Here are many tips and hidden tricks for your knowledge base. mesothelioma paternity paternity testing crm software refinance loan online drug rehab center student loan consolidation electronic medical records telecom audits remote access credit counseling medical billing high risk merchant account corporate gift ideas leadership development fleet management identity theft big bear florida mortgage broker alcohol abuse data logger california mortgage rates rackmount chassis, id card printers

23 September, 2010

Use computer for security for free

How To Use A Computer As A Video Or Security Surveillance System For Free


pc security
Supervision Cam is an application that lets you turn your computer into a video or security surveillance system. What the Supervision Cam does is it compares by capturing pictures from cameras at regular intervals that you have defined. Some of the activities are as follows: * It can save images on your hard disk as PNG, JPG or BMP.
* It can also play back a sound file.
* It could forward a message to computers within a network.
* It could initiate a program.


Supervision Cam captures all the images within the time intervals specified by the user. The users can also use this as a Web cam program. This application is really easy to use as it is not complicated at all. This program can also collect image files from the Internet Webcam. Listed below are some of the additional features that a supervision cam can give to its users. * It can support a wide variety of capture boards and cameras.
* It has provisions to connect one or more cameras at the same time.
* It supports various languages such as Italian, English, French, German, Portuguese and Dutch.
* It also gives the users the option to add descriptions or a logo to the picture.
* You can create a mirror image or even rotate the picture.
* Quick print review or direct printing options of the captured image are some of the other options.
* It also gives certain advanced features to the print function.
* You can also save all your settings in documented format.

[ Download SupervisionCam ]

20 September, 2010

GOOGLE HACKING

Google serves almost 80 percentof all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites.The following are some of the hacks that can be accomplished using Google.

1. Hacking Security Cameras

There exists many security cameras used for monitoring places like parking lots, college campus, road trafficetc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter

inurl:”viewerframe?mode=motion”

Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. You will see something as follows
As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really aless refresh rate. But there are other search queries through you can gain access to other cameras which have faster refresh rates. So to access them just use the following search query.

intitle:”Live View / – AXIS”
Click on any of the search results to access a different set of live cameras. Thus you have hacked Security Cameras using Google.


  2. Hacking Personal and Confidential Documents

Using Google it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing theirAddress, Phone, DOB, Education, Work experience etc. can be found just in seconds.

intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”

You can gain access to a list of .xls (excel documents) which contain contact details including email addresses of large group of people. To do sotype the following search query and hit enter.

filetype:xls inurl:”email.xls”

Also it’s possible togain access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query intitle:index.of finances.xls


3. Hacking Google to gain access to Free Stuffs

Ever wondered how to hack Google for free music or ebooks. Well here is a way to do that. To download free music just enter the following query on google search box and hit enter.

“?intitle:index.of?mp3eminem“

Now you’ll gain access to the whole index of eminem album where in you can download the songs of your choice. Instead of eminem you can subtitute the name of your favorite album. To search for the ebooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.

19 September, 2010

Invisible password protected folder

Password-protected-folder
Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by thenormal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.

How to create aPassword Protected Folder
Step-1: Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as ABC.
Step-2: Now in this folder place all the important files, documents or any folders that you want to password protect.
Step-3: Now Right-click on this folder (ABC) and select the option Send To -> Compressed (zipped) Folder.
Step-4: Now a new compressed zipped folder gets created next this folder (ABC) with the same name.
Step-5: Double-click on this compressed zipped folder and you should see your original folder (ABC)here.
Step-6: Now goto the File menu and select the option Add a password.
ie:File -> Add a password
Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the password protected folder.

How to make it Invisible
Step-1: Now Right-click on this password protected folder and select Properties.
Step-2: At the bottom select theoption Hidden and press OK. Now your folder gets invisible (hidden).
Step-3: In order to unhide this folder go to My Computer – >Tools -> Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options
  • Do not show hidden files and folders
  • Show hidden files and folders
Now select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password. To make it invisible again repeat step -1 through step-3 and select the first option and click OK. Now the folder becomes invisible once again.

who is invisible on gmail or gtalk

gmail hack

Step 1.

Set the target user as off the record while he/she is online. This can be done by simply clicking on the option in the chat window.


Step 2.

Try sending an IM when he/she is invisible or offline. If he/she is invisible he/she will receive message. If he/she is offline you will receive an error“did not receive your chat”. This hack will only work if you mark the target user as off record when he/she is online. It is a limitation.
How does it work? When the chat is off the record, it will no longer stored in the gmail account. When you send IM to an invisible / offline user it will be delivered by default. At the receiving end the IM will receive as a pop in form of chat window if the user is invisible. If the user is offline it will receive as an email in the inbox. The main problem with this hack is if the target user is using another email client or desktop version.

registry editing disabled fixed

Cannot Access Regedit, How to Fix It?

Registry Editing has been disabled by your administrator

First we'll begin with the method that appears to work the best.

Method 1 - Enabling the Registry with VBScript

Doug Knox, a Microsoft Most Valuable Professional, has created a VBScript that enables or disables the Registry Editor based on the following location in the registry. Of course, since the registry editor is disabled, you can't change it manually, so Doug wrote a Visual Basic Script to accomplish the task.

HKey_Current_User\Software\Microsoft\Windows\CurrentVersion\Policies\System\

Visit Doug's page and download Registry Tools VBScript to your desktop, double-click on it to run it, then reboot your computer and try to open the Registry Editor.

If this fix didn't solve your problem, try method two shown below.

Method 2: Use Symantec's tool to reset shell\open\command registry keys

Sometimes worms and trojans will make changes to the shell\open\command registry entries as part of their infections. This will cause the virus to run each time you try to run an .exe file such as the Registry Editor. In these cases, visit Symantec's website and download the UnHookExec.inf file to your desktop. Right-click on it and choose Install. Restart your computer and then try to open the Registry Editor.


Method 3: Rename Regedit.com to Regedit.exe
Some viruses and other malware will load a regedit.com file that is many times a zero byte dummy file. Because .com files have preference over .exe files when executed if you type REGEDIT in the run line, it will run the regedit.com instead of the real regedit.exe file.

Delete the regedit.com file if its a zero byte file to restore access to REGEDIT. In some cases, such as the W32.Navidad worm, you'll need to rename the REGEDIT file to get it to work.



Method 4: Windows XP Professional and Group Policy Editor

If you have Windows XP Professional
registry editing disabled fixed - NISHANT COOL TRICKS AND HACKS
and access to an administrative user account, you could change the registry editor options in the Group Policy Editor.

  1. Click Start, Run
  2. Type GPEDIT.MSC and Press Enter
  3. Go to the following location


    • User Configuration
    • Administrative Templates
    • System

  4. In the Settings Window, find the option for "Prevent Access to Registry Editing Tools" and double-click on it to change.
  5. Select Disabled or Not Configured and choose OK
  6. Close the Group Policy Editor and restart your computer
  7. Try opening REGEDIT again
Although there are a few other ways, the above ways I have used with great success in re-enabling the REGEDIT command. If you are interested in more ways to reactive the REGEDIT command, you may want to visit a site called Killian's Guide, that goes into more detail on a variety of ways to get the registry editor to work again.

MAC OS ON WINDOWS PLATFORM

Figure 8


Figure 7


Figure 6


Figure 5


Figure 4


Figure 3


Figure 2


Figure 1

MAC OS ON WINDOWS PLATFORMThis is a featured page


Want to use the glamorous Mac OSX? Don’t have money to buy a Mac? That’s okay because a new guide has been released that will allow you to install Leopard version 10.5.1 in a single step to your PC.
You will have to meet some very specific hardware requirements, non-Core Intel processors are not supported (meaning anything in the Pentium line), Core Duo or Core 2 Duo processors are required. AMD processors are not supported at this time though a patch is in the works for that.
After confirming you have the correct processor, you will need a blank DVD-R to burn the ISO image files to. DailyApps has all the links to the files you will need to complete the installation.
However, some of your hardware may not work, WiFi cards and sound seem to be the most common but since Apple supports Intel, ATi and nvidia graphic cards there shouldn’t be any problems.
The installation files are about a 2.1GB download which will take a while no matter how fast your connection is and it is recommended that you burn the files to DVD at a slower than normal speed.
That’s just the preparation, to actually install Leopard, pop the DVD you just created in your drive, boot from it and let the installation begin.
Since Mac OSX Leopard uses the HFS+ file system, it’s not clear if you will be able to partition your drive and be allowed to dual boot Leopard and Windows XP/Vista. Try that at your own risk. If you can live with wiping your whole drive just to try this, it’s probably the safer method.
You didn’t think I’d let you off that easy, did you? This falls on a gray area of the law and violates Apple’s EULA. It’s only a matter of time before Apple puts an end to this and is it really worth the risk? That’s just up to you.


CHECK THIS ALSO....



Run Mac OS X on a PCby NISHANT SRIVASTAVA



People have long wanted to run the Mac OS operating system on PC hardware, specifically on Intel and AMD architectures. But despite pleas and prayers, that wish remains unfulfilled.
Although running Mac OS natively on PC hardware is not possible, there is another option--running Mac OS X on an emulator. In this article, I will show you how to install and run Mac OS X Panther on your PC using PearPC, a free, architecture-independent PowerPC platform that runs on PCs. To check out PearPC's features, go to the PearPC-PowerPC Architecture Emulator web site.
Here are the steps you'll take to use PearPC to install Mac OS X:
  1. Download the PearPC PowerPC Architecture Emulator.
  2. Obtain hard disk images for use with PearPC.
  3. Obtain images of your client OS installation disk.
  4. Configure PearPC to use the hard disk image and the OS images.
Downloading PearPCDownload the PearPC PowerPC Architecture Emulator. Once it's downloaded, extract its content to a folder, say, [Desktop]:\PearPC. This is the folder that is going to contain all of the files you'll see in the next couple of sections.
Note: [Desktop] refers to the path of my Windows desktop; that is, C:\Documents and Settings\Wei-Meng Lee\Desktop\.
Hard disk imagesTo install Mac OS X on the emulator, you need a hard disk image. You can download preformatted hard disk images from http://pearpc.net/downloads.php. Two disk sizes are available: 3GB and 6GB. If you plan to install the full Mac OS X, then use the 6GB image. If you have limited disk space on your hard drive, use the smaller, 3GB image. Be aware that the default install of Mac OS X takes up a little more than 3GB, and so you need to unselect certain components during installation if you use the 3GB image.
The disk images come in two formats: BZ2 and RAR. I used the 6GB RAR disk images. You need to uncompress the disk image before you can use it. To uncompress the RAR image, I used WinRAR from http://www.rarlab.com/download.htm. Uncompress the image and save it in the [Desktop]:\PearPC folder.
Making images of your client OSTo install Mac OS X on your hard disk image, you need to make copies of your Mac OS X installation disk in ISO format. You can use Nero or any other disk utility to save CDs or DVDs in ISO format. In my case, I have saved the images in the C:\PearPC folder. I have named the first disk Panther1.iso.
Note: You need to purchase Mac OS X in order to run Mac OS X in PearPC.

Configuring PearPC

Once you've taken the previous steps, you're ready for the final step: configuring PearPC to use the all the relevant disk images. To do it, you need to create a configuration file. You can find the instructions on how to create one manually at http://pearpc.net/guides.php?guides_id=2. Or you can download a Windows application that does all the hard work for you. In my case, I used the PearPC Control Panel to help me manage my Mac OS X emulation.
Launch PearPC Control Panel and click on the Create New Configuration File icon. You will see the first screen as shown in Figure 1. Click on Continue to proceed to the next step.
Figure 1. Using the Create Configuration File wizard
In the next screen, you have to supply a few pieces of information (see Figure 2). First, specify the location of the PearPC emulator. In my case, it is [Desktop]:\PearPC\ppc.exe.
Next, specify the location of the hard disk image; that is, [Desktop]:\PearPC\macosx_6gb.img.
Note: Be sure to replace [Desktop] with your own desktop path.
Also, set the amount of memory you want to set aside for Mac OS X. (I have allocated 255MB.) Click on Continue.
Figure 2. Creating a new configuration file
In the next screen, you have the option to specify the screen resolution and color depth to use. Click on Finish when done (see Figure 3).
Note: I tried to enable networking, but I never got it to work. Also, use G3 and not G4 CPU emulation.
Figure 3. Specifying additional options
Give a name to the configuration file and save the file in the location specified (see Figure 4). Name it Mac OS X Panther and save it in the location [Desktop]:\PearPC\macosxpanther.cfg. Click on Finish.
Figure 4. Completing the wizard
You should now see the icon for your Mac OS X Panther in the PearPC Control Panel (see Figure 5). You need to complete one final step before you start installing Mac OS X on your PC--check the "CD-ROM device is installed" option and specify the location of the Mac OS install disk image. In my case, it is [Desktop]:\Panther1.iso. This is the image that will be used to boot up the emulator.
Figure 5. The completed configuration file
Figure 6 shows the files in my [Desktop]:\PearPC folder. The important files are highlighted.
Figure 6. Files in the PearPC folder
That's it! Double-click on the Mac OS X Panther icon and you should see the PearPC 0.3.0 window pop up (see Figure 7). Your Mac OS X installation should start soon afterward.
Note: It took me quite a while to get my Mac OS X to install. I encountered a number of failed attempts--when I booted into Mac OS X, it prompted me to restart my machine. But after several attempts, it worked.
Figure 7. Installing Mac OS X
Once the OS is installed, you will be asked to restart the machine. For subsequent attempts to run Mac OS X on your emulator, you should uncheck the "CD-ROM device is installed" option so that it can boot directly from the hard disk image. If the installation is performed correctly, you should see something like Figure 8 when Mac OS X boots up.
Figure 8. Mac OS X booting up
Figure 9 shows I am having fun with my newly installed Mac on my PC.
Figure 9
Figure 9. Running Mac OS X on a PC!
And if you still doubt if I am really running Mac OS X on my PC, Figure 10 will prove it to you.
Figure 10 Figure 10. Running Mac OS X in my Windows XP PC

Summary

Before installing PearPC and using Mac OS X, you need to keep several things in mind:
  1. You need a license to run Mac OS X. That is, you need to buy a copy of Mac OS X.
  2. The installation process takes time. Don't install Mac OS X on a slow machine; I tried the steps outlined in this article on three different machines--933MHz, 1.7GHz, and 3.0GHz, all equipped with 512MB of RAM. The 3.0GHz machine installed significantly faster compared with the rest, but it still took me several hours to get all of the installation done. Also, make sure you have lots of free hard disk space. The hard disk image itself takes up 6GB, and the additional installation disk images are going to take up a few more gigabytes.
  3. Even though the installation process is painfully slow, once the system is installed it is actually quite responsive. While you won't be able to fully experience Mac OS X as if you were using a real Mac, the emulation provides a good way for you to try out Mac OS X before you head to the nearest Apple shop to get the latest iMac.
Have fun, and let me know if PearPC works for you.

18 September, 2010

USE USB AS A KEY TO START WINDOWS

Most of us are concerned about the security and privacy of our data. We put login passwords, encrypt data and do various other tricks to ensure that someone cannot access our system without our authorization. Hardware manufacturers have also started exploiting our desire for data security by offering fingerprint readers, face recognition and other fancy stuff. If you are paranoid about who accesses your system, you can use a simple trick to prevent the system from booting unless you want it to boot.
This can be achieved by using a regular USB/pen/thumb drive (whatever you call it). Basically configure your system to boot windows from USB stick. The hack would be more than enough to keep even your curious geeky computer friends from booting into the system. That said, it is by no means foolproof (which security measure is? ) so you might not want to bet your life on it.
*** DISCLAIMER : the following method requires you to make some changes to your operating system.MakeUseOf cannot accept any legal liability if anything goes wrong with your PC and you should proceed at your own risk.Please read the instructions thoroughly before beginning and if you are still not sure what you are doing, you should seek help from a knowledgeable friend ***
A key requirement for the hack to work is that your system should support booting from a USB device. This can be verified from within the BIOS menu. So if you have an older system that doesn’t support booting from USB devices, this one is not for you. We will cook up something else! Although, now that I think about it, theoretically (because I have not tried) the hack should work with a floppy disk as well. So you guys with older systems can also follow along and let us know if it worked.
What we are going to do is transfer some of the important files (you will see which ones) that Windows needs in order to boot, to the USB drive. Now if someone was to boot up the PC without your USB drive the system won’t find these important files and will thus fail to boot.
So now that you know the concept, let’s get working:
  • Format the USB drive.
  • Within Windows Explorer go to Tools > Folder Options. Within the View tab, choose “Show hidden files” and uncheck “Hide protected operating system files”.
  • usb key lock computer
  • Open up the Windows Partition (usually C:), copy boot.ini, NTLDR and ntdetect.com onto your USB drive.
  • Boot up the system and change the boot order preference to check for a USB device first. You can access the BIOS menu generally by hitting F8 when the computer just starts.
Just in case you are curious, the boot.ini file is required to tell where the operating system resides. NTLDR is the NT loader which actually loads the operating system. ntdetect.com detects basic hardware that is required to boot up the system.
The changes are fully recoverable, although it would require some work for the uninitiated. If something goes wrong or you want to restore back things as they were then use the Recovery Console from your Windows CD.

16 September, 2010

Techniques behind phishing


Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.
Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites such as Orkut are also a target of phishing.
Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack. In most cases we get a fake e-mail that appears to have come from a Trusted Website . Here the hacker may request us to verify username & password by replaying to a given email address.
TECHNIQUES BEHIND PHISHING ATTACK
1.Link Manipulation
Most methods of phishing use some form of technical deception designed to make a link in an email appear to belong to some trusted organization or spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL

instead of http://www.microsoft.com/
2.Filter Evasion
Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails. This is the reason Gmail or Yahoo will disable the images by default for incoming mails.
How does a phishing attack/scam look like?
As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. Here is an example of how the phishing scam email looks like

Example of a phishing e-mail message, including a deceptive URL address linking to a scam Web site.
To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site (1), but it actually takes you to a phishing site (2) or possibly a pop-up window that looks exactly like the official site.
These copycat sites are also called “spoofed” Web sites. Once you’re at one of these spoofed sites, you may send personal information to the hackers.
How to identify a fraudulent e-mail?
Here are a few phrases to look for if you think an e-mail message is a phishing scam.
“Verify your account.”
Legitimate sites will never ask you to send passwords, login names, Social Security numbers, or any other personal information through e-mail.
“If you don’t respond within 48 hours, your account will be closed.”
These messages convey a sense of urgency so that you’ll respond immediately without thinking.
“Dear Valued Customer.”
Phishing e-mail messages are usually sent out in bulk and often do not contain your first or last name.
“Click the link below to gain access to your account.”
HTML-formatted messages can contain links or forms that you can fill out just as you’d fill out a form on a Web site. The links that you are urged to click may contain all or part of a real company’s name and are usually “masked,” meaning that the link you see does not take you to that address but somewhere different, usually a scam Web site.
Notice in the following example that resting the mouse pointer on the link reveals the real Web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company’s Web address, which is a suspicious sign.

So the Bottom line to defend from phishing attack is
1.Never assume that an email is valid based on the sender’s email address.
2.A trusted bank/organization such as paypal will never ask you for your full name and password in a PayPal email.
3.An email from trusted organization will never contain attachments or software.
4.Clicking on a link in an email is the most insecure way to get to your account.

WHY PC CRASHED (ALL REASONS)

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."
You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?
1. Hardware conflict
The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.
For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.
If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:
* Start-Settings-Control Panel-System-Device Manager.
Often if a device has a problem a yellow ‘!’ appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.
Sometimes a device might share an IRQ with something described as ‘IRQ holder for PCI steering’. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.
Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).
When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.
To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2. Bad Ram
Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.
But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.
One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can
make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.
Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.
EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3. BIOS settings
Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.
Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.
A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer’s display.
Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to ‘yes’ to allow Windows to do this.)
4. Hard disk drives
After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to
* Start-Programs-Accessories-System Tools-Disk Defragmenter
This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.
The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).
Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to
* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.
Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.
Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to
* Start-Programs-Accessories-System Tools-ScanDisk
Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.
5. Fatal OE exceptions and VXD errors
Fatal OE exception errors and VXD errors are often caused by video card problems.
These can often be resolved easily by reducing the resolution of the video display. Go to
* Start-Settings-Control Panel-Display-Settings
Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.
If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to
* Start-Settings-Control Panel-System-Device Manager
Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.
If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.
The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.
Another useful way to resolve video problems is to go to
* Start-Settings-Control Panel-System-Performance-Graphics
Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).
Look up your video card’s manufacturer on the internet and search for the most recent drivers for it.
6. Viruses
Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to
* Start-Settings-Control Panel-Add/Remove Programs
Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.
A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.
An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec (www.symantec.com).
7. Printers
The action of sending a document to print creates a bigger file, often called a postscript file.
Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer’s performance.
If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer’s default settings and you may be able to carry on.
8. Software
A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.
Read the instructions and use it carefully so you don’t do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org
Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.
Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.
Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn’t work.
Remember to restore all the BIOS settings back to their former settings following installation.
9. Overheating
Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.
One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com
CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.
10. Power supply problems
With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.
If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.
*******************************END

how to prevent orkut account from hackers

We already discussed on my blog how Orkut accounts are hacked from smart Orkut hackers by manipulating the victim (The account which is being hacked) in giving out his own password and account information using false technique such as Fake login page.So here are some of the tips for Orkut users to prevent from getting their own Orkut profile hacked!

Orkutting in Public Computer

Make sure you do not check the button “Remember Me” when you log in to your Orkut account from a publicly accessible Internet (Cyber Cafe).Someone might peep when you are typing the password,in such case strong password with numbers and capitalization are recommended.

Anti Keylogger

If you are visiting a local browsing center then try to check the programs installed in the computer.If you find keylogger (which stores password) then remove it immediately (Complain about this to the person who manages the browsing center).You can also install a Anti Keylogger to protect and safely log in to your Orkut account.Another solution for this is to make use of On Screen keyboard which is installed on every Windows Operation System.

Never use Javascript code

If a friend scraps you to copy the javascript code and paste it in your browser address bar then re check the Javascript to understand the code.If you are familiar with the code then make a search or better ignore such javascript scraps,no matter what they do! They are a time waster..

Re-Check Links via Scraps

Some people will blindly click on the website links sent by anonymous orkut user to the scrapbook.Re check the links once again and make sure you do not enter your password to any fake login page or give out any of the Orkut details if you are visiting a website or any link via orkut scrapbook.

Strong Google Gmail password

If you are having a password which is easy to remember then change is as soon as possible.Because hackers can make use of programs such as “Brute Force” to easily detect your password (If the password is short and is a dictionary word).Make use of Password generators and take a note of your password.Also make sure you have a good security question & answer which none of your friend can easily guess.

Check the address bar

Everytime you visit someone’s profile via links or any orkut community then check the address bar to ensure that you are on Orkut.com website.If you detect any different url then do not panic, immediately change your orkut password!

Stay away from Orkut Strangers

If someone requests for friendship then checkout his/her profile, check scraps, orkut communities and mutual friends joined by the person.So that you get a clear idea if the person is genuine or a orkut hacker who want to abuse your profile.

Maintain Orkut Privacy Profile

Keep your profile private if you are too much concerned about your privacy.Generally this will help you a great deal if you are orkutting to connect with Well-Known friends as it eliminates anonymous scraping and friendship with strangers!

Remember to Logout

Make sure you do NOT forgot to Log out from the Orkut website if you are accessing Internet from a public area.Once again double check Orkut,Gmail and Google services.
GA_googleFillSlot("Single_rectuangular_ad");
<br>

how to get back your orkut/gmail ids

Everyone should read this no matter how safe you think you are! As Google Account is a single account used across all Googles services like Gmail,orkut, Blogger, Adsense, Checkout. etc, it can turn out to be our worst nightmare if it gets hacked! Like many other online services Google tries to protect your account with secret question as well as optional secondary email address. But there is one more official option which only Google Provides! Now lets go step-by-step?

#1.Trying "Forget Password" Option:
I know this will not work in most cases, as options like forget password rely on secondary email address and security question, both of which can be easily changed once a account gets hacked. Still you should try atleast once as most password gets hacked by script kiddies and not by real hackers. So go to Forget Password form first!


#2. What if "Forget Password" Option Fails
You can submit a form to Google in which you can provide details about your Google Account usage. Details include information which most likely only real owner can provide. Here are few things for example?

* Last successful login date
* Account creation date
* Google products you used with this account and the date you started using each one
* Details about orkut account (if you use orkut)
* Details about Blogger account (if you use Blogger)

Now most important part is what they quoted on the form,

"Please answer each question as thoroughly and accurately as possible. If you?re not certain about some of the information, provide your closest estimate. Whether or not we can return your account depends on the strength and accuracy of your responses."

So I will suggest following things?

* Your goal should be to give Google maximum & accurate data! So take your time and submit form with maximum amount of information possible. You can consult your trusted friends if you are not sure. As an example it could be Vicky or Pankaj who invited you on orkut. If you are not sure call them up and ask it!

* Submit only one form! Yes this should be common sense. Do not submit multiple forms. A person who uses around 10-15 Google products asked me if he can submit multiple forms mentioning different Google products.

* Submit form from the place which you use most often to access your account like PC at home! Although they haven?t mentioned this explicitly, line above submit button says, "Please note that we need your IP address in order to resolve this issue. Your IP address will be captured automatically when you submit this form."

Finally Contact Form is here!

http://www.google.com/support/accounts/bin/request.py?contact_type=ara&ctx=accounts&hl=en


I advise everyone to have a look at this form and information it asks. You can prepare a document about secret info, may be in cell phone or pen down it on a paper. This will come handy if something goes wrong in future!

I guess I have offered my best possible help on the issue. It may or may not work but Thats all I can do.

13 September, 2010

change password of linux and windows 7

kon boot

hack password of window 7 and linux by this software..


1. Download Kon-Boot ISO and burn to CD. (Its only a few KB in size)
(Link:http://www.piotrbania.com/all/kon-boot/)
(If you don't know how to burn ISO images to a CD, write it in the comments and
I will write a tutorial very soon)2. Insert the Kon-Boot CD that you just burned and boot the computer with the CD.
You will need to configure the BIOS to start up the computer with CD.
(Most modern PC's don't require anything and its pretty easy too,
if needed, write it in comments if you need help)3. A kryptos login splash screen appears.
Youll need to hit enter to continue or else the screen will stay there.
Kon-Boot login windows without password4. Kon-Boot will tell you that it is ready to hax0R in. (Kewl huh?)
It will check SMAP BIOS entries, detect dummy BIOS, and fix SMAP entries.
KonBoot login to password protected windows5. Windows will now load as normal.6. When the Log On to Windows box appear, simply type anything in the password box and youre in!
You can even leave the password field blank.Do take note that Kon-Boot does NOT modify any of your files.
If you boot up the computer the next time without Kon-Boot CD
and try to login using any password, youll get the error
The system could not log you on. Make sure your User name and domain are correct,
then type your password again. Letters in passwords must be typed using the correct case.Ive scanned Kon-Boot ISO image file in VirusTotal and so far only Kaspersky,
F-Secure and Microsoft detected it as a threat. For testing purposes,
Ive installed and updated Kaspersky Anti-Virus 2009 on my desktop computer,
then used Kon-Boot to login to a password protected account.
I am still able to login and Kaspersky did not find any suspicious activity.Kon-Boot is free, small and very useful! In my opinion,
it is so far the BEST tool to login to Windows without password today.
Think carefully of what youre going to do because you will lose friends, job, trust
and etc if youre caught breaking in to Windows without permission and remember
I don't take any responsibility.Here is a Sample Console output of what it will look like -Ubuntu 8.04 torpeda tty1
torpeda login:kon-usr
# id
uid=0(root) gid=0(root)
# whoami
root
download
CD ISO ImageCD-konboot-v1.1-2in1.zip

How to Trace Any IP Address

ipmap

In my earlier post I had discussed about how to capture the IP addressof a remote computer. Once you obtain this IPaddress it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source. One of my favorite site is ip2location.com. Just go to http://www.ip2location.com/demo.aspxand enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of abutton you can find the following information for any given IP address.

1. Country in which the IP is located 2. Region 3. City 4. Latitude/Longitude 5. Zip Code 6. Time Zone 7. Name of the ISP 8. Internet Speed 9. Weather Station 10. Area Code and 11. Domain name associated with the IP address. A sample snapshot of the results from ip2location.com is given below

ip2location_results
You can also visually traceroute any IP address back to it’s location. For this just visit http://www.yougetsignal.com/tools/visual-tracert/and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination. Hope this helps. Please pass you comments.

anonymous orkut scraps trick send anonymous scrap on orkut

anonymous orkut scraps trickWARNING : do this trick with new orkut account because you are going to delete your account in this trick

Sending anonymous scraps on Orkut is a pretty fun trick. You can send scraps to your friends, write whatever you want in that scrap, but your friend will not be able to catch you. Your friend even won’t be able to drop a reply to that scrap sender also. This trick is known as anonymous scrap trick. Play this Orkut prank with your friends and surprise them
.


To post anonymous scraps and hide your identity on orkut, follow the below steps.
  1. Go to www.orkut.com and open a new account. (Use any email ID to get registered)
  2. Sign in to your orkut profile with your new email and password.
  3. Write scraps and post in your friend’s scrapbook. You can post scraps in as many scrapbooks as you like.
  4. When you are done with scrap writing, it’s time to make them anonymous.
  5. Navigate to your Orkut profile’s Settings >> General >> My Account >> Delete my Orkut Account >> Delete Account to delete your Orkut profile. (Remember that you are deleting your newly created account, your original account is safe, don’t worry!)
  6. Now after the deletion of your Orkut profile, the scraps you sent and the scrap sender both will be marked as anonymous.
  7. You are done.

http://216.74.55.182/images/slides/createscantoword_1.png CONVERT SCANNED TEXT IMAGES TO TEXT DOC

http://216.74.55.182/images/slides/createscantoword_1.png


OCR (optical character recognition) is the recognition of printed or written TEXT CHARACTERS s by a computer. This involves photoscanning of the text character-by-character, analysis of the scanned-in image, and then translation of the character image into character codes, such as ASCII, commonly used in data processing.

In OCR processing, the scanned-in image or BITMAP is analyzed for light and dark areas in order to identify each alphabetic letter or numeric digit. When a character is recognized, it is converted into an ASCII code. Special circuit boards and computer chips designed expressly for OCR are used to speed up the recognition process.


OCR is being used by libraries to digitize and preserve their holdings. OCR is also used to process checks and credit card slips and sort the mail. Billions of magazines and letters are sorted every day by OCR machines, considerably speeding up mail delivery.

CONVERT YOUR SCANNED TEXT DOC TO TEXT FILES

http://img.openablog.net/sv7/images/edit170856.jpg
FREE OCR SOFTWARE

DOWNLOAD FROM HERE....

free calls from yahoo

free calls from yahoo
100 % working trick

first you need latest yahoo messanger


first dial this no

+18003733411

hear the instruction of lady

when she says free calls


choose free call

and then dial the number

country code 1st and enjoy.......


its all the VOICE basic Command use ur voice to activate FREE calls...


you can call 5 min for free every day

09 September, 2010

How to remove autorun.inf from USB Drive

Worms spreads by creating a copy of itself and starts by autorun.inf files. It is essential to remove the malicious and autorun.inf files not only from computers but also from the source, and that is the USB Drive. PreciseSecurity have created a procedure to delete the malicious files on infected drives.

PROCEDURE:
1. While the computer is still off;
2. Plugin the USB Drive
3. Insert the Windows XP CD-ROM into the CD-ROM drive. It must be the bootable Windows XP Installer
4. Start the computer from the CD-ROM drive. It will start Windows Setup screen
5. When the “Welcome to Setup” prompt appears.Press “R” to start the Recovery Console
6. If asked “Which Window installation would you like to logon to” select the number. Type “1? then Enter, if only one installation of Windows is present
7. Enter the administrator password, press Enter
8. It will bring you to command prompt, C:\Windows>
9. Proceed with the following command:
- Type d: (This is the drive letter of USB. It can be e: or f: defending on how many hard disk or cd drive is installed)
- Type attrib -h -r -s autorun.inf
- Type “edit autorun.inf” it will open DOS Editor and display contents as follows
==========================
[autorun]
open=file.exe
shell\Open\Command=file.exe
shell\open\Default=1
shell\Explore\Command=file.exe
shell\Autoplay\command=file.exe
==========================
Take note on the file that it called to open (in above example it is file.exe)

10. Exit DOS Editor and return to command prompt, D:\>
11. Delete the file that was called to open on DOS Editor
- Type del /f /a file.exe

12. Delete autorun.inf file
- Type del /f /a autorun.inf

13. Exit Recovery Console by typing exit.

FIND PASSWORDS BEHIND THE STARS

Ever wanted toknow whatis behind those ********passwords. For example if you want to know password from facebook account that somebody else have typed and left it. Here is post which will help you. .1)Howto breakhiddenpasswords******** in firefoxThis is simple. Just copy and paste the followingjavascript codewhen in your address bar whenever you are on a site with a login form and it will display the password behind ****** right away.


COPY THE CODE AND PASTE IT INTO ADDRESS BAR



javascript: var p=r(); function r(){var g=0;var x=false;var x=z(document.forms);g=g+1;var w=window.frames;for(var k=0;k




password

Enter email address where you want to receive tutorials when we post them! It’s free!
2)Howto breakhiddenpasswords******** inInternet ExplorerDownloadAsterisk Keyand run it. When you are on a site with a login form click
ShowInternet ExplorerPasswords

asterwin-ie


2)Howto breakhiddenpasswords******** in some applicationsTo do it, you should use free password reader utility called SC-PassUnleash. But, it only works on certain FTP clients and email clients.
Download:SC-PassUnleash


passunleash

12 TIPS FOR VIRUS FREE COMPUTER

Computer VirusIs your computer infected with virus? Do you oftenget mysterious error messages? Well this is a common problem faced by almost all the computer users across the globe. There are many viruses and worms out there that could infect your computer. Some are harmless, but, they do have the capacity to do any number of nasty things, up to and including, erasing all data from your computer. However there are ways to keep viruses away from your PC. Here are the 12 tips to maintain a virus free computer.

1. Email is one of the common ways by which your computer can catch a virus. So it is always recommended to stay away fromSPAM. Open only those emails that has it’s origin from a trusted source such as those which comes from your contact list. If you are using your own private email host (other than gmail, yahoo, hotmailetc.)then it is highly recommended that you use a good anti-spam software. And finallyNEVER clickon any links in the emails that comesfrom untrusted sources.


2. USB thumb/pen drives is another common way by which viruses spread rapidly. So it is always a good habit to perform a virus scan before copying any dataonto your computer.NEVER double-click the pen drive to open it. Insteadright-click on it and select the option “open”. This is a safe wayto opena pendrive.


3.Be careful about using MS Outlook. Outlook is more susceptible to worms than other e-mail programs, unless you have efficient Anti-Virus programs running. Use Pegasus or Thunderbird (by Mozilla), or a web-based program such as Hotmail or Yahoo (In Firefox).


4. As we all know, Internet is the main source of all the malicious programs including viruses, worms, trojans etc. In fact Internet contributes to virus infection by up to 80%. So here are the tips for safe surfing habits so that you canward offvirus infection up to the maximum extent.

Don’t click on pop-up windows that announce a sudden disaster in your city orannounce that you’ve won an hourly prize. They are the ways to mislead Internet users and you should never trust them.
You can also use a pop-up blockerto automatically block those pop-ups.

5. Most of us use search engines like Google to find what we are looking for. It is quite obviousfor a malicious website to getlisted in the search results. So to avoid visiting those untrusted malicious websites, you can download and install theAVG LinkScannerwhich is a freeware. This tool can become very handy and will help you to stay away from malicious websites.


6. Install a good antivirus software and keep it updated. Also perform full system scan periodically.It is highly recommended that you turn on the automatic update feature. This is the most essential task to protect your PC from virues. If PC security is your first option then it isrecommendedthat yougo for a shareware antivirus software over the free ones. Most of the antivirus supports the Auto-Protect feature that provides realtime security for your PC. Make sure that this feature is turned on.


7. Install agoodAntispywareprogram, that operates against Internet malware and spyware.

8. Never open any email attachments that come from untrusted sources. If it is a picture, text or sound file (these attachments end in the extensions .txt, .jpeg, .gif, .bmp, .tif, .mp3, .htm, .html, and .avi), you are probably safe, but still do a scan before opening.

9. Do not use disks that other people gave you, even from work. The disk could be infected with a virus. Of course, you can run a virus scan on it first to check it out.

10.Set up your Windows Update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both the operating systemand Internet Explorer. These updates fix security holes in both pieces of software.

11. While you download files from untrusted websites/sources such as torrents, warez etc. make sure that you run a virus scan before executing them.


12. And finally it is recommended not to visit the websites that feature illegal/unwanted stuffs such as cracks, serials, warez etc. since theycontribute much in spreading of viruses and other malicious programs.

This is a featured page

What to do if your Computer's running slowly

WFSC1_slow_600px.gif (600×438)What to do if your Computer's running slowly



We get a lot of people coming here complaining of slow running computers, and posting HijackThis logs for us to look at. They suspect that an infection is causing their problem. In a great many cases, malware is not the cause of the problem, and a few simple procedures are all that it takes to resolve things.

Computers need regular maintenance, I know this comes as a shock to some of you, but it's true nonetheless.

Now before you start to panic, don't worry. I'm not going to be asking you to start ripping off the covers of your machine and fiddling with the circuit boards, and I'm not going to be asking you to start following some arcane ritual known only to TechnoGeeks. What we're going to do is simple enough for anyone to do.

It's best if we break things down into two sections, the first are those that should be done regularly, the next are those that only need to be done once, or very infequently.

First, the tasks that need to be carried out regularly
  • Clear out your Temporary files

    During the normal operation of your computer, Windows and your other programs create an awful lot of temporary files. For the most part they are just that, temporary. But for any number of reasons, when they're no longer needed they don't get removed by the program that created them. So over time their number builds up, and unless you clear them out they can slow down your computer noticeably.

    In the case of your browser, the problem can be worse. All browsers cache the web pages you visit. The original reason was to make loading pages faster. When everyone was on dial-up this was quite a good idea, but with modern fast connections it's mostly unnecessary now. However browsers still cache webpages, and unless cleaned out regularly they build up to a position where they can have some pretty dramatic effects on how your browser works. Any number of wierd browser problems are caused by nothing more than an overfull cache.

    So once a month, or once a week if you're a heavy user, it's a good idea to clean out your Temporary files.

    Quote:For users of XP
    • Click Start > All Programs > Accessories > System Tools > Disk Cleanup
    • This will bring up the Disk Cleanup window.
    • Check the following entries.
      • Temporary Internet Files.
      • Recycle Bin.
      • Temporary Files.
    • Click OK.
    • When prompted whether you're sure you want to do this click Yes.

    For users of Vista
    • Click Start > All Programs > Accessories > System Tools > Disk Cleanup
    • This will open the Disk Cleanup Options window
    • Choose:
      • My files only
        or
      • Files from all users on this computer
    • Click Continue
    • Select the drive you want to clean up
    • Click OK
    • Check the following entries:
      • Temporary Internet Files
      • Recycle Bin
      • Temporary Files
    • Click OK
    • When asked if you're sure you want to delete these files, click Yes.
  • Defrag your hard drive

    Every time you write a file to your hard drive, the drive controller has to find space on your drive. It will often break files into fragments, so that it can use the available disk space efficiently. However over time files can become very fragmented because of this, and your drive controller has to work harder to find all the fragments and re-combine them so that a program can use it. This slows things down, depending on the amount of fragmentation of your files, it can slow things down a lot.

    So once a month (for heavy users), or once every 3 or 4 months (for light users), it's a good idea to defragment your hard drive.

    This will re-arrange the fragments on your drive so they form contiguous entities which are much easier for your drive controller to deal with.

    It's a time consuming operation, usually taking several hours, so best to do what I do, and start it going before you go to bed.

    Quote:For users of XP
    • Click Start > All Programs > Accessories > System Tools > Disk Defragmenter
    • Click on the Analyze button.
    • Let the analyzer run, it takes 5-10 minutes or so, sometimes longer, depending on your disk size.
    • When finished it will pop up a window telling you whether you need to defrag or not.
    • Microsoft is notoriously conservative about defragging, so don't take the recommendation you get as gospel. Have a look at the graph produced when analyzing, if there's more than about 10-15% showing red, then Defragging will improve your disk performance.
    • If you need to defrag:
      • Click the Defragment button.
      • The defrag process can take hours, so go do something useful, or if you've followed my advice and done this before bedtime, go have a good sleep and it'll be done when you wake up.

    For users of Vista
    • Click Start > All Programs > Accessories > System Tools > Disk Defragmenter
    • Click Continue
    • A window will open
    • To set up a regular schedule to defragment your hard drive
      • Check Run on a schedule (recommended)
      • Select the time of day and day of the week that works best for you
      • Select the volume (drive) to be defragmented
    • To defragment right now:
      • Click on the Defragment Now button
      • Select drives to defragment
      • Click OK to begin the defragmentation process


Next, the ones that you only need to do once or very infrequently.
  • Reduce the number of program that are Auto Starting

    Pretty much every program you install these days is set to auto start when you boot up. The program manufacturers tell you it's for your benefit, but the truth is for most of them it's just not necessary that they do so. Lots of auto starting program will severely slow down your startup time, and having lots of unnecessary program running in memory will slow down the running speed of your computer as well.

    Luckily it's not hard to prevent unecessary program from auto starting. Doing so does not mean you can't use the program, you start them by double clicking on their icons, just as you always have, it just means they won't be running when you're not using them.

    Of course program like your firewall and antivirus need to auto run, so we won't be touching them at all.

    Quote:For inexperienced computer users.
    • Download StartupLite by Rubberducky to your desktop.
    • Doubleclick StartupLite.exe to launch the program.
    • Ensure the Disable box is checked.
    • Click Continue.
    • A pop up message will tell you the unnecessary startup items in your list have been disabled and ask you to restart your computer.
    • Re-start your computer.

    Quote:For experienced users,
    • Download and install WinPatrol By Bill Pytlovany.
    • Doubleclick the Scottydog icon in your taskbar to launch the program.
    • Click on the Startup Programs tab.
    • To stop a program starting automatically at startup, click on it to highlight it, then click the Disable button.

      (It will be up to you to research items first to see whether they should be disabled)
    • Exit WinPatrol.

    If you've disabled something you later wish to re-enable, do the following.
    • Launch WinPatrol (as described above).
    • Click on the Startup Programs tab.
    • Click on entry you wish to re-enable.
    • With a disabled entry, the Disable button will turn into an Enable button.
    • Click Enable
    • Exit WinPatrol
  • Do you have a HOSTS file installed?

    If you are using one of the pre-prepared Hosts files to block unwanted and dangerous sites (eg. MVPs Hosts or Bluetack) then if you are not part of a domain, and notice a slowdown, you will need to disable the Windows DNS Client Service.

    Quote:For users of XP,
    • Click Start > Run > type services.msc into the Open: box, then click OK.
    • This will open the Services window.
    • Scroll down to DNS Client and double click on it.
      • Click the Stop button to stop the service.
      • Set startup type to Manual.
      • Click OK
    • Exit the Services window.

    For users of Vista,
  • From Start, in the Start Search box, type services.msc
  • Give permission to continue.
  • Scroll down to DNS Client and double click on it.
    • Under Service Status, click Stop
    • Under Startup Type, choose Disabled.
    • Click Apply, OK
  • Exit the Services window.
  • Disable your Indexing Service

    This service does what its name suggests, it indexes all your files, in order that you can find things faster when searching.

    It does it on a continuous basis, using up a great deal of CPU time and working your hard drive for no real good reason. As a result, although it may speed up your search times, it slows down your computer at all other times.

    I don't know about you, but I know where most of the files I want are located. For the number of times I have to run a search I'd rather have a faster computer than a faster search, so I turn this one off.

    By default this service is not installed in Vista, if you see it on your Vista then it has been deliberately added for reverse compatibility reasons, leave it alone.

    Quote:For users of XP,
    • Click Start > Run > type services.msc into the Open: box, then click OK.
    • This will open the Services window.
    • Scroll down to Indexing Service and double click on it.
      • Click the Stop button to stop the service.
      • Set Startup type to Disabled.
      • Click OK
    • Exit the Services window.
  • Check the amount of free space you have on your hard drive

    Windows (XP and Vista) needs a certain amount of "overhead" (free disk space) if it's to operate efficiently. If it doesn't have that space, your processor has to "page out", which will slow everything down considerably.

    Ideally you need at least 15-20% of your disk to be empty, if you don't have 15% then it's time to start freeing up some disk space.

    Quote:For users of XP,
    • Click Start > All Programs > Accessories > System Tools > Disk Defragmenter
    • Look in the last column (top right) under % Free Space
    • Exit Disk Defragmenter.

    For users of Vista,
  • Click Start > Computer
  • A window will open
  • Information for your hard disk drive(s), including the exact amount of free space available, will be displayed in the uppermost portion of the window.
  • Presuming you don't have enough free disk space, here's a couple of suggestions for freeing some up
    • Remove unnecessary programs

      OK, time to be honest with yourself, are you really using all those programs you've got installed, or are there some that you haven't used in a lifetime. If there are, then why not get rid of them and free up some disk space. Your hard drive will thank you for your efforts.
      Quote:For users of XP,
      • Click Start > Control Panel > Add or Remove Programs
      • Click on the program you want to remove to highlight it.
      • Click the Change/Remove button and follow any instructions given.
      • Repeat for all program you wish to remove.

      For users of Vista,
      • For Control Panel Home view - Click Start > Control Panel > Programs > Programs and Features
      • For Classic View - Click Start > Control Panel > Programs and Features
        [list]
      • For either option, to uninstall a program, select it from the list and then click Uninstall.
  • Reduce your System Restore Points

    Windows creates System Restore points on a regular basis (every 24 hours), they take up a great deal of space on your hard drive (up to 12% for XP, 15% for Vista). If your computer has been running without problems (other than the slowness) for some time, then you can free up a lot of space by reducing the number of System Restore points to one (the latest).

    Windows will continue creating more RPs, but it'll take some time before you need to thin them out again.
    Quote:For users of XP,
    • Click Start > All Programs > Accessories > System Tools > Disk Cleanup
    • This will bring up the Disk Cleanup window.
    • Click the More Options tab.
      • In the System Restore field, click Clean up
      • You will be prompted if you want to remove all but the most recent restore point.
      • Click Yes.
    • Click OK.
    • When prompted whether you're sure you want to do this click Yes.


      For users of Vista,
      • Click Start > All Programs > System Tools > Disk Cleanup
      • Select Files from all users on this computer
      • Click on Continue
      • Select the appropriate drive letter (usually C:)
      • When the Disk Cleanup window opens, select the More Options tab
      • Under System Restore and Shadow Copies click on the Clean up button
      • All but the latest restore point will be removed
        [LIST]
      • Note: In some editions of Windows Vista, the disc might include file shadow copies and older Windows Complete PC Backup images as part of restore points. This information will also be deleted.

My fav tricks and hacks

This is my most favourite part

Giving you tips and trick from my collection my fav tricks and hacks - NISHANT COOL TRICKS AND HACKS
WEBCAMS . . . Are you bored ? AND dont have anything better to do well im going to show WEBcams or street cams
1. Enter one of the following into Google
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / - AXIS”
intitle:”Live View / - AXIS 206M”
intitle:”Live View / - AXIS 206W”
intitle:”Live View / - AXIS 210″
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1″ intext:”Open Menu”
intext:”MOBOTIX M10″ intext:”Open Menu”
intext:”MOBOTIX D10″ intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1″
intitle:”sony network camera snc-m1″
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console - Web Monitor”


Chat with Friends through ms dos Command Prompt
1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see Command Prompt Showing Some Thing Like This:
Messenger
User:


7) Now, type the IP Address of the computer you want to contact and press enter


8) Now all you need to do is type your message and press Enter.
Start Chatting.......!


Surfing Internet... Type in the url and Hit Enter, that's it ?

But...
Have you ever thought what happens after that ?

Lets Trace n see what happens !

Do the following :
# Start >> Run
# Type cmd
# This will open the Command Prompt
# Type cd
# Type tracert www.google.com
---------------------- Note ---------------------------
You can replace www.google.com with any website url.
------------------------------------
---------------------

Results :
$ First line shows the IP address of the website... $ You'll be shown steps in which the website gets load !
$ More is the number of steps more is time taken to load the website !

Remove Stored username and Passwords !
To remove the Stored User Names and Passwords from your system, try this:
Click Start, Run and type Control keymgr.dll
Remove the entries from the list.
The other ways to access this dialog are:
Type Control Userpasswords2 in RUN box, click Advanced, Manage Passwords
-or-
From Control Panel, select your User Account, click Manage your network passwords

It Works

Automatically close non-responsive programs>>>>>>>
With a small registry tweak, Windows XP can be set to automatically close any program that 'stops responding' (crashes), eliminating the need for you to use the task manager to close down the offending software manually.

To do this:

Open REGEDIT and navigate to HKEY_CURRENT_USERControl Panel Desktop

Modify the REG_SZ entry AutoEndTasks with a value of 1

To convert a FAT partition to NTFS:
Click Start, click Programs, and then click Command Prompt.
In Windows XP, click Start, click Run, type cmd and then click OK.
At the command prompt, type CONVERT [driveletter]: /FS:NTFS.
Convert.exe will attempt to convert the partition to NTFS.
NOTE: Although the chance of corruption or data loss during the conversion from FAT to NTFS is minimal, it is best to perform a full backup of the data on the drive that it is to be converted prior to executing the convert command. It is also recommended to verify the integrity of the backup before proceeding, as well as to run RDISK and update the emergency repair disk

Removing Shared Documents folder From My Computer
Open registry editor by going to Start then Run and entering regedit. Once in registry, navigate to key

HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows CurrentVersion Explorer My Computer NameSpace DelegateFolders

You must see a sub-key named {59031a47-3f72-44a7-89c5-5595fe6b30ee}. If you delete this key, you have effectively removed the my shared documents folder.

Locking the desktop
If you are leaving your computer for a while and do not wish to turn it off, but want to assure that no-one else can use the computer while you are away, locking the desktop is the best option.

By pressing WINDOWSKEY+L, you password protect your system just as if you had logged out or restarted the computer. The advantage is that any programs or processes that were running when you locked the desktop will stay open and running in the background, ready for you to resume work or play.

Reduce MS windows booting time
Hello friends you can decrease the windows booting time by using following tips:

First
-------------------------
1. Click at the Start icon
2. Then click run
3. type msconfig, which will open a new window.
4. select startup then check the programms which u wish to run at start up. Un check rest of them which u do not want to run at start up. After that restart your windows.


Second
--------------------------
open the folder c:windowstemp and then delete everything in it...... select all and delete

Third ( it will also increase your internet speed)
--------------------------
open documents and settings folder
then choose your login folder
then unhide everything from folder options
then you will find a folder local settings
then open the temp folder
then delete everything in it......... select all and delete
then come back to local settings folder
then open temp internet files folder
then delete everything in it......... select all and delete

At last re boot your machine...

Make Firefox Three Times Faster.......
Here is an old trick used by many peoples... Well it worked for me but not a big diffrence... i think it depends on PC.

here it goes.....

1. Typa about:config in the url bar in Firefox.
2. Type network.http in the filter bar.
3. Double click on network.http.pipelining to set it as true
4. Set network.http.pipelining.maxrequests to 30 (Firefox will then make up to 30 requests at a time)
5. Set network.http.proxy.pipelining as True
6. Rightclick anywhere and choose New -> Integer, name it nglayout.initialpaint.delay and make the value 0.
7. Restart Firefox

System Information . . .
In Start go to Run and type msinfo32

and press enter

it will give you the detailed information of your system.

Increasing Band-Width By 20%
Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc

To get it back:

Click Start then Run and type "gpedit.msc" without quotes.This opens the group policy editor. Then go to:
Local Computer Policy then Computer Configuration then Administrative Templates then Network then QOS Packet Scheduler and then to Limit Reservable Bandwidth. Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab i.e."By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.It works on Win 2000 as well.

Hidden Star Wars movie in xp
go to run and type:

telnet towel.blinkenlights.nl

hit enter...
enjoy the movie....

Eliminating the Right Click on the Taskbar
To eliminate the right click on the taskbar:

Start Regedit
Go to HKEY_CURRENT_USER Software Microsoft Windows CurrentVersion Policies Explorer
Add a DWORD and give it a name of NoTrayContextMenu
Give it a value of 1
Reboot

Shutdown Windows in 3 sec
Press (Ctr+Alt+Del) to open task manager

Open Start & select shut down tab

press & hold ' Ctrl ' key while selecting Turn Off from dis tab.

Count 3.. 2.. 1.. Voila!!!

DISPLAY MESSAGE ON STARTUP
Open Run & type regedit

Navigate to HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon

Modify the key legalnoticecaption with what you want to name the window.
Modify the key legalnoticetext with what you want the window to say.

Restart

Remove windows messenger from XP one forever

Go to Run box and type next:
runDll32 advpack.dll, LaunchINFSection %windir%INF msmsgs.inf,
BLC.Remove





Disable XP Error Reporting!! 2 Dec 2008
my fav tricks and hacks - NISHANT COOL TRICKS AND HACKS

Right click on MyComputer choose Properties
In System Properties click on Advenced
In Advenced click on Error Reporting
Check "Disable error reporting"
Leave unchecked field "But notify me when critical errors occur"

FOLDER LOCK WITHOUT ANY SOFTWARE
FOLDER LOCK WITHOUT ANY SOFTWARE........FOR THOSE WHO ARE NOT KNOWING
♠FIRST GO TO NOTEPAD AND WRITE THE BELOW CODE AND SAVE IT'S EXTENSION AS .bat THAT IS IT IS BATCH FILE


if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B303
09D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End


AFTER THIS CLOSE IT AND WHEN YOU WILL CLICK IT A FOLDER NAME "LOCKER"WILL BE THERE.Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'.
If you want to unlock your files,double click the batch file again and you would be prompted for password.
Enter the password and enjoy access to the folder.

How to recover MOST of scratched CD data discs


First some tools will be needed:

1. Alcohol 120%
2. UltraISO
3. Windows XP/2000 (not tested on 95/98/me)
3. Small piece of cotton
4. Dry cleaner paper
5. Finally, oil for cooking.

First step - preparing the CD

Get the cotton and drop some water, start cleaning vertically the surface of CD.
Do it 3 times and dry the water with a piece of dry cleaner paper. With a new piece
of cotton, drop some oil for cooking and start to wet the surface like you are
washing the CD with the oil. Dry carefully now. Some particles of oil will stay on the
microsurface of the scrath. It's okay. Seems the oil helps the laser of the CD/DVD driver
to read the surface again. Sure this will work with small unreadable scratchs - some hard
scratchs loose parts of the surface of the CD where we have data and it's lost forever.
But if it is loosed try anyway. Whith this tip 80% of the small scratched CD's coud be
recovered.

Second Step - testing the CD

With Alcohol 120% make an ISO - image making wizard - and lets see if the app can
read the loosed surface. In my case Alcohol 120% had recovered 60% of the data.
This is not enough. Have tryed other appz, they do not recover all the data. But the
CD/DVD driver laser CAN recover all data in this case. the data is still there, what we do?

third step - making the new CD


With the main copy system of windows explorer you can do it. Just create one folder
with the same name of the CD label for future burn reference, and copy the CD content
to the folder. When the CD copy process find the scratch, in majority of the cases, it's
slow down the reading and will recover ALL loosed data.If not, it just tell you there's
an unreadable sector. In this case your CD is lost. finally
windows explorer got all the data from the scratch and made a copy in the folder.
with the ultraISO, wrote the original CD label, drop the content of the folder and
save as Iso. You can Test the new CD just mounting the iso in the Alcohol 120%. . Works like a charm.

Sounds too bizzarre, but works. Course you can jump the cleaning process and try to copy
the content with Windows explorer.

Restricting Logon Access


If you work in a multiuser computing environment, and you have full (administrator level) access to your computer, you might want to restrict unauthorized access to your "sensitive" files under Windows 95/98.
One way is to disable the Cancel button in the Logon dialog box.
Just run Regedit and go to:

HKEY_LOCAL_MACHINE/Network/Logon

Create the "Logon" subkey if it is not present on your machine: highlight the Network key -> right-click in the left hand Regedit pane -> select New -> Key -> name it "Logon" (no quotes) -> press Enter. Then add/modify a DWORD value and call it "MustBeValidated" (don't type the quotes). Double-click it, check the Decimal box and type 1 for value.
Now click the Start button -> Shut Down (Log off UserName) -> Log on as a different user, and you'll notice that the Logon Cancel button has been disabled.



Search For Hidden Or System Files In Windows XP


The Search companion in Windows XP searches for hidden and system files differently than in earlier versions of Windows. This guide describes how to search for hidden or system files in Windows XP.

Search for Hidden or System Files By default, the Search companion does not search for hidden or system files. Because of this, you may be unable to find files, even though they exist on the drive.

To search for hidden or system files in Windows XP:
Click Start, click Search, click All files and folders, and then click More advanced options.

Click to select the Search system folders and Search hidden files and folders check boxes.

NOTE: You do not need to configure your computer to show hidden files in the Folder Options dialog box in Windows Explorer to find files with either the hidden or system attributes, but you need to configure your computer not to hide protected operating system files to find files with both the hidden and system attributes. Search Companion shares the Hide protected operating system files option (which hides files with both the system and hidden attributes) with the Folder Options dialog box Windows Explorer.




Make your Folders Private


•Open My Computer
•Double-click the drive where Windows is installed (usually drive (C:), unless you have more than one drive on your computer).
•If the contents of the drive are hidden, under System Tasks, click Show the contents of this drive.
•Double-click the Documents and Settings folder.
•Double-click your user folder.
•Right-click any folder in your user profile, and then click Properties.
•On the Sharing tab, select the Make this folder private so that only I have access to it check box.

OLD IS GOLD

Add your name to display clock!

go to control panel----->regional & language settings----->click on "customize" button---->click on "time" button-----> in AM symbol type your desired name---->in PM symbol type your desired name---> press ok twice-->

Old trick but cool try.......

Rename recycle bin
Open up your favorite plain text editor (notepad, for example) and copy the

following text into a new file:



REGEDIT4

[HKEY_CLASSES_ROOTCLSID{645FF040-5081-101B-9F08-00AA002F954E}ShellFolder]
"Attributes"=hex:50,01,00,20

"CallForAttributes"=dword:00000000



Now save this text file as a .reg file, such as "Rename Recycle Bin.reg" and

put it wherever you like. Double click on the file, and when it asks you if

you want to import it into the registry, choose Yes. You'll notice a new

option in the right-click menu to Rename the Recycle Bin. You can also

rename it by highlighing the Bin and hitting F2, or by highlighting it and

clicking on the file name (just like renaming any other file.


If you want to turn off this new feature, make another .reg file with the

same content as above, but change the first number in the "Attributes"=hex:

line from 50 to 40 and import that file into the registry

Watch movies in DOS mode of your windows xp
go to > start menue > run > type " cmd "
in Cmd mode now type :
telnet ascii-wm.net 2006 ( for World Cup '06 Soccer )
or
telnet towel.blinkenlights.nl ( for STAR WARS movie my fav tricks and hacks - NISHANT COOL TRICKS AND HACKS )

Change Internet Explorer background
On the menu bar - Click Tools. Click Internet Options.
In the Internet Options dialog box - If the General tab is not selected, click it.
On the General tab - Click the Colors button.
In the Colors dialog box - Clear the Use Windows colors check box.
Click the Text or Background buttons.
In the Color dialog box, under Basic colors - Click the color that best meets your needs. Click OK.
To close the dialog boxes - Click OK twice.

trick<>
trick<>
Now you can use Google Talk in the panel / sidebar
while browsing with your favourite browser.

You dont need to have the GTalk client installed at all.

1. Goto Bookmark Manager.
2. Click to create new bookmark.
3. Paste the following URL in the address (URL location) field.
http://talkgadget.google.com/talkgadget/client

4. Enter any name for the bookmark like GTalk.
5. Select the option for adding in sidebar or panel.
6. Click OK and you are done.

Google Talk talkgadget requires Adobe Flash Player 8 or above.

Works in both Opera & Firefox.

TRick <<>>
TRick <<>>
Now there is a simple trick to get rid of “All the slots Assigned to your Country are in use, Try again later” message.

* Go to Google Translate Tool
* Paste your Megaupload Link into Translate a web page box
* And Translate it from English to German.
* Hit the translate button and wait for the download page to load.
* And have fun !!
http://www.google.com/translate_t



-----------------
You may also just try this site even to fool rapidshare more than megaupload.com.

Since it is a proxy site and hosted in USA.Megaupload never blocks them.

http://rapidsurf.proxymafia.org/

Triks<<>>>
Triks<<>>>
SPEED UP UR ACROBAT READER (ALMOST LIKE NOTEPAD)


Do u get irritated when acrobat reader takes 5/10 seconds to load when you want to open a pdf document. There is a way to speed up the loading.

1. Go to the installation folder of acrobat reader
(C:program filesadobeacrobatreader.. whatever)

2. Move all the files and folders from the "plugins" directory to the "Optional" directory. (I repeat.. cut and paste the files NOT copy & paste).

Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).

Now your acrobat reader will load very fast
and almost as good as notepad..
njoy♥♥♥♥


ftp link 4 adobe
ftp://ftp.adobe.com/


ftp 4 microsoft
ftp://ftp.microsoft.com/

How to Hide the drives(c:,d:,e:,...etc) in Ur Comp
How to Hide the drives(c:,d:,e:,...etc) in Ur Comp
This is a great trick you can play on your friends. To disable the display of local or networked drives when you click My Computer.

1.Go to start->run.Type regedit.Now go to:
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer

Now in the right pane
create a new DWORD item and name it NoDrives (it is case sensitive).
Now modify it's value and set it to 3FFFFFF (Hexadecimal) .
Now restart your computer.
So, now when you click on My Computer, no drives will be shown(all gone...).

To enable display of drives in My Computer, simply delete this DWORD item that you created.Again restart your computer.You can now see all the drives again.

Speed Up Starting Of CD/DVD Burning Software
Whenever you Burn your data onto a CD/DVD, you might have noticed that it takes time to open the software. Either you use Nero or Roxio or any other software, it takes time to open. You can speed this process by making some changes in the services. Some of the services used by this software are not required and can be stopped. This will make the process much faster. Lets see how.
1. Go to Start –> Control Panel –> Administrative Tools –> Services.
2. Select IMAPI CD-Burning COM Service and Disable the Startup Type.
3. Click OK and Exit.
You will now see the difference. This makes the service much faster then your previous experience. However, if you are using the Windows inbuilt burning service, then you might not see this service, and if you do then disabling this won’t have any effect.

■■■ Image in folder background ■■■

~~This trick will help u in setting a pic in your folder background

Go to Control panel -> Folder options -> view tab -> show hidden files and uncheck the 2 boxes below it

Open a folder, search for a file desktop.ini (cnt find it? scroll to end of this post)
U will see something like this or a bit different

[.ShellClassInfo]
IconFile=%SystemRoot%system32SHELL32.d
ll
IconIndex=3


Now add this line below it:

[ExtShellFolderViews]
{BE098140-A513-11D0-A3A4-00C04FD706EC}={BE098140-A513-11D0-A3A4-00C04FD706EC}
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
IconArea_Image=C:Documents and Settingswin xpMy DocumentsMy Pictureskihlo32qwe.jpg

Change

C:Documents and Settingswin xpMy DocumentsMy Pictureskihlo32qwe.jpg

with ur location of the image u wanna set as background

Refresh and close the folder and chck again


****************************************
**************************

In case if ur folder dont have the desktop.ini file thn do this to create it

Open folder -> right click -> properties -> customize tab
change icon of the folder to any icon and u cn see the desktop.ini file now

Uninstalling:

Remove the line in the file ,simple


Change XP Boot Screen


If you would like to change your boot up screen follow the directions below. These instructions assume that you have a place to download the boot screen from the net. If you would like to download a boot screen, visit http://www.themexp.org

1. Backup (copy) the file %windir%system32ntoskrnl.exe (most likely C:windowssystem32ntoskrnl.exe - the boot screen)
2. Download the .zip to your computer (important: make sure to get the right version, XP or XP SP1)
3. Extract ntoskrnl.exe to a directory other than %windir%system32 (most likely C:windowssystem32)
4. Reboot your computer into Safe Mode (hit F8 before the boot screen) or into true DOS (from a boot disk)
5. Overwrite the file %windir%system32ntoskrnl.exe (which should have been backed up) with the extracted exe
6. Reboot your computer as you normally would

Associate an icon with a drive


To set the icon of any drive (hard disk, cd rom or anything else) with a letter (C: etc.), run REGEDIT (Start -> Run -> regedit)

Navigate to:

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorer

If one doesn't already exist, create a new KEY called "DriveIcons". Under this key, create a new key with the letter of your drive.

I.e. C for your C: drive.

To change the icon for that drive, create a key inside that one called DefaultIcon and set the path of (Default) to the location of your icon

eg CDefaultIcon
then (Default) = D:DocumentsC Drive Icon.ico

To change the name of that drive, create a key in the drive letter one (eg C) called DefaultLabel and set the (Default) to what you want the drive to be called.
This is useful if you want to assign a long name to the floppy drive.

Associate an icon with a drive



To set the icon of any drive (hard disk, cd rom or anything else) with a letter (C: etc.), run REGEDIT (Start -> Run -> regedit)

Navigate to:

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorer

If one doesn't already exist, create a new KEY called "DriveIcons". Under this key, create a new key with the letter of your drive.

I.e. C for your C: drive.

To change the icon for that drive, create a key inside that one called DefaultIcon and set the path of (Default) to the location of your icon

eg CDefaultIcon
then (Default) = D:DocumentsC Drive Icon.ico

To change the name of that drive, create a key in the drive letter one (eg C) called DefaultLabel and set the (Default) to what you want the drive to be called.
This is useful if you want to assign a long name to the floppy drive.

Change Browser Toolbar Background
Change Browser Toolbar Background
This tweak customizes the appearance of the Internet Explorer Toolbar

XP Professional

1. Click Start > Run > Type gpedit.msc
2. Click User Configuration > Windows Setting > Internet Explorer Maintenance > Browser User Interface
3. Double click on Browser Toolbar Customization
4. Click on Customize Toolbar Background Bitmap
5. Browse for the new Background

XP Home Edition

1. Click Start > Run, type: regedit
2. Navigate to HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerToolbar
3. Right click on an empty spot and create a new string value
4. Name it BackBitmapIE5
5. Doubleclick on BackBitmapIE5 and type in the path of your toolbar bitmap
6. Click OK and close regedit
(always backup before making any changes in the registry)



Note: Because you can customize your browser toolbar there isn't a specific size which
you need to make this tweak work. Play around with the size until you get it right.

The Width of your toolbar with be the width of your resolution. 1024 will be your width
if your resolution is 1024x768.

Change Log On Screen Colors
Change Log On Screen Colors
Microsoft includes three default "shell styles" with the Windows XP Luna theme: Homestead, Metallic, and NormalColor.

You can see these three styles in the "Welcome to Windows" and "Log On to Windows" screens during logon.

To change the style, open regedit and go to: HKEY_USERS.DEFAULTSoftwareMicrosoftWindowsCurrentVersionThemeManager
Change the "ColorName" key value to either "Homestead" or "Metallic". "Homestead" will show the title bars in an olive color. "Metallic" will show them in a silver color.

Log off or reboot to see the change.

Note: this will only work on the original Ctrl+Alt+Del log on screen, not the new Welcome screen.

More quick key tips!
More quick key tips!
Ok, I can't believe someone submitted the Windows Key+E to launch explorer as a 'tweak', but I guess you'd be really happy to learn about it if you didn't already know.

In the spirit of higher learning, here's a few more:

Windows Key + F - Launch Find tool
Windows Key + M - Mimimize all open windows
Windows Key + R - Launch the 'Run' button
Windows Key + U - Launch the utility manager (win2k & XP only?)
Alt + Tab (Hold Alt & Press Tab repeadly) - Task Switcher
Alt + F4 - kills the 'active' application - fun(?) for killing web popup windows quickly when they are coming at you like spam madness!

Ctrl+Alt+Del - In Win9x/ME (why are you using that?) it launches a 14m3 version of NT/2K/XP's Task Manager. In NT/2K/XP you get a menu with useful options for lock computer, logoff, shutdown, change password, task manager etc.

Strange, but true that some good programs are hidd
Strange, but true that some good programs are hidd
Strange, but true that some good programs are hidden in Windows XP !!!
Programs :

1. Private Character Editor :
Used for editing fonts,etc.

** start>>Run
** Now, type eudcedit

2. Dr. Watson :
This an inbuilt windows repairing software !

** start>>Run
** Now, type drwtsn32

3. Media Player 5.1 :
Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!

** start>>Run
** Now, type mplay32

4. iExpress :
Used to create Setups

You can create your own installers !

** start>>Run
** Now, type iexpress

drive "Access is denied" message?
drive "Access is denied" message?
start>Run=type("CMD" without " ") enter.

follow these

1. go to C: by typing C:>cd c:
2. type C:>attrib -S -H -R autorun.inf
3. delete the file by typing C:>del autorun.inf
4. goto drive D: by typing C:>d:
5. repeat step 1,2 and 3
6. do the same in all your drives (say you have C,D,E,F).
7. Close the DOS command window
8. Open task manager and "end task" the explorer.exe in the processes tab
9. From Application Tab in taskManager, select "new Task" button, type "explorer.exe"

Create a shortcut to switch users
Create a shortcut to switch users
Fast user switching has been a very useful feature of Windows for multi-user computers. Dating back to Windows XP, fast user switching allows multiple users to be logged into a computer at once. This is very useful if a user is in the middle of work but another needs to use the computer shortly. Fast user switching will allow the other user to log in while still retaining the other users session. Once the other user is finished the session can be switched back to the original user.

Creating a shortcut to switch the active user is as easy as creating a shortcut to c:windowssystem32tsdiscon.exe

1. Right click where you want the shortcut to be created and select New and then Shortcut.
2. Copy and paste “c:windowssystem32tsdiscon.exe” into the location box and hit Next.
3. Give it a name and hit Finish.
Well here's some tricks for WINDOWS 7


To get rid of the Send Feedback link on every window
, you'll have to edit a Windows registry value:

1. Open up the Start Menu
2. Type "regedit.exe" (without quotes) into the search box and hit enter
3. Navigate to "HKEY_Current_UserControl PanelDesktop
4. Locate the key on the right side that says FeedbackToolEnabled
5. Double Click on FeedBackToolEnabled
6. Change the value from 3 to 0



Windows 7 includes many new way to manage your windows such as window snapping and cool tricks like Aero Shake. One secret that few users know about are the new keyboard shortcuts that are a big help for any power user. The following keyboard shortcuts provide another way to use the new window management features in Windows 7.

1) Windows key + up will maximize a window to fill the screen
2) Windows key + down arrow on a maximized window will restore it to the original size.
3) Windows key + down will minimize any regular window to the task bar.
4) Windows key + M will minimize any window to the task bar.
5) Windows key + right or left arrow snap a window to half of the screen. This is the same as dragging a window to far left or right side of the screen.
6) Windows key + home will minimize all open windows in the background except the top most active window. This is the same as shaking the window (Aero Shake).
7) Windows key + T will iterate through your task bar thumbnails of open applications.
8) Windows key + D will minimize all windows.
9) Windows key + Space bar will let you peek at the desktop.
10) If you have multiple monitors, Windows key + shift + right arrow will move the active window to your next monitor. Windows key + shift + left arrow will revert it back.
11) Good old Flip 3D is still there. Use Windows key + Tab to bring it up. While holding the Windows key hit tab to iterate through the windows. Hold down Windows key + shift and then hit tab to reverse the direction.


Have fun! And enjoy the cool tweaks that are here...