tag:blogger.com,1999:blog-82613074367683017092023-06-20T21:58:44.023-07:00Tips for Trickslegal tricks to easy access on internetedifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.comBlogger28125tag:blogger.com,1999:blog-8261307436768301709.post-2128647007962260512007-09-21T02:03:00.000-07:002007-09-21T02:05:12.207-07:00Removing Services Dependencies.This will allow you to disable a service or uninstall it from your system without effecting another service that depends on it. Here's how you do it<br />1. After you have set your services the way you want them and you have disabled/uninstalled something that another services depends on, run "regedit"<br />2. Under HKEY_LOCAL_MACHINE\System\find the service that will not function, do to another service being disabled/uninstall (found in ControlSet001\Services, ControlSet002\Services, and CurrentControlSet\Services)<br />3. Once you have found the service right-click on the string value, "DependOnService,"and modify<br />4. You should now see a list of services that it is dependent on. Simply delete the service that you have disabled/uninstalled<br />5. Restart your computer and your ready to go Disclaimer REMEMBER TO BACKUP YOU REGISTRY FIRST I'm not totaly sure if this will have any negative effects on your system.<br />I used this method after uninstalling "Netbios over Tcpip" from my system completely, so that my Dhcp service would function and I have had NO negative effects on my system.edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-26078892823534919622007-09-21T02:01:00.000-07:002007-09-21T02:02:55.354-07:00HIDDEN WINDOWS XP ICONS.Windows XP Pro and Home contains icons for folders and files that cannot normally be seen, you can select to view hidden files from the folder options menu, but there are still some that remain hidden.You can set windows to view these files as normal hidden files, so that when you use the view hidden files and folders toggle from the folder options menu that these will be turned on/off along with the normal hidden files.These files are usually system files and should not be altered or deleted unless you really know what you are doing, if you don't yet still wish to change them I might suggest that you create back-ups of your system first.<br /><br />I will personally accept no responsibility for any damage caused by using this tweak. To view the hidden files you need to open up regedit, if you are not sure how to do this, select run from the start menu and type in 'regedit' without the apostrophe's. In the regedit window, expand out the groups by clicking on the '+' next to the name in the left hand column of regedit, and navigate to the below address.HKEY_CURRENT_USER \SOFTWARE \MICROSOFT \WINDOWS \CURRENTVERSION \EXPLORER \ADVANCEDwhen you have clicked the advanced folder on the left pane, look down the list at the titles in the right hand pane, one of those titles is 'ShowSuperHidden'double click the title and in the window that appears set the value to equal 1 to show the super hidden files and 0 to hide them.edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-63521101220093423382007-09-04T07:18:00.000-07:002007-09-04T07:24:01.494-07:00Speed up you windows againIts too long content for me to put all ways and methods on how to speed up the windows. Dont worry I will explain to you through my post, so you have to ensure keep your eyes on my post okay. Okay for the second ways on how to speed up your windows is to turn off your system restore.<br /><br />System Restore can be a useful if your computer is having problems, however storing all the restore points can literally take up Gigabytes of space on your hard drive. To turn off System Restore:<br /><br />1. Open Control Panel<br />2. Click on Performance and Maintenance<br />3. Click on System<br />4. Click on the System Restore tab<br />5. Tick 'Turn off System Restore on All Drives'<br />6. Click 'Ok'<br /><br />You also can defragment your pagefile. One of the best ways of doing this is to creat a separate partition on your hard drive just for your page file, so that it doesn't get impacted by normal disk usage. Another way of keeping your pagefile defragmented is to run PageDefrag. This cool little app can be used to defrag your pagefile, and can also be set to defrag the pagefile everytime your PC starts. To install:<br /><br />1. Download and Run PageDefrag<br />2. Tick "Defrag at next Reboot"<br />3. Click "Ok"<br />4. Rebootedifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-77033782636068722732007-09-04T07:09:00.000-07:002007-09-04T07:18:24.686-07:00Speed up your windowsBefore this I provided you with some advices to speed up your PC machines .Glad I helped, since I got huge positive response so I decided to put another few advices for you to obey! ok let's start with the Ways To Speed Up Windows:<br /><br />The first thing you should know that Windows XP has many services running that take up system resources that you will never need. Below is a list of services that can be disabled on most machines:<br /><br />• Alerter<br />• Clipbook<br />• Computer Browser<br />• Distributed Link Tracking Client<br />• Fast User Switching<br />• Help and Support - (If you use Windows Help and Support leave this enabled)<br />• Human Interface Access Devices<br />• Indexing Service<br />• IPSEC Services<br />• Messenger<br />• Netmeeting Remote Desktop Sharing (disabled for extra security)<br />• Portable Media Serial Number<br />• Remote Desktop Help Session Manager (disabled for extra security)<br />• Remote Procedure Call Locator<br />• Remote Registry (disabled for extra security)<br />• Remote Registry Service<br />• Secondary Logon<br />• Routing & Remote Access (disabled for extra security)<br />• Server<br />• SSDP Discovery Service - (Unplug n' Pray will disable this)<br />• Telnet<br />• TCP/IP NetBIOS Helper<br />• Upload Manager • Universal Plug and Play Device Host<br />• Windows Time<br />• Wireless Zero Configuration (Do not disable if you use a wireless network)<br />• Workstation<br /><br />How to solve this? easy way you just disabled all these things and that's it..oppsss..I forget to tell you the ways on how to disabled all these unneeded services.<br /><br />1. Go to Start and then Run and type "services.msc"<br />2. Doubleclick on the service you want to change<br />3. Change the startup type to 'Disable"<br /><br />Get the point?right..do it now!edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-3497057044255253502007-09-03T01:50:00.000-07:002007-09-03T01:54:14.660-07:00Viruses calling phase 2I just go through its types directly<br /><br /><strong>6. Virus: W32/Mytob-EX</strong><br />A mass-mailing worm and IRC backdoor Trojan similar in nature to W32-Mytob-GH. W32/Mytob-EX runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels. This virus spreads by sending itself to email attachments harvested from your email addresses.<br /><br /><strong>7. Virus: W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER<br /></strong>This family of worm variations possesses similar characteristics in terms of what they can do. They are mass-mailing worms with backdoor functionality that can be controlled through the Internet Relay Chat (IRC) network. Additionally, they can spread through email and through various operating system vulnerabilities such as the LSASS (MS04-011).<br /><br /><strong>8. Virus: Zafi-D</strong><br />A mass mailing worm and a peer-to-peer worm which copies itself to the Windows system folder with the filename Norton Update.exe. It can then create a number of files in the Windows system folder with filenames consisting of 8 random characters and a DLL extension. W32/Zafi-D copies itself to folders with names containing share, upload, or music as ICQ 2005a new!.exe or winamp 5.7 new!.exe. W32/Zafi-D will also display a fake error message box with the caption "CRC: 04F6Bh" and the text "Error in packed file!".<br /><br /><strong>9. Virus: W32/Netsky-D</strong><br />A mass-mailing worm with IRC backdoor functionality which can also infect computers vulnerable to the LSASS (MS04-011) exploit.<br /><br /><strong>10. Virus: W32/Zafi-B</strong><br />A peer-to-peer (P2P) and email worm that will copy itself to the Windows system folder as a randomly named EXE file. This worm will test for the presence of an internet connection by attempting to connect to www.google.com or www.microsoft.com. A bilingual, worm with an attached Hungarian political text message box which translates to “We demand that the government accommodates the homeless, tightens up the penal code and VOTES FOR THE DEATH PENALTY to cut down the increasing crime. Jun. 2004, Pécs (SNAF Team)”<br /><br />These are all in "one family" if you can see the main head of virus is W32. Its a best plat number for your car but its not a best for your computer.edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-73962758167391972412007-09-03T01:43:00.000-07:002007-09-03T01:50:09.847-07:00Viruses callingFor the next 2 or 3 post, I would like to explain to you about the viruses that you should know in order to protect your computer. Some viruses are dangerous and some of them is not however if you call "virus" its still need to prevent. Simple advice from me, keep your anti-virus software updated, and stay aware of the current computer virus threats.<br /><br /><strong>1. Virus: Trojan.Lodear</strong><br />A Trojan horse that attempts to download remote files. It will inject a .dll file into the EXPLORER.EXE process causing system instability.<br /><br /><strong>2. Virus: </strong><a href="mailto:W32.Beagle.CO@mm"><strong>W32.Beagle.CO@mm</strong></a><br />A mass-mailing worm that lowers security settings. It can delete security-related registry sub keys and may block access to security-related websites.<br /><br /><strong>3. Virus: Backdoor.Zagaban<br /></strong>A Trojan horse that allows the compromised computer to be used as a covert proxy and which may degrade network performance.<br /><br /><strong>4. Virus: W32/Netsky-P</strong><br />A mass-mailing worm which spreads by emailing itself to addresses produced from files on the local drives.<br /><br /><strong>5. Virus: W32/Mytob-GH</strong><br />A mass-mailing worm and IRC backdoor Trojan for the Windows platform. Messages sent by this worm will have the subject chosen randomly from a list including titles such as: Notice of account limitation, Email Account Suspension, Security measures, Members Support, Important Notification.<br /><br />That's all for the viruses that you should be aware and I call it the top 5 viruses that is really..really aware...I will tell you another viruses in the next post.edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-61380488742489081762007-09-03T01:36:00.000-07:002007-09-03T01:42:55.680-07:00Fighting SpamI will make it short on how to protect your email from spam.<br /><br /><strong>1. Do what you can to avoid having your email address out on the net.</strong> <br /><br />There are products called “spam spiders” that search the Internet for email addresses to send email to. If you are interested, do a search on “spam spider” and you will be amazed at what you get back. You can view at <a href="http://www.webpoison.org/">www.WebPoison.org</a><br /><br /><strong>2. Get spam blocking software</strong><br /><strong></strong><br />For this program you can go directly to <a href="http://www.cloudmark.com/">www.cloudmark.com</a> or <a href="http://www.mailwasher.net/">www.mailwasher.net</a> . Whatever you do, get the software. It will save you time. The software is not foolproof, but they really do help. You usually have to do some manual set up to block certain types of email.<br /><br /><strong>3. Use the multiple email address approach</strong><br /><br />There are a lot of free email addresses to be had. If you must subscribe to newsletters, then have a “back-up” email address. It would be like giving your sell phone number to your best friends and the business number to everyone else.<br /><br /><strong>4. Attachments from people you don’t know are BAD, BAD, and BAD!!</strong><br /><strong></strong><br />You should know why I repeat for 3 times right? if you do not know who is sending you something, DO NOT OPEN THE ATTACHMENT. Secondly, look for services that offer filtering. Firewall vendors offer this type of service as well.<br /><br /><strong>5. Email services now have “bulk-mail” baskets</strong><br /><br />If what you use currently does not support this, think about moving to a new vender. The concept is simple. If you know someone, they can send you emails. If you don’t know them, put them in the bulk email pile and then “choose” to allow them into your circle. Spam Blocking software has this concept as well, but having extra layers seems critical these days, so it is worth looking into.edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-10828909771764653942007-09-03T01:32:00.000-07:002007-09-03T01:35:03.231-07:00What is Botnets?A botnet is comparable to compulsory military service for windows boxes and this definition I took it from <a href="http://project.honeynet.org/papers/bots">http://project.honeynet.org/papers/bots</a> .<br /><br />Botnets are networks of computers that hackers have infected and grouped together under their control to propagate viruses, send illegal spam, and carry out attacks that cause web sites to crash.What makes botnets exceedingly bad is the difficulty in tracing them back to their creators as well as the ever-increasing use of them in extortion schemes. How are they used in extortion schemes? Imagine someone sending you messages to either pay up or see your web site crash. This scenario is starting to replay itself over and over again.<br /><br />Botnets can consist of thousands of compromised machines. With such a large network, botnets can use Distributed denial-of-service (DDoS) as a method to cause mayhem and chaos. For example a small botnet with only 500 bots can bring corporate web sites to there knees by using the combined bandwidth of all the computers to overwhelm corporate systems and thereby cause the web site to appear offline.<br /><br />One well-known technique to combat botnets is a honeypot. Honeypots help discover how attackers infiltrate systems. A Honeypot is essentially a set of resources that one intends to be compromised in order to study how the hackers break the system. Unpatched Windows 2000 or XP machines make great honeypots given the ease with which one can take over such systems. You can read more about Botnets at <a href="http://project.honeynet.org/">http://project.honeynet.org</a>edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-41099228375828057852007-08-30T05:39:00.000-07:002007-08-30T05:46:26.529-07:00Free Access To Websites Without RegisteringI dont know whether I have told you about this thing but it is truly amazed for me to re-inform to you if I did before because I found it so interesting that you can access the websites without registering. I'm not say all websites but certain websites that I tried it works!! Let's do this....<br /><br />Firstly go to:<br /><br /> <a href="http://bugmenot.com/">http://bugmenot.com</a> and type the website that you want to log on into.<br /><br />Let me give you an example.<br /><br /><a href="http://www.nytimes.com/">http://www.nytimes.com/</a>, <a href="http://www.winnetmag.com/etcetera">http://www.winnetmag.com/etcetera</a>.<br />and changing the user agent of your browser to:Googlebot/2.1+<br /><a href="http://www.googlebot.com/bot.html">http://www.googlebot.com/bot.html</a><br /><br />If you using Mozilla's Firefox, its even better. Download and install the User Agent Switcher from <a href="http://www.chrispederick.com/work/firefox/useragentswitcher/">http://www.chrispederick.com/work/firefox/useragentswitcher/</a><br />and add the Googlebot user agent.edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-55200915655361798672007-08-30T05:23:00.000-07:002007-08-30T05:35:32.423-07:0010 Fast and Free Security EnhancementsHello...<br /><br />I took this info from one of the magazine that I read and I found it usefull for me and you to increase the security of your pc. Its theoritically and practically effective:<br /><br />Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.<br /><br /><strong>1.</strong> Check Windows Update and Office Update regularly<br /> by looking at <a href="http://office.microsoft.com/productupdates">http://office.microsoft.com/productupdates</a> have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.<br /><br /><strong>2.</strong> Install a personal firewall. Both SyGate (<a href="http://www.sygate.com/">www.sygate.com</a>) and ZoneAlarm (<a href="http://www.zonelabs.com/">www.zonelabs.com</a>) offer free versions.<br /><br /><strong>3.</strong> Install a free spyware blocker. I recommended to you a SpyBot Search & Destroy (<a href="http://security.kolla.de/">http://security.kolla.de</a>). SpyBot is also paranoid and ruthless in hunting out tracking cookies.<br /><br /><strong>4.</strong> Block pop-up spam messages in Windows NT, 2000, or XP by disabling the Windows Messenger service (this is unrelated to the instant messaging program). Open Control Panel Administrative Tools Services and you'll see Messenger. Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.<br /><br /><strong>5.</strong> Use strong passwords for at least seven characters and change them periodically, use letters and numbers and have at least one symbol. A decent example would be <a href="mailto:f8izKro@l">f8izKro@l</a>. This will make it much harder for anyone to gain access to your accounts.<br /><br /><strong>6.</strong> If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.<br /><br /><strong>7.</strong> Buy antivirus software and keep it up to date. If you're not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., <a href="http://www.grisoft.com/">www.grisoft.com</a>). And doublecheck your AV with the free, online-only scanners available at <a href="http://www.pandasoftware.com/activescan">www.pandasoftware.com/activescan</a> and <a href="http://housecall.trendmicro.com/">http://housecall.trendmicro.com</a>. I used kaspersky antivirus for my pc and you can serve via <a href="http://www.kaspersky.com/">www.kaspersky.com</a> for more details<br /><br /><strong>8.</strong> If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get. For more, check out our wireless section or see the expanded coverage in Your Unwired World in our next issue.<br /><br /><strong>9.</strong> Join a respectable e-mail security list, such as the one found at our own Security Supersite at <a href="http://security.ziffdavis.com/">http://security.ziffdavis.com</a>, so that you learn about emerging threats quickly and can take proper precautions.<br /><br /><strong>10.</strong> Be skeptical of things on the Internet. Don't assume that e-mail "From:" a particular person is actually from that person until you have further reason to believe it's that person. Don't assume that an attachment is what it says it is. Don't give out your password to anyone, even if that person claims to be from "support."edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-25171156937012748342007-08-23T06:38:00.000-07:002007-08-23T06:43:12.950-07:00WINDOWS MEDIA PLAYER 9.When installing WMP 9 it leaves a watersign on your desktop. You can easily remove this with: regedit:HKey_Local_Machine\SOFTWARE\microsoft\system certificates\CA\certificates\FEE449EE0E3965A5246F00E87FDE2A065FD89D4HKey_Local_Machine\software\microsoft\system certificates\ROOT\certificates\2BD63D28D7BCD0E251195AEB519243C13142EBC3Remove both lines and restart computer. For the code you just copy and you dont need to memorize all those.<br /><br />One more tip from me on how to changing the windows media player titlebar.This is a per-user tweak. Open RegEdit.Browse to the following key:HKEY_USERS\S-1-5-21-xxxxxxxxx-xxxxxxxxx-xxxxxxxxxx-xxxx\Software\Policies\Microsoft\WindowsMediaPlayer(the x's will vary from computer to computer , it's the key without the "_Classes" at the end) Create the following String, "TitleBar" , the value of this will now become the TitleBar of Windows Media Player.edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-80287584574542989962007-08-16T04:37:00.000-07:002007-08-16T04:43:54.706-07:00Tech books onlineI have 250 collection books related to tech. and online based and you also can find it easily through internet. Here I provide to you 10 websites that provide those books:<br /><br />1. 10 minute guide to lotus notes mail 4.5<br /> <a href="http://www.parsian.net/set1252/pages/books.htm">http://www.parsian.net/set1252/pages/books.htm</a><br /><br />2. 10 minute guide to Microsoft exchange5.0<br /> <a href="http://www.parsian.net/set1252/pages/books.htm">http://www.parsian.net/set1252/pages/books.htm</a><br /><br />3. 10 minute guide to outlook 97<br /> <a href="http://www.parsian.net/set1252/pages/books.htm">http://www.parsian.net/set1252/pages/books.htm</a><br /><br />4. 10 minute guide to schedule+ forwindows95<br /> <a href="http://www.parsian.net/set1252/pages/books.htm">http://www.parsian.net/set1252/pages/books.htm</a><br /><br />5. ActiveX programming unleashed<br /> <a href="http://www.parsian.net/set1252/pages/books.htm">http://www.parsian.net/set1252/pages/books.htm</a><br /><br />6. ActiveX programming unleashed<br /> <a href="http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/">http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/</a><br /><br />7. Advanced perl programming<br /> <a href="http://www.hk8.org/old_web/">http://www.hk8.org/old_web/</a><br /><br />8. Advanced PL/SQL programming with packages<br /> <a href="http://www.hk8.org/old_web/">http://www.hk8.org/old_web/</a><br /><br />9. Adventure in Prolog/AMZI<br /> <a href="http://www.oopweb.com/">www.oopweb.com</a><br /><br />10. Algorithms CMSC251/Mount, David<br /> <a href="http://www.oopweb.com/">www.oopweb.com</a><br /><br />I will inform you from time to time once I got the new source for the booksedifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-41849432905831137952007-08-16T04:34:00.000-07:002007-08-16T04:36:26.424-07:00XP tips again<strong>Change Web Page Font Size on the Fly</strong><br /><br />If your mouse contains a wheel for scrolling, you can change font size on the fly when viewing a Web page. To do so:<br /><br />Press and hold Ctrl. Scroll down (or towards yourself) to enlarge the font size. Scroll up (or away from yourself) to reduce the font size.<br />You might find it useful to reduce font size when printing a Web page, so that you can fit more content on the page.<br /><br /><strong>WinXP Clear Page file on shutdown</strong><br /><strong></strong><br />WINXPCPS.REG (WinXP Clear Page file on shutdown)<br /><br />This Registration (.REG) file clears the Page file when you power off the computer.Restart Windows for these changes to take effect!ALWAYS BACKUP YOUR SYSTEM BEFORE MAKING ANY CHANGES!<br /><br />Browse to: HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ Control \ Session Manager \ Memory Management<br /><br />and add the DWORD variable "ClearPageFileAtShutdown"=dword:00000001<br /><br />You can also do this without reg hacking.<br />Go to Control panel Administrative tools, local security policy. then go to local policies ---> security options.Then change the option for "Shutdown: Clear Virtual Memory Pagefile"edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-67382776652450099052007-08-15T06:30:00.000-07:002007-08-15T06:37:09.550-07:00More XP tips<strong>How do I get the "Administrator" name on Welcome Screen?</strong><br /><strong></strong><br />To get Admin account on the "Welcome Screen" as well as the other usernames, make sure that there are no accounts logged in.<br />Press "ctrl-alt-del" twice and you should be able to login as administrator!<br />finally worked for me after I found out that all accounts have to be logged out first<br /><br /><strong>Fix Movie Interference in AVI files</strong><br /><strong></strong><br />If you have any AVI files that you saved in Windows 9x, which have interference when opened in Windows XP, there is an easy fix to get rid of the interference:<br /><br />1. Open Windows Movie Maker.Click View and then click Options.Click in the box to remove the check mark beside Automatically create clips.<br />2. Now, import the movie file that has interference and drag it onto the timeline. Then save the movie, and during the re rendering, the interference will be removed.<br /><br /><strong>Create a Password Reset Disk</strong><br /><strong></strong><br />If you are running Windows XP Professional as a local user in a workgroup environment, you can create a password reset disk to log onto your computer when you forget your password. To create the disk:<br /><br />1. Click Start, click Control Panel, and then click User Accounts.<br />2. Click your account name.<br />3. Under Related Tasks, click Prevent a forgotten password.<br /><br />Follow the directions in the Forgotten Password Wizard to create a password reset disk.<br />Store the disk in a secure location, because anyone using it can access your local user account<br /><br />That's all for today's tips and I will show you more tips and tricks about XP for the next dayedifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-69185115943382288042007-04-16T03:57:00.000-07:002007-04-16T04:00:21.836-07:00Tips And Tricks For Your Windows XP (version 2)<strong>RESTORING MEDIA PLAYER</strong><br /><strong></strong><br />To restore Windows Media Player insert the the XP CD into the CD drive (if it autostarts click exit). Open a command window and type the following :rundll32.exe setupapi,InstallHinfSection InstallWMP7 132 c:\windows\inf\wmp.inf<br /><br /><strong>RESTORING ACCESS TO CD ROM'S</strong><br /><strong></strong><br />If you removed CD Burning software, or for some other mystical reason, can not longer access your CD ROM's, in most cases following registry keys needs to be deleted: Locate and delete the UpperFilters and LowerFilters values under the following key in the registry:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E965-E325-11CE-BFC1-08002BE10318}<br /><br /><strong>DELETING THE INDEX.DAT</strong><br /><strong></strong><br />Del "C:\Documents and Settings\aeon\Local Settings\Temporary Internet Files\Content.IE5\index.dat"<br /><br /><strong>CONTROL PANEL ON THE DESKTOP.</strong><br /><strong></strong><br />On The Desktop, Right Click Your Mouse Then Choose "New Folder". Name The Folder As "ControlPanel. {21EC2020-3AEA-1069-A2DD-08002B30309D}" Without The "Quote Things. And Now You Can Access The Control Panel More Faster Then Before.<br /><br /><strong>CHANGING INTERNET EXPLORER ICON NAME.</strong><br /><strong></strong><br />Open Registry Editor Then Go To : "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID". You Can See A Few Key Below It.<br /><br />Now Go To This Key {871C5380-42A0-1069-A2EA-08002B30309D}, Double Click At The Default Value On The Right, Enter Whatever Name You Like.edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-71767707845440907112007-04-16T03:47:00.000-07:002007-04-16T03:57:17.946-07:00Tips And Tricks For Your Windows XP (version 1)<strong>STOP NOISE IN COPYING AUDIO CD</strong><br /><br />When using 3rd party burning software (eg, Nero Burning Rom) to copy audio CD,some noise may be heard at the end of each track. To prevent this,try the following method:<br /><br />1. Enter System Properties\device manager<br />2. Select IDE ATA/ATAPI controllers<br />3. Double click on thee CD writer IDE channel<br />4. Select advance setting<br />5. Change the transfer mode to 'PIO Only'<br />6. Restart Computer<br /><br /><strong>DISABLING THE 'UNSIGNED DRIVER' DIALOGS</strong><br /><strong></strong><br />This option wll disable the screen wich keeps popping up when you try to install 'digitally unsigned drivers'. Normally you can choose to continue the install anyways, but I have had situations where you cannot continue the install.. very annoying.. This is how to fix it:<br />Click Start - Run<br /><br />then type: gpedit.msc<br />then hit enter.Browse the folder tree to the following location:<br />User Configuration - Administrative Templates - Systemnow right-click Code signing for Device drivers and select Properties.On the Settings tab, either select- enable, and then select ignore from the appearing listbox..-<br />or click the disable option. Click apply and Ok and your set!Alternatively especially for XP Home users:<br />Open "System" properties (Windows key + pause or Right click 'My Computer' - properties or Control Panel - System).On the Hardware tab click the "Driver Signing" button. In the dialogue that comes up choose "Ignore" to install the new driver anyway.<br /><br /><strong>DMA MODE ON IDE DEVICES VIEWS</strong><br /><strong></strong><br />Just like Windows 2000, Windows XP still fails to set the DMA mode correctly for the IDE device designated as the slaves on the primary IDE and secondary IDE channels. Most CD-ROMS are capable of supporting DMA mode, but the default in XP is still PIO. Setting it to DMA won't make your CD-ROM faster, but it will consume less CPU cycles. Here's how:<br /><br />1. Open the Device Manager. One way to do that is to right click on "My Computer", select the Hardware tab, and Select Device Manager.<br />2. Expand "IDE ATA/ATAPI Controllers" and double-click on "Primary IDE Channel"<br />3. Under the "Advanced Settings" tab, check the "Device 1" setting. More than likely, your current transfer mode is set to PIO.<br />4. Set it to "DMA if available".<br /><br />Repeat the step for the "Secondary IDE Channel" if you have devices attached to it. Reboot.edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-17995684700137980352007-03-23T04:24:00.000-07:002007-03-23T04:27:52.672-07:00Google secretsActually this is all the same which I'd given to you in my previous post but for this time I will put it more details about it..let see<br /><br /><b>Method 1</b><br />?ww.google.com<br /><br />put this string in google search:<br /><br />"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums<br /><br />"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums<br /><br />"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums<br /><br />"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums<br /><br />"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums<br /><br />"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums<br /><br /><b>Notice that i am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.</b><br /><br /><b>Method 2</b><br />?ww.google.com<br /><br />put this string in google search:<br /><br />?intitle:index.of? mp3<br /><br />You only need add the name of the song/artist/singer.<br />Example: ?intitle:index.of? mp3 jackson<br /><br />Good luck..!!edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-20527015826059298562007-03-15T21:02:00.000-07:002007-03-19T04:52:29.703-07:00How to make a new Web SiteThese are among the website that you need to log in..<br /><br /><a href="http://www.make-a-web-site.com/">http://www.make-a-web-site.com/</a><br /><a href="http://www.pagetutor.com/pagetutor/makapage/index.html">http://www.pagetutor.com/pagetutor/makapage/index.html</a><br /><a href="http://www.webmonkey.com">www.webmonkey.com</a><br /><br />Colour Palletes<br /><a href="http://colormatch.dk">http://colormatch.dk</a><br /><br />HTMLlock <---Need<br /><br /><a href="http://www.devside.net">http://www.devside.net</a><br /><a href="http://www.devside.net/download/crypto/disclaimer1.html">http://</a><a href="http://www.devside.net/download/crypto/disclaimer1.html">www.devside.net/download/crypto/disclaimer1.html</a><br /><br />And that's it...edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-90884302532972573522007-03-15T20:59:00.000-07:002007-03-15T21:01:33.967-07:00Bootex LOGChecking file system on M:The type of the file system is FAT32.<br /><br />One of your disks needs to be checked for consistency. Youmay cancel the disk check, but it is strongly recommendedthat you continue.Windows will now check the disk. <br />Volume Serial Number is 0CC5-A44C<br />Windows has checked the file system and found no problems.<br /> 512241664 bytes total disk space. <br /> 2158592 bytes in 66 hidden files. <br /> 1122304 bytes in 273 folders. <br /> 156733440 bytes in 1643 files. <br /> 352215040 bytes available on disk.<br /><br /> 4096 bytes in each allocation unit. <br /> 125059 total allocation units on disk. <br /> 85990 allocation units available on disk.edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-56051064980422955732007-03-15T20:58:00.000-07:002007-03-15T20:59:13.317-07:00Free Access To Websites Without RegisteringGo to<br /><br />-http://bugmenot.com/<br />and type the URL of the website you want to log into.Examples:<br />-http://www.nytimes.com/, -http://www.winnetmag.com/etcetera.<br />Another (and better) way is changing the user agent of your browser to:Googlebot/2.1+<br />-http://www.googlebot.com/bot.html<br />This is very easy in Mozilla's Firefox. Download and install the User Agent Switcher from<br />-http://www.chrispederick.com/work/firefox/useragentswitcher/and add the Googlebot user agent.<br />Have fun, Dead Dreamer!<br />-]Edit[- Now this kicks ass, was just browsing entire forum without even needing to login to view restricted areas, and it works on other sites And no, you cant access the hidden forums either, already tried thatedifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-40249789970513911762007-03-15T20:55:00.000-07:002007-03-15T20:57:30.959-07:00free X-boxAnyone here think about getting xbox live but not have enough money to pay for the starter kit...<br /><br />You can now get it without paying a cent (that is if you have a free 2 month trial)<br />First go to <a href="http://www.xbconnect.com/downloads.php">http://www.xbconnect.com/downloads.php</a> and download the current version of XBConnect...<br />Secondly you must get a Ethernet cable and connect your X-BOX to your router (if you have, you MUST have one BTW)<br />Thirdly install and open xbconnect. Create a new account .......<br />Fourthly go on <a href="http://www.xbox.com/live">www.xbox.com/live</a> and sign in your .NET passport and create a profile for xbox live<br />Fifthly open your xbox with a xbox live supported game and follow the setup for xbox live ....<br /><br />And YOUR DONE!!!!!edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-66255791308649635502007-03-15T20:49:00.000-07:002007-03-15T20:52:15.999-07:0010 Fast and Free Security EnhancementsBefore you spend a dime on security, there are many precautions you can take that will protect you against the most common threats<br /><br /><br />1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.<br /><br />2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.<br /><br />3. Install a free spyware blocker. Our Editors' Choice ("Spyware," April 22) was SpyBot Search & Destroy (_http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.<br /><br />4. Block pop-up spam messages in Windows NT, 2000, or XP by disabling the Windows Messenger service (this is unrelated to the instant messaging program). Open Control Panel Administrative Tools Services and you'll see Messenger. Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.<br /><br />5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be <a href="mailto:f8izKro@l">f8izKro@l</a>. This will make it much harder for anyone to gain access to your accounts.<br /><br />6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.<br /><br />7. Buy antivirus software and keep it up to date. If you're not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., w*w.grisoft.com). And doublecheck your AV with the free, online-only scanners available at w*w.pandasoftware.com/activescan and _http://housecall.trendmicro.com.<br /><br />8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get. For more, check out our wireless section or see the expanded coverage in Your Unwired World in our next issue.<br /><br />9. Join a respectable e-mail security list, such as the one found at our own Security Supersite at _http://security.ziffdavis.com, so that you learn about emerging threats quickly and can take proper precautions.<br /><br />10. Be skeptical of things on the Internet. Don't assume that e-mail "From:" a particular person is actually from that person until you have further reason to believe it's that person. Don't assume that an attachment is what it says it is. Don't give out your password to anyone, even if that person claims to be from "support."edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-6008484021662356992007-03-12T21:40:00.000-07:002007-03-14T21:35:06.104-07:00Using Google for searching ebooksGoogle has some fantastic potential for you to find whatever you are after on the internet.<br />To search for a book / program / file perhaps try the following।<br /><br />Go to Google's search page and use the following criteria in the search dialog<br />intitle:index.of? file extension Name of item<br />e.g. intitle:index.of? chm <br /><br />This will hopefully give you a listing of all websites that google has cached that contain references to files in CHM format that are published by SYNGRESS.<br />---------------I use in <br /><br />+("index of") +("/ebooks""/book") +(chmpdfziprar) +syngress<br />or<br />allinurl: +(rarchmzippdftgz) SyngressEnjoyedifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-85326175663656080142007-03-12T21:35:00.000-07:002007-03-12T21:39:21.326-07:00how To Find Serial Numbers On Googleok, this is a little trick that i usually use to find cd keys with google.<br />if your looking for a serial number for nero (for example) goto google.com and type nero 94FBR and it'll bring it this works great in google<br />HOW DOES THIS WORK?<br /><br />Quite simple really। 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.<br /><br />1)The pages that are returned are pages dealing specifically with the product you're wantinga serial for।<br /><br />2)Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page।<br /><br />I hope this trick help you finding your ccd keys easily<br />Enjoy :)edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0tag:blogger.com,1999:blog-8261307436768301709.post-8125488902564615292007-03-05T21:08:00.000-08:002007-03-05T21:09:32.495-08:00Getting movies, Mp3, games using GoogleOkay lets keep this tutorial short. you want movies and games/mp3 / games and dont' know where to get them, thank god there is google.comgoto <a href="http://www.google.com/">www.google.com</a><br />put this string in<br /><br />"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums<br />"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums<br />"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums<br />"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums<br />"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums<br /><br />Notice that I am only changing the word after the parent directory, change it to what you want and you will get lots of goods. i got plenty of movie sites heh.edifierhttp://www.blogger.com/profile/09315564019723733299noreply@blogger.com0