Search your phone details here

Wednesday, March 2, 2011

Delete An “Undeletable” File


1) First of all, close all programs.
2) Press CTRL+SHIFT+ESC
3) Go to the Processes tab and right-click on explorer.exe and click end task.
4) Go to the Application tab and click on New task.
5) Click on Browse
6) Change the file type programs to all files. 
7) Browse the file, then highlight the file and try to delete the file by pressing SHIFT+DELETE.
8) Go back to Task Manager, click New Task and enter EXPLORER.EXE to restart the GUI shell.
9) Close Task Manager.

How To Hack a Computer Easily using Script..!!!

Well you wanna hack,huh? This will however make a script kiddie..
First off you will need to download ProRat SE 1.9 (Clean)
Download it [Password: pro]
Download Winrar Also

Then follow the steps below:

1) Extract the file onto your desktop and place them into a folder
2) Open ProRat.exe , you will get a message, press OK
3) once you see the program, click the button CREATE
4) You will get another window, enter your email into the E-MAIL section ( you will need a real email)
5) Go to GENERAL SETTINGS, and check PROTECTION FROM….
and press CREATE SERVER.
Now that you’ve finished the hardest part, follow these steps below and you can get hacking.
6) Send the program to a friend, and make sure he/she opens it.
7) Check your email, (junk in needed), and find the “Your victim is online”
8) Copy and paste the IP address onto ProRat where it says “IP:[127.0.0.1]“
9) Press CONNECT, DO NOT CHANGE THE PORT, if u did change it back to 5110
10) Type in the password (default is usually 123456, it is in the email).
11) Your done, now you can mess with the buttons on the program. Especially the GIVE DAMAGE button. It will damage their pc by format, and will make the computer useless.
I will not be responsible for your action, this article is for only education on how it works, and how to prevent it. Still need help?

z

Ctrl+C may be the most important work we do everyday. But it’s not a very safe thing to do. Read on to know why. What happens when you press Ctrl+C while you are online. We do copy various data by Ctrl + C for pasting elsewhere. This copied data is stored in clipboard and is accessible from the net by a combination of Javascripts and ASP. This is called clipboard hack problem.

Just try this:
1. Copy any text by Ctrl + C
2.Click the Link: Retrieve Clipboard Text To A Web Page With Javascript – Make Sure You Do Not Allow Someone To Gather This Information, It Is An Exploit In Many Eyes
3.You will see the text you copied was accessed by this web page.

Surprised! I know you are because i was also surprised to see it. Do not keep sensitive data (like passwords, credit card numbers, PIN etc.) in the clipboard while surfing the web. It is extremely easy to extract the text stored in the clipboard to steal your sensitive information. Forward this information to as many friends as you can, to save them from online frauds!
It is true, text you last copied for pasting (copy & paste) can be stolen when you visit web sites using a combination of JavaScript and ASP (or PHP, or CGI) to write your possible sensitive data to a database on another server.
How Cipboard Hack is done?
The Clipboard hack is done by the following Source Code:
How to safeguard yourself from Clipboard Hack Problem?
To avoid clipboard hack problem, do the following:
1.Go to internet options->security.
2.Press custom level.
3.In the security settings, select disable under Allow paste operations via script.
Now the contents of your clipboard are safe

If Orkut Blocked..,,,Surf Anonymously using JAP!!

No problem if orkut/youtube etc is blocked in your office or college or school….and you are fed up of using proxy websites and there low surfing speeds.And what worse if these proxy websites are also blocked…..phew!!!!
But no problems…..
Download JAP & Download Ultrasurf and easily surf any blocked website with anonymity
Step 1: Download JAP or ultrasurf
Step 2: Execute Setup file [may take few minutes depending upon internet speed]
Step 3: Change you Explorer LAN connection settings Change the default gateway IP to 127.0.0.1 and port 4001
Thats it you have gained independence to free to surf any website….

Hide User Accounts in Win XP Welcome Screen

The welcome screen displays all of the local users on the system, except the built-in administrator account that was created during setup.
Hide Your User Account
If we want to hide a specific user from the list, we need to create a special value under this registry key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Under this key you simply create a new DWORD value – the name matches the users name exactly, and the value is one of the following (Decimal format)
0 – Hides the user just from the welcome screen
1 – The user is shown

Before you start putting values in this key, I want to warn you. This tip is particularly dangerous. If you make the wrong move, you could make it nearly impossible to get back into your system. (Use safe mode if you mess up, to get back in)

To disable the users I want, I browse to the registry key on my system:
Now I want to hide all of the accounts except my own, so I add each of the accounts shown on the welcome screen, and give them a value of zero.


How do you log on now that you are a hidden user?
If you are running windows XP Professional you simply need to press CTRL-ALT-DEL twice, and the standard logon screen will be displayed. This has one pitfall – it will fail to work if a user is still currently logged in. If you are having trouble getting it to show, then reboot and press it twice before any users have logged in. (I have not tested this in Windows XP Home…Some people say that the standard logon screen won’t come up (maybe they didn’t get all of the windows updates?), if that happens boot into safe mode and edit the registry back to normal)

Google Cool Trick

Hi Found a Cool Trick to impress your Friends …
Just for fun not much guys.
1. Do a Image  Search in google.com ( Any Image)
2. Now delete the URL on the Browser ( http://images.google.com/images?client=firefox-a&rls=org.mozilla:en-US:official&channel=s&hl=en&q=fun&um=1&ie=UTF-8&sa=N&tab=wi)
3 Now replce with this code
javascript:R= 0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI= document.images ; DIL=DI.length; function A(){for(i=0; i
or
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName(”img”); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position=’absolute’; DIS.left=(Math.tan(R*x1+i*x2+x3)*x4+x5)+”px”; DIS.top=(Math.tan(R*y1+i*y2+y3)*y4+y5)+”px”}R++}setInterval(’A()’,5); void(0);
or
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i
or
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName(”img”); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position=’absolute’; DIS.left=(Math.sin(R*1+i*x2+x3)*x1+x2)+”px”; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+”px”}R++}setInterval(’A()’,50); void(0);
4. Pres Enter. Cool yeah..

Speed Up Your Net By 20%

You can get it back:
Click Start then Run and type “gpedit.msc” without quotes.This opens the group policy editor. Then go to:

Local Computer Policy >
Computer Configuration >
Administrative Templates >
Network >
QOS Packet Scheduler >
then to Limit Reservable Bandwidth

Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the ‘Explain’ tab i.e.”By default,the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default.”
So the trick is to ENABLE reservable bandwidth, then set it to ZERO.
This will allow the system to reserve nothing, rather than the default 20%. It works on Win XP as well.

Mobile Phone Viruses

A mobile phone virus or mobile malware – malicious mobile software – is a computer virus specifically adapted for the mobile phone environment and designed to spread from one vulnerable phone to another.

A virus is a program code that replicates by being copied to another program. Viruses can be transmitted as attachments to an email or in a download file. Some viruses take effect as soon as their code is executed; other viruses can lie dormant. A virus that replicates by resending itself as an email attachment or as a part of a network message is known as a worm.
Viruses can range from benign to quite harmful; they can erase data from the infected phone or send fake messages purporting to be from the phones owner. How prevalent are mobile phone viruses? The current security risk from mobile phone viruses and worms is low.
Until many more smart phones or PDAs are in use, and users of these phones are regularly exchanging executable files, the risk will remain low.
The mobile industry takes the threat of viruses very seriously and is continually monitoring its networks and working to protect users from any future risk from mobile phone viruses. There are also some simple measures that individual users can implement to protect themselves.What can I do to protect my phone?
The following tips can help prevent problems with viruses on your phone:
1. Switch to Bluetooth hidden mode. If your phone has Bluetooth capability, ensure that the Bluetooth capability is switched to hidden or invisible mode unless you specifically need it to be visible.This will help prevent other Bluetooth-enabled devices from finding your phone (unless you grant them the necessary permission) and will therefore help protect your phone from worms that spread using the Bluetooth wireless technology.
2. Exercise caution before opening attachments. When accepting applications sent via Bluetooth, or opening MMS attachments, exercise caution, just as you would when opening an email attachment on your PC, because they may include harmful software.
Ensure the application or attachment comes from a known source, and is wary of opening files that have unfamiliar text attached to them, even if they come from someone you know.
3. Only download content from a trusted source. Trusted sources may include operator portals and other well-known brands that offer adequate protection against viruses and other harmful software. Be aware though that, as with emails, malicious or fraudulent users may be able to fake the appearance of a trusted source.
4. Consider anti-virus software. Some software is available to prevent phone viruses. You may wish to consider downloading this software.
5. Contact your phone manufacturer if concerned. If you think you have a virus, call the phone manufacturer’s care line. They can assist you confirm if it is a virus, and help fix the problem.

Saturday, February 26, 2011

Hide IP Address – Real ways to hide your IP

Here in this post I will try to give you every possible information to hide the IP address. If you seriously want to hide your IP address then this post is for you!
One of the most frequently asked questions by the internet users is How To Hide IP Address ?. Many times it becomes necessary to hide the real IP address for the sake of privacy. For this, I have tried many softwares, proxy servers and many such tools that guaranteed to hide my IP address.But still none of them worked for me. I think most of you have the same experience. Are you fed up with these dummy softwares that fails to hide the real IP address? Then is there any working way to hide the IP address?

 
YES, you can definitely hide your IP
Now I’ll come to the heart of the post, which contains the answer to your curious question How to Hide the IP address ? The only solution to hide your IP address is by using a Proxy Server. But Wait! The story doesn’t end here. Even though proxy servers are the only way to hide your IP address, there are several ways of connecting your PC to the proxy server. Before setting up the connection with the proxy servers you must know some information about different types of proxy servers and their uses.
1. Transparent Proxy Server
This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used to speedup the web browsing since thay have a very good ability to cache websites. But they do not conceal the IP of it’s users. It is widely known as transparent proxy because it will expose your real IP address to the web. This type of proxy server does not hide your IP address.
2. Anonymous Proxy Server
This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.
3. Distorting Proxy Server
This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.
4. High Anonymity Proxy Server (Elite Proxy)
This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. This type of proxy server will hide your IP address.So this is the best way to mask your IP.
Which Proxy Server is the best to Hide My IP ?
I know, you can answer this question better than me.Obviously High Anonymity Proxy or Elite Proxy is the best to hide your IP. But it’s not easy to get a list of working elite proxies. If you search the Google, you will definitely get tons of proxy list. You’ll get a list of proxies in the following format
IP:Port Number
Eg: 221.90.45.67:8080 (221.90.45.67 is the IP of the proxy server and 8080 is the port number)
But most of them don’t work. Here are some of the problems/risks associated with using free proxies that are available on the internet.
  • Most of them do not work since the proxy servers frequently changes it’s IP/Port number.
  • Even if you find a working proxy server it may be too slow.
  • Your privacy is not guaranteed since all your traffic is routed through the proxy server.
  • The administrators of the proxy servers may steal your valuable information such as passwords, SSN (Social security number), Credit Card details etc.
So with all these being the risks then how to find a working, fast ,highly anonymous and secured Proxy servers?
Now I will give a list of softwares that will really hide your IP address. I have tried many such softwares and have found only few of them working perfectly. Here is a list of working IP Hiding softwares that you can try. I have listed them in the order of their popularity
1. Hide The IP
Let’s you choose the country, type and speed of the proxy. Not so popular but personally I recommend this to the users.
2. Hide My IP
3. Hide IP NG
You can get more informations about these products on their respective homepages.
How to ensure that the IP is hidden ?
Before you hide your IP you can check your real IP by visiting the following site.
WhatIsMyIPAddress.Com
Once you get your real IP, switch on your IP hiding software. Now once again visit the above site and check your IP address. If you see a new IP then this means that your software is doing the right job. Also the above site(Whatismyipaddress.com) is capable of detecting many proxies. If you see the words such as “suspected proxy server or network sharing device” or similar words then it means that the proxy you are using is not an Elite Proxy.
One Final Word before you leave! Even though Elite proxies are almost undetectable this doesn’t mean that you can escape from online crimes by hiding your IP. There are many proxy detecting services available which detect almost any proxy. So if you involve in any cyber crimes then you will definitely be behind the bars. Using proxy will not help you in this case.
One More thing, it is unsafe to use proxy during e-commerce transactions such as Online banking, Online Credit Card payment etc. So please avoid proxies during these circumstances.

How to Trace IP Address

In my earlier post I had discussed about how to capture the IP address of a remote computer. Once you obtain this IP address it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think.
There exists many websites through which you can trace any IP address back to it’s source. One of my favorite site is ip2location.com.
Just go to http://www.ip2location.com/demo.aspx and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address.
1. Country in which the IP is located
2. Region
3. City
4. Latitude/Longitude
5. Zip Code
6. Time Zone
7. Name of the ISP
8. Internet Speed
9. Weather Station
10. Area Code and
11. Domain name associated with the IP address.
A sample snapshot of the results from ip2location.com is given below

ip2location_results
You can also visually trace route any IP address back to it’s location. For this just visit http://www.yougetsignal.com/tools/visual-tracert/ and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination.

How to Find the IP Address of a Remote Computer

Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. In this post I’ll show you how to find the IP address of a remote computer in simple steps.
I have created a PHP script to make

it easier for you to find the IP address of the remote computer of your choice. Here is a step-by-step process to find out the IP address.
1. Download the IP Finder script (IP_Finder.ZIP) that I have created.
2. Open a new account in X10Hosting (or any free host that supports PHP).
3. Extract the IP_Finder.ZIP file and upload the two files ip.php and ip_log.txt into the root folder of your hosting account using the File Manager.
4. You can rename the ip.php to any name of your choice.
5. Set the permission to 777 on ip_log.txt.
Now you are all set to find the IP address of your friend or any remote computer of your choice. All you have to do is send the link of ip.php to your friend or the person with whom you’re chatting. Once the person click’s on the link, his/her IP address is recorded in the file ip_log.txt.
For your better understanding let’s take up the following example.
Suppose you open a new account in X10hosting.com with the subdomain as abc, then your IP Finder link would be

http://abc.x10hosting.com/ip.php
You have to send the above link to you friend via email or while chatting and ask him to visit that link. Once your friend clicks on the link, his IP address will be recorded along with the Date and Time in the ip_log.txt file. After recording the IP address, the script will redirect the person to google.com so as to avoid any suspicion.
To find the recorded IP address check the logs using the following link.
http://abc.x10hosting.com/ip_log.php
The sample log will be in the following format
79.92.144.237 Thursday 07th of May 2009 05:31:27 PM
59.45.144.237 Thursday 07th of May 2009 05:31:28 PM
123.92.144.237 Thursday 07th of May 2009 05:31:31 PM
NOTE: You have to replace abc with your subdomain name.

A Virus Program to Disable USB Ports

In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.
Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.
1. Download the USB_Block.rar file on to your computer.
2. It contains the following 4 files.

  • block_usb.c (source code)
  • unblock_usb.c (source code)
3. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my post - How to Compile C Programs.
3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).
4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe  (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.
5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post – How to Change the ICON of an EXE file (This step is also optional).

How to Compile C Programes

In many of my previous posts especially in the VIRUS CREATION section, I have used C as the programming language. If you’re new to C programming and find it difficult to compile the C source codes then this post is for you. Here is a step-by-step procedure to install Borland C++ compiler 5.5 and compile C programs.

 

How to install Borland C++ compiler

 
1. Download Borland C++ compiler 5.5 (for Windows platform) from the following link.
http://www.codegear.com/downloads/free/cppbuilder
2. After you download, run freecommandlinetools.exe. The default installation path would be
C:\Borland\BCC55
 

How to configure Borland C++ compiler

 
1. After you install Borland C++ compier, create two new Text Documents
2. Open the first New Text Document.txt file and add the following two lines into it
-I”c:\Borland\Bcc55\include” -L”c:\Borland\Bcc55\lib”
Save changes and close the file. Now rename the file from New Text Document.txt to bcc32.cfg.
3. Open the second New Text Document (2).txt file and add the following line into it
-L”c:\Borland\Bcc55\lib”
Save changes and close the file. Now rename the file from New Text Document (2).txt to ilink32.cfg.
4. Now copy the two files bcc32.cfg and ilink32.cfg, navigate to C:\Borland\BCC55\Bin and paste them.
 

How to compile the C source code (.C files)

 
1. You need to place the .C (example.c) file to be compiled in the following location
C:\Borland\BCC55\Bin
2. Now goto command prompt (Start->Run->type cmd->Enter)
3. Make the following path as the present working directory (use CD command)
C:\Borland\BCC55\Bin
4. To compile the file (example.c) use the following command
Command to Compile C Program
bcc32 example.c
5. Now if there exists no error in the source code you’ll get an executable file (example.exe) in the same location (C:\Borland\BCC55\Bin).
6. Now you have successfully compiled the source code into an executable file(.exe file).
NOTE: The above tutorial assumes that you’ve installed the compiler onto the C: drive (by default).

How To Make A Trojan Hourse

Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple Trojan on your own using C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run. Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using a high level programming language it is often undetected by antivirus. The source code for this Trojan is available for download at the end of this post. Let’s see how this Trojan works…
Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horse and how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.

Now lets move to the working of our Trojan
The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in the Windows\System32 folder with the .dll extension. Since the junk file has the .dll extention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.
The algorithm of the Trojan is as follows
1. Search for the root drive
2. Navigate to WindowsSystem32 on the root drive
3. Create the file named “spceshot.dll
4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full
5. Once the drive is full, stop the process.
You can download the Trojan source code HERE. Please note that I have not included the executabe for security reasons. You need to compile it to obtain the executable.

How to compile, test and remove the damage?

Compilation:
For step-by-step compilation guide, refer my post How to compile C Programs.
Testing:
To test the Trojan,  just run the SpaceEater.exe file on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space.
NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.
How to remove the Damage and free up the space?
To remove the damage and free up the space, just type the following in the “run” dialog box.
%systemroot%\system32
Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk.
 NOTE: You can also change the ICON of the virus to make it look like a legitimate program. This method is described in the post: How to Change the ICON of an EXE file ?
Please pass your comments and tell me your opinion. I am just waiting for your comments…

How To Speedup Your XP

Services You Can Disable

There are quite a few services you can disable from starting automatically.
This would be to speed up your boot time and free resources.
They are only suggestions so I suggestion you read the description of each one when you run Services
and that you turn them off one at a time.

Some possibilities are:
Alerter
Application Management
Clipbook
Fast UserSwitching
Human Interface Devices
Indexing Service
Messenger
Net Logon
NetMeeting
QOS RSVP
Remote Desktop Help Session Manager
Remote Registry
Routing & Remote Access
SSDP Discovery Service
Universal Plug and Play Device Host
Web Client


--------------------------------------------------------------------------------

Cleaning the Prefetch Directory

WindowsXP has a new feature called Prefetch. This keeps a shortcut to recently used programs.
However it can fill up with old and obsolete programs.

To clean this periodically go to:

Star / Run / Prefetch
Press Ctrl-A to highlight all the shorcuts
Delete them

--------------------------------------------------------------------------------

Not Displaying Logon, Logoff, Startup and Shutdown Status Messages

To turn these off:

Start Regedit
Go to HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionpoliciessystem
If it is not already there, create a DWORD value named DisableStatusMessages
Give it a value of 1

--------------------------------------------------------------------------------
Clearing the Page File on Shutdown

Click on the Start button
Go to the Control Panel
Administrative Tools
Local Security Policy
Local Policies
Click on Security Options
Right hand menu - right click on "Shutdown: Clear Virtual Memory Pagefile"
Select "Enable"
Reboot

For regedit users.....
If you want to clear the page file on each shutdown:

Start Regedit
Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementClearPageFileAtShutdown
Set the value to 1

--------------------------------------------------------------------------------

No GUI Boot

If you don't need to see the XP boot logo,

Run MSCONFIG
Click on the BOOT.INI tab
Check the box for /NOGUIBOOT

---------------------------------------------------------------------------------
Speeding the Startup of Some CD Burner Programs

If you use program other than the native WindowsXP CD Burner software,
you might be able to increase the speed that it loads.

Go to Control Panel / Administrative Tools / Services
Double-click on IMAPI CD-Burning COM Service
For the Startup Type, select Disabled
Click on the OK button and then close the Services window
If you dont You should notice

--------------------------------------------------------------------------------

Getting Rid of Unread Email Messages

To remove the Unread Email message by user's login names:

Start Regedit
For a single user: Go to HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionUnreadMail
For all users: Go to HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUnreadMail
Create a DWORD key called MessageExpiryDays
Give it a value of 0

------------------------------------------------------------------------------

Decreasing Boot Time

Microsoft has made available a program to analyze and decrease the time it takes to boot to WindowsXP
The program is called BootVis

Uncompress the file.
Run BOOTVIS.EXE
For a starting point, run Trace / Next Boot + Driver Delays
This will reboot your computer and provide a benchmark
After the reboot, BootVis will take a minute or two to show graphs of your system startup.
Note how much time it takes for your system to load (click on the red vertical line)
Then run Trace / Optimize System
Re-Run the Next Boot + Drive Delays
Note how much the time has decreased
Mine went from approximately 33 to 25 seconds.

--------------------------------------------------------------------------------
Increasing Graphics Performance

By default, WindowsXP turns on a lot of shadows, fades, slides etc to menu items.
Most simply slow down their display.

To turn these off selectively:

Right click on the My Computer icon
Select Properties
Click on the Advanced tab
Under Performance, click on the Settings button
To turn them all of, select Adjust for best performance
My preference is to leave them all off except for Show shadows under mouse pointer and Show window contents while dragging

---------------------------------------------------------------------------

Increasing System Performance

If you have 512 megs or more of memory, you can increase system performance
by having the core system kept in memory.

Start Regedit
Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementDisablePagingExecutive
Set the value to be 1
Reboot the computer

---------------------------------------------------------------------------

Increasing File System Caching

To increase the amount of memory Windows will locked for I/O operations:

Start Regedit
Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management
Edit the key IoPageLockLimit

-----------------------------------------------------------------------------

Resolving Inability to Add or Remove Programs

If a particular user cannot add or remove programs, there might be a simple registry edit neeed.

Go to HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesUninstall
Change the DWORD NoAddRemovePrograms to 0 disable it

4096 - 32megs of memory or less
8192 - 32+ megs of memory
16384 - 64+ megs of memory
32768 - 128+ megs of memory
65536 - 256+ megs of memory

Unblock or Bypass Orkut Restrictions

Hi friends, since I am getting a lot of comments on how to unblock or to bypass orkut restrictions, I have been on the look out for new proxies. Bennet at circumventor has a great list of proxy sites. I had subscribed to his newsletter  and got these proxies. I have not tried them out, since Orkut is no longer blocked in my college.
You can reply to comments using these proxies by using reply option.
Please send in your valuable comments.
Use http / https
http://www.yogurtgland.com
http://www.olivejoke.com/
http://www.turtlebride.com/
http://www.cashcrumpet.com/
http://www.swanbike.com/
http://www.FilterDisable.com/
http://www.plumfriend.com/
http://www.clattercup.com/
http://www.gravityguy.com/
http://www.crimepuff.com/
http://www.clubsurfer.com/
http://www.grapemouse.com/
http://www.goldpuddle.com/
http://www.fancysportscar.com/
http://www.headcross.com/
http://www.youngcheese.com/
http://www.fearbutter.com/
http://www.leafdrink.com/
http://www.turtlejar.com/

Friday, February 25, 2011

How To Change Windows 7 Logon Screen Easily

Finally Microsoft has incorporated a new feature in the latest build (7057) of Windows 7 which supports the end user to change the logon screen background without using any hacks or third-party tools.
Windows 7 logon background
In previous version of Windows, user had to use third-parry tools like Tune-Up-Utilities to change the logon screen background easily. Windows 7 now supports customization of Windows 7 logon screen officially. Replacing the old logon screen is just another task like changing wallpaper (Desktop background). Thanks to withinwindows for finding out this excellent feature.
Follow the procedure below to change the Windows 7 logon screen.
1. Download the registry file from here. Extract the file and double-click on the file to enable this feature (Alternative method: right-click, select Merge).
2. Now, head over to the following folder:
C:\Windows\System32\oobe (“C” is your Windows Seven Installation drive)
3. Here, create a new folder named Info. Again, create a new folder inside the Info folder and rename it as backgrounds.
4. Copy your favorite image file to this folder and rename it as backgroundDefault. Note that the image must be in JPG format and the size should be less than 256 KB.
5. You are done. Reboot your system and see the change.
The following files (sorted by width-to-height ratio) are supported in  C:\Windows\System32\oobe\Info\Backgrounds folder:
* backgroundDefault.jpg
* background768×1280.jpg  (0.6)
* background900×1440.jpg  (0.625)
* background960×1280.jpg  (0.75)
* background1024×1280.jpg (0.8)
* background1280×1024.jpg (1.25)
* background1024×768.jpg  (1.33-)
* background1280×960.jpg  (1.33-)
* background1600×1200.jpg (1.33-)
* background1440×900.jpg  (1.6)
* background1920×1200.jpg (1.6)
* background1280×768.jpg  (1.66-)
* background1360×768.jpg  (1.770833-)

Labels