Short cut keys for Microsoft word
CTRL and A Selects all in the current document.
CTRL and B Bold text.
CTRL and C Copies the item or text to the Clipboard and can be pasted using CTRL and V.
CTRL and D Displays the Font dialogue box.
CTRL and E Centre Alignment.
CTRL and F Displays the Find dialog box, to search the current document.
CTRL and G Displays the Go to dialog box, to go to a specific location in the current document.
CTRL and H Displays the Replace dialogue box.
CTRL and I Italic text.
CTRL and J Full Justification.
CTRL and K Create Hyperlink
CTRL and L Left Alignment
CTRL and M Tab
CTRL and N Creates a new document.
CTRL and O Displays the Open File dialogue box.
CTRL and P Displays the Print dialog box.
CTRL and R Right Alignment.
CTRL and S Displays the Save dialog box.
CTRL and U Underline text
CTRL and V Pastes the copied item or text from the Clipboard into the current position in the document.
CTRL and X Cuts the item or text selected to the Clipboard.
CTRL and Y Redo the last undone action.
CTRL and Z Undoes the last action.
CTRL and ENTER Insert Page Break.
CTRL and F2 Show Print preview.
CTRL and F4 Closes the active document window.
CTRL and F6 Opens the next document window.
back to top | © Copyright 2001-2006 helpwithpcs.com
Keyboard Shortcut
Result in Microsoft Word
F1 key Get help or use the Office assistant.
SHIFT and F1 Key Context sensitive help.
F2 Key Move text or image.
SHIFT and F2 Key Copy Text.
F3 Key Insert an autotext entry.
SHIFT and F3 Key Change the case of the selected text.
F4 Key Perform last action again.
SHIFT and F4 Key Perform a Find or Go to action again.
F5 Key Displays the Go to dialogue box, from here you can also Find and Replace.
SHIFT and F5 Key Move to a previous revision.
F6 Key Go to the next frame or pane.
SHIFT and F6 Key Go to the previous frame or pane.
F7 Key Launch the Spell checker.
SHIFT and F7 Key Launch the Thesaurus.
F8 Key Extend the current selection.
SHIFT and F8 Key Shrink the current selection.
F9 Key Update the selected fields.
SHIFT and F9 Key Switch between a field code and it's result.
F10 Key Activate the menu bar.
SHIFT and F10 Key Display a Shortcut Menu. Same as right clicking.
F11 Key Go to the next field.
SHIFT and F11 Key Go to the previous field.
F12 Key Save file As, equivalent to tools menu.
SHIFT and F12 Key Save document, equivalent to tools menu.
Identify Faulty Device Drivers
If you are having problems with lockups, blue screens, or can only get to safe mode,
often the problem is due to a faulty device driver.
One way to help identify them is through the use of the Verfier program
Start / Run / Verifier
Keep the default of Create Standard Settings
Select the type of drivers you want to confirm
A list of drivers to be verified on the next boot will be shown.
Reboot
If your computer stops with a blue screen, you should get an error message with the problem driver
To turn off the Verifier, run verifier /reset
Create Your Own Logon Message
Click Start, click Run, type regedit, and then click OK.
In the Registry Editor, drill down to the following key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Right-click LegalNoticeCaption, click Modify, type My Windows XP Machine, and then click OK.
Right-click LegalNoticeText, click Modify, and then type your message.
Close the editor and your new message will appear at every log on.
This tip applies to computers that are part of a domain. For stand-alone or peer-to-peer networks, the custom screen appears just before the Welcome screen.
You may need to have an administrator account on your computer to make changes to the registry. Incorrectly editing the registry may severely damage your system. At the very least, you should back up any valued data on the computer before making changes to the registry.
Guide on Formatting a Windows Based PC
well i suppose most of you will be knowing but still just thought ill write one for newbies who dont know or ppl who need help
ok here is the way! njoy happy formatting
Formatting a computer with Windows 98:
Req. Items : Windows 98 Startup Disk or Win 98 Setup CD(recommended)
Windows 98 will work on both FAT and FAT32 partitions.. but never on a NTFS so here are the steps..
:arrow: STEP 1
Change Bios Boot Sequence. you can do this by Hitting the DEL or sumtimes F1 key when u switch on the computer.Once in the BIOS Change the boot sequence by entering the Advanced Bios Features or similar phrase. Make the First Boot device to CD-ROM. Now save the settings and Exit the BIOS
:arrow: STEP 2
now that your Boot Sequence is changed you will land up on a screen asking two options
1)Boot From Hard Disk
2)Boot From CD-ROM
Select the Second option and boot from the CD ROM
now you will be taken in to the option below..
1)Setup Windows 98 from CD
2)Start Computer with CD-ROM support
3)Start Computer without CD-ROM support
Select the Second option upon which you will be taken to the screen with
A:\>
now type
A:\>fdisk (then press enter)
:arrow: STEP 3
The first screen as soon as you type fdisk and press enter comes with an option in the bottom of the screen select Y (this is to make sure u are installing a FAT32 type partition)
http://img208.imageshack.us/my.php?image=page013pm.gif
incase u want it in FAT16 key in N and press enter
Now the FDISK options will be like this
http://img217.imageshack.us/my.php?image=page0020yl.gif
remember ull have the 5th option only if u have two Hard Drives installed.
Now Select the 3rd option if u already have existing partitions..
http://img28.echo.cx/my.php?image=page064ml.gif
Here delete the Partition in this order First the Logical Drives then the
Extended Drives and finally the Primary you cant do it anyother way.
Now that you have no partitions we can proceesd on how to create them
Now select the first option Create a Dos Partition
http://img31.echo.cx/my.php?image=page110hu.gif
here select the first option again
now you will be prompted with the option of taking the whole drive for primary Partition
http://img251.echo.cx/my.php?image=page124sw.gif
Please Select N If you want more than one partition
now you will get the option of selecting the disk space fot that partition
Please Select N If you want more than one partition
now you will get the option of selecting the disk space fot that partition
http://img151.imageshack.us/my.php?image=page130uk.gif
after selecting press enter
now it will automatically create the partition and after it finishes press the ESC key to return to the main BIOS menu. There you will find a Warning message saying the Partition is not set active and unless you set it active it cannot be used
so now select the 2 option and it will prompt u to select the partition to be set active press 1 and press enter key
now that the partition is active you can either create more partitions or leave it there.In case u need more select the 1st option and then select the 2nd option of Creating an Extended partition.
now when it asks you for the amount of space to be taken jus give the whole remaining space it will automatically say that no logical drives are defined and it will create logical now say you have 2 GB left make sure each partition is above 512 MB as 512 MB will be made into FAT16 partition so say you are selecting
1024 MB i.e 1 GB it will create the partition and come back to the same screen now u have 1 GB left jus select it and press enter now you will have one more partition.
Now your computer has 3 partitions
C:\ (primary)
D:\ (Extended Logical)
E:\ (Logical)
now get out of the Fdisk by pressing ESC key until u reach A:\> now press ctrl+alt+del and restart the system again follow the steps i.e boot from cdrom and start comp with cd rom support. now befor you land up A:\> ull get a message above saying F:\> is the Media drive so Type F: and press enter
Now you will be taken in to the F:\> drive i.e the CD-Rom drive
default the win98 directory is this way
F:\>cd win98
F:\Win98>_
now type Format C: and press enter you will get a warning that all data will be lost press Y and press enter now the formatting will start
After a few mins the formatting of the C: is over now it will ask you for the Disk label say u can keep any thing.. like hello or wat any darn thing
similarly type Format D: and E: seperatly and format them and assign them Driver Label if you want
incase you dont want drive label just press enter without typing anything
thats it your done.You have successfully learnt to create,edit and format partitons based on FDISK(fat16,fat32) now ull be in the path
F:\Win98>_
Type Setup and press enter and you will be guided thro the setup process of Installing the Win 98
-------------------------------------------------------------------------------------
thats it for now will edit when i find time to write the procedure of NTFS partitions using WIN2K and XP
P.S incase you notice mistakes(there cld be sum) pls tell it
Make Your Own System Security Suite!!!!
A System Security Suite is one which bundles all the required tools for complete System Protection, like AntiVirus, Firewall, AntiSpyware, File cleaners, Registry Cleaners etc. For example Norton Internet Security, System Mechanic etc.
I saw many posts asking which Security Suite is better, which is lighter, Which is the best free AV and some thing like that. One of the common replies was that Security suites were highly resource hungry and some of the best AVs are Bloatwares! And all of them are Commercial softwares and they cost a bomb!
How about making or rather assembling your own Security Suite, which consists all the required tools? These tools in the assembled Suite are very efficient and powerful. Moreover your Security Suite is completely FREE!
Read on.............
:arrow: AntiVirus:-
Well, Viruses need no introduction, do they? To battle them you need an AntiVirus!
AVG 7 Free AntiVirus, AntiVir and Avast are some of the few full fledged free AnitViruses. Full fledged AV means that, it should at least have Real Time scanner, On Demand scanner, Mail scanner, Automatic Updates.
AVG, Avast and AntiVir satisfy all the above conditions and have good Virus detection, Features, and Quick updates and is also very light on resources. You don't have to worry about any Viruses, Worms or Trojans sneaking into your PC!
:arrow:AntiSpyware:-
Spywares, Adwares and Hijackers (collectively called as Malwares, short for Malicious Softwares) can do major damages to the system. Notorious malwares like CoolWebSearch, VX2 etc are very hard to remove and are not detected/completely removed by the AntiVirues. This calls in for a special dedicated tool, AntiSpyware!
AdAware and SpyBot SnD are very good AntiSpywares which have frequently updated large database of Malwares.
SpyBot SnD has one cool tool built into it called as TeaTimer, this TeaTimer monitors the System continuously and protects the System files and Registry from Malwares.
SpyBot SnD also adds a BHO to the Internet Explorer, by using this SpyBot blocks the bad downloads(like installation of ActiveX components, BHOs by Spywares without the knowledge of the user) automatically. These two softwares are a must have in every computer.
Windows XP users can also install MS AntiSpyware, which uses Giant's database, and has a pretty good detection rate.
:arrow: Anti Trojan:-
Not all Trojan Horses are detected by AntiVirues and AntiSpyware. So you should have softwares which specialize in the removal of Trojans. So called BackDoor Trojans open your PC from the inside to attackers, which enables the person/website who sent the Trojan to monitor your PC. Even worse variant is so called RATware, short for Remote Administration Tool, which enables a hacker to control your PC!
a2 Free is the best free Anti Trojan (and Anti Malware) software available. Currently a2 Free has a database of some 94,000 Trojans, Dialers, Worms and Spywares. And this will grow since it has frequent updates to database.
Antoher good AntiTrojan available for Free is Ewido Security Suite, this comes as 14 day trial after which special features are disabled and free, basic version can be used. It's better to have both the scanners.
:arrow: Immunize!:-
Above softwares detect and remove Virues and Malwares present in the PC, but they can not prevent them from sneaking into your system (except Real Time scanner of the AntiVirus to an extent).
SpywareBlaster prevents the installation of Malwares into system. SpywareBlaster need not be running in the background, but it's a run once tool.
It's working principle can be described as follows, many Spywares, Hijackers which come through ActiveX components, make certain Registry entries called as CLSIDs. SpywareBlaster has a database of these bad CLSIDs. When we run SpywareBlaster once, it sets the Kill Bit of the bad CLSID as 1, this means, the corresponding ActiveX component are never called by Internet Explorer, thus preventing it's execution. So this prevents the execution of these Spywares even though they are in the PC. This is something like Immunization!
:arrow: Firewall
There will be many virtual Ports in a computer. These ports are either open or closed. When the PC is connected to Internet, many Worms, Hackers scan for the open ports of PC connected, if they find an open port, they try to sneak in the System without the user's knowledge. Popular attack of this type is SQL Slammer worm attack, known as HellKern. You would never know what's happening in the background.
To prevent these port scanning and other malicious attacks, Firewalls should be installed.
Firewalls act as barrier between PC and Net, and filter the data that is being transmitted and received. Also, Firewalls block all the open ports so that port scanning will be unsuccessful.
A popular Free Firewall is ZoneAlarm, this is one critically acclaimed Firewall. ZoneAlarm is very light on System resources and it blocks each and every baddies without failure!
Other good free Firewalls worth a try is Kerio Personal, Sygate Personal and OutPost Personal.
:arrow: Clean that junk!
After some time of PC usage, junk/temp files start to accumulate. This eats up space, and also functions as favorite hide out for viruses and malwares. So it's necessary to clean up the junk regularly. CleanUp! and CCleaner are very good Free cleaners available. They clean the every bit of junk in the system. Just run them before shutting down your PC or after disconnected from Internet to remove the junk.
Anther good junk cleaner is GLock Temp Cleaner, this along with cleaning junk files, has one extra feature that is it lists all the archives present in the System, and later we can delete the unwanted archives.
:arrow: Registry Cleaner:-
If any Softwares are installed in a PC, it makes a Registry entry. Registry entries are also created by softwares to remember the user's preferences like "Recently opened files" etc. These entries should be theoretically removed when the specific software or file is removed. But, many a times this does not happen. This leads to the accumulation of large number of junk in the registry. This degrades the System performance. This is where Registry Cleaners come into picture.
RegCleaner is one of the best free Registry cleaners available. Apart from cleaning, it has plenty of other features like Startup information, File type Editing etc.
:arrow: Miscellaneous Tools:-
This is a list of free tools which perform some specialized tasks. SpywareGuard is small real time bad download protection tool, which works in a similar manner of SpywareBlaster. This actively monitors Internet Explorer and blocks any malicious ActiveX Components, BHOs and Tracking Cookies.
MRUBlaster is a small tool from the house Javacoolsoftware which makes SpywareBlaster and SpywareGuard. This nifty utility scans the computer for MRU lists (Most Recently Used lists are the history kept by the applications or Windows itself like recently opened documents, search items, files opened etc). MRUBlaster can scan and remove up to 30000 different MRU entries.
McAfee Stinger is an On demand virus remover which can detect and remove some 55 (and growing) common and dangerous Viruses , Trojans and their variants.
If you get all the above softwares, and use them regularly, then you are safe, well almost! All these softwares are completely free offering as much protection as their Commercial counterparts provide.
Finally our own Security Suite consists of:-
:arrow: AntiVirus ---------- AVG or Avast or AntiVir
:arrow: Firewall------------- ZoneAlarm or Kerio or OutPost or Sygate
:arrow: AntiSpyware------- SpyBot SnD, AdAware and MS AntiSpyware
:arrow: AntiTrojan---------- a2 Free and Ewido
:arrow: Immunization------ SpywareBlaster
:arrow: Junk Cleaners------ CleanUp! and CCleaner
:arrow: Registry Cleaner--- RegCleaner
:arrow: Misc. Tools---------- SpywareGuard, MRUBlaster, McAfee Stinger
:arrow: Alternate Browsers:-
Since Internet Explorer has many vulnerabilities, it's easy for malicious Websites to drop baddies into the System. Main target areas are Plugins for IE, BHOs, ActiveX components, Toolbars for IE. Spywares/Trojans masquerade as above these Add-ons for IE, and can do their job effectively!
So, it's safer to switch to alternate browsers like FireFox and Opera. These browsers, by design do not support the above listed AddOns (Two reasons for that! One is they are MS Technologies and the second one is of course, Security!).
These browsers also offer many user friendly features like Tabbed Browsing, Inbuilt Downloader with Resume support, faster page loading etc.[/code]
MAKE WINXP STARTUP/SHUTDOWN FASTER !
How to reduce WinXP StartUp/Shutdown times ?
over the last 6 m since i started using a pc, i used to get really **** off sitting & twidling my thumbs, till my WinXP/SP1, started/shutdown.
So i looked around to see how i could reduce these times. here are my observations. if you can add to them or correct me, pls do so.
1. restrict the no. of start-ups. i have only igfxTray.exe. hkcmd.exe, ctfmon.exe as my start-ups; and my pc works just fine.
2. disable services which one may not require. if one does not connect to the internet or if your pc is a stand-alone one, there may b sevral services which u can disable or switch over to manual mode. auto-starting of services and closing down of services takes time & resources. these can be saved.
3. enable boot defragmentation, so that files used during start-up are clubbed together.
4. reducing visual effects (winxp eye candy) can also help save it.
5. disable : "clear page file on shutdown" option. cleaning the page-file on every shut down means overwriting the data by zeros, and it takes time.
6. fine tune your registry regularly.
there are also some BIOS hacks like enabling Quick Post, disabling Boot-Up Floppy Seek, diabling Boot Daly. but i dont know how to do it and its presently out of my league. ive alraedy had to reformat by pc 6 times in the last 6 mnths since i bot it, trying these and all other types of stunts !
Generally people also recommend emptying the Prefetch directory every
week. But i believe Window uses this directory to speed up launching
applications. It analyzes the files you use during startup and the applications you launch, and it creates an index to where those files and applications are located on your hard disk. By using this index, XP can launch files and applications faster. So, by emptying the directory, are we not, most likely slowing down launching applications; even during start-up ?
Utilities like WinPatrol or Tune-Up can help you in all of the above.
U can also try using ZOOM by dacshundsoftware.the same company that makes Hare
Hiding user account in win xp
Hopefully someone will find this useful. Ive done this on my machine as well.
To a hide an account to display on the welcome screen of xp here is a nifty way:
1. Open regedit
2. Browse to
Hkey_local_machine> software>microsoft>windows nt>winlogon>special Accounts>Userlist
Here you will see a list of all accounts on XP which are hidden and dont display on welcome screen. Yes XP does create useless accounts as you see there.
3. Go on the right pane, right click, create a new dword value with its name as the exact username you want to hide and its value as "0" without the quotes.
Now if you have only one account on XP and you want to hide it, DO NOT DO THE ABOVE! READ BELOW AND FOLLOW A NEW PROCEDURE
If you do this accidently, it will make an infinite restart loop in your computer. If you accidently do it, then just login in safe mode and remove the value you just set in the regedit.
If you only have one account and want to do this, you will have to disable welcome screen & fast user switching in USERS in control panel.
What I did was: create a dummy limited account for people who want to access my machine sometimes. And I hided my own account using the proceedure mentioned.
To access this hidden account from the welcome screen press CTRL+ALT+DEL twice and you can enter your username and password.
Note: Might I add a disclaimer that I take no responsibility if someone manages to mess up their computer using the procedure above. Backup your registry thats all I want to suggest.
disabling the f8 key for bootup
Find the file msdos.sys which can be find at c\msdos.sys. Since this is a hidden system file, you will have to make it writeable by changing it’s attributes by going to the DOS Prompt and typing the following
go to the root directory
C\Windows>cd\
Then make msdos.sys writeable and unhide it by typing
C\>attrib msdos.sys –h –w
3)Open msdos.sys in WordPad
4) You will see something that looks like this
;FORMAT
[Paths]
WinDir=C\WINDOWS
WinBootDir=C\WINDOWS
HostWinBootDrv=C
[Options]
BootMenu=0 (default)
BootMulti=1
BootGUI=1
DoubleBuffer=1
AutoScan=1
WinVer=4.10.1998
;
;The following lines are required for compatibility with other programs.
;Do not remove them (MSDOS.SYS needs to be >1024 bytes).
;xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxa
To disable the function keys during bootup, directly below [Options] you insert the following piece of code
"BootKeys=0."
(Without the quotes of course.)
Now instead of inserting the BootKeys command you can also insert the following command
"BootDelay=0."
Not many people know about the BootDelay=0 command so that along with the BootKeys command does make your machine safer. Then save msdos.sys.
5) Since msdos.sys is an important system file you should change it’s attributes back to read only and hidden by typing
c>attrib msdos.sys +h +r
Windows XP Services that can be Safely set to MANUAL!!!
When we install windows XP, there r many services running in background. Among them many services r useless and can be set manual to make our windows faster.
In this tutorial I'm telling the services which can be safely set to MANUAL.
How to do it?
1.) Right-click on My Computer icon on desktop and select Manage, it'll open a window, in which goto: Services & Application -> Services. To disable or Set it to MANUAL, double-click on service and select What u want in Startup list box.
2.) U can also open the same by going to Administrative Tools and open Computer Management.
NOTE:- Always set the service to MANUAL, never disable it. So that whenever windows needs to start a service it can easily start and use it. If u set ne service DISABLE, then windows can not enable it and will give ERROR...
Some service may be system dependent, like setting some services MANUAL can work on many systems but can make some systems not working if they required that service to run. Thats why always check the services one by one, and in case windows gives ERROR, u can re-enable that service by starting the system in SAFE MODE.
So here is the list of services that can be safely set to MANUAL (Many of them may be disabled automatically on some systems):
Alerter
Computer Browser
Distributed Link Tracking Client (If u hv NTFS partition, then don't disable it)
Fast User Switching Capability (removes Switch Users option)
Indexing service
Internet Connection Firewall/Internet Connection Sharing
Messenger
Remote Registry (Always disable it for Security purposes)
Secondary Logon
Server
System Restore (If u don't use System Restore)
TCP/IP NetBIOS Helper Service
Uninterruptible Power Supply
Upload Manager
Wireless Zero Configuration
U may find more services according to ur requirements!
Automated System Recovery overview in Windows XP
Automated System Recovery overview in Windows XP
View products that this article applies to.
SUMMARY
The purpose of this article is to describe Automated System Recovery in Microsoft Windows XP and to list supported information between the original release of Microsoft Windows XP, Windows XP Service Pack 1 (SP-1), and Windows XP Service Pack 1a (SP-1a).
MORE INFORMATION
Microsoft recommends that you regularly create Automated System Recovery (ASR) sets as part of an overall plan for system recovery so that you are prepared if the system fails. ASR should be a last resort for system recovery. Use ASR only after you have exhausted other options. For example, you should first try Safe Mode Boot and Last Known Good.
ASR is a two-part system; it includes ASR backup and ASR restore. The ASR Wizard, located in Backup, does the backup portion. The wizard backs up the system state, system services, and all the disks that are associated with the operating system components. ASR also creates a file that contains information about the backup, the disk configurations (including basic and dynamic volumes), and how to perform a restore.
You can access the restore portion by pressing F2 when prompted in the text-mode portion of setup. ASR reads the disk configurations from the file that it creates. It restores all the disk signatures, volumes, and partitions on (at a minimum) the disks that you need to start the computer. ASR will try to restore all the disk configurations, but under some circumstances it might not be able to. ASR then installs a simple installation of Windows and automatically starts a restoration using the backup created by the ASR Wizard.
For more information about how to set up and use Automated System Recovery in Microsoft Windows XP, visit the following Microsoft Web site:
http://www.microsoft.com/technet/pro...ntain/asr.mspx
Remove Google Ads in Mozilla Firefox
Although, Common Ads can be removed from Firefox Using AdBlock Extension, there's nothing availble to actually remove those Google Text Framed Ads we see, you can always Right click and Block, but that's a temporary solution, here's How you can Get rid of those ads for once and for all!
Tools You Need:
Mozilla Firefox Browser
ChromeEdit Extension For Firefox
Download and Install ChromEdit, which let's you Edit User Files, Restart Firefox, and Open ChromEdit
Go to userContent.css and add the following Code:
Code:
/* Block Ads v.2004-06-12 by Neil Jenkins
Portions of this ruleset are derived from the ad blocking css by Joe Francis at:
http://www.floppymoose.com/
Some code also contributed by Mike Hokenson:
http://www.gozer.org/mozilla/ad_blocking
*/
iframe[width="120"][height="600"], a img[width="120"][height="600"],
iframe[width="125"][height="600"], a img[width="125"][height="600"],
iframe[width="150"][height="100"], a img[width="150"][height="100"],
iframe[width="150"][height="600"], a img[width="150"][height="600"],
iframe[width="160"][height="600"], a img[width="160"][height="600"],
iframe[width="300"][height="250"], a img[width="300"][height="250"],
iframe[width="336"][height="280"], a img[width="336"][height="280"],
iframe[width="468"][height="60"], a img[width="468"][height="60"],
iframe[width="470"][height="62"], a img[width="470"][height="62"],
iframe[width="728"][height="90"], a img[width="728"][height="90"],
iframe[width="730"][height="92"], a img[width="730"][height="92"],
iframe[width="600"][height="120"], object[width="125"][height="300"],
iframe[width="180"][height="150"],
iframe[src*="/ad-"],
iframe[src*="/ad."],
iframe[src*="/ad/"],
iframe[src*="/ad_"],
iframe[src*="/adframe"],
iframe[src*="/ads"],
iframe[src*="/adv"],
iframe[src*="/adx"],
iframe[src*=".ad"],
iframe[src*="_Banner"],
iframe[src*="BET365"],
iframe[src*="/click"],
iframe[src*="?click"],
iframe[src*="googlesyndication"],
iframe[src*="promos"],
iframe[name="bsadframe"],
iframe[id="adFrame"],
iframe[id="splashFrame"],
img[src*="/ad-"],
img[src*="/ad."],
img[src*="/ad/"],
img[src*="/ad_"],
img[src*="/ads"],
img[src*="/adv"],
img[src*="/adx"],
img[src*=".ad"],
img[src*="_ad_"],
img[src*="/click"],
img[src*="?click"],
img[src*="Editorial_Promos"],
img[src*="/toms_skyscraper_"],
img[src$="images/logos/amazon_international.gif"],
img[src*="freshmeat.net/button.gif"],
img[src*="pic.geocities.com/images/"],
img[src*="i.imdb.com/Vpics/"],
img[src*="i.imdb.com/Photos/CMSIcons"],
img[src*="i.imdb.com/Icons/apix/"],
img[src*="i.imdb.com/Icons/kpix/"],
img[src*="i.imdb.com/apix/"],
img[src*="sportsbybrooks.com/farkbutton.gif"],
img[alt*="advert"],
img[alt*="Click Here To Visit Our Sponsor"],
img[alt*="Sponsored Links"],
img[name="fixedSpImg"],
a:link[href*="/ad-"] img,
a:link[href*="/ad."] img,
a:link[href*="/ad/"] img,
a:link[href*="/ad_"] img,
a:link[href*="/ads"] img,
a:link[href*="/adv"] img,
a:link[href*="/adx"] img,
a:link[href*=".ad"] img,
a:link[href*="/banner"] img,
a:link[href*="/click.cgi"] img,
a:link[href*="/clickcgi?"] img,
a:link[href*="/clickover"] img,
a:link[href*="/clickthr"] img,
a:link[href*="/click-"] img,
a:link[href*="=click"] img,
a:link[href*="?click"] img,
a:link[href*="/A="] img,
table table table[width="346"][height="280"],
table[class="metatable"],
table[id="RefAd"],
table[cellspacing="0"][width="160"][height="329"][bgcolor="#000000"],
table[cellpadding="5"][width="150"][style="border: 1px dashed rgb(221, 170, 170); background-color: rgb(236, 248, 255);"],
table[border="0"][height="600"][width="120"],
table[height="90"][cellspacing="0"][cellpadding="0"][width="728"][border="0"],
table[border="0"][cellpadding="3"][cellspacing="0"][height="40"][width="100%"],
table[border="0"][cellpadding="0"][cellspacing="4"][align="right"][width="20%"],
table[border="2"] td[valign="top"][bgcolor="#ffffff"] table[width="138"],
table[border="0"][cellpadding="1"][cellspacing="0"][width="626"][bgcolor="#6699cc"],
table[bordercolor="red"][height="225"][cellspacing="0"][cellpadding="0"][width="190"][bgcolor="white"][border="0"],
table[width="336"][border="0"][cellspacing="0"][cellpadding="0"][align="right"][style="margin-left: 10px; margin-bottom: 10px;"],
table[width="770"][border="0"] tr[valign="top"]
td[width="160"],
td[class="cnnNavAd"],
td[class="RHBarBody"],
td[class="sl-table"],
td[style="border-bottom: 1px solid rgb(204, 204, 204); padding: 7px 3px; background-color: rgb(255, 254, 249);"],
td span[class="aoltextad"],
form[name="frmLargeForm"],
form[action*="click_lx.cgi"],
form[action^="http://rd.yahoo.com/"],
form[action=""][name$="SoapCity"],
form[action=""][name^="728x90"],
form[action=""][name^="300x250"],
form[method="get"][action*="martindale"][name="MDH"],
embed[type="application/x-shockwave-flash"][src*="_Banner"],
embed[type="application/x-shockwave-flash"][src*="/ad"],
embed[type="application/x-shockwave-flash"][href*="/ad"],
embed[type="application/x-shockwave-flash"][src*=".ad"],
embed[type="application/x-shockwave-flash"][href*=".ad"],
embed[type="application/x-shockwave-flash"][src*="?click"],
embed[type="application/x-shockwave-flash"][href*="?click"],
embed[type="application/x-shockwave-flash"][src*="/click"],
embed[type="application/x-shockwave-flash"][href*="/click"],
embed[type="application/x-shockwave-flash"][href*="promos"],
embed[type="application/x-shockwave-flash"][href*="=click"],
embed[type="application/x-shockwave-flash"][href*="redirect"],
embed[type="application/x-shockwave-flash"][href*="/A="],
embed[type="application/x-shockwave-flash"][name*="advert"],
embed[type="application/x-shockwave-flash"][name*="banner"],
embed[type="application/x-shockwave-flash"][width="728"][height="90"],
embed[type="application/x-shockwave-flash"][width="468"][height="60"],
embed[type="application/x-shockwave-flash"][width="467"][height="63"],
div[id="adstrip"],
div[id*="advert"],
div[id="dropin"],
div[id="dwindow"],
div[id="dcv_EchangeLay"],
div[id="mntl"],
div[id*="popup"],
div[id="quack"],
div[id="splashLayer"],
div[id*="sponsor"],
div[id="yschsec"],
div[class="ovt"],
div#contextualLinks,
div[style="border: 1px solid rgb(221, 221, 221); padding: 5px; background-color: rgb(255, 255, 255);"],
object[id="widgeth"],
*[class="ad"],
*[class*="eSext"],
*[name*="klipad"],
*[style*="/ads/"],
*[id*="popover_"],
*[src*="120x80"],
*[src*="140x"],
*[src*="?ad"],
*[src*="-ad-"],
*[src*="/adimage"],
*[src*="/adimg"],
*[src*="advert"],
*[src*="=click"],
*[src*="banners."],
*[src*="banner_ads"],
*[src*="/images/dinkus/more-arrow-lo.gif"],
*[src*="/javaImages/ec/"],
*[src*="/offer"],
*[src*="/puffboxes/"],
*[src*="/sponsors/"],
*[src*="_sponsor_"],
*[src*="/us.yimg.com/a/ya"],
*[src*=".adbutler.de"],
*[src*=".nedstatbasic.net"],
*[src*=".tradedoubler.com"],
*[src*=".travelocity./Sponsor_gifs/"],
*[src*="a.consumer.net"],
*[src*="bannermania.nom.pl"],
*[src*="cash4banner.com"],
*[src*="crazypopups.com"],
*[src*="hit-now.com"],
*[src*="hitbox.com"],
*[src*="img.thebugs.ws"],
*[src*="kinghost.com/ban/"],
*[src*="klipmart"],
*[src*="popupad.net/ats/"],
*[src*="public"][src*="ad"],
*[src*="/publicidad/"],
*[src*="qkimg.net"],
*[src*="qksrv.net"],
*[src*="rcm-images.amazon.com"],
*[src*="rcm.amazon.com"],
*[src*="salon.com/Creatives"],
*[src*="sexcounter."],
*[src*="sideads/"],
*[src*="statse.webtrendslive.com"],
*[href*="logging.to"],
*[href*="/referral/"],
*[href*="tryaol"],
*[href*="websponsors"],
*[src*="banman.asp"],
*[href*="banman.asp"],
*[src*="bannerman"],
*[href*="bannerman"],
*[src*="?banner"],
*[href*="?banner"],
*[src*="/banner/"],
*[href*="/banner/"],
*[src*="/jump/"],
*[href*="/jump/"],
*[src*="adfarm"],
*[href*="adfarm"],
*[src*="advertising.com"],
*[href*="advertising.com"],
*[src*="ar.atwola.com"],
*[href*="ar.atwola.com"],
*[src*="atdmt.com"],
*[href*="atdmt.com"],
*[src*="bluestreak.com"],
*[href*="bluestreak.com"],
*[src*="clickxchange.com"],
*[href*="clickxchange.com"],
*[src*="doubleclick"],
*[href*="doubleclick"],
*[src*="falkag.net"],
*[href*="falkag.net"],
*[src*="fastclick.com"],
*[href*="fastclick.com"],
*[src*="mediaplex"],
*[href*="mediaplex"],
*[src*="netdirect.nl"],
*[href*="netdirect.nl"],
*[src*="spinbox."],
*[href*="spinbox."],
*[src*="tradedoubler.com"],
*[href*="tradedoubler.com"],
*[src*="transfer.go"],
*[href*="transfer.go"],
*[src*=".tribalfusion"],
*[href*=".tribalfusion"],
*[src*="valueclick"],
*[href*="valueclick"],
*[src*="http://216.92.211.171/"],
*[href*="http://216.92.211.171/"],
*[src*="http://216.92.21.16/"],
*[href*="http://216.92.21.16/"] {
display: none !important;
}
img[src*=".advance"],
img[src*="/click_"],
img[src*="/cnn/images/clickability/"],
img[src*="/logo2.m"],
img[src$="/banners/com000.jpg"],
a:link[href*=".add"] img,
a:link[href*="admin"] img,
a:link[href*="adobe"] img,
a:link[href*=".adp"] img,
a:link[href*="/advance"] img,
a:link[href*="click.mp3"] img,
a:link[href*="/imgres?imgurl="] img,
a:link[href*=":head"] img,
a:link[href*="http://nettracker."] img,
embed[type="application/x-shockwave-flash"][src*="gallery"] {
display: inline !important;
}
#rh table[class=”metatable”]{display: none !important;}
#rh div[class=”c”] {display: none !important;}
it's Really worth it considering, the page layout gets much cleaner after the hack.
PS: It removes Framed Yahoo! Ads as well, but not the Sidebar ons on Geocities Website.
save addl disk space thus ...............
heres how u can save additional disk space,
using "remove hotfix backups v 2.1.6" Cool
when u install Windows Update, backup folders r created for the files that were replaced during the update. These are created so that you can easily uninstall a particular Hotfix, if it causes problems with your system. If your system is running stable and you don't need to uninstall the hotfixes, then you can safely remove the backup files to free up disk space. u can alway manually delete the $uninstallxxxxx folders and the addremove/ registry entries; or u can use 'remove hotfix backups utility v 2.1.6' which does a smart job at it !
This small freeware utility will locate the Hotfixes that have created backup files on your system, and will remove those backups. It will also removes the associated Registry entries for these items in Add/Remove Programs.
Arrow click http://www.dougknox.com/xp/utils/xp_hotfix_backup.htm
the sitehttp://<a href="http://www.dougknox....index.html</a>also offers an excellant
range of tips, trick, utilitys, and fixes for winxp. check it out
Protecting your Windows system
Too many people these days are coming into the forums requesting help on massively infected systems. So, I thought I'd compile something for the newbies like me that may be useful to help prevent infections and other useless trash on your computer.
Step One: The Core
This is the single most important piece of your computer. Chances are that if there's something wrong with this, the weakest link in the chain, everything will come crashing straight on top of you. I am talking about the Single Point of Failure (SPoF) on your system - the Operating System.
This critical piece (actually, make that ultra-hyper-mega-critical) of software is what manages the entire show and you dont want any unnecessary software messing with it. Not all Operating Systems are created equal. Technically speaking, server OSes are some of the safest OSes around. But usually you cannot go around installing these OSes unless you're a total geek with around 10 computers around your home and you need software to centrally manage them. When it comes to a single desktop OS, currently Microsoft Windows XP rules the roost.
Your choice of Windows OS preference in the order of safest first is:
Windows XP Professional
Windows XP Home
Windows 2000 Professional
Windows NT 4.0
Windows 98 SE
Windows ME
Windows 98
Windows 95
I would recommend you either stick to the Windows XP OSes, Windows 2000 Professional or Windows 98 SE. Needless to say, Microsoft Windows XP is currently the most safe computing environment for a user. And that neatly brings us to our next topic.
Step Two: Patching it Up
No OS is secure if you are running it straight out of the box. A long list of vulnerabilities are detected by security experts and Microsoft routinely releases update software to address these vulnerabilities and close them. Updates may either be :
Service Packs
Critical Updates
Hotfixes
Cumulative Updates / Rollups
Hardware Updates
Optional Updates
Service Packs (SP) are comprehensive updates to the OS, fixing every single vulnerability in the OS since the release of the OS itself or the last SP release. SP's also include major OS changes, newer updates to system files and they contain every single update to the OS that has ever been released. Also, SPs are cumulative, so if you were to install SP1, it would contain every single update since the OS release and if you install SP2, it would contain every single update that has been released since SP1, and it would also include the updates of SP1 also. So, if you are patching an OS with an SP, you dont have to go around installing SP1, then SP2, SP3, etc. Installing the latest SP would mean you're getting all the updates. The latest SPs for the various OS are:
Windows XP - SP2:
The best way to get SP2 for Windows XP is either via Automatic Updates (I will get to this later), Windows Update, ordering the free Service Pack 2 from Microsoft.
Microsoft only releases an SP for the OSes that can be used as full-fledged network clients, so there are no SPs for Windows ME, 98 SE, 98 and 95, only the standalone updates. However, an Unofficial SP exists for Microsoft Windows 98 SE.
Critical Updates are those very important updates that Microsoft releases in response to a threat against the Windows OS. There is no option and these should not be avoided. Installing these updates is a must if you dont want your system exploited or open to infection. Microsoft usually releases a slew of these updates every month.
Hotfixes are patches to existing Windows components that address a vulnerability in the code and are released as and when the vulnerabilities are discovered. Needless to say, you need these as well if you want to protect your OS.
Cumulative Updates and security Rollups are a bunch of related updates and hotfixes that enhance the security of the Windows component and also patch any existing unpatched vulnerability. Of course, you need these too.
Hardware Updates can sometimes be found on Windows Update when your hardware manufacturer, like your motherboard manufacturer, releases patches, fixes and updates that usually add functionality and improve performance of your hardware components. While these updates are optional, it is recommended that you install them because they often boost your hardware's performance and provide newer functionality that you can take advantage of.
Optional Updates are just that. They're optional and its your choice whether you wish to update/upgrade them. Usually, these fall in the category of extra tools for the Windows OS such as a newer Media Player, a Journal Viewer, Movie Editing Software, software to make applications programmed in the .NET environment to work, etc. You can safely ignore these updates if you are not planning to use them.
Microsoft releases a number of updates on the second Tuesday of every month, which many of us geeks fondly call "Patch Tuesday". Make sure you bookmark this day in your calendar each month and check for updates. Also, if a threat is severe enough, it may make the people at Microsoft release an update before the planned Patch Tuesday.
Also, most programs have updates for themselves. While some are improvements on features, its not uncommon for products to include security enhancements as well. Keep track of the products you're using and check for updates for your software products regularly. This is especially important when it comes to Microsoft Office products as their updates can have a significant impact on sysem security. You can always visit Office Update to check for the latest updates to your Office products.
Step Two Point Five: Honesty Pays
It is worthwhile to mention that when it comes to Windows OSes, it is better to pay for a legal, genuine copy of the OS to enable you to get the latest updates without a hassle. When it comes to Windows XP, it will not allow you to install a genuine copy of the SP or some critical fixes unless you have a legit version of the OS. Yes, cracked SPs exist and you can always install them, but you will be doing the world a lot of good, not to mention yourself, if you just get yourself a legit copy of at least Windows XP Home. You just spent over 20,000 on that new computer, the least you can do is spend another 4000 and live quite happily afterwards.
Step Three: Securing the OS
Here we will take a look at securing the OS itself without using any third party software. The most important tool here is the "Automatic Updates" option. You can usually find this option in the Control Panel, if you are running Windows ME, Windows 2000 (with the appropriate SP) or Windows XP.
When you open the Automatic Updates option, you will be faced with a couple of options including (exact wordings may differ)
Automatically Download and Install Updates
Download Updates but let me choose when to install them
Notify me of updates but do not automatically download or install them
Turn off Automatic Updates
It is recommended that you select Option 3 - "Notify me of updates but do not automatically download or install them" instead of Option 4, turning off the Auto Update feature. This way, when an important update is released, the Automatic Updates feture will inform you that updates are available for your OS and you can go to Windows Update and download and install them at your convenience. Also this way, you can tell when an update is being offered before the Patch Tuesday cycle and stay protected.
Windows XP comes with a built in Firewall to protect your computer, but its not a worthy solution when compared to a standalone firewall, so I will skip that in favor of a third party firewall solution.
Also, make sure you secure your user account with a password so that no one can fiddle with your system in your absence and then damage the OS.
Windows XP, when patched with Service Pack 2, comes with a Security Center option that can be accessed via the Control Panel. When you restart your computer after installing SP2, you will be prompted to choose an Automatic Updates method (1 out of the 4 choices) The Security Center also monitors the status of the built-in Windows Firewall, which is enabled by default and also the status of your antivirus program, whether it is on, turned off or if it requires an update. However, it only works with well known antivirus solutions. If any of these components are not working right or are turned off or disabled, the Security Center will pop up a warning in your system tray notification area, alerting you.
Step Four: Protection with Third Party Software
Antivirus Solutions
The biggest threat to a Windows system is a virus. How or why a virus attacks and how it spreads, I am not going to go into here. Usually a virus spreads through one of these mediums:
a) an infected floppy or CD
b) an infected file over the network
c) an infected file from the Internet
d) an infected file you received via e-mail or instant messenger.
An antivirus program is a third party solution that runs all the time in your system and monitors and protects your system from viruses and maybe, other threats, depending on the product and its version. It includes a scanning engine and a list of signatures of known viruses that it compares to files staying in your computer's memory and hard disk as well as the ones coming in and going out. If it detects a virus, it immediately stops the activity of the file and informs you about the virus' presence and prompts you to either clean the file or delete it. It should be noted that the major antivirus vendors, McAfee, Symantec, Trend Micro, Kaspersky, etc. release newer versions of their antivirus programs at least once each year in addition to releasing "updates" for the antivirus program every week.
You should have the latest version of the antivirus programs running at all times, and should also make sure its updated every week with the latest virus "signatures." Failure to do any of these two steps may mean an immediate infection. All antivirus programs come with an Automatic Update feature built in that will automatically contact its server and look for available updates and then download and install them automatically. It is recommended that you leave this feature turned on.
Here are a list of instructions that you should actively follow to prevent an infection:
a) Make sure you use the latest version of your antivirus and keep it updated weekly and make sure its auto-update feature is turned on.
b) Never use a CD or a floppy without scanning it for viruses.
c) Do not open files from the Internet without scanning them with the antivirus. Most download managers can integrate with the antivirus program to automatically scan the downloaded files. Turn this feature on.
d) Do not accept and download files from an Instant Messenger conversation if you do not know what it is. Also, all instant messengers can integrate with the antivirus. Turn this feature on.
e) Never open an attachment from an email, no matter what extension it is, without first scanning it with an antivirus. Again, all email clients can integrate with your antivirus solution to automatically scan for viruses in your emails.
Too many people these days are coming into the forums requesting help on massively infected systems. So, I thought I'd compile something for the newbies that may be useful to help prevent infections and other useless trash on your computer.
Step One: The Core
This is the single most important piece of your computer. Chances are that if there's something wrong with this, the weakest link in the chain, everything will come crashing straight on top of you. I am talking about the Single Point of Failure (SPoF) on your system - the Operating System.
This critical piece (actually, make that ultra-hyper-mega-critical) of software is what manages the entire show and you dont want any unnecessary software messing with it. Not all Operating Systems are created equal. Technically speaking, server OSes are some of the safest OSes around. But usually you cannot go around installing these OSes unless you're a total geek with around 10 computers around your home and you need software to centrally manage them. When it comes to a single desktop OS, currently Microsoft Windows XP rules the roost.
Your choice of Windows OS preference in the order of safest first is:
Windows XP Professional
Windows XP Home
Windows 2000 Professional
Windows NT 4.0
Windows 98 SE
Windows ME
Windows 98
Windows 95
I would recommend you either stick to the Windows XP OSes, Windows 2000 Professional or Windows 98 SE. Needless to say, Microsoft Windows XP is currently the most safe computing environment for a user. And that neatly brings us to our next topic.
Step Two: Patching it Up
No OS is secure if you are running it straight out of the box. A long list of vulnerabilities are detected by security experts and Microsoft routinely releases update software to address these vulnerabilities and close them. Updates may either be :
Service Packs
Critical Updates
Hotfixes
Cumulative Updates / Rollups
Hardware Updates
Optional Updates
Service Packs (SP) are comprehensive updates to the OS, fixing every single vulnerability in the OS since the release of the OS itself or the last SP release. SP's also include major OS changes, newer updates to system files and they contain every single update to the OS that has ever been released. Also, SPs are cumulative, so if you were to install SP1, it would contain every single update since the OS release and if you install SP2, it would contain every single update that has been released since SP1, and it would also include the updates of SP1 also. So, if you are patching an OS with an SP, you dont have to go around installing SP1, then SP2, SP3, etc. Installing the latest SP would mean you're getting all the updates. The latest SPs for the various OS are:
Windows XP - SP2:
The best way to get SP2 for Windows XP is either via Automatic Updates (I will get to this later), Windows Update, ordering the free Service Pack 2 from Microsoft, (click this link to place your order) or from the Digit September 2004 CD/DVD. However, if you want to download it yourself, a larger network install can be downloaded here.
Windows 2000 - SP4 Download
Windows NT 4.0 - SP6a Download
Microsoft only releases an SP for the OSes that can be used as full-fledged network clients, so there are no SPs for Windows ME, 98 SE, 98 and 95, only the standalone updates. However, an Unofficial SP exists for Microsoft Windows 98 SE.
Windows 98 SE Unofficial SP - Version 2.0 RC1 Download
Critical Updates are those very important updates that Microsoft releases in response to a threat against the Windows OS. There is no option and these should not be avoided. Installing these updates is a must if you dont want your system exploited or open to infection. Microsoft usually releases a slew of these updates every month.
Hotfixes are patches to existing Windows components that address a vulnerability in the code and are released as and when the vulnerabilities are discovered. Needless to say, you need these as well if you want to protect your OS.
Cumulative Updates and security Rollups are a bunch of related updates and hotfixes that enhance the security of the Windows component and also patch any existing unpatched vulnerability. Of course, you need these too.
Hardware Updates can sometimes be found on Windows Update when your hardware manufacturer, like your motherboard manufacturer, releases patches, fixes and updates that usually add functionality and improve performance of your hardware components. While these updates are optional, it is recommended that you install them because they often boost your hardware's performance and provide newer functionality that you can take advantage of.
Optional Updates are just that. They're optional and its your choice whether you wish to update/upgrade them. Usually, these fall in the category of extra tools for the Windows OS such as a newer Media Player, a Journal Viewer, Movie Editing Software, software to make applications programmed in the .NET environment to work, etc. You can safely ignore these updates if you are not planning to use them.
Microsoft releases a number of updates on the second Tuesday of every month, which many of us geeks fondly call "Patch Tuesday". Make sure you bookmark this day in your calendar each month and check for updates. Also, if a threat is severe enough, it may make the people at Microsoft release an update before the planned Patch Tuesday.
Also, most programs have updates for themselves. While some are improvements on features, its not uncommon for products to include security enhancements as well. Keep track of the products you're using and check for updates for your software products regularly. This is especially important when it comes to Microsoft Office products as their updates can have a significant impact on sysem security. You can always visit Office Update to check for the latest updates to your Office products.
Step Two Point Five: Honesty Pays
It is worthwhile to mention that when it comes to Windows OSes, it is better to pay for a legal, genuine copy of the OS to enable you to get the latest updates without a hassle. When it comes to Windows XP, it will not allow you to install a genuine copy of the SP or some critical fixes unless you have a legit version of the OS. Yes, cracked SPs exist and you can always install them, but you will be doing the world a lot of good, not to mention yourself, if you just get yourself a legit copy of at least Windows XP Home. You just spent over 20,000 on that new computer, the least you can do is spend another 4000 and live quite happily afterwards.
Step Three: Securing the OS
Here we will take a look at securing the OS itself without using any third party software. The most important tool here is the "Automatic Updates" option. You can usually find this option in the Control Panel, if you are running Windows ME, Windows 2000 (with the appropriate SP) or Windows XP.
When you open the Automatic Updates option, you will be faced with a couple of options including (exact wordings may differ)
Automatically Download and Install Updates
Download Updates but let me choose when to install them
Notify me of updates but do not automatically download or install them
Turn off Automatic Updates
It is recommended that you select Option 3 - "Notify me of updates but do not automatically download or install them" instead of Option 4, turning off the Auto Update feature. This way, when an important update is released, the Automatic Updates feture will inform you that updates are available for your OS and you can go to Windows Update and download and install them at your convenience. Also this way, you can tell when an update is being offered before the Patch Tuesday cycle and stay protected.
Windows XP comes with a built in Firewall to protect your computer, but its not a worthy solution when compared to a standalone firewall, so I will skip that in favor of a third party firewall solution.
Also, make sure you secure your user account with a password so that no one can fiddle with your system in your absence and then damage the OS.
Windows XP, when patched with Service Pack 2, comes with a Security Center option that can be accessed via the Control Panel. When you restart your computer after installing SP2, you will be prompted to choose an Automatic Updates method (1 out of the 4 choices) The Security Center also monitors the status of the built-in Windows Firewall, which is enabled by default and also the status of your antivirus program, whether it is on, turned off or if it requires an update. However, it only works with well known antivirus solutions. If any of these components are not working right or are turned off or disabled, the Security Center will pop up a warning in your system tray notification area, alerting you.
Step Four: Protection with Third Party Software
Antivirus Solutions
The biggest threat to a Windows system is a virus. How or why a virus attacks and how it spreads, I am not going to go into here. Usually a virus spreads through one of these mediums:
a) an infected floppy or CD
b) an infected file over the network
c) an infected file from the Internet
d) an infected file you received via e-mail or instant messenger.
An antivirus program is a third party solution that runs all the time in your system and monitors and protects your system from viruses and maybe, other threats, depending on the product and its version. It includes a scanning engine and a list of signatures of known viruses that it compares to files staying in your computer's memory and hard disk as well as the ones coming in and going out. If it detects a virus, it immediately stops the activity of the file and informs you about the virus' presence and prompts you to either clean the file or delete it. It should be noted that the major antivirus vendors, McAfee, Symantec, Trend Micro, Kaspersky, etc. release newer versions of their antivirus programs at least once each year in addition to releasing "updates" for the antivirus program every week.
You should have the latest version of the antivirus programs running at all times, and should also make sure its updated every week with the latest virus "signatures." Failure to do any of these two steps may mean an immediate infection. All antivirus programs come with an Automatic Update feature built in that will automatically contact its server and look for available updates and then download and install them automatically. It is recommended that you leave this feature turned on.
Here are a list of instructions that you should actively follow to prevent an infection:
a) Make sure you use the latest version of your antivirus and keep it updated weekly and make sure its auto-update feature is turned on.
b) Never use a CD or a floppy without scanning it for viruses.
c) Do not open files from the Internet without scanning them with the antivirus. Most download managers can integrate with the antivirus program to automatically scan the downloaded files. Turn this feature on.
d) Do not accept and download files from an Instant Messenger conversation if you do not know what it is. Also, all instant messengers can integrate with the antivirus. Turn this feature on.
e) Never open an attachment from an email, no matter what extension it is, without first scanning it with an antivirus. Again, all email clients can integrate with your antivirus solution to automatically scan for viruses in your emails.
Norton Antivirus 2005
McAfee VirusScan
Trend Micro PC-Cillin 2005 (Currently the best, in my opinion)
Kaspersky Antivirus 5.0 Personal
NOD32 2.0 - v7.20
Norman Virus Control
CA eTrust Antivirus v7.1
AVG Antivirus v7.308
avast! 4 Home Edition
AntiVir Personal Edition
Firewalls:
In this day, when broadband and LAN/Cable Internet access is rampant, there is always a chance that somemay may break into your computer, gain access and control your computer to do malicious acts without your permission. A firewall acts like a filter for the data that's going in and out of your computer. If it detects that a program is trying to access the Internet or your local network without your permission, it will stop such activity. Also, if a hacker or any other user tries to gain access to your computer without your permission, it will block all such activity too. The Windows Firewall that comes bundled along with Windows XP SP2 is woefully inadequate when it comes to protecting your computer.
The key to running a firewall efficiently is to configure it right. When it comes to configuring, the key steps to remember are these:
a) If you do not know the program, deny it access to the Internet and the local network.
b) Never allow the software to "remember" the access rights for a program, that is, do not wantonly check the "I know this program. Do not ask me again" for programs that you are not absolutely sure about.
c) Some Windows processes need access to the Internet or your local network to work the way its supposed to. Make sure you check the name of the program and its use before you allow or deny access.
d) Unless you run a server or play/host online or network multiplayer games, go ahead and deny inbound access to all programs except your mail clients, browsers, etc.
e) Do not allow programs to connect to the Internet unless they absolutely need to. So while Adobe Acrobat checks for an update with its servers when you start it up, thats OK. But when you are planning to play Quake 3 Arena offline and it tries to connect to the Internet, go ahead and deny it access this time around.
Good firewalls include;
ZoneAlarm (The best among them all, when you configure it right)
Kerio Personal Firewall
SyGate Personal Firewall Standard
Kaspersky Anti-Hacker v1.7
Norton Personal Firewall 2005
McAfee Personal Firewall Plus
Trend Micro PC-Cillin Internet Security 2005
Anti-Spyware:
Chances are that you're probably using the default Internet Explorer browser that came along with your OS. The browser is literally the weakest link in the Microsoft OS and is a very popular target for people that write software to either attack your computer, or as in most cases, just increase their revenue. People write code called spyware/adware/malware that hijack your browser settings or install software that track your movements online or in some cases, totally prevent you from getting any work done and steal your Internet passwords. And if you're using Internet Explorer, you're their favorite snack.
To test the "integrity" of your browser and whether it is vulnerable to spyware and being hijacked and exploited, run the Browser Security . Chances are, yes, you're very vulnerable. Fortunately, we have software just like antivirus programs - antispyware programs that prevent and clean attacks on your system. As with antivirus, the key to a good antispyware program is to leave its protection system running at all times and to update them regularly with the "signature libraries" of spyware.
Some of the well known products are:
SpyBot - Search and Destroy 1.3 (The best, in my opinion)
LavaSoft Ad-Aware SE Personal v1.05
Microsoft Windows AntiSpyware Beta
Another tools that prevents your browser being hijacked and your critical system settings being changed in BHODemon 2.0. Also, when you install antispyware like SpyBot, you will be prompted to install system protection software called "TeaTimer" and will be prompted to have it automatically startup along with your computer. Select this option and when an important change occurs, you have the option to either accept the change or deny it, effectively killing unwanted program installs and browser hijacks.
Misc. Tools:
Of course, you can always ditch the browser and go for a safer alternative. The best I would recommend is Mozilla Firefox, currently at version 1.0.1. Also the lightest browser around, it makes for the best replacement for Internet Explorer. It also automatically imports all your IE cache, settings, cookies and bookmarks, so you have to do nothing but install it and browse safe.
Also, Microsoft has a Malicious Software Removal Tool that you can download and scan for and remove unwanted malicious software. A newer version of the tool will be released each month.
Too many people these days are coming into the forums requesting help on massively infected systems. So, I thought I'd compile something for the newbies that may be useful to help prevent infections and other useless trash on your computer.
Step One: The Core
This is the single most important piece of your computer. Chances are that if there's something wrong with this, the weakest link in the chain, everything will come crashing straight on top of you. I am talking about the Single Point of Failure (SPoF) on your system - the Operating System.
This critical piece (actually, make that ultra-hyper-mega-critical) of software is what manages the entire show and you dont want any unnecessary software messing with it. Not all Operating Systems are created equal. Technically speaking, server OSes are some of the safest OSes around. But usually you cannot go around installing these OSes unless you're a total geek with around 10 computers around your home and you need software to centrally manage them. When it comes to a single desktop OS, currently Microsoft Windows XP rules the roost.
Your choice of Windows OS preference in the order of safest first is:
Windows XP Professional
Windows XP Home
Windows 2000 Professional
Windows NT 4.0
Windows 98 SE
Windows ME
Windows 98
Windows 95
I would recommend you either stick to the Windows XP OSes, Windows 2000 Professional or Windows 98 SE. Needless to say, Microsoft Windows XP is currently the most safe computing environment for a user. And that neatly brings us to our next topic.
Step Two: Patching it Up
No OS is secure if you are running it straight out of the box. A long list of vulnerabilities are detected by security experts and Microsoft routinely releases update software to address these vulnerabilities and close them. Updates may either be :
Service Packs
Critical Updates
Hotfixes
Cumulative Updates / Rollups
Hardware Updates
Optional Updates
Service Packs (SP) are comprehensive updates to the OS, fixing every single vulnerability in the OS since the release of the OS itself or the last SP release. SP's also include major OS changes, newer updates to system files and they contain every single update to the OS that has ever been released. Also, SPs are cumulative, so if you were to install SP1, it would contain every single update since the OS release and if you install SP2, it would contain every single update that has been released since SP1, and it would also include the updates of SP1 also. So, if you are patching an OS with an SP, you dont have to go around installing SP1, then SP2, SP3, etc. Installing the latest SP would mean you're getting all the updates. The latest SPs for the various OS are:
Windows XP - SP2:
The best way to get SP2 for Windows XP is either via Automatic Updates (I will get to this later), Windows Update, ordering the free Service Pack 2 from Microsoft, (click this link to place your order) or from the Digit September 2004 CD/DVD. However, if you want to download it yourself, a larger network install can be downloaded here.
Windows 2000 - SP4 Download
Windows NT 4.0 - SP6a Download
Microsoft only releases an SP for the OSes that can be used as full-fledged network clients, so there are no SPs for Windows ME, 98 SE, 98 and 95, only the standalone updates. However, an Unofficial SP exists for Microsoft Windows 98 SE.
Windows 98 SE Unofficial SP - Version 2.0 RC1 Download
Critical Updates are those very important updates that Microsoft releases in response to a threat against the Windows OS. There is no option and these should not be avoided. Installing these updates is a must if you dont want your system exploited or open to infection. Microsoft usually releases a slew of these updates every month.
Hotfixes are patches to existing Windows components that address a vulnerability in the code and are released as and when the vulnerabilities are discovered. Needless to say, you need these as well if you want to protect your OS.
Cumulative Updates and security Rollups are a bunch of related updates and hotfixes that enhance the security of the Windows component and also patch any existing unpatched vulnerability. Of course, you need these too.
Hardware Updates can sometimes be found on Windows Update when your hardware manufacturer, like your motherboard manufacturer, releases patches, fixes and updates that usually add functionality and improve performance of your hardware components. While these updates are optional, it is recommended that you install them because they often boost your hardware's performance and provide newer functionality that you can take advantage of.
Optional Updates are just that. They're optional and its your choice whether you wish to update/upgrade them. Usually, these fall in the category of extra tools for the Windows OS such as a newer Media Player, a Journal Viewer, Movie Editing Software, software to make applications programmed in the .NET environment to work, etc. You can safely ignore these updates if you are not planning to use them.
Microsoft releases a number of updates on the second Tuesday of every month, which many of us geeks fondly call "Patch Tuesday". Make sure you bookmark this day in your calendar each month and check for updates. Also, if a threat is severe enough, it may make the people at Microsoft release an update before the planned Patch Tuesday.
Also, most programs have updates for themselves. While some are improvements on features, its not uncommon for products to include security enhancements as well. Keep track of the products you're using and check for updates for your software products regularly. This is especially important when it comes to Microsoft Office products as their updates can have a significant impact on sysem security. You can always visit Office Update to check for the latest updates to your Office products.
Step Two Point Five: Honesty Pays
It is worthwhile to mention that when it comes to Windows OSes, it is better to pay for a legal, genuine copy of the OS to enable you to get the latest updates without a hassle. When it comes to Windows XP, it will not allow you to install a genuine copy of the SP or some critical fixes unless you have a legit version of the OS. Yes, cracked SPs exist and you can always install them, but you will be doing the world a lot of good, not to mention yourself, if you just get yourself a legit copy of at least Windows XP Home. You just spent over 20,000 on that new computer, the least you can do is spend another 4000 and live quite happily afterwards.
Step Three: Securing the OS
Here we will take a look at securing the OS itself without using any third party software. The most important tool here is the "Automatic Updates" option. You can usually find this option in the Control Panel, if you are running Windows ME, Windows 2000 (with the appropriate SP) or Windows XP.
When you open the Automatic Updates option, you will be faced with a couple of options including (exact wordings may differ)
Automatically Download and Install Updates
Download Updates but let me choose when to install them
Notify me of updates but do not automatically download or install them
Turn off Automatic Updates
It is recommended that you select Option 3 - "Notify me of updates but do not automatically download or install them" instead of Option 4, turning off the Auto Update feature. This way, when an important update is released, the Automatic Updates feture will inform you that updates are available for your OS and you can go to Windows Update and download and install them at your convenience. Also this way, you can tell when an update is being offered before the Patch Tuesday cycle and stay protected.
Windows XP comes with a built in Firewall to protect your computer, but its not a worthy solution when compared to a standalone firewall, so I will skip that in favor of a third party firewall solution.
Also, make sure you secure your user account with a password so that no one can fiddle with your system in your absence and then damage the OS.
Windows XP, when patched with Service Pack 2, comes with a Security Center option that can be accessed via the Control Panel. When you restart your computer after installing SP2, you will be prompted to choose an Automatic Updates method (1 out of the 4 choices) The Security Center also monitors the status of the built-in Windows Firewall, which is enabled by default and also the status of your antivirus program, whether it is on, turned off or if it requires an update. However, it only works with well known antivirus solutions. If any of these components are not working right or are turned off or disabled, the Security Center will pop up a warning in your system tray notification area, alerting you.
Step Four: Protection with Third Party Software
Antivirus Solutions
The biggest threat to a Windows system is a virus. How or why a virus attacks and how it spreads, I am not going to go into here. Usually a virus spreads through one of these mediums:
a) an infected floppy or CD
b) an infected file over the network
c) an infected file from the Internet
d) an infected file you received via e-mail or instant messenger.
An antivirus program is a third party solution that runs all the time in your system and monitors and protects your system from viruses and maybe, other threats, depending on the product and its version. It includes a scanning engine and a list of signatures of known viruses that it compares to files staying in your computer's memory and hard disk as well as the ones coming in and going out. If it detects a virus, it immediately stops the activity of the file and informs you about the virus' presence and prompts you to either clean the file or delete it. It should be noted that the major antivirus vendors, McAfee, Symantec, Trend Micro, Kaspersky, etc. release newer versions of their antivirus programs at least once each year in addition to releasing "updates" for the antivirus program every week.
You should have the latest version of the antivirus programs running at all times, and should also make sure its updated every week with the latest virus "signatures." Failure to do any of these two steps may mean an immediate infection. All antivirus programs come with an Automatic Update feature built in that will automatically contact its server and look for available updates and then download and install them automatically. It is recommended that you leave this feature turned on.
Here are a list of instructions that you should actively follow to prevent an infection:
a) Make sure you use the latest version of your antivirus and keep it updated weekly and make sure its auto-update feature is turned on.
b) Never use a CD or a floppy without scanning it for viruses.
c) Do not open files from the Internet without scanning them with the antivirus. Most download managers can integrate with the antivirus program to automatically scan the downloaded files. Turn this feature on.
d) Do not accept and download files from an Instant Messenger conversation if you do not know what it is. Also, all instant messengers can integrate with the antivirus. Turn this feature on.
e) Never open an attachment from an email, no matter what extension it is, without first scanning it with an antivirus. Again, all email clients can integrate with your antivirus solution to automatically scan for viruses in your emails.
Trial Software:
Norton Antivirus 2005
McAfee VirusScan
Trend Micro PC-Cillin 2005 (Currently the best, in my opinion)
Kaspersky Antivirus 5.0 Personal
NOD32 2.0 - v7.20
Norman Virus Control
CA eTrust Antivirus v7.1
Free Antivirus Software:
AVG Antivirus v7.308
avast! 4 Home Edition
AntiVir Personal Edition
Firewalls:
In this day, when broadband and LAN/Cable Internet access is rampant, there is always a chance that somemay may break into your computer, gain access and control your computer to do malicious acts without your permission. A firewall acts like a filter for the data that's going in and out of your computer. If it detects that a program is trying to access the Internet or your local network without your permission, it will stop such activity. Also, if a hacker or any other user tries to gain access to your computer without your permission, it will block all such activity too. The Windows Firewall that comes bundled along with Windows XP SP2 is woefully inadequate when it comes to protecting your computer.
The key to running a firewall efficiently is to configure it right. When it comes to configuring, the key steps to remember are these:
a) If you do not know the program, deny it access to the Internet and the local network.
b) Never allow the software to "remember" the access rights for a program, that is, do not wantonly check the "I know this program. Do not ask me again" for programs that you are not absolutely sure about.
c) Some Windows processes need access to the Internet or your local network to work the way its supposed to. Make sure you check the name of the program and its use before you allow or deny access.
d) Unless you run a server or play/host online or network multiplayer games, go ahead and deny inbound access to all programs except your mail clients, browsers, etc.
e) Do not allow programs to connect to the Internet unless they absolutely need to. So while Adobe Acrobat checks for an update with its servers when you start it up, thats OK. But when you are planning to play Quake 3 Arena offline and it tries to connect to the Internet, go ahead and deny it access this time around.
Good firewalls include;
ZoneAlarm (Free) (The best among them all, when you configure it right)
Kerio Personal Firewall (Free)
SyGate Personal Firewall Standard (Free )
Kaspersky Anti-Hacker v1.7 (Trial)
Norton Personal Firewall 2005 (Trial)
McAfee Personal Firewall Plus (Trial)
Trend Micro PC-Cillin Internet Security 2005 (Trial)
Anti-Spyware:
Chances are that you're probably using the default Internet Explorer browser that came along with your OS. The browser is literally the weakest link in the Microsoft OS and is a very popular target for people that write software to either attack your computer, or as in most cases, just increase their revenue. People write code called spyware/adware/malware that hijack your browser settings or install software that track your movements online or in some cases, totally prevent you from getting any work done and steal your Internet passwords. And if you're using Internet Explorer, you're their favorite snack.
To test the "integrity" of your browser and whether it is vulnerable to spyware and being hijacked and exploited, run the Browser Security Check here. Chances are, yes, you're very vulnerable. Fortunately, we have software just like antivirus programs - antispyware programs that prevent and clean attacks on your system. As with antivirus, the key to a good antispyware program is to leave its protection system running at all times and to update them regularly with the "signature libraries" of spyware.
Some of the well known products are:
SpyBot - Search and Destroy 1.3 (The best, in my opinion)
LavaSoft Ad-Aware SE Personal v1.05
Microsoft Windows AntiSpyware Beta
Another tools that prevents your browser being hijacked and your critical system settings being changed in BHODemon 2.0. You can download it here. Also, when you install antispyware like SpyBot, you will be prompted to install system protection software called "TeaTimer" and will be prompted to have it automatically startup along with your computer. Select this option and when an important change occurs, you have the option to either accept the change or deny it, effectively killing unwanted program installs and browser hijacks.
Misc. Tools:
Of course, you can always ditch the browser and go for a safer alternative. The best I would recommend is Mozilla Firefox, currently at version 1.0.1. Also the lightest browser around, it makes for the best replacement for Internet Explorer. It also automatically imports all your IE cache, settings, cookies and bookmarks, so you have to do nothing but install it and browse safe.
Get Mozilla Firefox 1.0.1 here!
Also, Microsoft has a Malicious Software Removal Tool that you can download and scan for and remove unwanted malicious software. A newer version of the tool will be released each month. Get it here.
In all my time, one tool that really caught my eye and bowled me over was BlackICE PC Protection. The program is actually a firewall for incoming data, but its being paranoid totally. The program totally blocks all incoming requests and literally hides your PC from the local network and from the Internet, making it totally invisible to the outside world. The program also bundles a nifty tool called "Application Protection." What it does is create a snapshot of all the installed programs and their "code" and if there is ANY change at all in the program, it refuses to let the program load without your permission. Of course, you can always authorize and add the program to a list, authorize it to run only once, or terminate it completely. This is the way a paranoid person like myself protects his system. There is no trial that I know of, but if you're interested you can take a look at the link I posted to find out more about the program.
I hope this helps. If anyone has anymore info to add on protecting their systems, please feel free to add it. I will post a HOWTO on fixing your problems with viruses, spyware and hackers tomorrow.
NOTE: A good site to get all your updates in one shot is The Software Patch or you can use third party tools like AutoPatcher to get the same job done.
BIOS updates - How to recover
Hello,
this is not what i wrote , i just grabbed it from the net . no credit to me.
my advice : dont flash bios in Windows
and flash only if necessary . and i think asrock mobos dont support the foll. method of recovery .( some eeprom limitations ).
PLZ pass on comments.Was it useful ?
PROCEDURE FOR RECOVERING A CORRUPT BIOS CHIP
By David Oakley
Amptron International Inc.
(Revised May 24, 2001)
INTRODUCTION TO BOOTBLOCK BIOS
Most BIOS code used today is called ‘BOOT BLOCK’ BIOS. A BOOT BLOCK type BIOS is
different from previous BIOS types in that it is divided into two distinct sections. The first section
of the BIOS is the BOOT BLOCK (hence the name). The BOOT BLOCK uses the first 24k of the
ROM and contains information necessary to initialize only critical system devices such as the
processor, memory and some ISA video cards as well as the floppy drive. The BIOS BOOT
BLOCK is a write protected area and cannot be over written by a BIOS flash utility without using a
special command line switch.
The second section is the SYSTEM BLOCK. The SYSTEM BLOCK is 232k in size and contains
the information necessary to initialize all other system devices such as the video system, input
devices, storage devices, COM ports and peripherals and performs the Power On Self Test. The
SYSTEM BLOCK constitutes the bulk of the ROM.
The illustration above depicts a standard 2Mb (256k) BIOS chip. Older BIOS chips may be only
1Mb (128k). The 1Mb BIOS chips are not BOOT BLOCK BIOS and therefore cannot be
recovered in the same way. If you have a 1Mb BIOS chip and your BIOS is corrupt then you will
need to reprogram the chip using the ‘Hot-Swapping’ method, or an EEPROM programmer.
UPDATING (FLASHING) YOUR BIOS
The process of updating your BIOS is called flashing. Because the type of ROM chip used is a
Flash EEPROM. To update your BIOS you use a utility called a BIOS Flash utility. When you
flash your BIOS the flash utility performs the following steps.
· ?Enters Protected Mode by loading the DOS 4G Protected Mode drivers
· ?Identifies the flash part (the BIOS chip)
· ?Identifies the flash part size and programming voltage
· ?Identifies the motherboard chipset
· ?Verifies the BIOS checksums (make sure that the BIOS file is correct)
· ?Erases the BIOS SYSTEM BLOCK (write over the data with all 0’s)
· ?Rewrites the SYSTEM BLOCK with the new BIOS file
· ?Loads CMOS defaults and reboots the computer
UPDATING (FLASHING) YOUR BIOS (Cont.)
If an error occurs within the first five steps of the flash process then an error message will be
displayed and the flash process will be aborted. Unfortunately if an error occurs after the flash
utility has erased the SYSTEM BLOCK then the computer will be disabled. The system power
will come on, but the system will not startup as it normally does and you may or may not see
anything on the screen. If your system has an AWARD BIOS you may see an error message on
the screen that says.
AWARD BootBlock BIOS v1.0
CMOS Checksum Error
At this point the system will attempt to boot from a floppy disk. You will be able to boot from a
bootable floppy, but without the BIOS SYSTEM BLOCK you can’t do much else.
METHODS OF RECOVERING A CORRUPT BIOS CHIP
There are four options available if your BIOS has become corrupt:
1) Use the BootBlock function of the BIOS to reprogram the BIOS ROM.
2) Use a method called ‘Hot-Swapping’ to reprogram the BIOS ROM.
3) Remove the BIOS ROM and manually reprogram it on an EEPROM programmer.
4) Purchase a replacement BIOS from the motherboard manufacturer.
This paper was written to aid you in reprogramming your BIOS using either of the first two
methods. If you are not comfortable or able to recover your BIOS using either of these methods
then it would be best to purchase a replacement BIOS chip from the motherboard’s manufacturer.
DIFFERENT BIOS DISTRIBUTIONS
There are two primary BIOS distributions used today they are AWARD, written by AWARD
Software and AMI, which is written by American Megatrends International. The methods used to
recovery your BIOS is different for each BIOS distribution, so it is crucial that your know which
BIOS distribution you have.
To determine which BIOS distribution you have you can either read the sticker that has been
placed on top of your BIOS chip, consult the user’s manual, or contact the motherboard
manufacturer. I will elaborate on each of these methods below.
IDENTIFYING YOUR MOTHERBOARDS BIOS DISTRIBUTION
The quickest way to identify which BIOS distribution your motherboard uses when you cannot
boot the computer is to read the manufacturers sticker on the BIOS chip itself, however not all
manufacturers label their BIOS chips. To do this you must first locate the BIOS chip on the
motherboard.
Currently there are two popular BIOS chip package types in use; 32-pin DIP (Dual In-line
Package) and 28-pin PLCC (Plastic Leaded Chip Carrier). The most common is the 32-pin DIP
type so this is what you should look for first. The DIP package type chip is a rectangular black
IDENTIFYING YOUR MOTHERBOARDS BIOS DISTRIBUTION (Cont.)
silicon chip with a row 16-pins along each of the longer sides of the chip. The PLCC chips are
smaller square chips that are closely fitted into a plastic socket on the motherboard. The PLCC
type chips have a total of 28 pins, which are inline on all sides of the chip and one of the corner of
the chip is at a 45° angle.
The illustration below is a larger than normal diagram of what each chip looks like.
( This illustration is not to scale )
The motherboard manufacturer usually places a sticker on top of the BIOS chip, which specifies
the BIOS distribution. The sticker will either say AWARD! or AMI.
Another easy way to identify your BIOS is by checking the user’s manual. The manual does not
generally mention the type of BIOS you have, but in most cases it will include screen shots
(pictures) of the BIOS Setup Utility, which shows the BIOS name at the top. In your manual there
should be a section that discusses how to setup your BIOS. Read the BIOS setup section and
pay close attention to the illustrations. The following is an example of information taken from a
screen shot in a motherboard user’s manual.
AMIBIOS SIMPLE SETUP UTILITY – VERSION 1.20
©1998 American Megatrends, Inc. All Rights Reserved
This motherboard obviously uses AMI BIOS.
The third and final way to identify your BIOS is to call the motherboard manufacturer and ask.
This is often a pretty simple approach, but it is not uncommon for motherboards of the same
model to use different BIOS distributions.
RECOVERING A CORRUPT AMI BOOTBLOCK BIOS
With motherboards that use BOOT BLOCK BIOS it is possible to recover a corrupted BIOS by
reprogramming it from a floppy diskette as long as the BOOT BLOCK section of the BIOS
remains unmodified. When a system with an AMI BIOS has a corrupt BIOS the system will
appear to start, but nothing will appear on the screen, the floppy drive light will come on and the
system will access the floppy drive repeatedly.
AMI has integrated a recovery routine into the BOOT BLOCK of the BIOS, which in the event the
BIOS becomes corrupt can be used to restore it. The routine is called when the SYSTEM BLOCK
of the BIOS is empty. The restore routine will access the floppy drive searching for a BIOS ROM
file named AMIBOOT.ROM, (this is why the floppy drive light comes on and the drive spins.) If the
RECOVERING A CORRUPT AMI BOOTBLOCK BIOS (Cont.)
file is found it is then loaded into the SYSTEM BLOCK of the BIOS to replace the missing
information.
NOTE: Make sure that the PC speaker inside your computer is working before you proceed.
When the BIOS has been restored your system will beep four times to let you know.
To restore an AMI BootBlock BIOS follow these steps:
1) Format a good working 1.44MB floppy diskette.
2) Copy a working BIOS ROM file for your motherboard onto the floppy disk. BIOS ROM
files can usually be downloaded from the motherboard manufacturer’s web site. If you
cannot locate a BIOS ROM file for your motherboard then call the motherboard
manufacturer for technical support.
3) Rename the BIOS ROM file ‘AMIBOOT.ROM’
4) Turn the system on and insert the disk into drive A:
5) After about 3 ~ 4 minutes the system will beep four times. Remove the disk from the
drive. The computer will then restart.
At this point your BIOS should be restored and the system should startup normally. If your system
does not startup normally then try using a different BIOS ROM file for your motherboard and read
the TROUBLESHOOTING PROBLEMS section below.
RECOVERING A CORRUPT AWARD BOOTBLOCK BIOS
With AWARD BIOS the process is similar but still a bit different. To recover an AWARD BIOS you
will need to create a floppy diskette with a working BIOS file in .BIN format, an AWARD flash
utility and an AUTOEXEC.BAT file. AWARD BIOS will not automatically restore the BIOS
information to the SYSTEM BLOCK for this reason you will need to add the commands necessary
to flash the BIOS to the AUTOEXEC.BAT file. The system will run the AUTOEXE.BAT file at
startup, which will in turn flash the BIOS. This is fairly easy. Here are the steps you need to take.
1) Create a bootable floppy disk. If you use Windows 95, 98 or DOS, this can be done by
going to the DOS prompt and typing the command. (Be sure to insert a disk first)
FORMAT A: /S
The /S switch specifies that the system files should be copied to the diskette to make it
bootable. If you are using Windows ME, Windows NT or Windows 2000 then you can not
use the /S switch with the FORMAT command. If you are unable to create a bootable
diskette because of the operating system you are using then you may download a
bootable diskette image from the BootDisk.com web site at (http://www.bootdisk.com)
2) Copy a working BIOS ROM (.BIN) file for your motherboard and an AWARD flash utility
to the floppy disk. You can usually download these files from the motherboard
manufacturer. If you need help finding these files call the motherboard manufacturer for
technical support.
3) Use a text editor or the ‘edit’ command at the DOS prompt to create a text file named
‘AUTOEXEC.BAT’ and save it on the floppy disk. Make sure that the file name is
AUTOEXEC and that the extension is .BAT (nothing else). If you create this file from
RECOVERING A CORRUPT AWARD BOOTBLOCK BIOS (Cont.)
4) within Windows using a program such as NOTEPAD, you may need to change the file
extension from .TXT to .BAT
5) With the text editor add the following commands to the AUTOEXEC.BAT file on the
floppy disk and then save the changes.
@ECHO OFF
@AWDFLASH BIOSFILE.BIN /py
NOTE: The ‘/py’ switch will cause the flash utility to automatically reprogram the BIOS
without any user intervention. Be sure to change the ‘AWDFLASH’ to the name
of the flash utility that you are using and change the ‘BIOSFILE.BIN’ to the name
of the BIOS ROM file you are using.
If you are not sure what the command line switch to automatically flash your
BIOS is, type the name of the flash utility with the ‘/?’ switch after it at a DOS
prompt and a list of the available switches will be displayed.
6) Insert the diskette you created into the floppy drive A: on the system that you need to
restore the BIOS on. Turn on the system. The computer should startup, read the floppy
disk, run the commands in the AUTOEXEC.BAT file and restore the BIOS.
At this point if everything went well then the BIOS should have been restored and the
computer should restart normally. If your system still did not restart normally then go to
the TROUBLESHOOTING PROBLEMS section below.
‘HOT-SWAPPING’ A BIOS CHIP
‘Hot-Swapping’ refers to removing a BIOS chip from the motherboard while the system power is
on and the system is in an idle state. Hot-Swapping a BIOS chip is VERY dangerous to both the
system and the person attempting to remove the chip. This method of BIOS recovery should only
be performed by experienced technician as a last option. Hot-Swapping will work on any type of
BIOS chip as long as both computers use the same type of chip.
WARNING: If done improperly this method of BIOS recovery could cause severe damage to the
motherboard and BIOS as well as severe injury to the person attempting to remove
the chip.
Hot-Swapping requires you to have two computers with the same BIOS distribution and type. The
way it works is, while the second (working computer) is on the BIOS chip is removed and the
BIOS chip from the first (non-working) board is inserted in its place. The BIOS flash utility is then
run on the second computer and the BIOS chip is updated with the BIOS file for the first
computer. In essence you are reprogramming the bad BIOS chip on a different motherboard and
then putting the chip back into the non-working motherboard. The procedure is below.
1) Start the second (working computer) and go to a DOS prompt. Make sure that no
programs are running in the background.
2) While the computer is on carefully remove the BIOS chip from the motherboard and set it
aside. Be sure to note the orientation of the chip so that you can later inset it back in to
the motherboard exactly as it was.
3) Insert the BIOS chip from the first (non-working) computer in to the BIOS socket on the
second (working computer’s) motherboard.
‘HOT-SWAPPING’ A BIOS CHIP (Cont.)
4) At the DOS prompt run the BIOS flash utility and update the BIOS chip with the correct
BIOS file for the first computer. If you get a warning message that the chipset and BIOS
does not match continue anyway. If the flash utility will not allow you to continue and it is
an AMI flash utility then re-run the flash utility using the ‘/X’ switch to enter the utilities
graphical interface and manually reprogram the BIOS from there.
5) Once the BIOS chip has been reprogrammed successfully carefully remove the BIOS
chip from the second computer and put it back into the first computer. Be sure to pay
close attention to the orientation of the chip so that you insert it correctly. Plugging in the
chip backwards will immediately damage both the chip and the motherboard.
6) Start the first computer. If all went well the first system should now be working again. If
not see the TROUBLESHOOTING PROBLEMS section below.
TROUBLESHOOTING PROBLEMS
PROBLEM: After following all of the directions the system will still not start normally. When the
system is powered on all it will do is try to access the floppy drive.
This would seem to indicate that the BIOS reprogramming was not successful or that
the BIOS ROM file was either damaged or not the correct one. Try the procedure
again using a different BIOS ROM file for your motherboard. Make sure that the BIOS
ROM file is for your exact motherboard model and revision.
PROBLEM: When the computer restarts the message ‘CMOS Checksum Bad’ and ‘Press F1 to
Enter Setup’ is displayed.
This is not necessarily a problem. This message is displayed when there are no
CMOS settings saved. This simply means that you need to set your system settings
(such as CPU speed, etc) Press whatever key you are prompted to and set the
CMOS settings accordingly.
PROBLEM: While trying to recover a AWARD BIOS the system starts to read from the floppy disk
and then stops and nothing else happens. When the system is rebooted it still has
the same problem.
This most likely indicates that there is something wrong with the boot disk. Double
check that the disk is bootable, contains the AUTOEXEC.BAT file, the BIOS flash
utility and the BIOS ROM (.BIN) file. If all of the files are present and the disk is
bootable then double check the AUTOEXEC.BAT file. Make sure that the name is
correct and that all of the commands are correct.
If you can see on the screen what the system is doing then try typing the commands
in the AUTOEXEC.BAT file manually to see if there is an error message that is
displayed. If everything checks out then try using a different BIOS ROM (.BIN) file. If
the problem persists use a different flash utility.
If you have any questions of comments regarding this procedure please e-mail me, my email
address is: [email protected]
Some Registry tweaks,try it at your own risk!
Here are some registry tricks which you can tryout :
1. Disable the Autorun Option in your CD Rom Drive:
Open your Registry and navigate to "HK_L_M\system\currentcontrolset\services\cdro m"
Change the value of 'Autorun', or create a new DWORD value if it doesn't already exist, and set the value as '0' for Autorun disabled.
2. Disable the Harddisk Lowdiskspace warning in Windows Xp
User Key: "HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
and
System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer"
create a new DWORD 'NoLowDiskSpaceChecks' and change its value to '1'.
3. Disable the Windows Key
"HK_L_M\system\currentcontrolset\control\keybo ard layout"
Create a new Binary value, or modify the existing value called 'Scancode Map' as shown below.
Value: 00 00 00 00 00 00 00 00 03 00 00 00 00 00 5B E0 00 00 5C E0 00 00 00 00
4. View System BIOS Information
Open Registry and navigate to
"HK_L_M\hardware\description\system"
5. Change the Title of Windows Media Player
"HK_C_USER\software\policies\microsoft\windowsmedi a player\"
Create a new string value called ' TitleBar' and change text as your wish.
6. Disable Internet access in Network
Open Registry and make the following changes
"KH_C_User\software\microsoft\windows\currentversi o n\internetsettings\"
Change the value of "Proxyenabled" to 1 and change the value of "proxyserver" and set it to an ip address. Change the value of the ip address and port to "10.0.0.1:5555"
7. Disable the ability to Right click on the desktop
"HK_C_User\software\microsoft\windows\currentversi o n\policies\explorer\"
Create a DWORD "NoViewContextMenu" and change its value to "0" for disabling and "1" for enabling.
8. Hide all items on desktop
"HK_C_USER\software\microsoft\windows\currentversi o n\policies\explorer\"
and
"HK_L_M\software\microsoft\windows\currentversion\ p olicies\explorer\"
create a new DWORD "NoDesktop" and change its value to "1"
You can show all the items in the desktop by chaning the value to "0"
9. Disable the "Change Password" button in windows
"HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\System"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersi on\Policies\System"
Create a new DWORD "DisableChangePassword" and change its value to "0" for disabling and "1" for enabling.
10. Disable the "cancel" button or pressing the "Esc" key while logging on to Windows"
"HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\Cu r rentVersion\Run"
Create a new string value "NoLogon" and change its value to "RUNDLL32 shell32,SHExitWindowsEx 0"
11. Remove "Log off" from start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer"
Create a new DWORD "NoLogOff" and change its value to "1" for disabling and "0" for enabling.
12. Clear the Recent playlist in Media Player
Navigate to "HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\ P layer"
And clear the "RecentFileList" subkey.
13. Empty temporary Internet files on exit (in Internet Explorer)
"HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Internet Settings\Cache"
and
"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Cur r entVersion\Internet Settings\Cache"
Create a new DWORD "Persistent" and change the value to "0" for emptying and "1" to remove this option.
14. Clear the Internet Explorere typed addresses history
"HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs"
And delete the subkeys.
15. Remove recent documents from start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer"
Create a new DWORD "NoRecentDocsMenu" and change its value to "1".
16. Remove Network connections from start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer"
Create a new DWORD "NoNetworkConnections" and change its value to "1".
17. Remove My documents from start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer"
Create a new DWORD "NoSMMyDocs" and change its value to "1".
18. Remove My pictures from start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer "
Create a new DWORD "NoSMMyPictures" ad change its value to "1".
19. Remove My music fro start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer"
Create a new DWORD "NoStartMenuMyMusic" and change its value to "1".
20. Reboot windows after crash
"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contr o l\CrashControl"
Create a new DWORD "AutoReboot" and change its value to "1".Restart the machine for the effect to take place.
21. Disable the use of MSDos
User Key: "HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\WinOldApp"
and
System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\WinOldApp"
Create a new DWORD "Disabled" and set its value to "1". Change it to "0" for enabling.
22. Enable Directory completion in MSDos prompt
User Key: "HKEY_CURRENT_USER\Software\Microsoft\Command Processor"
and
System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor"
Create a new DWORD "PathCompletionChar " and set it to equal the hex value of the required control character.
23. Quick edit the command prompt
User Key: "HKEY_CURRENT_USER\Console"
and
System Key: "HKEY_USERS\.DEFAULT\Console"
Create a new DWORD "QuickEdit" and set its value to "1" for enabling and "0" for disabling.
24. Disable Registry editing
"HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Curr e ntVersion\Policies\System"
Create a new DWORD "DisableRegistryTools" and change its value to "0" for allowing Regedit and "1" for disabling it.
25. Disable task scheduler
" HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion\RunServices"
Delete the value from "SchedulingAgent". Usually its value is set to "'mstask.exe".
26. Remove My computer from desktop and start menu
User Key: "HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\NonEnum"
and
System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\NonEnum"
Create "{20D04FE0-3AEA-1069-A2D8-08002B30309D}" and change its value to "1" for removing. Change its value to "0" for showing.
27. Show Windows version on desktop
User Key: "HKEY_CURRENT_USER\Control Panel\Desktop"
Create a new DWORD " PaintDesktopVersion" and change its value to "1" for showing and "0" for removing.
28. Remove My documenst from desktop
Windows 95, 98 and Me
"HKEY_CURRENT_USER\Software\Classes\CLSID\{450D8FB A -AD25-11D0-98A8-0800361B1103}\ShellFolder"
Windows NT, 2000 and XP
"HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Explorer\CLSID\{450D8FBA-AD25-11D0-98A8-0800361B1103}\ShellFolder"
Modify the value called "Attributes" as "0xf0500174" to hide or "0xf0400174" to show.
29. Disable Scan disk after improper shutdown
" HKEY_LOCAL_MACHINE\System\CurrentControlSet\Contro l\FileSystem"
create a new DWORD "DisableScandiskOnBoot" and change its value to "01" for disablng and "00" for enabling.
30. Automatically end Hung programs.
" HKEY_CURRENT_USER\Control Panel\Desktop"
and
"System Key: [HKEY_USERS\.DEFAULT\Control Panel\Desktop"
Modify the value of "AutoEndTasks" to "1".
Windows uses 20% of your bandwidth! Get it back
A nice little tweak for XP. Microsoft reserve 20% of your available bandwidth for their own purposes (suspect for updates and interrogating your machine etc..)
Here's how to get it back:
Click Start-->Run-->type "gpedit.msc" without the "
This opens the group policy editor. Then go to:
Local Computer Policy-->Computer Configuration-->Administrative Templates-->Network-->QOS Packet Scheduler-->Limit Reservable Bandwidth
Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab :
"By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.
works on XP Pro, and 2000 other OS not tested.
Does'nt work on winxp home
How to Convert a FAT Partition to NTFS
How to Convert a FAT Partition to NTFS
To convert a FAT partition to NTFS, perform the following steps.
Click Start, click Programs, and then click Command Prompt.
In Windows XP, click Start, and then click Run.
At the command prompt, type CONVERT [driveletter]: /FS:NTFS.
Convert.exe will attempt to convert the partition to NTFS.
NOTE: Although the chance of corruption or data loss during the conversion from FAT to NTFS is minimal, it is best to perform a full backup of the data on the drive that it is to be converted prior to executing the convert command. It is also recommended to verify the integrity of the backup before proceeding, as well as to run RDISK and update the emergency repair disk (ERD).
Convert.exe will attempt to convert the partition to NTFS.