HyperTerminal Linux PuTTY SSH Telnet TeraTerm Win 7 Win7 Windows Windows 7 Windows Vista Windows7

Alternatives to HyperTerminal in Windows 7 and Vista

Beginning with Windows Vista Microsoft removed HyperTerminal (aka HyperTerm & Hyper Terminal).  Of course, this means it isn’t in Windows 7 either. There are several options you can use to replace its functionality.

  • PuTTYMy Recommendation
    • PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator.
  • WinRS (Windows Remote Shell)
    • If you only need remote shell access, you can use WinRS which was introduced in Windows Vista. To get help and see execution options with WinRS, run winrs /? at a command prompt.
  • Telnet is a simple, text-based program that you can use to connect to other devices over your local network or over the Internet.  Telnet can be executed right from the command prompt, although you may have to enable it in Control Panel.
  • Phone and Modem Options can be used to troubleshoot modem problems
    • Open Phone and Modem Options by clicking the Start button, Control Panel, Hardware and Sound, finally Phone and Modem Options.
  • Realterm is a terminal program specially designed for capturing, controlling and debugging binary and other difficult data streams. It is far better for debugging comms than Hyperterminal. It has no support for dialing modems, etc – that is what hyperterminal does.
  • TeraTerm is another alternative to HyperTerminal.  Tera Term is a free software terminal emulator (communication program) which supports:
    • Serial port connections.
    • TCP/IP (telnet, SSH1, SSH2) connections.
    • IPv6 communication.
    • VT100 emulation and selected VT200/300 emulation.
    • TEK4010 emulation.
    • File transfer protocols (Kermit, XMODEM, ZMODEM, B-PLUS and Quick-VAN).
    • Scripts using the “Tera Term Language”.
    • Japanese, English, Russian and Korean character sets.
    • UTF-8 character encoding.

  • AbsoluteTelnet Telnet, SSH, and SFTP Client.  AbsoluteTelnet / SSH is a secure flexible terminal client that is suitable for developers, administrators, or deployment across the enterprise. It includes the industry standard SSH protocols to secure terminal session data across insecure environments such as the internet. Its new tabbed interface is a favorite among AbsoluteTelnet users.
  • XP’s Hyper Terminal
    • If you really want (or just can’t be without it) you can still use XP’s Hyper Terminal. Just copy the following two files from an existing XP, Windows 2000 or 2003 box or extract them from the installation CD’s of the previous OS’s: hypertrm.dll and hypertrm.exe. Although you could put them anywhere on the disk as installation is not required, you may want to place them in %SYSTEMROOT% (normally C:WindowsSystem32).
Linux RichCopy Robocopy Win 7 Win7 Windows Windows 7 Windows Vista Windows7

RichCopy – RoboCopy GUI (sort of) by Microsoft

RichCopy is a free utility from Ken Tamaru of Microsoft. The tool was first developed in 2001 and has been updated regularly to keep pace with evolving needs.  Worthy of note is that RichCopy is a multithreaded copying tool. That means that rather than copying one file at a time in serial order, RichCopy can open multiple threads simultaneously, allowing many files to be copied in parallel and cutting the total time required to complete the operation several times over. You can also pause and resume file copy operations, so if you lose network connectivity at any point, you can just pick up where you left off.

Of course, these are really just the simplest features of RichCopy. As the figure below shows, you also get a vast array of granular controls that allow you to customize all of those fancy aspects of your file copying —filtering files, saving attributes, adjusting cache size, and so on. If you regularly copy lots of files over the network or between various storage devices, these features will significantly ease your daily life.

Download RichCopy.

For those of you like me who prefer the command line see the following about RoboCopy:

Elin Nordegren Linux Tiger Woods Windows

Tiger Woods & Elin Nordegren latest family portrait

This is what happens when you piss off a hot wife by cheating!  Tiger Woods is a great guy, but he’s still human.  Can’t blame Elin Nordegren for beating the crap out of him.

Tiger Woods and Elin Nordegren have been married for five years and have two children.

The Angry Wife Golf Club Guide

Hibernate Linux Sleep Windows

What is the difference between Hibernate and Sleep in Windows 7

Hibernate takes a snapshot of everything in RAM (including any running applications) and saves it to the hard disk in the file c:hiberfil.sys, then shuts the computer down.  When the computer is restarted from hibernation it boots a bit faster than a normal power up from scratch. Hibernation does not consume any power while the computer is off.

Use: When the computer isn’t going to be used for an extended period, say several hours or more, like over night.

Sleep basically shuts down the computer except for some components like RAM, so the next time it is resumed, it will start very quickly. Note: sleep consumes a small amount of battery power.

Use: When the computer will be left for a short time, like at lunchtime or driving to or from work.


Cisco DDOS Linux netstat Security Windows

Detecting DoS / DDoS Attack on a Windows 2003 / 2008 Server

How do I detect a DDOS (Distributed denial of service) / DOS attack on a Windows Server 2003 / 2000 / 2008, XP, Vista or Windows 7? Can I use Linux netstat command syntax to detect DDoS attacks?

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users.

You can always use netstat command to get list of connections under Windows. Open command prompt by visiting Start > Run > Type “cmd” in box.

netstat is a command line utility which displays protocol statistics and current TCP/IP network connections in a system. Type the following command to see all connections:

netstat -noa


  1. n: Displays active TCP connections, however, addresses and port numbers are expressed numerically and no attempt is made to determine names.
  2. o: Displays active TCP connections and includes the process ID (PID) for each connection. You can find the application based on the PID on the Processes tab in Windows Task Manager.
  3. a: Displays all active TCP connections and the TCP and UDP ports on which the computer is listening.

You can use find command as filter to searches for a specific string of text in a file. In the following example you are filtering out port 80 traffic:

netstat -ano | find /c "80"

Find the IP address which is causing maximum number of connection and block it using Cisco firewall or IPSec. Another protective measurement is to harden the TCP/IP stack.

Further readings:

Linux Security Windows

Delete File Securely / Permanently Delete File Data in Windows

I know how to delete a file securely using GNU/Linux and Open source tools under Linux. I’m looking for DoD 5520.22-M or NNSA compliant delete utility under Windows. How do I delete a file permanently under Windows XP or Server operating system with NTFS; so that no one can retrieve my data?

Linux offers various programs such as shred or DOD 5220.22-M certified scrub utility.

sDelete: Permanently Delete File

You need to use SDelete which, implements the Department of Defense clearing and sanitizing standard DOD 5220.22-M, to give you confidence that once deleted with SDelete, your file data is gone forever. Download sDelete (47KB).
It works on following Microsoft operating systems:

  • Client: Windows XP and higher (including Windows 7 and Vista).
  • Server: Windows Server 2003 and higher.

Once downloaded open command prompt by visiting Start -> Run -> Type cmd and press [Enter] key.

To delete all data stored in a file called c:docsfinical.xls, enter:
sdelete -p 10 -z c:docsfinical.xls

To delete all data and files stored in a directory (folder) called c:docsexcel, enter:
sdelete -p 10 -z c:docsexcel

sDelete Quick help:

Usage: sdelete [-p passes] [-s] [-q] 
sdelete [-p passes] [-z|-c] [drive letter]
-c Zero free space (good for virtual disk optimization).
-p passes Specifies number of overwrite passes.
-s Recurse subdirectories.
-q Don't print errors (quiet).
-z Cleanse free space.

Eraser Open Source Free Software

Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP, Vista, Windows 2003 Server and DOS. Eraser is Free software and its source code is released under GNU General Public License. Uses the Guttmann (Default), Pseudorandom Data and US DoD 5220-22.M methods. Download Eraser software here.

A note about wiping a hard disk

Use Darik’s Boot and Nuke (“DBAN”) is a self-contained boot disk that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for bulk or emergency data destruction.

HostMonitor Linux Network Monitoring Networking Windows

Network Monitoring With Advanced Host Monitor by KS-Soft

HostMonitor is a highly scalable network monitoring software and it is suitable for small and enterprise-level networks.

You will progably say “There are dozens of programs like this“? That is right! But please check what HostMonitor offers and compare its power and flexibility to surprisingly low price:
  • using 62 test methods this software can check almost any parameter of your servers;
  • highly flexible action profiles allow you to start actions in predefined order depending on the test results;
  • HostMonitor creates various log files using different detail levels and file formats (Text, HTML, DBF and ODBC);
  • built-in Report Manager allows you to create and customize reports to your liking in a variety of ways;
  • using Remote Monitoring Agents for Windows, FreeBSD, Linux, NetBSD, OpenBSD and Solaris you may easily monitor remote networks;
  • Web Service, Telnet Service and Remote Control Console simplifies remote management;
  • and this is not all…  Advanced Host Monitor does much more!  
I have been using HostMonitor for years and love it.  It is flexible, easy to use and won’t break the bank.  Check it out.
iPhone iPod iTouch Linux Windows

How to type accented characters on iPhone and iPod Touch

If you find yourself needing to type an accented character (acutes, graves, umlauts, etc.), all you have to do is hold down the relevant key for a couple of seconds and voilà a nice pop-up menu will appear with the available choices. The trick works for a number of different characters besides the vowels (e.g. ‘z’ and ‘?’) and this works as well on the iPod touch.

iPhone Linux Windows

Add mobile websites to your iPhone’s home screen

Many websites and services offer great mobile versions without being packaged in an App Store application. If you want to be able to quickly access these sites from your home screen, follow these steps:

  1. Launch Safari on your iPhone
  2. Browse to a desired mobile site (most sites will automatically redirect you to the mobile version once they determine that you’re using an iPhone)
  3. Click the Favorites (+) button at the bottom of Safari
  4. Click “Add to Home Screen”
  5. Type a name for the icon that will appear on your home screen
  6. Click the “Add” button

You will now see an icon on your home screen that will take you directly to the mobile website.

iPhone Linux Windows Wipe Data

How to Wipe Your iPhone of all Personal Data

Clearing all of the data from your iPhone is simple.

  1. Go to Settings
  2. Tap on General
  3. Scroll all the way down and tap Reset
  4. Choose Erase All Content and Settings
  5. Enter passcode (if you’re using one)
  6. Select Erase iPhone (twice), confirming that you REALLY want to lose everything

Make sure you have it plugged in, as the process will take quite a long time, “about an hour” according to the warning. But, believe me, it is time well spent!

Once the process is complete, you’ll be left with a “factory fresh” installation of the iPhone OS with no trace of you or your data.