Wednesday, August 5, 2009

Disable Error Reporting


1. Open Control Panel
2. Click on Performance and Maintenance.
3. Click on System.
4. Then click on the Advanced tab
5. Click on the error-reporting button on the bottom of the windows.
6. Select Disable error reporting.
7. Click OK
8. Click OK

Remove shortcut arrow from desktop icons

Here's how you can remove those shortcut arrows from your desktop icons in Windows XP.

1. Start regedit.
2. Navigate to HKEY_CLASSES_ROOTlnkfile
3. Delete the IsShortcut registry value.

You may need to restart Windows XP.

Improve the Broadband Speed-new technique for computers more than 256 mb ram

1) Goto http://www.testmy.net/ and click on Download Speed Test, and then on Smart Test....(and while conducting this test, don't forget to close all Instant Messagers, and there should be no other web activity, other than the test)

2) Note down the speeds.

Now, lets see, what all changes to be made.....

This tip is designed for increased BROADBAND speed in Windows XP while using standard Network Interface cards (NIC) that are connected to ADSL modems, or when using any directly-connected USB ADSL modem.

To speed up the Internet connection speed we need to configure a special buffer in the computer's memory in order to enable it to better deal with interrupts made from the NIC or the USB modem.

This tip is only recommended if you have 256MB RAM or higher.

Step #1 - Identify the IRQ used by the NIC/USB modem

1. Open the System Information tool by running MSINFO32.EXE from the Run command.
2. Expand System Summary > Hardware Resources > IRQs.
3. Look for the listing made for your NIC (in my case - a Intel® PRO/100+ Management Adapter). Note the IRQ next to the specified line (in my case - IRQ21).

In case of USB modems you will first need to find the right USB device used by your modem. Follow these steps:

1. Open the Device Manager tool by running DEVMGMT.MSC from the Run command (or by right-clicking My Computer > Hardware tab > Device Manager button).

2. Scroll down to Universal Serial Bus controllers and expand it.

3. Right-click the USB Root Hub and select Properties. Note that you might need to do so for all listed USB Root hubs (if there are more than one) in order to find the right one.

4. In the Power tab, look for your USB ADSL modem.

5. In the Resources tab look for the assigned IRQ (in this case - IRQ21).

6. This is the IRQ we're looking for.

Note: IRQs and modem names might vary...

Step #2 - Modify the system.ini file

1. Run SYSEDIT.EXE from the Run command.
2. Expand the system.ini file window.
3. Scroll down almost to the end of the file till you find a line called [386enh].
4. Press Enter to make one blank line, and in that line type IRQX=4096 where X is the designated IRQ number we found in step #1, in my case it's IRQ21.

Note: This line IS CASE SENSITIVE!!!

5. Click on the File menu, then choose Save.
6. Close SYSEDIT and reboot your computer.

Done. Speed improvement will be noticed after the computer reboots.

Chat with your friends through MS-DOS

1. All you need is your friends IP address and your Command Prompt.

2. Open your notepad and write tis code as it is.................. I would prefer you to copy this !

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3. Now save this as "Messenger.Bat".

4. Drag this file (.bat file)over to Command Prompt and press enter!

5. You would then see some thing like this:

MESSENGER
User:

6. After "User" type the IP address of the computer you want to contact.

7. Before you press "Enter" it should look like this:

MESSENGER
User: IP_Address
Message: Hi, How are you ?

8. Now all you need to do is press "Enter", and start chatting

Make Web Pages Available for Offline Viewing

With Internet Explorer 6 in Windows XP, you can make a Web page available offline and view it when your computer is not connected to the Internet—for example on your laptop during a flight. This feature is also handy for viewing Web pages at home without tying up a phone line if you have a dial–up Internet connection.
To make the current Web page available offline
On the Favorites menu, click Add to Favorites.

Select the Make available offline check box.


To specify a schedule for updating that page, and how much content to download, click Customize.

Follow the instructions on your screen.
To make an existing favorite item available offline
On the Favorites menu, click Organize Favorites.

Click the page you want to make available offline.

Select the Make available offline check box.

To specify a schedule for updating that page, and how much content to download, click Properties.
To view Web pages without being connected to the Internet
After you mark your favorite pages for viewing offline, you can view them offline by following these steps
Before you disconnect from the Internet, on the Tools menu, click Synchronize.

When you're ready to work offline, on the File menu, click Work Offline. Internet Explorer will always start in Offline mode until you click Work Offline again to clear the check mark.

In your Favorites list, click the item you want to view.
You can also make Web pages available offline without adding them to your Favorites list, by saving the pages on your computer.
Follow these steps
On the File menu, click Save As.

Double–click the folder you want to save the page in.

In the File name box, type a name for the page.

In the Save as type box, select a file type.

Do one of the following:

To save all of the files needed to display this page, including graphics, frames, and style sheets, click Web Page, complete. This option saves each file in its original format.

To save all of the information needed to display this page in a single MIME–encoded file, click Web Archive. This option saves a snapshot of the current Web page. This option is available only if you have installed Outlook Express 5 or later. When you choose Web Page, complete, only the current page is saved. With Web Page, complete and Web Archive, you can view all of the Web page offline, without adding the page to your Favorites list and marking it for offline viewing.

To save just the current HTML page, click Web Page, HTML only. This option saves the information on the Web page, but it does not save the graphics, sounds, or other files.

To save just the text from the current Web page, click Text Only. This option saves the information on the Web page in straight text format.

see where ur password stores

If you lock yourself out of Windows stuff, all passwords are stored in files called *.pwl in C:windows. Download showpass.zip from this link to view all passwords stored. Or rename the files to .bak to delete passwords.

In Unix, passwords are normally stored at etc/passwd. This can be viewed using the cat command (prints a file to screen): cat etc/passwd. Make sure you're passwords are shadowed (not actually in etc/passwd). Also make sure they aren't in a file called shadow, especically not in a file called etc/shadow.
Unix passwords are encrypted far better than Windows one's (to be fair, Windows 95 isn't designed for users), but can still be cracked through a program called jon. view here

How to Speed Up Folder Access

In this page, I'll show you how to speed up folder access on your computer. Why you need to speed up folder access? In my opinion, you need to do that if you have a lot of folders and sub directories on your computer. Because when you access a directory, your windows system will wastes a lot of time updating the stamp showing the last access time for that directory. So you need to disable access update to stop your computer from doing this. Follow these steps to speed up folder access by disable access update on your computer.

1. Click on RUN, type Regedit in the open box and then click "OK".

2. Find HKEY_LOCAL_MACHINE > System > CurrentControlSet > Control > FileSystem

3. Create new DWORD Value called NtfsDisableLastAccessUpdate by right-click in a blank area of the window on the right and then select DWORD Value.

4. Double click on "NtfsDisableLastAccessUpdate", change the value data to 1 and then click OK. That's al

How to make your Desktop Icons Transparent

http://img510.imageshack.us/img510/3084/untitledar4.jpg

Go to ontrol Panel > System, > Advanced > Performance area > Settings button Visual Effects tab "Use drop shadows for icon labels on the Desktop"

How to Rename the Recycle Bin

To change the name of the Recycle Bin desktop icon, open Regedit and go to:

HKEY_CLASSES_ROOT/CLSID/{645FF040-5081-101B-9F08-00AA002F954E}

and change the name "Recycle Bin" to whatever you want (don't type any quotes).

GENERAL Virus and Trojan removal Instructions.

BEFORE you start, UNDERSTAND something very clearly;

If the steps below do NOT fix your problem

You will have to post a “HijackThis Log” at one of the security forums that provide spyware cleaning services.

Wilders Security does NOT provide Spyware Cleaning Services!



For the most part what I have suggested fixes the greater majority of problems out there...however, it does NOT fix everything.






Please PRINT out the following Instructions and read them FULLY before proceeding.


After this follow each step in order, and ONE step at a time.



Do NOT go onto a further step until you have completed the one you are on.


Also make sure you have the very latest version of each product mentioned and they are fully up-to-date.






If you use Forum specific software, such as NOD32, you may want to place a new thread in one of these forums regarding your problem, as there are Moderators and experienced people involved in each. They will be able to help you further with these programs. You still may be directed back to this thread to follow the instructions below.





Step 1. Update your Anti-virus program. If you do not have an Anti-virus software program, please download a free version from here and update it. Do NOT run this YET.

NOTE: do NOT install an additional Anti-virus or Anti-Trojan software program if you currently have one, as this may cause further problems.



Step 2. Download Winsock XP Fix available here. Do NOT run this YET.



Step 3. If you don't have a firewall package, download and install a free one such as Zone Alarm – a firewall with visual outgoing alerts to see what is trying to access the internet, available here. A list of other free firewalls can be found here.



Step 4. Download Stinger (free) – Offline Virus removal tool, available here. Do NOT run this YET.



Step 5. Download one of these Anti-Trojan packages: TrojanHunter (eval) or Ewido (free/ 'plus' version eval). Install and update it. Do NOT run this YET.



Step 6. Install and update Spybot Search and Destroy (free) – Spyware removal and protection, with registry monitor, available here or here. Install and update it. Do NOT run this YET.



Step 7. Download “Ad-Aware” (free) – Spyware removal. What Spybot Search and Destroy doesn’t pick up, this will, and vice versa. Ad-Aware is available here or here. Install and update it. Do NOT run this YET.



Step 8. Download “CWShredder” (free) – Specific Spyware removal tool, available here. Install and update it. Do NOT run this YET.



Step 9. Download “VX2 Cleaner” (free) – Specific Spyware removal tool, available here. Do NOT run this YET.

NOTE: Make sure you choose the correct version for your Windows operating system.



Step 10. MAKE SURE YOUR ANTI-VIRUS IS FULLY UP TO DATE with the latest virus signatures, BEFOREcontinuing.



Step 11. Turn OFFSystem Restore”, this applies only to Windows ME and Windows XP:



WARNING: Turning OFF System Restore means you will NOT be able to ROLL BACK your computer to the current state it is in.


Windows XP Instructions (reference with screen images)

1. Right click on the “My Computer” icon on the Windows desktop.

2. Click “Properties”.

3. Click on the “System Restore”.

4. Place a tick in “Turn off System Restore on all Drives”.

5. Click OK.

6. Close and RESTART your system.


OR


Windows ME Instructions (reference with screen images)

1. Right click on the “My Computer” icon on the Windows desktop.

2. Click “Properties”.

3. Click on “Performance”.

4. Click “File system”.

5. Click “Troubleshooting”.

6. Check “Disable system restore”.

7. Click on OK.

8. Close and RESTART your system.



Step 12. Restart your system again in “SAFE MODE” by pressing/tapping F8 while booting up your computer.

Further instructions of placing your system into “SAFE MODE” can be found here as pressing/tapping the F8 key does not always work with some computers.



Step 13. Delete your TEMP files by doing the following:

Open up Internet Explorer.

Click on Tools.

Internet Options.

General TAB.

Temporary Internet Files.

Delete Files.

Delete All Offline Content.



While in “SAFE MODE” do ALL of the following and REMAIN in SAFE MODE until Step 21:



Step 14. Run a scan with your “Anti-virus Program” or the program you downloaded above.

NOTE: If your Anti-virus has a Quarantine feature – USE IT when asked/offered to do so.



Step 15. Run a scan with “Stinger” the program you downloaded above.



Step 16. Run a scan with the Anti-Trojan program you use or downloaded above.



Step 17. Run a scan with “Spybot Search and Destroy” the program you downloaded above.



Step 18. Run a scan with “AdAware” the program you downloaded above.



Step 19. Run a scan with “CWShredder” the program you downloaded above.



Step 20. Run a scan with “VX2 Cleaner” the program you downloaded above.



Step 21. Reboot your system into NORMAL MODE.



Step 22. Run the ONLINE virus scan found here, or run one from the list found here.



Step 23. Make sure your Windows is FULLY up-to-date (NO EXCUSES) by doing the following:

While on the Internet, Click on Internet Explorer (the Blue “e”)

Click on Tools (on the bar at the top of your screen in Internet Explorer)

Click on Windows Update.

This will take you to the Microsoft Windows Update page where you need to follow the on screen prompts, starting with “EXPRESS INSTALL”. Install ALL “Critical Updates” and “Service Packs”.



REPEAT STEPS 12 to 22, THREE TIMES, as some Viruses, Trojans and Spyware can be very elusive.



If all the above steps do NOT fix your problem please download and run "HijackThis" found here and post your log at a security forum that provides spyware cleaning services.

Keep in mind the following quote:

Quote:
Originally Posted by LowWaterMark
There are many other good spyware cleaning sites out there, but we don't maintain a comprehensive site list ourselves.

Three of the sites we've often recommended in many replies here are: SpywareInfo, CastleCopsand TomCoyote, though certainly there are others we could include.

If after or during the above cleaning process you find that your internet connection has been broken, please run the Winsock XP Fix application that you downloaded in Step 1 at the beginning of this post.


OR


Proceed with the following to delete the corrupted registry keys, and then reinstall the TCP/IP protocol.


Step 1. Delete the corrupted registry keys

1. Click Start, and then click Run.

2. In the Open box, type regedit, and then click OK.

3. In Registry Editor, locate the following keys, right-click each key, and then click Delete:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Winsock

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Winsock2

4. When you are prompted to confirm the deletion, click Yes.

NOTE: Restart the computer after you delete the Winsock keys. Doing so causes the Windows XP operating system to create new shell entries for those two keys. If you do not restart the computer after you delete the Winsock keys, the next step does not work correctly.



Step 2. Install TCP/IP

1. Right-click the network connection, and then click Properties.

2. Click Install.

3. Click Protocol, and then click Add.

4. Click Have Disk.

5. Type C:\Windows\inf, and then click OK.

6. On the list of available protocols, click Internet Protocol (TCP/IP), and then click OK.

7. Restart the computer.

list of trojan horses


Manually Removing PC Viruses!

Have you ever been in the possition that you know you have an virus but you dont have any antivirus?? Its almost impossible to remove it manual without knowing about a few tips & tricks.

After reading this turtorial im sure you will know how to manual remove most of the virus lurking around. But that dosnt mean you shouldnt have any anti virus on you computer! Anyway, lets get starting with the turtorial.. I suppose you already know what safe mode is. If you dont try pressing the F8 key some times when you start your computer. You havto do this when your computer is about to start the first windows components. In win2k or xp i think you can press space and then F8 when it ask you if you want to go back to previous working setting.

Enough talk about how to start you computer in safe mode, but if you want to manual remove viruses you almost everytime haveto do this in safe mode becouse in safemode most viruses dosnt start. Only some few windows component is allowed to run in safemode. So here is what to do. Step:

1: Start your computer in safemode.

2: If you know where the virus are hiding delete the executable file.

3: Open the registry and go to the keys below and add an : in front of the value of the string that you think its the virus. Like this, if string is "virus" and its value is "c:\virus.exe" change its value to ":c:\virus.exe". The : is like comenting out the value. But if you are sure its the virus you can just delete the string. Here are the keys you maybe want to look at: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Runonce

NOTE-Firefox user might not able to view full path.For full path edit your text size smaller by pressing ctrl-.

4: The virus can start itself from some other places to. win.ini is the most common files that viruses can use. Soo you should find the files named win.ini and system.ini and look through them and see if you find anything.

5: Look through the startup folder that is normaly located in your profile directory \Start Menu\Programs\Startup.

6: Try searching for the virus executable to see if its hiding some other place.

7: Finally look through the list of services that windows is running. This list is often located under control panel - administrative tools - services. After this 7 steps just reboot your computer in normal mode and try to figure out if the virus is still there.. If not SUCCESS if yes, try to go back to safe mode and hunt some more. Off course this 7 steps will not work on every virus out there, but many of them.

Note:-
-Be carefull with the registery, dont mess it up, if u do ur computer is Gone , depends on wat u mess up, i suggest u made a system restore point first, so incase someting happens you can go back on it. -

Can Virus be good ?

For most users, computer virus is synonym of the worst nightmares that can happen on their system. Yet some famous researchers keep insisting that it is possible to use the replication mechanism of the viral programs for some useful and beneficial purposes. This mechanism does not specify explicitly that it is malicious. Intuitively, computer viruses are just a kind of technology. As with any other kind of technology, they are ethically neutral – they are neither bad nor good – it is the purposes that people use them for can be bad or good. So far they have been used mostly for bad purposes. It is therefore natural to ask the question whether it is possible to use this kind of technology for good purposes. Indeed, Fred Cohen (Cohn 1994, p.15), one of the most active proponents of the idea has attempted to implement the idea.

The File Compressor Virus is one of the oldest ideas for good viruses of Cohn. The idea consists of creating a self-replicating program, which will compress the files it inflects, before attaching itself to them. Such a program is easy to implement and it has already been done. There is a family of MS-DOS viruses which appends itself to the executable files, then compress the infected file, and then deposits a small decompressor that would decompress the file in memory at runtime.

Some people have had the idea to develop an “anti virus” virus – a virus that would be able to locate other malicious ones and remove them, Such a self-replicating anti-virus program would have the benefits to spread very fast and update itself automatically. Several viruses have been constructed along these ideas. Some of them locate a few known viruses and removed them from the infected files, others attach themselves to the clean files and issue an error message if another piece of code becomes attached after the unwanted virus.

It appears that all these good viruses are far from successful as they have too many undesirable or even destructive properties so that the existence of good virus is highly questionable.

wat is virus? can u tell ,if no read here

can u tell ,if no read here:

A computer virus is an infiltration which corrupts existing files on your computer. Viruses are named as such after biological viruses, as they use similar techniques to spread from one computer to another.
Computer viruses attack mainly executable files and documents. To replicate, a virus attaches its "body" to the end of a target file. In short, this is how a computer virus works: after execution of the infected file, the virus activates itself (before the original application) and performs its predefined task. Only after that, the original application runs. A virus cannot infect a computer unless a user (either accidentally or deliberately) runs or opens the malicious program by him/herself.

Computer viruses can range in activity and severity. Some of them are extremely dangerous because of their ability to purposely delete files from a hard drive. On the other hand, some viruses cause no real damage – they only serve to annoy the user and demonstrate the technical skills of their authors.

It is important to note that viruses are (when compared to trojans or spyware) gradually becoming more of a rarity, since they are not commercially enticing for authors of malicious software. Also, the term "virus” is often incorrectly used to cover all types of infiltrations. At present, this is gradually being overcome and the new, more accurate term "malware” (malicious software) is used.
If your computer is infected with a virus, it is necessary to restore infected files to their original state – i.e. to clean them by using an antivirus program.

Examples of viruses are: OneHalf, Tenga, and Yankee Doodle

Why current anti-virus techniques are doomed

There are a variety of complementary anti-virus techniques in common usage [5, 6]. Activity monitors alert users to system activity that is commonly associated with viruses, but only rarely associated with the behavior of normal, legitimate programs. Integrity management systems warn the user of suspicious changes that have been made to files. These two methods are quite generic, and can be used to detect the presence of hitherto unknown viruses in the system. However, they are not often able to pinpoint the nature or even the location of the infecting agent, and they often flag or prevent legitimate activity, and so can disrupt normal work or lead the user to ignore their warnings altogether.

Virus scanners search files, boot records, memory, and other locations where executable code can be stored for characteristic byte patterns that occur in one or more known viruses. They tend to be substantially less prone to false positives than activity monitors and integrity management systems. Scanners are essential for establishing the identity and location of a virus. Armed with this very specific knowledge, repairers, which restore infected programs to their original uninfected state, can be brought into play. The drawback of scanning and repair mechanisms is that they can only be applie"

Remove the Recycle Bin from the Desktop

If you don't use the Recycle Bin to store deleted files , you can get rid of its desktop icon all together.

Run Regedit and go to:

HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/explorer/Desktop/NameSpace


Click on the "Recycle Bin" string in the right hand pane. Hit Del, click OK.


http://spider.tm/aug2007/images/tip01.jpg

ACCESS( USE) YOUR FRIEND COMPUTER FROM UR COMPUETR in seconds of time


Restricting a Website-very easy

Suppose you wanna block www.orkut.com then or some other site like the below one
example:the below page is taken for example only no one can report abuse about it
http://info.template-help.com/img/Screens/sample_website_template.jpg

1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named HOSTS and open it with notepad
3] Go to the last line - "127.0.0.1 localhost" - under that add 127.0.0.2 www.orkut.com, and then that site will no longer be accessible !!!

********************************************
C:\WINDOWS\system32\drivers\etc\hosts

127.0.0.1 localhost
127.0.0.2 www.orkut.com
********************************************
http://www.filebuzz.com/software_screenshot/full/66582-Internet_Access_Controller.jpg
If you wanna block more sites you can add more lines to this by addling 1 to the Loop back IP

********************************************
C:\WINDOWS\system32\drivers\etc\hosts

127.0.0.1 localhost
127.0.0.2 www.orkut.com
127.0.0.3 www.yahoomail.com
127.0.0.4 www.gmail.com
********************************************
Group Policy
Open Group Policy (Run -> gpedit.msc)

Go to User configuration -> Windows settings -> Internet explorer maintenance->
security -> double click Security zones

Enable security zones and privacy by selecting import the current security zones and privacy settings -> Click on modify settings -> Click on privacy -> Click site -> In the address of the web site tab add the site name you wanna block -> Click block -> click OK -> OK -> OK


This will block the site.

This configured can be done on the local system or the same can be configured in GPO and can be applied to the entire domain !