To hide zip folder's in windows xp go with the following command's.
Start--->Run type regsvr32 /u zipfldr.dll
that's it.
To hide zip folder's in windows xp go with the following command's.
Start--->Run type regsvr32 /u zipfldr.dll
that's it.
Automated System Recovery overview in Windows XP
View products that this article applies to.
SUMMARY
The purpose of this article is to describe Automated System Recovery in Microsoft Windows XP and to list supported information between the original release of Microsoft Windows XP, Windows XP Service Pack 1 (SP-1), and Windows XP Service Pack 1a (SP-1a).
MORE INFORMATION
Microsoft recommends that you regularly create Automated System Recovery (ASR) sets as part of an overall plan for system recovery so that you are prepared if the system fails. ASR should be a last resort for system recovery. Use ASR only after you have exhausted other options. For example, you should first try Safe Mode Boot and Last Known Good.
ASR is a two-part system; it includes ASR backup and ASR restore. The ASR Wizard, located in Backup, does the backup portion. The wizard backs up the system state, system services, and all the disks that are associated with the operating system components. ASR also creates a file that contains information about the backup, the disk configurations (including basic and dynamic volumes), and how to perform a restore.
You can access the restore portion by pressing F2 when prompted in the text-mode portion of setup. ASR reads the disk configurations from the file that it creates. It restores all the disk signatures, volumes, and partitions on (at a minimum) the disks that you need to start the computer. ASR will try to restore all the disk configurations, but under some circumstances it might not be able to. ASR then installs a simple installation of Windows and automatically starts a restoration using the backup created by the ASR Wizard.
For more information about how to set up and use Automated System Recovery in Microsoft Windows XP, visit the following Microsoft Web site:
http://www.microsoft.com/technet/pro...ntain/asr.mspx
Although, Common Ads can be removed from Firefox Using AdBlock Extension, there's nothing availble to actually remove those Google Text Framed Ads we see, you can always Right click and Block, but that's a temporary solution, here's How you can Get rid of those ads for once and for all!
Tools You Need:
Mozilla Firefox Browser
ChromeEdit Extension For Firefox
Download and Install ChromEdit, which let's you Edit User Files, Restart Firefox, and Open ChromEdit
Go to userContent.css and add the following Code:
it's Really worth it considering, the page layout gets much cleaner after the hack.Code:/* Block Ads v.2004-06-12 by Neil Jenkins Portions of this ruleset are derived from the ad blocking css by Joe Francis at: http://www.floppymoose.com/ Some code also contributed by Mike Hokenson: http://www.gozer.org/mozilla/ad_blocking */ iframe[width="120"][height="600"], a img[width="120"][height="600"], iframe[width="125"][height="600"], a img[width="125"][height="600"], iframe[width="150"][height="100"], a img[width="150"][height="100"], iframe[width="150"][height="600"], a img[width="150"][height="600"], iframe[width="160"][height="600"], a img[width="160"][height="600"], iframe[width="300"][height="250"], a img[width="300"][height="250"], iframe[width="336"][height="280"], a img[width="336"][height="280"], iframe[width="468"][height="60"], a img[width="468"][height="60"], iframe[width="470"][height="62"], a img[width="470"][height="62"], iframe[width="728"][height="90"], a img[width="728"][height="90"], iframe[width="730"][height="92"], a img[width="730"][height="92"], iframe[width="600"][height="120"], object[width="125"][height="300"], iframe[width="180"][height="150"], iframe[src*="/ad-"], iframe[src*="/ad."], iframe[src*="/ad/"], iframe[src*="/ad_"], iframe[src*="/adframe"], iframe[src*="/ads"], iframe[src*="/adv"], iframe[src*="/adx"], iframe[src*=".ad"], iframe[src*="_Banner"], iframe[src*="BET365"], iframe[src*="/click"], iframe[src*="?click"], iframe[src*="googlesyndication"], iframe[src*="promos"], iframe[name="bsadframe"], iframe[id="adFrame"], iframe[id="splashFrame"], img[src*="/ad-"], img[src*="/ad."], img[src*="/ad/"], img[src*="/ad_"], img[src*="/ads"], img[src*="/adv"], img[src*="/adx"], img[src*=".ad"], img[src*="_ad_"], img[src*="/click"], img[src*="?click"], img[src*="Editorial_Promos"], img[src*="/toms_skyscraper_"], img[src$="images/logos/amazon_international.gif"], img[src*="freshmeat.net/button.gif"], img[src*="pic.geocities.com/images/"], img[src*="i.imdb.com/Vpics/"], img[src*="i.imdb.com/Photos/CMSIcons"], img[src*="i.imdb.com/Icons/apix/"], img[src*="i.imdb.com/Icons/kpix/"], img[src*="i.imdb.com/apix/"], img[src*="sportsbybrooks.com/farkbutton.gif"], img[alt*="advert"], img[alt*="Click Here To Visit Our Sponsor"], img[alt*="Sponsored Links"], img[name="fixedSpImg"], a:link[href*="/ad-"] img, a:link[href*="/ad."] img, a:link[href*="/ad/"] img, a:link[href*="/ad_"] img, a:link[href*="/ads"] img, a:link[href*="/adv"] img, a:link[href*="/adx"] img, a:link[href*=".ad"] img, a:link[href*="/banner"] img, a:link[href*="/click.cgi"] img, a:link[href*="/clickcgi?"] img, a:link[href*="/clickover"] img, a:link[href*="/clickthr"] img, a:link[href*="/click-"] img, a:link[href*="=click"] img, a:link[href*="?click"] img, a:link[href*="/A="] img, table table table[width="346"][height="280"], table[class="metatable"], table[id="RefAd"], table[cellspacing="0"][width="160"][height="329"][bgcolor="#000000"], table[cellpadding="5"][width="150"][style="border: 1px dashed rgb(221, 170, 170); background-color: rgb(236, 248, 255);"], table[border="0"][height="600"][width="120"], table[height="90"][cellspacing="0"][cellpadding="0"][width="728"][border="0"], table[border="0"][cellpadding="3"][cellspacing="0"][height="40"][width="100%"], table[border="0"][cellpadding="0"][cellspacing="4"][align="right"][width="20%"], table[border="2"] td[valign="top"][bgcolor="#ffffff"] table[width="138"], table[border="0"][cellpadding="1"][cellspacing="0"][width="626"][bgcolor="#6699cc"], table[bordercolor="red"][height="225"][cellspacing="0"][cellpadding="0"][width="190"][bgcolor="white"][border="0"], table[width="336"][border="0"][cellspacing="0"][cellpadding="0"][align="right"][style="margin-left: 10px; margin-bottom: 10px;"], table[width="770"][border="0"] tr[valign="top"] td[width="160"], td[class="cnnNavAd"], td[class="RHBarBody"], td[class="sl-table"], td[style="border-bottom: 1px solid rgb(204, 204, 204); padding: 7px 3px; background-color: rgb(255, 254, 249);"], td span[class="aoltextad"], form[name="frmLargeForm"], form[action*="click_lx.cgi"], form[action^="http://rd.yahoo.com/"], form[action=""][name$="SoapCity"], form[action=""][name^="728x90"], form[action=""][name^="300x250"], form[method="get"][action*="martindale"][name="MDH"], embed[type="application/x-shockwave-flash"][src*="_Banner"], embed[type="application/x-shockwave-flash"][src*="/ad"], embed[type="application/x-shockwave-flash"][href*="/ad"], embed[type="application/x-shockwave-flash"][src*=".ad"], embed[type="application/x-shockwave-flash"][href*=".ad"], embed[type="application/x-shockwave-flash"][src*="?click"], embed[type="application/x-shockwave-flash"][href*="?click"], embed[type="application/x-shockwave-flash"][src*="/click"], embed[type="application/x-shockwave-flash"][href*="/click"], embed[type="application/x-shockwave-flash"][href*="promos"], embed[type="application/x-shockwave-flash"][href*="=click"], embed[type="application/x-shockwave-flash"][href*="redirect"], embed[type="application/x-shockwave-flash"][href*="/A="], embed[type="application/x-shockwave-flash"][name*="advert"], embed[type="application/x-shockwave-flash"][name*="banner"], embed[type="application/x-shockwave-flash"][width="728"][height="90"], embed[type="application/x-shockwave-flash"][width="468"][height="60"], embed[type="application/x-shockwave-flash"][width="467"][height="63"], div[id="adstrip"], div[id*="advert"], div[id="dropin"], div[id="dwindow"], div[id="dcv_EchangeLay"], div[id="mntl"], div[id*="popup"], div[id="quack"], div[id="splashLayer"], div[id*="sponsor"], div[id="yschsec"], div[class="ovt"], div#contextualLinks, div[style="border: 1px solid rgb(221, 221, 221); padding: 5px; background-color: rgb(255, 255, 255);"], object[id="widgeth"], *[class="ad"], *[class*="eSext"], *[name*="klipad"], *[style*="/ads/"], *[id*="popover_"], *[src*="120x80"], *[src*="140x"], *[src*="?ad"], *[src*="-ad-"], *[src*="/adimage"], *[src*="/adimg"], *[src*="advert"], *[src*="=click"], *[src*="banners."], *[src*="banner_ads"], *[src*="/images/dinkus/more-arrow-lo.gif"], *[src*="/javaImages/ec/"], *[src*="/offer"], *[src*="/puffboxes/"], *[src*="/sponsors/"], *[src*="_sponsor_"], *[src*="/us.yimg.com/a/ya"], *[src*=".adbutler.de"], *[src*=".nedstatbasic.net"], *[src*=".tradedoubler.com"], *[src*=".travelocity./Sponsor_gifs/"], *[src*="a.consumer.net"], *[src*="bannermania.nom.pl"], *[src*="cash4banner.com"], *[src*="crazypopups.com"], *[src*="hit-now.com"], *[src*="hitbox.com"], *[src*="img.thebugs.ws"], *[src*="kinghost.com/ban/"], *[src*="klipmart"], *[src*="popupad.net/ats/"], *[src*="public"][src*="ad"], *[src*="/publicidad/"], *[src*="qkimg.net"], *[src*="qksrv.net"], *[src*="rcm-images.amazon.com"], *[src*="rcm.amazon.com"], *[src*="salon.com/Creatives"], *[src*="sexcounter."], *[src*="sideads/"], *[src*="statse.webtrendslive.com"], *[href*="logging.to"], *[href*="/referral/"], *[href*="tryaol"], *[href*="websponsors"], *[src*="banman.asp"], *[href*="banman.asp"], *[src*="bannerman"], *[href*="bannerman"], *[src*="?banner"], *[href*="?banner"], *[src*="/banner/"], *[href*="/banner/"], *[src*="/jump/"], *[href*="/jump/"], *[src*="adfarm"], *[href*="adfarm"], *[src*="advertising.com"], *[href*="advertising.com"], *[src*="ar.atwola.com"], *[href*="ar.atwola.com"], *[src*="atdmt.com"], *[href*="atdmt.com"], *[src*="bluestreak.com"], *[href*="bluestreak.com"], *[src*="clickxchange.com"], *[href*="clickxchange.com"], *[src*="doubleclick"], *[href*="doubleclick"], *[src*="falkag.net"], *[href*="falkag.net"], *[src*="fastclick.com"], *[href*="fastclick.com"], *[src*="mediaplex"], *[href*="mediaplex"], *[src*="netdirect.nl"], *[href*="netdirect.nl"], *[src*="spinbox."], *[href*="spinbox."], *[src*="tradedoubler.com"], *[href*="tradedoubler.com"], *[src*="transfer.go"], *[href*="transfer.go"], *[src*=".tribalfusion"], *[href*=".tribalfusion"], *[src*="valueclick"], *[href*="valueclick"], *[src*="http://216.92.211.171/"], *[href*="http://216.92.211.171/"], *[src*="http://216.92.21.16/"], *[href*="http://216.92.21.16/"] { display: none !important; } img[src*=".advance"], img[src*="/click_"], img[src*="/cnn/images/clickability/"], img[src*="/logo2.m"], img[src$="/banners/com000.jpg"], a:link[href*=".add"] img, a:link[href*="admin"] img, a:link[href*="adobe"] img, a:link[href*=".adp"] img, a:link[href*="/advance"] img, a:link[href*="click.mp3"] img, a:link[href*="/imgres?imgurl="] img, a:link[href*=":head"] img, a:link[href*="http://nettracker."] img, embed[type="application/x-shockwave-flash"][src*="gallery"] { display: inline !important; } #rh table[class=”metatable”]{display: none !important;} #rh div[class=”c”] {display: none !important;}
PS: It removes Framed Yahoo! Ads as well, but not the Sidebar ons on Geocities Website.
Now this 1 I dint knew
real great tip
I dont use Firefox
But will try this tip on it
I love clean layout of website
and dats y I use Maxthon
i will read this tips and reply tuluvaguy.thanks for sharing.
And Guttu i was wondering why the language bar comes automatically i load windows. now i know the reason. thanks for the tip guttu.
heres how u can save additional disk space,
using "remove hotfix backups v 2.1.6" Cool
when u install Windows Update, backup folders r created for the files that were replaced during the update. These are created so that you can easily uninstall a particular Hotfix, if it causes problems with your system. If your system is running stable and you don't need to uninstall the hotfixes, then you can safely remove the backup files to free up disk space. u can alway manually delete the $uninstallxxxxx folders and the addremove/ registry entries; or u can use 'remove hotfix backups utility v 2.1.6' which does a smart job at it !
This small freeware utility will locate the Hotfixes that have created backup files on your system, and will remove those backups. It will also removes the associated Registry entries for these items in Add/Remove Programs.
Arrow click http://www.dougknox.com/xp/utils/xp_hotfix_backup.htm
the sitehttp://<a href="http://www.dougknox....index.html</a>also offers an excellant
range of tips, trick, utilitys, and fixes for winxp. check it out
Too many people these days are coming into the forums requesting help on massively infected systems. So, I thought I'd compile something for the newbies like me that may be useful to help prevent infections and other useless trash on your computer.
Step One: The Core
This is the single most important piece of your computer. Chances are that if there's something wrong with this, the weakest link in the chain, everything will come crashing straight on top of you. I am talking about the Single Point of Failure (SPoF) on your system - the Operating System.
This critical piece (actually, make that ultra-hyper-mega-critical) of software is what manages the entire show and you dont want any unnecessary software messing with it. Not all Operating Systems are created equal. Technically speaking, server OSes are some of the safest OSes around. But usually you cannot go around installing these OSes unless you're a total geek with around 10 computers around your home and you need software to centrally manage them. When it comes to a single desktop OS, currently Microsoft Windows XP rules the roost.
Your choice of Windows OS preference in the order of safest first is:
Windows XP Professional
Windows XP Home
Windows 2000 Professional
Windows NT 4.0
Windows 98 SE
Windows ME
Windows 98
Windows 95
I would recommend you either stick to the Windows XP OSes, Windows 2000 Professional or Windows 98 SE. Needless to say, Microsoft Windows XP is currently the most safe computing environment for a user. And that neatly brings us to our next topic.
Step Two: Patching it Up
No OS is secure if you are running it straight out of the box. A long list of vulnerabilities are detected by security experts and Microsoft routinely releases update software to address these vulnerabilities and close them. Updates may either be :
Service Packs
Critical Updates
Hotfixes
Cumulative Updates / Rollups
Hardware Updates
Optional Updates
Service Packs (SP) are comprehensive updates to the OS, fixing every single vulnerability in the OS since the release of the OS itself or the last SP release. SP's also include major OS changes, newer updates to system files and they contain every single update to the OS that has ever been released. Also, SPs are cumulative, so if you were to install SP1, it would contain every single update since the OS release and if you install SP2, it would contain every single update that has been released since SP1, and it would also include the updates of SP1 also. So, if you are patching an OS with an SP, you dont have to go around installing SP1, then SP2, SP3, etc. Installing the latest SP would mean you're getting all the updates. The latest SPs for the various OS are:
Windows XP - SP2:
The best way to get SP2 for Windows XP is either via Automatic Updates (I will get to this later), Windows Update, ordering the free Service Pack 2 from Microsoft.
Microsoft only releases an SP for the OSes that can be used as full-fledged network clients, so there are no SPs for Windows ME, 98 SE, 98 and 95, only the standalone updates. However, an Unofficial SP exists for Microsoft Windows 98 SE.
Critical Updates are those very important updates that Microsoft releases in response to a threat against the Windows OS. There is no option and these should not be avoided. Installing these updates is a must if you dont want your system exploited or open to infection. Microsoft usually releases a slew of these updates every month.
Hotfixes are patches to existing Windows components that address a vulnerability in the code and are released as and when the vulnerabilities are discovered. Needless to say, you need these as well if you want to protect your OS.
Cumulative Updates and security Rollups are a bunch of related updates and hotfixes that enhance the security of the Windows component and also patch any existing unpatched vulnerability. Of course, you need these too.
Hardware Updates can sometimes be found on Windows Update when your hardware manufacturer, like your motherboard manufacturer, releases patches, fixes and updates that usually add functionality and improve performance of your hardware components. While these updates are optional, it is recommended that you install them because they often boost your hardware's performance and provide newer functionality that you can take advantage of.
Optional Updates are just that. They're optional and its your choice whether you wish to update/upgrade them. Usually, these fall in the category of extra tools for the Windows OS such as a newer Media Player, a Journal Viewer, Movie Editing Software, software to make applications programmed in the .NET environment to work, etc. You can safely ignore these updates if you are not planning to use them.
Microsoft releases a number of updates on the second Tuesday of every month, which many of us geeks fondly call "Patch Tuesday". Make sure you bookmark this day in your calendar each month and check for updates. Also, if a threat is severe enough, it may make the people at Microsoft release an update before the planned Patch Tuesday.
Also, most programs have updates for themselves. While some are improvements on features, its not uncommon for products to include security enhancements as well. Keep track of the products you're using and check for updates for your software products regularly. This is especially important when it comes to Microsoft Office products as their updates can have a significant impact on sysem security. You can always visit Office Update to check for the latest updates to your Office products.
Step Two Point Five: Honesty Pays
It is worthwhile to mention that when it comes to Windows OSes, it is better to pay for a legal, genuine copy of the OS to enable you to get the latest updates without a hassle. When it comes to Windows XP, it will not allow you to install a genuine copy of the SP or some critical fixes unless you have a legit version of the OS. Yes, cracked SPs exist and you can always install them, but you will be doing the world a lot of good, not to mention yourself, if you just get yourself a legit copy of at least Windows XP Home. You just spent over 20,000 on that new computer, the least you can do is spend another 4000 and live quite happily afterwards.
Step Three: Securing the OS
Here we will take a look at securing the OS itself without using any third party software. The most important tool here is the "Automatic Updates" option. You can usually find this option in the Control Panel, if you are running Windows ME, Windows 2000 (with the appropriate SP) or Windows XP.
When you open the Automatic Updates option, you will be faced with a couple of options including (exact wordings may differ)
Automatically Download and Install Updates
Download Updates but let me choose when to install them
Notify me of updates but do not automatically download or install them
Turn off Automatic Updates
It is recommended that you select Option 3 - "Notify me of updates but do not automatically download or install them" instead of Option 4, turning off the Auto Update feature. This way, when an important update is released, the Automatic Updates feture will inform you that updates are available for your OS and you can go to Windows Update and download and install them at your convenience. Also this way, you can tell when an update is being offered before the Patch Tuesday cycle and stay protected.
Windows XP comes with a built in Firewall to protect your computer, but its not a worthy solution when compared to a standalone firewall, so I will skip that in favor of a third party firewall solution.
Also, make sure you secure your user account with a password so that no one can fiddle with your system in your absence and then damage the OS.
Windows XP, when patched with Service Pack 2, comes with a Security Center option that can be accessed via the Control Panel. When you restart your computer after installing SP2, you will be prompted to choose an Automatic Updates method (1 out of the 4 choices) The Security Center also monitors the status of the built-in Windows Firewall, which is enabled by default and also the status of your antivirus program, whether it is on, turned off or if it requires an update. However, it only works with well known antivirus solutions. If any of these components are not working right or are turned off or disabled, the Security Center will pop up a warning in your system tray notification area, alerting you.
Step Four: Protection with Third Party Software
Antivirus Solutions
The biggest threat to a Windows system is a virus. How or why a virus attacks and how it spreads, I am not going to go into here. Usually a virus spreads through one of these mediums:
a) an infected floppy or CD
b) an infected file over the network
c) an infected file from the Internet
d) an infected file you received via e-mail or instant messenger.
An antivirus program is a third party solution that runs all the time in your system and monitors and protects your system from viruses and maybe, other threats, depending on the product and its version. It includes a scanning engine and a list of signatures of known viruses that it compares to files staying in your computer's memory and hard disk as well as the ones coming in and going out. If it detects a virus, it immediately stops the activity of the file and informs you about the virus' presence and prompts you to either clean the file or delete it. It should be noted that the major antivirus vendors, McAfee, Symantec, Trend Micro, Kaspersky, etc. release newer versions of their antivirus programs at least once each year in addition to releasing "updates" for the antivirus program every week.
You should have the latest version of the antivirus programs running at all times, and should also make sure its updated every week with the latest virus "signatures." Failure to do any of these two steps may mean an immediate infection. All antivirus programs come with an Automatic Update feature built in that will automatically contact its server and look for available updates and then download and install them automatically. It is recommended that you leave this feature turned on.
Here are a list of instructions that you should actively follow to prevent an infection:
a) Make sure you use the latest version of your antivirus and keep it updated weekly and make sure its auto-update feature is turned on.
b) Never use a CD or a floppy without scanning it for viruses.
c) Do not open files from the Internet without scanning them with the antivirus. Most download managers can integrate with the antivirus program to automatically scan the downloaded files. Turn this feature on.
d) Do not accept and download files from an Instant Messenger conversation if you do not know what it is. Also, all instant messengers can integrate with the antivirus. Turn this feature on.
e) Never open an attachment from an email, no matter what extension it is, without first scanning it with an antivirus. Again, all email clients can integrate with your antivirus solution to automatically scan for viruses in your emails.
Too many people these days are coming into the forums requesting help on massively infected systems. So, I thought I'd compile something for the newbies that may be useful to help prevent infections and other useless trash on your computer.
Step One: The Core
This is the single most important piece of your computer. Chances are that if there's something wrong with this, the weakest link in the chain, everything will come crashing straight on top of you. I am talking about the Single Point of Failure (SPoF) on your system - the Operating System.
This critical piece (actually, make that ultra-hyper-mega-critical) of software is what manages the entire show and you dont want any unnecessary software messing with it. Not all Operating Systems are created equal. Technically speaking, server OSes are some of the safest OSes around. But usually you cannot go around installing these OSes unless you're a total geek with around 10 computers around your home and you need software to centrally manage them. When it comes to a single desktop OS, currently Microsoft Windows XP rules the roost.
Your choice of Windows OS preference in the order of safest first is:
Windows XP Professional
Windows XP Home
Windows 2000 Professional
Windows NT 4.0
Windows 98 SE
Windows ME
Windows 98
Windows 95
I would recommend you either stick to the Windows XP OSes, Windows 2000 Professional or Windows 98 SE. Needless to say, Microsoft Windows XP is currently the most safe computing environment for a user. And that neatly brings us to our next topic.
Step Two: Patching it Up
No OS is secure if you are running it straight out of the box. A long list of vulnerabilities are detected by security experts and Microsoft routinely releases update software to address these vulnerabilities and close them. Updates may either be :
Service Packs
Critical Updates
Hotfixes
Cumulative Updates / Rollups
Hardware Updates
Optional Updates
Service Packs (SP) are comprehensive updates to the OS, fixing every single vulnerability in the OS since the release of the OS itself or the last SP release. SP's also include major OS changes, newer updates to system files and they contain every single update to the OS that has ever been released. Also, SPs are cumulative, so if you were to install SP1, it would contain every single update since the OS release and if you install SP2, it would contain every single update that has been released since SP1, and it would also include the updates of SP1 also. So, if you are patching an OS with an SP, you dont have to go around installing SP1, then SP2, SP3, etc. Installing the latest SP would mean you're getting all the updates. The latest SPs for the various OS are:
Windows XP - SP2:
The best way to get SP2 for Windows XP is either via Automatic Updates (I will get to this later), Windows Update, ordering the free Service Pack 2 from Microsoft, (click this link to place your order) or from the Digit September 2004 CD/DVD. However, if you want to download it yourself, a larger network install can be downloaded here.
Windows 2000 - SP4 Download
Windows NT 4.0 - SP6a Download
Microsoft only releases an SP for the OSes that can be used as full-fledged network clients, so there are no SPs for Windows ME, 98 SE, 98 and 95, only the standalone updates. However, an Unofficial SP exists for Microsoft Windows 98 SE.
Windows 98 SE Unofficial SP - Version 2.0 RC1 Download
Critical Updates are those very important updates that Microsoft releases in response to a threat against the Windows OS. There is no option and these should not be avoided. Installing these updates is a must if you dont want your system exploited or open to infection. Microsoft usually releases a slew of these updates every month.
Hotfixes are patches to existing Windows components that address a vulnerability in the code and are released as and when the vulnerabilities are discovered. Needless to say, you need these as well if you want to protect your OS.
Cumulative Updates and security Rollups are a bunch of related updates and hotfixes that enhance the security of the Windows component and also patch any existing unpatched vulnerability. Of course, you need these too.
Hardware Updates can sometimes be found on Windows Update when your hardware manufacturer, like your motherboard manufacturer, releases patches, fixes and updates that usually add functionality and improve performance of your hardware components. While these updates are optional, it is recommended that you install them because they often boost your hardware's performance and provide newer functionality that you can take advantage of.
Optional Updates are just that. They're optional and its your choice whether you wish to update/upgrade them. Usually, these fall in the category of extra tools for the Windows OS such as a newer Media Player, a Journal Viewer, Movie Editing Software, software to make applications programmed in the .NET environment to work, etc. You can safely ignore these updates if you are not planning to use them.
Microsoft releases a number of updates on the second Tuesday of every month, which many of us geeks fondly call "Patch Tuesday". Make sure you bookmark this day in your calendar each month and check for updates. Also, if a threat is severe enough, it may make the people at Microsoft release an update before the planned Patch Tuesday.
Also, most programs have updates for themselves. While some are improvements on features, its not uncommon for products to include security enhancements as well. Keep track of the products you're using and check for updates for your software products regularly. This is especially important when it comes to Microsoft Office products as their updates can have a significant impact on sysem security. You can always visit Office Update to check for the latest updates to your Office products.
Step Two Point Five: Honesty Pays
It is worthwhile to mention that when it comes to Windows OSes, it is better to pay for a legal, genuine copy of the OS to enable you to get the latest updates without a hassle. When it comes to Windows XP, it will not allow you to install a genuine copy of the SP or some critical fixes unless you have a legit version of the OS. Yes, cracked SPs exist and you can always install them, but you will be doing the world a lot of good, not to mention yourself, if you just get yourself a legit copy of at least Windows XP Home. You just spent over 20,000 on that new computer, the least you can do is spend another 4000 and live quite happily afterwards.
Step Three: Securing the OS
Here we will take a look at securing the OS itself without using any third party software. The most important tool here is the "Automatic Updates" option. You can usually find this option in the Control Panel, if you are running Windows ME, Windows 2000 (with the appropriate SP) or Windows XP.
When you open the Automatic Updates option, you will be faced with a couple of options including (exact wordings may differ)
Automatically Download and Install Updates
Download Updates but let me choose when to install them
Notify me of updates but do not automatically download or install them
Turn off Automatic Updates
It is recommended that you select Option 3 - "Notify me of updates but do not automatically download or install them" instead of Option 4, turning off the Auto Update feature. This way, when an important update is released, the Automatic Updates feture will inform you that updates are available for your OS and you can go to Windows Update and download and install them at your convenience. Also this way, you can tell when an update is being offered before the Patch Tuesday cycle and stay protected.
Windows XP comes with a built in Firewall to protect your computer, but its not a worthy solution when compared to a standalone firewall, so I will skip that in favor of a third party firewall solution.
Also, make sure you secure your user account with a password so that no one can fiddle with your system in your absence and then damage the OS.
Windows XP, when patched with Service Pack 2, comes with a Security Center option that can be accessed via the Control Panel. When you restart your computer after installing SP2, you will be prompted to choose an Automatic Updates method (1 out of the 4 choices) The Security Center also monitors the status of the built-in Windows Firewall, which is enabled by default and also the status of your antivirus program, whether it is on, turned off or if it requires an update. However, it only works with well known antivirus solutions. If any of these components are not working right or are turned off or disabled, the Security Center will pop up a warning in your system tray notification area, alerting you.
Step Four: Protection with Third Party Software
Antivirus Solutions
The biggest threat to a Windows system is a virus. How or why a virus attacks and how it spreads, I am not going to go into here. Usually a virus spreads through one of these mediums:
a) an infected floppy or CD
b) an infected file over the network
c) an infected file from the Internet
d) an infected file you received via e-mail or instant messenger.
An antivirus program is a third party solution that runs all the time in your system and monitors and protects your system from viruses and maybe, other threats, depending on the product and its version. It includes a scanning engine and a list of signatures of known viruses that it compares to files staying in your computer's memory and hard disk as well as the ones coming in and going out. If it detects a virus, it immediately stops the activity of the file and informs you about the virus' presence and prompts you to either clean the file or delete it. It should be noted that the major antivirus vendors, McAfee, Symantec, Trend Micro, Kaspersky, etc. release newer versions of their antivirus programs at least once each year in addition to releasing "updates" for the antivirus program every week.
You should have the latest version of the antivirus programs running at all times, and should also make sure its updated every week with the latest virus "signatures." Failure to do any of these two steps may mean an immediate infection. All antivirus programs come with an Automatic Update feature built in that will automatically contact its server and look for available updates and then download and install them automatically. It is recommended that you leave this feature turned on.
Here are a list of instructions that you should actively follow to prevent an infection:
a) Make sure you use the latest version of your antivirus and keep it updated weekly and make sure its auto-update feature is turned on.
b) Never use a CD or a floppy without scanning it for viruses.
c) Do not open files from the Internet without scanning them with the antivirus. Most download managers can integrate with the antivirus program to automatically scan the downloaded files. Turn this feature on.
d) Do not accept and download files from an Instant Messenger conversation if you do not know what it is. Also, all instant messengers can integrate with the antivirus. Turn this feature on.
e) Never open an attachment from an email, no matter what extension it is, without first scanning it with an antivirus. Again, all email clients can integrate with your antivirus solution to automatically scan for viruses in your emails.
Norton Antivirus 2005
McAfee VirusScan
Trend Micro PC-Cillin 2005 (Currently the best, in my opinion)
Kaspersky Antivirus 5.0 Personal
NOD32 2.0 - v7.20
Norman Virus Control
CA eTrust Antivirus v7.1
AVG Antivirus v7.308
avast! 4 Home Edition
AntiVir Personal Edition
Firewalls:
In this day, when broadband and LAN/Cable Internet access is rampant, there is always a chance that somemay may break into your computer, gain access and control your computer to do malicious acts without your permission. A firewall acts like a filter for the data that's going in and out of your computer. If it detects that a program is trying to access the Internet or your local network without your permission, it will stop such activity. Also, if a hacker or any other user tries to gain access to your computer without your permission, it will block all such activity too. The Windows Firewall that comes bundled along with Windows XP SP2 is woefully inadequate when it comes to protecting your computer.
The key to running a firewall efficiently is to configure it right. When it comes to configuring, the key steps to remember are these:
a) If you do not know the program, deny it access to the Internet and the local network.
b) Never allow the software to "remember" the access rights for a program, that is, do not wantonly check the "I know this program. Do not ask me again" for programs that you are not absolutely sure about.
c) Some Windows processes need access to the Internet or your local network to work the way its supposed to. Make sure you check the name of the program and its use before you allow or deny access.
d) Unless you run a server or play/host online or network multiplayer games, go ahead and deny inbound access to all programs except your mail clients, browsers, etc.
e) Do not allow programs to connect to the Internet unless they absolutely need to. So while Adobe Acrobat checks for an update with its servers when you start it up, thats OK. But when you are planning to play Quake 3 Arena offline and it tries to connect to the Internet, go ahead and deny it access this time around.
Good firewalls include;
ZoneAlarm (The best among them all, when you configure it right)
Kerio Personal Firewall
SyGate Personal Firewall Standard
Kaspersky Anti-Hacker v1.7
Norton Personal Firewall 2005
McAfee Personal Firewall Plus
Trend Micro PC-Cillin Internet Security 2005
Anti-Spyware:
Chances are that you're probably using the default Internet Explorer browser that came along with your OS. The browser is literally the weakest link in the Microsoft OS and is a very popular target for people that write software to either attack your computer, or as in most cases, just increase their revenue. People write code called spyware/adware/malware that hijack your browser settings or install software that track your movements online or in some cases, totally prevent you from getting any work done and steal your Internet passwords. And if you're using Internet Explorer, you're their favorite snack.
To test the "integrity" of your browser and whether it is vulnerable to spyware and being hijacked and exploited, run the Browser Security . Chances are, yes, you're very vulnerable. Fortunately, we have software just like antivirus programs - antispyware programs that prevent and clean attacks on your system. As with antivirus, the key to a good antispyware program is to leave its protection system running at all times and to update them regularly with the "signature libraries" of spyware.
Some of the well known products are:
SpyBot - Search and Destroy 1.3 (The best, in my opinion)
LavaSoft Ad-Aware SE Personal v1.05
Microsoft Windows AntiSpyware Beta
Another tools that prevents your browser being hijacked and your critical system settings being changed in BHODemon 2.0. Also, when you install antispyware like SpyBot, you will be prompted to install system protection software called "TeaTimer" and will be prompted to have it automatically startup along with your computer. Select this option and when an important change occurs, you have the option to either accept the change or deny it, effectively killing unwanted program installs and browser hijacks.
Misc. Tools:
Of course, you can always ditch the browser and go for a safer alternative. The best I would recommend is Mozilla Firefox, currently at version 1.0.1. Also the lightest browser around, it makes for the best replacement for Internet Explorer. It also automatically imports all your IE cache, settings, cookies and bookmarks, so you have to do nothing but install it and browse safe.
Also, Microsoft has a Malicious Software Removal Tool that you can download and scan for and remove unwanted malicious software. A newer version of the tool will be released each month.
Too many people these days are coming into the forums requesting help on massively infected systems. So, I thought I'd compile something for the newbies that may be useful to help prevent infections and other useless trash on your computer.
Step One: The Core
This is the single most important piece of your computer. Chances are that if there's something wrong with this, the weakest link in the chain, everything will come crashing straight on top of you. I am talking about the Single Point of Failure (SPoF) on your system - the Operating System.
This critical piece (actually, make that ultra-hyper-mega-critical) of software is what manages the entire show and you dont want any unnecessary software messing with it. Not all Operating Systems are created equal. Technically speaking, server OSes are some of the safest OSes around. But usually you cannot go around installing these OSes unless you're a total geek with around 10 computers around your home and you need software to centrally manage them. When it comes to a single desktop OS, currently Microsoft Windows XP rules the roost.
Your choice of Windows OS preference in the order of safest first is:
Windows XP Professional
Windows XP Home
Windows 2000 Professional
Windows NT 4.0
Windows 98 SE
Windows ME
Windows 98
Windows 95
I would recommend you either stick to the Windows XP OSes, Windows 2000 Professional or Windows 98 SE. Needless to say, Microsoft Windows XP is currently the most safe computing environment for a user. And that neatly brings us to our next topic.
Step Two: Patching it Up
No OS is secure if you are running it straight out of the box. A long list of vulnerabilities are detected by security experts and Microsoft routinely releases update software to address these vulnerabilities and close them. Updates may either be :
Service Packs
Critical Updates
Hotfixes
Cumulative Updates / Rollups
Hardware Updates
Optional Updates
Service Packs (SP) are comprehensive updates to the OS, fixing every single vulnerability in the OS since the release of the OS itself or the last SP release. SP's also include major OS changes, newer updates to system files and they contain every single update to the OS that has ever been released. Also, SPs are cumulative, so if you were to install SP1, it would contain every single update since the OS release and if you install SP2, it would contain every single update that has been released since SP1, and it would also include the updates of SP1 also. So, if you are patching an OS with an SP, you dont have to go around installing SP1, then SP2, SP3, etc. Installing the latest SP would mean you're getting all the updates. The latest SPs for the various OS are:
Windows XP - SP2:
The best way to get SP2 for Windows XP is either via Automatic Updates (I will get to this later), Windows Update, ordering the free Service Pack 2 from Microsoft, (click this link to place your order) or from the Digit September 2004 CD/DVD. However, if you want to download it yourself, a larger network install can be downloaded here.
Windows 2000 - SP4 Download
Windows NT 4.0 - SP6a Download
Microsoft only releases an SP for the OSes that can be used as full-fledged network clients, so there are no SPs for Windows ME, 98 SE, 98 and 95, only the standalone updates. However, an Unofficial SP exists for Microsoft Windows 98 SE.
Windows 98 SE Unofficial SP - Version 2.0 RC1 Download
Critical Updates are those very important updates that Microsoft releases in response to a threat against the Windows OS. There is no option and these should not be avoided. Installing these updates is a must if you dont want your system exploited or open to infection. Microsoft usually releases a slew of these updates every month.
Hotfixes are patches to existing Windows components that address a vulnerability in the code and are released as and when the vulnerabilities are discovered. Needless to say, you need these as well if you want to protect your OS.
Cumulative Updates and security Rollups are a bunch of related updates and hotfixes that enhance the security of the Windows component and also patch any existing unpatched vulnerability. Of course, you need these too.
Hardware Updates can sometimes be found on Windows Update when your hardware manufacturer, like your motherboard manufacturer, releases patches, fixes and updates that usually add functionality and improve performance of your hardware components. While these updates are optional, it is recommended that you install them because they often boost your hardware's performance and provide newer functionality that you can take advantage of.
Optional Updates are just that. They're optional and its your choice whether you wish to update/upgrade them. Usually, these fall in the category of extra tools for the Windows OS such as a newer Media Player, a Journal Viewer, Movie Editing Software, software to make applications programmed in the .NET environment to work, etc. You can safely ignore these updates if you are not planning to use them.
Microsoft releases a number of updates on the second Tuesday of every month, which many of us geeks fondly call "Patch Tuesday". Make sure you bookmark this day in your calendar each month and check for updates. Also, if a threat is severe enough, it may make the people at Microsoft release an update before the planned Patch Tuesday.
Also, most programs have updates for themselves. While some are improvements on features, its not uncommon for products to include security enhancements as well. Keep track of the products you're using and check for updates for your software products regularly. This is especially important when it comes to Microsoft Office products as their updates can have a significant impact on sysem security. You can always visit Office Update to check for the latest updates to your Office products.
Step Two Point Five: Honesty Pays
It is worthwhile to mention that when it comes to Windows OSes, it is better to pay for a legal, genuine copy of the OS to enable you to get the latest updates without a hassle. When it comes to Windows XP, it will not allow you to install a genuine copy of the SP or some critical fixes unless you have a legit version of the OS. Yes, cracked SPs exist and you can always install them, but you will be doing the world a lot of good, not to mention yourself, if you just get yourself a legit copy of at least Windows XP Home. You just spent over 20,000 on that new computer, the least you can do is spend another 4000 and live quite happily afterwards.
Step Three: Securing the OS
Here we will take a look at securing the OS itself without using any third party software. The most important tool here is the "Automatic Updates" option. You can usually find this option in the Control Panel, if you are running Windows ME, Windows 2000 (with the appropriate SP) or Windows XP.
When you open the Automatic Updates option, you will be faced with a couple of options including (exact wordings may differ)
Automatically Download and Install Updates
Download Updates but let me choose when to install them
Notify me of updates but do not automatically download or install them
Turn off Automatic Updates
It is recommended that you select Option 3 - "Notify me of updates but do not automatically download or install them" instead of Option 4, turning off the Auto Update feature. This way, when an important update is released, the Automatic Updates feture will inform you that updates are available for your OS and you can go to Windows Update and download and install them at your convenience. Also this way, you can tell when an update is being offered before the Patch Tuesday cycle and stay protected.
Windows XP comes with a built in Firewall to protect your computer, but its not a worthy solution when compared to a standalone firewall, so I will skip that in favor of a third party firewall solution.
Also, make sure you secure your user account with a password so that no one can fiddle with your system in your absence and then damage the OS.
Windows XP, when patched with Service Pack 2, comes with a Security Center option that can be accessed via the Control Panel. When you restart your computer after installing SP2, you will be prompted to choose an Automatic Updates method (1 out of the 4 choices) The Security Center also monitors the status of the built-in Windows Firewall, which is enabled by default and also the status of your antivirus program, whether it is on, turned off or if it requires an update. However, it only works with well known antivirus solutions. If any of these components are not working right or are turned off or disabled, the Security Center will pop up a warning in your system tray notification area, alerting you.
Step Four: Protection with Third Party Software
Antivirus Solutions
The biggest threat to a Windows system is a virus. How or why a virus attacks and how it spreads, I am not going to go into here. Usually a virus spreads through one of these mediums:
a) an infected floppy or CD
b) an infected file over the network
c) an infected file from the Internet
d) an infected file you received via e-mail or instant messenger.
An antivirus program is a third party solution that runs all the time in your system and monitors and protects your system from viruses and maybe, other threats, depending on the product and its version. It includes a scanning engine and a list of signatures of known viruses that it compares to files staying in your computer's memory and hard disk as well as the ones coming in and going out. If it detects a virus, it immediately stops the activity of the file and informs you about the virus' presence and prompts you to either clean the file or delete it. It should be noted that the major antivirus vendors, McAfee, Symantec, Trend Micro, Kaspersky, etc. release newer versions of their antivirus programs at least once each year in addition to releasing "updates" for the antivirus program every week.
You should have the latest version of the antivirus programs running at all times, and should also make sure its updated every week with the latest virus "signatures." Failure to do any of these two steps may mean an immediate infection. All antivirus programs come with an Automatic Update feature built in that will automatically contact its server and look for available updates and then download and install them automatically. It is recommended that you leave this feature turned on.
Here are a list of instructions that you should actively follow to prevent an infection:
a) Make sure you use the latest version of your antivirus and keep it updated weekly and make sure its auto-update feature is turned on.
b) Never use a CD or a floppy without scanning it for viruses.
c) Do not open files from the Internet without scanning them with the antivirus. Most download managers can integrate with the antivirus program to automatically scan the downloaded files. Turn this feature on.
d) Do not accept and download files from an Instant Messenger conversation if you do not know what it is. Also, all instant messengers can integrate with the antivirus. Turn this feature on.
e) Never open an attachment from an email, no matter what extension it is, without first scanning it with an antivirus. Again, all email clients can integrate with your antivirus solution to automatically scan for viruses in your emails.
Trial Software:
Norton Antivirus 2005
McAfee VirusScan
Trend Micro PC-Cillin 2005 (Currently the best, in my opinion)
Kaspersky Antivirus 5.0 Personal
NOD32 2.0 - v7.20
Norman Virus Control
CA eTrust Antivirus v7.1
Free Antivirus Software:
AVG Antivirus v7.308
avast! 4 Home Edition
AntiVir Personal Edition
Firewalls:
In this day, when broadband and LAN/Cable Internet access is rampant, there is always a chance that somemay may break into your computer, gain access and control your computer to do malicious acts without your permission. A firewall acts like a filter for the data that's going in and out of your computer. If it detects that a program is trying to access the Internet or your local network without your permission, it will stop such activity. Also, if a hacker or any other user tries to gain access to your computer without your permission, it will block all such activity too. The Windows Firewall that comes bundled along with Windows XP SP2 is woefully inadequate when it comes to protecting your computer.
The key to running a firewall efficiently is to configure it right. When it comes to configuring, the key steps to remember are these:
a) If you do not know the program, deny it access to the Internet and the local network.
b) Never allow the software to "remember" the access rights for a program, that is, do not wantonly check the "I know this program. Do not ask me again" for programs that you are not absolutely sure about.
c) Some Windows processes need access to the Internet or your local network to work the way its supposed to. Make sure you check the name of the program and its use before you allow or deny access.
d) Unless you run a server or play/host online or network multiplayer games, go ahead and deny inbound access to all programs except your mail clients, browsers, etc.
e) Do not allow programs to connect to the Internet unless they absolutely need to. So while Adobe Acrobat checks for an update with its servers when you start it up, thats OK. But when you are planning to play Quake 3 Arena offline and it tries to connect to the Internet, go ahead and deny it access this time around.
Good firewalls include;
ZoneAlarm (Free) (The best among them all, when you configure it right)
Kerio Personal Firewall (Free)
SyGate Personal Firewall Standard (Free )
Kaspersky Anti-Hacker v1.7 (Trial)
Norton Personal Firewall 2005 (Trial)
McAfee Personal Firewall Plus (Trial)
Trend Micro PC-Cillin Internet Security 2005 (Trial)
Anti-Spyware:
Chances are that you're probably using the default Internet Explorer browser that came along with your OS. The browser is literally the weakest link in the Microsoft OS and is a very popular target for people that write software to either attack your computer, or as in most cases, just increase their revenue. People write code called spyware/adware/malware that hijack your browser settings or install software that track your movements online or in some cases, totally prevent you from getting any work done and steal your Internet passwords. And if you're using Internet Explorer, you're their favorite snack.
To test the "integrity" of your browser and whether it is vulnerable to spyware and being hijacked and exploited, run the Browser Security Check here. Chances are, yes, you're very vulnerable. Fortunately, we have software just like antivirus programs - antispyware programs that prevent and clean attacks on your system. As with antivirus, the key to a good antispyware program is to leave its protection system running at all times and to update them regularly with the "signature libraries" of spyware.
Some of the well known products are:
SpyBot - Search and Destroy 1.3 (The best, in my opinion)
LavaSoft Ad-Aware SE Personal v1.05
Microsoft Windows AntiSpyware Beta
Another tools that prevents your browser being hijacked and your critical system settings being changed in BHODemon 2.0. You can download it here. Also, when you install antispyware like SpyBot, you will be prompted to install system protection software called "TeaTimer" and will be prompted to have it automatically startup along with your computer. Select this option and when an important change occurs, you have the option to either accept the change or deny it, effectively killing unwanted program installs and browser hijacks.
Misc. Tools:
Of course, you can always ditch the browser and go for a safer alternative. The best I would recommend is Mozilla Firefox, currently at version 1.0.1. Also the lightest browser around, it makes for the best replacement for Internet Explorer. It also automatically imports all your IE cache, settings, cookies and bookmarks, so you have to do nothing but install it and browse safe.
Get Mozilla Firefox 1.0.1 here!
Also, Microsoft has a Malicious Software Removal Tool that you can download and scan for and remove unwanted malicious software. A newer version of the tool will be released each month. Get it here.
In all my time, one tool that really caught my eye and bowled me over was BlackICE PC Protection. The program is actually a firewall for incoming data, but its being paranoid totally. The program totally blocks all incoming requests and literally hides your PC from the local network and from the Internet, making it totally invisible to the outside world. The program also bundles a nifty tool called "Application Protection." What it does is create a snapshot of all the installed programs and their "code" and if there is ANY change at all in the program, it refuses to let the program load without your permission. Of course, you can always authorize and add the program to a list, authorize it to run only once, or terminate it completely. This is the way a paranoid person like myself protects his system. There is no trial that I know of, but if you're interested you can take a look at the link I posted to find out more about the program.
I hope this helps. If anyone has anymore info to add on protecting their systems, please feel free to add it. I will post a HOWTO on fixing your problems with viruses, spyware and hackers tomorrow.
NOTE: A good site to get all your updates in one shot is The Software Patch or you can use third party tools like AutoPatcher to get the same job done.
Hello,
this is not what i wrote , i just grabbed it from the net . no credit to me.
my advice : dont flash bios in Windows
and flash only if necessary . and i think asrock mobos dont support the foll. method of recovery .( some eeprom limitations ).
PLZ pass on comments.Was it useful ?
PROCEDURE FOR RECOVERING A CORRUPT BIOS CHIP
By David Oakley
Amptron International Inc.
(Revised May 24, 2001)
INTRODUCTION TO BOOTBLOCK BIOS
Most BIOS code used today is called ‘BOOT BLOCK’ BIOS. A BOOT BLOCK type BIOS is
different from previous BIOS types in that it is divided into two distinct sections. The first section
of the BIOS is the BOOT BLOCK (hence the name). The BOOT BLOCK uses the first 24k of the
ROM and contains information necessary to initialize only critical system devices such as the
processor, memory and some ISA video cards as well as the floppy drive. The BIOS BOOT
BLOCK is a write protected area and cannot be over written by a BIOS flash utility without using a
special command line switch.
The second section is the SYSTEM BLOCK. The SYSTEM BLOCK is 232k in size and contains
the information necessary to initialize all other system devices such as the video system, input
devices, storage devices, COM ports and peripherals and performs the Power On Self Test. The
SYSTEM BLOCK constitutes the bulk of the ROM.
The illustration above depicts a standard 2Mb (256k) BIOS chip. Older BIOS chips may be only
1Mb (128k). The 1Mb BIOS chips are not BOOT BLOCK BIOS and therefore cannot be
recovered in the same way. If you have a 1Mb BIOS chip and your BIOS is corrupt then you will
need to reprogram the chip using the ‘Hot-Swapping’ method, or an EEPROM programmer.
UPDATING (FLASHING) YOUR BIOS
The process of updating your BIOS is called flashing. Because the type of ROM chip used is a
Flash EEPROM. To update your BIOS you use a utility called a BIOS Flash utility. When you
flash your BIOS the flash utility performs the following steps.
· ?Enters Protected Mode by loading the DOS 4G Protected Mode drivers
· ?Identifies the flash part (the BIOS chip)
· ?Identifies the flash part size and programming voltage
· ?Identifies the motherboard chipset
· ?Verifies the BIOS checksums (make sure that the BIOS file is correct)
· ?Erases the BIOS SYSTEM BLOCK (write over the data with all 0’s)
· ?Rewrites the SYSTEM BLOCK with the new BIOS file
· ?Loads CMOS defaults and reboots the computer
UPDATING (FLASHING) YOUR BIOS (Cont.)
If an error occurs within the first five steps of the flash process then an error message will be
displayed and the flash process will be aborted. Unfortunately if an error occurs after the flash
utility has erased the SYSTEM BLOCK then the computer will be disabled. The system power
will come on, but the system will not startup as it normally does and you may or may not see
anything on the screen. If your system has an AWARD BIOS you may see an error message on
the screen that says.
AWARD BootBlock BIOS v1.0
CMOS Checksum Error
At this point the system will attempt to boot from a floppy disk. You will be able to boot from a
bootable floppy, but without the BIOS SYSTEM BLOCK you can’t do much else.
METHODS OF RECOVERING A CORRUPT BIOS CHIP
There are four options available if your BIOS has become corrupt:
1) Use the BootBlock function of the BIOS to reprogram the BIOS ROM.
2) Use a method called ‘Hot-Swapping’ to reprogram the BIOS ROM.
3) Remove the BIOS ROM and manually reprogram it on an EEPROM programmer.
4) Purchase a replacement BIOS from the motherboard manufacturer.
This paper was written to aid you in reprogramming your BIOS using either of the first two
methods. If you are not comfortable or able to recover your BIOS using either of these methods
then it would be best to purchase a replacement BIOS chip from the motherboard’s manufacturer.
DIFFERENT BIOS DISTRIBUTIONS
There are two primary BIOS distributions used today they are AWARD, written by AWARD
Software and AMI, which is written by American Megatrends International. The methods used to
recovery your BIOS is different for each BIOS distribution, so it is crucial that your know which
BIOS distribution you have.
To determine which BIOS distribution you have you can either read the sticker that has been
placed on top of your BIOS chip, consult the user’s manual, or contact the motherboard
manufacturer. I will elaborate on each of these methods below.
IDENTIFYING YOUR MOTHERBOARDS BIOS DISTRIBUTION
The quickest way to identify which BIOS distribution your motherboard uses when you cannot
boot the computer is to read the manufacturers sticker on the BIOS chip itself, however not all
manufacturers label their BIOS chips. To do this you must first locate the BIOS chip on the
motherboard.
Currently there are two popular BIOS chip package types in use; 32-pin DIP (Dual In-line
Package) and 28-pin PLCC (Plastic Leaded Chip Carrier). The most common is the 32-pin DIP
type so this is what you should look for first. The DIP package type chip is a rectangular black
IDENTIFYING YOUR MOTHERBOARDS BIOS DISTRIBUTION (Cont.)
silicon chip with a row 16-pins along each of the longer sides of the chip. The PLCC chips are
smaller square chips that are closely fitted into a plastic socket on the motherboard. The PLCC
type chips have a total of 28 pins, which are inline on all sides of the chip and one of the corner of
the chip is at a 45° angle.
The illustration below is a larger than normal diagram of what each chip looks like.
( This illustration is not to scale )
The motherboard manufacturer usually places a sticker on top of the BIOS chip, which specifies
the BIOS distribution. The sticker will either say AWARD! or AMI.
Another easy way to identify your BIOS is by checking the user’s manual. The manual does not
generally mention the type of BIOS you have, but in most cases it will include screen shots
(pictures) of the BIOS Setup Utility, which shows the BIOS name at the top. In your manual there
should be a section that discusses how to setup your BIOS. Read the BIOS setup section and
pay close attention to the illustrations. The following is an example of information taken from a
screen shot in a motherboard user’s manual.
AMIBIOS SIMPLE SETUP UTILITY – VERSION 1.20
©1998 American Megatrends, Inc. All Rights Reserved
This motherboard obviously uses AMI BIOS.
The third and final way to identify your BIOS is to call the motherboard manufacturer and ask.
This is often a pretty simple approach, but it is not uncommon for motherboards of the same
model to use different BIOS distributions.
RECOVERING A CORRUPT AMI BOOTBLOCK BIOS
With motherboards that use BOOT BLOCK BIOS it is possible to recover a corrupted BIOS by
reprogramming it from a floppy diskette as long as the BOOT BLOCK section of the BIOS
remains unmodified. When a system with an AMI BIOS has a corrupt BIOS the system will
appear to start, but nothing will appear on the screen, the floppy drive light will come on and the
system will access the floppy drive repeatedly.
AMI has integrated a recovery routine into the BOOT BLOCK of the BIOS, which in the event the
BIOS becomes corrupt can be used to restore it. The routine is called when the SYSTEM BLOCK
of the BIOS is empty. The restore routine will access the floppy drive searching for a BIOS ROM
file named AMIBOOT.ROM, (this is why the floppy drive light comes on and the drive spins.) If the
RECOVERING A CORRUPT AMI BOOTBLOCK BIOS (Cont.)
file is found it is then loaded into the SYSTEM BLOCK of the BIOS to replace the missing
information.
NOTE: Make sure that the PC speaker inside your computer is working before you proceed.
When the BIOS has been restored your system will beep four times to let you know.
To restore an AMI BootBlock BIOS follow these steps:
1) Format a good working 1.44MB floppy diskette.
2) Copy a working BIOS ROM file for your motherboard onto the floppy disk. BIOS ROM
files can usually be downloaded from the motherboard manufacturer’s web site. If you
cannot locate a BIOS ROM file for your motherboard then call the motherboard
manufacturer for technical support.
3) Rename the BIOS ROM file ‘AMIBOOT.ROM’
4) Turn the system on and insert the disk into drive A:
5) After about 3 ~ 4 minutes the system will beep four times. Remove the disk from the
drive. The computer will then restart.
At this point your BIOS should be restored and the system should startup normally. If your system
does not startup normally then try using a different BIOS ROM file for your motherboard and read
the TROUBLESHOOTING PROBLEMS section below.
RECOVERING A CORRUPT AWARD BOOTBLOCK BIOS
With AWARD BIOS the process is similar but still a bit different. To recover an AWARD BIOS you
will need to create a floppy diskette with a working BIOS file in .BIN format, an AWARD flash
utility and an AUTOEXEC.BAT file. AWARD BIOS will not automatically restore the BIOS
information to the SYSTEM BLOCK for this reason you will need to add the commands necessary
to flash the BIOS to the AUTOEXEC.BAT file. The system will run the AUTOEXE.BAT file at
startup, which will in turn flash the BIOS. This is fairly easy. Here are the steps you need to take.
1) Create a bootable floppy disk. If you use Windows 95, 98 or DOS, this can be done by
going to the DOS prompt and typing the command. (Be sure to insert a disk first)
FORMAT A: /S
The /S switch specifies that the system files should be copied to the diskette to make it
bootable. If you are using Windows ME, Windows NT or Windows 2000 then you can not
use the /S switch with the FORMAT command. If you are unable to create a bootable
diskette because of the operating system you are using then you may download a
bootable diskette image from the BootDisk.com web site at (http://www.bootdisk.com)
2) Copy a working BIOS ROM (.BIN) file for your motherboard and an AWARD flash utility
to the floppy disk. You can usually download these files from the motherboard
manufacturer. If you need help finding these files call the motherboard manufacturer for
technical support.
3) Use a text editor or the ‘edit’ command at the DOS prompt to create a text file named
‘AUTOEXEC.BAT’ and save it on the floppy disk. Make sure that the file name is
AUTOEXEC and that the extension is .BAT (nothing else). If you create this file from
RECOVERING A CORRUPT AWARD BOOTBLOCK BIOS (Cont.)
4) within Windows using a program such as NOTEPAD, you may need to change the file
extension from .TXT to .BAT
5) With the text editor add the following commands to the AUTOEXEC.BAT file on the
floppy disk and then save the changes.
@ECHO OFF
@AWDFLASH BIOSFILE.BIN /py
NOTE: The ‘/py’ switch will cause the flash utility to automatically reprogram the BIOS
without any user intervention. Be sure to change the ‘AWDFLASH’ to the name
of the flash utility that you are using and change the ‘BIOSFILE.BIN’ to the name
of the BIOS ROM file you are using.
If you are not sure what the command line switch to automatically flash your
BIOS is, type the name of the flash utility with the ‘/?’ switch after it at a DOS
prompt and a list of the available switches will be displayed.
6) Insert the diskette you created into the floppy drive A: on the system that you need to
restore the BIOS on. Turn on the system. The computer should startup, read the floppy
disk, run the commands in the AUTOEXEC.BAT file and restore the BIOS.
At this point if everything went well then the BIOS should have been restored and the
computer should restart normally. If your system still did not restart normally then go to
the TROUBLESHOOTING PROBLEMS section below.
‘HOT-SWAPPING’ A BIOS CHIP
‘Hot-Swapping’ refers to removing a BIOS chip from the motherboard while the system power is
on and the system is in an idle state. Hot-Swapping a BIOS chip is VERY dangerous to both the
system and the person attempting to remove the chip. This method of BIOS recovery should only
be performed by experienced technician as a last option. Hot-Swapping will work on any type of
BIOS chip as long as both computers use the same type of chip.
WARNING: If done improperly this method of BIOS recovery could cause severe damage to the
motherboard and BIOS as well as severe injury to the person attempting to remove
the chip.
Hot-Swapping requires you to have two computers with the same BIOS distribution and type. The
way it works is, while the second (working computer) is on the BIOS chip is removed and the
BIOS chip from the first (non-working) board is inserted in its place. The BIOS flash utility is then
run on the second computer and the BIOS chip is updated with the BIOS file for the first
computer. In essence you are reprogramming the bad BIOS chip on a different motherboard and
then putting the chip back into the non-working motherboard. The procedure is below.
1) Start the second (working computer) and go to a DOS prompt. Make sure that no
programs are running in the background.
2) While the computer is on carefully remove the BIOS chip from the motherboard and set it
aside. Be sure to note the orientation of the chip so that you can later inset it back in to
the motherboard exactly as it was.
3) Insert the BIOS chip from the first (non-working) computer in to the BIOS socket on the
second (working computer’s) motherboard.
‘HOT-SWAPPING’ A BIOS CHIP (Cont.)
4) At the DOS prompt run the BIOS flash utility and update the BIOS chip with the correct
BIOS file for the first computer. If you get a warning message that the chipset and BIOS
does not match continue anyway. If the flash utility will not allow you to continue and it is
an AMI flash utility then re-run the flash utility using the ‘/X’ switch to enter the utilities
graphical interface and manually reprogram the BIOS from there.
5) Once the BIOS chip has been reprogrammed successfully carefully remove the BIOS
chip from the second computer and put it back into the first computer. Be sure to pay
close attention to the orientation of the chip so that you insert it correctly. Plugging in the
chip backwards will immediately damage both the chip and the motherboard.
6) Start the first computer. If all went well the first system should now be working again. If
not see the TROUBLESHOOTING PROBLEMS section below.
TROUBLESHOOTING PROBLEMS
PROBLEM: After following all of the directions the system will still not start normally. When the
system is powered on all it will do is try to access the floppy drive.
This would seem to indicate that the BIOS reprogramming was not successful or that
the BIOS ROM file was either damaged or not the correct one. Try the procedure
again using a different BIOS ROM file for your motherboard. Make sure that the BIOS
ROM file is for your exact motherboard model and revision.
PROBLEM: When the computer restarts the message ‘CMOS Checksum Bad’ and ‘Press F1 to
Enter Setup’ is displayed.
This is not necessarily a problem. This message is displayed when there are no
CMOS settings saved. This simply means that you need to set your system settings
(such as CPU speed, etc) Press whatever key you are prompted to and set the
CMOS settings accordingly.
PROBLEM: While trying to recover a AWARD BIOS the system starts to read from the floppy disk
and then stops and nothing else happens. When the system is rebooted it still has
the same problem.
This most likely indicates that there is something wrong with the boot disk. Double
check that the disk is bootable, contains the AUTOEXEC.BAT file, the BIOS flash
utility and the BIOS ROM (.BIN) file. If all of the files are present and the disk is
bootable then double check the AUTOEXEC.BAT file. Make sure that the name is
correct and that all of the commands are correct.
If you can see on the screen what the system is doing then try typing the commands
in the AUTOEXEC.BAT file manually to see if there is an error message that is
displayed. If everything checks out then try using a different BIOS ROM (.BIN) file. If
the problem persists use a different flash utility.
If you have any questions of comments regarding this procedure please e-mail me, my email
address is: davido@amptronusa.com
Here are some registry tricks which you can tryout :
1. Disable the Autorun Option in your CD Rom Drive:
Open your Registry and navigate to "HK_L_M\system\currentcontrolset\services\cdro m"
Change the value of 'Autorun', or create a new DWORD value if it doesn't already exist, and set the value as '0' for Autorun disabled.
2. Disable the Harddisk Lowdiskspace warning in Windows Xp
User Key: "HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
and
System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer"
create a new DWORD 'NoLowDiskSpaceChecks' and change its value to '1'.
3. Disable the Windows Key
"HK_L_M\system\currentcontrolset\control\keybo ard layout"
Create a new Binary value, or modify the existing value called 'Scancode Map' as shown below.
Value: 00 00 00 00 00 00 00 00 03 00 00 00 00 00 5B E0 00 00 5C E0 00 00 00 00
4. View System BIOS Information
Open Registry and navigate to
"HK_L_M\hardware\description\system"
5. Change the Title of Windows Media Player
"HK_C_USER\software\policies\microsoft\windowsmedi a player\"
Create a new string value called ' TitleBar' and change text as your wish.
6. Disable Internet access in Network
Open Registry and make the following changes
"KH_C_User\software\microsoft\windows\currentversi o n\internetsettings\"
Change the value of "Proxyenabled" to 1 and change the value of "proxyserver" and set it to an ip address. Change the value of the ip address and port to "10.0.0.1:5555"
7. Disable the ability to Right click on the desktop
"HK_C_User\software\microsoft\windows\currentversi o n\policies\explorer\"
Create a DWORD "NoViewContextMenu" and change its value to "0" for disabling and "1" for enabling.
8. Hide all items on desktop
"HK_C_USER\software\microsoft\windows\currentversi o n\policies\explorer\"
and
"HK_L_M\software\microsoft\windows\currentversion\ p olicies\explorer\"
create a new DWORD "NoDesktop" and change its value to "1"
You can show all the items in the desktop by chaning the value to "0"
9. Disable the "Change Password" button in windows
"HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\System"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersi on\Policies\System"
Create a new DWORD "DisableChangePassword" and change its value to "0" for disabling and "1" for enabling.
10. Disable the "cancel" button or pressing the "Esc" key while logging on to Windows"
"HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\Cu r rentVersion\Run"
Create a new string value "NoLogon" and change its value to "RUNDLL32 shell32,SHExitWindowsEx 0"
11. Remove "Log off" from start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer"
Create a new DWORD "NoLogOff" and change its value to "1" for disabling and "0" for enabling.
12. Clear the Recent playlist in Media Player
Navigate to "HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\ P layer"
And clear the "RecentFileList" subkey.
13. Empty temporary Internet files on exit (in Internet Explorer)
"HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Internet Settings\Cache"
and
"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Cur r entVersion\Internet Settings\Cache"
Create a new DWORD "Persistent" and change the value to "0" for emptying and "1" to remove this option.
14. Clear the Internet Explorere typed addresses history
"HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs"
And delete the subkeys.
15. Remove recent documents from start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer"
Create a new DWORD "NoRecentDocsMenu" and change its value to "1".
16. Remove Network connections from start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer"
Create a new DWORD "NoNetworkConnections" and change its value to "1".
17. Remove My documents from start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer"
Create a new DWORD "NoSMMyDocs" and change its value to "1".
18. Remove My pictures from start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer "
Create a new DWORD "NoSMMyPictures" ad change its value to "1".
19. Remove My music fro start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer"
Create a new DWORD "NoStartMenuMyMusic" and change its value to "1".
20. Reboot windows after crash
"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contr o l\CrashControl"
Create a new DWORD "AutoReboot" and change its value to "1".Restart the machine for the effect to take place.
21. Disable the use of MSDos
User Key: "HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\WinOldApp"
and
System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\WinOldApp"
Create a new DWORD "Disabled" and set its value to "1". Change it to "0" for enabling.
22. Enable Directory completion in MSDos prompt
User Key: "HKEY_CURRENT_USER\Software\Microsoft\Command Processor"
and
System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor"
Create a new DWORD "PathCompletionChar " and set it to equal the hex value of the required control character.
23. Quick edit the command prompt
User Key: "HKEY_CURRENT_USER\Console"
and
System Key: "HKEY_USERS\.DEFAULT\Console"
Create a new DWORD "QuickEdit" and set its value to "1" for enabling and "0" for disabling.
24. Disable Registry editing
"HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Curr e ntVersion\Policies\System"
Create a new DWORD "DisableRegistryTools" and change its value to "0" for allowing Regedit and "1" for disabling it.
25. Disable task scheduler
" HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion\RunServices"
Delete the value from "SchedulingAgent". Usually its value is set to "'mstask.exe".
26. Remove My computer from desktop and start menu
User Key: "HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\NonEnum"
and
System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\NonEnum"
Create "{20D04FE0-3AEA-1069-A2D8-08002B30309D}" and change its value to "1" for removing. Change its value to "0" for showing.
27. Show Windows version on desktop
User Key: "HKEY_CURRENT_USER\Control Panel\Desktop"
Create a new DWORD " PaintDesktopVersion" and change its value to "1" for showing and "0" for removing.
28. Remove My documenst from desktop
Windows 95, 98 and Me
"HKEY_CURRENT_USER\Software\Classes\CLSID\{450D8FB A -AD25-11D0-98A8-0800361B1103}\ShellFolder"
Windows NT, 2000 and XP
"HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Explorer\CLSID\{450D8FBA-AD25-11D0-98A8-0800361B1103}\ShellFolder"
Modify the value called "Attributes" as "0xf0500174" to hide or "0xf0400174" to show.
29. Disable Scan disk after improper shutdown
" HKEY_LOCAL_MACHINE\System\CurrentControlSet\Contro l\FileSystem"
create a new DWORD "DisableScandiskOnBoot" and change its value to "01" for disablng and "00" for enabling.
30. Automatically end Hung programs.
" HKEY_CURRENT_USER\Control Panel\Desktop"
and
"System Key: [HKEY_USERS\.DEFAULT\Control Panel\Desktop"
Modify the value of "AutoEndTasks" to "1".
Windows uses 20% of your bandwidth! Get it back
A nice little tweak for XP. Microsoft reserve 20% of your available bandwidth for their own purposes (suspect for updates and interrogating your machine etc..)
Here's how to get it back:
Click Start-->Run-->type "gpedit.msc" without the "
This opens the group policy editor. Then go to:
Local Computer Policy-->Computer Configuration-->Administrative Templates-->Network-->QOS Packet Scheduler-->Limit Reservable Bandwidth
Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab :
"By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.
works on XP Pro, and 2000 other OS not tested.
Does'nt work on winxp home
How to Convert a FAT Partition to NTFS
To convert a FAT partition to NTFS, perform the following steps.
Click Start, click Programs, and then click Command Prompt.
In Windows XP, click Start, and then click Run.
At the command prompt, type CONVERT [driveletter]: /FS:NTFS.
Convert.exe will attempt to convert the partition to NTFS.
NOTE: Although the chance of corruption or data loss during the conversion from FAT to NTFS is minimal, it is best to perform a full backup of the data on the drive that it is to be converted prior to executing the convert command. It is also recommended to verify the integrity of the backup before proceeding, as well as to run RDISK and update the emergency repair disk (ERD).
Convert.exe will attempt to convert the partition to NTFS.
Bookmarks