Web Analytics

ad

Thursday, June 20, 2013

MAKING WINDOWS XP GENUINE

download jellybean keyfinder from this website
http://www.magicaljellybean.com/keyfinder.shtml

Now open keyfinder.exe
Click on options and click "change windows key"
Now enter this key and you're done.
*****************************
V2C47-MK7JD-3R89F-D2KXW-VPK3J
*****************************

P.S: this works on windows xp sp2 only......

ppl u can try this out...
this might sound silly but it works perfectly...

TRY INSTALLING IE7 OR MEDIA PLAYER11.

Increase the Internet Speed:

Open Notepad and paste the below code in it.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters]
"SackOpts"=dword:00000001
"TcpWindowSize"=dword:0005ae4c
"Tcp1323Opts"=dword:00000003
"DefaultTTL"=dword:00000040
"EnablePMTUBHDetect"=dword:00000000
"EnablePMTUDiscovery"=dword:00000001
"GlobalMaxTcpWindowSize"=dword:0005ae4c

Now save this file as speed.reg. Execute it and observe the change!

Renaming The Start Button:

To rename the start button, you will need a hex editor.
My preference is UltraEdit

Copy the \windows\explore.exe file to a new name (e.g. explorer_1.exe)
With the hex editor, open that file and go to offset 412b6
You will see the word start with blanks between each letter
Edit it be any 5 characters or less
Save the file
Boot to DOS
Copy the existing c:\windows\explorer.exe to explorer.org
Copy explorer_1.exe to explorer.exe
You will also need to replace the explorer.exe in the c:\windows\system32\dllcache file as well with the new one.
Note: If the partition is NTFS and you can't access the files from DOS:

Start Regedit
Go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon.
Change the value of Shell from Explorer.exe to explorer_1.exe

Breaking The XP Password:

In case of user password boot the pc in safemode by pressing the F8 key and then selecting the Safe Mode option. You can now logon as an administrator and XP wont prompt for the password. Incase of an administrator account try rebooting the pc in DOS. access C:\Windows\system32\config\sam . Rename SAM as SAM.mj
Now XP wont ask for password next time You Login. Also

Go to the cmd prompt .
Type net user *.
It will list all the users.
Again type net user "administrator" or the name of the administrator "name" *.
e.g.: net user aaaaaa *(where aaaaaa is the name).
It will ask for the password.
Type the password and there you are done.
Logging In As Administrator:

Hold the Ctrl-Alt key and press Del twice. This will bring up the normal login and you can log on as Administrator.

To unhide the Administrator account so it does show up:

Start Regedit

Go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList

Unhide the Administrator key by giving it a value of 1

super fast shut down

if u want to shutdown ur pc faster or slower:

1- start-->run-->regedit
when u start run and then write regedit

2- +HKEY_LOCAL_MACHINE
+SYSTEM
+CurrentControlSet
Control

left kick on control and u will find WaitToKillServiceTimeout.
dobbel kick on WaitToKillServiceTimeout.
in WaitToKillServiceTimeout its 20000 it means 20 secunds...if u want to shudown windos faster then get the numbers smaller, like 10000 or 5000 (10 sec or 5 sec) or if u want to shutdown longer writ 50000 (50sec).

How to Hide the drives(c:,d:,e:,a:...etc)

This is a great trick you can play on your friends. To disable the display of local or networked drives when you click My Computer.




1.Go to start->run.Type regedit.Now go to:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Now in the right pane create a new DWORD item and name it NoDrives(it is case sensitive). Now modify it's value and set it to 3FFFFFF (Hexadecimal) .Now restart your computer. So, now when you click on My Computer, no drives will be shown(all gone...). To enable display of drives in My Computer, simply delete this DWORD item that you created.Again restart your computer.You can now see all the drives again.

how to change windows log in sound

goto control panel -> sounds and audio devices....
select sound tab from that dialogue box...
now select windows logon from program events and browse to set ur desire sound(the file should be in wav format only)

make a virus tht keeps restarting your victims pc

just follow these steps

1.open note pad

2.type "shutdown -s" with out coaches

3.save the file with .bat extension
for eg:if the file name is orkut save the file as orkut.bat

4.after saving the file close the notpad

5.tats it, u have created a prog which shutdowns the pc with in 30
of executing the file(orkut.bat)


the main part comes only now
if u want to use this to to fool ur friends
u have to do this

1.copy the file
2.open "x:\Documents and Settings\USERNAME\Start Menu\Programs\Startup\" (x->is the drive on which ur windows has been installes and USERNAME is the username)
3.paste a shortcut on this directory

TATS ALL U HAVE TO DO


WAT WILL HAPPEN IF U DO THIS?

WHEN EVER UR FRIEND STARTS HIS PC

a count down will start

after 30 sec his pc will shutdown





if u want ur friends pc to restart automatically

then u have to follow the same steps mentioned above

but u have to replace "shutdown -s" "restart _s"

Make pc as ALARM

Now this is specially for the ones who are too lazy to get up even when the trust cellphone dies screeching its lungs out. Its pretty simple Creating the playlist create a playlist of your favourite songs in Winamp, WMP or any other player. Export the playlist as a M3U playlist. M3U is generally accepted by almost every player. Triggering the alarm point to start> programs >accessories > system tools >scheduled tasks Create a new task and choose program as windows media player or winamp (May work with others too but I haven't tried anything else) Choose "daily", Enter the time and choose "every day" at next screen. It would now ask for password (leave blank in case you don't have one) Right click on the newly created task and check the "run only if logged in" check box. In the properties. Append the path to the playlist you created in the "run" text box. It should now look like Code:Code:"D:\windows mediaplayer\wmplayer.exe"K:\Playlists\smoothies.m3uthe text inside quotes is my WMP's path. It may vary for you. The text after WMP's path is the one to the playlist. Click OK and you're done.

All Saved Password Location

Google Chrome:

Chrome Passwords are stored in a SQLite file the sites name and sites username is in clear text but the password is seeded in a Triple DES algorithm. The file is called Web Data and is stored in the following location

XP – C:\Documents and Settings\Username\Local Settings\Application Data\Google\Chrome\User Data\Default
Vista – C:\Users\Username\Appdata\Local\Google\Chrome\User Data\Default

Trillian:
Note- I have just realised the new version of trillian the passwords made be stored/encrypted differently
Trillian Passwords are stored in .ini files the first character of the password is encrypted with XOR with the key 243 then the password is converted into hex. The file is based on what the password is for so if it was icq it would be icq.ini (for new versions I think they are all stored in a file called accounts.ini or something similar if you open it up with notepad you will see all the data + the encrypted password). The files are stored in the following location:

XP (old version) – C:\Program Files\Trillian\users\
XP (new version) – C:\Documents and Settings\Username\Local Settings\Application Data\Trillian\user\global – I am not sure on exact but it is somewhere their
Vista (old version)- C:\Program Files\Trillian\users\
Vista (new version)- C:\Users\Username\Appdata\Roaming\Trillian\user\gl obal

MSN /Windows Live Messenger:
MSN Messenger version 7.x: The passwords are stored under HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\C reds\[Account Name]
Windows Live Messenger version 8.x/9.x: The passwords are stored in the Credentials file, with entry name begins with “WindowsLive:name=”. They a set of Win API functions (Credential API’s) to store its’ security data (Credentials). These functions store user information, such as names and passwords for the accounts (Windows Live ID credentials). Windows Live ID Credential records are controlled by the operating system for each user and for each session. They are attached to the “target name” and “type”. If you are familiar with SQL you can think of target name and type as the primary key. Table below lists most frequently used fields in Windows Live ID Credential records.

Paltalk:
Paltalk Passwords are using the same password encryption algorithm. Paltalk passwords are stored in the registry. To encrypt the new password Paltalk looks at the serial number of the disk C:\ and performs a mix with the Nickname. The resulting string is then mixed again with the password and some other constants. The final string is then encoded and written to the registry.
AIM, ICQ and Yahoo Messenger passwords that are stored by Paltalk are encoded by BASE64 algorithm.
The passwords are stored in the Registry, under HKEY_CURRENT_USER\Software\Paltalk\[Account Name]

Google Talk:
Google Talk passwords are encoded/decoded using Crypto API. Encrypted Gmail passwords are stored by Google Talk in the registry under HKEY_CURRENT_USER\Software\Google\Google
Talk\Accounts\[Account Name]

Firefox:
The passwords are stored in one of the following filenames: signons.txt, signons2.txt, and signons3.txt (depends on Firefox version)
These password files are located inside the profile folder of Firefox, in [Windows Profile]\Application Data\Mozilla\Firefox\Profiles\[Profile Name]
Also, key3.db, located in the same folder, is used for encryption/decription of the passwords.

Yahoo Messenger 6.x:
The password is stored in the Registry, under HKEY_CURRENT_USER\Software\Yahoo\Pager
(”EOptions string” value)

Yahoo Messenger 7.5 or later:
The password is stored in the Registry, under HKEY_CURRENT_USER\Software\Yahoo\Pager – “ETS” value.
The value stored in “ETS” value cannot be recovered back to the original password.

AIM:
AIM uses Blowfish and base64 algorithms to encrypt the AIM passwords.
448-bit keyword is used to encrypt the password with Blowfish. The encrypted string is then encoded using base64. The passwords are stored in the Registry, under HKEY_CURRENT_USER\Software\America Online\AIM6\Passwords
Filezilla:
Passwords are stored in a .xml file located in Filezilla on appdata their is sources for this

Internet Explorer 4.00 – 6.00:
The passwords are stored in a secret location in the Registry known as the “Protected Storage”.
The base key of the Protected Storage is located under the following key:
“HKEY_CURRENT_USER\Software\Microsoft\Protected Storage System Provider”.
You can browse the above key in the Registry Editor (RegEdit), but you won’t be able to watch the passwords, because they are encrypted.
Also, this key cannot easily moved from one computer to another, like you do with regular Registry keys.

Internet Explorer 7.00 – 8.00:
The new versions of Internet Explorer stores the passwords in 2 different locations.
AutoComplete passwords are stored in the Registry under HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\IntelliForms\Storage2.
HTTP Authentication passwords are stored in the Credentials file under Documents and Settings\Application Data\Microsoft\Credentials , together with login passwords of LAN computers and other passwords.

Opera:
The passwords are stored in wand.dat filename, located under [Windows Profile]\Application Data\Opera\Opera\profile

Outlook Express (All Versions):
The POP3/SMTP/IMAP passwords Outlook Express are also stored in the Protected Storage, like the passwords of old versions of Internet Explorer.

Outlook 98/2000:
Old versions of Outlook stored the POP3/SMTP/IMAP passwords in the Protected Storage, like the passwords of old versions of Internet Explorer.

Outlook 2002-2008:
All new versions of Outlook store the passwords in the same Registry key of the account settings.
The accounts are stored in the Registry under HKEY_CURRENT_USER\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\[Profile Name]\9375CFF0413111d3B88A00104B2A6676\[Account Index]
If you use Outlook to connect an account on Exchange server, the password is stored in the Credentials file, together with login passwords of LAN computers.

ThunderBird:
The password file is located under [Windows Profile]\Application Data\Thunderbird\Profiles\[Profile Name]
You should search a filename with .s extension.

Digsby:
The main password of Digsby is stored in [Windows Profile]\Application Data\Digsby\digsby.dat
All other passwords are stored in Digsby servers.

Building a Windows boot disk with BartPE

PEBuilder Home Page 

Other Tools 
IPChange.exe: This is an IP tool that can reset an IP address without a reboot. 
- Factory.exe: This is a Sysprep component that installs drivers after boot. Extract from the Windows Server 2003 install media (\support\tools\deploy.cab) or download the Windows Server 2003 Resource Kit and extract factory.exe from rktools.msi\Cabs.winrk.cab\deploy.cab. 
- Netcfg.exe: This is the network configuration tool, and you can get it from the Windows Preinstallation Environment (Windows PE) 1.2, Windows XP SP1 OEM Preinstallation Kit (OPK), or from ERD Commander 2002. 

If you don't have access to these files, you can download snetcfg_wxp.exe

Plug-ins for Bart's PE Builder 
Bootable Java CD 
PE-Builder Plugins 

- Commercial version of BartPE: avast! BART CD 

Share an Internet Connection With Multiple Computers

Linux offers the ability to act as both firewall and router for 
multiple computers. You can easily set this up using iptables. 

Execute the following commands on your Linux box. This example assumes 
that eth0 is the network interface connected to the cable or DSL modem. 

# iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE 
# modprobe ip_conntrack_ftp 
# echo 1 > /proc/sys/net/ipv4/ip_forward 
# iptables -P INPUT DROP 

Of course, this is greatly simplified; it's just the basics to get you 
up and running quickly. 

Keep in mind that it doesn't matter what systems you're running on your 
network, be it Windows, Macs, or other Linux systems. All you need to 
do is tell those clients to use this Linux machine as the gateway.

Manually resetting AUTOCHK.EXE for a drive

A crash can sometimes cause the dirty bit to be set when there was no data pending to be written, provoking a disk check the next time the system is rebooted. This in turn can cause a disk check to run persistently at each reboot, even when the dirty bit has not been set. If a disk check is running at each reboot regardless of whether or not the system was shut down cleanly, then the problem is no longer the dirty bit per se, but rather the way AUTOCHK.EXE has been configured to run at startup. 

There are a few ways to manually override this. The first is to run CHKDSK /F on the drive in question; if it runs successfully, the AUTOCHK.EXE command is cleared and the system will no longer be checked at each reboot. Another way to do it is to edit the Registry directly and remove the AUTOCHK command. To do this, navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager in the Registry and look for a REG_MULTI_SZ value with the name BootExecute. Set the value of BootExecute to a null value. This will prevent AUTOCHK from running on next reboot. 

On the whole, it's safest to first attempt to use CHKDSK /F on the drive that is being repeatedly checked at startup. Editing BootExecute should only be done if CHKDSK doesn't seem to be working. Running CHKDSK also has the added bonus of manually clearing the dirty bit.

Clear your important information on computer shutdown

Clear your important information on computer shutdown 

During processing, OS(operating system) transfers some data and programs from RAM to hard disk and reloads again when required. The data or programs are stored in hard disk in swapfile(temporary file). This swapping of data between memory and hard disk is called paging. Operating system spends large time in paging process, instead of executing the application software. But the problem is that while working you use different software programs on computer and page file may contain your confidential information or stored in non encrypted format. To reduce this risk, you can make your computer to clear out page file automatically each time you shutdown your system.

Perform the following steps to perform this automatically :

1. To enable this feature, you will need to be logged into your computer with administrative rights.

2. First click on start button to open control panel and then click on "Administrative Tools" option.

3. Then click on " local security policy "

4. Now "Local Security Settings" panel will appear, on lift side of this panel click on "Local Policies".

5. Here click on "Security Options" then double click on "Shutdown: Clear virtual memory pagefile" option.

6. Small window will appear . select enabled from it and you are done.

Computer Maintenance Checklist

Computer Maintenance Checklist

At system setup

Install a surge suppressor/emergency shutdown power strip
Register your software products
Schedule automated updates
Read the maintenance section of your manual
Set up your email to auto-archive older messages
Install anti virus software
Install anti-advertising software
Put your software drivers in a pocket sleeve 3 ring binder

Weekly

Run a disk scan to check for hard drive issues
Run a defragmentation program
Run a clean up to delete unneeded files
Back up your files to a remote location
Empty your recycle bin
Delete your Internet files
Clear your browsing history
Delete your cookies
Update your virus definitions
Run a full virus scan

Monthly

Check for updates
Delete/uninstall unneeded or unused programs

Quarterly

Clean your keyboard
Clean your monitor
Clean your peripherals
Rebuild your desktop
Change all your passwords

Yearly

Renew your software update and anti virus subscriptions

Hidden Programs In Windows:

Most of us are aware about this stuff but just for collection i posted it.

1. Private Character Editor OR Hidden Font Editor

Used for editing fonts,etc.
*** start>>Run
*** Now, type eudcedit

2. Dr. Watson

This an inbuilt windows repairing software .
*** start>>Run
*** Now, type drwtsn32

3. Media Player 5.1

Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!
** start>>Run
** Now, type mplay32

4. iExpress

Used to create Setups. one can create their own installers.
** start>>Run
** Now, type iexpress

5. HIDDEN MUSIC or Window music or inbuilt music

a) Microsoft Windows XP is playing a cool music during installation.

b) To hear what you’ve been missing, just follow these:

c) Make you way to C:\WINDOWS\system32\oobe\images and look for a file called "Title.wma" or possibly "Windows welcome music.wma".

d) It is around 2.56Mb in size. Just double click the file and this will open Windows Media Player, or your defaul player

6. Hidden Text Editor

Windows XP comes with another text editor besides Notepad.

** start>>Run
** Now, type edit

7. Hidden Internet Conference Application

NetMeeting delivers a complete Internet conferencing solution for all Windows users with multi-point data conferencing, text chat, whiteboard, and file transfer, as well as point-to-point audio and video.

** start>>Run
** Now, type conf

8. Driver Verify

Creates, displays, and deletes settings to verify your drivers.

** start>>Run
** Now, type verifier

9. DirectX diagnostic Tool

Troubleshoots DirectX components.

** start>>Run
** Now, type dxdiag

10. Group and Policy Manager

Manages user and computer permissions and privileges.

** start>>Run
** Now, type gpedit

11. System Configuration Utility

Configures and controls startup modes.

** start>>Run
** Now, type msconfig

12. Microsoft Synchronization Manager

Allows synchronization of web pages when offline.

** start>>Run
** Now, type mobsync

13. Microsoft Telnet Client

Connects to Telnet networks.

** start>>Run
** Now, type telnet

14. Performance Monitor

Monitor CPU , harddisk and logs.

** start>>Run
** Now, type perfmon

15. Registry editor

Create, view, and modify registry values

** start>>Run
** Now, type regedit

16. Remote access phone book

Seems to allow connections to a network phone book

** start>>Run
** Now, type rasphone

17. Signature Verification tool

Checks and verifies file security signatures

** start>>Run
** Now, type sigverif

18. System Configuration Editor

Modify SYSTEM.INI, WIN.INI, CONFIG.SYS, AUTOEXEC.BAT

** start>>Run
** Now, type sysedit

Ways To Speed WinXP

23 Ways To Speed WinXP, Not only Defrag 

Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.
1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.

2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.

3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.

The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.

Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.

Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.

5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.

6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.

7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.

8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.

9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.

10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.

11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.

13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.

14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.

15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.

16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.

17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.

18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.

19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.

20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.

21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.

22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.

23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.

Reinstall windows without losing anything

Reinstall windows without losing anything

You can use this method as often as you like when you need to repair something that had gotten corrupted and you don't want to do a clean install.

This is better than doing a windows repair install from the cd because doing that can cause changes to settings and even make it so you can't get updates anymore from microsoft update site because of the 'silent install' they did a year or so ago (unless you rereg some dll files).

1- Start WindowsXP
2- Go to the location of your source files
3- Run WINNT32 /unattend
For example, D:\I386\winnt32 /unattend ( copy & paste this command into the RUN box, then press ENTER ) Your computer will do the rest.

Start > All Programs > Accessories > Command Prompt.
Copy & paste > D:\I386\winnt32 /unattend (notice the space between 32 and / )
Press Enter.
If you have i386 on your drive, you can replace D: ( if D: is your cd drive ) with the location of it. (be sure it's the full i386 though)

D: is the driver letter where your windows XP Cd is
if D:\I386\winnt32 /unattend doesn't work then try : d:\winnt32 /unattend.
You can use this method as often as you like when you need to repair something that had gotten corrupted and you don't want to do a clean install.

This is better than doing a windows repair install from the cd because doing that can cause changes to settings and even make it so you can't get updates anymore from microsoft update site because of the 'silent install' they did a year or so ago (unless you rereg some dll files).

1- Start WindowsXP
2- Go to the location of your source files
3- Run WINNT32 /unattend
For example, D:\I386\winnt32 /unattend ( copy & paste this command into the RUN box, then press ENTER ) Your computer will do the rest.

Start > All Programs > Accessories > Command Prompt.
Copy & paste > D:\I386\winnt32 /unattend (notice the space between 32 and / )
Press Enter.
If you have i386 on your drive, you can replace D: ( if D: is your cd drive ) with the location of it. (be sure it's the full i386 though)

D: is the driver letter where your windows XP Cd is
if D:\I386\winnt32 /unattend doesn't work then try : d:\winnt32 /unattend.

Top 10 computer security tips

Top 10 computer security tips

Use "anti-virus software" and keep it up to date.
Don't open e-mails or attachments from unknown sources. Be suspicious of any unexpected e-mail attachments even if it appears to be from someone you know.
Protect your computer from Internet intruders - use "firewalls."
Regularly download security updates and "patches" for operating systems and other software.
Use hard-to-guess passwords. Mix upper case, lower case, numbers, or other characters not easy to find in a dictionary, and make sure they are at least eight characters long.
Back-up your computer data on disks or CDs regularly.
Don't share access to your computers with strangers. Learn about file sharing risks.
Disconnect from the Internet when not in use.
Check your security on a regular basis. When you change your clocks for daylight-savings time, reevaluate your computer security.
Make sure your family members and/or your employees know what to do if your computer becomes infected.

1. Use "anti-virus software" and keep it up to date. Make sure you have anti-virus software on your computer! Anti-virus software is designed to protect you and your computer against known viruses so you don't have to worry. But with new viruses emerging daily, anti-virus programs need regular updates, like annual flu shots, to recognize these new viruses. Be sure to update your anti-virus software regularly! The more often you keep it updated, say once a week, the better. Check with the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software. Stop viruses in their tracks!

2. Don't open e-mails or attachments from unknown sources. Be suspicious of any unexpected e-mail attachments even if they appear to be from someone you know. A simple rule of thumb is that if you don't know the person who is sending you an e-mail, be very careful about opening the e-mail and any file attached to it. Should you receive a suspicious e-mail, the best thing to do is to delete the entire message, including any attachment. . If you are determined to open a file from an unknown source, save it first and run your virus checker on that file, but also understand that there is still a risk. If the mail appears to be from someone you know, still treat it with caution if it has a suspicious subject line (e.g. "Iloveyou" or "Anna Kounikova") or if it ortherwise seems suspicious (e.g., it was sent in the middle of the night). Also be careful if you receive many copies of the same message from either known or unknown sources. Finally, remember that even friends and family may accidentally send you a virus or the e-mail may have been sent from their machines without their knowledge. Such was the case with the "I Love You" virus that spread to millions of people in 2001. When in doubt, delete! If you receive an e-mail from a trusted vendor or organization, be careful of phishing, a high-tech scam used to deceive consumers into providing personal data, including credit card numbers, etc. For information about "phishing" go to the FTC document titiled "How Not to Get Hooked By a Phishing Scam",http://www.ftc.gov/bcp/conline/pubs/alerts/phishingalrt.pdf. The best way to make sure you're dealing with a merchant you trust, and not a fraudster, is to initiate the contact yourself. Type the merchant's address into your Internet browser instead of clicking on a link in an e-mail.

3. Protect your computer from Internet intruders - use "firewalls." Equip your computer with a firewall! Firewalls create a protective wall between your computer and the outside world. They come in two forms, software firewalls that run on your personal computer and hardware firewalls that protect a number of computers at the same time. They work by filtering out unauthorized or potentially dangerous types of data from the Internet, while still allowing other (good) data to reach your computer. Firewalls also ensure that unauthorized persons can't gain access to your computer while you're connected to the Internet. You can find firewall hardware and software at most computer stores and in some operating systems. Don't let intruders in!

4. Regularly download security updates and "patches" for operating systems and other software. Most major software companies today release updates and patches to close newly discovered vulnerabilities in their software. Sometimes bugs are discovered in a program that may allow a criminal hacker to attack your computer. Before most of these attacks occur, the software companies or vendors create free patches for you that they post on their web sites. You need to be sure you download and install the patches! Check your software vendors' web sites regularly for new security patches or use the automated patching features that some companies offer. Ensure that you are getting patches from the correct patch update site. Many systems have been compromised this past year by installing patches obtained from bogus update sites or e-mails that appear to be from a vendor that provides links to those bogus sites. If you don't have the time to do the work yourself, download and install a utility program to do it for you. There are available software programs that can perform this task for you. Stay informed!

5. Use hard-to-guess passwords. Mix upper case, lower case, numbers, or other characters not easy to find in a dictionary, and make sure they are at least eight characters long. Passwords will only keep outsiders out if they are difficult to guess! Don't share your password, and don't use the same password in more than one place. If someone should happen to guess one of your passwords, you don't want them to be able to use it in other places. The golden rules of passwords are:

A password should have a minimum of 8 characters, be as meaningless as possible, and use uppercase letters, lowercase letters, symbols and numbers, e.g., xk2&LP97.
Change passwords regularly, at least every 90 days.
Do not give out your password to anyone! For enhanced security, use some form of two-factor authentication. Two-factor authentication is a way to gain access by combining something you know (PIN) with something you have (token or smart card).

6. Back-up your computer data on disks or CDs regularly. Experienced computer users know that there are two types of people: those who have already lost data and those who are going to experience the pain of losing data in the future. Back up small amounts of data on floppy disks and larger amounts on CDs. If you have access to a network, save copies of your data on another computer in the network. Many people make weekly backups of all their important data. And make sure you have your original software start-up disks handy and available in the event your computer system files get damaged. Be prepared!

7. Don't share access to your computers with strangers. Learn about file sharing risks. Your computer operating system may allow other computers on a network, including the Internet, to access the hard-drive of your computer in order to "share files". This ability to share files can be used to infect your computer with a virus or look at the files on your computer if you don't pay close attention. So, unless you really need this ability, make sure you turn off file-sharing. Check your operating system and your other program help files to learn how to disable file sharing. Don't share access to your computer with strangers!

8. Disconnect from the Internet when not in use. Remember that the Digital Highway is a two-way road. You send and receive information on it. Disconnecting your computer from the Internet when you're not online lessens the chance that someone will be able to access your computer. And if you haven't kept your anti-virus software up-to-date, or don't have a firewall in place, someone could infect your computer or use it to harm someone else on the Internet. and help protect others: disconnect!

9. Check your security on a regular basis. When you change your clocks for daylight-savings time, reevaluate your computer security. The programs and operating system on your computer have many valuable features that make your life easier, but can also leave you vulnerable to hackers and viruses. You should evaluate your computer security at least twice a year - do it when you change the clocks for daylight-savings! Look at the settings on applications that you have on your computer. Your browser software, for example, typically has a security setting in its preferences area. Check what settings you have and make sure you have the security level appropriate for you. Set a high bar for yourself!

10. Make sure your family members and/or your employees know what to do if your computer becomes infected. It's important that everyone who uses a computer be aware of proper security practices. People should know how to update virus protection software, how to download security patches from software vendors and how to create a proper password. Make sure they know these tips too!
//