Monday, February 27, 2006

Cross check you Doctor

You take your son to the doctor for a mild fever .He prescribes three or four drugs and also gives him an injection .Says he'll be alright

Nightmare starts in the night ,your son becomes alergic to the doctor's prescription and you rush him to a casualty unit somewhere and it takes him a week to recover.
So how do you verify whether the prescription the doctor gives you is right??

This is a question we all had at one point of time or the other,but didn't know the answer .No you are wrong.There is a book called CIMS manual which contains all the medicines and the drugs in all medicines available .

That should cost you a mere Rs 150/-.This can give you information to know what your doc is prescribing for you.I will tell you it is worth having it .I have one and strongly recommend you to buy one.


RBI directions on credit card

RBI / 2005-06 / 211

DBOD.FSD.BC. 49/ 24.01.011/ 2005-06

November 21, 2005

All Commercial Banks / NBFCs

(Excluding RRBs)

Dear Sir,

Credit Card Operations of banks

Pursuant to the announcement made in the Annual Policy Statement 2004-05, the Reserve Bank of India had constituted a Working Group on Regulatory Mechanism for Cards. The Group has suggested various regulatory measures aimed at encouraging growth of credit cards in a safe, secure and efficient manner as well as to ensure that the rules, regulations, standards and practices of the card issuing banks are in alignment with the best customer practices. The following guidelines on credit card operations of banks have been framed based on the recommendations of the Group as also the feedback received from the members of the public, card issuing banks and others. All the credit card issuing banks / NBFCs should implement these guidelines immediately.

Each bank / NBFC must have a well documented policy and a Fair Practices Code for credit card operations. In March 2005, the IBA released a Fair Practices Code for credit card operations which could be adopted by banks / NBFCs. The bank / NBFC's Fair Practice Code should, at a minimum, incorporate the relevant guidelines contained in this circular. Banks / NBFCs should widely disseminate the contents thereof including through their websites, at the latest by November 30, 2005.

Guidelines for Implementation

1. Issue of cards

a. Banks / NBFCs should independently assess the credit risk while issuing cards to persons, specially to students and others with no independent financial means. Add-on cards i.e. those that are subsidiary to the principal card, may be issued with the clear understanding that the liability will be that of the principal cardholder.

b. As holding several credit cards enhances the total credit available to any consumer, banks / NBFCs should assess the credit limit for a credit card customer having regard to the limits enjoyed by the cardholder from other banks on the basis of self declaration/ credit information.

c. The card issuing banks / NBFCs would be solely responsible for fulfillment of all KYC requirements, even where DSAs / DMAs or other agents solicit business on their behalf.

d. While issuing cards, the terms and conditions for issue and usage of a credit card should be mentioned in clear and simple language (preferably in English, Hindi and the local language) comprehensible to a card user. The Most Important Terms and Conditions (MITCs) termed as standard set of conditions, as given in the Appendix, should be highlighted and advertised/ sent separately to the prospective customer/ customers at all the stages i.e. during marketing, at the time of application, at the acceptance stage (welcome kit) and in important subsequent communications.

2. Interest rates and other charges

a. Card issuers should ensure that there is no delay in dispatching bills and the customer has sufficient number of days (at least one fortnight) for making payment before the interest starts getting charged.

b. Card issuers should quote annualized percentage rates (APR) on card products (separately for retail purchase and for cash advance, if different). The method of calculation of APR should be given with a couple of examples for better comprehension. The APR charged and the annual fee should be shown with equal prominence. The late payment charges, including the method of calculation of such charges and the number of days, should be prominently indicated. The manner in which the outstanding unpaid amount will be included for calculation of interest should also be specifically shown with prominence in all monthly statements. Even where the minimum amount indicated to keep the card valid has been paid, it should be indicated in bold letters that the interest will be charged on the amount due after the due date of payment. These aspects may be shown in the Welcome Kit in addition to being shown in the monthly statement.

c. The bank / NBFC should not levy any charge that was not explicitly indicated to the credit card holder at the time of issue of the card and getting his / her consent. However, this would not be applicable to charges like service taxes, etc. which may subsequently be levied by the Government or any other statutory authority.

d. The terms and conditions for payment of credit card dues, including the minimum payment due, should be stipulated so as to ensure that there is no negative amortization.

e. Changes in charges (other than interest) may be made only with prospective effect giving notice of at least one month. If a credit card holder desires to surrender his credit card on account of any change in credit card charges to his disadvantage, he may be permitted to do so without the bank levying any extra charge for such closure.

3. Wrongful billing

a. The card issuing bank / NBFC should ensure that wrong bills are not raised and issued to customers. In case, a customer protests any bill, the bank / NBFC should provide explanation and, if necessary, documentary evidence to the customer within a maximum period of sixty days with a spirit to amicably redress the grievances.

b. To obviate frequent complaints of delayed billing, the credit card issuing bank / NBFC may consider providing bills and statements of accounts online, with suitable security built therefor.

4. Use of DSAs / DMAs and other agents

a. When banks / NBFCs outsource the various credit card operations, they have to be extremely careful that the appointment of such service providers do not compromise with the quality of the customer service and the bank / NBFC’s ability to manage credit, liquidity and operational risks. In the choice of the service provider, the bank / NBFCs have to be guided by the need to ensure confidentiality of the customer’s records, respect customer privacy, and adhere to fair practices in debt collection.

b. The Code of Conduct for Direct Sales Agents (DSAs) formulated by the Indian Banks’ Association (IBA) could be used by banks / NBFCs in formulating their own codes for the purpose. The bank / NBFC should ensure that the DSAs engaged by them for marketing their credit card products scrupulously adhere to the bank / NBFC’s own Code of Conduct for credit card operations which should be displayed on the bank / NBFC’s website and be available easily to any credit card holder.

c. The bank / NBFC should have a system of random checks and mystery shopping to ensure that their agents have been properly briefed and trained in order to handle with care and caution their responsibilities, particularly in the aspects included in these guidelines like soliciting customers, hours for calling, privacy of customer information, conveying the correct terms and conditions of the product on offer, etc.

5. Protection of Customer Rights

Customer’s rights in relation to credit card operations primarily relate to personal privacy, clarity relating to rights and obligations, preservation of customer records, maintaining confidentiality of customer information and fair practices in debt collection. The card issuing bank / NBFC would be responsible as the principal for all acts of omission or commission of their agents (DSAs / DMAs and recovery agents).

i. Right to privacy

a. Unsolicited cards should not be issued. In case, an unsolicited card is issued and activated without the consent of the recipient and the latter is billed for the same, the card issuing bank / NBFC shall not only reverse the charges forthwith, but also pay a penalty without demur to the recipient amounting to twice the value of the charges reversed.

b. Unsolicited loans or other credit facilities should not be offered to the credit card customers. In case, an unsolicited credit facility is extended without the consent of the recipient and the latter objects to the same, the credit sanctioning bank / NBFC shall not only withdraw the credit limit, but also be liable to pay such penalty as may be considered appropriate.

c. The card issuing bank / NBFC should not unilaterally upgrade credit cards and enhance credit limits. Prior consent of the borrower should invariably be taken whenever there are any change/s in terms and conditions.

d. The card issuing bank / NBFC should maintain a Do Not Call Registry (DNCR) containing the phone numbers (both cell phones and land phones) of customers as well as non-customers (non-constituents) who have informed the bank / NBFC that they do not wish to receive unsolicited calls / SMS for marketing of its credit card products. The DNCR should be set up within two (2) months from the date of this circular and wide publicity should be given to the arrangement.

e. The intimation for including an individual’s telephone number in the Do Not Call Registry (DNCR) should be facilitated through a website maintained by the bank / NBFC or on the basis of a letter received from such a person addressed to the bank / NBFC.

f. The card issuing bank / NBFC should introduce a system whereby the DSAs/ DMAs as well as its Call Centers have to first submit to the bank / NBFC a list of numbers they intend to call for marketing purposes. The bank / NBFC should then refer to the Do Not Call Registry (DNCR) and only those numbers which do not figure in the Registry should be cleared for calling.

g. The numbers cleared by the card issuing bank / NBFC for calling should only be accessed. The bank / NBFC would be held responsible if a Do Not Call Number (DNCN) is called on by its DSAs / DMAs or Call Centre/s.

h. The card issuing bank / NBFC should ensure that the Do Not Call Registry (DNCR) numbers are not passed on to any unauthorised person/s or misused in any manner.

i. Banks / NBFCs/ their agents should not resort to invasion of privacy viz., persistently bothering the card holders at odd hours, violation of "do not call" code etc.

(ii) Customer confidentiality

a. The card issuing bank / NBFC should not reveal any information relating to customers obtained at the time of opening the account or issuing the credit card to any other person or organization without obtaining their specific consent, as regards the purpose/s for which the information will be used and the organizations with whom the information will be shared. Banks / NBFCs should satisfy themselves, based on specific legal advice, that the information being sought from them is not of such nature as will violate the provisions of the laws relating to secrecy in the transactions. Banks / NBFCs would be solely responsible for the correctness or otherwise of the data provided for the purpose.

b. In case of providing information relating to credit history / repayment record of the card holder to a credit information company (specifically authorized by RBI), the bank / NBFC may explicitly bring to the notice of the customer that such information is being provided in terms of the Credit Information Companies (Regulation) Act, 2005.

c. Before reporting default status of a credit card holder to the Credit Information Bureau of India Ltd. (CIBIL) or any other credit information Company authorized by RBI, banks / NBFCs may ensure that they adhere to a procedure, duly approved by their Board, including issuing of sufficient notice to such card holder about the intention to report him/ her as defaulter to the Credit Information Company. The procedure should also cover the notice period for such reporting as also the period within which such report will be withdrawn in the event the customer settles his dues after having been reported as defaulter. Banks / NBFCs should be particularly careful in the case of cards where there are pending disputes. The disclosure/ release of information, particularly about the default, should be made only after the dispute is settled as far as possible. In all cases, a well laid down procedure should be transparently followed. These procedures should also be transparently made known as part of MITCs.

d. The disclosure to the DSAs / recovery agents should also be limited to the extent that will enable them to discharge their duties. Personal information provided by the card holder but not required for recovery purposes should not be released by the card issuing bank / NBFC. The card issuing bank / NBFC should ensure that the DSAs / DMAs do not transfer or misuse any customer information during marketing of credit card products.

(iii) Fair Practices in debt collection

(a) In the matter of recovery of dues, banks / NBFCs may ensure that they, as also their agents, adhere to the extant instructions on Fair Practice Code for lenders (circular DBOD. Leg. No. BC. 104 /09.07.007 / 2002–03 dated May 5, 2003) as also IBA’s Code for Collection of dues and repossession of security. In case banks / NBFCs have their own code for collection of dues it should, at the minimum, incorporate all the terms of IBA's Code.

(b) In particular, in regard to appointment of third party agencies for debt collection, it is essential that such agents refrain from action that could damage the integrity and reputation of the bank / NBFC and that they observe strict customer confidentiality. All letters issued by recovery agents must contain the name and address of a responsible senior officer of the card issuing bank whom the customer can contact at his location.

(c) Banks / NBFCs / their agents should not resort to intimidation or harassment of any kind, either verbal or physical, against any person in their debt collection efforts, including acts intended to humiliate publicly or intrude the privacy of the credit card holders’ family members, referees and friends, making threatening and anonymous calls or making false and misleading representations.

6. Redressal of Grievances

a. Generally, a time limit of sixty (60) days may be given to the customers for preferring their complaints / grievances.

b. The card issuing bank / NBFC should constitute Grievance Redressal machinery within the bank / NBFC and give wide publicity about it through electronic and print media. The name and contact number of designated grievance redressal officer of the bank / NBFC should be mentioned on the credit card bills. The designated officer should ensure that genuine grievances of credit card subscribers are redressed promptly without involving delay.

c. The grievance redressal procedure of the bank / NBFC and the time frame fixed for responding to the complaints should be placed on the bank / NBFC's website. The name, designation, address and contact number of important executives as well as the Grievance Redressal Officer of the bank / NBFC may be displayed on the website. There should be a system of acknowledging customers' complaints for follow up, such as complaint number / docket number, even if the complaints are received on phone.

d. If a complainant does not get satisfactory response from the bank / NBFC within a maximum period of thirty (30) days from the date of his lodging the complaint, he will have the option to approach the Office of the concerned Banking Ombudsman for redressal of his grievance/s. The bank / NBFC shall be liable to compensate the complainant for the loss of his time, expenses, financial loss as well as for the harassment and mental anguish suffered by him for the fault of the bank and where the grievance has not been redressed in time.

7. Internal control and monitoring systems

With a view to ensuring that the quality of customer service is ensured on an on-going basis in banks / NBFCs, the Standing Committee on Customer Service in each bank / NBFC may review on a monthly basis the credit card operations including reports of defaulters to the CIBIL, credit card related complaints and take measures to improve the services and ensure the orderly growth in the credit card operations. Banks / NBFCs should put up detailed quarterly analysis of credit card related complaints to their Top Management. Card issuing banks should have in place a suitable monitoring mechanism to randomly check the genuineness of merchant transactions.

8. Right to impose penalty

The Reserve Bank of India reserves the right to impose any penalty on a bank / NBFC under the provisions of the Banking Regulation Act, 1949 for violation of any of these guidelines.

Yours faithfully

(P. Vijaya Bhaskar)

Chief General Manager

Avoid wireless attacks through your Bluetooth cell phone

How to Avoid wireless attacks through your Bluetooth cell phone

Published: September 22, 2005

Bluetooth® wireless technology is included with many cell phones and PDAs. It was initially designed to let you swap documents between other Bluetooth devices without the use of annoying connecting cables, but has since expanded to provide services such as Web connectivity and online game playing. However, any time you transmit information online, you can be vulnerable to online attack; and as the popularity of Bluetooth increases, so does its interest to cybercriminals.

The Bluetooth process and vulnerability

When it's set to "discoverable" mode, your Bluetooth cell phone or PDA sends a signal indicating that it's available to "pair" with another Bluetooth gadget and transmit data back and forth. However, an attacker who detects this signal could also attempt to pair with your device and hack in to steal your personal identification number (PIN). You could remain blissfully unaware, while the attacker, with your PIN in hand, could be:

Stealing information stored on your device, including contact lists, e-mail, and text messages.

Sending unsolicited text messages or images to other Bluetooth-enabled gadgets.

Accessing your mobile phone commands, which allows the attacker to use your phone to make phone calls, sent text messages, read and write phonebook contacts, eavesdrop on conversations, and connect to the Internet.

Installing a virus on your device that could wreak the same kind of havoc as a virus could on your computer—for example, slowing or disabling your service, or destroying or stealing information.

Criminals have also been known to drive around with Bluetooth detectors, looking for cell phones and PDAs to infiltrate; and to outfit laptop computers with powerful antennas in order to pick up Bluetooth signals from as far as a half-mile away. The latest forms of high-tech attack even include forcing Bluetooth devices to pair with the attacker's device when they are not in the discoverable mode. (It's also very labor-intensive, so targets tend to be individuals known to have a very large bank account or hold expensive secrets.)

Tips to improve your Bluetooth security

Keep your Bluetooth setting to "non-discoverable" (transmission-disabled) and only switch it to "discoverable" when you're using it. Just leaving your cell phone or PDA in the discoverable mode keeps it dangerously open for Bluetooth transmission—a Bluetooth user within up to a 30-foot range can receive your signal and potentially use it to access your device as you walk around town, drive, or even walk through your office.

Use a strong PIN code. Codes of five digits or longer are harder to crack.

Avoid storing sensitive data such as your social security number, credit card numbers, and passwords on any wireless device.

Stay up-to-date on Bluetooth developments and security issues, and regularly check with the manufacturer of your device for news on software updates or any specific security vulnerabilities.

More Bluetooth tidbits

Q: Why is this technology called Bluetooth?

A: Just as Bluetooth wireless technology links two different gadgets together, the 10th century Danish king Harald "Blatand" united the separate kingdoms of Denmark and Norway. "Blatand" loosely translates to "Bluetooth" in English.

Q: What does it mean when someone gets "Bluejacked"?

A: "Bluejacking" is one of many terms of Bluetooth attack jargon:

Bluejacking: sending unsolicited text messages

Bluesnarfing: stealing information

Bluebugging: stealing mobile phone commands

War-nibbling: driving around looking for Bluetooth signals to attack

Bluesniping: using a laptop and powerful antenna to attack from a distance

Take care of your valuable things

True story:


This lady has changed her habit on the hand phone after her handbag was stolen.

Her handbag which contained her mobile, credit card, purse..Etc....was stolen. 20min later when she called her hubby, telling him what happened. Husband says "I've just received your SMS asking about your Pin number. And I've replied a little while ago".

When they rushed down to the bank. Bank staff told them all the money was already withdrawn. The pickpocket had actually used the stolen hand phone to sms "hubby" in the contact list and go t hold of the pin number. Within 20 mins he had withdrawn all the money from the bank account.

Morale of the lesson:

Do not disclose the relationship between you and the people in your contact list. Avoid using names like Home, Honey, Hubby, sweetheart, Dad, Mum etc..................and very importantly, when sensitive info is being asked thru SMS, CONFIRM by calling back.


Escape Earthquake -Triangle of life

EXTRACT FROM DOUG COPP'S ARTICLE ON THE:
"TRIANGLE OF LIFE"
Edited by Larry Linn for MAA Safety Committee brief on 4/13/04.

My name is Doug Copp. I am the Rescue Chief and Disaster Manager of the American Rescue Team International (ARTI), the world's most experienced
rescue team. The information in this article will save lives in an earthquake.

I have crawled inside 875 collapsed buildings, worked with rescue teams from 60 countries, founded rescue teams in several countries, and I am a member of many rescue teams from many countries. I was the United Nations expert in Disaster Mitigation for two years. I have worked at every major disaster! in the world since 1985, except for simultaneous disasters.

In 1996 we made a film which proved my survival methodology to be correct.
The Turkish Federal Government, City of Istanbul, University of Istanbul Case Productions and ARTI cooperated to film this practical, scientific test. We collapsed a school and a home with 20 mannequins inside. Ten mannequins did "duck and cover," and ten mannequins I used in my "triangle of life" survival method. After the
simulated earthquake collapse we crawled through the rubble and entered the building to film and document the results. The film, in which I practiced my survival techniques under directly observable, scientific conditions, relevant to building collapse, showed there would have been zero percent survival for those doing duck and cover.
There would likely have been 100 percent survivability for people using my method of the "triangle of life." This film has been seen by millions of viewers on televi! sion in Turkey and the rest of Europe, and it was seen in the USA, Canada and Latin America on the TV program Real TV.

The first building I ever crawled inside of was a school in Mexico City during the 1985 earthquake. Every child was under their desk. Every child was crushed to the thickness of their bones. They could have survived by lying down next to their desks in the aisles. It was obscene, unnecessary and I wondered why the children were not in the aisles. I didn't at the time know that the children were told to hide under something.

Simply stated, when! buildings collapse, the weight of the ceilings falling upon the objects or furniture inside crushes these objects, leaving a space or void next to them. This space is what I call the "triangle of life". The larger the object, the stronger, the less it will compact. The less the object compacts, the larger the void, the greater the probability that the person who is using this vo! id for safety will not be injured. The next time you watch collapsed buildings, on television, count the "triangles" you see formed. They are everywhere. It is the most common shape, you will see, in a collapsed building. They are everywhere.

TEN TIPS FOR EARTHQUAKE SAFETY

1) Most everyone who simply "ducks and covers" WHEN BUILDINGS COLLAPSE
are crushed to death. People who get under objects, like desks or cars, are
crushed.

2) Cats, dogs and babies often naturally curl up in the fetal position. You should too in an earthquake. It is a natural safety/survival instinct. You can survive in a smaller void. Get next to an object, next to a sofa, next to a large bulky object that will compress slightly but leave a void next to it.

3) Wooden buildings are the safest type of construction to be in during an earthquake. Wood is flexible and moves with the force of the earthquake. If the wooden building does collapse, l! arge survival voids are created. Also, the wooden building has less concentrated, crushing weight. Brick buildings will break into individual bricks. Bricks will cause many injuries but less squashed bodies than concrete slabs.

4) If you are in bed during the night and an earthquake occurs, simply roll off the bed. A safe void will exist around the bed. Hotels can achieve a much greater survival rate in earthquakes, simply by posting a sign on The back of the door of every room telling occupants to lie down on the floor, next to the bottom of the bed during an earthquake.

5) If an earthquake happens and you cannot easily escape by getting out the door or window, then lie down and curl up in the fetal position next to a sofa, or large chair.

6) Most everyone who gets under a doorway when buildings collapse is killed. How? If you stand under a doorway and the doorjamb falls forward or
backward you will be crushed by the ceiling ! above. If the door jam falls sideways you will be cut in half by the doorway. In either case, you will be killed!

7) Never go to the stairs. The stairs have a different "moment of frequency" (they swing separately from the main part of the building). The stairs and remainder of the building continuously bump into each other until structural failure of the stairs takes place. The people who get on stairs before they fail are chopped up by the stair treads – horribly mutilated. Even if the building doesn't collapse, stay away from the
stairs. The stairs are a likely part of the building to be damaged. Even if the stairs are not collapsed by the earthquake, they may collapse later when overloaded by fleeing people. They should always be checked for safety, even when the rest of the building is not damaged.

8) Get Near the Outer Walls Of Buildings Or Outside Of Them If Possible - It is much better to be near the outside of the building rat! her than the interior. The farther inside you are from the outside perimeter of the building the greater the probability that your escape route will be blocked;

9) People inside of their vehicles are crushed when the road above falls
in an earthquake and crushes their vehicles; which is exactly what happened
with the slabs between the decks of the Nimitz Freeway. The victims of the San Francisco earthquake all stayed inside of their vehicles. They were all killed. They could have easily survived by getting out and sitting or lying next to their vehicles. Everyone killed would have survived if they had been able to get out of their cars and sit or lie next to them. All the crushed cars had voids 3 feet high next to them, except for the cars that had columns fall directly across them.

10) I discovered, while crawling inside of collapsed newspaper offices and other offices with a lot of paper, that paper does not compact. Large voids are found surrounding stacks of paper.


Spread the word and save someone's life...

BEWARE of Mirrors

Have you seen recent advertisement of M/S SAINT GOBAIN GLASSES shown in TELEVISION'S?
- Then you must have known about 2 Way mirror & is also shown in Hindi Movie HUMRAAZ. How to determine if a mirror is 2 way or not .Not to scare you, but to make sure that you aware.

Many of the hotels and textile showrooms cheat the customers this way & watch privately. HOW TO DETECT A 2-WAY MIRROR When we visit toilets,bathrooms, hotel rooms, changing rooms, etc., how many of you know for sure that the seemingly ordinary mirror hanging on the wall is a real mirror, r actually a 2-way mirror i.e., they can see you, but you can't see them). There have been many cases of people installing 2-way mirrors in female changing rooms or bathroom or bedrooms. It is very difficult to positively identify the surface by just looking at it.

So, how do we determine with any amount of certainty what type of mirror we are looking at?

CONDUCT THIS SIMPLE TEST:

Place the tip of your fingernail against the reflective surface and if there is a GAP between your fingernail and the image of the nail, then it is a GENUINE mirror. However, if your fingernail DIRECTLY TOUCHES the image of your nail, then BEWARE, IT IS A 2-WAY MIRROR! (There is someone seeing you from the other side). So remember, every time you see a mirror, do the "fingernail test." It doesn't cost you anything.

It is simple to do. This is a really good thing to do. The reason there is a gap on a real mirror, is because the silver is on the back of the mirror UNDER the glass. Whereas with a two-way mirror, the silver is on the Surface. Keep it in mind! Make sure and check every time you enter in hotel rooms. May be someone is making a film on you.

Wednesday, February 08, 2006

113 Useful RUN Commands

To Access….

Run Command

Accessibility Controls

access.cpl

Add Hardware Wizard

hdwwiz.cpl

Add/Remove Programs

appwiz.cpl

Administrative Tools

control admintools

Automatic Updates

wuaucpl.cpl

Bluetooth Transfer Wizard

fsquirt

Calculator

calc

Certificate Manager

certmgr.msc

Character Map

charmap

Check Disk Utility

chkdsk

Clipboard Viewer

clipbrd

Command Prompt

cmd

Component Services

dcomcnfg

Computer Management

compmgmt.msc

Date and Time Properties

timedate.cpl

DDE Shares

ddeshare

Device Manager

devmgmt.msc

Direct X Control Panel (If Installed)*

directx.cpl

Direct X Troubleshooter

dxdiag

Disk Cleanup Utility

cleanmgr

Disk Defragment

dfrg.msc

Disk Management

diskmgmt.msc

Disk Partition Manager

diskpart

Display Properties

control desktop

Display Properties

desk.cpl

Display Properties (w/Appearance Tab Preselected)

control color

Dr. Watson System Troubleshooting Utility

drwtsn32

Driver Verifier Utility

verifier

Event Viewer

eventvwr.msc

File Signature Verification Tool

sigverif

Findfast

findfast.cpl

Folders Properties

control folders

Fonts

control fonts

Fonts Folder

fonts

Free Cell Card Game

freecell

Game Controllers

joy.cpl

Group Policy Editor (XP Prof)

gpedit.msc

Hearts Card Game

mshearts

Iexpress Wizard

iexpress

Indexing Service

ciadv.msc

Internet Properties

inetcpl.cpl

IP Configuration (Display Connection Configuration)

ipconfig /all

IP Configuration (Display DNS Cache Contents)

ipconfig /displaydns

IP Configuration (Delete DNS Cache Contents)

ipconfig /flushdns

IP Configuration (Release All Connections)

ipconfig /release

IP Configuration (Renew All Connections)

ipconfig /renew

IP Configuration (Refreshes DHCP & Re-Registers DNS)

ipconfig /registerdns

IP Configuration (Display DHCP Class ID)

ipconfig /showclassid

IP Configuration (Modifies DHCP Class ID)

ipconfig /setclassid

Java Control Panel (If Installed)

jpicpl32.cpl

Java Control Panel (If Installed)

javaws

Keyboard Properties

control keyboard

Local Security Settings

secpol.msc

Local Users and Groups

lusrmgr.msc

Logs You Out Of Windows

logoff

Microsoft Chat

winchat

Minesweeper Game

winmine

Mouse Properties

control mouse

Mouse Properties

main.cpl

Network Connections

control netconnections

Network Connections

ncpa.cpl

Network Setup Wizard

netsetup.cpl

Notepad

notepad

Nview Desktop Manager (If Installed)

nvtuicpl.cpl

Object Packager

packager

ODBC Data Source Administrator

odbccp32.cpl

On Screen Keyboard

osk

Opens AC3 Filter (If Installed)

ac3filter.cpl

Password Properties

password.cpl

Performance Monitor

perfmon.msc

Performance Monitor

perfmon

Phone and Modem Options

telephon.cpl

Power Configuration

powercfg.cpl

Printers and Faxes

control printers

Printers Folder

printers

Private Character Editor

eudcedit

Quicktime (If Installed)

QuickTime.cpl

Regional Settings

intl.cpl

Registry Editor

regedit

Registry Editor

regedit32

Remote Desktop

mstsc

Removable Storage

ntmsmgr.msc

Removable Storage Operator Requests

ntmsoprq.msc

Resultant Set of Policy (XP Prof)

rsop.msc

Scanners and Cameras

sticpl.cpl

Scheduled Tasks

control schedtasks

Security Center

wscui.cpl

Services

services.msc

Shared Folders

fsmgmt.msc

Shuts Down Windows

shutdown

Sounds and Audio

mmsys.cpl

Spider Solitare Card Game

spider

SQL Client Configuration

cliconfg

System Configuration Editor

sysedit

System Configuration Utility

msconfig

System File Checker Utility (Scan Immediately)

sfc /scannow

System File Checker Utility (Scan Once At Next Boot)

sfc /scanonce

System File Checker Utility (Scan On Every Boot)

sfc /scanboot

System File Checker Utility (Return to Default Setting)

sfc /revert

System File Checker Utility (Purge File Cache)

sfc /purgecache

System File Checker Utility (Set Cache Size to size x)

sfc /cachesize=x

System Properties

sysdm.cpl

Task Manager

taskmgr

Telnet Client

telnet

User Account Management

nusrmgr.cpl

Utility Manager

utilman

Windows Firewall

firewall.cpl

Windows Magnifier

magnify

Windows Management Infrastructure

wmimgmt.msc

Windows System Security Tool

syskey

Windows Update Launches

wupdmgr

Windows XP Tour Wizard

tourstart

Wordpad

write