Page 4 of 20 FirstFirst ... 2345614 ... LastLast
Results 31 to 40 of 197

Thread: Tips and Tricks

  1. #31
    Join Date
    Jan 2006
    Location
    Press F13 to find the location
    Posts
    615

    Default Hide ZIP FOlDERS.

    To hide zip folder's in windows xp go with the following command's.

    Start--->Run type regsvr32 /u zipfldr.dll

    that's it.

  2. #32
    Join Date
    Jan 2006
    Location
    Press F13 to find the location
    Posts
    615

    Default Automated System Recovery overview in Windows XP

    Automated System Recovery overview in Windows XP
    View products that this article applies to.

    SUMMARY
    The purpose of this article is to describe Automated System Recovery in Microsoft Windows XP and to list supported information between the original release of Microsoft Windows XP, Windows XP Service Pack 1 (SP-1), and Windows XP Service Pack 1a (SP-1a).
    MORE INFORMATION
    Microsoft recommends that you regularly create Automated System Recovery (ASR) sets as part of an overall plan for system recovery so that you are prepared if the system fails. ASR should be a last resort for system recovery. Use ASR only after you have exhausted other options. For example, you should first try Safe Mode Boot and Last Known Good.

    ASR is a two-part system; it includes ASR backup and ASR restore. The ASR Wizard, located in Backup, does the backup portion. The wizard backs up the system state, system services, and all the disks that are associated with the operating system components. ASR also creates a file that contains information about the backup, the disk configurations (including basic and dynamic volumes), and how to perform a restore.

    You can access the restore portion by pressing F2 when prompted in the text-mode portion of setup. ASR reads the disk configurations from the file that it creates. It restores all the disk signatures, volumes, and partitions on (at a minimum) the disks that you need to start the computer. ASR will try to restore all the disk configurations, but under some circumstances it might not be able to. ASR then installs a simple installation of Windows and automatically starts a restoration using the backup created by the ASR Wizard.

    For more information about how to set up and use Automated System Recovery in Microsoft Windows XP, visit the following Microsoft Web site:
    http://www.microsoft.com/technet/pro...ntain/asr.mspx

  3. #33
    Join Date
    Jan 2006
    Location
    Press F13 to find the location
    Posts
    615

    Default Remove Google Ads in Mozilla Firefox

    Although, Common Ads can be removed from Firefox Using AdBlock Extension, there's nothing availble to actually remove those Google Text Framed Ads we see, you can always Right click and Block, but that's a temporary solution, here's How you can Get rid of those ads for once and for all!
    Tools You Need:
    Mozilla Firefox Browser
    ChromeEdit Extension For Firefox
    Download and Install ChromEdit, which let's you Edit User Files, Restart Firefox, and Open ChromEdit
    Go to userContent.css and add the following Code:
    Code:
    /* Block Ads v.2004-06-12 by Neil Jenkins 
       Portions of this ruleset are derived from the ad blocking css by Joe Francis at: 
       http://www.floppymoose.com/ 
       Some code also contributed by Mike Hokenson: 
       http://www.gozer.org/mozilla/ad_blocking 
    */ 
    
    iframe[width="120"][height="600"], a img[width="120"][height="600"], 
    iframe[width="125"][height="600"], a img[width="125"][height="600"], 
    iframe[width="150"][height="100"], a img[width="150"][height="100"], 
    iframe[width="150"][height="600"], a img[width="150"][height="600"], 
    iframe[width="160"][height="600"], a img[width="160"][height="600"], 
    iframe[width="300"][height="250"], a img[width="300"][height="250"], 
    iframe[width="336"][height="280"], a img[width="336"][height="280"], 
    iframe[width="468"][height="60"],  a img[width="468"][height="60"], 
    iframe[width="470"][height="62"],  a img[width="470"][height="62"], 
    iframe[width="728"][height="90"],  a img[width="728"][height="90"], 
    iframe[width="730"][height="92"],  a img[width="730"][height="92"], 
    iframe[width="600"][height="120"], object[width="125"][height="300"], 
    iframe[width="180"][height="150"], 
    iframe[src*="/ad-"], 
    iframe[src*="/ad."], 
    iframe[src*="/ad/"], 
    iframe[src*="/ad_"], 
    iframe[src*="/adframe"], 
    iframe[src*="/ads"], 
    iframe[src*="/adv"], 
    iframe[src*="/adx"], 
    iframe[src*=".ad"], 
    iframe[src*="_Banner"], 
    iframe[src*="BET365"], 
    iframe[src*="/click"], 
    iframe[src*="?click"], 
    iframe[src*="googlesyndication"], 
    iframe[src*="promos"], 
    iframe[name="bsadframe"], 
    iframe[id="adFrame"], 
    iframe[id="splashFrame"], 
    img[src*="/ad-"], 
    img[src*="/ad."], 
    img[src*="/ad/"], 
    img[src*="/ad_"], 
    img[src*="/ads"], 
    img[src*="/adv"], 
    img[src*="/adx"], 
    img[src*=".ad"], 
    img[src*="_ad_"], 
    img[src*="/click"], 
    img[src*="?click"], 
    img[src*="Editorial_Promos"], 
    img[src*="/toms_skyscraper_"], 
    img[src$="images/logos/amazon_international.gif"], 
    img[src*="freshmeat.net/button.gif"], 
    img[src*="pic.geocities.com/images/"], 
    img[src*="i.imdb.com/Vpics/"], 
    img[src*="i.imdb.com/Photos/CMSIcons"], 
    img[src*="i.imdb.com/Icons/apix/"], 
    img[src*="i.imdb.com/Icons/kpix/"], 
    img[src*="i.imdb.com/apix/"], 
    img[src*="sportsbybrooks.com/farkbutton.gif"], 
    img[alt*="advert"], 
    img[alt*="Click Here To Visit Our Sponsor"], 
    img[alt*="Sponsored Links"], 
    img[name="fixedSpImg"], 
    a:link[href*="/ad-"] img, 
    a:link[href*="/ad."] img, 
    a:link[href*="/ad/"] img, 
    a:link[href*="/ad_"] img, 
    a:link[href*="/ads"] img, 
    a:link[href*="/adv"] img, 
    a:link[href*="/adx"] img, 
    a:link[href*=".ad"] img, 
    a:link[href*="/banner"] img, 
    a:link[href*="/click.cgi"] img, 
    a:link[href*="/clickcgi?"] img, 
    a:link[href*="/clickover"] img, 
    a:link[href*="/clickthr"] img, 
    a:link[href*="/click-"] img, 
    a:link[href*="=click"] img, 
    a:link[href*="?click"] img, 
    a:link[href*="/A="] img, 
    table table table[width="346"][height="280"], 
    table[class="metatable"], 
    table[id="RefAd"], 
    table[cellspacing="0"][width="160"][height="329"][bgcolor="#000000"], 
    table[cellpadding="5"][width="150"][style="border: 1px dashed rgb(221, 170, 170); background-color: rgb(236, 248, 255);"], 
    table[border="0"][height="600"][width="120"], 
    table[height="90"][cellspacing="0"][cellpadding="0"][width="728"][border="0"], 
    table[border="0"][cellpadding="3"][cellspacing="0"][height="40"][width="100%"], 
    table[border="0"][cellpadding="0"][cellspacing="4"][align="right"][width="20%"], 
    table[border="2"] td[valign="top"][bgcolor="#ffffff"] table[width="138"], 
    table[border="0"][cellpadding="1"][cellspacing="0"][width="626"][bgcolor="#6699cc"], 
    table[bordercolor="red"][height="225"][cellspacing="0"][cellpadding="0"][width="190"][bgcolor="white"][border="0"], 
    table[width="336"][border="0"][cellspacing="0"][cellpadding="0"][align="right"][style="margin-left: 10px; margin-bottom: 10px;"], 
    table[width="770"][border="0"] tr[valign="top"] 
    td[width="160"], 
    td[class="cnnNavAd"], 
    td[class="RHBarBody"], 
    td[class="sl-table"], 
    td[style="border-bottom: 1px solid rgb(204, 204, 204); padding: 7px 3px; background-color: rgb(255, 254, 249);"], 
    td span[class="aoltextad"], 
    form[name="frmLargeForm"], 
    form[action*="click_lx.cgi"], 
    form[action^="http://rd.yahoo.com/"], 
    form[action=""][name$="SoapCity"], 
    form[action=""][name^="728x90"], 
    form[action=""][name^="300x250"], 
    form[method="get"][action*="martindale"][name="MDH"], 
    embed[type="application/x-shockwave-flash"][src*="_Banner"], 
    embed[type="application/x-shockwave-flash"][src*="/ad"], 
    embed[type="application/x-shockwave-flash"][href*="/ad"], 
    embed[type="application/x-shockwave-flash"][src*=".ad"], 
    embed[type="application/x-shockwave-flash"][href*=".ad"], 
    embed[type="application/x-shockwave-flash"][src*="?click"], 
    embed[type="application/x-shockwave-flash"][href*="?click"], 
    embed[type="application/x-shockwave-flash"][src*="/click"], 
    embed[type="application/x-shockwave-flash"][href*="/click"], 
    embed[type="application/x-shockwave-flash"][href*="promos"], 
    embed[type="application/x-shockwave-flash"][href*="=click"], 
    embed[type="application/x-shockwave-flash"][href*="redirect"], 
    embed[type="application/x-shockwave-flash"][href*="/A="], 
    embed[type="application/x-shockwave-flash"][name*="advert"], 
    embed[type="application/x-shockwave-flash"][name*="banner"], 
    embed[type="application/x-shockwave-flash"][width="728"][height="90"], 
    embed[type="application/x-shockwave-flash"][width="468"][height="60"], 
    embed[type="application/x-shockwave-flash"][width="467"][height="63"], 
    div[id="adstrip"], 
    div[id*="advert"], 
    div[id="dropin"], 
    div[id="dwindow"], 
    div[id="dcv_EchangeLay"], 
    div[id="mntl"], 
    div[id*="popup"], 
    div[id="quack"], 
    div[id="splashLayer"], 
    div[id*="sponsor"], 
    div[id="yschsec"], 
    div[class="ovt"], 
    div#contextualLinks, 
    div[style="border: 1px solid rgb(221, 221, 221); padding: 5px; background-color: rgb(255, 255, 255);"], 
    object[id="widgeth"], 
    *[class="ad"], 
    *[class*="eSext"], 
    *[name*="klipad"], 
    *[style*="/ads/"], 
    *[id*="popover_"], 
    *[src*="120x80"], 
    *[src*="140x"], 
    *[src*="?ad"], 
    *[src*="-ad-"], 
    *[src*="/adimage"], 
    *[src*="/adimg"], 
    *[src*="advert"], 
    *[src*="=click"], 
    *[src*="banners."], 
    *[src*="banner_ads"], 
    *[src*="/images/dinkus/more-arrow-lo.gif"], 
    *[src*="/javaImages/ec/"], 
    *[src*="/offer"], 
    *[src*="/puffboxes/"], 
    *[src*="/sponsors/"], 
    *[src*="_sponsor_"], 
    *[src*="/us.yimg.com/a/ya"], 
    *[src*=".adbutler.de"], 
    *[src*=".nedstatbasic.net"], 
    *[src*=".tradedoubler.com"], 
    *[src*=".travelocity./Sponsor_gifs/"], 
    *[src*="a.consumer.net"], 
    *[src*="bannermania.nom.pl"], 
    *[src*="cash4banner.com"], 
    *[src*="crazypopups.com"], 
    *[src*="hit-now.com"], 
    *[src*="hitbox.com"], 
    *[src*="img.thebugs.ws"], 
    *[src*="kinghost.com/ban/"], 
    *[src*="klipmart"], 
    *[src*="popupad.net/ats/"], 
    *[src*="public"][src*="ad"], 
    *[src*="/publicidad/"], 
    *[src*="qkimg.net"], 
    *[src*="qksrv.net"], 
    *[src*="rcm-images.amazon.com"], 
    *[src*="rcm.amazon.com"], 
    *[src*="salon.com/Creatives"], 
    *[src*="sexcounter."], 
    *[src*="sideads/"], 
    *[src*="statse.webtrendslive.com"], 
    *[href*="logging.to"], 
    *[href*="/referral/"], 
    *[href*="tryaol"], 
    *[href*="websponsors"], 
    *[src*="banman.asp"], 
    *[href*="banman.asp"], 
    *[src*="bannerman"], 
    *[href*="bannerman"], 
    *[src*="?banner"], 
    *[href*="?banner"], 
    *[src*="/banner/"], 
    *[href*="/banner/"], 
    *[src*="/jump/"], 
    *[href*="/jump/"], 
    *[src*="adfarm"], 
    *[href*="adfarm"], 
    *[src*="advertising.com"], 
    *[href*="advertising.com"], 
    *[src*="ar.atwola.com"], 
    *[href*="ar.atwola.com"], 
    *[src*="atdmt.com"], 
    *[href*="atdmt.com"], 
    *[src*="bluestreak.com"], 
    *[href*="bluestreak.com"], 
    *[src*="clickxchange.com"], 
    *[href*="clickxchange.com"], 
    *[src*="doubleclick"], 
    *[href*="doubleclick"], 
    *[src*="falkag.net"], 
    *[href*="falkag.net"], 
    *[src*="fastclick.com"], 
    *[href*="fastclick.com"], 
    *[src*="mediaplex"], 
    *[href*="mediaplex"], 
    *[src*="netdirect.nl"], 
    *[href*="netdirect.nl"], 
    *[src*="spinbox."], 
    *[href*="spinbox."], 
    *[src*="tradedoubler.com"], 
    *[href*="tradedoubler.com"], 
    *[src*="transfer.go"], 
    *[href*="transfer.go"], 
    *[src*=".tribalfusion"], 
    *[href*=".tribalfusion"], 
    *[src*="valueclick"], 
    *[href*="valueclick"], 
    *[src*="http://216.92.211.171/"], 
    *[href*="http://216.92.211.171/"], 
    *[src*="http://216.92.21.16/"], 
    *[href*="http://216.92.21.16/"] { 
            display: none !important; 
    } 
    
    img[src*=".advance"], 
    img[src*="/click_"], 
    img[src*="/cnn/images/clickability/"], 
    img[src*="/logo2.m"], 
    img[src$="/banners/com000.jpg"], 
    a:link[href*=".add"] img, 
    a:link[href*="admin"] img, 
    a:link[href*="adobe"] img, 
    a:link[href*=".adp"] img, 
    a:link[href*="/advance"] img, 
    a:link[href*="click.mp3"] img, 
    a:link[href*="/imgres?imgurl="] img, 
    a:link[href*=":head"] img, 
    a:link[href*="http://nettracker."] img, 
    embed[type="application/x-shockwave-flash"][src*="gallery"] { 
            display: inline !important; 
    } 
    #rh table[class=”metatable”]{display: none !important;} 
    #rh div[class=”c”] {display: none !important;}
    it's Really worth it considering, the page layout gets much cleaner after the hack.
    PS: It removes Framed Yahoo! Ads as well, but not the Sidebar ons on Geocities Website.

  4. #34
    Join Date
    Jan 2006
    Location
    Mera Bharat Mahan
    Posts
    1,961

    Default

    Now this 1 I dint knew
    real great tip
    I dont use Firefox
    But will try this tip on it
    I love clean layout of website
    and dats y I use Maxthon

  5. #35
    Join Date
    Aug 2005
    Location
    India
    Posts
    1,544

    Default

    i will read this tips and reply tuluvaguy.thanks for sharing.
    And Guttu i was wondering why the language bar comes automatically i load windows. now i know the reason. thanks for the tip guttu.

  6. #36
    Join Date
    Jan 2006
    Location
    Press F13 to find the location
    Posts
    615

    Default save addl disk space thus ...............

    heres how u can save additional disk space,
    using "remove hotfix backups v 2.1.6" Cool

    when u install Windows Update, backup folders r created for the files that were replaced during the update. These are created so that you can easily uninstall a particular Hotfix, if it causes problems with your system. If your system is running stable and you don't need to uninstall the hotfixes, then you can safely remove the backup files to free up disk space. u can alway manually delete the $uninstallxxxxx folders and the addremove/ registry entries; or u can use 'remove hotfix backups utility v 2.1.6' which does a smart job at it !

    This small freeware utility will locate the Hotfixes that have created backup files on your system, and will remove those backups. It will also removes the associated Registry entries for these items in Add/Remove Programs.

    Arrow click http://www.dougknox.com/xp/utils/xp_hotfix_backup.htm

    the sitehttp://<a href="http://www.dougknox....index.html</a>also offers an excellant
    range of tips, trick, utilitys, and fixes for winxp. check it out

  7. #37
    Join Date
    Jan 2006
    Location
    Press F13 to find the location
    Posts
    615

    Default Protecting your Windows system

    Too many people these days are coming into the forums requesting help on massively infected systems. So, I thought I'd compile something for the newbies like me that may be useful to help prevent infections and other useless trash on your computer.

    Step One: The Core

    This is the single most important piece of your computer. Chances are that if there's something wrong with this, the weakest link in the chain, everything will come crashing straight on top of you. I am talking about the Single Point of Failure (SPoF) on your system - the Operating System.

    This critical piece (actually, make that ultra-hyper-mega-critical) of software is what manages the entire show and you dont want any unnecessary software messing with it. Not all Operating Systems are created equal. Technically speaking, server OSes are some of the safest OSes around. But usually you cannot go around installing these OSes unless you're a total geek with around 10 computers around your home and you need software to centrally manage them. When it comes to a single desktop OS, currently Microsoft Windows XP rules the roost.

    Your choice of Windows OS preference in the order of safest first is:
    Windows XP Professional
    Windows XP Home
    Windows 2000 Professional
    Windows NT 4.0
    Windows 98 SE
    Windows ME
    Windows 98
    Windows 95

    I would recommend you either stick to the Windows XP OSes, Windows 2000 Professional or Windows 98 SE. Needless to say, Microsoft Windows XP is currently the most safe computing environment for a user. And that neatly brings us to our next topic.

    Step Two: Patching it Up

    No OS is secure if you are running it straight out of the box. A long list of vulnerabilities are detected by security experts and Microsoft routinely releases update software to address these vulnerabilities and close them. Updates may either be :
    Service Packs
    Critical Updates
    Hotfixes
    Cumulative Updates / Rollups
    Hardware Updates
    Optional Updates

    Service Packs (SP) are comprehensive updates to the OS, fixing every single vulnerability in the OS since the release of the OS itself or the last SP release. SP's also include major OS changes, newer updates to system files and they contain every single update to the OS that has ever been released. Also, SPs are cumulative, so if you were to install SP1, it would contain every single update since the OS release and if you install SP2, it would contain every single update that has been released since SP1, and it would also include the updates of SP1 also. So, if you are patching an OS with an SP, you dont have to go around installing SP1, then SP2, SP3, etc. Installing the latest SP would mean you're getting all the updates. The latest SPs for the various OS are:
    Windows XP - SP2:

    The best way to get SP2 for Windows XP is either via Automatic Updates (I will get to this later), Windows Update, ordering the free Service Pack 2 from Microsoft.

    Microsoft only releases an SP for the OSes that can be used as full-fledged network clients, so there are no SPs for Windows ME, 98 SE, 98 and 95, only the standalone updates. However, an Unofficial SP exists for Microsoft Windows 98 SE.

    Critical Updates are those very important updates that Microsoft releases in response to a threat against the Windows OS. There is no option and these should not be avoided. Installing these updates is a must if you dont want your system exploited or open to infection. Microsoft usually releases a slew of these updates every month.

    Hotfixes are patches to existing Windows components that address a vulnerability in the code and are released as and when the vulnerabilities are discovered. Needless to say, you need these as well if you want to protect your OS.

    Cumulative Updates and security Rollups are a bunch of related updates and hotfixes that enhance the security of the Windows component and also patch any existing unpatched vulnerability. Of course, you need these too.

    Hardware Updates can sometimes be found on Windows Update when your hardware manufacturer, like your motherboard manufacturer, releases patches, fixes and updates that usually add functionality and improve performance of your hardware components. While these updates are optional, it is recommended that you install them because they often boost your hardware's performance and provide newer functionality that you can take advantage of.

    Optional Updates are just that. They're optional and its your choice whether you wish to update/upgrade them. Usually, these fall in the category of extra tools for the Windows OS such as a newer Media Player, a Journal Viewer, Movie Editing Software, software to make applications programmed in the .NET environment to work, etc. You can safely ignore these updates if you are not planning to use them.

    Microsoft releases a number of updates on the second Tuesday of every month, which many of us geeks fondly call "Patch Tuesday". Make sure you bookmark this day in your calendar each month and check for updates. Also, if a threat is severe enough, it may make the people at Microsoft release an update before the planned Patch Tuesday.

    Also, most programs have updates for themselves. While some are improvements on features, its not uncommon for products to include security enhancements as well. Keep track of the products you're using and check for updates for your software products regularly. This is especially important when it comes to Microsoft Office products as their updates can have a significant impact on sysem security. You can always visit Office Update to check for the latest updates to your Office products.

    Step Two Point Five: Honesty Pays

    It is worthwhile to mention that when it comes to Windows OSes, it is better to pay for a legal, genuine copy of the OS to enable you to get the latest updates without a hassle. When it comes to Windows XP, it will not allow you to install a genuine copy of the SP or some critical fixes unless you have a legit version of the OS. Yes, cracked SPs exist and you can always install them, but you will be doing the world a lot of good, not to mention yourself, if you just get yourself a legit copy of at least Windows XP Home. You just spent over 20,000 on that new computer, the least you can do is spend another 4000 and live quite happily afterwards.

    Step Three: Securing the OS

    Here we will take a look at securing the OS itself without using any third party software. The most important tool here is the "Automatic Updates" option. You can usually find this option in the Control Panel, if you are running Windows ME, Windows 2000 (with the appropriate SP) or Windows XP.

    When you open the Automatic Updates option, you will be faced with a couple of options including (exact wordings may differ)
    Automatically Download and Install Updates
    Download Updates but let me choose when to install them
    Notify me of updates but do not automatically download or install them
    Turn off Automatic Updates

    It is recommended that you select Option 3 - "Notify me of updates but do not automatically download or install them" instead of Option 4, turning off the Auto Update feature. This way, when an important update is released, the Automatic Updates feture will inform you that updates are available for your OS and you can go to Windows Update and download and install them at your convenience. Also this way, you can tell when an update is being offered before the Patch Tuesday cycle and stay protected.

    Windows XP comes with a built in Firewall to protect your computer, but its not a worthy solution when compared to a standalone firewall, so I will skip that in favor of a third party firewall solution.

    Also, make sure you secure your user account with a password so that no one can fiddle with your system in your absence and then damage the OS.

    Windows XP, when patched with Service Pack 2, comes with a Security Center option that can be accessed via the Control Panel. When you restart your computer after installing SP2, you will be prompted to choose an Automatic Updates method (1 out of the 4 choices) The Security Center also monitors the status of the built-in Windows Firewall, which is enabled by default and also the status of your antivirus program, whether it is on, turned off or if it requires an update. However, it only works with well known antivirus solutions. If any of these components are not working right or are turned off or disabled, the Security Center will pop up a warning in your system tray notification area, alerting you.

    Step Four: Protection with Third Party Software

    Antivirus Solutions

    The biggest threat to a Windows system is a virus. How or why a virus attacks and how it spreads, I am not going to go into here. Usually a virus spreads through one of these mediums:
    a) an infected floppy or CD
    b) an infected file over the network
    c) an infected file from the Internet
    d) an infected file you received via e-mail or instant messenger.

    An antivirus program is a third party solution that runs all the time in your system and monitors and protects your system from viruses and maybe, other threats, depending on the product and its version. It includes a scanning engine and a list of signatures of known viruses that it compares to files staying in your computer's memory and hard disk as well as the ones coming in and going out. If it detects a virus, it immediately stops the activity of the file and informs you about the virus' presence and prompts you to either clean the file or delete it. It should be noted that the major antivirus vendors, McAfee, Symantec, Trend Micro, Kaspersky, etc. release newer versions of their antivirus programs at least once each year in addition to releasing "updates" for the antivirus program every week.

    You should have the latest version of the antivirus programs running at all times, and should also make sure its updated every week with the latest virus "signatures." Failure to do any of these two steps may mean an immediate infection. All antivirus programs come with an Automatic Update feature built in that will automatically contact its server and look for available updates and then download and install them automatically. It is recommended that you leave this feature turned on.

    Here are a list of instructions that you should actively follow to prevent an infection:
    a) Make sure you use the latest version of your antivirus and keep it updated weekly and make sure its auto-update feature is turned on.
    b) Never use a CD or a floppy without scanning it for viruses.
    c) Do not open files from the Internet without scanning them with the antivirus. Most download managers can integrate with the antivirus program to automatically scan the downloaded files. Turn this feature on.
    d) Do not accept and download files from an Instant Messenger conversation if you do not know what it is. Also, all instant messengers can integrate with the antivirus. Turn this feature on.
    e) Never open an attachment from an email, no matter what extension it is, without first scanning it with an antivirus. Again, all email clients can integrate with your antivirus solution to automatically scan for viruses in your emails.



    Too many people these days are coming into the forums requesting help on massively infected systems. So, I thought I'd compile something for the newbies that may be useful to help prevent infections and other useless trash on your computer.

    Step One: The Core

    This is the single most important piece of your computer. Chances are that if there's something wrong with this, the weakest link in the chain, everything will come crashing straight on top of you. I am talking about the Single Point of Failure (SPoF) on your system - the Operating System.

    This critical piece (actually, make that ultra-hyper-mega-critical) of software is what manages the entire show and you dont want any unnecessary software messing with it. Not all Operating Systems are created equal. Technically speaking, server OSes are some of the safest OSes around. But usually you cannot go around installing these OSes unless you're a total geek with around 10 computers around your home and you need software to centrally manage them. When it comes to a single desktop OS, currently Microsoft Windows XP rules the roost.

    Your choice of Windows OS preference in the order of safest first is:
    Windows XP Professional
    Windows XP Home
    Windows 2000 Professional
    Windows NT 4.0
    Windows 98 SE
    Windows ME
    Windows 98
    Windows 95

    I would recommend you either stick to the Windows XP OSes, Windows 2000 Professional or Windows 98 SE. Needless to say, Microsoft Windows XP is currently the most safe computing environment for a user. And that neatly brings us to our next topic.


    Step Two: Patching it Up

    No OS is secure if you are running it straight out of the box. A long list of vulnerabilities are detected by security experts and Microsoft routinely releases update software to address these vulnerabilities and close them. Updates may either be :
    Service Packs
    Critical Updates
    Hotfixes
    Cumulative Updates / Rollups
    Hardware Updates
    Optional Updates

    Service Packs (SP) are comprehensive updates to the OS, fixing every single vulnerability in the OS since the release of the OS itself or the last SP release. SP's also include major OS changes, newer updates to system files and they contain every single update to the OS that has ever been released. Also, SPs are cumulative, so if you were to install SP1, it would contain every single update since the OS release and if you install SP2, it would contain every single update that has been released since SP1, and it would also include the updates of SP1 also. So, if you are patching an OS with an SP, you dont have to go around installing SP1, then SP2, SP3, etc. Installing the latest SP would mean you're getting all the updates. The latest SPs for the various OS are:

    Windows XP - SP2:
    The best way to get SP2 for Windows XP is either via Automatic Updates (I will get to this later), Windows Update, ordering the free Service Pack 2 from Microsoft, (click this link to place your order) or from the Digit September 2004 CD/DVD. However, if you want to download it yourself, a larger network install can be downloaded here.

    Windows 2000 - SP4 Download

    Windows NT 4.0 - SP6a Download

    Microsoft only releases an SP for the OSes that can be used as full-fledged network clients, so there are no SPs for Windows ME, 98 SE, 98 and 95, only the standalone updates. However, an Unofficial SP exists for Microsoft Windows 98 SE.

    Windows 98 SE Unofficial SP - Version 2.0 RC1 Download

    Critical Updates are those very important updates that Microsoft releases in response to a threat against the Windows OS. There is no option and these should not be avoided. Installing these updates is a must if you dont want your system exploited or open to infection. Microsoft usually releases a slew of these updates every month.

    Hotfixes are patches to existing Windows components that address a vulnerability in the code and are released as and when the vulnerabilities are discovered. Needless to say, you need these as well if you want to protect your OS.

    Cumulative Updates and security Rollups are a bunch of related updates and hotfixes that enhance the security of the Windows component and also patch any existing unpatched vulnerability. Of course, you need these too.

    Hardware Updates can sometimes be found on Windows Update when your hardware manufacturer, like your motherboard manufacturer, releases patches, fixes and updates that usually add functionality and improve performance of your hardware components. While these updates are optional, it is recommended that you install them because they often boost your hardware's performance and provide newer functionality that you can take advantage of.

    Optional Updates are just that. They're optional and its your choice whether you wish to update/upgrade them. Usually, these fall in the category of extra tools for the Windows OS such as a newer Media Player, a Journal Viewer, Movie Editing Software, software to make applications programmed in the .NET environment to work, etc. You can safely ignore these updates if you are not planning to use them.

    Microsoft releases a number of updates on the second Tuesday of every month, which many of us geeks fondly call "Patch Tuesday". Make sure you bookmark this day in your calendar each month and check for updates. Also, if a threat is severe enough, it may make the people at Microsoft release an update before the planned Patch Tuesday.

    Also, most programs have updates for themselves. While some are improvements on features, its not uncommon for products to include security enhancements as well. Keep track of the products you're using and check for updates for your software products regularly. This is especially important when it comes to Microsoft Office products as their updates can have a significant impact on sysem security. You can always visit Office Update to check for the latest updates to your Office products.

    Step Two Point Five: Honesty Pays

    It is worthwhile to mention that when it comes to Windows OSes, it is better to pay for a legal, genuine copy of the OS to enable you to get the latest updates without a hassle. When it comes to Windows XP, it will not allow you to install a genuine copy of the SP or some critical fixes unless you have a legit version of the OS. Yes, cracked SPs exist and you can always install them, but you will be doing the world a lot of good, not to mention yourself, if you just get yourself a legit copy of at least Windows XP Home. You just spent over 20,000 on that new computer, the least you can do is spend another 4000 and live quite happily afterwards.

    Step Three: Securing the OS

    Here we will take a look at securing the OS itself without using any third party software. The most important tool here is the "Automatic Updates" option. You can usually find this option in the Control Panel, if you are running Windows ME, Windows 2000 (with the appropriate SP) or Windows XP.

    When you open the Automatic Updates option, you will be faced with a couple of options including (exact wordings may differ)
    Automatically Download and Install Updates
    Download Updates but let me choose when to install them
    Notify me of updates but do not automatically download or install them
    Turn off Automatic Updates

    It is recommended that you select Option 3 - "Notify me of updates but do not automatically download or install them" instead of Option 4, turning off the Auto Update feature. This way, when an important update is released, the Automatic Updates feture will inform you that updates are available for your OS and you can go to Windows Update and download and install them at your convenience. Also this way, you can tell when an update is being offered before the Patch Tuesday cycle and stay protected.

    Windows XP comes with a built in Firewall to protect your computer, but its not a worthy solution when compared to a standalone firewall, so I will skip that in favor of a third party firewall solution.

    Also, make sure you secure your user account with a password so that no one can fiddle with your system in your absence and then damage the OS.

    Windows XP, when patched with Service Pack 2, comes with a Security Center option that can be accessed via the Control Panel. When you restart your computer after installing SP2, you will be prompted to choose an Automatic Updates method (1 out of the 4 choices) The Security Center also monitors the status of the built-in Windows Firewall, which is enabled by default and also the status of your antivirus program, whether it is on, turned off or if it requires an update. However, it only works with well known antivirus solutions. If any of these components are not working right or are turned off or disabled, the Security Center will pop up a warning in your system tray notification area, alerting you.

    Step Four: Protection with Third Party Software

    Antivirus Solutions

    The biggest threat to a Windows system is a virus. How or why a virus attacks and how it spreads, I am not going to go into here. Usually a virus spreads through one of these mediums:
    a) an infected floppy or CD
    b) an infected file over the network
    c) an infected file from the Internet
    d) an infected file you received via e-mail or instant messenger.

    An antivirus program is a third party solution that runs all the time in your system and monitors and protects your system from viruses and maybe, other threats, depending on the product and its version. It includes a scanning engine and a list of signatures of known viruses that it compares to files staying in your computer's memory and hard disk as well as the ones coming in and going out. If it detects a virus, it immediately stops the activity of the file and informs you about the virus' presence and prompts you to either clean the file or delete it. It should be noted that the major antivirus vendors, McAfee, Symantec, Trend Micro, Kaspersky, etc. release newer versions of their antivirus programs at least once each year in addition to releasing "updates" for the antivirus program every week.

    You should have the latest version of the antivirus programs running at all times, and should also make sure its updated every week with the latest virus "signatures." Failure to do any of these two steps may mean an immediate infection. All antivirus programs come with an Automatic Update feature built in that will automatically contact its server and look for available updates and then download and install them automatically. It is recommended that you leave this feature turned on.

    Here are a list of instructions that you should actively follow to prevent an infection:
    a) Make sure you use the latest version of your antivirus and keep it updated weekly and make sure its auto-update feature is turned on.
    b) Never use a CD or a floppy without scanning it for viruses.
    c) Do not open files from the Internet without scanning them with the antivirus. Most download managers can integrate with the antivirus program to automatically scan the downloaded files. Turn this feature on.
    d) Do not accept and download files from an Instant Messenger conversation if you do not know what it is. Also, all instant messengers can integrate with the antivirus. Turn this feature on.
    e) Never open an attachment from an email, no matter what extension it is, without first scanning it with an antivirus. Again, all email clients can integrate with your antivirus solution to automatically scan for viruses in your emails.


    Norton Antivirus 2005
    McAfee VirusScan
    Trend Micro PC-Cillin 2005 (Currently the best, in my opinion)
    Kaspersky Antivirus 5.0 Personal
    NOD32 2.0 - v7.20
    Norman Virus Control
    CA eTrust Antivirus v7.1
    AVG Antivirus v7.308
    avast! 4 Home Edition
    AntiVir Personal Edition


    Firewalls:

    In this day, when broadband and LAN/Cable Internet access is rampant, there is always a chance that somemay may break into your computer, gain access and control your computer to do malicious acts without your permission. A firewall acts like a filter for the data that's going in and out of your computer. If it detects that a program is trying to access the Internet or your local network without your permission, it will stop such activity. Also, if a hacker or any other user tries to gain access to your computer without your permission, it will block all such activity too. The Windows Firewall that comes bundled along with Windows XP SP2 is woefully inadequate when it comes to protecting your computer.

    The key to running a firewall efficiently is to configure it right. When it comes to configuring, the key steps to remember are these:
    a) If you do not know the program, deny it access to the Internet and the local network.
    b) Never allow the software to "remember" the access rights for a program, that is, do not wantonly check the "I know this program. Do not ask me again" for programs that you are not absolutely sure about.
    c) Some Windows processes need access to the Internet or your local network to work the way its supposed to. Make sure you check the name of the program and its use before you allow or deny access.
    d) Unless you run a server or play/host online or network multiplayer games, go ahead and deny inbound access to all programs except your mail clients, browsers, etc.
    e) Do not allow programs to connect to the Internet unless they absolutely need to. So while Adobe Acrobat checks for an update with its servers when you start it up, thats OK. But when you are planning to play Quake 3 Arena offline and it tries to connect to the Internet, go ahead and deny it access this time around.

    Good firewalls include;

    ZoneAlarm (The best among them all, when you configure it right)
    Kerio Personal Firewall
    SyGate Personal Firewall Standard
    Kaspersky Anti-Hacker v1.7
    Norton Personal Firewall 2005
    McAfee Personal Firewall Plus
    Trend Micro PC-Cillin Internet Security 2005


    Anti-Spyware:


    Chances are that you're probably using the default Internet Explorer browser that came along with your OS. The browser is literally the weakest link in the Microsoft OS and is a very popular target for people that write software to either attack your computer, or as in most cases, just increase their revenue. People write code called spyware/adware/malware that hijack your browser settings or install software that track your movements online or in some cases, totally prevent you from getting any work done and steal your Internet passwords. And if you're using Internet Explorer, you're their favorite snack.
    To test the "integrity" of your browser and whether it is vulnerable to spyware and being hijacked and exploited, run the Browser Security . Chances are, yes, you're very vulnerable. Fortunately, we have software just like antivirus programs - antispyware programs that prevent and clean attacks on your system. As with antivirus, the key to a good antispyware program is to leave its protection system running at all times and to update them regularly with the "signature libraries" of spyware.

    Some of the well known products are:

    SpyBot - Search and Destroy 1.3 (The best, in my opinion)
    LavaSoft Ad-Aware SE Personal v1.05
    Microsoft Windows AntiSpyware Beta

    Another tools that prevents your browser being hijacked and your critical system settings being changed in BHODemon 2.0. Also, when you install antispyware like SpyBot, you will be prompted to install system protection software called "TeaTimer" and will be prompted to have it automatically startup along with your computer. Select this option and when an important change occurs, you have the option to either accept the change or deny it, effectively killing unwanted program installs and browser hijacks.

    Misc. Tools:


    Of course, you can always ditch the browser and go for a safer alternative. The best I would recommend is Mozilla Firefox, currently at version 1.0.1. Also the lightest browser around, it makes for the best replacement for Internet Explorer. It also automatically imports all your IE cache, settings, cookies and bookmarks, so you have to do nothing but install it and browse safe.
    Also, Microsoft has a Malicious Software Removal Tool that you can download and scan for and remove unwanted malicious software. A newer version of the tool will be released each month.


    Too many people these days are coming into the forums requesting help on massively infected systems. So, I thought I'd compile something for the newbies that may be useful to help prevent infections and other useless trash on your computer.

    Step One: The Core

    This is the single most important piece of your computer. Chances are that if there's something wrong with this, the weakest link in the chain, everything will come crashing straight on top of you. I am talking about the Single Point of Failure (SPoF) on your system - the Operating System.

    This critical piece (actually, make that ultra-hyper-mega-critical) of software is what manages the entire show and you dont want any unnecessary software messing with it. Not all Operating Systems are created equal. Technically speaking, server OSes are some of the safest OSes around. But usually you cannot go around installing these OSes unless you're a total geek with around 10 computers around your home and you need software to centrally manage them. When it comes to a single desktop OS, currently Microsoft Windows XP rules the roost.

    Your choice of Windows OS preference in the order of safest first is:
    Windows XP Professional
    Windows XP Home
    Windows 2000 Professional
    Windows NT 4.0
    Windows 98 SE
    Windows ME
    Windows 98
    Windows 95

    I would recommend you either stick to the Windows XP OSes, Windows 2000 Professional or Windows 98 SE. Needless to say, Microsoft Windows XP is currently the most safe computing environment for a user. And that neatly brings us to our next topic.


    Step Two: Patching it Up

    No OS is secure if you are running it straight out of the box. A long list of vulnerabilities are detected by security experts and Microsoft routinely releases update software to address these vulnerabilities and close them. Updates may either be :
    Service Packs
    Critical Updates
    Hotfixes
    Cumulative Updates / Rollups
    Hardware Updates
    Optional Updates

    Service Packs (SP) are comprehensive updates to the OS, fixing every single vulnerability in the OS since the release of the OS itself or the last SP release. SP's also include major OS changes, newer updates to system files and they contain every single update to the OS that has ever been released. Also, SPs are cumulative, so if you were to install SP1, it would contain every single update since the OS release and if you install SP2, it would contain every single update that has been released since SP1, and it would also include the updates of SP1 also. So, if you are patching an OS with an SP, you dont have to go around installing SP1, then SP2, SP3, etc. Installing the latest SP would mean you're getting all the updates. The latest SPs for the various OS are:

    Windows XP - SP2:
    The best way to get SP2 for Windows XP is either via Automatic Updates (I will get to this later), Windows Update, ordering the free Service Pack 2 from Microsoft, (click this link to place your order) or from the Digit September 2004 CD/DVD. However, if you want to download it yourself, a larger network install can be downloaded here.

    Windows 2000 - SP4 Download

    Windows NT 4.0 - SP6a Download

    Microsoft only releases an SP for the OSes that can be used as full-fledged network clients, so there are no SPs for Windows ME, 98 SE, 98 and 95, only the standalone updates. However, an Unofficial SP exists for Microsoft Windows 98 SE.

    Windows 98 SE Unofficial SP - Version 2.0 RC1 Download

    Critical Updates are those very important updates that Microsoft releases in response to a threat against the Windows OS. There is no option and these should not be avoided. Installing these updates is a must if you dont want your system exploited or open to infection. Microsoft usually releases a slew of these updates every month.

    Hotfixes are patches to existing Windows components that address a vulnerability in the code and are released as and when the vulnerabilities are discovered. Needless to say, you need these as well if you want to protect your OS.

    Cumulative Updates and security Rollups are a bunch of related updates and hotfixes that enhance the security of the Windows component and also patch any existing unpatched vulnerability. Of course, you need these too.

    Hardware Updates can sometimes be found on Windows Update when your hardware manufacturer, like your motherboard manufacturer, releases patches, fixes and updates that usually add functionality and improve performance of your hardware components. While these updates are optional, it is recommended that you install them because they often boost your hardware's performance and provide newer functionality that you can take advantage of.

    Optional Updates are just that. They're optional and its your choice whether you wish to update/upgrade them. Usually, these fall in the category of extra tools for the Windows OS such as a newer Media Player, a Journal Viewer, Movie Editing Software, software to make applications programmed in the .NET environment to work, etc. You can safely ignore these updates if you are not planning to use them.

    Microsoft releases a number of updates on the second Tuesday of every month, which many of us geeks fondly call "Patch Tuesday". Make sure you bookmark this day in your calendar each month and check for updates. Also, if a threat is severe enough, it may make the people at Microsoft release an update before the planned Patch Tuesday.

    Also, most programs have updates for themselves. While some are improvements on features, its not uncommon for products to include security enhancements as well. Keep track of the products you're using and check for updates for your software products regularly. This is especially important when it comes to Microsoft Office products as their updates can have a significant impact on sysem security. You can always visit Office Update to check for the latest updates to your Office products.

    Step Two Point Five: Honesty Pays

    It is worthwhile to mention that when it comes to Windows OSes, it is better to pay for a legal, genuine copy of the OS to enable you to get the latest updates without a hassle. When it comes to Windows XP, it will not allow you to install a genuine copy of the SP or some critical fixes unless you have a legit version of the OS. Yes, cracked SPs exist and you can always install them, but you will be doing the world a lot of good, not to mention yourself, if you just get yourself a legit copy of at least Windows XP Home. You just spent over 20,000 on that new computer, the least you can do is spend another 4000 and live quite happily afterwards.

    Step Three: Securing the OS

    Here we will take a look at securing the OS itself without using any third party software. The most important tool here is the "Automatic Updates" option. You can usually find this option in the Control Panel, if you are running Windows ME, Windows 2000 (with the appropriate SP) or Windows XP.

    When you open the Automatic Updates option, you will be faced with a couple of options including (exact wordings may differ)
    Automatically Download and Install Updates
    Download Updates but let me choose when to install them
    Notify me of updates but do not automatically download or install them
    Turn off Automatic Updates

    It is recommended that you select Option 3 - "Notify me of updates but do not automatically download or install them" instead of Option 4, turning off the Auto Update feature. This way, when an important update is released, the Automatic Updates feture will inform you that updates are available for your OS and you can go to Windows Update and download and install them at your convenience. Also this way, you can tell when an update is being offered before the Patch Tuesday cycle and stay protected.

    Windows XP comes with a built in Firewall to protect your computer, but its not a worthy solution when compared to a standalone firewall, so I will skip that in favor of a third party firewall solution.

    Also, make sure you secure your user account with a password so that no one can fiddle with your system in your absence and then damage the OS.

    Windows XP, when patched with Service Pack 2, comes with a Security Center option that can be accessed via the Control Panel. When you restart your computer after installing SP2, you will be prompted to choose an Automatic Updates method (1 out of the 4 choices) The Security Center also monitors the status of the built-in Windows Firewall, which is enabled by default and also the status of your antivirus program, whether it is on, turned off or if it requires an update. However, it only works with well known antivirus solutions. If any of these components are not working right or are turned off or disabled, the Security Center will pop up a warning in your system tray notification area, alerting you.

    Step Four: Protection with Third Party Software

    Antivirus Solutions

    The biggest threat to a Windows system is a virus. How or why a virus attacks and how it spreads, I am not going to go into here. Usually a virus spreads through one of these mediums:
    a) an infected floppy or CD
    b) an infected file over the network
    c) an infected file from the Internet
    d) an infected file you received via e-mail or instant messenger.

    An antivirus program is a third party solution that runs all the time in your system and monitors and protects your system from viruses and maybe, other threats, depending on the product and its version. It includes a scanning engine and a list of signatures of known viruses that it compares to files staying in your computer's memory and hard disk as well as the ones coming in and going out. If it detects a virus, it immediately stops the activity of the file and informs you about the virus' presence and prompts you to either clean the file or delete it. It should be noted that the major antivirus vendors, McAfee, Symantec, Trend Micro, Kaspersky, etc. release newer versions of their antivirus programs at least once each year in addition to releasing "updates" for the antivirus program every week.

    You should have the latest version of the antivirus programs running at all times, and should also make sure its updated every week with the latest virus "signatures." Failure to do any of these two steps may mean an immediate infection. All antivirus programs come with an Automatic Update feature built in that will automatically contact its server and look for available updates and then download and install them automatically. It is recommended that you leave this feature turned on.

    Here are a list of instructions that you should actively follow to prevent an infection:
    a) Make sure you use the latest version of your antivirus and keep it updated weekly and make sure its auto-update feature is turned on.
    b) Never use a CD or a floppy without scanning it for viruses.
    c) Do not open files from the Internet without scanning them with the antivirus. Most download managers can integrate with the antivirus program to automatically scan the downloaded files. Turn this feature on.
    d) Do not accept and download files from an Instant Messenger conversation if you do not know what it is. Also, all instant messengers can integrate with the antivirus. Turn this feature on.
    e) Never open an attachment from an email, no matter what extension it is, without first scanning it with an antivirus. Again, all email clients can integrate with your antivirus solution to automatically scan for viruses in your emails.

    Trial Software:
    Norton Antivirus 2005
    McAfee VirusScan
    Trend Micro PC-Cillin 2005 (Currently the best, in my opinion)
    Kaspersky Antivirus 5.0 Personal
    NOD32 2.0 - v7.20
    Norman Virus Control
    CA eTrust Antivirus v7.1

    Free Antivirus Software:
    AVG Antivirus v7.308
    avast! 4 Home Edition
    AntiVir Personal Edition

    Firewalls:

    In this day, when broadband and LAN/Cable Internet access is rampant, there is always a chance that somemay may break into your computer, gain access and control your computer to do malicious acts without your permission. A firewall acts like a filter for the data that's going in and out of your computer. If it detects that a program is trying to access the Internet or your local network without your permission, it will stop such activity. Also, if a hacker or any other user tries to gain access to your computer without your permission, it will block all such activity too. The Windows Firewall that comes bundled along with Windows XP SP2 is woefully inadequate when it comes to protecting your computer.

    The key to running a firewall efficiently is to configure it right. When it comes to configuring, the key steps to remember are these:
    a) If you do not know the program, deny it access to the Internet and the local network.
    b) Never allow the software to "remember" the access rights for a program, that is, do not wantonly check the "I know this program. Do not ask me again" for programs that you are not absolutely sure about.
    c) Some Windows processes need access to the Internet or your local network to work the way its supposed to. Make sure you check the name of the program and its use before you allow or deny access.
    d) Unless you run a server or play/host online or network multiplayer games, go ahead and deny inbound access to all programs except your mail clients, browsers, etc.
    e) Do not allow programs to connect to the Internet unless they absolutely need to. So while Adobe Acrobat checks for an update with its servers when you start it up, thats OK. But when you are planning to play Quake 3 Arena offline and it tries to connect to the Internet, go ahead and deny it access this time around.

    Good firewalls include;

    ZoneAlarm (Free) (The best among them all, when you configure it right)
    Kerio Personal Firewall (Free)
    SyGate Personal Firewall Standard (Free )
    Kaspersky Anti-Hacker v1.7 (Trial)
    Norton Personal Firewall 2005 (Trial)
    McAfee Personal Firewall Plus (Trial)
    Trend Micro PC-Cillin Internet Security 2005 (Trial)


    Anti-Spyware:

    Chances are that you're probably using the default Internet Explorer browser that came along with your OS. The browser is literally the weakest link in the Microsoft OS and is a very popular target for people that write software to either attack your computer, or as in most cases, just increase their revenue. People write code called spyware/adware/malware that hijack your browser settings or install software that track your movements online or in some cases, totally prevent you from getting any work done and steal your Internet passwords. And if you're using Internet Explorer, you're their favorite snack.
    To test the "integrity" of your browser and whether it is vulnerable to spyware and being hijacked and exploited, run the Browser Security Check here. Chances are, yes, you're very vulnerable. Fortunately, we have software just like antivirus programs - antispyware programs that prevent and clean attacks on your system. As with antivirus, the key to a good antispyware program is to leave its protection system running at all times and to update them regularly with the "signature libraries" of spyware.

    Some of the well known products are:

    SpyBot - Search and Destroy 1.3 (The best, in my opinion)
    LavaSoft Ad-Aware SE Personal v1.05
    Microsoft Windows AntiSpyware Beta

    Another tools that prevents your browser being hijacked and your critical system settings being changed in BHODemon 2.0. You can download it here. Also, when you install antispyware like SpyBot, you will be prompted to install system protection software called "TeaTimer" and will be prompted to have it automatically startup along with your computer. Select this option and when an important change occurs, you have the option to either accept the change or deny it, effectively killing unwanted program installs and browser hijacks.

    Misc. Tools:

    Of course, you can always ditch the browser and go for a safer alternative. The best I would recommend is Mozilla Firefox, currently at version 1.0.1. Also the lightest browser around, it makes for the best replacement for Internet Explorer. It also automatically imports all your IE cache, settings, cookies and bookmarks, so you have to do nothing but install it and browse safe.

    Get Mozilla Firefox 1.0.1 here!

    Also, Microsoft has a Malicious Software Removal Tool that you can download and scan for and remove unwanted malicious software. A newer version of the tool will be released each month. Get it here.

    In all my time, one tool that really caught my eye and bowled me over was BlackICE PC Protection. The program is actually a firewall for incoming data, but its being paranoid totally. The program totally blocks all incoming requests and literally hides your PC from the local network and from the Internet, making it totally invisible to the outside world. The program also bundles a nifty tool called "Application Protection." What it does is create a snapshot of all the installed programs and their "code" and if there is ANY change at all in the program, it refuses to let the program load without your permission. Of course, you can always authorize and add the program to a list, authorize it to run only once, or terminate it completely. This is the way a paranoid person like myself protects his system. There is no trial that I know of, but if you're interested you can take a look at the link I posted to find out more about the program.

    I hope this helps. If anyone has anymore info to add on protecting their systems, please feel free to add it. I will post a HOWTO on fixing your problems with viruses, spyware and hackers tomorrow.

    NOTE: A good site to get all your updates in one shot is The Software Patch or you can use third party tools like AutoPatcher to get the same job done.

  8. #38
    Join Date
    Jan 2006
    Location
    Press F13 to find the location
    Posts
    615

    Default BIOS updates - How to recover

    Hello,
    this is not what i wrote , i just grabbed it from the net . no credit to me.
    my advice : dont flash bios in Windows
    and flash only if necessary . and i think asrock mobos dont support the foll. method of recovery .( some eeprom limitations ).
    PLZ pass on comments.Was it useful ?



    PROCEDURE FOR RECOVERING A CORRUPT BIOS CHIP
    By David Oakley
    Amptron International Inc.
    (Revised May 24, 2001)
    INTRODUCTION TO BOOTBLOCK BIOS
    Most BIOS code used today is called ‘BOOT BLOCK’ BIOS. A BOOT BLOCK type BIOS is
    different from previous BIOS types in that it is divided into two distinct sections. The first section
    of the BIOS is the BOOT BLOCK (hence the name). The BOOT BLOCK uses the first 24k of the
    ROM and contains information necessary to initialize only critical system devices such as the
    processor, memory and some ISA video cards as well as the floppy drive. The BIOS BOOT
    BLOCK is a write protected area and cannot be over written by a BIOS flash utility without using a
    special command line switch.
    The second section is the SYSTEM BLOCK. The SYSTEM BLOCK is 232k in size and contains
    the information necessary to initialize all other system devices such as the video system, input
    devices, storage devices, COM ports and peripherals and performs the Power On Self Test. The
    SYSTEM BLOCK constitutes the bulk of the ROM.
    The illustration above depicts a standard 2Mb (256k) BIOS chip. Older BIOS chips may be only
    1Mb (128k). The 1Mb BIOS chips are not BOOT BLOCK BIOS and therefore cannot be
    recovered in the same way. If you have a 1Mb BIOS chip and your BIOS is corrupt then you will
    need to reprogram the chip using the ‘Hot-Swapping’ method, or an EEPROM programmer.
    UPDATING (FLASHING) YOUR BIOS
    The process of updating your BIOS is called flashing. Because the type of ROM chip used is a
    Flash EEPROM. To update your BIOS you use a utility called a BIOS Flash utility. When you
    flash your BIOS the flash utility performs the following steps.
    · ?Enters Protected Mode by loading the DOS 4G Protected Mode drivers
    · ?Identifies the flash part (the BIOS chip)
    · ?Identifies the flash part size and programming voltage
    · ?Identifies the motherboard chipset
    · ?Verifies the BIOS checksums (make sure that the BIOS file is correct)
    · ?Erases the BIOS SYSTEM BLOCK (write over the data with all 0’s)
    · ?Rewrites the SYSTEM BLOCK with the new BIOS file
    · ?Loads CMOS defaults and reboots the computer
    UPDATING (FLASHING) YOUR BIOS (Cont.)
    If an error occurs within the first five steps of the flash process then an error message will be
    displayed and the flash process will be aborted. Unfortunately if an error occurs after the flash
    utility has erased the SYSTEM BLOCK then the computer will be disabled. The system power
    will come on, but the system will not startup as it normally does and you may or may not see
    anything on the screen. If your system has an AWARD BIOS you may see an error message on
    the screen that says.
    AWARD BootBlock BIOS v1.0
    CMOS Checksum Error
    At this point the system will attempt to boot from a floppy disk. You will be able to boot from a
    bootable floppy, but without the BIOS SYSTEM BLOCK you can’t do much else.
    METHODS OF RECOVERING A CORRUPT BIOS CHIP
    There are four options available if your BIOS has become corrupt:
    1) Use the BootBlock function of the BIOS to reprogram the BIOS ROM.
    2) Use a method called ‘Hot-Swapping’ to reprogram the BIOS ROM.
    3) Remove the BIOS ROM and manually reprogram it on an EEPROM programmer.
    4) Purchase a replacement BIOS from the motherboard manufacturer.
    This paper was written to aid you in reprogramming your BIOS using either of the first two
    methods. If you are not comfortable or able to recover your BIOS using either of these methods
    then it would be best to purchase a replacement BIOS chip from the motherboard’s manufacturer.
    DIFFERENT BIOS DISTRIBUTIONS
    There are two primary BIOS distributions used today they are AWARD, written by AWARD
    Software and AMI, which is written by American Megatrends International. The methods used to
    recovery your BIOS is different for each BIOS distribution, so it is crucial that your know which
    BIOS distribution you have.
    To determine which BIOS distribution you have you can either read the sticker that has been
    placed on top of your BIOS chip, consult the user’s manual, or contact the motherboard
    manufacturer. I will elaborate on each of these methods below.
    IDENTIFYING YOUR MOTHERBOARDS BIOS DISTRIBUTION
    The quickest way to identify which BIOS distribution your motherboard uses when you cannot
    boot the computer is to read the manufacturers sticker on the BIOS chip itself, however not all
    manufacturers label their BIOS chips. To do this you must first locate the BIOS chip on the
    motherboard.
    Currently there are two popular BIOS chip package types in use; 32-pin DIP (Dual In-line
    Package) and 28-pin PLCC (Plastic Leaded Chip Carrier). The most common is the 32-pin DIP
    type so this is what you should look for first. The DIP package type chip is a rectangular black
    IDENTIFYING YOUR MOTHERBOARDS BIOS DISTRIBUTION (Cont.)
    silicon chip with a row 16-pins along each of the longer sides of the chip. The PLCC chips are
    smaller square chips that are closely fitted into a plastic socket on the motherboard. The PLCC
    type chips have a total of 28 pins, which are inline on all sides of the chip and one of the corner of
    the chip is at a 45° angle.
    The illustration below is a larger than normal diagram of what each chip looks like.
    ( This illustration is not to scale )
    The motherboard manufacturer usually places a sticker on top of the BIOS chip, which specifies
    the BIOS distribution. The sticker will either say AWARD! or AMI.
    Another easy way to identify your BIOS is by checking the user’s manual. The manual does not
    generally mention the type of BIOS you have, but in most cases it will include screen shots
    (pictures) of the BIOS Setup Utility, which shows the BIOS name at the top. In your manual there
    should be a section that discusses how to setup your BIOS. Read the BIOS setup section and
    pay close attention to the illustrations. The following is an example of information taken from a
    screen shot in a motherboard user’s manual.
    AMIBIOS SIMPLE SETUP UTILITY – VERSION 1.20
    ©1998 American Megatrends, Inc. All Rights Reserved
    This motherboard obviously uses AMI BIOS.
    The third and final way to identify your BIOS is to call the motherboard manufacturer and ask.
    This is often a pretty simple approach, but it is not uncommon for motherboards of the same
    model to use different BIOS distributions.
    RECOVERING A CORRUPT AMI BOOTBLOCK BIOS
    With motherboards that use BOOT BLOCK BIOS it is possible to recover a corrupted BIOS by
    reprogramming it from a floppy diskette as long as the BOOT BLOCK section of the BIOS
    remains unmodified. When a system with an AMI BIOS has a corrupt BIOS the system will
    appear to start, but nothing will appear on the screen, the floppy drive light will come on and the
    system will access the floppy drive repeatedly.
    AMI has integrated a recovery routine into the BOOT BLOCK of the BIOS, which in the event the
    BIOS becomes corrupt can be used to restore it. The routine is called when the SYSTEM BLOCK
    of the BIOS is empty. The restore routine will access the floppy drive searching for a BIOS ROM
    file named AMIBOOT.ROM, (this is why the floppy drive light comes on and the drive spins.) If the
    RECOVERING A CORRUPT AMI BOOTBLOCK BIOS (Cont.)
    file is found it is then loaded into the SYSTEM BLOCK of the BIOS to replace the missing
    information.
    NOTE: Make sure that the PC speaker inside your computer is working before you proceed.
    When the BIOS has been restored your system will beep four times to let you know.
    To restore an AMI BootBlock BIOS follow these steps:
    1) Format a good working 1.44MB floppy diskette.
    2) Copy a working BIOS ROM file for your motherboard onto the floppy disk. BIOS ROM
    files can usually be downloaded from the motherboard manufacturer’s web site. If you
    cannot locate a BIOS ROM file for your motherboard then call the motherboard
    manufacturer for technical support.
    3) Rename the BIOS ROM file ‘AMIBOOT.ROM’
    4) Turn the system on and insert the disk into drive A:
    5) After about 3 ~ 4 minutes the system will beep four times. Remove the disk from the
    drive. The computer will then restart.
    At this point your BIOS should be restored and the system should startup normally. If your system
    does not startup normally then try using a different BIOS ROM file for your motherboard and read
    the TROUBLESHOOTING PROBLEMS section below.
    RECOVERING A CORRUPT AWARD BOOTBLOCK BIOS
    With AWARD BIOS the process is similar but still a bit different. To recover an AWARD BIOS you
    will need to create a floppy diskette with a working BIOS file in .BIN format, an AWARD flash
    utility and an AUTOEXEC.BAT file. AWARD BIOS will not automatically restore the BIOS
    information to the SYSTEM BLOCK for this reason you will need to add the commands necessary
    to flash the BIOS to the AUTOEXEC.BAT file. The system will run the AUTOEXE.BAT file at
    startup, which will in turn flash the BIOS. This is fairly easy. Here are the steps you need to take.
    1) Create a bootable floppy disk. If you use Windows 95, 98 or DOS, this can be done by
    going to the DOS prompt and typing the command. (Be sure to insert a disk first)
    FORMAT A: /S
    The /S switch specifies that the system files should be copied to the diskette to make it
    bootable. If you are using Windows ME, Windows NT or Windows 2000 then you can not
    use the /S switch with the FORMAT command. If you are unable to create a bootable
    diskette because of the operating system you are using then you may download a
    bootable diskette image from the BootDisk.com web site at (http://www.bootdisk.com)
    2) Copy a working BIOS ROM (.BIN) file for your motherboard and an AWARD flash utility
    to the floppy disk. You can usually download these files from the motherboard
    manufacturer. If you need help finding these files call the motherboard manufacturer for
    technical support.
    3) Use a text editor or the ‘edit’ command at the DOS prompt to create a text file named
    ‘AUTOEXEC.BAT’ and save it on the floppy disk. Make sure that the file name is
    AUTOEXEC and that the extension is .BAT (nothing else). If you create this file from
    RECOVERING A CORRUPT AWARD BOOTBLOCK BIOS (Cont.)
    4) within Windows using a program such as NOTEPAD, you may need to change the file
    extension from .TXT to .BAT
    5) With the text editor add the following commands to the AUTOEXEC.BAT file on the
    floppy disk and then save the changes.
    @ECHO OFF
    @AWDFLASH BIOSFILE.BIN /py
    NOTE: The ‘/py’ switch will cause the flash utility to automatically reprogram the BIOS
    without any user intervention. Be sure to change the ‘AWDFLASH’ to the name
    of the flash utility that you are using and change the ‘BIOSFILE.BIN’ to the name
    of the BIOS ROM file you are using.
    If you are not sure what the command line switch to automatically flash your
    BIOS is, type the name of the flash utility with the ‘/?’ switch after it at a DOS
    prompt and a list of the available switches will be displayed.
    6) Insert the diskette you created into the floppy drive A: on the system that you need to
    restore the BIOS on. Turn on the system. The computer should startup, read the floppy
    disk, run the commands in the AUTOEXEC.BAT file and restore the BIOS.
    At this point if everything went well then the BIOS should have been restored and the
    computer should restart normally. If your system still did not restart normally then go to
    the TROUBLESHOOTING PROBLEMS section below.
    ‘HOT-SWAPPING’ A BIOS CHIP
    ‘Hot-Swapping’ refers to removing a BIOS chip from the motherboard while the system power is
    on and the system is in an idle state. Hot-Swapping a BIOS chip is VERY dangerous to both the
    system and the person attempting to remove the chip. This method of BIOS recovery should only
    be performed by experienced technician as a last option. Hot-Swapping will work on any type of
    BIOS chip as long as both computers use the same type of chip.
    WARNING: If done improperly this method of BIOS recovery could cause severe damage to the
    motherboard and BIOS as well as severe injury to the person attempting to remove
    the chip.
    Hot-Swapping requires you to have two computers with the same BIOS distribution and type. The
    way it works is, while the second (working computer) is on the BIOS chip is removed and the
    BIOS chip from the first (non-working) board is inserted in its place. The BIOS flash utility is then
    run on the second computer and the BIOS chip is updated with the BIOS file for the first
    computer. In essence you are reprogramming the bad BIOS chip on a different motherboard and
    then putting the chip back into the non-working motherboard. The procedure is below.
    1) Start the second (working computer) and go to a DOS prompt. Make sure that no
    programs are running in the background.
    2) While the computer is on carefully remove the BIOS chip from the motherboard and set it
    aside. Be sure to note the orientation of the chip so that you can later inset it back in to
    the motherboard exactly as it was.
    3) Insert the BIOS chip from the first (non-working) computer in to the BIOS socket on the
    second (working computer’s) motherboard.
    ‘HOT-SWAPPING’ A BIOS CHIP (Cont.)
    4) At the DOS prompt run the BIOS flash utility and update the BIOS chip with the correct
    BIOS file for the first computer. If you get a warning message that the chipset and BIOS
    does not match continue anyway. If the flash utility will not allow you to continue and it is
    an AMI flash utility then re-run the flash utility using the ‘/X’ switch to enter the utilities
    graphical interface and manually reprogram the BIOS from there.
    5) Once the BIOS chip has been reprogrammed successfully carefully remove the BIOS
    chip from the second computer and put it back into the first computer. Be sure to pay
    close attention to the orientation of the chip so that you insert it correctly. Plugging in the
    chip backwards will immediately damage both the chip and the motherboard.
    6) Start the first computer. If all went well the first system should now be working again. If
    not see the TROUBLESHOOTING PROBLEMS section below.
    TROUBLESHOOTING PROBLEMS
    PROBLEM: After following all of the directions the system will still not start normally. When the
    system is powered on all it will do is try to access the floppy drive.
    This would seem to indicate that the BIOS reprogramming was not successful or that
    the BIOS ROM file was either damaged or not the correct one. Try the procedure
    again using a different BIOS ROM file for your motherboard. Make sure that the BIOS
    ROM file is for your exact motherboard model and revision.
    PROBLEM: When the computer restarts the message ‘CMOS Checksum Bad’ and ‘Press F1 to
    Enter Setup’ is displayed.
    This is not necessarily a problem. This message is displayed when there are no
    CMOS settings saved. This simply means that you need to set your system settings
    (such as CPU speed, etc) Press whatever key you are prompted to and set the
    CMOS settings accordingly.
    PROBLEM: While trying to recover a AWARD BIOS the system starts to read from the floppy disk
    and then stops and nothing else happens. When the system is rebooted it still has
    the same problem.
    This most likely indicates that there is something wrong with the boot disk. Double
    check that the disk is bootable, contains the AUTOEXEC.BAT file, the BIOS flash
    utility and the BIOS ROM (.BIN) file. If all of the files are present and the disk is
    bootable then double check the AUTOEXEC.BAT file. Make sure that the name is
    correct and that all of the commands are correct.
    If you can see on the screen what the system is doing then try typing the commands
    in the AUTOEXEC.BAT file manually to see if there is an error message that is
    displayed. If everything checks out then try using a different BIOS ROM (.BIN) file. If
    the problem persists use a different flash utility.
    If you have any questions of comments regarding this procedure please e-mail me, my email
    address is: [email protected]

  9. #39
    Join Date
    Jan 2006
    Location
    Press F13 to find the location
    Posts
    615

    Default Some Registry tweaks,try it at your own risk!

    Here are some registry tricks which you can tryout :
    1. Disable the Autorun Option in your CD Rom Drive:
    Open your Registry and navigate to "HK_L_M\system\currentcontrolset\services\cdro m"
    Change the value of 'Autorun', or create a new DWORD value if it doesn't already exist, and set the value as '0' for Autorun disabled.

    2. Disable the Harddisk Lowdiskspace warning in Windows Xp
    User Key: "HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
    and
    System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer"
    create a new DWORD 'NoLowDiskSpaceChecks' and change its value to '1'.

    3. Disable the Windows Key
    "HK_L_M\system\currentcontrolset\control\keybo ard layout"
    Create a new Binary value, or modify the existing value called 'Scancode Map' as shown below.
    Value: 00 00 00 00 00 00 00 00 03 00 00 00 00 00 5B E0 00 00 5C E0 00 00 00 00

    4. View System BIOS Information
    Open Registry and navigate to
    "HK_L_M\hardware\description\system"

    5. Change the Title of Windows Media Player
    "HK_C_USER\software\policies\microsoft\windowsmedi a player\"
    Create a new string value called ' TitleBar' and change text as your wish.

    6. Disable Internet access in Network
    Open Registry and make the following changes
    "KH_C_User\software\microsoft\windows\currentversi o n\internetsettings\"
    Change the value of "Proxyenabled" to 1 and change the value of "proxyserver" and set it to an ip address. Change the value of the ip address and port to "10.0.0.1:5555"

    7. Disable the ability to Right click on the desktop
    "HK_C_User\software\microsoft\windows\currentversi o n\policies\explorer\"
    Create a DWORD "NoViewContextMenu" and change its value to "0" for disabling and "1" for enabling.

    8. Hide all items on desktop
    "HK_C_USER\software\microsoft\windows\currentversi o n\policies\explorer\"
    and
    "HK_L_M\software\microsoft\windows\currentversion\ p olicies\explorer\"
    create a new DWORD "NoDesktop" and change its value to "1"
    You can show all the items in the desktop by chaning the value to "0"

    9. Disable the "Change Password" button in windows
    "HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\System"
    and
    "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersi on\Policies\System"
    Create a new DWORD "DisableChangePassword" and change its value to "0" for disabling and "1" for enabling.

    10. Disable the "cancel" button or pressing the "Esc" key while logging on to Windows"
    "HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\Cu r rentVersion\Run"
    Create a new string value "NoLogon" and change its value to "RUNDLL32 shell32,SHExitWindowsEx 0"

    11. Remove "Log off" from start menu
    "HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
    and
    "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer"
    Create a new DWORD "NoLogOff" and change its value to "1" for disabling and "0" for enabling.

    12. Clear the Recent playlist in Media Player
    Navigate to "HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\ P layer"
    And clear the "RecentFileList" subkey.

    13. Empty temporary Internet files on exit (in Internet Explorer)
    "HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Internet Settings\Cache"
    and
    "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Cur r entVersion\Internet Settings\Cache"
    Create a new DWORD "Persistent" and change the value to "0" for emptying and "1" to remove this option.

    14. Clear the Internet Explorere typed addresses history
    "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs"
    And delete the subkeys.

    15. Remove recent documents from start menu
    "HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
    and
    "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer"
    Create a new DWORD "NoRecentDocsMenu" and change its value to "1".

    16. Remove Network connections from start menu
    "HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
    and
    "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer"
    Create a new DWORD "NoNetworkConnections" and change its value to "1".

    17. Remove My documents from start menu
    "HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
    and
    "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer"
    Create a new DWORD "NoSMMyDocs" and change its value to "1".

    18. Remove My pictures from start menu
    "HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
    and
    "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer "
    Create a new DWORD "NoSMMyPictures" ad change its value to "1".

    19. Remove My music fro start menu
    "HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\Explorer"
    and
    "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\Explorer"
    Create a new DWORD "NoStartMenuMyMusic" and change its value to "1".

    20. Reboot windows after crash
    "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contr o l\CrashControl"
    Create a new DWORD "AutoReboot" and change its value to "1".Restart the machine for the effect to take place.

    21. Disable the use of MSDos
    User Key: "HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\WinOldApp"
    and
    System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\WinOldApp"
    Create a new DWORD "Disabled" and set its value to "1". Change it to "0" for enabling.

    22. Enable Directory completion in MSDos prompt
    User Key: "HKEY_CURRENT_USER\Software\Microsoft\Command Processor"
    and
    System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor"
    Create a new DWORD "PathCompletionChar " and set it to equal the hex value of the required control character.

    23. Quick edit the command prompt
    User Key: "HKEY_CURRENT_USER\Console"
    and
    System Key: "HKEY_USERS\.DEFAULT\Console"
    Create a new DWORD "QuickEdit" and set its value to "1" for enabling and "0" for disabling.

    24. Disable Registry editing
    "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Curr e ntVersion\Policies\System"
    Create a new DWORD "DisableRegistryTools" and change its value to "0" for allowing Regedit and "1" for disabling it.

    25. Disable task scheduler
    " HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion\RunServices"
    Delete the value from "SchedulingAgent". Usually its value is set to "'mstask.exe".

    26. Remove My computer from desktop and start menu
    User Key: "HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Policies\NonEnum"
    and
    System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cur r entVersion\Policies\NonEnum"
    Create "{20D04FE0-3AEA-1069-A2D8-08002B30309D}" and change its value to "1" for removing. Change its value to "0" for showing.

    27. Show Windows version on desktop
    User Key: "HKEY_CURRENT_USER\Control Panel\Desktop"
    Create a new DWORD " PaintDesktopVersion" and change its value to "1" for showing and "0" for removing.

    28. Remove My documenst from desktop
    Windows 95, 98 and Me
    "HKEY_CURRENT_USER\Software\Classes\CLSID\{450D8FB A -AD25-11D0-98A8-0800361B1103}\ShellFolder"
    Windows NT, 2000 and XP
    "HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr e ntVersion\Explorer\CLSID\{450D8FBA-AD25-11D0-98A8-0800361B1103}\ShellFolder"
    Modify the value called "Attributes" as "0xf0500174" to hide or "0xf0400174" to show.

    29. Disable Scan disk after improper shutdown
    " HKEY_LOCAL_MACHINE\System\CurrentControlSet\Contro l\FileSystem"
    create a new DWORD "DisableScandiskOnBoot" and change its value to "01" for disablng and "00" for enabling.

    30. Automatically end Hung programs.
    " HKEY_CURRENT_USER\Control Panel\Desktop"
    and
    "System Key: [HKEY_USERS\.DEFAULT\Control Panel\Desktop"
    Modify the value of "AutoEndTasks" to "1".



    Windows uses 20% of your bandwidth! Get it back

    A nice little tweak for XP. Microsoft reserve 20% of your available bandwidth for their own purposes (suspect for updates and interrogating your machine etc..)

    Here's how to get it back:

    Click Start-->Run-->type "gpedit.msc" without the "

    This opens the group policy editor. Then go to:

    Local Computer Policy-->Computer Configuration-->Administrative Templates-->Network-->QOS Packet Scheduler-->Limit Reservable Bandwidth

    Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab :

    "By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."

    So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.
    works on XP Pro, and 2000 other OS not tested.
    Does'nt work on winxp home

  10. #40
    Join Date
    Jan 2006
    Location
    Press F13 to find the location
    Posts
    615

    Default How to Convert a FAT Partition to NTFS

    How to Convert a FAT Partition to NTFS


    To convert a FAT partition to NTFS, perform the following steps.

    Click Start, click Programs, and then click Command Prompt.

    In Windows XP, click Start, and then click Run.


    At the command prompt, type CONVERT [driveletter]: /FS:NTFS.

    Convert.exe will attempt to convert the partition to NTFS.


    NOTE: Although the chance of corruption or data loss during the conversion from FAT to NTFS is minimal, it is best to perform a full backup of the data on the drive that it is to be converted prior to executing the convert command. It is also recommended to verify the integrity of the backup before proceeding, as well as to run RDISK and update the emergency repair disk (ERD).


    Convert.exe will attempt to convert the partition to NTFS.

Page 4 of 20 FirstFirst ... 2345614 ... LastLast

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •