Google Chrome Hidden Pages or Configuration Parameters


Google Chrome Browser seems to be perfect lightweight browser and might become Firefox killer. Memory consumption of Google Chrome is very low and way web pages loads seems to be even faster then Firefox 3.
Users have already started Reverse Engineering Google Chrome and found out many hidden chrome pages or call it as Seven Google Chrome Configuration Parameters.
Here is list of Google Chrome Hidden Pages or Configuration Parameters. You have to input about:parameter in address bar to open this hidden treasure. (Replace parameter with respective word) as listed.

about:network
about:ipc
about:histograms
about:histograms/Loop
about:objects
about:crash
about:hang
about:shorthang
about:dns
about:memory
about:cache
about:version
about:internets (Easter egg)

Note: I am unable to generate config pages for the parameters marked bold

Best funny firefox tricks


Here are Some Funny Firefox Tricks

To perform these tricks open your firefox browser and copy/paste the following in your address bar


This will show you dancing firefox.Your firefox window will automatically popup anywhere at screen.


This will open another firefox within in a new tab.So you will have firefox within firefox.


This will open firefox options dialog box in new tab.


This will open your firefox bookmark manager in new tab.


This will open your history in new tab.


This will open your extensions tab in your current window .


This will Open the “cookies window” inside a tab in the Firefox window.


This will Open the “Clear Private Data” window inside the current tab.


This will Open the “About Firefox” Dialog box inside the tab.


This will Open a scrolling list of names. The one’s who we must thank for creating Firefox

Hack Modem & ISP and get High speed trick


Most of us will be feeling that the surfing speed which is allocated by our ISP is not enough. People with 64Kbps will think 128Kbps will be cool speed. People with 128Kbps will think 256Kbps will be cool and so on

This tutorial will teach you how to increase your 64Kbps link to 512Kbps or what ever speed you like.

It is very much possible to do this. With a bit of luck if your Cable Internet Service Provider are very uneducated on how this very new technology works and leave some key loopholes open for you to grab vital information on how to accomplish this task. But this [tutorial] will no guarantee you 100% success.

Okay here we go. I'm going to try to explain you as best as I can to accomplish re-configuring your SB5100, SB4100 or SB3100 cable modem

Theory of cable modem working

All the cable modems when it boots up it will search for an "Image file" where in all configuration like your upload speed limit and download speed limit is defined. This "Image file" is stored in ISP`s TFTP server. Modem will be pre-configured with the ISP`s TFTP server IP address and the Image file name to be downloaded. When the modem boots up it query TFTP server and download Image file from [TFTP] [server] according to this this our speed limits will be set.

Our Mission

Get this Image file from ISP`s TFTP server, reconfigure it according to our need and force our modem to download this file from our Computer rather than downloading it from our ISP`s TFTP server.

1). Get cable [modems] MAC-Addreaa

You can either look at the back of the modem to get this MAC Address or you can logon to your Cable modem with your Web Browser 192.168.100.1/ . This is internal HTML pages stored within your DOCsis cable modem (SB5100, SB4100 and SB3100) that gives you even more vital information on configuration. Unless it is turned off by your ISP. This feature might be totally turned off by your ISP.

2). Get your [ISP] TFTP server IP address

a) There's a program called QUERY.EXE from Weird Solutions which is a BOOTP packet request program that will tell you everything you need to know, without all these extra steps. It will display the Image Filename, TFTP server address, which is really all you need to get started. To use this BOOTP QUERY tool, you need the MAC address of your cable modem or Beginners can use DOCSIS Diagnosis utility

Code::
docsis

Using the above tools you will get the information of your ISP`s TFTP server IP and the name of your "Image file" stored in that TFTP server

All your vital information is stored in this file, One of which is the MaxRateDown 2621440; MaxRateUp 393216;. (This was my ISP settings. Which you can see is similar to what speed I was getting. 40KB/s up and 250 KB/s down)

Among these, the one we need are:

Configuration [TFTP] [Server] = 194.*.*..90 (replace this with yours throughout in the doc)

Configuration filename = isrr.bin (replace this with yours throughout in the doc)

And

IP fragments created = 0

IP address.10.$$$.$$$.$$$ = 10.$$$.$$$.$$$

IP address.192.168.100.1 = 192.168.100.1 (the IP address of the cable modem, (replace this with yours throughout in the doc)

IP-to-If-index.10.$$$.$$$.$$$ = 2

Suggestion: You can do this step by sniffing the modem i.e. "192.168.100.1" when modem boots up. I never tried this method. Try your luck.

3) Download Image file from ISP`s TFTP server.

For doing this got to your command prompt and use below commands with out quotes and bracket.

"C:\tftp -i GET "

Okay now you got Image file from your ISP`s TFTP server.

4). Decrypt the Image file which you downloaded from ISP`s TFTP server

For all you can use the DOCsis tool
Code::
docsis
to decode

5). Modify the Image file

Change your computer's TCP configuration same as ISP`s TFTP server (i.e. IP address same as ISP`s TFTP server)

Go to my network place and right click ->properties

Select your LAN Card right click ->property->Internet Protocol (TCP-IP) double click on it and change it to as following values

Configure your TPC's TCP settings as below

IP: 194.*.*.90 (replace with the ISP's TFTP server)

Netmask: 255.255.255.0

Gateway: 192.168.100.1 (replace with your cable modem's IP address)

Note: Gateway should be 192.168.100.1 then only your modem can communicate with computer.

6). Encrypt the modified Image file (Save it using Docsis)

7). Host TFTP server in your computer

Download TFTP Server software and host TFTP server in your computer

You can download TFTP server from: http://www.ziddu.com/download/17379177/tftpd32.exe.html

8). Put Image file in the base directory of your TFTP

Start TFTPD32 server. Go to Settings and set the Security to None. Increase the timeout to 20secs and the Max Retransmit to 6. Choose to translate UNIX filenames. Make sure it's base directory point to where the isrr.bin is (i.e. the image file which you modified). If you need to replicate a directory pathname along with the image file, then make a directory from root that corresponds to the image file pathname.

Restart your modem, and AS SOON as the SEND light goes solid, you should see a receive on your TFTP server i.e. your PC

9). [Restart] your [modem]

10). Changer your PC's IP back as given by ISP

11). Done. Start surfing with your new speed
Enjoy!

New Ways to Use Your Webcam


I've owned a webcam for years, but until recently I never had much use for it. Sure, from time to time I'd try a video-conferencing service like Skype or SightSpeed, but they always left me disappointed. I know these services have plenty of PC Magazine enthusiasts, but I'm not among them, yet. (Q: "Can you see me now?" A: "Not very well.") And if you're not using your webcam to connect with faraway friends or relatives, what's the point of having one?
Here's one thought: What if you could turn your webcam into a TV camera, able to broadcast live video virtually anywhere in the world? Here's another: What if you could record a talking-head video of yourself that would pop up on your Web site, giving visitors a surprising, personalized greeting? One more: Use your webcam to record a video greeting to send via e-mail instead of boring old text.
These three ideas are behind a trio of new Web services, all of them free, all of them offering a lot more bang for your webcam buck. Once you try Bubble Guru, Eyejot, and Ustream.tv, I guarantee you'll never look at your webcam the same way again. Quite the opposite: You'll spend considerable time looking into it.
Don't own a webcam yet? You might find one shoehorned into the next PC you buy: Apple's iSight camera is now a staple in virtually every new iMac and MacBook, and manufacturers like Acer, HP, and Toshiba all offer systems with built-in webcams. Of course, you can always clip on an aftermarket webcam from Creative, Logitech, or another vendor; watch for a series of reviews of the latest and greatest models in the coming weeks. In the meantime, check the lighting and put on a shirt: It's time for your close-up.

custom views in MS EXCEL


Some times we create and use big files in Excel. It becomes difficult to search for the cell we want to work on. So we cannot use Go To features. Not only this we also get confused for go to new cell, print the new cell, create the print settings and make the builders.


Can we create and go to most used cells list. Yes we can. This depends on how do you see the Excel work sheet. The custom view feature gives the solution for this. First you decide the workbook view or printing view then you can save that. This makes some changes but this is to create your favorite views and settings. If you create the print setting for particular view that also gets saved in view setting. We can save and retrieve as many cells we want in a worksheet and hide others. This saves time and energy. Ways to creating the view setting.


First open your large workbook.
Then go to the place you are using.
Now make the changes you want. For example create print area, hide rows, filters, subtotals. Then create the view settings.
Go to view menu and select the custom view there. Now open the custom view window.
Press the Add button to create new view. The opened window gives the feature of decide the name of the new view. Select the view name that is used to identify easily.

You can also decide the new view print settings. After doing that give the name for view then click ok. This is a method for creating your favorite views and save these views. Now you return to the workbook and drop it there. Then you can retrieve the saved view. For that go to view menu then select custom views there. Select the wanted view in select the name of the view at the window and click show. Now you got a workbook with selected cells and settings. If you want delete the view setting go to custom views then press the delete button.

How To Make A Folder With Name CON


Did you ever tried to create a folder with name con or prn or nul? you cannot create a folder with names con , prn or nul in windows. but you can create folders with these names from dos with some special commands

to create a folder with name con in c just type this code in dos

md\\.\\c:\con

if you want to create the same folder in another location just type its adress after md\\.\\

for example if you want to create a folder with name con in a folder named test in d drive, just type the following code

md\\.\\d:\test\con

you can use the same code for creating folders with name prn, nul etc..

MegaUpload Premium Link Generator


Way To Download From MegaUpload With Out Any Limit.

Generate a normal megaupload link to a premium link. Visit FreeMu.info website, scroll right to the bottom and you'll see a small text box with a small Go button. Just paste the megaupload link to the text box and click Go! button. You will notice that the page is being refreshed and you're at the top of the FreeMu.info page. Scroll down again and this time you'll see a long link just below the text box.

There is a Firefox extension which lets you bypass the requirement to download the unnecessary toolbar.

Remove Log Off User From Start Menu


For those of you who don't need the Log Off User option, these are the steps to remove it.
Flare up registry editor.
Scroll to HKEY_CURRENT_USER\Software\Microsoft\Windows
\CurrentVersion\Policies\Explorer Right-click on the right pane and
select New,
DWORD Value. Name it NoLogOff.
Double-click and enter 1 as value. To restore the Log Off User option,
reverse the steps by changing 1 to 0 or delete DWORD value.

42 registry hacking tricks & tweaks for windows xp


Structure of Windows XP Registry :


When you will open the Windows XP Registry , you will see it's divided into two panes. On the left side there are Five main
Keys as shown below. These can be expanded to several Sub-Keys, which further has many Sub-Keys.

+HKEY_CLASSES_ROOT

+HKEY_CURRENT_USER

+HKEY_LOCAL_MACHINE

+HKEY_USERS

+HKEY_CURRENT_CONFIG



Before you try out the Tweaks, learn how to Backup and Restore Windows XP Registry.
Types of Registry Backups :
It?s very important that before you do editing you make a backup of the current registry. If you ignore this warning, it might prove deadly for you?so better listen to me J
Open your registry. Go to Start>Run , type regedit . When you invoke the Export function from File>Export, you are given a choice of different file types that can be saved :
Registration Files (*.reg)
Registry Hive Files (*.*)
Text Files (*.txt)
Win9x/NT 4 Registration Files (*.reg)
All Files

Each one of the different file types above plays an important role in how the data you export is saved. Choosing the wrong type can give you unexpected results. So let me explain you quickly these file types.

Registrations Files : The Registration Files option creates a .reg file. This is the most well known file format used for backing up the registry. The Registration File can be used in two ways. As a text file it can be read and edited using Notepad outside of Registry Editor. Once the changes have been made and saved, right clicking the file and using the [Merge] command adds the changed file back into the registry. If you make additions to the registry using regedit and then merge the previously saved Registration File, anything that you've added via regedit will not be removed, but changes you make to data using regedit that previously existed in the saved Registration File will be overwritten when it is merged

Registry Hive Files : Unlike the Registration Files option above, the Registry Hive Files option creates a binary image of the selected registry key. The image file is not editable via Notepad nor can you view its contents using a text editor. However, what the Registry Hive Files format does is create an image perfect view of the selected key and allow you to import it back into the registry to insure any problematic changes you made are eliminated.

Text Files : This option does just as the name suggests. It creates a text file containing the information in the selected key. It's most useful purpose is creating a record or snapshot of a key at a particular point in time that you can refer back to if necessary. It cannot be merged back into the registry like a Registration File.

Win9x/NT 4 Registration Files : This option creates a .reg file in the same manner used by the Registration Files option. It's used by previous Windows versions and serves no purpose in XP unless you want to merge a key from XP into a previous version of Windows.

Out of the give above choices , the safest method of backing up registry is to use Registry Hive Files option. No matter what ever you do or goes wrong in editing, importing the image of the key will eliminate all changes.

**Note-> I have included the exact name/value between [ ] brackets. [ & ] should be ignored, only the data inside them should be considered.



1. Customize Windows Media Player Title Bar

Change the title bar to read Windows Media Player provided by , so if I had entered text ?Abhishek Bhuyan? , it would read: Windows Media Player provided by Abhishek Bhuyan

[Start] [Run] [Regedit]

Go to HKEY_CURRENT_USER\Software\Policies\Microsoft
Create the Key [WindowsMediaPlayer]
Create String value named [TitleBar]

Data Type: REG_SZ // Value Name: TitleBar
Double click TitleBar and Enter the text to be displayed in the title bar.

Exit Registry / Reboot

2. Minimize Outlook 2002 to the System Tray

If you frequently access Outlook during the day it?s more convenient to have it minimized to the system tray rather than invoking it each time you need to send/receive e-mail. This tweak minimizes Outlook 2002 to the system tray:

[Start] [Run] [Regedit]

Go to HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Outlook\Preferences

Modify/Create Data Type DWORD named [MinToTray]
Setting for Value Data: [0 = Disabled / 1 = Enabled]

Exit Registry / Reboot

3. Specify Default IE Download Directory

This tweak changes the default directory where downloads initiated in Internet Explorer are stored on the system.

[Start] [Run] [Regedit]

Go to HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer

Modify/Create String Value of Data type REG_SZ Named [Download Directory]
Value Data: [Enter Path to Directory to be Assigned as Defualt for Downloads]

Exit Registry / Reboot

4. Force Use of Classic Start Menu

This tweak loads the Classic Start Menu and makes it impossible to change back to the Windows XP version

[Start] [Run] [Regedit]

Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Modify/Create the DWORD Value of Data type REG_DWORD Named [NoSimpleStartMenu]
Value Data: [0 = Default / 1 = Force Classic Start Menu]

Exit Registry / Reboot

5. Hide/Show Internet Explorer Desktop Icon

By default, Windows XP does not show the Internet Explorer icon on the Windows desktop. Using the registry tweak below allows you to control whether or not the Internet Explorer icon is displayed.

[Start] [Run] [Regedit]

Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Modify/Create DWORD Value of Data type REG_DWORD Named [NoInternetIcon]
Setting for Value Data: [0 = Disabled / 1 = Enabled]

Exit Registry / Reboot

6. Increase Menu Display Speed

When you click on the Start Menu there is some delay to display the contents , just for no reason. Effects are pretty though. The default speed can be adjusted with a quick registry entry.

The default value is 400. Set it to 0 and the delay is gone. If you are not able to adjust pick a number that suits your style and make the change.

[Start] [Run] [Regedit]

Go to HKEY_CURRENT_USER\Control Panel\Desktop

Modify/Create String value of Data type REG_SZ Named [MenuShowDelay]

Value Data: [Default = 400 / Adjust to Preference]

Exit Registry / Reboot

7. Change the Location of Special Folders

This tweak allows changing the location of special folders on the system. Any of the folders listed in the registry key may be moved.

[Start] [Run] [Regedit]

Go to : HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserShell Folders

Modify/Create String value of Data type REG_SZ Named [Various Folder Names]

Data Type: REG_SZ [String Value] // Value Name: Consult RegEdit for Folder Names

Value Data: [Move the folder to the new desired location using explorer, and then edit the matching folder in RegEdit to reflect the new folder location]

Exit Registry and Reboot

8. Faster Browsing in Windows Explorer on Network Computers

By default, a Windows XP machine connecting to a Windows 95/98/Me computer will search for scheduled tasks or enabled printers on the remote computer. Two sub-keys control this behavior. Deleting them will speed up browsing on the remote computer.

[Start] [Run] [Regedit]

Go to : HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\RemoteComputer\NameSpace

To Disable Scheduled Task Checking
Value Name: {D6277990-4C6A-11CF-8D87-00AA0060F5BF}
Delete the sub-key in the left pane of Registry Editor

To Disable Printer Checking
Value Name: {2227A280-3AEA-1069-A2DE-08002B30309D}
Delete the sub-key in the left pane of Registry Editor

Exit Registry / Reboot

9. Add Administrator Account to Log In Screen

When Windows XP is first installed it requires you to enter at least one name of a user who will access the computer. Once you create this name the default Administrator account vanishes. To access it, press Ctrl-Alt-Delete twice at the Welcome screen to retrieve the standard Windows 2000 logon dialog. Log on as Administrator from this point. To log the Administrator off, click [Start] [Log Off] and [Log Off] when the [Log Off Windows] selection box appears. The Log On screen with the available users will be displayed.

To Make the Administrator Account Always Visible on the Login Screen use this Registry Tweak.

[Start] [Run] [Regedit]

Go to: HKEY_LOCALMACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList

Modify/Create DWORD Value of Data type REG_DWORD Named [Administrator]
Setting for Value Data: [0 = Disabled / 1 = Enabled]

Exit Registry / Reboot

10. Increase Internet Download Connections

Increase Simultaneous Internet Download Connections. Increases the number of allowed simultaneous connections to ten (10).

[Start] [Run] [Regedit]

Go to: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings

Modify/Create DWORD Value of Data type REG_DWORD Named [MaxConnectionsPer1_0Server]
Setting for Value Data: [0000000a]

Modify/Create DWORD Value of Data type REG_DWORD Named [MaxConnectionsPerServer]
Setting for Value Data: [0000000a]

Exit Registry / Reboot


11. Connected Web Files and Folders

Connecting web files and folders allows a primary .htm or .html file to be moved in conjunction with files associated with the primary document. Once the primary document has been defined, create a sub-folder using the same name as the primary document but assign it a .files extension. Whenever the primary file is moved, the sub-folder will also move and remain as a sub-folder of the primary.

[Start] [Run] [Regedit]

Go to: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer

Modify/Create DWORD Value of Data type REG_DWORD Named [NoFileFolderConnection]
Setting for Value Data: [0 = Enabled (Default) / 1 = Disabled]

Exit Registry / Reboot

12. Hide/Show My Documents Folder on Desktop

By default, Windows XP does not show the My Documents folder on the Windows desktop. Using the registry tweak below allows you to control whether or not My Documents is displayed.

[Start] [Run] [Regedit]

Go to: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{450D8FBA-AD25-11D0-98A8-0800361B1103}\ShellFolder

Modify/Create DWORD Value of Data type REG_DWORD Named [Attributes]
Setting for Value Data: [Default = 0xf0400174 / Hidden = 0xf0500174]

Exit Registry / Reboot

13. Create a Hidden User Account

This tweak allows an account that is normally displayed on the Welcome screen to be hidden from view. To log on using the account it's necessary to use the Log On To Windows dialog box similar to the one in Windows 2000 i.e. press CTRL+ALT+DEL twice.

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList

Modify/Create DWORD Value of Data type REG_DWORD Named [Type Name of Account to be Hidden]
Setting for Value Data: [0 = Account is Hidden / 1 = Enabled]

Exit Registry / Reboot

While the account is hidden on the Welcome screen, note that the account profile will be visible in C:\Documents and Settings or wherever user profiles are stored as well as in Local Users and Groups.

14. Create Legal Notice Logon Dialog Box

In situations where you need users to read a legal notice before logging on, this tweak will create the caption for the notice.

Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon

Modify/Create String Value of Data type REG_SZ Named [LegalNoticeCaption]
Value Data for LegalNoticeCaption: [Type the Caption for the Dialog Box]

Modify/Create String Value of Data type REG_SZ Named [LegalNoticeText]
Value Data for LegalNoticeText: [Type the Data for the Legal Notice]

Exit Registry / Reboot

15. Manage Internet Explorer Error Reporting

This tweak removes the IE Error Reporting tool from appearing with the option to send browser debugging reports to Microsoft.

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main

Note:- Create both values listed below and set according to the bold type for the tweak to function properly.

Modify/Create DWORD Value of Data type REG_DWORD Named [IEWatsonEnabled]
Value Data: [0 - Disabled / 1 - Enabled]

Modify/Create DWORD Value of Data type REG_DWORD Named [IEWatsonDisabled]
Value Data: [0 - Disabled / 1 - Enabled]

Exit Registry / Reboot

16. Customize Logon and Security Dialog Title

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\ CurrentVersion\Winlogon

Modify/Create String Value of Data type REG_SZ Named [Welcome]
Value Data: [0 = Disabled / 1 = Enabled]

Exit Registry / Reboot

17. Customize Logon Box Message

This is the message displayed on the Classic Logon box, not the XP ?Welcome? logon screen

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\ CurrentVersion\Winlogon

Modify/Create String Value of Data type REG_SZ Named [LogonPrompt]
Value Data: [Enter the text of the message]

Exit Registry / Reboot

18. Welcome Screen Logon Vs Classic Logon

This tweak specifies whether the Welcome screen or the Classic logon will be used to access Windows XP.

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon

Modify/Create DWORD Value of Data type REG_DWORD Named [LogonType]
Value Data: [0 - Classic Mode / 1 - Welcome Screen]

Exit Registry / Reboot

19. QoS (Quality Of Service) Bandwidth Reserve Setting

By default, Windows XP reserves 20% of the connection bandwidth for QoS traffic. This tweak allows the setting to be altered to a different percentage of connection bandwidth. If the system uses more than a single adapter for network connections, each adapter may be set individually by navigating to:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Psched\Parameters\Adapters\{Adpater-ID} rather than HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Psched

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Psched

Modify/Create DWORD Value of Data type REG_DWORD Named [NonBestEffortLimit]
Setting for Value Data: [Enter as a Percentage / Default Value = 20]

Exit Registry / Reboot

20. Enable/Disable Save Password in DUN

This tweak saves user passwords for Dial Up Networking so they do not have to be re-entered each session.

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\Parameters

Modify/Create DWORD Value of Data type REG_DWORD Named [DisableSavePassword]
Setting for Value Data: [0 = Disabled (Passwords Saved) / 1 = Enabled (Passwords Not Saved)]

Exit Registry / Reboot

21. Change the Registered Organization/Owner of Windows XP

This tweak allows modification of the registered owner and organization of the Windows XP software.

Note:- This tweak has nothing to do with Windows Product Activation (WPA) and will not allow you to register illegal XP software.

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion

Modify/Create String Value of Data type REG_SZ Named [RegisteredOrganization] or [RegisteredOwner]
Setting for Value Data: [Modify the Values to Reflect Current Information]

Exit Registry / Reboot

22. Remove Links Folder in Favorites

The Links folder is part of Favorites whether it's being accessed through Internet Explorer or the Favorites menu in the Start Menu. This tweak will remove it from those locations.

[Start] [Run] [Regedit]

Go to: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar

Modify/Create String Value of Data type REG_SZ Named [LinksFolderName]
Value Data: [Set the String Value to a blank string]

Open Internet Explorer and manually delete the Links folder from Favorites Menu.
The Links folder will not be recreated.

Exit Registry / Reboot

23. Enable/Disable Active Window Tracking to Mouse Movements

When the mouse is moved over an open window it automatically sets the focus to that particular window. It does not bring the window to the foreground of the open windows.

[Start] [Run] [Regedit]

Go to: HKEY_CURRENT_USER\Control Panel\Mouse

Modify/Create DWORD Value of Data type REG_DWORD Named [ActiveWindowTracking]
Setting for Value Data: [0 = ActiveWindowTracking Disabled / 1 = ActiveWindowTracking Enabled]

Exit Registry / Reboot

24. Auto Disconnect for Internet Explorer

Use this edit to automatically disconnect from Internet Explorer after a specified length of time has elapsed. Use this trick on anyone whom you don?t like using your computer with net J

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Parameters

Modify/Create DWORD Value of Data type REG_DWORD Named [Autodisconnect]
Value Data: [Enter a new disconnect time. Use Hexadecimal if you are unfamiliar with Binary]

Exit Registry / Reboot

25. Auto Reboot on System Crash

By default, when the Windows XP operating system crashes an automatic reboot of the system occurs. While this behavior can be convenient, the downside is the error message accompanying the crash is not visible. Often times this information can be a great help in troubleshooting the source of the crash. This behavior can be modified in two ways; via the registry or using the System Properties property sheet.

[Start] [Run] [Regedit]

Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl

Modify/Create DWORD Value of Data type REG_DWORD Named [AutoReboot]
Setting for Value Data: [0 = AutoReboot Disabled / 1 = AutoReboot Enabled]

Exit Registry / Reboot

Open System Properties via Start > Control Panel > Performance and Maintenance > System

[System Properties may also be opened using the WinKey+Pause key combination]

Select the Advanced tab and then click Settings in the Startup and Recovery section

In System Failure section, clear the checkbox next to Automatically Restart

Click OK and OK to exit

26. Modify Control Panel Categories

Even if you like the new style for Control Panel, you might at times wish you could shift some items around into a different category. It's possible.

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Control Panel\Extended Properties\{305CA226-D286-468e-B848-2B2E8E697B74} 2

Modify/Create DWORD Value of Data type REG_DWORD Named [Choose one of the applets with .cpl extension]

Setting for Value Data: [Select the value from table below]

Other Control Panel Options 0
Appearance and Themes 1
Printers and Other Hardware 2
Network and Internet Connections 3
Sounds, Speed, and Audio Devices 4
Performance and Maintenance 5
Date, Time, Language, and Regional Options 6
Accessibility Options 7
Add or Remove Programs 8
User Accounts 9

Exit Registry / Reboot

To further customize the items that appear in the new Control Panel, do a search of your system for all files that end in .cpl extension. If they aren't already listed, you can add them with a new DWORD value and then assign them to a category of your choosing.

27. Enable/Disable Run Commands Specific to the Registry

This tweak controls the use of the Run command on the local machine

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ Policies\Explorer

Create a DWORD value of Data Type REG_DWORD for each Run function that will be disabled.

Modify/Create the Value Name [DisableLocalMachineRun]
Modify/Create the Value Name [DisableLocalMachineRunOnce]

Modify/Create the Value Name [DisableCurrentUserRun]
Modify/Create the Value Name [DisableCurrentUserRunOnce]

Setting for Value Data: [0 = Disabled / 1 = Enabled]

Exit Registry / Reboot

28. Enable/Disable System Properties Access from My Computer

This tweak removes access to System Properties via My Computer as well as via Control Panel.

[Start] [Run] [Regedit]

Go to: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Modify/Create DWORD Value of Data type REG_DWORD Named [NoPropertiesMyComputer]
Value Data: [0 - Display Properties / 1 - Hide Properties]

Exit Registry / Reboot

29. Uninstall Programs Manually

Just because Windows XP has the Add/Remove Programs feature it doesn't mean your application will appear in the list. Furthermore, even if it does appear, it's no guarantee that the uninstall feature will work. When you run across one of these situations the items listed below will help in getting rid of the application. Be aware that these steps may not remove everything associated with the application and can impact other applications on the computer. Have a backup or restore point and use caution.

Find the directory for the application and delete all the files in the directory. Delete the directory.

Open regedit and navigate to HKEY_LOCAL_MACHINE\SOFTWARE and find the folder for the application. Delete the folder.

Open regedit and navigate to HKEY_CURRENT_USER\SOFTWARE and find the folder for the application. Delete the folder.

To remove the application entry from Add/Remove Programs (if present) open regedit and navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall and find the folder for the application. Delete the folder.

Some applications have Services attached to them. If this is the case, navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services, locate and delete the service.

In Windows Explorer, navigate to the individual user settings and delete program references. Common places to check would be:

C:\Documents and Settings\All Users\Start Menu\Programs and delete relevant entries.

C:\Documents and Settings\All Users\Start Menu\Programs\Startup and delete relevant entries.

C:\Documents and Settings\%YourUserID%\Start Menu\Programs and delete relevant entries.

[Do this for each User ID listed]

C:\Documents and Settings\%YourUserID%\Start Menu\Programs\Startup and delete relevant entries.

[Do this for each User ID listed]

If no entries were found in the previous step and the application launches automatically, navigate to

HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows

and delete the entry.

30. Create a right-click command prompt option

You can right-click a folder to get a list of actions you can apply to it. Here?s a way to create an action on that right-click menu that opens a command prompt window with that folder as the current directory. In a text editor such as Notepad, type the following exactly:

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\Folder\shell\Cmd Here]

@=?Command &Prompt Here?

[HKEY_CLASSES-ROOT\Folder\shell\Cmd Here\command]

@=?cmd.exe /k pushd %L?



Save the file with any name you want, with a .reg extension. Then double-click the saved file and choose Yes to merge the file?s information into the Registry. You can delete the file. Right-click any folder and you?ll see the CommandPrompt Here option.

31. Adjusting System Restore values

The new System Restore feature in Windows XP automatically backs up a snapshot of your system, including your Registry, every 24 hours. It also saves restore points for 90 days. Neither of these values is directly editable in the System Restore program, but you can change them in the Registry. Go to:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore

You?ll find an assortment of settings here. To change the interval between automatically created restore points, change the RPGlobalInterval setting. To change the number of days that a restore point is retained, change the RPLifeInterval setting.

System Restore time intervals are measured in seconds, not days, so you must convert the number of days you want into seconds. There are 86,400 seconds in a day, so multiply 86,400 by the number of days you want to determine the value. (There are 3,600 seconds in an hour, I hope you know)

32. Erase the swap file at shutdown

You might be concerned about someone browsing your users? swap files and gathering up little bits of their sensitive data. A remote possibility, to be sure, but it could happen. For that extra measure of security, go to:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Memory Management

Set the ClearPageFileAtShutdown DWORD to 1. This will make shutdowns take longer, because it overwrites everything in the swap file with zeroes. Don?t turn this feature on unless you have a serious security threat.

33. Delete the Files Stored on This Computer category in the My Computer window

In Windows XP, the My Computer window?s listing is broken down by categories: Hard Disk Drives, Devices with Removable Storage, and so on. One of these categories is Files Stored on This Computer, which appears at the top of the My Computer window. If a user doesn?t need it , you can get rid of it. To do so, go to:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\
NameSpace\Delegate Folders

Delete the {59031a47-3f72-44a7-89c55595fe6b30ee} subkey to remove the category.

34. Change the desktop cleanup frequency

Through Display Properties (Desktop tab, Customize Desktop button, General tab), you can turn on and off a feature that runs the Desktop Cleanup Wizard every 60 days. You don?t have an option to set a different interval there, but you can change the interval in the Registry. To do so, go to:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Desktop\CleanupWiz

Change the Days Between Clean Up Value to some other number of days (in decimal format).

35. Sort menus alphabetically

When you install a new program for a user, it doesn?t find its place in the alphabetical Start menu hierarchy right away; it hangs out at the bottom for a little while. If your users employ the Classic Start menu, they can re-alphabetize it manually by right-clicking the taskbar and choosing Properties, clicking the Customize button next to the Classic Start Menu, and clicking the Sort button. With the Windows XP style of Start menu, however, you don?t have an equivalent button. To make Windows always alphabetize the list, remove the permissions from the Registry key that controls the sort order for the Start menu. To do so, go to:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder

Choose Edit | Permissions and click the Advanced button. Deselect the Inherit From Parent The Permission Entries That Apply To Child Objects check box and then click Copy when the Security dialog box pops up. Click OK and clear the Full Control entry for your account and all security groups you are a member of. Leave only Read permission.

36. Prevent programs from loading at startup

Remember back in the good old days of Windows 3.1 when you could open up the Win.ini file in a text editor and remove an item from the RUN= line to disable it from running at startup? With Windows 9x and above, the Win.ini file became less useful because 32-bit programs were set to run at startup from within the Registry instead.

One way to selectively disable programs from loading at startup is to use MSCONFIG (from the Run command) to deselect certain items. Another way to remove them is to edit the Registry directly. Consider the following locations:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

for applications that start up for all users

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

for applications that start up when the current user logs on

Remove the entry for a program by right-clicking it and selecting Delete to prevent it from loading.

37. Change categories in the Control Panel

Windows XP?s Control Panel is broken down by category in the default Category view, but the group to which an item belongs is not always obvious. If you disagree with Microsoft?s assignments, you can switch them around. To assign a different category to an item, go to:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Control Panel\Extended Properties\
{305CA226-D286-468e-B848-2B2E8E697B74} 2

Find the item you want to change and double-click it to bring up a dialog box. Change the item?s DWORD value to your preference. Use the Table given below as a guide (shown with decimal numbers, which is the way you should enter them).

DWORD value to set

Other Control Panel Options 0

Appearance and Themes 1

Printers and Other Hardware 2

Network and Internet Connections 3

Sounds, Speed, and Audio Devices 4

Performance and Maintenance 5

Date, Time, Language, and Regional Options 6

Accessibility Options 7

Add or Remove Programs 8

User Accounts 9

38. Grouping multiple open windows

Windows XP will group multiple open windows (IE windows for example) into one group on the task bar to keep the taskbar clear. This can be annoying at times - especially when comparing different web pages because you have to go back to the task bar, click on the group and then click on the page you want and then you only get one page because you have to click on each one separately. I think the default for this is 8 windows - any combination of apps or utilities open.

You can modify this behavior by adding this registry key at:

HKEY_CURRRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\

add a Dword value of type REG_DWORD named [TaskbarGroupSize]

modify "TaskbarGroupSize" entry to be the number of windows you want open before XP starts to group them on the task bar.

A value of 2 will cause the Taskbar buttons to always group

Another tweak is to disable or enable recent documents history. This can be done at:

HKEY_CURRRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\

this key should already be present - if it isn't you'll need to add it:

Add a Binary value of type REG_BINARY named [NoRecentDocsHistory]

modify it so that value reads 01 00 00 00

39. Disable Tips

To disable Ballon tips in Windows XP do this registry tweak

Go to : HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced

Create a new DWORD value, name it EnableBalloonTips, and set it equal to 0. If EnableBalloonTips is already there and equal to 1, set it equal to 0. Quit the registry editor, log off, and log back on. Voila! Your computer will stop talking down to you.

40. Add/Remove optional features of Windows XP

To dramatically expand the list of applications you can remove from Windows XP after installation, navigate to C:\WINDOWS\inf and open the sysoc.inf file. {Opps , if you didn?t find the inf directory, you are right. It?s a hidden folder, so go to Tools>Folder Options> View , enable Show Hidden Files & Folders.}

[Version]

Signature = "$Windows NT$"

DriverVer=07/01/2001,5.1.2600.0

[Components]

NtComponents=ntoc.dll,NtOcSetupProc,,4

WBEM=ocgen.dll,OcEntry,wbemoc.inf,hide,7

Display=desk.cpl,DisplayOcSetupProc,,7

Fax=fxsocm.dll,FaxOcmSetupProc,fxsocm.inf,,7

NetOC=netoc.dll,NetOcSetupProc,netoc.inf,,7

iis=iis.dll,OcEntry,iis.inf,,7

com=comsetup.dll,OcEntry,comnt5.inf,hide,7

dtc=msdtcstp.dll,OcEntry,dtcnt5.inf,hide,7

IndexSrv_System = setupqry.dll,IndexSrv,setupqry.inf,,7

TerminalServer=TsOc.dll, HydraOc, TsOc.inf,hide,2

msmq=msmqocm.dll,MsmqOcm,msmqocm.inf,,6

ims=imsinsnt.dll,OcEntry,ims.inf,,7

fp_extensions=fp40ext.dll,FrontPage4Extensions,fp40ext.inf,,7

AutoUpdate=ocgen.dll,OcEntry,au.inf,hide,7

msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7

RootAutoUpdate=ocgen.dll,OcEntry,rootau.inf,,7

IEAccess=ocgen.dll,OcEntry,ieaccess.inf,,7



Games=ocgen.dll,OcEntry,games.inf,,7

AccessUtil=ocgen.dll,OcEntry,accessor.inf,,7

CommApps=ocgen.dll,OcEntry,communic.inf,HIDE,7

MultiM=ocgen.dll,OcEntry,multimed.inf,HIDE,7

AccessOpt=ocgen.dll,OcEntry,optional.inf,HIDE,7

Pinball=ocgen.dll,OcEntry,pinball.inf,HIDE,7

MSWordPad=ocgen.dll,OcEntry,wordpad.inf,HIDE,7

ZoneGames=zoneoc.dll,ZoneSetupProc,igames.inf,,7

[Global]

WindowTitle=%WindowTitle%

WindowTitle.StandAlone="*"

The entries that include the text hide or HIDE will not show up in Add/Remove Windows Components by default. To fix this, do a global search and replace for ,hide and change each instance of this to , (a comma). Then, save the file, re launch Add/Remove Windows Components,

41. Remove Windows Messenger

It seems that a lot of people are interested in removing Windows Messenger for some reason, though I strongly recommend against this: In Windows XP, Windows Messenger will be the hub of your connection to the .NET world, and now that this feature is part of Windows, I think we're going to see a lot of .NET Passport-enabled Web sites appearing as well. But if you can't stand the little app, there are a couple of ways to get rid of it, and ensure that it doesn't pop up every time you boot into XP. The best way simply utilizes the previous tip:

If you'd like Windows Messenger to show up in the list of programs you can add and remove from Windows, navigate to C:\WINDOWS\inf and open sysoc.inf (see the previous tip for more information about this file). You'll see a line that reads:

msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7

Change this to the following and Windows Messenger will appear in Add or Remove Programs, then Add/Remove Windows Components, then , and you can remove it for good:

msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,7

42. Rename multiple files ( it is not a Registry tweak though. I thought this to be really cool, so I have put it here)

A new, small, neat feature for Windows XP deals with renaming files. I personally have always wanted the OS to include a way to do a mass file renaming on a bunch of files. You can now rename multiple files at once .Its really simple:

Select several files in Explorer, press F2 and rename one of those files to something else. All the selected files get renamed to the new file name (plus a number added to the end). Simple J



I hope you enjoyed the above Registry tricks ! May be next time I?ll come up with more. That's all for now .

Youtube hacking tricks


YouTube is the best video sharing site with millions of users registered. Getting lots of views and subscribers is very important for you popularity on YouTube. In this tutorial I will teach you & show you how to get more then 100, 000 views on YouTube. Its totally free & simple... All you need is little time, good internet connection & proxy list.

1. First of all Download YouTube Increaser from the official site. via google

2. Install and run the software to see something like this:

3. Now when you install it and run it you can use it 30 times. Well, now I will show you how to bypass that limit & get free full version of it. Lets start.

Follow these steps:

Click Start -> then click Run -> Type in Regedit and click OK.

Now, we will need to edit registry folder of our Tube Increaser 3.0.

HKEY_CURRENT_USER > Software > TurboTube > choose TubeIncreaser > and delete turbo

4. Now we need proxy, because if we use our own IP we will get around 5 views only per day, because YouTube got some limit.

5. Download Proxy List from here or go to www.tubeincreaser.com/proxylist.txt and save the proxy list in notepad and name it Proxy.txt.

6. When you save it on desktop, go to TubeIncreaser 3.0 and click Load List and choose list. In YouTube URL bar, write your Video URL/link, from Hits box write numbers of views and click button Start.

That's all friends, really easy and simple. You can get around 200k views per day if your net is good.

77 regedit, tips and tricks to get your windows faster, secure & easy to use, free download


Here are 77 tips and tricks to get your windows faster, secure & easy to use:

1. Pick Your Edition. Most business users do not need the more expensive Ultimate Edition; stick with Professional unless you specifically need BitLocker.

2. Upgrading? Go 64-bit. As the second major Windows release to fully support 64-bit, the x64 architecture has definitely arrived on the desktop. Don't buy new 32-bit hardware unless it's anetbook.

3. Use Windows XP Mode. Yes, it's only an embedded Virtual PC with a full copy of WinXP—but it's an embedded Virtual PC with a full copy of Windows XP! This is the first profoundly intelligent use of desktop virtualization we've seen—and a great way to move to Windows 7 without giving up full Windows XP compatibility.

4. Use Windows PowerShell v2. More than just a shell, this is the administration tool you've always wanted: Parallel, distributed processing for administrative tasks! Manage 100 machines literally as easily as you manage one with the new Remoting feature. Windows PowerShell v2 ships for the first time in Windows 7, and within six months will be available for older versions of Windows.

5. Use AppLocker. We've been fans of Software Restriction Policies since Windows XP, and AppLocker finally makes application whitelisting possible. Use it to enhance or even replace your anti-virus software, ensuring that only the software you want to run will run.

6. Shift to and from Explorer and CommandPrompt. The classic Windows power toy Open Command Prompt Here is now an integral part of Windows 7 Explorer. Hold down the shift key then right-click a folder to add this option to the property menu. While you're in a command prompt, if you want to open an Explorer window with the focus of the window on the current directory, enter start.

7. Record Problems. The Problem Steps Recorder (PSR) is a great new feature that helps in troubleshooting a system (see Figure 1). At times, Remote Assistance may not be possible. However, if a person types psr in their Instant Search, it will launch the recorder. Now they can perform the actions needed to recreate the problem and each click will record the screen and the step. They can even add comments. Once complete, the PSR compiles the whole thing into an MHTML file and zips it up so that it can be e-mailed for analysis to the network admin (or family problem solver, depending on how it's being used).

Figure 1 The Problem Steps Recorder dramatically speeds up troubleshooting. (Click the image for a larger view)

8. Make Training Videos. Use a tool like Camtasia to record short, two to three minute video tutorials to help your users find relocated features, operate the new Taskbar and so forth. Get them excited about Windows 7—and prepared for it.

9. Start Thinking About Windows Server 2008 R2. Some of Windows 7's more compelling features, like BranchCache, work in conjunction with the new server OS. The R2 upgrade path is pretty straightforward, so there's little reason not to take advantage of the synergies if you can afford upgrade licenses.

10. Prepare Those XP Machines. There's no in-place upgrade from Windows XP to Windows 7, so start planning to migrate user data now, in advance of a Windows 7 upgrade deployment.

11. Consider Clean Installs. Even when upgrading Windows Vista machines, consider a clean install rather than an in-place upgrade. Yes, it's more hassle, but it'll produce a more trouble-free computer in the long run.

12. Consider Upgrade Assurance. Even if you've never bought it before, consider it for your new Windows 7 licenses. Access to the Microsoft Desktop Optimization Pack (MDOP), which includes App-V, MED-V and other cool technologies, is worth the premium.

13. Find New Tools. Within Control Panel is a single Troubleshooting link that leads you to all of your diagnostic tools on the system. There are additional tools, however, not installed by default. Selecting the "View all" link in the top left-hand corner will help you to see which troubleshooting packs are local and which ones are online. If you find a tool that you don't have, you can grab it from here.

14. Understand Virtual Desktop Infrastructure (VDI). Windows 7 plays an important role in Microsoft's VDI strategy, where virtualized Windows 7 machines are hosted on a central virtualization server using a special blanket "Enterprise Centralized Desktop" license. Read up and figure out if you can take advantage of this new strategy.

15. Prepare for DirectAccess. DirectAccess makes it easier for users to remotely access their office-based resources, without a VPN. DirectAccess also opens up remote computers more fully to Group Policy—but it requires Windows 7 and Windows 2008 R2.

16. Employ Deployment Image Servicing and Management (DISM). If you quickly want to list or manage Windows packages, features or drivers, use the command-line utility DISM. The "image" in the name may fool you into thinking that this is solely a deployment tool. An online command-line switch lets you manage the features in the currently loaded OS. To get a list of the loaded Windows features, enter dism /online /get-features /format:table. To enable a feature, enter dism /online /enable-feature /featurename:.

17. Embrace Troubleshooting Packs. Designed to help users troubleshoot and solve problems on their own, you need to update your support procedures to acknowledge these Packs. For example, don't force users to repeat steps the Pack already walked them through, and consider developing your own Packs (in Windows PowerShell) to support in-house systems.

18. Check Reliability. The Reliability Monitor was introduced in Windows Vista as 'The Reliability and Performance Monitor." In Windows 7 it has been separated from Performance Monitor and moved to a new location under the Action Center. You open the Action Center in Control Panel and then look under the Maintenance options for the "View reliability history" link. You can also just type in Reliability Monitor from the Instant Search (see Figure 2).

Figure 2 The Reliability Monitor has been broken out separately from Performance Monitor. (Click the image for a larger view)

19. Accept Diversity. Not every organization will be ready to move entirely to Windows 7 right away. That's fine—but that shouldn't mean the entire organization stays on Windows XP, either. The myths of the cost savings of having only one OS have been largely disproven or downplayed, so use Windows 7 where it makes sense to do so.

20. Get Snippy. The snipping tool has also been around in various incarnations but it's even easier to use in Windows 7. Launch the tool, then drag and drop any part of your screen. The tool will snip the selection. You can save it as a graphic file or annotate with basic drawing tools. Teach your end users how to use this tool so they can grab the snapshots of their problems and send them to the help desk. Or create your own library of visual notes.

21. Presentation Nirvana. Press Windows+P to access the new Presentation mode, and easily turn on your projector and laptop screen at the same time. No more messing with vendor-specific utilities and arcane keystrokes. (Windows+X accesses the Mobility Center, with additional presentation options.)

22. Cut the Clutter. Press Windows+Home to minimize all but the current window, removing background clutter and letting you focus on that report your boss has been bugging you about.

23. Be a Mouse-Click Administrator. Windows 7 makes it easy to gain admin rights with a keyboard shortcut. Click on Ctrl+Shift on a taskbar-locked icon, and voila! You've launched it with appropriate admin rights.

24. Faster Installations. If your computer is capable of booting from USB, try this: XCopy the Windows 7 installation DVD to a sufficiently large USB drive, boot from that drive, and install Windows from there. It's faster than a spinning platter.

25. Burn Discs with a Click. Or two; double-click an ISO file to burn it to your CD or DVD writer.

26. Restore Point Previews Many of us used to shut off System Restore because we were terrified to actually use it; under Windows 7, we can be much calmer. After selecting a Restore Point, Windows will now offer to show you which files and folders will be affected by restoring to that point.

27. Sync Time Zones. If you work with offices in different time zones and frequently find yourself missing meeting times because you are not in sync with their time zone, try the "Additional Clocks" feature that was first introduced in Vista. Within your Date and Time settings is a tab called Additional Clocks, where you can add two or more clocks to your taskbar time, and set them to provide different time zones from your current time zone.

28. Configure User Account Control (UAC). Even if you're a UAC hater, give it another try. Go to the Control Panel to configure its behavior to something slightly less obnoxious than what Windows Vista had, and see if you can't live with the extra protection it offers (see Figure 3).

Figure 3 User Account Control, the bane of administrators, has been revamped and improved. (Click the image for a larger view)

29. RoboCopyCopyCopy. The always-useful Robocopy.exe can now run multi-threaded; run Robocopy /? to review its new parameters (like /MT for multithreading) and make your copies go faster.

30. Remote Desktop Console. Windows 7 Remote Server Administration Tools (RSAT) does not include a console-based remote desktop utility. And even if it did, the standard remote desktop console has some nagging limitations: It can't move connections around in the list; it can't sort by folders and so forth. If you manage lots of servers from your Windows 7 workstation, try downloading a copy of mRemote from mremote.org. This donation-requested utility allows you to mix together a variety of remote control applications, including Citrix Independent Computing Architecture (ICA), Microsoft Remote Desktop Protocol (RDP), Virtual Network Computing (VNC), Secure Shell (SSH) and rlogin. All host names are displayed in a standard tree control that can be divided into folders, sorted alphabetically, and allow you to assign different logon accounts and secure passwords to each connection.

31. Multiple Monitors. Windows 7 makes working with multiple monitors intuitive and flexible. There are a variety of shortcuts and mouse motions that flick windows from monitor to monitor. To make the most of this, you need lots and lots of screen real estate. Try one of the new QWXGA monitors from Samsung (tinyurl.com/qwxgasamsung) or Dell (tinyurl.com/qwxgadell). These 23-inch monitors have a 2048x1152 resolution, making it possible to put two full-sized pages on the same monitor. Pair them together and you'll get enough space to have all your admin tools open along with Office, Visio, your intranet sites and a little note to your mom in Live Mail. Move your taskbar to the left or right side of the window instead of along the bottom to free up even more real estate.

32. Windows PowerShell Scripting. If you want to make the most of Windows PowerShell on Windows 7, you'll need a quick way to build and debug scripts. Windows 7 comes with an interactive editor that allows you to try out cmdlets and test functions on the fly.

33. Drag-and-Drop Notification Icons. The redesigned notification area displays only a minimum number of icons; all other notification icons are moved to a side window. Rather than using the Customize option to select icons for the main display, you can drag-and-drop icons from the side window to the notification area.

34. Add Unindexed Shared Folders to Library. You can add UNC paths such as \\servername\sharename to a Library, but the server must index the folder. If you want to add a UNC path to an unindexed server, you can create a symbolic link to the UNC path, then add the link or links to the library. Use the mklink command. For example, mklink HomeFolder \\ServerName\Homefolder.

35. Simplify Cloned Machine Setups. You can't run Sysinternals' newsid utility to change the identity of a cloned Windows 7 machine (either a virtual machine or imaged PC). Instead, create a template installation then run sysprep /oobe /generalize /reboot /shutdown /unattend:scriptfile. Clone or copy this virtual machine file. When it launches, it will get a new SID and you can fill in the name. The reference for building unattended script files is at tinyurl.com/winunattend.

36. Snap That Aero. The Windows key is great for all your shortcuts. Now you can use it to work with the new AeroSnap feature in Windows 7. Select a window, hit the Windows key and a left or right arrow to snap the window to that half of the screen, or use the up arrow to snap it to the top of the screen.

37. Shortcut the Taskbar. The Windows key is great for shortcuts. You can select the Windows key and a number to correspond to items on your taskbar. So, if IE (for example) is the third icon on your taskbar (not counting the Start button), you can hit the Windows key and the number three to launch or open IE.

38. Manage Passwords. Control Panel includes a new application called Credential Manager. This may appear to be a completely new tool that allows you to save your credentials (usernames and passwords) for Web sites you log into and other resources you connect to (such as other systems). Those credentials are saved in the Windows Vault, which can be backed up and restored. However, you might see this as similar to a tool we have in XP and Vista. From the Instant Search, type in control /userpasswords2 and you will be brought to the Advanced User Accounts Control Panel, where you can also manage passwords for your account (see Figure 4).

Figure 4 The Credential Manager provides a handy, secure place to store passwords. (Click the image for a larger view)

39. Trigger Actions. Event Viewer is closely tied into Task Scheduler. You have the ability to take an event (select it in Event Viewer) and then from the Actions pane, select the option "Attach a Task" to have that event, when it appears, trigger an action. That action can be: launch a program; send an e-mail; or display a message. This feature may be very helpful in troubleshooting a problem.

40. Browse InPrivate. A new feature in IE8 is the ability to open the browser in an InPrivate Browsing session that allows you to perform banking and so forth from a public location without fear of leaving behind any residue. IE will not retain anything you do in an In Private Browsing session. You can perform this action if you are already within IE by selecting the Safety button and then InPrivate Browsing. This will open another IE window altogether. However, you can save a few steps by using the shortcut. Right-click the desktop IE icon, click InPrivate and the windows will open in an InPrivate session already.

41. Go Live. Many applications installed on past versions of Windows have been removed. Starting with Windows 7, these applications (and a few others not typically installed with Windows) have been moved into the Live Essentials downloadable applications, at download.live.com. These applications include Messenger, Mail, Writer, Photo Gallery, Movie Maker, Family Safety and a few others.

42. Remove Apps. Although some applications have been moved off of Windows to become an optional download, other apps, such as IE8, Media Player, Media Center and DVD Maker are still included. In times past, especially when it came to IE, the applications were tied into the OS. However, in Windows 7 you can easily remove them if desired. Head to the Program and Features applet in Control Panel and select the "Turn Windows features on or off" link in the top left-hand corner. Then you can select the checkbox of the features you want to lose or add for your system (see Figure 5).

Figure 5 Windows 7 unbinds many applications from the OS, making it easy to add and remove them. (Click the image for a larger view)

43. Are You Windows 7 Experienced? System properties has a rating called the Windows Experience Index (WEI). This rating is a collection of five different ratings that are determined by the Windows System Assessment Tool (WinSAT). The highest rating score is 7.9 (compared to 5.9 in Vista), using the categories of Processor, RAM, Graphics, Gaming Graphics and Primary Hard Disk. The final rating is not an average of all the ratings, but the lowest of the subcomponent scores.

44. Analyze Processes. One of the coolest new features in the revamped Resource Monitor (resmon) is the ability to see the "wait chain traversal." An unresponsive process will be shown in red in the Resource Monitor; right-click the process and choose Analyze Process. This will show the threads in the process and see who holds the resources that are holding up the process itself. You can then kill that part of the process if you like.

45. Create Virtual Worlds. Virtualization capability has been added to the Disk Management tools. If you open Computer Management, go to the Disk Manager tool and then click the Action button at top, you will see the options Create VHD and/or Attach VHD. This allows you to create and mount a virtual hard drive directly from within the GUI. Note: With Windows 7 you even have the ability to boot a Windows 7 VHD (see Figure 6).

Figure 6 Windows 7 adds a great deal of virtualization support, including the ability to create and attach virtual hard drives from the GUI. (Click the image for a larger view)

46. Encrypt USB Sticks. Use BitLocker To Go. Maybe you've managed to never misplace or lose a USB key, but for the rest of us mere mortals, it's a fact of life. Most of the time it's no big deal, but what if it contains sensitive data? BitLocker To Go enables you to encrypt data on removable storage devices with a password or a digital certificate stored on a smart card.
The 14 Best Windows 7 Keyboard Shortcuts
The Windows key now performs a wide variety of functions. Here are a handful of the most useful ones:

47. Lock with Group Policy. Take control through AppLocker application control. AppLocker intercepts kernel calls that try to create new processes or load libraries and ensures the code is allowed to execute. Practically, that means you can eliminate unknown and unwanted software by implementing AppLocker through Group Policy.
48. Be Our Guest. Guest mode proves a convenient method to give a guest or child access to your computer with limits on making system changes, installing software, or writing to the disk outside the user profile. After the user is done and logs off, data saved inside of the user profile is deleted.

49. Restore from Backed up Restore Points. You can choose to include restore points in your backups and restore from them when using System Restore. This is convenient if you want to create a baseline of a working configuration and be able to restore to it in the future without overwriting other data on the hard disk.

50. Benefit from BranchCache.BranchCache helps you save on round trips for requested files in remote branch scenarios. If one person requests a file over the WAN, it's cached locally and either distributed across computers at the remote branch or stored on a central server at the remote branch.

51. Disable Search Suggestion Popups. As you type in the Search Box, Windows 7 makes suggestions based on past queries by pulling past queries from the Registry. You can disable this in the Local Group Policy by enabling User Configuration | Administrative Templates | Windows Components | Windows Explorer | Turn Off Display Of Recent Search Entries In the Windows Explorer.

52. Pin Control Panel to Taskbar. If you use the Control Panel frequently, you may have noticed that you cannot simply right-click the Control Panel and select Pin to Taskbar. Instead, you must first Open Control Panel so its icon appears in the taskbar. From there, you can right-click the icon in the taskbar and select Pin this program to taskbar.

53. Leverage Search Connectors. You can now search the Web using the search functionality. Windows 7 includes Federated Search to increase the search scope beyond the local and network resources. Several search connectors are available, such as for YouTube and Twitter, or you can create custom ones to fit your needs.

54. Use Stickier Notes. Even though this feature has existed in previous versions of Windows in one form or another, it's much easier to use in Windows 7. You can stick a note on your desktop for quick reminders. It's a snap to change the font or note color. If you have a note selected, use Ctrl-N to create a new one.

55. Try out Improved WordPad. You probably haven't given much thought to WordPad lately, but the version shipping with Windows 7 has undergone a major renovation. Think of it as a lite version of Microsoft Word. WordPad sports a spiffy ribbon interface, making it a snap to create well-formatted documents. Plus, you are no longer relegated to saving them as .RTF files. WordPad now supports the Office Open XML document (.DOCX) format. This makes it even easier to open .DOCX files created in Word in WordPad.

56. Calculate. Another basic utility that received a major overhaul is the venerable calculator. In addition to standard and scientific views, there are now programmer and statistic modes. You will also love the conversion and calculation features. Want to convert Celsius to Fahrenheit but can never remember the formula? Use the conversion panel. You'll also enjoy the data calculation extension. Quickly find the difference between two dates or calculate a new date by adding or subtracting years, months or days.

57. Manage Services from Task Manager. The Windows 7 Task Manager now includes a tab to manage services. You can quickly see at a glance the status of all services on your machine. Click a column heading to sort. You can even start and stop services with a simple right-click. If you need full-blown service management, use the Services button to launch the Services management console. You may often have the Task Manager running in the system tray; now, having service management access means one less window to have open.

58. Get Under the Hood. Windows 7 offers more ways to peek under the hood without adding third-party solutions. A terrific example is the Resource Monitor. The performance tab in Windows Task Manager is a good start, but sometimes you need more information. Click the Resource Monitor button to get more detailed information and performance graphs for key subsystems like CPU and Disk. You can also find the Resource Monitor under Accessories | System Tools.

59. Check Vital Signs. Another new system tool you'll enjoy is the System Health report. In the Run dialog box, type perfmon /report, which generates a system health report. This report records details about your computer's performance, resource usage and more. The report also includes diagnostic information about things that aren't working as they should and suggested steps to resolve. The reports are saved and can be accessed with the Performance Monitor management console. You can also save as an HTML file or send via e-mail.

60. Get More Windows PowerShell. Windows PowerShell v2 promises to be a game-changer for many system administrators. Many will prefer to use the graphical Windows PowerShell console, also known as the Integrated Scripting Environment (ISE). You'll find this in the Windows Power Shell folder under Accessories. Add a keyboard shortcut of Ctrl+Alt+I to quickly launch it. Run any Windows PowerShell command in the lower panel and see the results in the middle. Create or edit scripts in the top pane. Open multiple Windows PowerShell sessions connected to remote computers. The ISE makes Windows PowerShell v2 easy to use and fun (see Figure 7).

Figure 7 Windows PowerShell has been much more tightly integrated with Windows 7, and adds the Integrated Scripting Environment. (Click the image for a larger view)

61. Put It on Old Stuff. One perhaps-not-so-obvious Windows 7 tip is that you should attempt to install it everywhere. One user has a 6-year-old laptop that originally shipped with Windows XP. He could never get Windows Vista to install on it. But Windows 7 installed without complaint and runs extremely smooth. Granted, there are some Windows 7 features he can't take advantage of because the processor lacks certain features, but these are minor issues considering the laptop now has life again.

62. Improve Security. In Vista it was difficult to manage system protection via restore points. The System Protection tab in Windows 7 is a vast improvement. In one spot you can configure how much space to devote to restore points, delete and create restore points or even turn off system protection altogether. This is very useful on older systems where disk space may be at a premium.

63. Actually Use Help and Support. Much of Vista's clutter has been reduced in Windows 7. For instance, the Help and Support page has three links, a search window and a link back to Microsoft's Windows site. It's much less intimidating for end users, so make sure they know about it. Search is much improved as well, making for a better, faster experience.

Windows seven shortcut keys I Free download


shortcuts can add hours of pain-free computer time.
Along with the new window management features in Windows 7 comes shortcuts for those features to completely bypass the mouse. This makes the new features more user-friendly, and solidifies the hope that Microsoft really is listening to their customers. Well, at least the share our affection for shortcuts.



Windows Logo + Right Arrow: Sends the window to the right half of the screen. This is a new feature in Windows 7—usually, you must drag the window all the way to the very bottom right corner for WINDOWS to recognize you want to dock this window on the right. This shortcut sends the window there with just a button click.

Windows Logo + Left Arrow: Sends the window the left half of the screen. When used with the shortcut above, you can see your windows side by side. This is great for comparing products online or fact checking with the internet in one window and a Word file in another.

Windows Logo + Home: Minimizes or restores everything but the current window. Windows 7 allows users to “shake” the current window to minimize all other windows. This shortcut takes the place of the awkward shaking.

Windows Logo + +: Hitting this shortcut will zoom in. Windows 7 has a magnifier that works with almost any window. This shortcut activates the magnifier.

Windows Logo + –: Conversely, this shortcut allows you to zoom out. It should be easy to remember—plus zooms in, minus zooms out.

Windows Logo + G: Displays gadgets in front of other windows. So, if you are making use of the gadgets and want to see what they are doing behind your current windows, just quickly hit this shortcut and the gadgets appear on top of your current windows.

Windows Logo + Up Arrow: Maximizes the current window.

Windows Logo + Down Arrow: Minimizes the current window.

How to remove stored usernames and passwords


To remove the Stored User Names and Passwords from your system, try this:
Click Start, Run and type Control keymgr.dll
Remove the entries from the list.
The other ways to access this dialog are:
Type Control Userpasswords2 in RUN box, click Advanced, Manage Passwords
-or-
From Control Panel, select your User Account, click Manage your network passwords

How to detect an email virus


You would be able to understand an email virus easily from their SUBJECT, most of them contains an amazing statement or unsusal word, such as below:

Weah ^_^ )
Hokki
Hi
ello!
Hello -)
Hey, dude, it's me ^_^
access Mpeg
Re:your text
Re:Text message
Re:Msg reply
Re:Is that your document?
Re:Hot Movie(MPEG)
Re:Information. ..
Re;Important info
Re:This is your photos!

and more, and more...

If you received emails with the subject matter as above, you
should delete even with out openin.


NOTE:

Don't have words in ur email subject which resembles a virus mail Otherwise your email would be deleted by recipient .

BEWARE it's dangerous.

*** If one of your file is infected by virus, it will change into function of a virus and might infect all files in your hard disk.

How to preotect your computer from keylogger


Keyloggers, a short word for Keystroke Logging, is a very scary system that hackers can use to secretly monitor and capture all keystrokes, mouse clicks, passwords, visited web-pages and launched applications;
tracks received and sent e-mails and lots more. It can even takes screenshots of the computer activity! Keystroke logging can be achieved by both hardware and software means. Hardware key loggers are

commercially available devices which come in three types: inline devices that are attached to the keyboard cable, devices which can be installed inside standard keyboards, and actual replacement keyboards that contain the key logger already built-in. If you search “keyloggers” in Google, you’ll find tons of results. There are free keyloggers and also paid keyloggers which offers much more advanced keylogging system.


You will not notice the presence of such program. It is invisible in the Task List (when you press Ctrl-Alt-Del). It will not show in Task Bar, let alone your Desktop. It does not make any noise, your system will not slow down as in the case of spyware. But the key logger silently records all the keystrokes and puff — before you know it, your password has been changed and your credit card number has been used to make fradulent purchases.
Some people use keyloggers for good purposes and some abuse it. That’s why we need to learn how to beat the keyloggers in order to protect our information from being stolen. If you think you don’t have keylogger on your system, then it might have one. You can only be sure that you are safe from keyloggers after you’ve read this article. Keyloggers have been a major problem today it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other
confidential data. Below are some methods through which you can protect your computer from keyloggers.

1. Use a Good Antivirus
This is the first and basic step that you need to take in order to protect your computer from keyloggers. Use a Good antivirus such as Kaspersky, Norton or Mcafee and update it regularly.

2. Use a Good Antispyware
Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware such as NoAdware.

3. Antilogger can come handy
Antiloggers are programs that detect the presence of keyloggers on a given computer. However, if the keloggers avoid detection by using different mechanisms, then antiloggers can also be of little use. Over
the past few years, experties have tested a lot of anti-logging programs and have found Zemana Antilogger as the best antilogger.

4. Zemana
Normally a keylogger can be easily detected by a Good Antivirus program, but hackers use some methods such as hexing, binding, crypting and similar techniques to make it harder to be detected by antivirus programs. In this case Zemana Antilogger comes handy as the program is specially developed to protect your system against harmfulkeyloggers.

5. Online Scanning
When ever you receive a suspicious file, you scan it with online scanners such as Multi-engine antivirus scanner which scans your file with 24 antivirus engines and reports it back to you if the file is recognized as a virus or spyware. This ensures that none of the malicious programs can escape from being detected as there are 24 differentantivirus engines are involved in the scanning process.

Posted by Computer Experts on December 17, 2010. Computer Stuff, Software, Tips & Tricks - No Comments

Keyloggers, a short word for Keystroke Logging, is a very scary system that hackers can use to secretly monitor and capture all keystrokes, mouse clicks, passwords, visited web-pages and launched applications;
tracks received and sent e-mails and lots more. It can even takes screenshots of the computer activity! Keystroke logging can be achieved by both hardware and software means. Hardware key loggers are
commercially available devices which come in three types: inline devices that are attached to the keyboard cable, devices which can be installed inside standard keyboards, and actual replacement keyboards that contain the key logger already built-in. If you search “keyloggers” in Google, you’ll find tons of results. There are free keyloggers and also paid keyloggers which offers much more advanced keylogging system.

You will not notice the presence of such program. It is invisible in the Task List (when you press Ctrl-Alt-Del). It will not show in Task Bar, let alone your Desktop. It does not make any noise, your system will not slow down as in the case of spyware. But the key logger silently records all the keystrokes and puff — before you know it, your password has been changed and your credit card number has been used to make fradulent purchases.
Some people use keyloggers for good purposes and some abuse it. That’s why we need to learn how to beat the keyloggers in order to protect our information from being stolen. If you think you don’t have keylogger on your system, then it might have one. You can only be sure that you are safe from keyloggers after you’ve read this article. Keyloggers have been a major problem today it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other
confidential data. Below are some methods through which you can protect your computer from keyloggers.

1. Use a Good Antivirus
This is the first and basic step that you need to take in order to protect your computer from keyloggers. Use a Good antivirus such as Kaspersky, Norton or Mcafee and update it regularly.

2. Use a Good Antispyware
Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware such as NoAdware.

3. Antilogger can come handy
Antiloggers are programs that detect the presence of keyloggers on a given computer. However, if the keloggers avoid detection by using different mechanisms, then antiloggers can also be of little use. Over
the past few years, experties have tested a lot of anti-logging programs and have found Zemana Antilogger as the best antilogger.

4. Zemana
Normally a keylogger can be easily detected by a Good Antivirus program, but hackers use some methods such as hexing, binding, crypting and similar techniques to make it harder to be detected by antivirus programs. In this case Zemana Antilogger comes handy as the program is specially developed to protect your system against harmfulkeyloggers.

5. Online Scanning
When ever you receive a suspicious file, you scan it with online scanners such as Multi-engine antivirus scanner which scans your file with 24 antivirus engines and reports it back to you if the file is recognized as a virus or spyware. This ensures that none of the malicious programs can escape from being detected as there are 24 differentantivirus engines are involved in the scanning process.

6. Sandboxie
Sandboxie is another great program to help you protect your computer against harmful keyloggers and spywares. Sandboxie runs your computer in an isolated space which prevents your program from making permanent changes to other programs in your computer.When ever you receive a file that looks suspicious, just run the program with Sandboxie so even if it is a keylogger or any other virus it will not make permanent changes to your computer system.To run a program in Sandboxie follow the steps as mentioned below:
1. Open sandboxie and click on sandbox menu on the top
2. Now go to Default sandbox
3. Then click on run any program
4. Now select the file you wish to run in sandboxie and click open

7. Keyscrambler
Keyscrambler is one of the best protection against keyloggers that you can have. It is a small program which encrypts your typed keystrokes so even if the victim has installed a keylogger on your system, he or she will get encrypted keys. Keyscrambler currently supports Firefox, Internet explorer and other applications, however its premium version supports more than 160 applications