November 17, 2011

Watch free Tv on your pc by just using a VLC player

Watch Live TV on Your PC For Free

Now you can watch free Tv on your pc by just using a VLC player.

Step 1 : First of all you need to have VLC player, if you don’t have vlc player kindly download and install it

Step 2 : Now open Vlc Player, and select streaming option from the media menu present in the menu bar.

Step 3 : Select network option and enter the url of the streaming channel. For example if you want to view B4u Music you need to add url
rtsp://217.146.95.166:554/playlist/ch12zqcif.3gp
in the url field and then select play option from the stream drop down menu.

Step 4 : After you click play in the above step, the channel will start streaming and you can watch your favorite channels.

Here is the List of many other channels which you will love to watch
Channel Name
Link
NDTV rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_33.sdp
NDTV Profit rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_31.sdp
Times Now rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_2.sdp
Aaj Tak rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_4.sdp
CNBC Aawaz rtsp://ss1c6.idc.mundu.tv:554/prf1/cid_34.sdp
CNBC TV 18 rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_35.sdp
Headlines Today rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_7.sdp
NDTV 24×7 rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_29.sdp
NK News rtsp://94.75.250.53:554/rtplive/rknews.sdp
RAJ News rtsp://94.75.250.220:1935/live/rajnews2.sdp
ETV rtsp://94.75.250.53/rtplive/etv2low.sdp
Studio N rtsp://94.75.250.220:1935/live/studion2
SVBC rtsp://94.75.250.220/rtplive/svbclow
Zoo Vision rtsp://stream.zoovision.com/live.sdp
B4u Music rtsp://217.146.95.166:554/playlist/ch12zqcif.3gp
iMusic rtsp://217.146.95.166:554/playlist/ch26yqcif.3gp
Zee Tamil rtsp://121.244.145.226:554/prf1/cid_54.sdp
Zee Kannad rtsp://121.244.145.226:554/prf1/cid_55.sdp
Zee Bangla rtsp://121.244.145.226:554/prf1/cid_52.sdp
Music Box rtsp://stream.the.sk/live/musicbox/musicbox-3m.3gp
Bella Tv rtsp://217.146.95.166:554/playlist/ch29yqcif.3gp
Fashion Tv rtsp://217.146.95.166:554/playlist/ch27yqcif.3gp
Adventure rtsp://video3.multicasttech.com/AFTVAdventure3GPP296.sdp
Horror rtsp://video2.multicasttech.com/AFTVHorror3GPP296.sdp
Comedy rtsp://video3.multicasttech.com/AFTVComedy3GPP96.sdp
Classic rtsp://video3.multicasttech.com/AFTVClassics3GPP296.sdp
Crime rtsp://video2.multicasttech.com/AFTVCrime3GPP296.sdp
Mystery rtsp://video2.multicasttech.com/AFTVMystery3GPP296.sdp
Clubbing Tv rtsp://217.146.95.166:554/playlist/ch21yqcif.3gp

July 27, 2011

Server Certificate Model


In this post we will discus a little about server certificate model. Yes you are right we will discus here something about CA certificates and SSL. So lets start from CA certificate. Full form of CA is certificate authority or certification authority its main task is to provide digital signatures which are known as CA certificates. The digital signatures/certificates certifies the ownership of a public key. There are several CA that provide digital certificates some are free while some are paid. The very common use of CA certificates can be found in SSL or TSL. The introduction of SSL in HTTP protocol has made possible data transfer via network in encrypted form. Due to introduction of SSL in HTTP the three way handshake is also slightly affected to support data transfer in encrypted form.



A digital certificate can be compared to a voter card id. A voter can be termed as a website, card issuing office as CA authorities and voter card number as secret cipher code. Cipher code for SSL is determined with help of cipher suite which is set of cryptographic primitives and configurations. It may include information about which key exchange algorithm to use, authentication algorithm, encryption, hashing and other information. SSL works on the basis of Public Key Infrastructure (PKI) and uses randomly generated session key for first time session key exchange with any website. The key exchange cycle involves setting up special session key that both client and server can use to communicate securely.

Now one of the biggest problem with SSL is that it only certifies that the certificate is issued to particular website for particular reason without any mechanism to verify it. That means you can use digital certificate verified for some other website for yourself. For most of the Windows ISS servers, these digital certificates and does not even needs real validation, it means if you activate HTTPS over HTTP in Windows ISS server then your SSL layer would be ready without any third party verification because it'll itself act as CA authority root server.

By the way the motive of this post was not explaining full working of SSL but to clear some basics that you must know to further understand our upcoming posts on attacking SSL encryption. So in upcoming posts we will have our look on SSL weaknesses and how to attack them. Till then thanks for reading, have a nice time and keep visiting.

July 21, 2011

FACEBOOK UNVEILS VIDEO CALLING POWERED BY SKYPE



Facebook has unveiled a group chat tool, a new design for its overall chat interface, and, yes, a video calling service based on Skype.
"Video calling is the first example of what we think of as a great social app," Facebook chief executive Mark Zuckerberg said during a press event at the company's Palo Alto, California, headquarters. "The integration that we've done could not have been done without the great social infrastructure we've rolled out over the last five years," he said.
The group chat tool is based on Facebook's existing Groups setup, which is now used by about 50 per cent of all Facebookers, according to Zuckerberg. The new design includes a browser sidebar that provides quick access to those you chat with most, and it offers a "call" button that launches the video service.




The video service requires a plug-in, but you can place a call to your Facebook friends that will then send them a notice pointing them to the plug-in. The service does not offer group video calling, but Zuckerberg indicated that this will eventually be rolled into the service.

The service cannot be used to call existing off-Facebook Skype clients – or vice versa. But Skype product manager Mike Barnes said that the two companies will eventually provide such off-Facebook calling.


Facebook has already started to roll the new tools across its site, and "millions" of users. Bates says that the video service will reach about one per cent of users on Wednesday. According to Skype CEO Tony Bates, the two companies have been working on the video service for the past six months.

In late June, Zuckerberg told a Seattle audience that Facebook would unveil something "awesome" today, and last week, Techcrunch reported that this would involve integrating the social network with the Skype VoIP service, which is now owned by Microsoft. Redmond is a Facebook investor and longtime Facebook partner. Microsoft's Bing underpins search on Facebook, and Facebook may be used to personalized your results on Bing. Microsoft announced in May it's buying Skype for $8.5bn.

July 13, 2011

DOXING - A WAY OF TRACING ANONYMOUS PEOPLE


Doxing is a way of tracing someone or getting information about an individual using sources on the internet and social engineering techniques. It's term was derived from --Documents-- as a matter of fact its the retrieval of Documents on a person or an organization.

I saw a well detailed information on how to implement this techniques and i will be sharing it here. As presented by Chintan Gurjar below is a technique to trace an anonymous person.


What is Doxing ?

Doxing(“Documents” or “Docx”) is the part of technique “Tracing”. It plays an important role in tracing. To gathering all available information is called as doxing. In information there are many informations like documents,victim’s name, gender and also that on internet on which which website, the person is there and by which which name and nick name. We are choosing the specific target.In this tutorial i will show you how to get the information about any particular individual. Doxing is easy depends on the available information about the specific target and it also depends on that how many information is available of that specific target right now. Doxing technique is very useful to solve the “Cyber Crime Cases”.With the help of this tutorial you will come to know that how the hackers dox the innocent people and make them victim to hack their email id accounts, Facebook accounts and their websites by implementing social engineering techniques.

For the Specific Target Here are some parts for which you should collect the information.
(1) Name
(2) Gender
(3) Birthday
(4) Age
(5) Website
(6) Email Id
(7) Social Networking Site Profiles -> Facebook/Yahoo/Orkut/Twitter/My space
(8) Location/Area/Country
(9) IP – Address

Once hacker have all this information,the next step of hacker is to go to the http://www.google.com/ and he can input the name of the specific target.The target’s all social networking site profile id will display Google. Hacker will copy paste it and then open that link into his browser.Then he/she can see the every information about the target.If the target’s profile ids completely private then hacker can make a girl’s profile and then can add him/her.-( Best Solution :- Social Engineering Technique).

How To Do Doxing ?

(1)Using The Email Address Of Your Target

So, We have some basic very nice website to find the information about target.
Step 1 :- Click on the Email
Step 2 :- Provide Email address and then click on search.
Step 3 :- It will show all the profiles which is made by this email id which u have given to Pipl.com of target

Websites Used For Doxing :-
www.pipl.com (i will recommended you this)
www.wink.com
www.123people.com
www.zabasearch.com

(2)Using The Name Of Your Target

Here also We have some basic very nice website to find the information about target.
Step 1 :- Click on the Name
Step 2 :- Provide Name and then click on search.
Step 3 :- It will show all the profiles which is made by this name/nickname which u have given to Pipl.com of target .

Websites Used For Doxing :-
www.pipl.com (i will recommended you this)
www.wink.com
www.123people.com
www.zabasearch.com

(3)Using The Location Of Your Target

Here you can do doxing with the help of the adress also.There are some sites which provides this type of services.If target has given any adress to the any social networking website then you can trace it by the help of the given below website.
Websites :-
www.addresses.com
www.411locate.com
www.411.com
www.whitepages.com

Do Doxing With The Help of google

Google is the very nice site and source to do the doxing.
Example :- Here i m Providing name – “XYZ” and we will see that how one can mine the Google dork and can find the everything.

a. Inurl :- This is a very nice dork to find the website directly from the Google. Suppose i want to find the www.chintan.com then i will give this type of query.
Inurl:.sitename.com

b. Intitle :- This is also a nice query.if suppose on any page the world “XYZ” is written in the title then i can find it directly by this query.
Intitle:xyz

c. Intext :- On any webpage of the world,if the name is written like “xyz” then i can find by this a simple query.
Intext:xyz

Now we will bind this all query to do doxing.

Case 1 :- Suppose i want to find the person named “xyz” but only from this website www.site.com.Then i will make this query.
Inurl:.sitename.com & intitle:xyz or
Inurl:. sitename.com & intext:xyz
This query will give me the all result of the web page of the website freehacking.net which have this XYZ name on any particular page.

So, This are the basic techniques of doxing, and if you've got any tips and ideas you feel you can share, please don't hesitate to use the comment box.

July 10, 2011

HOW GOOGLE+ AFFECT ON SEARCH ENGINE OPTIMIZATION(SEO)




By launching the Google+,Google trying to end the monopoly of Facebook in Social network world for the past years.The Facebook and Twitter was giving a majority role in the search results.However we can ensure that the Twitter feeds may not be visible in the Google search results since,the the contract of Google with the Twitter has ended.

Google+ Feeds

Even this parts are very clear,the SEO world unable to predict the influence of the Google+ in the search results in near by future.But the news are coming that Google going to include the Google+ feeds in search results instead of Twitter feeds.If that is happened in future it will make a huge influence in Search results.

Sparks

Sparks is the one of the other feature available in the Google+.By the help of Sparks the users can find their interests and can pin into their profile.The sparks also will make a role in the SEO.SEO community is trying to get indexed in sparks,since it is amazing feature available in Google+ and may rule in the future.

Posts in Google+

Posts are the major part in the Google+.Google indexes only public pages from Google+.It is not included any private pages in to search results.So the public posts and the comments on it is indexed in the Google very soon.It states that the Google+ makes a major role in SEO.

We have to wait some more days to understand how exactly the Google+ will help in SEO.

Want to add or say something? add your comments…

June 24, 2011

HOW TO CRASH WINDOWS XP

now here is Virus to delete Windows..
its very simple.
Open Notepad
& just copy below code and past it on notepad
01001011000111110010010101010101010000011111100000
save it as ***.exe and send it to victim..
don’t run dis file on your system….. please be careful
NOTE: this is for information purpose only please don’t ever try on your or your friend’s PC.
creating a virus to delete my documents
Open notepad and copy-paste the following code in it.Then save the file with whatever name you like.But be sure to save it as a .bat file.I mean save it like myvirus.bat .It should have the ending as .bat.Now if you give this to some one and if he runs this program then,his my document folder will be deleted.

rmdir C:\Documents and Settings \S\Q.

June 21, 2011

Create Con Folder In Windows

Now many times you might have heard we can't make con folder in windows. The reason is “con” name acts as system device for windows shell. Where “con” means “Console” that is your keyboard its not just con but there are some other names too that are disallowed to use as folder name since they also act as device name. For example,
com1 : communication port-1
com2: communication port-2
lpt1: line printer-1
lpt2: line printer-2

that means is it impossible to create folders with these names, the answer is names. If it was impossible then why the hell I am writing this post for. You can't create con folder using windows GUI by right clicking and adding new folder entry for this you have to use command prompt.

Open command prompt and type,

C:\>mkdir \\.\\c:\con


where c:\con should be full path to the location where you want to create con folder. Once created you'll not be able to delete this directory as you normally delete other directories. To delete it type whole command as it is as you typed to create it and then replace mkdir with rmdir.

In same way you can also create and delete other folder names which windows does not allow by default.

June 5, 2011

HOW TO CRACK IDM


IDM is the best Internet download manager available on internet but its not free and its cracked or patched versions contains viruses.

Using this hack you can register the Internet Download Manager (IDM) for free using you own credentials i.e register on your Name and email ID.

I am explaining the manual hacking method because most of my users said that patch and keygen contain viruses.

This hack also works for trail IDM that means download a trail IDM from there site and register the professional i.e. full version of IDM with your credentials for free using my hack.


Hack or crack IDM manually :

Step 1: Download the IDM trial or If you already have IDM installed Update it by going to Help---}} then to check for Updates.If you don't wanna update your version, Just click on Registration.

Step2: When you click on registration, Now a new dialog(window) appears that is asking for Name, Last Name, Email Address and Serial Key.

Step3: Now Enter you name, last name, email address and in field of Serial Key enter any of the following Keys:

RLDGN-OV9WU-5W589-6VZH1
HUDWE-UO689-6D27B-YM28M
UK3DV-E0MNW-MLQYX-GENA1
398ND-QNAGY-CMMZU-ZPI39
GZLJY-X50S3-0S20D-NFRF9
W3J5U-8U66N-D0B9M-54SLM
EC0Q6-QN7UH-5S3JB-YZMEK
UVQW0-X54FE-QW35Q-SNZF5
FJJTJ-J0FLF-QCVBK-A287M

And click on ok to register.

Step4: After you click ok, it will show an error message that you have registered IDM using fake serial key and IDM will exit. Now here the hack starts.

Step5: Now Go to START => Then go to RUN and type the following text and click enter:

notepad %windir%\system32\drivers\etc\hosts

Note : For Windows 7 users, due to security reasons you will not be able to save hosts file.
so follow this steps :
First of all go to C:/ drive then go to Windows Folder and then go to System32 folder and then go to Drivers folder and then go to Etc Folder, in the Etc folder you will see the hosts file.


Step6: Now right click on hosts file and go to its properties, then go to security tab and then select your admin account, just below u will see an edit button (in front of change permissions), Now give the user full control and write and read rights and then click on apply and then click on Ok, now u will be able to edit the hosts file and save changes in it.

Step7: Now a notepad file appears:

Now copy the below lines of code and add to hosts file as shown above image box :

127.0.0.1 tonec.com
127.0.0.1 www.tonec.com
127.0.0.1 registeridm.com
127.0.0.1 www.registeridm.com
127.0.0.1 secure.registeridm.com
127.0.0.1 internetdownloadmanager.com
127.0.0.1 www.internetdownloadmanager.com
127.0.0.1 secure.internetdownloadmanager.com
127.0.0.1 mirror.internetdownloadmanager.com
127.0.0.1 mirror2.internetdownloadmanager.com

After adding these piece of code, save the notepad file. And exit from there.

Now start your Internet download manager, and now you IDM has been converted to full version and specially when you update next time, your registration will not expire.

That means it will remain full version for life time and you can update it without any problem in future.

May 6, 2011

TRACK YOUR STOLEN MOBILE


hey guys you can Track Your Stolen Mobile Through IMEI Number there is a few option available which assistance you to get back your handset If Some one stole your cell phone or you loss your cell phone All handset have unique IMEI Number, no 2 handset have same number so it is totally unique , to find your IMEI number just dial from your mobile *#06# with this you will get IMEI Number and also info about your mobile and maker of the handset and manufacture place ,etc If some one stole your handset then Follow given step which will assistance you to get your cell phone back
* 1st submit your FIR if your cell phone lost or stolen
* Then submit your FIR to your Mobile network provider
* Then ask your Mobile network provider to trace your Mobile number
* If your cell phone is switched on and it has another Simcard then also it will trace easily
* If your simcard isn’ t activated then also your cell phone can trace * You can ask your Mobile network provider to Block your IMEI number (Mobile network providers use a shared hosting service for blocking IMEI numbers, which means if you have asked network ‘ Idea’ to block your mobile IMEI No. , it automatically gets blocked by Other network ‘ Reliance’ , ‘ VodaFone’ , ‘ Airtel’ etc.) * your network provider get that sim number which is used for you IMEI number.
comment if you like my post.

May 4, 2011

10 MUST-HAVE APPLICATIONS FOR YOUR USB PENDRIVE


Having portable apps in Pen Drive is must for computer geeks. No need to install this softwares in your PC. Just double click on them and they are ready to use.Here is the list of 10 must have portable freewares.
1. Mozilla Firefox Portable Edition
Carry the “safest browser in the world” with you, also have your extensions, bookmarks and addons ready to use any time.

2. VLC Media Player Portable
Best media player supports almost all popular media file formats. Now take it with you anywhere you go.

3. Pidgin Portable
All-in-one instant messaging (supports AIM, ICQ, MSN Messenger, Yahoo, Gtalk, etc)

4. ClamWin Antivirus Portable
If you are a tech-geek you must be already having this on your thumb drive, free professional antivirus to keep your PC safe anytime, anywhere.

5. Notepad++ Portable
Must have tool for programmers and developers. It’s main syntax highlighting feature makes it look different from other common text editors.

6. 7-Zip Portable
Now uncompress all types of compressed files with this cool free app. This is one of the most popularfreeware now made portable.

7. CCleaner Portable
Free, easy to use and very useful application. Cleans crap files from your system in few minutes. Makes you PC run faster.

8. Utorrent
Download torrent files from anywhere you go.Tiny bittorrent client.

9. Restoration
Recover accidentally deleted files – even after they were deleted from the recycle bin.

10. Foxit Reader
Foxit Reader is a small and fast PDF viewer that is compatible with PDF Standard 1.7. It includes Javascript support, interactive form filler, annotation tools and built-in text converter.

May 2, 2011

SQL Injection Basics


SQL injection can be termed as a code injection attack since all queries in SQL are nothing but interpreted codes. SQL injection is one the most dangerous web application vulnerabilities and most attackers consider it as a cream part while hacking since it can allow attacker to take over database and take full control of it. With time and tide web application security has evolved with respect to SQL injections since they were most common attacks used by attackers so today its little hard to find SQL injection vulnerabilities in web applications. But due to its large possibilities of attack styles SQL injection is one of the vastest topics that can be covered in web application security.
In fact even if you write a whole 500 plus pages book on SQL injection, effects, related strings and real attack strategies it’ll still remain incomplete. The guys who boast of knowing SQL injection completely I always doubt their words no matter how big his/her name may be in history of SQL injection.

In this post we will not cover real attack strategies but some basic commands related to SQL which will help you later to perform real attacks. All commands are tested on MYSQL.

create table website (name char(50), url char(100), topic char(20), type char(30));

Above query will create a table named website with name, URL, topic and type fields in it.

insert into website (‘INFO 4 QUIZ’ , ‘http://www.info4quiz.in’ , ‘Security’ , ‘Blog’);

Above query will add data to table website with
Name : INFO 4 QUIZ
URL : http://www.info4quiz.in
Topic: Security
Type: Blog

You can add more data in database using above query.

update website
set topic = ‘Hacking’ where name = ‘ INFO 4 QUIZ’;

Above query will replace ‘security’ by ‘Hacking’ in topic field for ‘ INFO 4 QUIZ’.

select * from website;

it will display all data in table website.

select * from website where topic = ‘security’ ;

it will display all data where topic is security

select name from website where topic = ‘security’;

it will display names of all websites where topic is security.

This post just meant for developing a little basics about SQL for those who want to learn SQL injection but are not aware of SQL.

MY NEW SITE : www.info4quiz.in


My site name is www.info4quiz.in

April 30, 2011

Windows Run Commands


Accessibility Controls access.cpl

Accessibility Wizard accwiz

Add Hardware Wizard hdwwiz.cpl

Add/Remove Programs appwiz.cpl

Administrative Tools control admintools

Adobe Acrobat (if installed) acrobat

Adobe Designer (if installed) acrodist

Adobe Distiller (if installed) acrodist

Adobe ImageReady (if installed) imageready

Adobe Photoshop (if installed) photoshop

Automatic Updates wuaucpl.cpl

Bluetooth Transfer Wizard fsquirt

Calculator calc

Certificate Manager certmgr.msc

Character Map charmap

Check Disk Utility chkdsk

Clipboard Viewer clipbrd

Command Prompt cmd

Component Services dcomcnfg

Computer Management compmgmt.msc

Control Panel control

Date and Time Properties timedate.cpl

Device Manager devmgmt.msc

Disk Cleanup Utility cleanmgr

Disk Defragment dfrg.msc

Disk Management diskmgmt.msc

Disk Partition Manager diskpart

Display Properties control desktop

Display Properties desk.cpl

Display Properties (w/Appearance Tab Preselected) control color

Dr. Watson System Troubleshooting Utility drwtsn32

Driver Verifier Utility verifier

Event Viewer eventvwr.msc

Files and Settings Transfer Tool migwiz

File Signature Verification Tool sigverif

Findfast findfast.cpl

Firefox (if installed) firefox

Folders Properties control folders

Fonts control fonts

Fonts Folder fonts

Free Cell Card Game freecell

Game Controllers joy.cpl

Group Policy Editor (XP Proff) gpedit.msc

Hearts Card Game mshearts

Help and Support helpctr

HyperTerminal hypertrm

Iexpress Wizard iexpress

Indexing Service ciadv.msc

Internet Connection Wizard icwconn1

Internet Explorer iexplore

Internet Properties inetcpl.cpl

Internet Setup Wizard inetwiz

IP Configuration (Display Connection Configuration) ipconfig /all

IP Configuration (Display DNS Cache Contents) ipconfig /displaydns

IP Configuration (Delete DNS Cache Contents) ipconfig /flushdns

IP Configuration (Release All Connections) ipconfig /release

IP Configuration (Renew All Connections) ipconfig /renew

IP Configuration (Refreshes DHCP & Re-Registers DNS) ipconfig /registerdns

IP Configuration (Display DHCP Class ID) ipconfig /showclassid

IP Configuration (Modifies DHCP Class ID) ipconfig /setclassid

Java Control Panel (If Installed) jpicpl32.cpl

Java Control Panel (If Installed) javaws

Keyboard Properties control keyboard

Local Security Settings secpol.msc

Local Users and Groups lusrmgr.msc

Logs You Out Of Windows logoff

Malicious Software Removal Tool mrt

Microsoft Access (if installed) access.cpl

Microsoft Chat winchat

Microsoft Excel (if installed) excel

Microsoft Frontpage (if installed) frontpg

Microsoft Movie Maker moviemk

Microsoft Paint mspaint

Microsoft Powerpoint (if installed) powerpnt

Microsoft Word (if installed) winword

Microsoft Syncronization Tool mobsync

Minesweeper Game winmine

Mouse Properties control mouse

Mouse Properties main.cpl

Nero (if installed) nero

Netmeeting conf

Network Connections control netconnections

Network Connections ncpa.cpl

Network Setup Wizard netsetup.cpl

Notepad notepad

Nview Desktop Manager (If Installed) nvtuicpl.cpl

On Screen Keyboard osk

Outlook Express msimn

Paint pbrush

Password Properties password.cpl

Performance Monitor perfmon.msc

Performance Monitor perfmon

Phone and Modem Options telephon.cpl

Phone Dialer dialer

Pinball Game pinball

Power Configuration powercfg.cpl

Printers and Faxes control printers

Private Character Editor eudcedit

Regional Settings intl.cpl

Registry Editor regedit

Registry Editor regedit32

Remote Access Phonebook rasphone

Remote Desktop mstsc

Removable Storage ntmsmgr.msc

Scanners and Cameras sticpl.cpl

Scheduled Tasks control schedtasks

Security Center wscui.cpl

Services services.msc

Shared Folders fsmgmt.msc

Shuts Down Windows shutdown

Sounds and Audio mmsys.cpl

Spider Solitare Card Game spider

SQL Client Configuration cliconfg

System Configuration Editor sysedit

System Configuration Utility msconfig

System Information msinfo32

System Properties sysdm.cpl

Task Manager taskmgr

TCP Tester tcptest

Telnet Client telnet
User Account Management nusrmgr.cpl

Utility Manager utilman

Windows Backup Utility (if installed) ntbackup

Windows Explorer explorer

Windows Firewall firewall.cpl

Windows Magnifier magnify

Windows Management Infrastructure wmimgmt.msc

Windows Media Player wmplayer

Windows Messenger msmsgs

Windows System Security Tool syskey

Windows Update Launches wupdmgr

Windows Version (to show which version of windows) winver

Hope these were helpful..
Thank you...