CSS Forums

CSS Forums (http://www.cssforum.com.pk/)
-   Computers and Technology (http://www.cssforum.com.pk/off-topic-section/computers-technology/)
-   -   PC_Tweaks (http://www.cssforum.com.pk/off-topic-section/computers-technology/28114-pc_tweaks.html)

Waseemtabish Sunday, October 25, 2009 09:51 AM

PC_Tweaks
 
[B]Basics Of Dual-Core Process Computer[/B]

The computer has been one of the most amazing and fruitful discoveries man has ever made. It has revolutionized the way man does his things. The way he eats, drinks, sleeps and even thinks. And computer itself has evolved over the years. From the Eniac I to the hand-held palmtops in executives` hands today, computer has changed with the technology. And it has changed our lives too.

The latest addition to this revolution of technical upgrading of computers is the dual-core processor technology. It refers to the CPU (Central Processing Unit- the brains of the computer) that possesses two independent and complete execution cores for each of its two processors. The concerned CPU contains two combined processors along with their cache memories and their respective controllers integrated into a singular circuit (commonly known as a silicon chip).
The dual-core process computer is suited to multitasking and handling miscellaneous tasks (often unrelated to each other). Because its CPU has two completely independent execution cores and both have independent interfaces to the front bus, it has excellent capacity to execute several programs and tasks simultaneously. Similarly, dual-core process computers may have more processor cores which is actually named as a multi-core process computer. These are highly efficient machines to conduct intensive tasks of computing or program execution at the same instance of time.

The Pentium dual-core process computer is the most preferred brand of computer in the market. It has x86-architectured microprocessors integrated onto its circuit. The 32-bit Yonah processors are a base for mobile computers while the 64-bit Allendale processors are maintained for the desktop computers. Both have absolutely different architecture as far as microprocessor technical build is concerned.

By early 2007, Intel decided to launch dual-core process computers in the field of notebooks or laptops too. This was a very important and vital decision as there were no other rivals in this phase if the market of computer architecture. Intel had only decided to launch the dual-core process computer system applying to notebooks on the behest of notebook or laptop manufacturers. The first processors to appear in notebooks using the dual-core process computer technology were the Pentium T2060, T2080 and a 32-bit Pentium M based on the Yonah core with a 1 MB L2 cache, instead of the usual 2MB cache memory.

Intel had forced a return of the Pentium brand to the market arena on 2006 with a host of low-cost single core Conroe-L core architecture processors with a 1 MB cache. These were numbered `1` to distinguish them from dual core process computer cores that had been labeled with the digit `2`.

More recently, on June 3, 2007, Intel released desktop dual-core processors from the Pentium brand. They were named as E2140 and E2160. September 2007 saw the late release of a better and updated model named E2180. These processors support the Intel64 extensions, because of their Allendale derived Core architecture. The power of these dual-core process computers was very imminent as most companies` demands exceeded supply over these multi-processor machines.

Dual-core process computer systems have taken over the world of computing today. As of its multi-tasking ability, it has gained world-wide acclaim due to its efficient, quick and yet superior quality program execution and task completion abilities. Heavier programs and complex games may be run with these dual-core process computer systems at the regular pace of conventional single-core processor systems did with light programs on the execution chart.

The age of computers had begun a long time back. But the age of sleek and efficient computing with the help of razor-edge technology has just begun with the dual-core process computer systems.

Waseemtabish Sunday, October 25, 2009 09:52 AM

Increasing The Life Of Hard Disk
 
[B]Increasing The Life Of Hard Disk[/B]

Taking care of your hard disk is important because this is the place where all the data is stored and once the hard disk crashes, data in most cases is not recoverable. There are data recovery softwares and programs which recover data from crashed hard disks but that is not for normal computer users.

But why do hard disks crash and what can be done to prevent them from crashing?. At the same time how can a hard disk be made more efficient? Here are the answers.

Hard disks crash due to many reasons. Voltage fluctuations, physical impact, improper alignment and of course mechanical failure due to wear and tear of internal parts. Let us start one by one and get the answers to the above problems.

1. Voltage fluctuations or spikes as they are called can be prevented by using voltage stabilizers or spike guards. This will limit the damage to the hard disk to a great extent.

2. Physical impact can be prevented by handling the hard disk carefully when installing/ re-installing. When installing the hard disk care should be taken to see that it sits perfectly horizontal and that it does not vibrate or shake once the computer is started.

3. The natural wear and tear of parts can be limited by defragmenting your hard disk from time to time.But what is defragmentation? All newly created files are stored in various places on the hard disk in a single cluster ( contiguous file ). But, as the number of files and programs increase, these files are not stored as one contiguous file but broken down and scattered in various places on the hard disk. In short files get fragmented. When these files are accessed by the user, the head on the hard disk moves to and fro to locate these fragments. These fragmented files puts lot of mechanical pressure on the internal parts of the hard disk. This leads to crashes. To start disk defragmenter from the start menu, click the start button and follow this path (All Programs / Accessories / System Tools / Disk Defragmenter). A minimum of 15 percent free space on your disk is needed for disk defragmenter to run. The disk can also be defragmented automatically by using schedule task. This program can can be accessed via system tools.

4. Power management tool can also be used to enhance the life of hard disk. To access this program go to start / control panel / power options and set the parameters for various hardware devices.

5. Disk cleanup increases the efficiency of the hard disk. So delete unwanted files and programs regularly.

Follow the above rules to increase the life of you hard disk.

Waseemtabish Sunday, October 25, 2009 09:53 AM

10 Reasons Why PCs Crash
 
[B]10 Reasons Why PCs Crash[/B][SIZE="7"][/SIZE]

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1 Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is [url]www.driverguide.com[/url]. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4 Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5 Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6 Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates ( [url]www.nai.com[/url]). Another is Norton AntiVirus 2000, made by Symantec ( [url]www.symantec.com[/url]).

7 Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8 Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from [url]www.jv16.org[/url]

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

9 Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from [url]www.computernerd.com[/url] or [url]www.coolit.com[/url]

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10 Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

Waseemtabish Sunday, October 25, 2009 09:54 AM

Top 20 Tips To Keep Your System Faster
 
[B]Top 20 Tips To Keep Your System Faster[/B]

Follow these tips and you will definitely have a much faster and more reliable PC! Most of the below tips works for windows XP

1. Wallpapers:
They slow your whole system down, so if you're willing to compromise, have a basic plain one instead!

2. Drivers:
Update your hardware drivers as frequently as possible. New drivers tend to increase system speed especially in the case of graphics cards, their drivers are updated by the manufacturer very frequently!

3. Minimizing:
If you want to use several programs at the same time then minimize those you are not using. This helps reduce the overload on RAM.

4. Boot Faster:
The 'starting Windows 95/98' message on startup can delay your booting for a couple of seconds. To get rid of this message go to c:\ and find the file Msdos.sys. Remove the Read-Only option. Next, open it in Notepad or any other text editor. Finally, go to the text 'Options' within the file and make the following changes: Add BootDelay=0. To make your booting even faster, set add Logo=0 to remove the Windows logo at startup.

5. Restart only Windows:
When restarting your PC, hold down Shift to only restart Windows rather than the whole system which will only take a fraction of the time.

6. Turn Off Animations:
Go to Display Settings from the Control Panel and switch to the Effects Tab. Now turn off Show Windows Content While Dragging and Smooth Edges on Screen Fonts. This tip is also helpful with Windows XP because of the various fade/scroll effects.

7. Faster Start-Menu Access:
Go to the Start menu and select Run. Now type Regedit and hit Enter. The Registry Editor will appear on the screen. Now, open the folder HKEY_CURRENT_USER\Control Panel\Desktop. You should see a MenuShowDelay value. If you don't then do the following: right click on a blank space in the right pane and select New\String. Change the name in the new value to MenuShowDelay. Now that we have the MenuShowDelay value, double click on it and enter 0 in the value data field. This sets the start menu delay to 0 milliseconds.

8. Resolutions:
If you are willing to do anything for faster performance from your PC, then try lowering your display resolution. The lower it is, the faster your PC.

9. Turn off Active Desktop:
Go to your Display Properties and switch to the Web tab. Uncheck View My Active Desktop As a Web Page. Since the Active Desktop option under Windows 98 uses a lot of system resources, this option can have a dramatic effect on the speed of the whole system.

10. Defragment Often:
Windows 98's Defrag tool uses Application Acceleration from Intel which means that when you defragment your drive, data is physically arranged on the drive so that applications will load faster.

11. Take your PC to Bed:
Using the Advanced Power Management feature under Windows 98 gives you the option to use the sleep command. That way, you can send your PC to sleep instead of shutting it down and then restarting it. It's as simple as pressing a button and then pressing the same button to wake it up. You can tell Windows after how many minutes/hours of inactivity to automatically sleep the machine in the Advanced Power Management section of the Control Panel.

12. Faster Internet Access:
If you use the internet for reference and the sites you visit are rarely updated then try the following. In IE (the same can be done in Netscape) go to Tools, Internet Options. Next, click on Settings in the Temporary Internet Files section. Finally, select Never for the first option and double the amount of storage space to use, click OK!

13. Benchmarking:
Benchmarking can be very useful when run frequently. It can tell you how your PC's components are performing and then compare them to other machines like yours. For example, when you overclock your PC, you want to know how much more speed you have and whether it is stable. All this and more can be discovered using benchmarking. An excellent piece of software for doing this job is SiSoft Sandra which can be found in the Downloads File Archive!

14. Refresh the Taskbar without restarting:
If you in some way change the taskbar, either in Regedit or elsewhere, you can refresh the task bar without restarting. Hold down Ctrl Alt Del, and double click on Explorer. Say Yes to close Explorer, but no to closing Windows. This will refresh the Taskbar and system tray.

15. Quick CD Eject:
Instead of pushing the button on your drive, right-click your CD drive letter in My Computer and click on Eject. This will also remove any icons that have become associated with the CD drive.

16. Start Up Programs:
Windows can be slowed down when programs run on start up. To eliminate this, check your Start up folder. You can access it from the start menu: Start, Programs, Start Up. Another way to eliminate programs from loading even before Windows actually starts is by doing the following: Click on Start, then Run. Type msconfig. It will take quite a long time for this program to load, but when you finally see it on your screen, explore the different tabs. They all have to do with how quickly your PC boots, so select what you want, and uncheck what you don't want!

17. Fonts:
When Windows starts, it loads every single font in the Fonts folder. Therefore, the more fonts you have, the slower the booting process. To get rid of unwanted fonts, simply go to the Fonts folder under c:\windows and remove whatever you don't want. Fonts that have a red letter 'A' as their icon are system fonts, so don't delete them.

18. Stretching Wallpapers:
Don't "stretch" your wallpaper in Windows 98 since it actually slows Windows down when you drag icons around on the desktop.

19. RAM Matters:
If you have less than 32MB then you should seriously think of upgrading it to at least 64MB. Windows runs much more smoothly with 64MB or higher and tends to use less hard disk space for virtual memory.

20. Partitioning:
A very nice little thing you can do to boost system performance. By partitioning your hard drive, splitting one physical drive into several logical ones, you can gain several advantages.
1. If you get a virus or you accidentally format a drive, not all will be lost.
2. By placing the swap file (Win386.swp) on a separate drive, The swap file will be less fragmented and thus, faster.
3. Place Windows on a separate drive and whenever you need to reinstall it, you rest assured that your data is safe on a separate drive.
Partitioning can be done using a few programs such as FDisk which comes with DOS.
However, FDisk formats everything on the hard disk before partitioning. Alternatively, you can use Partition Magic fromPower Quest to partition your hard disk without losing your data.

Waseemtabish Sunday, October 25, 2009 09:56 AM

How to find drivers for Unknown Devices
 
Most of U members often seen or faced some problems in finding drivers specially of unknown devices. I almost tried maximum drivers guides etc but they are not that much effective as the following method is. I by my self use this method for my self. This method I got from google 1st time & now I am fully utilizing it when ever I need to find unknown devices drivers.

1. Open Device Manager (Control Panel>System>Hardware>Device Manager)
2. The hardware whose drivers are missing will appear as Unknown device, so it's easier to locate the device.
3. Right click on the unknown device and click on Properties.
4. Under the Properties window click on Details tab and select Device Instance Id from the drop down box.
5. You should see a code similar to this

PCI\VEN_8086&DEV_27DC&SUBSYS_30868086
&REV_01\4&1E46F438&0&40F0

6. The portion of the code highlighted in RED is the Vendor ID and the portion highlighted in GREEN is the Device ID. In this example:

Vendor ID = 8086
Device ID = 27DC
7. Once you have obtained both the IDs open the given site & put ur vendor ID & Device ID there & u will get full detail & model number of that unknown device so just by typing that device name correctly in google U can get exect drivers of ur unknown devices



Code:
[url]www.pcidatabase.com[/url]

Waseemtabish Sunday, October 25, 2009 09:57 AM

1 Attachment(s)
Sometimes online you need to know your IP address. This is the address which identifies your computer on the Internet, and it's how information you request gets sent to you correctly, instead of ending up on someone else's computer. If you play online games with others and in some other circumstances, you'll need your IP address to create a direct connection between you and another Internet user. As your IP is usually dynamically assigned – that is, you get a different IP each time you connect to the Internet – how do you know what yours is?

It's easy to find out:

1. Click Start -> Run.
2. In the Run dialog box, type winipcfg and click OK.

A dialog box will be displayed, containing your IP address as well as other information.

Note: Microsoft doesn't include the Windows IP Configuration (winipcfg) tool with Windows 2000 or Windows XP. However, you can download a version for those operating systems directly from Microsoft. It has a slightly different name (wntipcfg), so once you've installed it, to run it do this:

1. Click Start -> Run.
2. In the Run dialog box, type wntipcfg and click OK

Waseemtabish Sunday, October 25, 2009 10:04 AM

Install xp in 10 min without Ghost
 
[B] Install xp in 10 min without Ghost[/B]

We all know that after loading the file or copying the file from the boot disk to temporary space the system requires a first time reboot.

Now if we press Shift+F10 then the task manager will open and there we will find that a process is running named setup.exe

now our task is to make the priority of this process maxm by right clicking on that.

We are done.

Find ur xp installed in 10 min with tolerance 2 min.

Waseemtabish Sunday, October 25, 2009 10:05 AM

[B]Rename a Series of Files[/B]

When you download photos from your digital camera, they often have unrecognizable names. You can rename several similar files at once with the following procedure. This also works for renaming other types of files.

1.Open the My Pictures folder. (Click Start, and then click My Pictures.) Or open another folder containing files that you want to rename.
2.Select the files you want to rename. If the files you want are not adjacent in the file list, press and hold CTRL, and then click each item to select it.
3.On the File menu, click Rename.
4.Type the new name, and then press ENTER.


All of the files in the series will be named in sequence using the new name you type. For example, if you type Birthday, the first will be named Birthday and subsequent files in the series will be named Birthday (1), Birthday (2), and so on. To specify the starting number for the series, type the starting number in parentheses after the new file name. The files in the series will be numbered in sequence starting with the number you type. For example, if you type Birthday (10), the other files will be named Birthday (11), Birthday (12), and so on.

Waseemtabish Sunday, October 25, 2009 10:10 AM

What'S a Virus
 
[B][SIZE="5"][B][CENTER]What'S a Virus[/CENTER][/B][/SIZE][/B]


1) Virus is a little program that its activity can destruct/destroy
some files and a computer system. If this program does not open, It still stays
inactive and could not or will not destroy anything.

2) Virus program is brought by an email-virus as attachment, Where it
has a server itself (virus server). Virus attachments cannot go to
another email to be an attachment, Such as an email was sent by user
(netter), Member, Moderator Etc. It must be brought by its email
itself, Called EMAIL VIRUS.

3) EMAIL VIRUS would send by any email address of any account that it
finds from some mailbox and address-book's another person at anywhere.
So that a virus attachment could to become look like sent by our
friend, Our member, Our moderator etc... In this case even my be able
the virus attachment was sent by your email address yourself.

4) Identification of virus attachment: it has a small size file,

Quote:
100KB, And it has file name extension such as:


Quote:
*.scr
*.clp
*.pif
*.bat
*.exe
*.com
*.txt
*.doc
*.lhz
*.rhz
and some time it's compressed by *.zip file.
Also probably its name is HotMovie.MPEG__________scr.
Actualy the file is virus attachment file with extension . scr


5) Beside said above you may be able to know an EMAIL VIRUS from its
subject (an amazing name), Such as:

Quote:
Weah )
Hokki=)
Hi
ello !=))
Hello -)
Hey, dude, it's me
access Mpeg
Re: your text
Re: Text message
Re: Msg reply
Re: Is that your document?
Re: Hot Movie( MPEG)
Re: Information...
Re; Important info
Re: This is your photos!
and more, and more...

If you should received emails with extensions or subject matter as
above , You should delete it. And under no circumstances open it.
By the way don't give your email subject with a name look like EMAIL
VIRUS subject otherwise your email would be deleted by the recipient.

*** If one of your file in your hard disk has infected by virus, It'll
change into function to be virus and might could infected all of files
in your hard disk.
Classification of Virus:- Viruses can be subdivided into a number of types, the main ones being:

Quote:
*

Boot sector viruses
*

Companion viruses
*

Email viruses
*

Logic bombs and time bombs
*

Macro viruses
*

Cross-site scripting virus

Two other types of malware are often classified as viruses, even though they may not meet the standard criteria:

*

Trojan horses
*

Worms


Boot sector virus:-

A boot sector virus alters the boot sector, usually the 1st sector, of a bootable disk or hard drive. Boot sector viruses were prevalent in the 1980s.
Companion virus:-A companion virus does not have host files per se, but exploits MS-DOS. A companion virus creates new files (typically .COM but can also use other extensions such as ".EXD") that have the same file names as legitimate .EXE files. When a user types in the name of a desired program, if a user does not type in ".EXE" but instead does not specify a file extension, DOS will assume he meant the file with the extension that comes first in alphabetical order and run the virus. For instance, if a user had "(filename).COM" (the virus) and "(filename).EXE" and the user typed "filename", he will run "(filename).COM" and run the virus. The virus will spread and do other tasks before redirecting to the legitimate file, which operates normally. Some companion viruses are known to run under Windows 95 and on DOS emulators on Windows NT systems. Path companion viruses create files that have the same name as the legitimate file and place new virus copies earlier in the directory paths. These viruses have become increasingly rare with the introduction of Windows XP, which does not use the MS-DOS command prompt.

E-mail virus:-

An E-mail virus is a virus which uses e-mail messages as a mode of transport. These viruses often copy themselves by automatically mailing copies to hundreds of people in the victim's address book.

Logic bomb:-

A logic bomb employs code that lies inert until specific conditions are met. The resolution of the conditions will trigger a certain function (such as printing a message to the user and/or deleting files). An example of a logic bomb would be a virus that waits to execute until it has infected a certain number of hosts. A time bomb is a subset of logic bomb, which is set to trigger on a particular date and/or time.

Macro virus:-

A macro virus, often written in the scripting languages for Microsoft programs such as Word and Excel, is spread in Microsoft Office by infecting documents and spreadsheets.
Cross-site scripting virus:-A cross-site scripting virus (XSSV) is a type of virus that utilizes cross-site scripting vulnerabilities to replicate. A XSSV is spread between vulnerable web applications and web browsers creating a symbiotic relationship.

Trojan horse:-
Trojan Horses are impostor files that claim to be something desirable but, in fact, are malicious. Rather than insert code into existing files, a Trojan horse appears to do one thing (install a screen saver, for example) when in fact it does something entirely different, and potentially malicious, such as erase files. Trojans can also open back doors so that computer hackers can gain access to passwords, and other personal information stored on a computer.

Although often referred to as such, Trojan horses are not viruses in the strict sense because they cannot replicate automatically. For a Trojan horse to spread, it must be invited onto a computer by the user opening an email attachment or downloading and running a file from the Internet, for example. Trojan.Vundo is an example of a Trojan horse.

Worm:-

A worm is a piece of software that uses computer networks and security flaws to create copies of itself. A copy of the worm will scan the network for any other machine that has a specific security flaw. It replicates itself to the new machine using the security flaw, and then begins scanning and replicating anew.

Worms are programs that replicate themselves from system to system without the use of a host file. This is in contrast to viruses, which requires the spreading of an infected host file. Although worms generally exist inside of other files, often Word or Excel documents, there is a difference between how worms and viruses use the host file. Usually the worm will release a document that already has the "worm" macro inside the document. The entire document will travel from computer to computer, so the entire document should be considered the worm. W32.Mydoom.AX@mm is an example of a worm.
Effects of computer viruses:-Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply to replicate themselves and make their presence known by presenting text, video, and audio messages. Even these benign viruses can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are bug-ridden, and these bugs may lead to system crashes and data loss.
Host types:-Viruses have targeted various types of hosts. This is a non-exhaustive list:

Binary executable files (such as COM files and EXE files in MS-DOS, Portable Executable files in Microsoft Windows, and ELF files in Linux)

Volume Boot Records of floppy disks and hard disk partitions

The master boot record (MBR) of a hard disk

General-purpose script files (such as batch files in MS-DOS and Microsoft Windows, VBScript files, and shell script files on Unix-like platforms).

Application-specific script files (such as Telix-scripts)

Documents that can contain macros (such as Microsoft Word documents, Microsoft Excel spreadsheets, AmiPro documents, and Microsoft Access database files)

Waseemtabish Sunday, October 25, 2009 10:12 AM

Svchost
 
3 Attachment(s)
[B]Svchost [/B]

Viewer Shows Exactly What Each svchost.exe Instance is Doing

One of the most popular articles on this site over the last year has been our must-read feature explaining svchost.exe and why it's running, and now there's an even easier way to see what's going on behind all of those svchost processes in Task Manager.

The Svchost Viewer is a small application that lists all of the current svchost.exe instances, shows how much memory each one is using and what services are running beneath it. For the uninitiated, svchost.exe is an underlying Windows component responsible for Windows services (read our full guide for more).


Using Svchost Viewer
The cool thing about Svchost Viewer is it requires no installation and can run directly off your USB flash drive, coming in handy when troubleshooting. Just double-click on the application to launch, and then click Yes when prompted whether to get the data.



After taking a few moments to complete the scan you will be presented with the number of svchost.exe instances running along with the service name, description, memory usage, and program path.

[CENTER]
[/CENTER]


This application is a great little tool to see what's really going on in your computer. Svchost Viewer is open source, requires the .NET 2.0 framework and should work on XP (SP2), Vista and Windows 7.


Download Svchost Viewer from codeplex.com


Code:
[url]http://rapidshare.com/files/193047295/Svchost.Viewer.Ver.0.3.0.0_RC1.rar[/url]



This is a Free Download and you can get it from

Code:
[url]http://www.codeplex.com/svchostviewer[/url]

Waseemtabish Sunday, October 25, 2009 10:13 AM

Programs containing spyware:
 
[B]Programs containing spyware:[/B]

This section gives an overview on programs which are known to carry spyware. If known, the type of spyware is listed after the program name. Be aware that this information can change very quickly. If you find your favorite program on this list, be suspicious and do further checks. If you use a program which is not listed here, don't assume that it's free of spyware.
Quote:

Quote:
!Glance
'WE' Group ProxyChecker 3.1.8
1 Click WebSlideShow
100 Proof Cocktail Planner
100% Word Search Free
100% Word Search Free
123Search 1.0
123Search 2
123Search 2
15 Puzzle 2.1
1st Contact
1stRiadaMelt
20/20
2Minute Warning
3D Anarchy
3D Frog Man Demo
3D Maze Man Demo
3D Morris
3D-FTP 3.0
3rd block 2.0
3S Accounting
3SI Accounting & Inventory Management (Demo) 2.0
5star Free Lines 1.2
7Way 0.15
A
Aadcom Screensaver Software
Aaron's WebVacuum 0.8f
Abe's FTP Client
Abe's Image Viewer
Abe's MP3 Finder 4.0
Abe's MP3 Finder
Abe's Picture Finder 1.4
Abe's SMB Client
Absolute Telnet 1.63
Absolute Yukon Solitaire
Access Diver 2.02
Access Diver III
Access Diver
Ace of Humor 1.0
Ace Talking Jokes & Quotes
AceNotes Free 2000c
Aces and Kings Solitaire
Acorn Email 2.5
AcqURL 3.1
AcqURL 3.1
ActionOutline Light 1.6
Active 'Net 1.0
Add Remove Plus! 1.1
Add URL 1.0
Add/Remove Plus
Add/Remove Plus! 1.1
AddAce
Address Rover 98
Admiral VirusScanner
Adsubtract SE 1.66
Advanced Call Center 2.9
Advanced Call Center
Advanced Directory Printer
Advanced Internet Tool 2.2.2
Advanced Maillist Verify 1.6
Advanced Maillist Verify
AdvertBar
Advertisement Wizard
AdWizard
Afreet SiteViewer
Alchemist Demo
Alchemy Anaconda
Alexa Toolbar
Alive and Kicking 3.1
AllNetic WWW and FTP Observer
alphaScape QuickPaste
Altnet Secureinstall
America Online (AOL)
An Online Secretary
AnchorNet1
Angove CD Player
Answwwer
AnySpeed
AOL Anti-timer
Applet Game Mania 1.7
Appload Notify
Ariadne Browser
Ashampoo Uninstaller
Ashampoo WinOptimizer 2000
AskBox 3.0
ASP1-A3
Attune
Auction Central 1.02
Auction Explorer
Auction Station
Audio CD MP3 Studio 2000
Audiogalaxy Satellite
Audiogalaxy Satellite .608 (Oct. 1 through Nov. 4, 2001)
Aureate Group Mail 3.0
Aureate GroupMail 3.06.00
Aureate SpamKiller Free Edition
Aution Central 1.02
AutoFTP PRO 2.3
AutoWeb 1.0
AxelCD 2.1
Axman
B
b3d Projector
Babylon
Babylon Tools 3.1 build 35
Babylon Tools before 3.1 build 35
Balloon Pop Demo
Banner Crafter
Bavardeur Branchez-vous
BearShare all versions
Beatle
Beeline
BeFaster v2.51
BigEListener
Binary Boy 1.70
BinaryVortex 1.4
Bingo Demo
Bingo Master Demo
Bio-Rhythms
BizAgent
Blast Thru Demo
Blinkin
Blue Engine 1.0
Blue Orbb
Bonzi Buddy Dec. 2001 releases and later
BookSmith: Original 1.2
BubbleBound
Buddy Pad
BuddyPhone 2.0
BuddyShare 1.1
Buisness Letter Punch
Bullseye Searcher 2.5
BullyFrog
Business Letter Punch
Button Magic
Buzme
C
Calendar+ 2000
Calendar+
Caliban Mailer
Calypso E-mail 3.0
CamCollect 1.4c
CamGrab
Canasis vB vB-Beta
Capture Express 2000 1.0
Carlanthano 2.9.868
Cascoly Screensaver 1.0
Cash 2000
CashBar
Caveman Cards
CD Box Labeler Pro
CD Extractor
CD MP3 Studio
CD Recording Studio
CD-AID 02.00.05.23
CDDB-Reader
CDMaster 32 3
CDMaster 32 4.5x
CDMaster32
CDMaster32 3.0
Centarsia 1.01
Challenge Pool
ChanStat 3.3
Charity Banner 1.0
Chat PicPluck
Cheat Machine 3.1
Cheat Machine 3.2x
Check and Get 1.2 build
Check and Get
Check and Get
Check4New 1.7
Chinese Checkers Demo
ChinMail 1.2
Clabra clipboard viewer 1.2
Classic Peg Solitaire 1.0
Clean & Tidy 1.5
Click
ClickDough
Clipmate Student Edition 5
Clock Saver 1.0
CoffeeCup Free HTML
ColorBreak
ColorBreak 2
ComTry Music Downloader 2.2
Concentration Done Right
Connect Four
Connect?
Connection Watcher 4
Contact Plus
ContextPro
Copernic 2000 For EVER!
Copernic Shopper Beta 2
Cowon Jet-Audio
CPR 1.2
Cracker!2000
Crazy Drake Demo
Crazy Puzzle Demo
Credit Card Verifier
Crescendo (LiveUpdate) Plugin 5.1
Crescendo internet music player
Crosses & Zeroes
CrushPop
Crystal FTP
Crystal FTP 2000
CS Telnet
CSE HTML Validator Lite 2.0
CSE HTML Validator Lite
Cursor Maker
CuteFTP 3.0 beta
CuteFTP 3.0/3.5
CuteFTP > 3.0
CuteFTP
CuteFTP/Tripod
CuteMX
CutePage 2.0
CutePage
Cyber-Gold Communications
D
DALiWorld
Danzig Pref Engine
Danzig Pref Engine 1.1
DateTime 1.3
DB to HTML Express
Debt Relief
Delphi Component Test
Delphi Tester
Desk Reference 0.1
DesktopDollars
Develop Critical Thinking
Develop Critical Thinking Skills
Dialarm 1.0.1.19
Dialer 2000 1.5
Dialpad
Digi-Cam Web Page Generator
DigiBand NewsWatch
DigiCams - The WebCam Viewer
DigiCams - WebCam Viewer
DigiGuide 3.x
Digital Postman 2.0
Digital Postman
Direct Connect 0.9.963
DirectUpdate
Disconnector 2.6
Disconnector
Disk Space Recovery Wizard
DiskSpace Explorer 2000 2.1
DivX 5.0.x
DL-Mail Pro 2000
DLExpert 0.92
DNScape
Doorbell 1.18
Dope Wars
Dope Wars
dotCool Builder
dotNow! Free Internet Access
Download Accelerator Plus (DAP) 5.0
Download Minder 1.5
Download Minder 1.8
Download Wonder 1.55
DownloadAgent
DownLoader 1.1
dozeCrypt III
DuRu
Dweeps Demo
Dwyco Video Conferencing 2.3
E
eAssist
Easy Noter
Easy Phone Book
Easy Splitter
EasyFill 2.02
EasyNoter
EasySeeker 4.0
eBlaster
EconoForecast
eDonkey2000
EIS Web Monitor 1.2
EldoS Keeper
eLOL (Electronic Laugh out Loud)
Email Extractor
Email Extractor'99 2.92
EmmaSoft ChatCat
EmmaSoft dBrow
EmmaSoft KeepLan
EmmaSoft Soundz
eMNGma
Encoding Utility 2000
EnvoyMail
EpAssist
Essay-Punch
EURO Converter 2
Every Link for You 2000
eVocabFlashCard 1.0
eWork
Executive Accounting-Demo
Express Communicator
Extreme Animals Demo
Extreme Bugs Demo
Extreme Dinosaurs Demo
Extreme Orchids Demo
EZ-Forms FREE
EZForms
EzStock
EZSurfer 2000
F
Family Tree Maker 7
FenceOut
FiestaBar
File & MP3 Renamer '99
File & MP3 Renamer
File Mag-Net 3.0
File Mentor
File Seeker
File Sniffer
FileMentor
FileSeeker
FileSender
FileSniffer
FileSplit 2.2
FindShare
Fire Client 1.5b1100
FlashGet (Formerly JetCar) 0.87
FlashGet 0.76 and +
FlashGet
FlashTrack
FlexSpex
Floorplan LT
Folder Guard Jr. 4.1
Folder Guard Jr.
Folder Guard Jr. Prior to 2
FormTool LT
FourTimes 3.5
Fractal World Generator 1.1
Frazzle
Free Budget
Free Hearts for Windows
Free ImageEditor 1.0
Free IRC 1.0
Free MP3
Free Notepad 1.0
Free Pics
Free Picture Harvester
Free Solitaire 3.0
Free Solitaire
Free Solitaire
Free Spades 0.7
Free Submit 1.0
Free Submitter Pro
Free Tetris
FreeBase
FreeBudget
FreeImageEditor 1.0
FreeIRC 1.0
FreeNetMon
FreeNotePad 1.0
FreeRenju
FreeRip MP3 1,0
FreeSaver MP3 1.0
FreeSite 1.0
FreeSubmit 1.0
FreeWebBrowser 1.0
FreeWebMail 1.0
FreeZip! 2.0
FTP Editor 1.7
FTP Works
FTPEditor 1.7
Fundi e-Lert 1.4.1.29
G
Galactic Invasion Demo
Galactic Menace
Galaxy of 3D Tetrimania Demo
Gardener Demo
Garret Demo
Gator
Geno Pro 1.7
Geno Pro
GenoPro 1.7
GenoPro 1.71
GenoPro 1.9
GenoPro
GenoPro
GenoPro prior to 1.7
GetDown
GetRight 4.x
GetRight Mail Control 1.0
Gif Animator 1.00
GifLine Pro 2.0.2
Gimme IP
Glowing Bugs Demo
GluedOn
Go!Zilla 3.5
Go!Zilla WebAttack
GodeZip
GoHip!
Gold Diver
Gomuko Pro 1.1
GovernMail 1.1
GPL
Grafula
Grammar Fitness Suite
Graph Paper Printer
Grokster 1.3.3 released Dec. 2001 through Jan. 1, 2002
Gunther's PasswordSentry
Gypsee
H
HallowMeenies
HandsFree Browser
HangWeb
hesci Private Label
HexWars II
Hey, Beer, Man
HiClock
HiDialer 2000
High Seas Solitaire
Home Buyer´s Calculator Suite
Homewatcher 1.3 Demo
Host Monitor 4
Hot Dog Vendor
Hot Lingo
Hotbar Toolbar
HOTText
HTML Proxy-Spy
HTML Translator 2.5
Html Tutor pro
HTTP Proxy-Spy
Huey Color Picker 1.8
Huey v1.8 Color Picker 1.8
HumanClick
Hypersnap-DX 3.61
I
iAgent 1.0
Iban Technologies IP Tools 2000 3.1
Ice Fusion
ice9
Idyle GimmIP 4.0
iFind Graphics 1.5
iKena 1.1 released Dec. 2001
Image Carousel
Image Site Grabber
imageN
imageN
ImagerX 2000 3.0
iMesh
Implosion Screensaver
In School We Trust (Pupil Edition)
In Vircible Anti Virus
InboxSpecialist
iNetPad 3.1
Infinite Patience 2.2
InfoBlast
InnovaClub
InstallZIP 1.4
IntegrityCheck Plus 2.01
Interchange FTP 0.2.1
Interfax 6.0.0
Intergalactic Exterminator Demo
Internet 007
Internet Neighborhood
Internet Tree 2.0
Internetrix 1.0
InterWebWord Companion
InvenTV
InVircible Anti Virus
Invisible Secrets 2.0
IP-Turboscanner
iPer Std,WH, Pro 3
iPhone
IPLAY
ISoaQ Beta 15c
iSolitaire
iToday
IVOX ICQ
Iwan's MP3 Finder 1.1
IYSoft Dial-Up Connection 1.2
J
JetCar
Jewels Of Anubis
JFK Research
jIRC
JOC Email Checker 1.7
JOC Web Finder
JOC Web Spider 2.6
JOC Web Spider
JoeCartoon (All)
JPEG Optimizer 3.07
JrEdit 1.0
JSoft Mail
K
Kachat Messenger
KaZaA all since early Feb., 2002
KaZaA Dec. 2001 releases up to Jan. 3, 2002
Keyword Monitor
KFK
KFTP
Kmail
Kmp3
Kontiki 1.02
KVT Diplom
L
LapLink FTP 2.0
Laser Chess 1.0
Lexicon Demo
Lexmark Print drivers installation
Life is Good
Lightspeed
LimeWire 1.8 beta and above
LimeWire 2.0x Dec. 2001 releases
Lines '98
Lines Millennium
Lines98
Lines98´/Lines Milenium
LineSoft Download
Link Cratter
Link Keeper
LinkProver 2.0
LivePaper
Loan Calculator Plus
Locker4U
LOL Chat 2.5
Lop.com Accessory Toolbar
Lop.com Search Engine
Ludo Safari Demo
M
Magellan explorer 2.2
Magic Signs
Mahjongg Game of Four Winds demo
Mahjongg Master 2 Demo
Mahjongg Masters
Mail Alert
Mail Them
MailAlert 2.33
Mailmoa 3.8
Mailmoa before 3.8
Manifest Timetrap 3.0
Marker 1.01
Marker 1.1
Marketscore
MASH-The m*cro$oft Agent Scripting Helper 4.5.3
MasterCrypt 2.0
Match It 1.0
MatchBlox
Mattel Retail products
Maxiimus
Maxxchat 1.0 B-6
Media Player
Medusa
Meeting Planner 0.8.0.1
MegaPhone
MegaSafe 6
MemriC 1.0
Meracl FontMap 1.2
Meracl FontMap
Meracl Hexocol 1.1
Meracl ID3 Tag Writer
Meracl ImageMap Generator 3.4
Meracl ImageMap Generator
Meracl MD Recorder 1.0
MessageMates
MetaMan
Midnight Oil Solitaire 3.1
MidWaviPro
MillenniuM BReaThe beta 0.3b
Millennium BReaThe Beta 3.1
MindAlmanac
Mindjongg
MindPlanner
MindSaver
mindseti.com
MindTrivia
Mini Golf Demo
MiniMemo-Die Cheatsdatenbank 9.0
MirNik Internet Finder 1.0
Mixman Studio
MJStudio
Moeboid
MonIRC 1.0.0.2
MoNooN2DR
Monsters & Mayhem
Moonwalker 2000 2.0.0
More Space 99 3.1
MouseAssist
MP3 Album Finder 1.3
MP3 Cat
MP3 Downloader 2.3
MP3 Fiend 5.5
MP3 Grouppie 4.5
MP3 Mag-Net 1.0
MP3 Player 2000 6.2
MP3 Renamer 1.33
Mp3 Stream Recorder 2.3
MP3 Tag Studio
MP3Album Finder
MP3INFO-Editor
MR. COOL
MSi-Clip
Mudslinger
MultiSender 1.03
Music Genie 1.0
MusicCity Morpheus 1.3
MusicCity Morpheus Preview Edition 1.3.1.1
MX Inspector BIG AD
My Genie Patriots
My Genie SE
My Genie Sports Edition 2.5
My GetRight 1.0
My House
My To Do
MyInfo
N
Naviscope 8.69
NeatFTP 1.0
Nebula Fighter Demo
NeoPlanet
Net CB 1.0
Net Pal
Net Scan 2000
Net Vampire 3.3
Net-A-Car Feature Car Screensaver
Net2Phone Dec. 2001 releases and later
NetAnts
NetBoard
Netbus Pro 2.10
NetCaptor 5.0
Netcaptor
NetCounter
Netman Downloader 1.0
NetMole 1.0
NetMonitor
NetNak 4.2
Netscape 6 through 7
Netscape/AOL Smart Download
NetScoopFinance
NetSetter
NetShark 1.0
Netsonic
Netsonic Pro 2.5
NetSuck 3.10.5/3.1
NetSuperSonic
NetTime Thingy 1.5
Network Assistant 1.9
NetXtract
Netzip
NeuroStock
News-Lynx
NewsBin
NewsShark
NewsWire 1.5
NfoNak 4.1
NightSparks
NikNak 2.0.1
NotePad+
NotePads+ 2.0
Notificator 1.01b
Notificator 1.0b
O
Octopus 3.0
Odigo Messenger 2 - 3
Of the day Quizzer 1.1
Off the day Creator 1.0
Onflow Media Player
Online Call
OnLineCall 1.19
Opera 5 & 6 (freeware version)
Option Insight 0.6.2
Othello FX
Oxide Demo
P
Paint by Numbers
Paper Picker 1.2
Paragraph Punch
Password Manager
Patriot Slots
Pattern Book 1.0.0.2
PC Telephone
PC-to-Phone
PCDJ
PCDJPHAT
Peh Pai
People Seek 98
PerfectPartner Time&Billing (Demo) 2.0
Personal Auction Track
Personal internet Finder 1.7
Personal Search Agent 0.8
Personal Stock Monitor SE
PGNSetup
PhonePro
Photo Base Junior
Photocopier 2.0
Photocopier 2.01
PicPluck 2.0
Picture Line
Picture Lines
Pictures In News 1.0
Ping Thingy
PingMaster
Pixel Pirate 1.0
PKZip
Planet.Billboard
Planet.MP3Find 3.0
PlayJ Studio
PMS
ponnu CHAMY's Music
PopMon 1.0.0.1
Popup Dictionary 2.0.70
PostCryptum
Power Lotto
Power Zip Express
PowerPak Accounting and Inventory Management-Demo 2
Powerzip 2000 Lite
pqDesktop
PrePromote 1.0.0
Printshop 10
PromaSoft Autoresponder 1.0732
ProtectX 3.0
ProxyChecker
Puzzle Master Demo
Q
Q*Wallet 1.6
QMS Memory Squares
QMS Mystery of Magical Numbers
QuadSucker/Web 1.8
Quadzle Puzzles
Quickhead-E
QuikLink Explorer Freeware Edition 3.0
QuikLink Autobot
QuikLink Explorer Freeware Edition 3.0
QuikLink Explorer Gold Edition 3.0
Quo Tracker 1.1.48
Quote Ticker Bar 6.0
QuoteWatch 4.2
QuoTracker
QuoTracker
Quta
QWallet
R
RadLight 3.03 release 5
RahJongg Demo
RapidBrowser
Rapidoc
Raptor Call of the Shadows Demo
Reader Rabbit
Real Audioplayer 7.0
Real Estate Web Site Creator 1.0
RealDownload
ReallyEasy Interactor 3.0(1)
RealPlayer 7
RealReverb Convolution 1.3
Recipe Review
Red Swoosh
Rededit
RedSheriff
ReGet 1.4
ReGet 1.6
ReGet
ReGet
ReGet
ReGet Junior
RemoteShut
Rename Master
Rename-It
RespondMiter / VX2 modules
Rest Your Eyes 3.0
Resume Detective 1.5
RingSurf
RoboCam 1.10
Rosemary's Weird Web World
Rosoft CD Extractor 1.09
Rosoft Media Player 1.0
Rubber Duck H30+
RunTurkeyRun
S
SaberQuest Page Burner
SaberQuest Tag Specification Edit
SafeNetMail
Sandbar
Savings4u 1.0 Beta 3
SBJV 3.0
SBWcc 2.0
Scout's Game 1.0
Scout's Game 1.02.1
ScreenFIRE - FileKing
ScreenFIRE 3.0
ScreenFlavors
ScreenMate Movies
ScreenMates
Scripto 0.80
Sea Battle 1.0
Seawar
SelfSeek
SERanker 1.24
Servant Salamander 1.6 Beta x
Shakespeare Punch
Shapez! 1.0
Shapez!
ShellGem
Shizzam 2.6
ShortKeys Lite
Sign Language Teacher
Simple Submit 1.0
SimpleFind 1.0
SimpleSubmit v1.0
Simplicity Personal Organizer
Site Select
SiteBack
SiteChecker
Sitesniffer 1.0
SK-111
Skeek Shooting 1.1
SL4 Historical Montage
SLEdit
Slide Puzzle 1.0
Smaller Image
Smart 'n Sticky
SmartBoard 200 FREE Edition 2.6
SmartDoc 3.0
SmartSum Calculator 2.0
Snap-It 4.0
Snipsnap 2.0
SoftCuisine 2.2.0
Software Translator
Software-Lynx
Sonic Mail
SonicBurn 1.3.178
SonicMail 2.6
SortSport
Sound Agent 1.0
Space Central Screen Saver
Space Checker
Spam Buster
Speak! Lite
Speaking Email DeLuxe 5.5.0
Speaking Email Deluxe 5.6.0
Spector Standard and Pro
Speedy eggbert Demo
Spherical HTML-Templator
Spherical MP3INFO-Editor 1.0
Splash! Siterave
Sputnik / VX2 modules
SpyTech
SpyTech CipherWorks 2.0
SpyTech Eradicator
SpyTech Integrity Check Plus
SpyTech NetArmor
SpyTech PasswordLock
SpyTech SecurityWorks
SpyTech Shadow
SpyTech Shadownet
SpyTech Spyagent
SpyTech SpyLock
SquareOff
SSScanner
SSSiter
SSSpider
Star Miner Demo
StartDrive 1.0
Static FTP
StationRadio
Stats '99 1.4
Stay On Pro
StickyNote 8.x
Stock Profit Spread Calculator 32
StockBrowser 1.9
Subscriber
SunEdit 2K
SunEdit 2k Mod Manager
SunKoSoft WebNewser 1.0b
Superball Challenge Demo
SuperBot
SuperIDE 1.4
Surf+ plug-in
SurfBar
Surfsaver
SurfSaver 2.1
Sweep 1.4
SweepsWinner
System Agent
System Mechanic 3.5
T
Tagger
Task Plus
Taskbar Executive
TaskWiz 1.3
TetriMania Master Demo
Text Tally 1.2
Text Transmogrifier
The Cassette Tape Producer 4.0.6
The Dictator
The Mapper
The Receptionist Desktop Edition 5.0
The Star Wars Combine HoloCom
TheNet 3.69
TI-FindMail 2.0
TI-FindMail
Tic-Tac-Toe Done Right
TIFNY 3.0
Tile Blazer Demo
Time Manager
Time Zone Converter
TimeWarner software
Toag
ToasterMultiTester
too Many Secrets 0.0.6 beta
Tools 3.1
TopMoxie
TopText
Total Finger 1.3
Total Whois 2.0
TPS108
Tracking The Eye 1999
Trade Site Creator 1.1
Trade Trakker
Traffic Attractor 2000 4.0
Transponder / IEHelper modules
Tray note Plus
Trianle Puzzle 1.0
TrivialNet 0.6
TS-Image Mapper
TsAdBot
TUCOWS Uploader 2.11
Tunnel Blaster Demo
Tweaki for Power Users 2.7.4
TWinExplorer 2.5
TWinExplorer Standard
TypeItIn
TypeWriter 1.0
U
UdmSearch 3.0.11.2
uICE
UK Phone Codes
Universal Explorer
V
Vagabond's Realm 0.9.1
Validate CC
VeriMP3 1.0
VeriTape 1.3
Vertigo QSearch
Viewpoint Media Player
Virtual Access 5.0
Virtual Friend
Visual Batch File
Visual Cyberadio
Visual Surfer 1.4
Vocabulary Wizard
Vocabulary Wizard
VOG Backgammon Main
VOG Backgammon Table
VOG Chess 2
VOG Chess Main
VOG Chess Table
VOG Reversi Main
VOG Reversi Table
VOG Shell
VOG Shell History
W
W3Filer 3.1.3
W3Filer
W3Filer(32) Up/Downloader Internet Files 3.1.3
War Demo
WarrenView 1.0
WE Group ProxyChecker 3.1.8
Web Coupon 1.0
Web Database
Web Page Authoring Software
Web Registrant PRO 4.0
Web Resume 1.0
Web Resume Wizard
Web SurfACE 2.0
Web Word Search 1.0
Web Word Wrestle
Web-Cam VCR
Web-N-Force 1.7
WEB2SMS 1.0
WebBug
WebCam VCR
WebCam Wonder 1.0
WebCamVCR 1.0
WebCopier 1.3
WebDrive 3.0
WebHunt 2.8
Webman 5.3
Webreaper 8.0
WebSaver
Website Manager
WebStripper 1.05
WebStripper 1.05
WebSurfAce
WebType 1.0
WebZip 3.5
Whisset
Whitehouse Mambo Parody
WhizFolders Organizer
Whois
WhoIs Thingy
WildTangent Games OEM bundle
Win A Lotto
WinAce 1.5
Windows Media Player 7 and 8
Windows XP Search Assistant
WinEdit 2000
WinMP3Locator
WinMX
WinSite
WinSite Light
WinWhatWhere
Wise Wolf Notify
Wise Wolf Optin
Wise Wolf Pages
Word Connect Demo
Word Search Mania
Word Search Mania Demo
Word+
Wordwright 1.0
WorldChat Client
Worm
Writing about Reading
Writing for Business
[url]www.cyber-gold.com/free.htm[/url]
[url]www.devgames.com[/url]
X
X Lines
X-Mas: Santa's Rein
xBlock 1.2
xtractor Plus 2.4
Y
Yellowbase
Yo Mamma, Osama!
Youbet.com
Your ESP Test
Z
Zarko 1.9
Zarko 3D
Zion 1.51
Zip Code Finder
ZIP Express 2000
ZIP Up The Web Pro!
Zip Wrangler


How to detect and remove spyware:
To detect and remove (if possible) adware and spyware we recommend the freeware Ad-aware which is frequently updated. Also useful is the shareware BPS Spyware/Adware Remover. It's advisable to adjust your firewall to block off internet access for all programs and services which are not entitled to access the internet. Of course, this won't work with the numerous Internet Explorer plug-ins. An IE plug-in has full control over the surfing session. Blocking off IE will block off internet access completely. Try to make sure that IE is not infected with spyware, or better still, use an alternative browser like Opera (registered version)

Waseemtabish Sunday, October 25, 2009 10:14 AM

Spyware Information
 
This guide explains what spyware is and what it does. Spyware has become a massive threat to the privacy of the internet user in recent years. Operating systems aren't able to detect or defend against spyware without an external program. One of a number of 3rd party tools - along with the user's own vigilance - is required to defeat this menace.
What is Spyware?
Spyware gathers information about the contents of, and the activities on, a computer system. This information is transmitted to the producer (or the one who controls the spyware), without the approval or knowledge of the user. The most common type of spyware is adware.
Adware is software which is embedded in other software (or sometimes distributed as a stand-alone program) and gathers and transmits the user's personal data. In return, ad banners are received and displayed on your system. Possible information that leaks out of your PC includes personal data (name, *-*-*, age,...), email addresses, credit card numbers, browser history, system configuration, installed software, hard disk content and passwords.
Another kind of spyware is surveillance software which logs activities on the computer system. The main difference fromadware is that surveillance software runs secretly in the background, no apparent activity is evident. Key loggers, screen scanner, trojans,... are surveillance software, some are realized in hardware (mostly used by law enforcement or intelligence agencies).
Known spyware:
Spyware became a branch of the software industry in recent years. Many specialized firms producing spyware. They pay the software programmers to implement spyware modules into their programs. That's the reason why many shareware and freeware programs are interlaced with spyware, the programmer is able to earn some extra money. What follows is a list of some popular spyware producers and what their products are doing.
Aureate/Radiate
This module can be very easily added to any software product. While using the software, the spy module is active and delivers precise audience targeting. Even without an established internet connection, Aureate/Radiate presents the user with splash screens, dynamic messaging, customized demographic collection and real-time surveys.
Conducent Timesink
Conducent is affiliated with a lot of Internet advertising networks. Their spy module receives ad content from the internet and stores it on the hard disk. During the runtime it presents the user with advertisements, and records what the user does with the ads (clicking them, for example). This information is sent back to Conducent. The spy module (TSadbot.exe) provides no uninstall feature, i.e. even when the carrier software is removed from the system, the spyware runs on.
Cydoor
Once integrated into a program, the Cydoor spy module dynamically loads ad banners from the internet. It presents ad content in offline or online mode. A unique numerical identifier is placed on the computer during the installation, so the PC system can be identified anytime.
Comet Cursor
Comet Cursor is a browser extension (IE and Netscape) and requires enabled ActiveX. It logs cookies, referrer IDs, IP addresses and other system information. When visiting a web site, the click activities of the user are logged and analyzed. Comet analyzes this data to improve the content and performance of that particular web site.
eZula & KaZaa Toptext
KaZaa Toptext is part of the file sharing client KaZaa. Toptext takes full control of the browser and changes the content of the web site (like the SmartTags which were planned for Windows XP). The content of the website is analyzed and certain keywords are highlighted and become a link to the company who paid eZula Inc for changing that keyword.
Flashpoint/Flashtrack
Flashpoint/Flashtrack is relatively unknown spyware. It logs the user's queries to a search engine, analyzes them and creates ad pop-up windows which seem to come from the visited web site, but actually are created by Flashtrack.
Flyswat
Flyswat is a plug-in for Internet Explorer and requires enabled ActiveX. It logs the user's clicks while surfing the internet. The gathered information is given to partners affiliated with Flyswat.
Gator
Gator is a program to log any data which is entered into forms (username, password, address, credit card number, etc.) This data is stored in an encrypted file and is transmitted to Gator over the internet. Gator also replaces dynamically ad banners from other web sites with their own banners.
GoHip
This browser extension reconfigures the Internet Explorer settings (Homepage, AutoSignature, search page, etc.) To every sent message GoHip attaches an advertisement. GoHip appears as Windows Startup in the Start menu.
Hotbar
Hotbar collects information about visited web sites and viewed pages. IP address, domain name, URL, browser information, operating system, cookies are stored with the respective time stamp. Search engine queries are also redirected to Hotbar and stored there. Also stored are the clicked buttons and links, the amount of time spent at a web site and entered form data (username, address, password, credit card numbers, etc.) Hotbar is affiliated with many advertisement networks.
Lop (C2Media)
Lop installs a toolbar and uses cookies to trace the user. C2Media works in cooperation with DoubleClick and the Network Advertising Initiative (NAI) to spy and serve ads.
Mattel BrOdcast
BrOdcast collects and sends information to Mattel and in return sends the user product offers and ads. It's mostly used in Mattel's own software for children.
Morpheus
Another Peer-to-Peer agent. Different spyware agents are included.
Realplayer
The RealMedia Realplayer contains many appropriate spy modules. The removal of the spy functions will result in a non-functioning Realplayer.
Songspy (IMG Entertainment)
Songspy is a music sharing client. The spy module opens TCP port 5190 and gives it full control over the computer system.
Web3000
Web3000 changes the content of visited web sites. The browser window and pop-up windows are used for ads. The users surfing habits are logged. Web3000 replaces winsock32.dll and other Windows system files.
WebHancer
WebHancer gathers information on visited web sites (address, size, loading time, completion state and network delay time). It does traffic, web and performance analysis. WebHancer hides itself in the system. Incorrect removal will destroy the internet connection.
Other...
A lot of other spyware is available (e.g. AdBreak, AdTools Codehammer Message Mates, AdvertBar, Alexa, Back Web, BDE, Brilliant Digital, Blackstone Data Transponder, B3d, Bulla, Bookmark Express, Bonzi Buddi, Cash Bar, Click Till u Win, Click The Button, CnsMin, Common Name, Delfin, DoubleClick , Download Ware (DAP), EverAd , Etraffic - TopMoxie, Expedio Ware, EWA, Favorite Man, Gratisware, homepageware, IEPlugin, KFH, Liveshows Dialer, MarketScore, Message Mates, MediaLoads, nCase, NewDotNet (New.net), NetPal, Netzany, NetSonic, Netsetter , Network Essentials, NowBox, OnFlow , OpenMe, Porn Dialer, SaveNow, Search-Explorer, Surf+, TPS108, TopMoxie, Transponder, Twisted Humor, UCmore, Vegas Palms Casino, wbeCheck, WNAD, WurldMediaBHO, ZapSpot,...) and some programs which have their own proprietary spy modules.

Waseemtabish Sunday, October 25, 2009 10:17 AM

remove a Google redirect virus
 
2 Attachment(s)
[B]How to remove a Google redirect virus [/B]


Thefollowing guide is to cure your PC from that annoying piece of malwarewhich hijacks and redirects your Google searches and other searchengines, otherwise known as a Google redirect. Other than the searchengine redirect, some other signs that you may have this infection are:

•Not being able to download, install, or run security programs like HijackThis or Malware Bytes Anti-Malware
•Being blocked from navigating to security/malware removal sites, for example : Microsoft or GeeksToGo


This infection is also commonly known by security applications as [COLOR=PaleGreen]Rootkit.Win32.TDSS, Trojan.DNS_Changer, or Troj/Rustock. It also has other aliases due to the fact that it evolves and changes over time.

You may find your anti-virus or anti-spyware programs identifies any of the following:

[/COLOR]

••C:\windows\system32\drivers\SKYNETsunjnbdw.sys
•C:\windows\system32\drivers\MSIVXvvynaffpomuyaycwkoiyldjssbgligea.sys
•C:\windows\system32\drivers\UACgrevmydoyiftawolx.sys
•C:\windows\system32\drivers\ovfsthhtkoslmsqrvwsntnkdioglrpufewidyw.sys
•c:\windows\system32\drivers\TDSSmaxt.sys
•c:\windows\system32\drivers\kungsfndqriiha.sys
•c:\windows\system32\drivers\seneka.sys


Another sign of it would be this line showing up in your HijackThis orOTL log, however this is not always present so you cant rely on itcompletely to tell whether you have the infection or not:

[COLOR=Yellow]O17 - HKLM\System\CCS\Services\Tcpip\..\{3B8FF4B4-174F-4B7F-BE68-78043E53C8DA}: NameServer = 85.255.112.70;85.255.112.201


Now lets get onto the good stuff, removing this infection from your PC!


Before we begin, you should save these instructions in Notepad to yourdesktop, or print them, for easy reference. For the fix to workproperly we will need you to close your browser, and any securityprograms like an anti-virus or anti-spyware. If you aren't completelysure how to do that, just continue on with the guide.



Step 1 :


We need to clean out your temp files and folders to speed up the whole process.


Download TFC (Temp File Cleaner) to your desktop
[/COLOR]
•Open the file and close any other windows.
•It [COLOR=Yellow]will close all programs itself when run, make sure to let it run uninterrupted.[/COLOR]
•Click the Start button to begin the process. The program should not take long to finish its job
•Once its finished it should [COLOR=Yellow]reboot your machine, if not, do this yourself to ensure a complete clean[/COLOR]



[COLOR=Yellow]
Step 2 :


We need to make sure you don't have another infection which can causeGoogle redirects. This is unlikely to fix your problem but its best tobe safe than sorry as they say.


Please download GooredFix, making sure that you save this file to your Desktop.[/COLOR]
•Double-click[COLOR=Yellow] GooredFix.exe on your Desktop (Note: If you are using Vista right-click GooredFix and select Run As Administrator...)[/COLOR]
•Select [COLOR=Yellow]Option#1 - Find Goored (no fix), by typing 1 and pressing Enter[/COLOR]
•A logfile should popup shortly, that will look something like this:

Check Download LinksCode: [COLOR=LemonChiffon]GooredFix v1.92 by jpshortstuff
Log created at 08:35 on 24/12/2008 running Option #1 (Administrator)
Firefox version 3.0.3 (en-GB)
[COLOR=Wheat]=====Suspect Goored Entries=====

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extensions]
"{ABB56C42-1843-46EF-A93E-482DE0F5B5AA}"="C:\Documents and Settings\Administrator\Local Settings\Application Data\{ABB56C42-1843-46EF-A93E-482DE0F5B5AA}"

C:\Program Files\Mozilla Firefox\extensions\{D96F1D71-4F95-443A-8AF3-541BFDBA096D}

=====Dumping Registry Values=====

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.3\extensions]
"Plugins"="C:\Program Files\Mozilla Firefox\plugins"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.3\extensions]
"Components"="C:\Program Files\Mozilla Firefox\components"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extensions]
"{ABB56C42-1843-46EF-A93E-482DE0F5B5AA}"="C:\Documents and Settings\Administrator\Local Settings\Application Data\{ABB56C42-1843-46EF-A93E-482DE0F5B5AA}"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extensions]
"jqs@sun.com"="C:\Program Files\Java\jre6\lib\deploy\jqs\ff"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extensions]
"{20a82645-c095-46ed-80e3-08825760534b}"="C:\WINDOWS\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\"[/COLOR][/COLOR]
•Take a look at the section highlighted in red.As shown in this log, there should be an entry there with a randomstring of numbers and letters enclosed in {} (in this case [COLOR=Yellow]{ABB56C42-1843-46EF-A93E-482DE0F5B5AA}), that shows a folder in C:\Documents and Settings\<your name>\Local Settings\Application Data\{the same random numbers and letters}. A newer version of the infection just consists of a folder in Firefox's extenions directory, in this case: C:\Program Files\Mozilla Firefox\extensions\{D96F1D71-4F95-443A-8AF3-541BFDBA096D}.[/COLOR]
•If these entries are present, [COLOR=Yellow]and if there are no other entries that you think may be legitimate in the "Suspect Goored Entries" section, then do the following:[/COLOR]
◦Close all Windows and Browsers, [COLOR=Yellow]especially any Firefox Windows.[/COLOR]
◦Double-click [COLOR=Yellow]GooredFix.exe on your Desktop (Note: If you are using Vista right-click GooredFix and select Run As Administrator...)[/COLOR]
◦Select [COLOR=Yellow]Option#2 - Fix Goored by typing 2 and pressing Enter.[/COLOR]
◦At the prompt, type y and press [COLOR=Yellow]Enter.[/COLOR]
◦GooredFix will now remove the infection (if it requires a reboot, please restart your computer).
◦Note : If no entries are under "Suspect GooredEntries" then that means you don't have this infection. Please do notrun Option #2, instead proceed straight to Step 3 below


[COLOR=Yellow]
Step 3 :


The following should remove the redirects and have your PC back to normal


Please download ComboFix from Here or Here to your Desktop.

**Note: In the event you already have Combofix,this is a new version that I need you to download. It is important thatit is saved and renamed following this process directly to yourdesktop**
[/COLOR]
1.If you are using Firefox, make sure that your download settings are as follows:
◦Tools->Options->Main tab
◦Set to "Always ask me where to Save the files".
2.During the download, rename [COLOR=Yellow]Combofix to Combo-Fix as follows:



[/COLOR]
3.It is important you rename Combofix during the download, but not after.
4.Please do not rename Combofix to other names, but only to the one indicated.
5.Close any open browsers.
6.Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

-----------------------------------------------------------

◦Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before"unpredictable results". performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause
◦Click on this linkto see a list of programs that should be disabled. The list is not allinclusive. If yours is not listed and you don't know how to disable it,please ask.

-----------------------------------------------------------
◦Close any open browsers.
◦WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
◦Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
◦If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

-----------------------------------------------------------
7.Double click on combo-Fix.exe & follow the prompts.
8.Note: Do not mouseclick combo-fix's window while it's running. That may cause it to stall
9.This should fix your search engine redirects. Please restart your PC, check how its running and if there are any more redirects.



[COLOR=Yellow]Step 4 :


This step is easy and quick, it is to remove any left over pieces of malware or anything else that may be hiding


Please download Malwarebytes' Anti-Malware from Here

Double Click mbam-setup.exe to install the application.[/COLOR]
•Make sure a checkmark is placed next to [COLOR=Yellow]Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.[/COLOR]
•If an update is found, it will download and install the latest version.
•Once the program has loaded, select [COLOR=Yellow]"Perform Quick Scan", then click Scan.[/COLOR]
•The scan may take some time to finish,so please be patient.
•When the scan is complete, click OK, then Show Results to view the results.
•Make sure that [COLOR=Yellow]everything is checked, and click Remove Selected.[/COLOR]
•When disinfection is completed it is recommended you reboot your PC

Extra Note:
[COLOR=LemonChiffon]If MBAMencounters a file that is difficult to remove,you will be presentedwith 1 of 2 prompts,click OK to either and let MBAM proceed with thedisinfection process,if asked to restart the computer,please do soimmediatly.



Conclusion :


Let us remove those tools we used, its best not to keep them around.

[/COLOR]
•Download OTC to your desktop and run it
•Click Yes to beginning the Cleanup process and remove these components, including this application.
•You will be asked to reboot the machine to finish the Cleanup process. Choose Yes.


Your PC should hopefully be clean from those pesky redirects ! There isnothing left to do but enjoy having a normal PC again. If that isn'tthe case then you must have some other sort of infection or a newvariant. Don't worry though, its nothing we cant fix. Just pop over tothe [COLOR=Yellow]Help Desk


However, if this guide did fix your PC, I'm glad to be of assistance.Feel free to hang around as there is plenty to read and learn here.

Waseemtabish Sunday, October 25, 2009 10:19 AM

~*~XP secrets~*~
 
[B] ~*~XP secrets~*~[/B]

XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/ sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

Creating ****down Icon or One Click ****down:

Navigate to your desktop. On the desktop, right-click and go to New, then to Shortcut (in other words, create a new shortcut). You should now see a pop-up window instructing you to enter a command line path.
Use this path in "Type Location of the Item"
****DOWN -S -t 01

If the C: drive is not your local hard drive, then replace "C" with the correct letter of the hard drive. Click the "Next" button. Name the shortcut and click the "Finish" button. Now whenever you want to **** down, just click on this shortcut and you're done.

Increasing Band-Width By 20%:

Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc

To get it back:

Click Start then Run and type " gpedit.msc" without quotes.This opens the group policy editor. Then go to:
Local Computer Policy then Computer Configuration then Administrative Templates then Network then QOS Packet Scheduler and then to Limit Reservable Bandwidth.

Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab I.e."By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.It works on Win 2000 as well.

Renaming The Recycle Bin icon:

To change the name of the Recycle Bin desktop icon, click Start then goto Run, write Regedit and press Enter. It opens Registry Editor. Now in Registry Editor go to:

HKEY_CLASSES_ ROOT/CLSID/ {645FF040- 5081-101B- 9F08-00AA002F954 E}
And change the name "Recycle Bin" to whatever you want (don't type any quotes).

Managing Tasks:

You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.


Removing Shared Documents folder From My Computer window:

Open registry editor by going to Start then Run and entering regedit. Once in registry, navigate to key

HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ My Computer \ NameSpace \ DelegateFolders

You must see a sub-key named {59031a47-3f72- 44a7-89c5- 5595fe6b30ee} . If you delete this key, you have effectively removed the my shared documents folder.
Making Google the Default Search Engine in Internet Explorer:

Open registry editor by going to Start then Run and entering regedit and navigate to following three keys separately and change it as shown below:


[HKEY_CURRENT_ USER\Software\ Microsoft\ Internet Explorer\Main]
"Search Page"=" [url]http://WWW.google.Com[/url] "
"Search Bar"=" [url]http://WWW.google[/url]. Com/i.e. "

[HKEY_CURRENT_ USER\Software\ Microsoft\ Internet Explorer\SearchURL]
""=" [url]http://WWW.google[/url]. Com/keyword/ %S "

[HKEY_LOCAL_ MACHINE\SOFTWARE \Microsoft\ Internet Explorer\Search]
"SearchAssistant" =" [url]http://WWW.google[/url]. Com/i.e. " .

Improving the Slow Boot up time:

There are a variety of reasons why your windows XP system would boot slowly. Most of the times it this has to do with the startup applications. If you would like to speed up the bootup sequence, consider removing some of the startup applications that you do not need. Easiest way to remove startup apps is through System Configuration Utility. Go to Start then Run and enter MSCONFIG and go to the Startup tab. Deselect/UnCheck application( S) that you do not want to startup at boot time.

Customize Logon prompt with your Own Words:

Open Registry by going to Start then Run, entering regedit and Navigate to

[HKEY_LOCAL_ MACHINE\SOFTWARE \Microsoft\ Windows NT\CurrentVersion\ Winlogon] . In right pane, look for key by the name "LogonPrompt" . Set its value to whatever text you want to see displayed at login screen.

IP address of your connection:

Go to Start then Run. Enter 'cmd' and then enter 'ipconfig' .Add the '/all' switch for more info .

Making Folders Private:

Open My Computer Double-click the drive where Windows is installed (usually drive (C, unless you have more than one drive on your computer). If the contents of the drive are hidden, under System Tasks, click Show the contents of this drive.

Double-click the Documents and Settings folder. Double-click your user folder. Right-click any folder in your user profile, and then click Properties. On the Sharing tab, select the Make this folder private so that only I have access to it check box.

To change Drive Letters:

Go to Start > Control Panel > Administrative Tools > Computer Management, Disk Management, then right-click the partition whose name you want to change (click in the white area just below the word "Volume") and select "change drive letter and paths."

From here you can add, remove or change drive letters and paths to the partition.

Removing the Shortcut arrow from Desktop Icons:

Goto Start then Run and Enter regedit. Navigate to HKEY_CLASSES_ ROOTlnkfile. Delete the IsShortcut registry value. You may need to restart Windows XP.

Get Drivers for your Devices:

Visit Windows Update (XP Only)
Look at the left hand pane and under Other Options click Personalize Windows Update.
Now in the right hand pane check the box - Display the link to the Windows Update Catalog under See Also
Below Choose which categories and updates to display on Windows Update - make sure you check all the boxes you want shown.
Click Save Settings
Now look in the left hand pane under See Also click Windows Update Catalog and choose what you're looking for. Choose either MS updates or drivers for hardware devices.
Start the Wizard and off you go.

Customize Internet Explorer's Title Bar:

Open Registry by going to Start then Run and Enter regedit. Navigate to HKEY_CURRENT_ USER\Software\ Microsoft\ Internet. Explorer\Main. In right hand panel look for string "Window Title" and change its value to whatever custom text you want to see.

Disabling the use of Win Key:

If your are a gaming freak then you must be sick of the Win key in your keyboard. To disable use of Win key, open registry by going to Start then Run and entering regedit.

Navigate to [HKEY_LOCAL_ MACHINE\SYSTEM\ CurrentControlSe t\Control\ Keyboard Layout] . In this look for value of "Scancode Map". Its binary data so be extra careful:
Set its value to "00 00 00 00 00 00 00 00 03 00 00 00 00 00 5B E0 00 00 5C E0 00 00 00 00" to disable the win key.

Restarting Windows without Restarting the Computer:

This one is again is. When you click on the ****DOWN button, make sure to simultaneous press SHIFT Button. If you hold the Shift key down while clicking on ****DOWN button, you computer would restart without restarting the Computer. This is equivalent to term "HOT REBOOT".

Stopping XP from displaying unread messages count on Welcome Screen:

To stop XP from displaying count of unread messages, Open registry and navigate to [HKEY_CURRENT_ USER\Software\ Microsoft\ Windows\CurrentV ersion\UnreadMai l] and look for the data key "MessageExpiryDays" . If you do not see this key, create one DWORD key by the name "MessageExpiryDays" . Setting its value to 0 would stop Windows XP from displaying the count of unread messages.

Modify Color Selection of Default Theme:

Open registry by going to Start then Run. Entering regedit, navigate to [HKEY_USERS\ .DEFAULT\ Software\ Microsoft\ Windows\CurrentV ersion\ThemeMana ger] and locate the key "ColorName".
Right Click on it and select modify its value from "NormalColor" to "Metallic"
Click Ok, and exit regedit and restart your computer.

Waseemtabish Sunday, October 25, 2009 10:20 AM

100 Run Commands
 
[B]100 Run Commands[/B]

Accessibility Options : access.cpl
Add Hardware: hdwwiz.cpl
Add / Remove Programs: appwiz.cpl
Administrative Tools : control admintools
Automatic Updates: wuaucpl.cpl
Wizard file transfer Bluethooth: fsquirt
Calculator: calc
Certificate Manager: certmgr.msc
Character: charmap
Checking disk : chkdsk
Manager of the album (clipboard) : clipbrd
Command Prompt : cmd
Service components (DCOM) : dcomcnfg
Computer Management : compmgmt.msc
DDE active sharing : ddeshare
Device Manager : devmgmt.msc
DirectX Control Panel (if installed) : directx.cpl
DirectX Diagnostic Utility : dxdiag
Disk Cleanup : cleanmgr
Disk Defragmenter : dfrg.msc
Disk Management : diskmgmt.msc
Partition manager : diskpart
Display Properties : control desktop
Properties of the display (2) : desk.cpl
Properties display (tab "appearance") : control color
Dr. Watson: drwtsn32
Manager vérirficateur drivers : check
Event Viewer : Eventvwr.msc
Verification of signatures of files: sigverif
Findfast (if present) : findfast.cpl
Folder Options : control folders
Fonts (fonts) : control fonts
Fonts folder windows : fonts
Free Cell ...: freecell
Game Controllers : Joy.cpl
Group Policy (XP Pro) : gpedit.msc
Hearts (card game) : mshearts
IExpress (file generator. Cab) : IExpress
Indexing Service (if not disabled) : ciadv.msc
Internet Properties : inetcpl.cpl
IPConfig (display configuration): ipconfig / all
IPConfig (displays the contents of the DNS cache): ipconfig / displaydns
IPConfig (erases the contents of the DNS cache): ipconfig / flushdns
IPConfig (IP configuration cancels maps): ipconfig / release
IPConfig (renew IP configuration maps) : ipconfig / renew
Java Control Panel (if present) : jpicpl32.cpl
Java Control Panel (if present) : javaws
Keyboard Properties: control keyboard
Local Security Settings : secpol.msc
Local Users and Groups: lusrmgr.msc
Logout: logoff
Microsoft Chat : winchat
Minesweeper (game): winmine
Properties of the mouse: control mouse
Properties of the mouse (2): main.cpl
Network Connections : control NetConnect
Network Connections (2): ncpa.cpl
Network configuration wizard: netsetup.cpl
Notepad : notepad
NView Desktop Manager (if installed): nvtuicpl.cpl
Manager links: packager
Data Source Administrator ODBC: odbccp32.cpl
Screen Keyboard: OSK
AC3 Filter (if installed) : ac3filter.cpl
Password manager (if present): Password.cpl
Monitor performance : perfmon.msc
Monitor performance (2): perfmon
Dialing Properties (phone): telephon.cpl
Power Options : powercfg.cpl
Printers and Faxes : control printers
Private Character Editor : eudcedit
Quicktime (if installed) : QuickTime.cpl
Regional and Language Options: intl.cpl
Editor of the registry : regedit
Remote desktop connection : mstsc
Removable Storage: ntmsmgr.msc
requests the operator to removable storage: ntmsoprq.msc
RSoP (traduction. ..) (XP Pro): rsop.msc
Scanners and Cameras : sticpl.cpl
Scheduled Tasks : control schedtasks
Security Center : wscui.cpl
Console management services: services.msc
shared folders : fsmgmt.msc
Turn off windows : shutdown
Sounds and Audio Devices : mmsys.cpl
Spider (card game): spider
Client Network Utility SQL server : cliconfg
System Configuration Editor : sysedit
System Configuration Utility : msconfig
System File Checker (SFC =) (Scan Now) : sfc / scannow
SFC (Scan next startup): sfc / scanonce
SFC (Scan each démarraget) : sfc / scanboot
SFC (back to default settings): sfc / revert
SFC (purge cache files): sfc / purgecache
SFC (define size CAHC x) : sfc / cachesize = x
System Properties : sysdm.cpl
Task Manager : taskmgr
Telnet client : telnet
User Accounts : nusrmgr.cpl
Utility Manager (Magnifier, etc) : utilman
Windows firewall (XP SP2) : firewall.cpl
Microsoft Magnifier: magnify
Windows Management Infrastructure: wmimgmt.msc
Protection of the accounts database: syskey
Windows update: wupdmgr
Introducing Windows XP (if not erased) : tourstart
Wordpad : write
Date and Time Properties : timedate.cpl

Waseemtabish Monday, October 26, 2009 07:53 PM

make an invisible folder in xp
 
[B]make an invisible folder in xp[/B]

First of all fight click on desktop in empty area.
the make a new folder and don't give it any name ok.
now right on it again and select remane .
then hold "Alt" key and while holding "Alt key" press "0160" from your num key pad which is on right side of your keyboard.
now you have named it.
there would showing nothing in its name.
now right click on it again and slect properties and then click on the customize tab and then click on change icon.
there would be a lots of icons in the list. now you scroll toward right till you find an empty place between the icons slect it and hit ok.
now you will see there is no icon on the desktop.

Waseemtabish Monday, October 26, 2009 07:55 PM

Make USB Disable Enable In Window
 
[B]Make USB Disable Enable In Window[/B]

pehle run main ja kar regedit likhna hai

Hkey_Local_Machine\System\CurrentControlset\Services\USBStor

IS KE BAAD START VALUE KO DOUBLE CLICK KAR KE OPEN KAREIN GE YAHAN 3 LIKHA HO GA US KO 4 KAR DEIN DISABLE HO JAYE GI DOBARA 3 KAR DEIN ENABLE HO JAYE GI...

Waseemtabish Monday, October 26, 2009 07:56 PM

Amaizng & Dangerus Tips
 
[B]usb disable krna (Disable)[/B]
may ap ko 2 files deta hoon inhey app kise ke b memmory card ya usb main copy kr dein ya khud double click kr dein jis b pc main ye file run ho gi us main kabi usb ports kaam krna chor dein ge jab tak us pc pr window nahi ho gi tb tk us main koi b usb suported dvice kaam nhi kre gi
usb enable krna (Enable)

[url]http://rapidshare.com/files/274798435/usb_U-D.zip[/url]

Waseemtabish Monday, October 26, 2009 07:58 PM

Secure Your Vista PC in 10 Easy Steps
 
By making a few judicious changes using the security tools within Windows Vista--and in some cases by adding a few pieces of free software--you can lock down your operating system.

1. Use Windows Security Center as a Starting Point

For a quick overview of your security settings, the Windows Security Center is where you'll find the status of your system firewall, auto update, malware protection, and other security settings. Click Start, Control Panel, Security Center, or you can simply click the shield icon in the task tray. If you see any red or yellow, you are not fully protected. For example, if you have not yet installed an antivirus product on your machine, or if your current antivirus product is out-of-date, the Malware section of the Security Center should be yellow. Windows does not offer a built-in antivirus utility, so you'll want to install your own. For free antivirus, I recommend AVG Anti-Virus 8.

2. Use Windows Defender as a Diagnostic Tool

The Malware section also covers antispyware protection, and for that Windows Vista includes Windows Defender. The antispyware protection in your antivirus program usually trumps the protection Microsoft provides, but there are several good reasons to keep Windows Defender enabled. One is that every antispyware program uses a different definition of what is and what is not spyware, so redundant protection can actually offer some benefit.

Another reason to keep Windows Defender enabled: diagnostics. Click Tools, and choose Software Explorer from the resulting pane. You can display lists of applications from several categories such as Currently Running Programs, Network Connected Programs, and Winsock Service Providers, but Startup Programs is perhaps the most useful. Click on any name in the left window, and full details will appear in the right pane. By highlighting, you can remove, disable, or enable any of the programs listed.

3. Disable the Start Up menu

Windows Vista keeps track of all the documents and programs you launch in the Start Up menu. This can be convenient for some users, but it can also compromise your privacy if you share a computer within an office or household. Fortunately Windows Vista provides an easy way to tweak this setting. To protect your privacy, follow these steps:

Right click on the taskbar and select Properties.
Click on the Start Menu tab.
Uncheck Store and display a list of recently opened files.
Uncheck Store and display a list of recently opened programs.
Click OK.

4. Get Two-Way Firewall Protection

No desktop should be without a personal firewall, but even if the Security Center says you're protected, you may not be. The Windows Firewall within Vista blocks all incoming traffic that might be malicious or suspicious--and that's good. But outbound protection is not enabled by default. That's a dangerous situation if some new malicious software finds its way onto your PC. Microsoft did include the tools for Windows Vista to have a true two-way firewall, but finding the setting is a little complicated. (Hint: Don't go looking the Windows Firewall settings dialog box.)

To get two-way protection in Windows Vista, click on the Start button; in the search space, type wf.msc and press Enter. Click on the Windows Firewall with Advanced Security icon. This management interface displays the inbound and outbound rules. Click on Windows Firewalls Properties. You should now see a dialog box with several tabs. For each profile--Domain, Private, and Public--change the setting to Block, and then click OK.


5. Lock Out Unwanted Guests

If you share your computer with others (and even if you don't), Windows Vista includes a neat way to keep unwanted guests from guessing your system administrator password. When you set up users and declare one user as administrator (with full privileges), Windows Vista allows outsiders unlimited guesses at the password you chose. Here's how to limit the guesses.

Click Start, type Local Security Policy.
Click Account Lockout Policy.
Choose Account Lockout Threshold.
At the prompt, enter the number of invalid log-ins you'll accept (say, 3).
Click OK and close.

6. Now Audit Your Attackers

With the Account Lockout policy in place, you can now enable auditing to see any account attacks. To turn on auditing for failed log-on events, do the following:

Click the Start button, type secpol.msc, and click the secpol icon.
Click on Local Policies and then Audit Policy.
Right-click on Audit account logon events policy and select Properties.
Check the Failure box and click OK.
Right-click on Audit logon events policy and select Properties.
Check the Failure box and click OK.
Close the Local Security Policy window.
You can then use the Event Viewer (by running eventvwr.msc) to view the logs under Windows Logs and Security.

7. Secure Your Internet Explorer Settings

The Windows Security Center will also report whether your Internet Explorer 7 (or IE security settings are at their recommended levels. If the screen shows this section as red, you can adjust the settings within the browser itself.

Within Internet Explorer, click Tools in the menu bar.
From the drop-down menu, click Internet Options.
Choose the Security tab.
Within the Security tab, click Custom Level.
Here you'll see a window with all the security options for the browser. If any are below the recommended level (if, say, some kind of malware reconfigured your browser settings), these options will be highlighted in red. To change an individual setting, click the appropriate radio button. To reset them all, use the button near the bottom of the tab. You can also change the overall security setting for Internet Explorer from the default Medium-High setting to the recommended High or Medium, if you wish. Click OK to save and close.


8. Use OpenDNS

Domain Name System (DNS) servers act as a phone book. When you type "pcworld . com" in the address bar, for instance, Internet Explorer sends that common-name request to your Internet service provider's DNS servers to be converted into a series of numbers, or an IP address. Lately, DNS servers have come under attack, with criminals seeking to redirect common DNS preferences to servers that their interests control. One way to stop such abuse is to use OpenDNS.

Go to Start, Control Panel, Network and Internet, and then click Network and Sharing Center. Under the tasks listed on the left, click Manage Network Connections. In the Manage Network Connections window, do the following.

Right-click on the icon representing your network card.
Click Properties.
Click Internet Protocol Version 4.
Click the Properties button.
Select the Use the following DNS server addresses radio button.
Click OK.

9. Live With User Account Control

One area where some people might want to see the Windows Security Center turn red is User Account Control (UAC), perhaps the most controversial security feature within Windows Vista. Designed to keep rogue remote software from automatically installing (among other things), UAC has a tendency to thwart legitimate software installations by interrupting the process several times with useless messages. In Windows 7 you'll be able to set UAC to the level you want. Until then, you do have some options.

One is to disable UAC. I would caution against that, since UAC is meant to warn you of potential danger. Instead, install TweakUAC, a free utility that offers the ability to turn UAC on or off as well as an intermediate "quiet" mode that keeps UAC on but suppresses administration elevation prompts. With TweakUAC in quiet mode, UAC will appear to be off to those running as administrator accounts, while people with standard user accounts will still be prompted.

10. Check Your Work

Now that you've tweaked Windows Vista, you can keep tabs on your system's security with the System Health Report. This diagnostic tool takes input from the Performance and Reliability Monitor and turns it into an information-packed report that can spotlight potential security problems.

Open Control Panel.
Click System.
In the Tasks list, click Performance (near the bottom).
In the resulting Tasks list, click Advanced tools (near the top).
Click the last item on the resulting list: Generate a system health report.
The report will list any missing drivers that might be causing error codes, tell you whether your antivirus protection is installed, and declare whether UAC is turned on. You may want to run this report once a month just to make sure everything's still good.

Waseemtabish Monday, October 26, 2009 08:00 PM

make your Desktop Icons Transparent
 
[B]make your Desktop Icons Transparent [/B]



Go to ontrol Panel > System, > Advanced > Performance area > Settings button Visual Effects tab "Use drop shadows for icon labels on the Desktop

Waseemtabish Monday, October 26, 2009 08:02 PM

Right click tips
 
[B]Right click tips[/B]

Lets say you have a bout 4-5 very useful applications which you use always. By placing them all on the first level menu will eventually crowd your start menu. Now why not utilize the right-click option instead? The right-click option gives you the ability to Open, Explore and Find. If you can add a shortcut to your application to that menu, it would be great.

To do this, crank up your registry editor and go to HKEY_CLASSES_ROOT\Directory\Shell. Right-click on Shell and create a new key. Type in an appropriate name for the key. On the right pane, double-click on the Default value, and add a title with a & character in front of the letter as an accelerator key. Right-click on the key you just created and create another key under it called command . For the Default value of command, enter the full path and program you want to execute in the Value data box.

For example, if you wanted Notepad, you would add that as the first key, the default in the right panel would be &Notepad so when you right click on the Start Button, the N would be underlined and you could just press that key. The command would be something like C:\Windows\notepad.exe. Now when you right click on the Start Button, your new program will show up

Waseemtabish Monday, October 26, 2009 08:04 PM

Refresh Your Windows (SPEED UP)
 
[B]Refresh Your Windows (SPEED UP) [/B]


Does your PC seem to be inexplicably slowing down? If you?ve scanned your PC and ruled out viruses and malware, then it is the invisible, undetectable detritus that has collected on your hard drive which is mucking up the works. Incompletely removed software, unnecessary background tasks, malfunctioning device drivers and other such pesky problems can seriously slow down your machine. Let?s look at how to get your Windows back to its quick and reliable self?and solve an unfixable Windows setup.

A Windows Treatment

If windows stumbles but doesn?t fall, your PC likely needs only refurbishing, not a full operating system makeover. In fact, machines with startup problems can usually be repaired without a last gasp reinstallation. (Of course, if your PC experiences problems before Windows loads, chances are they have nothing to do with the OS). Follow these steps to reinvigorate your current Windows setup.


CUT BACK ON AUTOLOADS

You may be amazed at just how many programs load automatically at Windows boot-up and then run in the background as you work (not all of them appear as icons in the system tray, either). Each of these programs uses memory and other resources, which might even cause a conflict with another program.
To view your list of autostart apps, select Start, Run, type msconfig, and press Enter to open the System Configuration Utility. (Windows 2000 lacks this utility, download Mike Lin?s free Startup Control Panel alternative for that OS from www. mlin.net). Click the Startup tab Uncheck items in this list to keep them from autoloading.

Windows 2000 needs no autoload programs, and Windows XP requires only one?sort of. If you don?t use Microsoft Messenger, you may want to uncheck ?msmsgs?, but doing so can cause problems with Outlook, Internet Explorer, or other Microsoft programs. Windows 98 and Me have several autoloading applications. In these versions, keep LoadPowerProfile, SystemTray, ScanRegistry, PCHealth, and TaskMonitor selected (including both instances of the first one if it?s listed twice, which can occur as part of Windows? boot process). If you use Windows? Task Scheduler, don?t uncheck SchedulingAgent (to find out whether a program is using the applet, select Start, Programs, Accessories, System Tools, Scheduled Tasks and see if anything is listed).

For Windows Me, keep StateMgr. Determining whether you need your other autoload apps requires a bit of detective work. You can usually figure out what application put the entry in your startup list by reading the information in the Startup tab?s Command column. For instance, if you see that the loading file is located in the Roxio folder, it?s a good bet that the entry is a Roxio program. Keep checked any listing related to your firewall or your antivirus program to make sure they?re always running in the background. On the other hand, some autoloaders put an icon in the system tray for launching an application that you could just as easily launch from the Start menu. Having these programs autoload is a waste of resources, so uncheck away.

Sometimes it?s a judgment call: If a utility enhances Windows in a way you like, running it at all times could be worthwhile. But even then, if Windows gives you trouble, consider disabling such a program?at least temporarily?to see whether it?s the culprit; life may be better without it.

Unfortunately some unchecked programs have a way of reappearing checked and autoloaded, even though you just unchecked them. Why? The application that installed the autoloading program sees what you?ve done, and responds by ?correcting? your mistake. If this happens to you, unchecking the option will just create a cycle of frustration. Instead, launch the application and explore its menus, looking for a ?load at startup? option. When you find it, uncheck it. If you don?t find such an option, check the vendor?s Web site. If you discover that there?s no way to turn off the autoloader, and you have no good reason to leave it on, ask yourself how badly you want that program on your PC. And uninstall it.


UNINSTALL UNUSED APPS


A program doesn?t have to be running to mess up Windows? performance. Getting rid of all the applications on your PC that you no longer use is a good idea. Doing so isn?t always easy, however. Most programs have their own uninstall routine.

Unfortunately, these routines seldom remove everything. All too often installing a program gives you both benefits and problems, and uninstalling it removes only the benefits. Nevertheless, the program?s own uninstall routine is the best place to start the removal process. You might find a shortcut to the uninstaller on the program?s Start menu entry. If not, select Start, Control Panel, Add or Remove Programs (in Windows XP) or Start, Settings, Control Panel, Add/Remove Programs (in all other Windows versions). Find the program you want on the ?Currently installed programs? list (under the Install/Uninstall tab in Windows 9, click the Add/Remove or Change/Remove button and follow the prompts.

You haven?t really gotten rid of the program yet. Reopen the System Configuration utility to see whether the uninstalled application still autoloads anything; if it does, follow the steps in ?Cut Back on Autoloads? above. Next, open Windows Explorer and delete the program?s folder inside the C:\Program Files directory (if it?s still there). And if a shortcut to the program is still on the Start menu, right-click the item and then select Delete.


PARE THE REGISTRY



There?s no bigger rat?s nest on a well used Windows system than the Registry. Whenever you install software, change hardware, or download something from the Web, you pour gunk into this vast, loosely constructed database that Windows relies on to work properly. Cleaning it out can make a world of difference in Windows? performance. Before you start, make sure you can restore the Registry to its previous state should you delete the wrong key.

Windows 98, Me, and XP (but not 2000) back up the Registry automatically, but it doesn?t hurt to make an extra backup before doing something that could hose your PC. With your personal data, it makes sense to store the backup at another location, but that?s not the case with the Registry backup. If your hard drive goes bad, it?s pointless to restore this Registry backup in another Windows setup. In Windows XP and Me, you can use System Restore to back up the Registry. Select Start, All Programs (Programs in Me), Accessories, System Tools, System Restore, Create a restore point, and then follow the prompts. To back up the Windows 98 Registry, select Start, Run, type scanreg, and press Enter. When you see no more errors, click Yes and then OK. Windows 2000 offers no reliable way to back up your Registry, so you have to use third-party software. I recommend Lars Hederer?s free Emergency Recovery Utility NT (ERUNT) that you can download from
Click Here To Download


Start Anew in Windows


Sometimes windows is beyond recovery, and there?s nothing left to do but reinstall it. If all goes well, you?ll be done in only a couple of hours?but be ready to survive without the machine?s services for a day or two if you need to troubleshoot the reinstall.

Before you do anything, back up: Make a copy of all your data files and place it on a CD or other removable medium. For optimal results, use a disk-imaging program like Norton Save & Restore or Acronis True Image, which duplicates your hard drive so that it can be quickly and easily restored if necessary. Next, locate your Windows installation CD (or the restore CD that came with your computer), plus the discs for every application that you want to keep. If you don?t have a restore CD, look for a restore utility on your PC, which likely has an option to create a restore CD.

If you downloaded a shareware program and don?t have a CD, make sure to track down the registration code needed to turn the free trial into the fully functional, unlimited-use version. With luck, you won?t need the CDs that came with your hardware, which are neither easy to access nor up-to-date. Put all of your current device drivers in a separate folder, away from C:\Windows, before the reinstall. But be forewarned: If a set-aside driver doesn?t work, you may still need the outdated one from the vendor?s CD.


GET SWEEPING


Take a deep breath, insert your Windows or restore CD, and reboot your PC. Restore CDs vary from vendor to vendor, so we can?t give you specific instructions. At their best, the discs are fully functional Windows CDs holding all the drivers you need. But at their worst, they only allow you to return your hard drive to its factory condition?with Windows but without any of your data and programs. If the only option on your restore CD is a fresh factory installation, make doubly sure you have your data backed up before you reinstall. After the reinstall, you?ll have to restore your data from this backup.

If your CD has a full copy of Windows XP or 2000, you?ll be prompted to ?Press any key to boot from CD?. Do so. In the setup program, pick the options that will leave the previous file system in place while deleting (as opposed to repairing) the old operating-system files. Follow the other prompts. You?ll eventually be asked for your user name, as well as for the names of other users. Enter just one name?not your real name (problems can arise if Windows tries to make new folders with the same names as existing ones). Instead, enter the name ?fake?, which you?ll delete later.

MATCH USERS TO DATA


When you?re back in Windows logged on as someone named ?fake,? open Windows Explorer to C:\Documents and Settings, select Tools, Folder Options, View, Show hidden files and folders, and make sure ?Hide protected operating system files (Recommended)? is unchecked. Click Yes, and then OK.

Now you?ll see six or more folders, among which will likely be ones named All Users, All Users. WINDOWS, Default User, Default User.WINDOWS, and ?fake?. There will also be a folder for each of the old installation?s log-in names. Open the Default User folder and look for one or more files named ?NTUSER? (they may have different file extensions). Delete these files, press Ctrl-A to select all the remaining files and folders, and then drag them all to the Default User.WINDOWS folder. At any dialog box, select Yes or, better yet, Yes to All. When you?re done, delete the empty Default User folder. Repeat the process with the All Users folder, copying everything except the ?NTUSER? files (if they exist) to the All Users.WINDOWS folder. Return to the Documents and Settings folder and rename each of the folders for an actual user (rather than the All Users, Default User, and ?fake? folders) by adding the extension .old to the name.

For instance, rename the folder ?Lincoln? to Lincoln.old (click the folder name once or use the F2 key to rename folders). To create the real accounts, select Start, Control Panel, User Accounts in Windows XP or Start, Settings, Control Panel, Users and Passwords in Windows 2000. Create an account for each user from the previous install. At least one of the accounts must have administrator privileges. In Windows 2000 you may have to check ?Users must enter user name and password to use this computer to create users?.

Once all of the users are in place, log off ?fake? and log on to each new account one at a time. In XP, select Start, Log Off, Log Off; in 2000, click Start, Shut Down, Log off fake, OK. If you are the only user, log on as yourself, log off, and log on again as ?fake.? If there are multiple users, first log on as one user, then log off and log on again as the next user, then log off again, and so on, until you?ve logged on and off as each user before logging back on as ?fake.? XP users:

Resist the temptation to use the Switch User option (which does not exist in 2000); you need to completely log off each user, not just switch users. Once you?re logged back on as ?fake,? your Documents and Settings folder should have two folders for each real user: ?login name? and ?login name.old?. Delete the ?NTUSER? files and move the others as described above for Default User, but this time from the ?login name. old? folder to the ?login name? folder. In other words, if the user?s name is ?Lincoln,? you would enter the ?Lincoln. old? folder, delete all the ?NTUSER? files, and drag the remaining files and folders to the ?Lincoln? folder. When you?re done, log off ?fake,? and then log on to one of the system?s real accounts with administrator privileges. Finally, return to Control Panel?s User Accounts applet and delete the ?fake? account, using the option to delete files.


FINISH THE JOB

The last step is to reinstall your drivers. Listings with a yellow question mark need an update. But other drivers may be out of date as well. To reinstall a driver, double-click its listing in Device Manager and choose Driver, Update Driver. Select the option in the Hardware Update Wizard that lets you choose the location of the search and select the driver (the wording varies). Uncheck the option to search floppies, CDs, and other removable media, and direct the wizard to look in the folder c:\olddrivers. Click Next, and follow the prompts.

If you are prompted to insert a particular CD, click OK and point to c:\olddrivers, which is where your drivers are stored. If that doesn?t work, simply tell the installer to skip that file. The driver will likely install properly despite Windows? inability to find that specific file. However, if the device doesn?t work, dig out the CD that came with it and load the driver from it. When all the drivers are in place, delete the c:\olddrivers folder, or move it to a removable medium for safekeeping.

Your applications are still on your hard drive and listed on your Start menu (that is, unless your restore CD reformatted your hard drive), but most of them won?t work because Windows can?t see them yet. Reinstall the applications that don?t open when you try them. If you no longer want a program, delete its shortcut from the Start menu and remove its folder from the Program Files folder. You don?t have to properly uninstall the app this time.

At some point, you may have to reactivate XP. Since your hardware hasn?t changed, this should be no problem. And last but definitely not least, you should update Windows and your applications.

Hardware Fixes

Conventional wisdom urges us to frequently update our drivers?the programs that tell Windows what to do with hardware. If your PC is running well, there?s no reason to update your drivers. But if you?re having trouble, a driver update might help. First, open Windows? Device Manager by right-clicking My Computer and selecting Properties. In Windows XP and 2000, click Hardware, Device Manager. In Windows 98 or Me, click Device Manager.

Look for entries with yellow question marks or red exclamation points: The question mark indicates that Windows is using a generic driver for that device instead of one designed for it, and an exclamation point means that the device is not working. The drivers for graphics boards, sound cards, and printers are most likely to need an update. Drivers under ?Computer?, ?Disk drives?, and ?Keyboards? rarely require updating.

To update a driver, double-click the component listing and choose Driver, Update Driver in the product?s Properties dialog box. The Hardware Update Wizard will search for an updated driver on your local drives as well as on Microsoft?s Windows Update site, and it will install the driver if it finds one.

Even if the wizard doesn?t find one, a driver update may be available. Search for a new version on the vendor?s Web site, or enter the full product name plus the word driver in a search engine. When you find an update, make sure it works with your version of Windows. Either the new driver will install automatically after you download and run it or it will provide you with installation instructions.
It is possible that updating a driver could make things worse. In Windows XP, click Roll Back Driver under the Driver tab in the Properties dialog box to return to the previous version. If you regret updating a driver in 98, Me, or 2000, your only option is to replace it with a generic driver (at least until the vendor releases a bug fix)

Waseemtabish Monday, October 26, 2009 08:05 PM

Some More
 
GREATLY INCREASE YOUR VIRTUAL RAM
This makes your computer faster by using part of your HD space as virtual RAM. ( Takes around a gigabyte of space,when initialized. but still speeds up your computer greatly!)

If your HD has less than 20GB of free space left then don't do this.

Alright, this is how you do it:


Instructions:
1. Right Click on "My Computer" icon and select "Properties".
2. Click on the Advanced tab.
3. Under Performance, click Settings.
4. Then click the Advanced tab on the button that pops up.
5. Under Virtual Memory at the bottom, click Change.
6. Click the Custom Size button.
7. For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although i use 4000), and for the Maximum size type in anywhere from 2000-2500 (although i use 6000).

8. Click Set, and then exit out of all of the Windows.
9. Finally, restart your computer.
10. You now have a faster computer and 1-2gb of virtual RAM!
I did this personally and it worked great for me.

================================================== ==

MAKE YOUR PROCESSOR FASTER..

This trick work with AMD and Intel

first go to start and then Run
and go to regedit

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Session Manager\Memory Management

in the right side you will see SecondLevelDataCache clik modifier and change it to .....

writ 256 if your processeur is
Intel pentium 3 E
Pentium 4
AMD k6-3
AMD Thunderbird
Cyrix 3
Pentium 2 Mobile

writ 64 if your processeur
AMD Duron

writ 512 if your processeur is
AMD K6-2
Pentium 2
Pentium 3 Katmai
AMD Athlon

writ 1024 if your processeur is :
Pentium 2 Xeon
Pentium 3 Xeon

and 128 for processeur
Pentium Celeron
Pentium Celeron 2

THIS IS FOR NEW COMPUTER!
Actually this tweak is completely useless on newer computers, all it does is set the L2 cache size. Here's a better explanation of it:

Myth - "Adjusting the SecondLevelDataCache Registry value to match your CPU's L2 Cache size will improve performance."

Reality - "If you do not set this registry value, Windows will use the HAL (Hardware Abstraction Layer) for retrieval of the L2 cache size automatically on boot up. If this fails, a default value of 256KB is used. This is where the myth that XP can only use 256KB of L2 cache comes from. But it's false. The SecondLevelDataCache is designed as a secondary source of cache size information for computers on which the HAL cannot detect the L2 cache. The HAL is able to retrieve the L2 cache size from any CPU using the set-associative cache design (Pentium II or newer), it's only the relatively few older processors with direct-mapped L2 caches that the HAL will not recognize. This tweak only applies to older computers (Pentium I or older) with over 64MB of memory. On these older systems, this tweak can improve performance by about 0.4%. Pentium II and later CPUs are not affected."

==================================================

Open Regedit by clicking Start>Run and type in regedit.
Once Regedit is open, click the plus symbol next to the HKEY_CURRENT_USER folder, the plus symbol next to Control Panel, and then click the Desktop folder icon to display its contents. In the right pane, double-click MenuShowDelay to change its value. (This Registry location is referred to as HKEY_CURRENT_USER\CONTROL\PANEL\DESKTOP\MENUSHOWDE LAY.) The default Value Data is 400, or 4/10 of a second. Change the Value Data to 0 for the least delay, and click OK. This will make menus appear instantly on your computer instead of having a delay.

================================================== ==

Open HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\CONTRO L\FILESYSTEM. Right-click Filesystem, select New, and DWORD Value. Rename NewValue#1 on the right-side pane to DisableNTFSLast-AccessUpdate. Double-click this new entry, change the Value Data field from 0 to 1, and then click OK. This disables the constant updating of the dates when a file or folder were last updated. This will speed up the system.

================================================== ==

Open HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRE NTVERSION\EXPLORER. Create a new DWORD Value called DesktopProcess, and set its Value Data to 1.
Expand HKEY_CURRENT_USER, expand Control Panel, and click Desktop. Double-click the AutoEndTasks string and change the value to 1. This causes all of the components of the explorer to run in one process, making your computer faster.
There is a caveat for some users here. Do not make this change if you are not running at least a Pentium processor and 16 MB of physical memory.

================================================== ==

Expand HKEY_LOCAL_MACHINE, expand SOFTWARE, expand Microsoft, expand Windows, and expand CurrentVersion. Right-click Explorer, expand New, click Key, and name the new key AlwaysUnloadDLL. Click AlwaysUnloadDLL, double-click the Default string, and change the value to 1. Windows tries to keep some DLL's in memory when the program uses them. If a user has low memory, this can cause performance issues.

================================================== =

Expand HKEY_CURRENT_USER, expand Control Panel, and click Desktop. Double-click the HungAppTimeout string and change the value to 1000. Now, double-click the WaitToKillAppTimeout, string and change the value to 2000. This sets your system up to more efficiently handle application hangups. It also will optimize the amount of time a system takes to close a program when you try to end Windows.

================================================== =

Expand HKEY_LOCAL_MACHINE, expand System, expand CurrentControlSet, and click Control. Double-click the WaitToKillServiceTimeout string and change the value to 2000. This optimizes the time that it will take for Windows Services to close when the system is set to shut down.

================================================== ==

Expand HKEY_CURRENT_USER, expand Control Panel, click Desktop, and double-click the MenuShowDelay string in the right-hand pane. Change the value to 100. This will cause Desktop menus to appear almost instantly.


Set Recycle Bin to 1-3 percent of the hard drive space. To do this, right click on the Recycle Bin. Select properties. Move the slider down to the desired amount and click Ok. By default, the Recycle bin takes up too much of your space.

Tips & Warnings

Source:

Code:
[url]http://www.howtodothings.com/computers/a3415-how-to-make-your-computer-faster.html[/url]

Waseemtabish Monday, October 26, 2009 08:08 PM

Usefull RUN commands
 
[B]Usefull RUN commands[/B]

Start -> Run | or Winkey+R

Accessibility Controls - access.cpl
Add Hardware Wizard - hdwwiz.cpl
Add/Remove Programs - appwiz.cpl
Administrative Tools - control admintools
Automatic Updates - wuaucpl.cpl
Bluetooth Transfer Wizard - fsquirt
Calculator - calc
Certificate Manager - certmgr.msc
Character Map - charmap
Check Disk Utility - chkdsk
Clipboard Viewer - clipbrd
Command Prompt - cmd
Component Services - dcomcnfg
Computer Management - compmgmt.msc
Date and Time Properties - timedate.cpl
DDE Shares - ddeshare
Device Manager - devmgmt.msc
Direct X Control Panel (If Installed)* - directx.cpl
Direct X Troubleshooter - dxdiag
Disk Cleanup Utility - cleanmgr
Disk Defragment - dfrg.msc
Disk Management - diskmgmt.msc
Disk Partition Manager - diskpart
Display Properties - control desktop
Display Properties - desk.cpl
Display Properties (w/Appearance Tab Preselected) - control color
Dr. Watson System Troubleshooting Utility - drwtsn32
Driver Verifier Utility - verifier
Event Viewer - eventvwr.msc
File Signature Verification Tool - sigverif
Findfast - findfast.cpl
Folders Properties - control folders
Fonts - control fonts
Fonts Folder - fonts
Free Cell Card Game - freecell
Game Controllers - joy.cpl
Group Policy Editor (XP Prof) - gpedit.msc
Hearts Card Game - mshearts
Iexpress Wizard - iexpress
Indexing Service - ciadv.msc
Internet Properties - inetcpl.cpl
IP Configuration (Display Connection Configuration) - ipconfig /all
IP Configuration (Display DNS Cache Contents) - ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents) - ipconfig /flushdns
IP Configuration (Release All Connections) - ipconfig /release
IP Configuration (Renew All Connections) - ipconfig /renew
IP Configuration (Refreshes DHCP & Re - Registers DNS) - ipconfig /registerdns
IP Configuration (Display DHCP Class ID) - ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID) - ipconfig /setclassid
Java Control Panel (If Installed) - jpicpl32.cpl
Java Control Panel (If Installed) - javaws
Keyboard Properties - control keyboard
Local Security Settings - secpol.msc
Local Users and Groups - lusrmgr.msc
Logs You Out Of Windows - logoff
Microsoft Chat - winchat
Minesweeper Game - winmine
Mouse Properties - control mouse
Mouse Properties - main.cpl
Network Connections - control netconnections
Network Connections - ncpa.cpl
Network Setup Wizard - netsetup.cpl
Notepad - notepad
Nview Desktop Manager (If Installed) - nvtuicpl.cpl
Object Packager - packager
ODBC Data Source Administrator - odbccp32.cpl
On Screen Keyboard - osk
Opens AC3 Filter (If Installed) - ac3filter.cpl
Password Properties - password.cpl
Performance Monitor - perfmon.msc
Performance Monitor - perfmon
Phone and Modem Options - telephon.cpl
Power Configuration - powercfg.cpl
Printers and Faxes - control printers
Printers Folder - printers
Private Character Editor - eudcedit
Quicktime (If Installed) - QuickTime.cpl
Regional Settings - intl.cpl
Registry Editor - regedit
Registry Editor - regedit32
Remote Desktop - mstsc
Removable Storage - ntmsmgr.msc
Removable Storage Operator Requests - ntmsoprq.msc
Resultant Set of Policy (XP Prof) - rsop.msc
Scanners and Cameras - sticpl.cpl
Scheduled Tasks - control schedtasks
Security Center - wscui.cpl
Services - services.msc
Shared Folders - fsmgmt.msc
****s Down Windows - ****down
Sounds and Audio - mmsys.cpl
Spider Solitare Card Game - spider
SQL Client Configuration - cliconfg
System Configuration Editor - sysedit
System Configuration Utility - msconfig
System File Checker Utility (Scan Immediately) - sfc /scannow
System File Checker Utility (Scan Once At Next Boot) - sfc /scanonce
System File Checker Utility (Scan On Every Boot) - sfc /scanboot
System File Checker Utility (Return to Default Setting) - sfc /revert
System File Checker Utility (Purge File Cache) - sfc /purgecache
System File Checker Utility (Set Cache Size to size x) - sfc /cachesize=x
System Properties - sysdm.cpl
Task Manager - taskmgr
Telnet Client - telnet
User Account Management - nusrmgr.cpl
Utility Manager - utilman
Windows Firewall - firewall.cpl
Windows Magnifier - magnify
Windows Management Infrastructure - wmimgmt.msc
Windows System Security Tool - syskey
Windows Update Launches - wupdmgr
Windows XP Tour Wizard - tourstart
Wordpad - write

ambren_kanval Saturday, October 31, 2009 08:36 AM

[QUOTE=Waseemtabish;149060][B] Install xp in 10 min without Ghost[/B]

We all know that after loading the file or copying the file from the boot disk to temporary space the system requires a first time reboot.

Now if we press Shift+F10 then the task manager will open and there we will find that a process is running named setup.exe

now our task is to make the priority of this process maxm by right clicking on that.

We are done.

Find ur xp installed in 10 min with tolerance 2 min.[/QUOTE]

@waseemtabish
Please tell more about this how can i install xp in just 10 min. i do't know what is ghost and how its work. my windows alway corrupted by virus, net etc.

[B]thanks[/B]
amber

mashal khan Saturday, October 31, 2009 10:03 PM

Waseemtabish
 
I am using service pack 3.what to do with??

Waseemtabish Sunday, November 01, 2009 09:40 AM

[B]@amberen_kanval & masahal khan[/B]

here is the solution of your problem. here is norton ghost programme you can down it from

[url]http://rs32.rapidshare.com/files/111399190/Norton_Ghost_14.0.rar[/url]

Install it and use it manullay it will solve your all problem. for manullay using here is the helping stuff for you.

[url]ftp://ftp.symantec.com/.../ghost/14/manuals/ngh_14_user_guide.pdf[/url]

hope your problem will solve.


[B]Regards.[/B]
/
malik wassim

Waseemtabish Sunday, November 01, 2009 08:14 PM

[FONT="Arial Black"][COLOR="Red"][B][SIZE="4"]***>__ Increase internet bandwith Speed ___<***[/SIZE][/B][/COLOR][/FONT]


first go on run tab type "gpedit.msc" and hit enter
2nd go on Computer Configration then AdministrativeTepmpletes then Network
now in the right side there are many folders go on "QoS packets Scheduler" and double click
3rd go on Limit reservable bandwidth and double click
here you will see three obtion
1 Not Configured
2 Enable
3 Disable
check on Enable
and change the value Band width % 20 to 00
this is the bandwidth which reserve for Microsoft for their work for e.g eror reporting

Waseemtabish Sunday, November 01, 2009 08:15 PM

[SIZE="4"][COLOR="Red"][FONT="Arial Black"][B]Secure Your Vista PC in 10 Easy Steps[/B][/FONT][/COLOR][/SIZE]

By making a few judicious changes using the security tools within Windows Vista--and in some cases by adding a few pieces of free software--you can lock down your operating system.

1. Use Windows Security Center as a Starting Point

For a quick overview of your security settings, the Windows Security Center is where you'll find the status of your system firewall, auto update, malware protection, and other security settings. Click Start, Control Panel, Security Center, or you can simply click the shield icon in the task tray. If you see any red or yellow, you are not fully protected. For example, if you have not yet installed an antivirus product on your machine, or if your current antivirus product is out-of-date, the Malware section of the Security Center should be yellow. Windows does not offer a built-in antivirus utility, so you'll want to install your own. For free antivirus, I recommend AVG Anti-Virus 8.

2. Use Windows Defender as a Diagnostic Tool

The Malware section also covers antispyware protection, and for that Windows Vista includes Windows Defender. The antispyware protection in your antivirus program usually trumps the protection Microsoft provides, but there are several good reasons to keep Windows Defender enabled. One is that every antispyware program uses a different definition of what is and what is not spyware, so redundant protection can actually offer some benefit.

Another reason to keep Windows Defender enabled: diagnostics. Click Tools, and choose Software Explorer from the resulting pane. You can display lists of applications from several categories such as Currently Running Programs, Network Connected Programs, and Winsock Service Providers, but Startup Programs is perhaps the most useful. Click on any name in the left window, and full details will appear in the right pane. By highlighting, you can remove, disable, or enable any of the programs listed.

3. Disable the Start Up menu

Windows Vista keeps track of all the documents and programs you launch in the Start Up menu. This can be convenient for some users, but it can also compromise your privacy if you share a computer within an office or household. Fortunately Windows Vista provides an easy way to tweak this setting. To protect your privacy, follow these steps:

Right click on the taskbar and select Properties.
Click on the Start Menu tab.
Uncheck Store and display a list of recently opened files.
Uncheck Store and display a list of recently opened programs.
Click OK.

4. Get Two-Way Firewall Protection

No desktop should be without a personal firewall, but even if the Security Center says you're protected, you may not be. The Windows Firewall within Vista blocks all incoming traffic that might be malicious or suspicious--and that's good. But outbound protection is not enabled by default. That's a dangerous situation if some new malicious software finds its way onto your PC. Microsoft did include the tools for Windows Vista to have a true two-way firewall, but finding the setting is a little complicated. (Hint: Don't go looking the Windows Firewall settings dialog box.)

To get two-way protection in Windows Vista, click on the Start button; in the search space, type wf.msc and press Enter. Click on the Windows Firewall with Advanced Security icon. This management interface displays the inbound and outbound rules. Click on Windows Firewalls Properties. You should now see a dialog box with several tabs. For each profile--Domain, Private, and Public--change the setting to Block, and then click OK.


5. Lock Out Unwanted Guests

If you share your computer with others (and even if you don't), Windows Vista includes a neat way to keep unwanted guests from guessing your system administrator password. When you set up users and declare one user as administrator (with full privileges), Windows Vista allows outsiders unlimited guesses at the password you chose. Here's how to limit the guesses.

Click Start, type Local Security Policy.
Click Account Lockout Policy.
Choose Account Lockout Threshold.
At the prompt, enter the number of invalid log-ins you'll accept (say, 3).
Click OK and close.

6. Now Audit Your Attackers

With the Account Lockout policy in place, you can now enable auditing to see any account attacks. To turn on auditing for failed log-on events, do the following:

Click the Start button, type secpol.msc, and click the secpol icon.
Click on Local Policies and then Audit Policy.
Right-click on Audit account logon events policy and select Properties.
Check the Failure box and click OK.
Right-click on Audit logon events policy and select Properties.
Check the Failure box and click OK.
Close the Local Security Policy window.
You can then use the Event Viewer (by running eventvwr.msc) to view the logs under Windows Logs and Security.

7. Secure Your Internet Explorer Settings

The Windows Security Center will also report whether your Internet Explorer 7 (or IE security settings are at their recommended levels. If the screen shows this section as red, you can adjust the settings within the browser itself.

Within Internet Explorer, click Tools in the menu bar.
From the drop-down menu, click Internet Options.
Choose the Security tab.
Within the Security tab, click Custom Level.
Here you'll see a window with all the security options for the browser. If any are below the recommended level (if, say, some kind of malware reconfigured your browser settings), these options will be highlighted in red. To change an individual setting, click the appropriate radio button. To reset them all, use the button near the bottom of the tab. You can also change the overall security setting for Internet Explorer from the default Medium-High setting to the recommended High or Medium, if you wish. Click OK to save and close.


8. Use OpenDNS

Domain Name System (DNS) servers act as a phone book. When you type "pcworld . com" in the address bar, for instance, Internet Explorer sends that common-name request to your Internet service provider's DNS servers to be converted into a series of numbers, or an IP address. Lately, DNS servers have come under attack, with criminals seeking to redirect common DNS preferences to servers that their interests control. One way to stop such abuse is to use OpenDNS.

Go to Start, Control Panel, Network and Internet, and then click Network and Sharing Center. Under the tasks listed on the left, click Manage Network Connections. In the Manage Network Connections window, do the following.

Right-click on the icon representing your network card.
Click Properties.
Click Internet Protocol Version 4.
Click the Properties button.
Select the Use the following DNS server addresses radio button.
Click OK.

9. Live With User Account Control

One area where some people might want to see the Windows Security Center turn red is User Account Control (UAC), perhaps the most controversial security feature within Windows Vista. Designed to keep rogue remote software from automatically installing (among other things), UAC has a tendency to thwart legitimate software installations by interrupting the process several times with useless messages. In Windows 7 you'll be able to set UAC to the level you want. Until then, you do have some options.

One is to disable UAC. I would caution against that, since UAC is meant to warn you of potential danger. Instead, install TweakUAC, a free utility that offers the ability to turn UAC on or off as well as an intermediate "quiet" mode that keeps UAC on but suppresses administration elevation prompts. With TweakUAC in quiet mode, UAC will appear to be off to those running as administrator accounts, while people with standard user accounts will still be prompted.

10. Check Your Work

Now that you've tweaked Windows Vista, you can keep tabs on your system's security with the System Health Report. This diagnostic tool takes input from the Performance and Reliability Monitor and turns it into an information-packed report that can spotlight potential security problems.

Open Control Panel.
Click System.
In the Tasks list, click Performance (near the bottom).
In the resulting Tasks list, click Advanced tools (near the top).
Click the last item on the resulting list: Generate a system health report.
The report will list any missing drivers that might be causing error codes, tell you whether your antivirus protection is installed, and declare whether UAC is turned on. You may want to run this report once a month just to make sure everything's still good.

Waseemtabish Sunday, November 01, 2009 08:17 PM

[B][FONT="Arial Black"][COLOR="Red"][SIZE="4"]Install Xp From Dos[/SIZE][/COLOR][/FONT][/B]

If XP will not install from the CD or if you have a new drive with no operating system on
it yet try these:

Install Windows XP from the hard drive with Windows 98 already installed:

Boot Windows 98
Insert the XP CD into your CD reader
Explore Windows XP through My Computer
Copy i386 folder to C:\
Go into C:\i386 folder and double click on winnt32.exe to launch the setup from the hard drive

Install Windows XP from DOS (ie. no OS on a new hard drive):

Boot with a Windows 98 Start Up disk
Insert the Windows 98 CD into the CD reader
Run smartdrv.exe from the Win98 directory on the windows 98 CD (file caching)
Type cd.. to back up to the root directory
Insert Windows XP CD into the CD reader
Copy the i386 folder to C:\
Go into C:\i386 folder on C: and type winnt.exe to launch the setup from the hard drive

Waseemtabish Sunday, November 01, 2009 08:18 PM

[COLOR="Red"][SIZE="4"][FONT="Arial Black"]Top 15 Ways to Extend Your Laptop’s Battery Life[/FONT][/SIZE][/COLOR]

Laptops tend to lose their charm quickly when you’re constantly looking for the nearest power outlet to charge up. How do you keep your battery going for as long as possible? Here are 15 easy ways to do so.

1. Defrag regularly - The faster your hard drive does its work - less demand you are going to put on the hard drive and your battery. Make your hard drive as efficient as possible by defragging it regularly. (but not while it’s on battery of course!) Mac OSX is better built to handle fragmentation so it may not be very applicable for Apple systems.

2. Dim your screen - Most laptops come with the ability to dim your laptop screen. Some even come with ways to modify CPU and cooling performance. Cut them down to the lowest level you can tolerate to squeeze out some extra battery juice.

3. Cut down on programs running in the background. Itunes, Desktop Search, etc. All these add to the CPU load and cut down battery life. Shut down everything that isn’t crucial when you’re on battery.

4. Cut down external devices - USB devices (including your mouse) & WiFi drain down your laptop battery. Remove or shut them down when not in use. It goes without saying that charging other devices (like your iPod) with your laptop when on battery is a surefire way of quickly wiping out the charge on your laptop battery.

5. Add more RAM - This will allow you to process more with the memory your laptop has, rather than relying on virtual memory. Virtual memory results in hard drive use, and is much less power efficient. Note that adding more RAM will consume more energy, so this is most applicable if you do need to run memory intensive programs which actually require heavy usage of virtual memory.

6. Run off a hard drive rather than CD/DVD - As power consuming as hard drives are, CD and DVD drives are worse. Even having one in the drive can be power consuming. They spin, taking power, even when they?re not actively being used. Wherever possible, try to run on virtual drives using programs like Alcohol 120% rather than optical ones.

7. Keep the battery contacts clean: Clean your battery’s metal contacts every couple of months with a cloth moistened with rubbing alcohol. This keeps the transfer of power from your battery more efficient.

8. Take care of your battery - Exercise the Battery. Do not leave a charged battery dormant for long periods of time. Once charged, you should at least use the battery at least once every two to three weeks. Also, do not let a Li-On battery completely discharge. (Discharing is only for older batteries with memory effects)

9. Hibernate not standby - Although placing a laptop in standby mode saves some power and you can instantly resume where you left off, it doesn’t save anywhere as much power as the hibernate function does. Hibernating a PC will actually save your PC’s state as it is, and completely shut itself down.

10. Keep operating temperature down - Your laptop operates more efficiently when it’s cooler. Clean out your air vents with a cloth or keyboard cleaner, or refer to some extra tips by LapTopMag.com.

11. Set up and optimize your power options - Go to ‘Power Options’ in your windows control panel and set it up so that power usage is optimized (Select the ‘max battery’ for maximum effect).

12. Don’t multitask - Do one thing at a time when you’re on battery. Rather than working on a spreadsheet, letting your email client run in the background and listening to your latest set of MP3’s, set your mind to one thing only. If you don’t you’ll only drain out your batteries before anything gets completed!

13. Go easy on the PC demands - The more you demand from your PC. Passive activities like email and word processing consume much less power than gaming or playing a DVD. If you’ve got a single battery charge - pick your priorities wisely.

14. Get yourself a more efficient laptop - Laptops are getting more and more efficient in nature to the point where some manufacturers are talking about all day long batteries. Picking up a newer more efficient laptop to replace an aging one is usually a quick fix.

15. Prevent the Memory Effect - If you’re using a very old laptop, you’ll want to prevent the ‘memory effect’ - Keep the battery healthy by fully charging and then fully discharging it at least once every two to three weeks. Exceptions to the rule are Li-Ion batteries (which most laptops have) which do not suffer from the memory effect.

Waseemtabish Sunday, November 01, 2009 08:20 PM

[B][FONT="Arial Black"][SIZE="4"][COLOR="Red"]Hack website and edit it [/COLOR][/SIZE][/FONT][/B]

Assalam o allikum.
aik aisi trick ke aap ko boht maza ayega.

kisi bhi website ko kholain or adress bar main yeh code past kerdain or enter kadain.

Quote:
javascript:document.body.contentEditable='true'; document.designMode='on'; void 0

Waseemtabish Sunday, November 01, 2009 08:22 PM

[SIZE="4"][COLOR="Red"][FONT="Arial Black"][B]Removing CD rom Icon From MY COMPUTER![/B][/FONT][/COLOR][/SIZE]

1. open my computer properties
2. go to Device Manager
3. in Device Manager Click once on "DVD\CD-ROM drives"
4. and click on disable . now you would see a red Cross on its icon.
5. now go to my computer and here we go what did you see there
6. is'nt it good.
7. you can use it again by enabling

Waseemtabish Sunday, November 01, 2009 08:23 PM

[SIZE="4"][FONT="Arial Black"][B][COLOR="Red"]down ur PC in zero Seconds!![/COLOR][/B][/FONT][/SIZE]

now i will tell you that how can you ****down your pc withinn zero seconds.
lets get it started.
right click on your desktop in any empty area and click on NEW and then on ShortCut.
a new window would comes up.
type here [ ****down -s -t 0 -c " type here you message " ]
dont use the brackets you can see this in picture also. instead of "0" you can choose the time of your choise also.
then click next.
in next window type whatever you want.
and click next and finish.
now you would see a icon on your desktop change this icon to your desire
now click on it and here we go to hell>>>>>>>>>>>>>>>..

Waseemtabish Sunday, November 01, 2009 08:24 PM

[B][FONT="Arial Black"][COLOR="Red"][SIZE="4"] Disable Task Manager[/SIZE][/COLOR][/FONT][/B]


Task Manager is a smart small utility in Windows XP that provides us information about applications and processes running in our computer. In the task manager, we can see the status of the programs that are currently running and choose to end programs that have stopped responding.
Of course it would be frustrating if the task manager was disabled for certain reason, but fortunately there’s a method to enable it back using a registry tweak. You can also choose to disable it with this method.

1. Firstly, from the Start button click ‘run’ and start Regedit.
2. Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\
3. Create a new key called “System”.
4. In System, create new DWORD value: DisableTaskMgr
5. Set the data value to 1 to enable Task Manager.
6. Set the data value to 0 to disable it.

Once you done the above, it should work right away.

Waseemtabish Sunday, November 01, 2009 08:25 PM

[B][SIZE="5"][COLOR="Red"][B]The Hidden Microsoft Song[/B][/COLOR][/SIZE][/B]


Do you know the hidden Microsoft song? I hear this song while im installing windows, where its almost at the end where have to register your windows,

Some people might not hear it because, your sound card driver isn't installed. If you want to know and hear that song, here it:
Go to
Start > Run > Copy and then Paste, or press and hold the Start + r .


Code:
C:\windows\system32\oobe\images\title.wma


and hit Enter, of course ... Your media player should load the song, and now you can hear it.
[B][COLOR="Blue"]
/
malik wassim[/COLOR][/B]

Waseemtabish Monday, November 02, 2009 04:02 PM

[FONT="Arial Black"][COLOR="Red"][SIZE="4"]Make Computer Talk [/SIZE][/COLOR][/FONT]


This is a visual basic script file that will pop up an msg which requires

1)Open Notepad

2) Copy the below text and paste on notepad...
Dim userInput


userInput = InputBox("Write a message for me to say")


Set Sapi = Wscript.CreateObject("SAPI.SpVoice")

Sapi.speak userInput

[/B]
3) Be Sure To Save As .VBS

4) Now open it and you will see an place to write

5) When you write it and press OK

6) Your computer will tell what you typed

Waseemtabish Monday, November 02, 2009 04:06 PM

[B][COLOR="Red"][SIZE="4"][FONT="Arial Black"]Speedup Processor[/FONT][/SIZE][/COLOR][/B]


Here is Edited registery for this purpose.
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Hara mi\App Paths\SPEEDUP.exe]
"User"="MICROHARAMI HIDDEN SPEED"
"Code"="99cc9f17df0d33e6-7b63110f0415efc4-312a21181239e5e9-bc5b09aae8c0661b"

Waseemtabish Monday, November 02, 2009 04:07 PM

[B]Block adult Sites with Proxy Auto Configuration Files:[/B]

Code:
[url]http://www.ericphelps.com/security/ProxyInstall.zip[/url]

In English:
Let's suppose there are sites you don't want your kids to see. It's kind of like the word "corn", except it starts with a "p". You understand? Well, using a Proxy Auto Configuration (PAC) file, you can block 80 to 90 percent of all these sites for free and without installing any special software.
As an adult, why should you care? Graphic content aside, those sites are like a mine field. Far too many of them try to install bad things on your computer. You may have already discovered how easy it is to end up at one of those sites accidentally while searching or by following a link from an email! For your own sake, you should block Internet Explorer from those types of sites.
Let's be honest. Nothing is perfect. Some things are going to slip through the filter. Others are going to be blocked when they shouldn't be. But the advantage of having a PAC file on your computer is that you can open it with Notepad and make changes. Add things. Take things away. Customize it.




1. change browser's proxy settings :

file://C:/WINDOWS/system32/drivers/etc/proxy (is ko pic no. 2 k mutabiq dekh ker Connection settings mein dal dain...)

Waseemtabish Monday, November 02, 2009 04:13 PM

[B]Hide Your Files In A JPEG[/B]


Well, did you know you could hide your files in a JPEG file? For this, you will only need to download WinRAR. You just need to have a little knowledge about Command Prompt and have WinRAR installed.
Ok, lets begin…
1. Gather all the files that you wish to hide in a folder anywhere in your PC (make it in C:\hidden - RECOMMENDED).
2. Now, add those files in a RAR archive (e.g. secret.rar). This file should also be in the same directory (C:\hidden).
3. Now, look for a simple JPEG picture file (e.g. logo.jpg). Copy/Paste that file also in C:\hidden.
4. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.
5. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.
6. Now type: “COPY /b logo.jpg + secret.rar output.jpg” (without quotes) - Now, logo.jpg is the picture you want to show, secret.rar is the file to be hidden, and output.jpg is the file which contains both.
7. Now, after you have done this, you will see a file output.jpg in C:\hidden. Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive .
Done!

and then send it 2 ur close friend ....chinky chinky i donot know whats da response from him ...may be this
do it with ur own responsibilty becz it can also effect ur PC..


04:54 PM (GMT +5)

vBulletin, Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.