLEASE ENTER  RIGHT CHOICE \n"
  <<"PRESS ANY KEY TO SEE THE MENU";
  getch( );
  goto lo;
}
}while(choice>0 && choice<19);
   fil.close( );
   file.close( );
  }
/*************************************************************/
/********************FUNCTION RES_MENU************************/
int res_menu( )
 {
  int n;
  cout<<"\n 1. RESARVATION OF ROOM "
 <<"\n 2. RESERVATION OF BANQUET HALL"
 <<"\n 3. RESERVATION OF CONFERENCE HALL"
 <<"\n ENTER YOUR CHOICE ";
  cin>>n;
  return n;
 }
/**********************************************************/
/*****************FUNCTION RES_MENU************************/
int del_menu( )
 {
  int n;
  cout<<"\n 1. DELETION OF ROOM "
 <<"\n 2. DELETION OF BANQUET HALL"
 <<"\n 3. DELETION OF CONFERENCE HALL"
 <<"\n ENTER YOUR CHOICE ";
  cin>>n;
  return n;
 }
/**********************************************************/
/*****************FUNCTION SEE MENU************************/
int see_menu( )
 {
  int n;
  cout<<"\n 1. TO SEE RECORD OF GUEST "
 <<"\n 2. TO SEE RECORD OF BANQUET HALL"
 <<"\n 3. TO SEE RECORD OF CONFERENCE HALL"
 <<"\n ENTER YOUR CHOICE ";
  cin>>n;
  return n;
 }
/**********************************************************/
/*****************FUNCTION FACILITY************************/
 void facilities( )
  {
    int gdriver = EGA, gmode = EGAHI, errorcode;
int color=1, x=185, y=1,mc,style=1,size=2;
    char msg[80];
    initgraph(&gdriver, &gmode, " ");
    errorcode = graphresult( );
    if (errorcode != grOk)
     {
      printf("Graphics error: %s\n", grapherrormsg(errorcode));
      printf("Press any key to halt:");
      getch( );
 exit(1);
     }
    getch( );
    mc=getmaxcolor( );
    cleardevice( );
    for(;!kbhit( );color++)
     {
 if(color>mc)
  color=1;
 setcolor(color); x=185;y=1;
 settextstyle(style, HORIZ_DIR, size);
 sprintf(msg, "DESCRIPTION  OF  SUITES");
      rectangle(60,60,600,280);
      line(60,100,600,100);line(330,60,330,280);
 outtextxy(x, y, msg); x=90;y=70;
 sprintf(msg, " TYPE OF SUITES            RENT PER DAY");
      outtextxy(x, y, msg); x=90;y=110;
 sprintf(msg, "     SUITE 1                  Rs 10000/-");
      outtextxy(x, y, msg); x=110;y=150;
 sprintf(msg, "   SUITE 2                  Rs 8500/-");
      outtextxy(x, y, msg); x=110;y=190;
 sprintf(msg, "   SUITE 3                  Rs 7000/-");
      outtextxy(x, y, msg); x=110;y=230;
 sprintf(msg, "   SUITE 4                  Rs 5500/-");
 outtextxy(x, y, msg); x=250;y=300;
      sprintf(msg, "PRESS ANY KEY TO SEE FACILITY.....");
 outtextxy(x, y, msg);
      delay(650);
     }
    getch( );
    cleardevice( );
    for(;!kbhit( );color++)
     {
 if(color>mc)
  color=1;
 setcolor(color); x=20;y=1;
 settextstyle(style, HORIZ_DIR, size);
 sprintf(msg, "**************************FACILITES"
                   "**************************");
 outtextxy(x, y, msg); x=110;y=30;
 sprintf(msg, "1. SWIMMING POOL(FREE)");
      outtextxy(x, y, msg); x=110;y=60;
 sprintf(msg, "2. INTERNATE CAFE (Rs 20/hr.) ");
      outtextxy(x, y, msg); x=110;y=90;
 sprintf(msg, "3. BANQUET ROOM (Rs 5000/day)");
      outtextxy(x, y, msg); x=110;y=120;
 sprintf(msg, "4. CONFERENCE HALL (Rs 2500/day)");
      outtextxy(x, y, msg); x=110;y=150;
 sprintf(msg, "5. COCKTAIL BAR (Rs 200/hr.)");
 outtextxy(x, y, msg); x=110;y=180;
      sprintf(msg, "6. GAMES ROOM(Rs 20/hr.)");
 outtextxy(x, y, msg); x=110;y=210;
      sprintf(msg, "7. LIBRARY(FREE)");
 outtextxy(x, y, msg); x=110;y=240;
      sprintf(msg, "8. JYM(FREE)");
 outtextxy(x, y, msg); x=110;y=270;
      sprintf(msg, "9. RESTURENT");
 outtextxy(x, y, msg); x=200;y=325;
      sprintf(msg, "PRESS ANY KEY TO CONTINUE.....");
 outtextxy(x, y, msg);
      delay(650);
     }
    closegraph( );
  }
/**********************************************************/
/****************FUNCTION MENU*****************************/
  int menu( )
   {
int gdriver = EGA, gmode = EGAHI, errorcode,n;
int color=1, x=185, y=1,mc,style=1,size=2;
    char msg[80],ch,*p,c;
    initgraph(&gdriver, &gmode, " ");
    errorcode = graphresult( );
    if (errorcode != grOk)
     {
      printf("Graphics error: %s\n", grapherrormsg(errorcode));
      printf("Press any key to halt:");
      getch( );
 exit(1);
     }
    getch( );
    mc=getmaxcolor( );
    cleardevice( );
    for(;!kbhit( );color++)
     {
 if(color>mc)
  color=1;
      setcolor(color); x=1;y=1;
 settextstyle(style, HORIZ_DIR, size);
 sprintf(msg,"****************************************"
                  "****************************************");
 outtextxy(x, y, msg); x=60;y=30;
 sprintf(msg, "***********************MENU"
                   "***********************");
      outtextxy(x, y, msg); x=190;y=60;
 sprintf(msg, "1.RESERVATION");
      outtextxy(x, y, msg); x=190;y=90;
 sprintf(msg, "2.SEE FILE");
      outtextxy(x, y, msg); x=190;y=120;
 sprintf(msg, "3.MODIFICATION");
      outtextxy(x, y, msg); x=190;y=150;
 sprintf(msg, "4.DELETE");
 outtextxy(x, y, msg); x=190;y=180;
      sprintf(msg, "5.GET BILL");
 outtextxy(x, y, msg); x=190;y=210;
      sprintf(msg, "6.STATUS OF HOTEL");
 outtextxy(x, y, msg); x=190;y=240;
      sprintf(msg, "7.EXIT");
 outtextxy(x, y, msg); x=1;y=270;
      sprintf(msg,"****************************************"
                  "****************************************");
 outtextxy(x, y, msg); x=200;y=325;
      sprintf(msg, "PLEASE ENTER CHOICE(1-7)");
 outtextxy(x, y, msg);
      delay(650);
     }
    ch=getch( );p=&ch;
    n=atoi(p);
    sprintf(msg,"%d",n);
    outtextxy(500, 325, msg);
    getch( );
    closegraph( );
    return n;
  }
/**************************************************************/
/********************FUNCTION RET_AMOUNT***********************/
void ret_amount(DA fg,int ty,int td)
 {
  int tod,t=0,mt=0; float lt;
  char cdd,cdm,*p;
  int dy,dd,dm;
  getdate(&d);
  dy=d.da_year;
  cdd=d.da_day;
  cdm=d.da_mon;
  p=&cdd; dd=atoi(p);
  p=&cdm; dm=atoi(p);
  tod=cal_days(dy,dm,dd,fg.dy,fg.dm,fg.dy,t,mt);
  if(tod==1)
   {
    if(ty==1)
     lt=(td*50*50);
    if(ty==2)
     lt=(td*25*50);
   }
  if(tod>1&&tod<8)
   {
    if(ty==1)
     lt=(td*50*75);
    if(ty==2)
     lt=(td*25*75);
   }
  else
   {
    if(ty==1)
     lt=(td*50*90);
    if(ty==2)
     lt=(td*25*90);
   }
  cout<<"\n REFUNDABLE AMOUNT IS Rs. "<<lt;
  getch( );
 }
/************************************************************/
/********************FUNCTION SHOWBILL***********************/
void showbill( )
 {
  clrscr( );
  fstream fil;
  hotel gues;
  fil.open("record.dat",ios::out|ios::app|ios::in|ios::binary);
  char gname[30],gtype[20],*p,ch;
  int gfac,gsuite,guestno,cdd,cmm,cyy,ldd,lmm,lyy,hr;
  int cth,lth,tot_day,cafebill,gamesbill,rest_bill,bar_bill,con_bill,ban_bill;
  float suitecost,facicost,totfac,lodge,tax=0.07;
  long totbill;
  gotoxy(20,8);
  cout<<"\n ENTER GUEST NO...........\n";
  cin>>guestno;
  if(!count || guestno>count)
   {
cout<<"\n THIS RECORD DOES NOT EXITS ";
getch( );
fil.close( );
menu( );
goto la;
   }
  else
   {
fil.seekg((guestno-1)*sizeof(gues),ios::beg);
fil.read((char*)&gues,sizeof(gues));
clrscr( );
strcpy(gname,gues.name);
if(gues.status!='*')
{
 getdate(&d);
 gues.ldy=d.da_year;
 gues.ldd=d.da_day;
 gues.ldm=d.da_mon;
 gettime(&t);
 gues.lth=t.ti_hour;
 gues.ltm=t.ti_min;
 gues.lts=t.ti_sec;
}
cyy=gues.cdy; lyy=gues.ldy;
p=&gues.cdd; cdd=atoi(p);
p=&gues.ldd; ldd=atoi(p);
p=&gues.cdm; cmm=atoi(p);
p=&gues.ldm; lmm=atoi(p);
p=&gues.cth; cth=atoi(p);
p=&gues.lth; lth=atoi(p);
tot_day=cal_days(cyy,cmm,cdd,lyy,lmm,ldd,cth,lth);
if(tot_day==0)
tot_day++;
gsuite=gues.type;
switch(gsuite)
{
 case 1: strcpy(gtype,"suite 1");
 break;
 case 2:strcpy(gtype,"suite 2");
break;
 case 3:strcpy(gtype,"suite 3");
break;
 case 4:strcpy(gtype,"suite 1");
break;
}
suitecost=facilitybill(gsuite);
lodge=tot_day*suitecost;
cout<<"\n IS HE USED THE INTERNATE CAFE "
<<"PRESS Y FOR YES & N FOR NO ";
ch=getch( );
if(ch=='y'||ch=='Y')
{
 cout<<"\n ENTER THE TOTAL HOUR FOR WHICH HE USE THE CAFE";
 cin>>hr;
 cafebill=hr*20;
}
else
cafebill=0;
cout<<"\n IS HE USED THE GAMES ROOM "
<<"PRESS Y FOR YES & N FOR NO ";
ch=getch( );
if(ch=='y'||ch=='y')
{
 cout<<"\n ENTER THE TOTAL HOUR FOR WHICH HE USE THE GAMES ROOM";
 cin>>hr;
 gamesbill=hr*20;
}
else
gamesbill=0;
cout<<"\n ENTER THE RESTURENT BILL";
cin>>rest_bill;
cout<<"\n IS HE USED THE COCKE TAIL BAR "
<<"PRESS Y FOR YES & N FOR NO ";
ch=getch( );
if(ch=='y'||ch=='y')
{
 cout<<"\n ENTER THE TOTAL HOUR FOR WHICH HE USE THE GAMES ROOM";
 cin>>hr;
 bar_bill=hr*200;
}
else
bar_bill=0;
gfac=cafebill+gamesbill+rest_bill+bar_bill+con_bill+ban_bill;
totbill=lodge+gfac+(lodge+gfac)*tax;
seebill(gname,lodge,cafebill,gamesbill,rest_bill,
            bar_bill,tot_day,gtype,totbill);
menu( );
   }
  la:
  fil.close( );
 }
/*************************************************************/
/*****************FUNCTION CALCULAT DAYS**********************/
int cal_days(int yy,int mm,int dd,int lyy,int lmm,
             int ldd,int th,int lth)
 {
  int totd,totm,toty,i;
  if(lyy>=yy)
   {
toty=lyy-yy;
lmm+=12*toty;
   }
  if(lmm>=mm)
   {
totm=lmm-mm;
for(i=totm;i>0;i--)
{
 if(mm==4||mm==6||mm==9||mm==11)
  ldd+=30;
 else
 if(mm==2)
  {
if(yy%4==0)
ldd+=29;
else
ldd+=28;
  }
 else
  ldd+=31;
 mm++;
}
   }
  totd=ldd-dd;
  if(lth>th)
   totd++;
  return totd;
 }
/*************************************************************/
/****************** FUNCTION FACILITY BILL********************/
float facilitybill( int y)
 {
  float cost;
  switch(y)
   {
case 1:cost=10000;
  break;
case 2:cost=8500;
  break;
case 3:cost=7000;
  break;
case 4:cost=5500;
  break;
   }
  return cost;
 }
/*************************************************************/
/******************** FUNCTION SEEBILL ***********************/
void seebill(char gname[30],float lodge,int cafebill,
             int gamesbill,int rest_bill,int bar_bill,
             float totday,char gtype[20],long totbill)
 {
  clrscr( );
  cout<<"\n \n\n HOTAL TAJ \n"
 <<"\n BARLI MUMBAI\n"
 <<"\n Ph:- 99334427983, 9234798381"
 <<"\n                 BILL    "
 <<"\n NAME "<<gname
 <<"\n lodging bill "<<lodge
 <<"\n cafe bill (Rs. 20/Hr) "<<cafebill
 <<"\n games bill (Rs. 20/Hr)"<<gamesbill
 <<"\n resturent bill "<<rest_bill
 <<"\n cocktail bar bill (rs 200/hr) "<<bar_bill
 <<"\n tax 7% "
 <<"\n days of stay "<<totday
 <<"\n suite "<<gtype
 <<"\n grndtotal "<<totbill
 <<"\n thakyou"
 <<"\n press any key to go to menu......";
  getch( );
 }
/************************************************************/
/******************** FUNCTION CURTAIN **********************/
void curtain( )
 {
  clrscr( );
  int r,c=0,c1=80;
  while((c<=38)&&(c1>38))
   {
for(r=1;r<24;r++)
{
 gotoxy(c,r);
 cout<<"*_*_*";
 gotoxy(c1,r);
 cout<<"*_*_*";
}
c++;c1--;
delay(100);
   }
 }