Monday, December 24, 2012

10 security enhancement points for computer

10 Fast and Free Security Enhancements PC magazine.

Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.

1. Check Windows Update and Office Update regularly have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall. Both SyGate ( and Zo
neAlarm ( offer free versions.

3. Install a free spyware blocker. Our Editors' Choice ("Spyware," April 22) was SpyBot Search & Destroy (_ SpyBot is also paranoid and ruthless in hunting out tracking cookies.

4. Block pop-up spam messages in Windows NT, 2000, or XP by disabling the Windows Messenger service (this is unrelated to the instant messaging program). Open Control Panel | Administrative Tools | Services and you'll see Messenger. Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.

5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro@l. This will make it much harder for anyone to gain access to your accounts.

6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.

7. Buy antivirus software and keep it up to date. If you're not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., w* And doublecheck your AV with the free, online-only scanners available at w* and _

8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get. For more, check out our wireless section or see the expanded coverage in Your Unwired World in our next issue.

9. Join a respectable e-mail security list, such as the one found at our own Security Supersite at _, so that you learn about emerging threats quickly and can take proper precautions.

10. Be skeptical of things on the Internet. Don't assume that e-mail "From:" a particular person is actually from that person until you have further reason to believe it's that person. Don't assume that an attachment is what it says it is. Don't give out your password to anyone, even if that person claims to be from "support."
Read more

Thursday, October 11, 2012

Four Tips for Longer PC Life

1. Keep your PC in a smoke-free environment. Tobacco smoke can damage delicate contacts and circuits.

2. Leave your PC running. Powering up from a cold state is one of the most stressful things you can do to your system's components.
If you don't want to leave your PC running all the time, use Windows' Power Management settings to put your machine into hibernation rather than completely shutting down.

In Windows XP, right-click the desktop and select Properties. Click the Screen Saver tab and select the Power button. Choose the Hibernate tab to ensure that hibernation is enabled, and then select a time beneath "System hibernates" under the Power Schemes tab.

(Note that this option is not available on all PCs.)
Computers running older versions of Windows may or may not provide similar power-management features. Look under the Power Management icon (Power Options in Windows 2000) in Control Panel to evaluate your machine's capabilities.

3. Don't leave your monitor running. The best way to extend your display's life is to shut it off when it's not in use.

4. Avoid jostling the PC. Whenever you move your system, even if it's just across the desktop, make sure the machine is shut down and unplugged.

Read more

Stop a restart process or shutdown in 3 steps

Some times we need to stop some restart process quickly.
In windows XP some times it gives auto restart warning and here is good solution for it.

1. Go to Start menu

2. Click on RUN

3. Enter the following command excluding hashcodes "shutdown -a"

its Done.
Read more

1 to 25 ways to speed windows not only defragment

Since defragging the disk won't do much to improve Windows XP performance, here are 25 suggestions that will.

Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.

1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.

2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.

3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free.

The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.

The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.

Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.

Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.

5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.

6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.

7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.

8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.

9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets.

A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.

10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.

11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.

13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.

14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.

15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.

16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.

17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.

18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance.

Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.

19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.

20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.

21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.

22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.

23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.

24.) Key things to save your computer : Defragment, DiskCheck, Error Cleaning, Antivirus, Memory Scanning etc.

25.) Scan every external disk you connect. There are many autorun viruses which may bipass antivirus if not scanned.

Read more

Tuesday, October 09, 2012

Signup form javascript validation with regular expressions - demo and coding

Demo form with validation
* click submit to check validation

Name : *
Email : *
Subject : *
Contact : *
Message :  
Javascript code for signup form <script type="text/javascript"> var ck_name = /^[A-Za-z0-9 ]{1,20}$/; var ck_email= /^([\w-]+(?:\.[\w-]+)*)@((?:[\w-]+\.)*\w[\w-]{0,66})\.([a-z]{2,6}(?:\.[a-z]{2})?)$/i ; var ck_subject = /^[A-Za-z0-9!@#,$%^&* -.+()_]{1,150}$/; var ck_phone = /^[0-9]{8,20}$/; function validate(form){ var name =; var email =; var subject = form.subject.value; var phone =; var errors = []; if (!ck_name.test(name)) { errors[errors.length] = "Enter Valid name"; } if (!ck_email.test(email)) { errors[errors.length] = "Enter valid email-id"; } if (!ck_subject.test(subject)) { errors[errors.length] = "Enter subject"; } if (!ck_phone.test(phone)) { errors[errors.length] = "Enter phone number"; } if (errors.length > 0) { reportErrors(errors); return false; } return true; } function reportErrors(errors){ var msg = "Please Enter Valid Data...\n"; for (var i = 0; i<errors.length; i++) { var numError = i + 1; msg += "\n" + numError + ". " + errors[i]; } alert(msg); } </script> Signup form html code <form method="post" name="form" onSubmit="return validate(this);"> <table width="100%" border="0" cellpadding="5"> <tr> <td width="32%" align="right"> Name :</td> <td width="4%">*</td> <td width="64%"><input class="tb6" type="text" name="name"></td> </tr> <tr> <td align="right">Email :</td> <td>*</td> <td><input class="tb6" type="text" name="email" /></td> </tr> <tr> <td align="right">Subject :</td> <td>*</td> <td><input class="tb6" type="text" name="subject" /></td> </tr> <tr> <td align="right">Contact :</td> <td>*</td> <td><input class="tb6" type="text" name="phone" /></td> </tr> <tr> <td valign="top" align="right">Message :</td> <td>&nbsp;</td> <td><textarea name="message" id="message" class="tb6" cols="30" rows="3"></textarea></td> </tr> <tr> <td>&nbsp;</td> <td>&nbsp;</td> <td><input type="submit" value="Submit" name="submit" id="submit"></td> </tr> </table> </form>
Read more

Saturday, October 06, 2012

7 Dangerous acts after a meal in day to day life

1. Don’t smoke —- Experiments from experts proves that smoking a cigarette after meal is comparable to smoking 10 cigarettes (chances of cancer is higher)

2. Don’t eat fruits immediately — Immediately eating fruits after meals will cause stomach to be bloated with air. Thre fore take fruits 1 -2 hours after meal or 1 hour before meal.

3. Don’t drink tea—— Because tea leaves contain a high content of acid. This substance will cause the protein content in the food we consume to be hundred thus difficult to digest.

4. Don’t loosen your belt———- Loosening the belt after meal will easily cause the intestine to be twisted and blocked.

5. Don’t bathe———- ——- Bathing after meal will cause the increase of blood flow to the hands, legs and body thus the amount of blood around the stomach will therefore decrease, this will weaken the digestive system in our stomach.

6. Don’t walk about———- — People always say that after a meal walk a hundred steps and you will live till 99. In actual fact this is not true. Walking will cause the digestive system to be unable to absorb the nutrition from the food we intake.

7. Don’t sleep immediately—- ——– The food we intake will not be to digest properly. Thus will lead to gastric and infection in our intestine.

Please Share it to your friends let them be aware.
Read more

Monday, October 01, 2012

‎25 ultimate tips for better life

1. Take a 10-30 minute walk every day. & while you walk, SMILE. It is the ultimate antidepressant.

2. Sit in silence for at least 10 minutes each day.

3. When you wake up in the morning, Pray to ask God's guidance for your purpose, today.

4. Eat more foods that grow on trees and plants and eat less food that is manufactured in plants.

5. Drink green tea and plenty of water. Eat blueberries, broccoli, and almonds.

6. Try to make at least three people smile each day.

7. Don't waste your precious energy on gossip, energy vampires, issues of the past, negative thoughts or things you cannot control. Instead invest your energy in the positive present moment.

8. Eat breakfast like a king, lunch like a prince and dinner like a college kid with a maxed out charge card.

9. Life isn't fair, but it's still good.

10. Life is too short to waste time hating anyone. Forgive them for everything !

11. Don't take yourself so seriously. No one else does.

12.You don't have to win every argument. Agree to disagree.

13. Make peace with your past so it won't spoil the present.

14. Don't compare your life to others. You have no idea what their journey is all about.

15. No one is in charge of your happiness except you.

16. Frame every so-called disaster with these words: 'In five years, will this matter?'

17. Help the needy,Be generous ! Be a 'Giver' not a 'Taker'

18. What other people think of you is none of your business.

19. Time heals everything.

20. However good or bad a situation is, it will change.

21. Your job won't take care of you when you are sick. Your friends will. Stay in touch.

22. Envy is a waste of time. You already have all you need.

23. Each night before you go to bed ,Pray to God and Be thankful for what you'll accomplish, today !

24. Remember that you are too blessed to be stressed.

25.share this to everyone to help them lead a happier life.
Read more

Thursday, September 27, 2012

Hard drive gone bad and slow - trick is here

The most common problems originate from corruption of the master boot record, FAT, or directory. Those are soft problems which can usually be taken care of with a combination of tools like Fdisk /mbr to refresh the master boot record followed by a reboot and Norton disk doctor or Spinneret.

The most common hardware problems are a bad controller, a bad drive motor, or a bad head mechanism.

1. Can the BIOS see and identify the hard drive correctly? If it can't, then the hard drives onboard controller is bad.

2. Does the drive spin and maintain a constant velocity? If it does, that's good news. The motor is functioning.

3. If the drive surges and dies, the most likely cause is a bad controller (assuming the drive is cool). A gate allowing the current to drive the motor may not be staying open. The drive needs a new controller.

4. Do you hear a lot of head clatter when the machine is turned on and initialized (but before the system attempts to access the hard drive). Head clatter would indicate that the spindle bearings are sloppy or worn badly. Maybe even lose and flopping around inside.

5. There is always the possibility that the controller you are using in the machine has gone south.

1. If the drive spins, try booting to the A> prompt, run Fdisk and check to see if Fdisk can see a partition on the hard drive. If Fdisk can see the partition, that means that it can access the drive and that the controller electronics are functioning correctly. If there is no head clatter, it may be just a matter of disk corruption which commonly occurs when a surge hits you machine and overwhelms the power supply voltage regulator. It commonly over whelms the system electronics allowing an EM pulse to wipe out the master boot record, file allocations table, and primary directory. Fdisk can fix the master boot record and Norton Disk Doctor can restore the FAT and Directory from the secondaries.

2. The drive spins but Fdisk can't see it. Try the drive in another system and repeat the test to confirm that Fdisk can't read through the drives onboard controller. If it sees it in another system, then your machines hard drive interface is bad. You can try an upgraded or replacement controller card like a Promise or CMD Technologies (there are others) in you machine after disabling the integrated controller in the BIOS, but if the integrated controller went south, it may just be symptomatic of further failures and you'd be wise to replace the motherboard. Trying the drive in another machine also eliminates the variable that your machines 12 volt power output being bad

3. If you get head clatter but a constant velocity on the drive motor (no surging), you might try sticking the hard drive in the freezer for about 12 hours. This is an old trick from back in the days of the MFM/ESDI driver era. This can cause the drive components to shrink enough to make the track marker align with the tracks. We don't see that kind of platter spindle wear much anymore, but back in the old days, the balancing and bearings weren't as good. Still, under the right circumstances, it might help. It would depend on how old the drive is and how many hours of wear have occurred. You have to be quick to get your info off the drive when it works. Back then, the drives were much smaller, so there wasn't so much to copy. So, go after the important data first.

4. The drive doesn't spin. Either the onboard controller is bad or the motor is bad (assuming you did try the drive in another machine). It's time to hit the net and local independent shops to see if you can locate another drive of the same make and model that's good. Since the drive is probably an older drive and no longer in distribution, your best bet is to find an identical used drive. If you know someone with the same make and model, you might be wise to try and persuade them to sell you their drive with an offer of providing them with a free upgraded drive. If you can locate an identical drive, start with the controller replacement ... this is the simplest and least invasive. If swapping the controller doesn't produce the desire result, you can tear into the drive and swap the motors. While you have both drive opened up to accomplish this, scrutinize the platters, heads and armatures. You might even hook the drive up and power it from a system with both drives attached. This way, you could see anything that deviates between the actions of both drives when they are initialized. Swapping patters is unlikely to produce any positive result. They are a balanced system like the tires on your car and I suspect that the balance will be different for each drive as will other variables.

5. There's always Ontrack Corp. who will attempt to recoup your info starting at $500 and going up from there. They don't fix and return the drive either.

If the info is all that important to you, I would seek some professional and experience technician in your locality who makes his living from servicing and building computer systems ... not just selling them. If you have had much experience salvaging information from bad hard drives, your likelihood of success is low. In the case of soft corruption, all utilities have their eccentricities. Often times, Norton Disk Doctor will go too far (if you let it). It's wise to just let those utilities small steps and then have a look at the drive and see if you can copy it off. Norton will go so far as to rename directories and files, and even delete them or break them up into fragments which are useless. _________________
Read more

Friday, September 21, 2012

How to recharge mobile for free without any investment or make money online and free movie tickets also | Hacking Tips and Trickz

Read more

How to format your computer using Bootable pandrive / USB port / USB Format | Hacking Tips and Trickz

Read more

Trick to download from a paypal site without paying a penny

Just a little basic html tip for those who are trying to download an application from sites which has an paypal order page & link to start you off.

Use a proxy when you try this to hide your ip as some sites will record your ip when you connect for security.

1) Rightclick your mouse (ctrl+click) viewsource and open the source of the site in an a texteditor
2) Search for the word "return"
3) Next to it you can find the url for the thank you page
4) Copy the url and paste it in your browser and you will see the download link

This works only if you can download instantly after payment, it will not work if the link needs to be emailed to you.

You can try it here to start with: Code:

About half way down the page you will find:

Copy the link into your browser and download.
Read more

Wednesday, September 19, 2012

Hard prank: ---fool your Friends

Hard prank:
Pick your poison batch file.
It asks your friend to choose a number between 1-5 and
then does a certain action:

1: Shutdown
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown
Type :

@echo off
title The end of the world
cd C:\
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press 'x' then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc...
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 4. Die this way (you're boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two

Save it as "Anything.BAT" and send it.

You might wanna have to change the Icon of the file before sending it to your friend, so right click the file, click Properties, click on the 'Change' Icon and change the icon from there
Read more

Rename a Series of Files in windows

When you connect your digi cam to your computer you see many files named in series like md101, md102 and so on.
You can do this thing by yourself on other files too.

To do this

• Open any folder containing files that you want to rename.

• Select the files you want to rename.
If the files you want are not adjacent in the file list, press and hold Ctrl, and then click each item to select it.

• On the File menu, click Rename.

• Type the new name, and then press ENTER.

• All of the files in the series will be named in sequence using the new name you type. For example, if you type ABCD, the first will be named ABCD and subsequent files in the series will be named ABCD(1), ABCD(2), and so on.

• To specify the starting number for the series, type the starting number in parentheses after the new file name.

The files in the series will be numbered in
sequence starting with the number you type.
For example, if you type ABCD(10), the other files will be named ABCD(11), ABCD(12), and so on.
Read more

Thursday, August 30, 2012

Amazing facts of life part 2

*Coca-Cola was originally green.

*The name of all the continents end with the same letter that they start with.

*The strongest muscle in the body is the tongue.

*TYPEWRITER is the longest word that can be made using the letters only on one row ! of the keyboard.

*Women blink nearly twice as much as men!!

*You can't kill yourself by holding your breath.

*It is impossible to lick your elbow.

*People say "Bless you" when you sneeze because when you sneeze, your heart stops for a millisecond.

*It is physically impossible for pigs to look up into the sky.

*The "sixth sick sheik's sixth sheep's sick" is said to be the toughest tongue twister in the English language.

*If you sneeze too hard, you can fracture a rib. If you try to suppress a sneeze, you can rupture a blood vessel in your head or neck and die.

*Each king in a deck of playing cards represents a great king from history.

Spades - King David

Clubs - Alexander the Great,

Hearts - Charlemagne

Diamonds - Julius Caesar.

*If a statue of a person in the park on a horse has both front legs in the air, the person died in battle.

*If the horse has one front leg in the air, the person died as a result of wounds received in battle

*If the horse has all four legs on the ground, the person died of natural causes.

*What do bullet proof vests, fire escapes, windshield wipers and laser printers all have in common?

Ans. - All invented by women.

*A crocodile cannot stick its tongue out.

*A snail can sleep for three years.

*All polar bears are left handed.

*American Airlines saved $40,000 in 1987 by eliminating one olive from each salad served in first-class.

*Butterflies taste with their feet.

*Elephants are the only animals that can't jump.

*In the last 4000 years, no new animals have been domesticated.

*On average, people fear spiders more than they do death.

*Shakespeare invented the word 'assassination' and 'bump'.

*Stewardesses is the longest word typed with only the left hand.

*The ant always falls over on its right side when intoxicated.

*The electric chair was invented by a dentist.

*The human heart creates enough pressure when it pumps out to the body to squirt blood 30 feet.

*Rats multiply so quickly that in 18 months, two rats could have over million descendants.

*Wearing headphones for just an hour will increase the bacteria in your ear by 700 times.

*The cigarette lighter was invented before the match.

*Most lipstick contains fish scales.

*Like fingerprints, everyone's tongue print is different.
Read more

Some amazing facts of life

◄ ► Some more Amazing Facts ◄ ►

* Chewing on gum while cutting onions can help a person from stop producing tears. Try it next time you chop onions!

* Until babies are six months old, they can breathe and swallow at thesame time. Indeed convenient!

* Offered a new pen to write with, 97% of all people will write their own name.

* Male mosquitoes are vegetarians. Only females bite.

* The average person's field of vision encompasses a 200-degree wide angle.

* To find out if a watermelon is ripe,knock it, and if it sounds hollow then it is ripe.

* Canadians can send letters with personalized postage stamps showing their own photos on each stamp.

* Babies' eyes do not produce tears until the baby is approximately six to eight weeks old.

* It snowed in the Sahara Desert in February of 1979.

* Plants watered with warm water grow larger and more quickly than plants watered with cold water.

* Wearing headphones for just an hour will increase the bacteria in your ear by 700 times.

* Grapes explode when you put them in the microwave.

* Those stars and colors you see when you rub your eyes are called phosphenes.

* Our eyes are always the same size from birth, but our nose and ears never stop growing.

* Everyone's tongue print is different, like fingerprints.

* Contrary to popular belief, a swallowed chewing gum doesn't stay in the gut. It will pass through the system and be excreted.

* At 40 Centigrade a person loses about 14.4 calories per hour by breathing.

* There is a hotel in Sweden built entirely out of ice; it is rebuilt every year.

* Cats, camels and giraffes are the only animals in the world that walk right foot, right foot, left foot, left foot, rather than right foot, left foot.

* Onions help reduce cholesterol if eaten after a fatty meal.

* The sound you hear when you crack your knuckles is actually the sound of nitrogen gas bubbles bursting
Read more

Join Zurker to get free VShares and become share holder of this website

Hello friends.
As u already know that facebook CEO and Founder mark zukerburg was blamed to stole the idea of facebook from two twin brother in harvard university in 2001 , later on they complaint and they got 65 million dollar in 2007.

click here to join

In 2009 they started a new project(ZURKER) and launched the beta version in DEC 2011.
You can join it now and become a share holder of this website.
This awesome feature of share is added by them.
Currently there are thousands of member joining this web site in UK alone per day. Totally free , new features than facebook and google+.
Join today and become share holder now. click here

Dont use different country ip to join because as beta it is limited to 7 country only.India and US people can create their account .Facebook worth 50 billion today but its users getting 0% so this new idea is invoked by the twin.
Follow the below link to join because you can register only by invitation from this link click here
Read more

Thursday, August 23, 2012

Recommendations for Email Security

Below are tips for using your email more safely.
1. Minimize the use of attachments
Copy and paste text as often as possible.

2. Question unsolicited document
Unsolicited bulk mail and commercial email can put you and your organization at risk. Questioning it means not opening it, not passing it on, but make sure to notify your system administrator immediately.

3. Never respond to spam email
For a spammer, one "hit" among thousands of mailings is enough to justify the practice. Instead, if you want a product that is advertised in a spam email, go to a Web site that also carries the product, inquire there, and tell them you do not approve of spam methods and will not patronize a company that uses spammers.

4. Never respond to the spam email's instructions to reply with the word "remove"
This is just a trick to get you to react to the email. It alerts the sender that a
human is at your address, which greatly increases its value. If you reply, your address is placed on more lists and you receive more spam.

5. Never sign up with sites that promise to remove your name from spam lists
These sites are of two kinds: (1) sincere, and (2) spam address collectors. The first kind of site is ignored (or exploited) by the spammers, and the second is owned by them. In both cases, your address is recorded and valued more highly because you have just identified it as read by a human.

6. Keep your virus protection up-to-date
Always make sure that the virus protection in your computer is in use and up to date.

7. Question executable programs received via email
This is the common way of passing viruses. Do not open them, do not pass them on, and notify your system administrator if you receive them.

8. Disable macros on your machine
To do this, you will need to open the application on Word 2000, select Tools, then select Macros, then select Security, and then checked High: Only signed macros from trusted sources will be allowed to run. Unsigned macros are automatically disabled.

9. Make sure that file extensions are viewable
This will alert you to files of the following types: .exe, .vbs, and .shs. To view file extensions in Windows select the Start menu, then select Settings, then select Control Panel, then select Folder Options, then select View, then UNCHECK the command that reads Hide File Extensions for Known file Types.

10. Notify the person you received an infected file from
This helps them to correct the problem within their system before passing the virus on to other users.

11. Monitor your transactions.
Review your order confirmations, account operations and trading statements as soon as you receive them to make sure that you are being charged only for transactions you made. Immediately report any irregularities.

12. Do not reply to any e-mail that requests your personal information.
Be very suspicious of any business or person who asks for your password, PIN (Personal Identification Number), or other highly sensitive information.
Read more

Recommendations for Home Computer Security

Task 1 – Install and use an Anti-Virus Program
A virus is a program that runs on your computer system without your permission. This means that when the virus runs, somebody else is using your computer possessions. A virus may also be destroying your files or disclosing them to others who aren't otherwise allowed to see them. An anti-virus program attempts to stop this from happening.

Task 2 – Keep your system Patched
Programs that need to be patched are weak spots through which intruders can more easily gain access to your computer possessions. Patching attempts to eliminate this kind of access. To protect your possessions, you need to keep all of the software you've purchased patched with all of the patches provided by the vendors who write that software. Vendors will tell you where to find and how to patch the software you have purchased from them.

Task 3 - Use Care When Reading Email with Attachments
Email attachments that you were not expecting are usually viruses, so the comments from Task 1 also apply here. Whether they are viruses or not, they are most often programs that run on your computer system without your permission. By using care, you are attempting to stop running unwanted programs on your computer system.

Task 4 – Install and Use a Firewall Program
A firewall program attempts to keep outside access out and limits inside access to outside resources. That is, it works like your locked front door that keeps unwanted people out and your toddler in. If intruders can't get to your computer resources, they can't use them for their purposes.

Task 5- Make Backups of Important Files and Folders
If a file or folder is destroyed accidentally, by an intruder, or in some other way, then a backup provides another copy. You are keeping what is yours by having more than one copy.

Task 6- Use Strong Passwords
These days, most of computer access users’ login selecting a strong password makes it harder for intruders to access your computer resources, because those passwords are harder to guess.

Task 7 - Use Care When Downloading and Installing Programs
The Internet is a powerful resource for finding and using the work of others to enhance your computing resources. Programs are one example.
However, not all programs on the Internet are what they say they are. Some programs are viruses like those described in Task 1, while others are like the email attachments described in Task 3.

By taking care before downloading and installing these programs, you are trying to improve the chances that these programs are what they say they are, will do to your computer resources what you want them to do, and will do nothing more.
Read more

Recommendations for Password Security

Pass phrases and Passwords
“If you've ever lost your wallet, you know the sense of vulnerability that comes with it. Someone might be walking around with your identification, pretending to be you. If someone steals your passwords, they could do the same thing online. "
Weak passwords

You probably already aware of not creating passwords using any combination of consecutive numbers or letters such as "12345678", "lmnopqrs", or adjacent letters on your keyboard such as "qwerty." And you've probably heard that using your login name, your spouse's name, or your birthday as your password are also big no-nos, or that you should never use a word that can be found in the dictionary, in any language? & even common words spelled backwards (Although at times becomes hard to remember)

Step 1: Create strong passwords that you can remember

The advice that we should follow is to come up with a completely random combination of numbers and symbols. We all know that a strong password is the one that, includes a combination of letters, numbers, and symbols and is easy for you to remember, but difficult for others to guess. This is the right approach but at times we tend to make the password complex for us to remember and resultant, we take a note of it on paper. Doing so we defeat the purpose of Strong Passwords, why? Chances are you would write it down and keep it in the top drawer of your desk and then it's No longer such a Great Password after all.

The easiest way to create a strong password is to come up with a pass phrase. A pass phrase is a sentence that you can remember, like "My son Aiden is three years older than my daughter Anna." You can make a pretty strong password by using the first letter of each word of the sentence. For example, msaityotmda, well we all know that we have to include numbers special characters for it to be valid.

You can make this password valid & stronger by using a combination of upper and lowercase letters, numbers, and special characters that look like letters. Substitute a @-sign instead of a, $-sign instead of an s,! Instead of an I or 1, (for c, 0 for o and so on. Well, you were not the first person to do that.)

For example, using the same memorable sentence and a few tricks, your password is now M$@!3y0tmd@ If you still think that is too hard to remember, you could try a more common phrase, such as "You can't teach an old dog new tricks." If you are using a common phrase, make sure to inject at least one number or symbol into the password. Such as U (t@0DnT.

Step 2: Keep your passwords a secret

Keeping your passwords safe means you have to keep them secret. Do not give them to friends and do not write them down and keep them at your desk or in an unprotected file on your computer. Your desk and that friend may not have the best motives when it comes to your privacy.
You should also be wary when giving them to the Web Site where you created the password in the first place. A new way in which hackers trick people into giving away their passwords and other personal information is through a scam called "phishing." Phishing is the practice of sending millions of bogus e-mails that appear to come from popular Web sites. The e-mails look so official that many people will respond to requests for their login name and password
Read more

Protect your Computer and Internet session

1. Never share your computer

2. Use a password on your PC to prevent unauthorized access to your information

3. Be wary of opening email messages from untrustworthy sources, especially if they contain attachments

4. Do not reply to emails that request your personal information. They may
appear to come from a trusted friend or business, but they are designed to trick you in disclosing sensitive personal information

5. Use personal firewalls and anti-virus software

6. Avoid downloading software such as screen savers, desktop themes, games, and other executable type programs from websites that are obscure or unidentifiable. These programs may contain Trojan viruses that would enable hackers to monitor or take over your PC

7. Disable all unnecessary services running on your computer

8. Always verify that the site is the genuine Emirates Islamic Bank/EIFB site

9. Do not leave your internet trading session unattended at any time

10. Before you start your internet trading session, ensure that all other internet sessions are closed. If your internet trading session is open, we recommend that you do not open other internet browsers at the same time
Read more

Protect your Password and Personal Information

1. Do not use passwords that are easy to guess, e.g. your name, your date of birth, your telephone number(s), etc

2. Use a combination of upper and lower case letters as well as numbers

3. Do not share your password with anyone and do not use the same password for other websites

4. Change your password frequently and never write it down in any where

5. Always log into Internet trading via our sites at the following addresse: and not through other links

6. Avoid logging into Internet for trading from Internet Cafés, Libraries or public sites

7. Always close the window once you have logged out of your Internet trading session

Important: No one at Emirates Islamic Financial Brokerage (EIFB) will ever ask you for your internet-trading password. If someone does ask you for it, they do not represent EIFB and under any circumstances, you should not provide this information.
Read more


Aright so u want to know how to turn the pc on in 10 seconds (may vary)Aright here what u have to do to turn ur pc on in 10 seconds

Click on the start button then press R it will take u to Run well go to run
n type Regedit
press enter
this will open Registery Editor
now look for the key


now there find the Key Called
"Startup Delay"
Double Click On It
Now where its Base
Click Decimal
Now its Default Value Is 4800000 (75300:hexadecimal)
Change The Value To 40000
here u go u have done it
now close the Registery Editor and Restart Your Computer
Read more

How to remove the shortcut arrow from the desktop ?

Open Regedit and navigate to the following key:

HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Shell Icons
Backup the key. More information.
In the right-pane, create a new String value named "29"
Double-click 29 and set its data to:

C:\Windows\System32\shell32.dll,50 (an empty icon)
Close Registry Editor.


Right-click Desktop, choose Properties
Click the Appearance Tab.

Click Advanced button.

Choose Icon from the drop-down list

Set it's size to 31 and press OK, OK.

The changes will be applied now. Repeat the above steps and then set the Icon size back to 32 (defaults). The above steps are required to force Windows to redraw the icons
Read more

Hacking windows SEND TO MENU

I know this is a very simple thing but the problem, as like many other issues, is the ignorance about it.

How often do you copy songs from a CD? Or some photos from a CD?

What do you do? You select the required files and do a CTRL –C. Open the destination folder and do a CTRL-V. Here is something you can benefit time from. Customize your SEND TO MENU.

This sounds simple and you can do it in less than sixty seconds.
You can create your own BASKET.

First you’ll need access to hidden files. So change your view settings to make all hidden files visible.
Tools -> folder options -> view (tab) and select the show hidden files and folders.
go to parent drive:/documents and settings/(user name)/send to

Open up my computer and locate your most used folders.

Create a shortcut of the most used folders in SEND TO FOLDER.You can do this in a number of ways.

Right click -> send to desktop(create shortcut) and move the shortcut from the desktop to the SEND TO FOLDER

Copy the most used folder and go to SEND TO FOLDER and right click -> paste shortcut.

Also remember to rename the shortcuts to send to videos or send to potos. We don’t need confusion when we use the same later.

Read more

Can u Delete Recycle Bin?

1 thing is 4 sure, delete option can be added 2 recycle bin.
the old registry thing will work out.
* launch the registry. [run regedit]
* open HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\ShellFolder
* to add a rename and delete option, change the Dword attribute to 70 01 00 20
* refresh and reboot the are done.
Read more

Deleting System Options from the Start menu

You can actually remove the Find and Run options from the start menu by performing a simple registry hack. Again like always Launch the registry editor and scroll down to the below key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer Right-

click on the right pane and select New, DWORD Value. Name it NoFind.(To remove the RUN option name it NoRun).
Double-click the newly create DWORD to edit it's value and enter 1 as its value. This will disable the FIND option of the Start Menu and will also disable the default Shortcut key(F3 for Find.)

To restore the Run or find command modify the value of the DWORD to 0 or simply Delete the DWORD value.
Read more

Disabling Display of Drives in My Computer

This is yet another trick you can play on your geek friend.

To disable the display of local or networked drives when you click My Computer

go to : HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Now in the right pane create a new DWORD item and name it NoDrives. Now modify it's value and set it to 3FFFFFF (Hexadecimal) Now press F5 to refresh.

When you click on My Computer, no drives will be shown. To enable display of drives in

My Computer, simply delete this DWORD item. It's .reg file is as follows: REGEDIT4 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explore r] "NoDrives"=dword:03ffffff
Read more

Ethical Hacking tools for hackers

most important tools:

1) IP Address Scanner
2) IP Calculator
3) IP Converter
4) Port Listener
5) Port Scanner
6) Ping
7) NetStat (2 ways)
8) Trace Route (2 ways)
9) TCP/IP Configuration
10) Online - Offline Checker
11) Resolve Host & IP
12) Time Sync
13) Whois & MX Lookup
14) Connect0r
15) Connection Analysator and protector
16) Net Sender
17) E-mail seeker
18) Net Pager
19) Active and Passive port scanner
20) Spoofer
21) Hack Trapper
22) HTTP flooder (DoS)
23) Mass Website Visiter
24) Advanced Port Scanner
25) Trojan Hunter (Multi IP)
26) Port Connecter Tool
27) Advanced Spoofer
28) Advanced Anonymous E-mailer
29) Simple Anonymous E-mailer
30) Anonymous E-mailer with Attachment Support
31) Mass E-mailer
32) E-mail Bomber
33) E-mail Spoofer
34) Simple Port Scanner (fast)
35) Advanced Netstat Monitoring
36) X Pinger
37) Web Page Scanner
38) Fast Port Scanner
39) Deep Port Scanner
40) Fastest Host Scanner (UDP)
41) Get Header
42) Open Port Scanner
43) Multi Port Scanner
44) HTTP scanner (Open port 80 subnet scanner)
45) Multi Ping for Cisco Routers
46) TCP Packet Sniffer
47) UDP flooder
48) Resolve and Ping
49) Multi IP ping
50) File Dependency Sniffer
51) EXE-joiner (bind 2 files)
52) Encrypter
53) Advanced Encryption
54) File Difference Engine
55) File Comparasion
56) Mass File Renamer
57) Add Bytes to EXE
58) Variable Encryption
59) Simple File Encryption
60) ASCII to Binary (and Binary to ASCII)
61) Enigma
62) Password Unmasker
63) Credit Card Number Validate and Generate
64) Create Local HTTP Server
65) extreme UDP Flooder
66) Web Server Scanner
67) Force Reboot
68) Webpage Info Seeker
69) Bouncer
70) Advanced Packet Sniffer
71) IRC server creator
72) Connection Tester
73) Fake Mail Sender
74) Bandwidth Monitor
75) Remote Desktop Protocol Scanner
76) MX Query
77) Messenger Packet Sniffer
78) API Spy
79) DHCP Restart
80) File Merger
81) E-mail Extractor (crawler / harvester bot)
82) Open FTP Scanner
83) Advanced System Locker
84) Advanced System Information
85) CPU Monitor
86) Windows Startup Manager
87) Process Checker
88) IP String Collecter
89) Mass Auto-Emailer (Database mailer; Spammer)
90) Central Server (Base Server; Echo Server; Time
Server; Telnet Server; HTTP Server; FTP Server)
91) Fishing Port Scanner (with named ports)
92) Mouse Record / Play Automation (Macro Tool)
93) Internet / LAN Messenger Chat (Server + Client)
94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/
95) Hash MD5 Checker
96) Port Connect - Listen tool
97) Internet MAC Address Scanner (Multiple IP)
98) Connection Manager / Monitor
99) Direct Peer Connecter (Send/Receive files + chat)
100) Force Application Termination (against Viruses and
101) Easy and Fast Screenshot Maker (also Web Hex Color
102) COM Detect and Test
103) Create Virtual Drives
104) URL Encoder
105) WEP/WPA Key Generator
106) Sniffer.NET
107) File Shredder
108) Local Access Enumerater
109) Steganographer (Art of hiding secret data in
110) Subnet Calculater
111) Domain to IP (DNS)
112) Get SNMP Variables
113) Internet Explorer Password Revealer
114) Advanced Multi Port Scanner
115) Port Identification List (+port scanner)
116) Get Quick Net Info
117) Get Remote MAC Address
118) Share Add
119) Net Wanderer
120) WhoIs Console.
121) Cookies Analyser
122) Hide Secret Data In Files
123) Packet Generator
124) Secure File Splitting
125) My File Protection (Password Protect Files, File
126) Dynamic Switch Port Mapper
127) Internet Logger (Log URL)
128) Get Whois Servers
129) File Split&Merge
130) Hide Drive
131) Extract E-mails from Documents
132) Net Tools Mini (Client/Server, Scan, ICMP, Net
Statistics, Interactive, Raw Packets, DNS, Whois, ARP,
Computer's IP, Wake On LAN)
133) Hook Spy
134) Software Uninstaller
135) Tweak & Clean XP
136) Steganographic Random Byte Encryption
137) NetTools Notepad (encrypt your sensitive data)
138) File Encrypter/Decrypter
139) Quick Proxy Server
140) Connection Redirector (HTTP, IRC, ... All protocols
141) Local E-mail Extractor
142) Recursive E-mail Extractor
143) Outlook Express E-mail Extractor
144) Telnet Client
145) Fast Ip Catcher
146) Monitor Host IP
147) FreeMAC (MAC Address Editor)
148) QuickFTP Server (+user accounts support)
149) NetTools Macro Recorder/Player (Keybord and Mouse
150) Network Protocol Analyzer
151) Steganographic Tools (Picture, Sounds, ZIP
Compression and Misc Methods)
152) WebMirror (Website Ripper)
153) Extra Tools (nmap console & win32 version)
Read more

Increase your computer's speed

Open up the Registry and go to:
[go to run and type regedit]

HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteComputer/NameSpace

Under that branch, select the key :


and delete it.

After this check out the browsing speed of ur pc.

Speed Up Mozilla Firefox.
Just follow these.

Type "about:config" into the address bar and hit enter. Scroll down and look for the following entries:


2. Alter the entries as follows:

Set "network.http.pipelining" to "true"
Set "network.http.proxy.pipelining" to "true"
Set "network.http.pipelining.maxrequests" to some number like 30.

3. Lastly right-click anywhere and select New-> Integer. Name it "nglayout.initialpaint.delay" and set its value to "0".

This value is the amount of time the browser waits before it acts on information it receives.


More speed
HKEY_CURRENT_USER/control panel/desktop

Now on the right side:-
-right click 'HungAppTimeout'
-Click 'Modify'
-Type Value 1000 click Ok

-right click "menu show delay"
-make it 5.

-right click "waytokillapptimeout"
-change value from 20000 to 3000.
Read more

Saturday, August 18, 2012

send unlimited free messages to any number and earn money to recharge mobile

you want to send unlimited messages ?
you are at right place then.

yes you earn money when you send messages.

The idea is simple , you send messages to your friends and you earn money on every message you send. It is totally reverse, you send message from mobile your balance is deducted but here you send a free message and you earn some money on every message which you use to recharge.

So you earn money on sending free sms then you use that money to recharge your mobile therefore, no need to waste your money on vouchers also.

so how do you start, just register on this website : Click here

[Optional] If referer code is asked then put this 282003E
This helps you earn more.

send messages and enjoy.
Read more

Tuesday, August 14, 2012

Best Downloading Sites

Best Downloading Sites

Youtube downloading sites:

> (supports 3gp HQ & Mp4 video formats)
Read more

access menu in ur phone withour a SIM card

To access menu in ur phone withour a SIM card, do the following:

>type **04*0000*0000*0000#

>When it says "Wrong Pin" press No.
Read more

how to find ip address of computer

To find IP address

Go to run
-> cmd

and type

Read more

Free PC Software sites

Free software websites





Read more

Saturday, August 11, 2012

Four Google Search Engines At One Page

4 Search engines at one page.

Go to this link

One page but four search engines

cool trick
Read more

how to request for new ip address

Start -> run -> cmd.exe and click OK

type the following. ENTER after each new line.

- ipconfig /flushdns
- ipconfig /release
- ipconfig /renew
- exit

Erase your cookies in whatever browser you are using

Read more

Proxy websites whic helps in openin a website if blocked

You can use this websites if any website is blocked.
Read more

Download Videos from YouTube or similar websites without any software (BEST)
Read more

how to SpeedUP internet surfing

-Go 2 Run

-type gpedit.msc

->administrative Template

->Computer configuration


->change value to 0

restart computer done.
Read more

Thursday, August 09, 2012

how to disable writing to USB

go to run and type regedit.msc

navigate to


and change values


Read more


follow the procedure

> open run command .

> type "regedit" without quotes.

> go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall

> click on any one of them and check "display name".
display name tells the installed program .

> delete the folder of the program which you want to
uninstall .
Read more

Get a Power Efficiency Report in windows 7

Have a laptop and want to get more battery life out of it? Windows 7 includes a hidden built-in tool that will examine your laptop's energy use and make recommendations on how to improve it.

To use it:

> Run a command prompt as an administrator. To do this,
type cmd in the search box, and when the cmd
icon appears, right-click it and choose
"Run as administrator."

> At the command line, type in the following:
powercfg -energy -output \BANDIKISHORE\Energy_Report.html
where \BANDIKISHORE represents the folder where you
want the report to be placed.

Example: powercfg -energy -output C:\Energy_Report.html
It lets the file to be created in C: drive

> For about a minute, Windows 7 will examine the
behavior of your laptop. It will then analyze
it and create a report in HTML format in the
folder you specified. Double-click the
file, and you'll get a report.

follow its recommendations for ways to improve power performance
Read more

how to Create Your own Virtual Drive in windows

> Go to start
> run
> Type cmd
> subst k: c:\FOLDERNAME

Check your my computer, new drive should be shown.
For removing, type

> subst k: /d

Basically virtual drive k assign a path to the
Read more

Put Folders, Files To "Send To"

Go to the path in explorer bar:

C:\Documents and Settings\user\SendTo

Remember SendTo folder is hidden by default. So

firstly you would have to apply the permission Show
hidden files and folders.

Paste shortcut of any folder or file.
Read more

Operate Computer Without Mouse Follow these steps

1. Press Shift+Alt + Num Lock

2. MouseKeys window will appear. Click OK or Settings
for further configuration.

3. Now you can operate your cursor position using
number keys(use the NUMPAD).
Read more

Hide User Accounts from users

> Start/Run, and type:


> User Config > Admin Templates > Control Panel

> doubleclick "Hide specified Control Panel applets"

> 'enabled'> then click 'Show"

> click Add button,

> type "nusrmgt.cpl" into the add box
Read more

Monday, August 06, 2012

To Speed Up Ur Computer

Click START-> Run-> Type "regedit"->

HKEY_CURRENT_USER -> control panel -> desktop

-> hung application timeout, right click'modify', make value to 1000,then click OK.

-> right click "menu show delay", make it 80.

-> right click on "waytokillapptimeout" modify, change value from 20000 to 3000.
Read more

How to Rename the Recycle Bin

To change the name of the Recycle Bin desktop icon,

open Regedit (type regedit in run) and go to:


and change the name "Recycle Bin" to whatever you want
(don't type any quotes).
Read more

how to know From When Your Computer Is Running

Go to start

> run

> cmd and type

> net statistics workstation

It will show statistics since date & time.

Here's one more other way by using this command
Read more

Apply Password To Your Guest Account

Applying a password to your guest account looks somewhat annoying, but you can easily apply it using cmd .

Just follow these steps:

Go to start

> run
> cmd
> Type "net user guest RAKESH" without quotes

where RAKESH is your password which you will
apply to guest. But for this you must be Log In with
using administration account.

Go to user accounts, you will see password apply to
your guest account.
Read more

Save Images From MS Word (.doc)

When you open any document in MS word, try to click on picture for saving then it does not provide option for saving it. so here's a way simply to save picture from any .doc file.

Follow these simple steps:

1. Save .doc documents as web page means as .htm

2. Open it with browser.

3. Save picture in the way as you do from any html file either by drag and drop or right click then save image as.
Read more

How to Fix Limited Or No Connectivity

After installing Windows XP Service Pack 2, you may
receive the following error message in the System Tray.

"This connection has limited or no connectivity. You
might not be able to access the Internet or some network
resources. " .

When attempting to set up or make network connections on a Windows computer, you may
encounter a Limited Or No Connectivity error message.

This message can result from any of several different
technical glitches or configuration problem.

Just copy this code and paste it in notepad.

Then save it as fix.bat

echo ipconfig/flushdns
echo ipconfig/release
echo ipconfig/renew

It will fix the error automatically. Then go to Local
Area Connection Properties and uncheck Notify me when
this connection has limited or no connectivity.

However if your broadband connection is working properly but
still it displays the error then no need to worry about
it, then simple uncheck the Notify me when this
connection has limited or no connectivity.
Read more

How to Disable User Access Control (UAC)

This much-loathed new Vista feature attempts to protect your system from malware infection by making you

manually confirm a whole host of everyday user operations. While it does not directly impact performance, it can be annoying and might be more hassle than good.

To disable User Access Control:

􀁺 Click Start then Control Panel

􀁺 Select User Accounts

􀁺 Select Turn User Account Control on or off

􀁺 Uncheck User Account Control Box

􀁺 Restart as recommended
Read more

Turn off System Restore

Analysis and restore point creation by Windows Vista can eat a fair amount of system resources. Disabling this

service will obviously mean the system restore feature in Vista will not be available in the event of a system crash.

Change this at your own risk.

To disable this service:

􀁺 Control Panel>System

􀁺 Click System Protection on the left panel

􀁺 Uncheck the main system drive

􀁺 Agree to the confirmation
Read more

Turn off Windows Hibernation

Windows hibernation background services can use a large amount of system resources. If you do not use the

Hibernate feature on a regular basis you may want to disable it to give Vista a performance boost.

To disable Hibernation:

�� Select the Control Panel then Power Options

�� Click Change Plan Settings

�� Click on Change Advanced Power Settings

�� Expand the Sleep selection

�� Expand the Hibernate After selection

�� Crank the selector down to zero

􀁺 Click Apply
Read more

Turn off Automatic Disk Defragmentation

Windows Vista and its always-on defragment feature is not really that necessary and can cause system slow down.

Just remember to run a defrag manually every week or so.

To disable this:

􀁺 Click Start then Computer

􀁺 Right Click the C: Drive

􀁺 Click on Properties

􀁺 Select the Tools Tab

􀁺 Click on Defragment Now

􀁺 Uncheck Run on a schedule
Read more

Disable Wallpaper Change in Windows 7

Desktop wallpaper can be restricted and can be set against any change for wallpaper.

 Open Run Dialogue Box (Win + R) and type gpedit.msc

 Navigate to Local Computer policy > User Configuration > Administrative Templates >
Desktop in left hand side pane.

 Select Desktop Wallpaper setting from right side pane.

 Open it and enable it.

 To use this setting, type the fully qualified path and name of the file that stores the wallpaper image. You can type a local path, such as C:\Windows\web\wallpaper\home.jpg. Also this setting specifies that the wallpaper image be centered, tiled, or stretched.

 Press OK
Read more

Retrieve Built Details & other Information of Windows Installed

Often Techies feel to have the Built number of OS they are using. Like I felt. Few OS versions have this info at the Desktop screen like Windows 7 Beta, RC had but few don‟t have .

To find out these details and much more info like product edition, build number and revision number for Windows Vista, Windows Server 2008,Windows 7 that is installed,

follow these steps:

 Open Registry Editor by typing Regedit in Start Search, then hit Enter.

 Go to the following registry key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion

 In the right side pane, you will see lots of registry subkeys and its value date. These keys will give you the required information about syour OS…..

1. ProductName : of Windows

2. EditionID: edition aka flavor of the OS.

3. BuildLabEx: Contains build and revision number

4. Current Build : contains build number

5. Registered Owner

6. Registered Organization
Read more

Friday, August 03, 2012

Setting Capslock Numlock and Scroll Lock

If you want to set the startup state for any or all of these keys,
you just need to edit the registry.

go to run and type regedit

Go to HKEY_CURRENT_USER \ Control Panel \ Keyboard
Open InitialKeyboardIndicators

Change the value to one of the following numbers

0 - All Keys off

1 - Caps Lock on

2 - Num Lock on

4 - Scroll Lock on

For multiple keys, add their values:

3 - Caps Lock and Num Lock on

5 - Caps Lock and Scroll Lock on

6 - Num Lock and Scroll Lock on

7 - Caps Lock, Num Lock, and Scroll Lock on

Log off and back on again
Read more

disable unwanted sservices to speed up your boot time and free resources

Services You Can Disable

There are quite a few services you can disable from starting automatically.

This would be to speed up your boot time and free resources.

They are only suggestions so I suggestion you read the description of each one when you run Services and that you turn them off one at a time.

Some possibilities are:

Alerter - Sends alert messages to specified users that are connected to the server computer.

Application Management - Allows software to tap directly into the Add/Remove Programs feature via the Windows Installer technology.

Background Intelligent Transfer Service - The Background Intelligent Transfer service is used by programs (such as Windows AutoUpdate) to download files by using spare bandwidth.

Clipbook - ClipBook permits you to cut and paste text and graphics over the network.
Error Reporting Service - Allows applications to send error reports to Microsoft in the event of an application fault.

Fast User Switching - Windows XP allows users to switch quickly between accounts, without requiring them to log off.

Help and Support - Allows the XP Built-in Help and Support Center to run.
IMAPI CD-Burning COM Service - You don't need this if you have other software to create CDs.

Indexing Service - Indexes contents and properties of files on local and remote computers; provides rapid access to files through flexible querying language.

IP SEC - Manages IP security policy and starts the ISAKMP/Oakley (IKE) and the IP security driver. If you are not on a domain, you likely don't need this running.

Messenger - Transmits net send and Alerter service messages between clients and servers. This is how a lot of pop-up windows start appearing on your desktop.

Net Logon - Supports pass-through authentication of account logon events for computers in a domain. If you are not on a domain, you don't need this running

Network DDE - Provides network transport and security for Dynamic Data Exchange (DDE) for programs running on the same computer or on different computers.
NT LM Security Support Provider - Provides security to remote procedure call (RPC) programs that use transports other than named pipes.

Performance Logs and Alerts - Collects performance data from local or remote computers based on preconfigured schedule parameters, then writes the data to a log or triggers an alert. If you don't need to monitor your performance logs, then you don't need this service.

Portable Media Serial Number - Retrieves the serial number of any portable music player connected to your computer

QOS RSVP - Provides network signaling and local traffic control setup functionality for QoS-aware programs and control applets.

Remote Desktop Help Session Manager - Manages and controls Remote Assistance. If you are not using Remote Desktop you don't need this service.

Remote Registry - Enables remote users to modify registry settings on this computer.

Routing & Remote Access - Offers routing services to businesses in local area and wide area network environments. Allows dial-in access.

Secondary Login - Enables starting processes under alternate credentials. This is what allows you to run an application as another user.

Smart Card - Manages access to smart cards read by this computer.
Smart Card Helper - Enables support for legacy non-plug and play smart-card readers used by this computer.

SSDP Discovery Service - Enables discovery of UPnP devices on your home network.

TCP/IP NetBIOS Helper - Enables support for NetBIOS over TCP/IP (NetBT) service and NetBIOS name resolution. This should not be needed in today's network environment.

Telnet - Enables a remote user to log on to this computer and run programs, and supports various TCP/IP Telnet clients.

Uninterruptible Power Supply Service - Manages an uninterruptible power supply (UPS) connected to the computer.

Universal Plug and Play Device Host - Provides support to host Universal Plug and Play devices

Upload Manager - Manages synchronous and asynchronous file transfers between clients and servers on the network.

Volume Shadow Copy Service - Manages and implements Volume Shadow Copies used for backup and other purposes.

Web Client - Enables Windows-based programs to create, access, and modify non-local files across the Internet.

Wirelesses Zero Configurations - Provides automatic configuration for the 802.11 adapters

WMI Performance Adapter - Provides performance library information from WMI HiPerf providers.

These are some tips to use winxp as per your requirement. Please restore your system before made any changes un registery
Read more

Wednesday, August 01, 2012

Fix a Slow Internet Connection

Why is your internet connection speed so slow?

Because you have not been nice to your bandwidth

There are number of simple and easy ways to speed up your PC on the net. Most of these solutions will cost you absolutely nothing. So, before you invest in a program that will speed up your internet access, take the time to perform a few maintenance tips to speed up your PC on the net.

The most important thing to remember is that your bandwidth has a limit. You paid for
this limitation when you signed up to your internet service provider. So, treat your
bandwidth as a precious commodity.

If your PC speed on the net is slow, it’s probably the result of improper use of your

Here are the best ways to speed up your PC on the internet.

1. Use a Firewall

A Firewall allows you to control both incoming and outgoing internet traffic on your PC.
The more programs you allow to use your bandwidth, the slower your PC speed on the
net becomes. Control the traffic and stop the congestion and erosion of your bandwidth.

2. Eliminate Index.dat files

These are little demons that will significantly slow down your computer's speed on the internet. Microsoft designed these secret human unreadable files to re-record all your internet history. All viewed web pages, downloads, even this article is logged there.

These files can grow up 100 megabytes. These large files requires CPU constant access
and bandwidth. Microsoft claims the files were originally designed to increase internet speed by mimicking a server. But it does the opposite because these files are re-record your internet history. This requires double the bandwidth of other files. Speed up your PC on the internet by eliminating these files.

3. Use a proxy

This is a very simple procedure that will speed up your PC internet access as much as
30%. Proxies allow you to surf through a server. This server network can load thousands of popular web pages. Therefore, there is no reason to use bandwidth to access them.

They are already pre-loaded. This will speed up your PC internet access time

4. Clear Your Cache

Your web browsers save a ton of data into a temporary storage area called your cache.
All your saved passwords, visited websites and downloaded files are stored here. The
problem is that this space is limited.

When it fills your browser slows down because it unable to dump information into your Windows cache. Clear your cache in order to
speed up your net surfing.
Read more

Speed Up Your Hard with NTFS.

Windows XP offers NTFS hard drive configuration. This offers better compression,
security and encryption. However, this conversion from FAT to NTFS standard requires
a bit more space on your hard drive nevertheless you will be reward with a faster drive.

You can easily switch to this system by following directions below:

1. Click Start

2. Click Run

3. Type cmd press Enter.

4. At the command prompt, type convert X:/FS:NTFS(X is your hard drive letter)

5. Hit Enter
Read more

Speeding Up Internet Searches

When you go to a web site, the first thing that happens is that a query goes out to the DNS server for IP address of the web site.

In order to eliminate this query, you can simply add the IP address and web name into the HOSTS file in the Windows directory.

To find the IP address, just PING the web name (ping For example, Microsoft would be: #.url

You can do this for all the sites you regularly visit.
Read more

Using the Ultimate Configuration Tool - the group policy editor

One of the most full featured Windows XP configuration tools available is hidden right there in your system, but most people don't even know it exists.
It's called the Local Group Policy Editor, or gpedit for short. It just like old Poledit.exe.

To start this editor:

Select Start and then Run, then type the following:

After you hit Enter, you'll be greeted by gpedit, which lets you modify almost every feature in Windows XP without having to go to regedit.
Read more

Enable disable automatic updates in windows - All about windows updates

How to Turn On Automatic Updates

Click Start , click Control Panel , and then double-click System.

Click the Automatic Updates tab, and then click one of the following options:

- Download the updates automatically and notify me when they are ready to be installed. (This is the default setting.)

- Notify me before downloading any updates and notify me again before installing them on my computer.

How to Turn Off Automatic Updates

Click Start , click Control Panel , and then double-click System.

Click the Automatic Updates tab, and then click Turn off automatic updating. I want
to update my computer manually.

How to Update Your Files Manually by Using Windows Update

If you choose not to use automatic updating, you can still install specific updates from the Windows Update Web site. Windows Update is a catalog of items such as drivers, security fixes, critical updates, the latest Help files, and Internet products that you can download to keep your computer up-to-date.

Click Windows Update in Help and Support Center.

On the Windows Update home page, click Scan for updates.

Click Yes when you are prompted to install any required software or device drivers.

How to Have Windows Remind You About Pending Updates

Click Remind Me Later in the Automatic Updates dialog box before you download or install the update.

In the Reminder dialog box, you can specify the amount of time Windows should wait before reminding you.

If the reminder is for downloading, Windows reminds you only when you are connected to the Internet.

If the reminder is for installing, Windows reminds you according to the schedule that you specify.

How to Download Available Updates

If you configured automatic updating to notify you before downloading any updates, an icon is displayed in the notification area each time new updates are found.
Double-click the icon in the notification area.

Do either of the following steps:
If you want Windows to download an update, make sure that the check box beside it is selected.-or-

If you do not want Windows to download an update, click to clear the check box beside it.

Your selected updates are downloaded in the background; this behavior allows you to continue working uninterrupted. Downloading does not interfere with or slow down other network activity, such as Internet browsing.

When downloading is finished, the icon is displayed in the notification area to notify you that updates are ready to be installed.

How to Pause or Resume Downloading

After the download process has started, you can pause or resume downloading at any time. If you close your Internet connection or restart your computer after pausing a download process, Windows automatically resumes the download process the next time you are connected to the Internet.

During the download process, click the icon that is displayed in the notification area, and then click Pause.

When you are ready for Windows to start downloading again, click the Automatic updating icon, and then click

Restore an Update that You Previously Declined

If you decide not to download a specific update, you can prompt Windows Update to offer that update again.

Click Start , click Control Panel, and then double-click System.

Click the Automatic Updates tab, and then click Restore Declined Updates.
Read more

Do Not Highlight Newly Installed Programs

Tired of that annoying little window that pops up to tell you that new software is installed? If it gets in the way when you’re logging off, turn it off completely. To do this:

Click Start, right-click at the top of the Start menu where your name is displayed, and then click Properties.

In the Taskbar and Start Menu Properties dialog box, on the Start Menu tab, click Customize.

Click the Advanced tab, and then clear the Highlight newly installed programs check box.
Click OK, and then click OK again.
Read more

Correcting System Hang at Startup

If your system hangs about 2 or 3 minutes at startup, where you can't access the Start
button or theTaskbar, it may be due to one specific service (Background Intelligent Transfer) running in the background. Microsoft put out a patch for this but it didn't
work for me.

Here's what you do

Click on Start/Run, type 'msconfig', then click 'OK'.

Go to the 'Services' tab, find the 'Background Intelligent Transfer' service.

Disable it, apply the changes & reboot.
Read more

Cracking windows xp admin and user passwords

I hope u guys liked tip given for resetting passwords in first part.
If u have guest or limited user account on PC than that control userpasswords2 tip does not help u much. Windows will still ask u admin password for resetting users passwords .

Ok go and Download a tool called CIA COMMANDER this is just what we want. This tool will create a copy protected bootable floppy which will allow u to boot any computer and also help u to get into any NTFS partition .First select floppy as first bootable device from BIOS. CIA shows u every thing to u in GUI.

After booting CIA will allow u to reset any user password even administrator’s password. It also includes a file manager, registry editor and a text/hex editor. Present version of CIA does not support FAT partitions but sooner its new version will even support FAT partition based system.

I have read on some tutorials about a tool called NTFS Pro which looks almost like CIA .
Read more

Turn Off System Restore to Save Space

By default, Windows XP keeps a backup of system files in the System Volume Information folder. This can eat up valuable space on your hard drive.
If you don't want Windows to back up your system files:

Open the Control Panel.

Double-click on System.

Click the System Restore tab.

Check "Turn off System Restore on all drives".

Hit Apply.

You may now delete the System Volume Information folder.
Read more

Disable Error Reporting

Open Control Panel.

Click on Performance and Maintenance.

Click on System.

Then click on the Advanced tab.

Click on the error-reporting button on the bottom of the windows.

Select Disable error reporting.

Click OK. Click OK.
Read more

Easy Way to Adjust LargeSystemCache

Normally, the tweak I've seen asks you to go into HKLM\System\CurrentControlSet\Control\Session Manager\Memory Management and change the value to either O or 1 to the adjustment the LargeSystemCache.

However, in Windows XP, all you have to do is:

Right-click My Computer.

Select Properties.

Click Advanced.

Choose Performance.

Click Advanced again.

Select either Programs or System Cache under Memory Usage.

Programs = 0 for the registry tweak equivalent
System Cache = 1 for the registry tweak equivalent
Read more

Load Internet Explorer the Fastest Way Possible

Edit your link to start Internet Explorer to have -nohome after it.

For Example: "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome

This will load internet explorer very fast because it does not load a web page while it is loading.

If you want to go to your homepage after it is loaded, just click on the home button.
Read more

Performance Increase Through My Computer

Easy enough tweak to usually find out about it on your own, but still, some of us still don't find it right away. So here it is:

Start > right-click on My Computer and select Properties.

Click on the "Advanced" tab.

See the "Performance" section? Click "Settings".

Disable the following:

Fade or slide menus into view

Fade or slide ToolTips into view

Fade out menu items after clicking

Show Shadows under menus

Slide open combo boxes

Slide taskbar buttons

Use a background image for each folder type

Use common tasks in folders

There, now Windows will still look nice and perform faster.
Read more