Friday, April 29, 2011

Windows 7: My System Won’t Stop Restarting (Looping on System Failure)


If you a bad driver installed on your system and have Windows 7 set to automatically restart upon system failure, your computer can become stuck in a loop of restarting. You can easily get out of this loop and work on fixing your system’s error.
1. Once the computer begins it’s next restart, press F8 on your keyboard repeatedly until the Advanced Boot Options screen appears. If the Windows startup logo shows up, then you will need to start over because you missed the opportunity.
2. Using the arrow keys on your keyboard, select Disable automatic restart on system failure and press Enter on your keyboard.
 Windows 7 will start up and not automatically restart, allowing you to troubleshoot the error and hopefully fix your system’s problem

Changing the ICON of an EXE file?







Some times it becomes necessary to change the ICON of an executable (.exe) file so that the exe file get’s a new appearence.Many of the Tools such as Tune-Up Winstyler does this job by adjusting the Windows to display a custom icon to the user. But in reality when the file is carried to a different computer, then it shows it’s original ICON itself. This means that in order to permanently change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself. Now when this is done the exe file’s ICON is changed permanently so that even if you take file to a different computer it show’s a new icon.
For this purpose I have found a nice tool which modifies the exe file and will embed the ICON of your choice into the file itself. Ie: The tool changes the exe ICON permanently.
I’ll give you a step-by-step instruction on how to use this tool to change the icon.
1. Goto www.shelllabs.com and download the trial version of Icon Changer and install it (Works on both XP and Vista).
2. Right-click on the exe file who’s ICON is to be changed.
3. Now you will see the option Change Icon…Click on that option.
4. Now the Icon Changer program will open up.
5. Icon changer will search for all the ICONS on your system so that you can select any one of those.
6. Now select the ICON of your choice and click on SET.
7. Now a popup window will appear and ask you to select from either of these two options.
  • Change embedded icon.
  • Adjust Windows to display custom icon.
Select the first option (Change embedded icon).
8. You are done. The ICON get’s changed.

How to Make a Trojan Horse


Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a Trojan on your own using C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run.  Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using a high level programming language it is often undetected by antivirus. The Trojan is available for download along with the source code at the end of this post. Let’s see how this Trojan works…
Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horse and how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.
Now lets move to the working of our Trojan
The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in theWindowsSystem32 folder with the .dll extension. Since the junk file has the .dllextention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.
The algorithm of the Trojan is as follows
1. Search for the root drive
2. Navigate to WindowsSystem32 on the root drive
3. Create the file named “spceshot.dll
4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full
5. Once the drive is full, stop the process.
You can download the Trojan along with it’s source code HERE.
How to compile, test and remove the damage?
Compilation:
You can use Borland C++ compiler (or equivalent) to compile the Trojan.
Testing:
To test the Trojan, just run the SpaceEater.exe file on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space.
NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.
How to remove the Damage and free up the space?
To remove the damage and free up the space, just type the following in the “run” dialog box.
%systemroot%system32
Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk.

How to hack remote computer using IP Address


You can get the IP address of the victim using this post.
Now, what do we do with this IP Address. Well first ping the IP Address to make sure that its alive. In other words online. Now at the bottom of this document ill include some links where you can obtain some key tools that may help on your journey through the electronic jungle. So we need to find places to get inside of the computer so we can start trying to find a way to "hack" the box. Port Scanners are used to identify the open ports on a machine that’s running on a network, whether its a router, or a desktop computer, they will all have ports. Protocols use these ports to communicate with other services and resources on the network.

1) Blues Port Scanner - This program will scan the IP address that you chose and identify open ports that are on the target box.

Example 1:
Idlescan using Zombie (192.150.13.111:80); Class: Incremental
Interesting ports on 208.225.90.120:
(The 65522 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
25/tcp open smtp
80/tcp open http
111/tcp open sunrpc
135/tcp open loc-srv
443/tcp open https 1027/tcp open IIS
1030/tcp open iad1
2306/tcp open unknown
5631/tcp open pcanywheredata
7937/tcp open unknown
7938/tcp open unknown
36890/tcp open unknown


In example 1 now we see that there are a variety of ports open on this box. Take note of all the ports that you see listed before you. Most of them will be paired up with the type of protocol that uses that port (IE. 80-HTTP 25-SMTP Etc...) Simply take all that information and paste it into notepad or the editor of your choice. This is the beginning of your targets record. So now we know what ports are open. These are all theoretical points of entry where we could wiggle into the computer system. But we all know its not that easy. Alright so we don't even know what type of software or what operating system that this system is running.

2) NMAP - Port Scanner - Has unique OS fingerprinting methods so when the program sees a certain series of ports open it uses its best judgment to guess what operating system its running. Generally correct with my experiences.

So we have to figure out what type of software this box is running if we are gonna start hacking the thing right? Many of you have used TELNET for your MUDS and MOOS and weird multiplayer text dungeons and many of you haven’t even heard of it before period. TELNET is used to open a remote connection to an IP Address through a Port. So what that means is we are accessing their computer from across the internet, all we need is their IP Address and a port number. With that record you are starting to compile, open a TELNET connection to the IP Address and enter one of the OPEN ports that you found on the target.
So say we typed 'TELNET -o xxx.xxx.xxx.xxx 25' this command will open up a connection through port 25 to the IP xxx.xxx.xxx.xxx. Now you may see some text at the very top of the screen. You may think, well what the hell, how is that little string of text going to help me. Well get that list you are starting to write, and copy the banners into your compilation of the information you’ve gathered on your target. Banners/Headers are what you get when you TELNET to the open ports. Here is an example of a banner from port 25.


220 jesus.gha.chartermi.net ESMTP Sendmail 8.12.8/8.12.8; Fri, 7 Oct 2005 01:22:29 -0400


Now this is a very important part in the enumeration process. You notice it says 'Sendmail 8.12.8/8.12.8' Well what do ya know, we now have discovered a version number. This is where we can start identifying the programs running on the machine. There are some instances in which companies will try and falsify their headers/banners so hackers are unable to find out what programs are truly installed. Now just copy all the banners from all the open ports *Some Ports May Have No Banners* and organize them in the little record we have of the target. Now we have all the open ports, and a list of the programs running and their version numbers. This is some of the most sensitive information you can come across in the networking world. Other points of interest may be the DNS server, that contains lots of information and if you are able to manipulate it than you can pretend to hotmail, and steal a bunch of peoples email. Well now back to the task at handu. Apart from actual company secrets and secret configurations of the network hardware, you got some good juicy info. http://www.securityfocus.com is a very good resource for looking up software vulnerabilities. If you cant find any vulnerabilities there, search on google. There are many, many, many other sites that post vulnerabilities that their groups find and their affiliates.

At SecurityFocus you can search through vendor and whatnot to try and find your peice of software, or you can use the search box. When i searched SecurityFocus i found a paper on how Sendmail 8.12.8 had a buffer overflow. There was proof of concept code where they wrote the shellcode and everything, so if you ran the code with the right syntax, a command prompt would just spawn. You should notice a (#) on the line where your code is being typed. That pound symbol means that the command prompt window thats currently open was opened as root. The highest privilage on a UNIX/Linux Box. You have just successfully hacked a box. Now that you have a command shell in front of you, you can start doing whatever you want, delete everything if you want to be a fucking jerk, however I dont recommend that. Maybe leave a text file saying how you did it and that they should patch their system.....whoever they are. And many times the best thing you can do is just lay in the shadows, dont let anyone know what you did. More often than not this is the path you are going to want to take to avoid unwanted visits by the authorities.

There are many types of exploits out there, some are Denial of Service exploits, where you shut down a box, or render an application/process unusable. Called denial of service simply because you are denying a service on someones box to everyone trying to access it. Buffer Overflow exploits are involved when a variable inside some code doesnt have any input validation. Each letter you enter in for the string variable will be 1 byte long. Now where the variables are located at when they are in use by a program is called the buffer. Now what do you think overflowing the buffer means. We overflow the buffer so we can get to a totally different memory address. Then people write whats called shellcode in hex. This shellcode is what returns that command prompt when you run the exploit. That wasnt the best description of a buffer overflow, however all you need to remember is that garbage data fills up the data registers so then the buffer overflows and allows for remote execution of almost every command available. There are many, many other types of attacks that cannot all be described here, like man-in-the-middle attacks where you spoof who you are. Performed correctly, the victim will enter http://www.bank.com and his connection will be redirected to your site where you can make a username and password box, make the site look legit. And your poor mark will enter their credentials into your site, when they think its really http://www.bank.com. You need to have a small script set up so it will automatiically display like an error or something once they try and log in with their credentials. This makes it seem like the site is down and the victim doenst give it a second thought and will simply try again later.
__________________________________________________ _______o_________

So as a summary of how to 0Wn a box when you only have an IP Address
Method Works On BOTH *Nix and Windoze

****You can do the same with domain names (IE google.com) than what you can with IP Addresses. Run a WHOIS Lookup or something along those lines. Or check up on InterNIC you should be able to resolve the domain name to an IP address.****

- Port Scan The Address And Record Open Ports
- Telnet To Open Ports To Identify Software Running On Ports

3) netcat - Network swiss army knife. Like TELNET only better and with a lot more functionality. Both can be used when you are trying to fingerprint software on open ports

- Record Banners And Take Note Of The Application Running and The Version Number
- Take A Gander Online At SecurityFocus.com or Eeye.com. If you cant find any vulnerabilities then search google.
- Make a copy of some Proof-Of-Concept code for the vulnerability.

*Read the documentation if there is any, for the proof-of-concept code you will be using for your exploit*

- Run The Exploit Against The Victim.
- Reap The Cheap-Sh0t Ownage

So guys...i hope you now know how to hack into a computer using a known IP Address. Once you get IP Address of the victim, you are able to access and hack the computer remotely as described in the post.

Friday, April 22, 2011

Import your messages or account from Outlook Express to Outlook


You can import e-mail messages from Outlook Express into Outlook. The process you use depends on whether the two e-mail programs are installed on the same computer or not. The Outlook Express Inbox folder is a single file, Inbox.dbx. Conversely, Outlook stores each message as an individual file. To transfer messages by using the Import and Export Wizard, you must first locate and copy the correct files from the computer where Outlook Express is installed to the computer where Outlook is installed.

  When outlook and outlook express are installed on same computer:           
1.In Outlook, on the File menu, click Import and Export.
2. Click Import Internet Mail and Addresses, and then click Next.
3. Click Outlook Express.
4. Select the Import mail check box.
5. Click Next.
6. Click Finish.
7. To save a copy of the import summary to your Inbox, click Save in Inbox.
  
When outlook and outlook express are installed on different computer:
    
    Copy Outlook Express folder
1.On the computer where your Outlook Express account is set up, in Outlook Express, on the Tools menu, click Options.
2. Click the Maintenance tab.
3.Click Store Folder, and then note the entire path shown in the field in the Store Location dialog box.
4. If necessary, modify the default view in Windows Explorer so that you can see hidden folders. The Outlook Express folder is located in a hidden folder.
5. Browse to the location that you found in the Store Location dialog box.
6. Do one of the following:
Copy the entire Outlook Express folder to removable media, such as a floppy disk, DVD, or portable memory device, and then copy it to the computer where Outlook is installed.
Copy the entire Outlook Express folder to a network location that the computer with both Outlook and Outlook Express has access to.
7. On the computer where Outlook is installed, open Outlook Express. If prompted to create an e-mail account, click Cancel.
8. On the Tools menu, click Options.
9. Click the Maintenance tab.
10.Click Store Folder and then click Change.
11. Browse to the location where you copied the Outlook Express folder, and then click the folder that you copied in step 6. Click OK.
12. To close the Store Location dialog box, click OK.
13. When prompted to use the new messages or replace them with messages from the old store location, click yes to switch to that store.
14. Close Outlook Express, and then open it again to complete the process.
Import Outlook Express messages into Outlook as mentioned above.

Thursday, April 21, 2011

System Changes to Foil Hackers and Browser Hijacker


Hackers and Browser Hijacking is one area of the Net that affects everyone at some stage.
In addition to having third party utilities such as SpyBot, Anti Virus scanners and firewalls installed there are some changes that can be made to Windows 2000/XP. Below are some details to make your system safer from hackers and hijackers.
Some of these tips require editing of the Registry so it is wise to either backup the registry and/or create a Restore Point.

1. Clearing the Page File at Shutdown

Windows 2000/XP paging file (Sometimes called the Swap File) can contain sensitive information such as plaintext passwords. Someone capable of accessing your system could scan that file and find its information. You can force windows to clear out this file.
In the registry navigate to HKEY_LOCAL_MACHINE\ SYSTEM\ CurrentControlSet\ControlSession\ManagerMemory\Management and add or edit the DWORD ClearPageFileAtShutdown. Set it to 1.
Note that when you do this, the system will take much longer to shut down: a system with a really big Page File (! Gig or more) may take a minute or two longer.

2. Disable the POSIX and OS/2 Subsystem.

Windows 2000 and XP come with little-documented subsystems it at allow compatibility with UNIX and OS/2 systems These rues systems are enabled by default but so rarely used that they are best off bring disabled completely to prevent possible service hijackings.
To disable these subsystems, open the registry and navigate to HKEY LOCAL MACHINE\SYSTEM\CurrentControl\ SetControlSession\ManagerSubSystems\. Delete the subkeys Os2 and Posix. Then reboot.

3. Never leave default passwords blank.

On installation, Windows 2000 sets up an Administrator account with total system access and prompts for a password. Guess what: by default, it allows that password to be blank. If a user doesn't want to type a password, he can simply click Next and the system will be an open door for anyone who wants to log on. Always opt for a password of some kind when setting up the default account on a machine.


4. Install Windows in a different directory.

Windows usually installs itself in the WINDOWS directory. Windows NT 4 0 and 2000 Will opt for WINNT. Many worms and other rogue programs assume this to be the case and attempt to exploit those folders files. To defeat this install Windows to another directory when you're setting it up - you can specify the name of the directory during setup. WINDIR is okay; so some people use WNDWS - A few (not that many) programs may not install properly if you install Windows to another folder but t hey are very few and they are far between.

5. Fake out hackers with a dummy Administrator account

Since the default account in Windows 2000 is always named Administrator, an enterprising hacker can try to break into your system by attempting to guess the password on that account. It you never bothered to put a password on that account, say your prayers.
Rather than be a sucker to a hacker, put a password on the Administrator account it you haven't done so already. Then change the name of the Administrator account. You'll still be able to use the account under its new name, since Windows identifies user accounts by a back-end ID number rather than the name. Finally, create a new account named Administrator and disable it. This should frustrate any would -be break-ins.
You can add new accounts and change the names of existing accounts in Windows 2000 through the Local Users and Groups snap in. Right-click on My Computer, select Manager, open the Local Users and Groups subtree, look in the Users folder and right-click on any name to rename it. To add a new user, right-click on the containing folder and select New User. Finally, to disable an account, double-click it, check the Account is disabled box and click OK.
Don't ever delete the original Administrator account. Some programs refuse to install without it and you might have to log in under that account at some point to setup such software. The original Administrator account is configured with a security ID that must continue to be present in the system.

6. Disable the Guest account

Windows XP comes with a Guest account that's used for limited access, but it's still possible to do some damage with it. Disable it completely if you are not using it. Under Control Panel, select User Accounts, click on Guest Account and then select Turn Off the Guest Account.

7. set the Hosts file to read-only to prevent name hijacking.

This one's from (and to a degree, for) the experts. The HOSTS file is a text file that all flavors of Windows use to hold certain network addresses that never change. When a network name and address is placed in HOSTS, the computer uses the address listed there for that network name rather than performing a lookup (which can take time). Experts edit this file to place their most commonly-visited sites into it, speeding things up considerably.
Unfortunately hijackers and hackers also love to put their own information into it - redirecting people from their favorite sites to places they don't want to go. One of the most common entries in HOSTS is local host which is set 1770.0.1. This refers to the local machine and if this entry is damaged the computer can behave very unpredictably.
To prevent HOSTS from being hijacked, set it to read-only. Go to the folder %Systemroot%system32driversetc, right-click on HOSTS, select Properties check the Read-Only box and click OK. If you want to add your own entries to HOSTS, you can unprotect it before doing so, but always remember to set it to read-only after you're done.

8. Disallow changes to IE settings through IE

This is another anti hijacker tip. IE can be set so that any changes to its settings must be performed through the Internet icon in the Control Panel, rather than through IE's own interface. Some particularly unscrupulous programs or sites try to tamper with setting by accessing the Tools, Options menu in IE. You can disable this and still make changes to IE's settings through the Control Panel.
Open the Registry and browse to HKEY_CURRENT_USER \Software\Policies\MicrosoftInternetExplorer\Restrictions\. Create or edit a new DWORD value named NoBrowserUptions and set it to 1 (this is a per-user setting). Some third-party programs such as Spybot Search and Destroy allow you to toggle this setting.
You can also keep IE from having other programs rename its default startup page, another particularly annoying form of hijacking. Browse to HKEY.CURRENT USERSoftwarePolicies MicrosoftInternet ExploreControl Panel and add or edit a DWORD, Homepage and set it to 1.

9. Turn off unneeded Services

Windows 2000 and XP both come with many background services that don't need to he running most of the time: Alerter, Messenger, Server (If you're running a standalone machine with no file or printer shares), NetMeeting Remote Desktop Sharing, Remote Desktop Help Session Manager (the last two if you're not using Remote Desktop or NetMeeting), Remote Registry, Routing and Remote Access (if you're not using Remote Access), SSDP Discovery Service, Telnet, and Universal Plug and Play Device Host.
A good resource and instruction on which of these services can be disabled go to http://www.blkviper.com/WinXP/

10. Disable simple File Shares.

In Windows XP Professional, the Simple File Sharing mode is easily exploited, since it’s a little too easy to share out a file across your LAN (or the NET at large). To turn it off, go m My Computer, click Tools, Folder Option and the View tab, and uncheck Use Simple file sharing (Recommended). Click OK. When you do this you can access the Security tab in the Properties window for all folders; set permissions for folders; and take ownership of objects (but not in XP Home).

Introduction to virtual memory and how much virtual memory you need for your system


Tutorial Objective:

This tutorial talks about anything about the virtual memory and how much virtual memory you need for your system.

Tutorial Introduction & Background:

Today application is getting bigger and bigger. Therefore, it requires a bigger system memory in order for the system to hold the application data, instruction, and thread and to load it. The system needs to copy the application data from the HDD into the system memory in order for it to process and execute the data. Once the memory gets filled up with data, the system will stop loading the program. In this case, users need to add more memory onto their system to support that intense application. However, adding more system memory costs the money and the normal user only needs to run the the intense application that requires the memory only for one or two days. Therefore, virtual memory is introduced to solve that type of problem.

Terminology & Explanation:

There are two types of memory, which are as follows:
  • System Memory is a memory that is used to store the application data and instruction in order for the system to process and execute that application data and instruction. When you install the memory sticks to increase the system RAM, you are adding more system memory. System Memory can be known as either the physical memory or the main memory.
  • Virtual Memory is a memory that uses a portion of HDD space as the memory to store the application data and instruction that the system deemed it doesn't need to process for now. Virtual Memory can be known as the logical memory, and it controls by the Operating System, which is Microsoft Windows. Adding the Virtual Memory can be done in system configuration.

Tutorial Information & Facts or Implementation :

Virtual Memory is a HDD space that uses some portion of it as the memory. It is used to store application data and instruction that is currently not needed to be process by the system.
During the program loading process, the system will copy the application data and its instruction from the HDD into the main memory (system memory). Therefore the system can use its resources such as CPU to process and execute it. Once the system memory gets filled up, the system will start moving some of the data and instruction that don't need to process anymore into the Virtual Memory until those data and instruction need to process again. So the system can call the next application data and instruction and copy it into the main memory in order for the system to process the rest and load the program. When the data and instruction that is in the Virtual Memory needs to process again, the system will first check the main memory for its space. If there is space, it will simply swap those into the main memory. If there are not any space left for the main memory, the system will first check the main memory and move any data and instructions that doesn't need to be process into the Virtual Memory. And then swap the data and instruction that need to be process by the system from the Virtual Memory into the main memory.
Having too low of Virtual Memory size or large Virtual Memory size (meaning the size that is above double of the system memory) is not a good idea. If you set the Virtual Memory too low, then the OS will keep issuing an error message that states either not enough memory or Virtual too low. This is because some portions of the system memory are used to store the OS Kernel, and it requires to be remaining in the main memory all the time. Therefore the system needs to have a space to store the not currently needed process data and instruction when the main memory get filled up. If you set the Virtual Memory size too large to support the intensive application, it is also not a good idea. Because it will create the performance lagging and even it will take the HDD free space. The system needs to transfer the application data and instruction back and forth between the Virtual Memory and the System Memory. Therefore, that is not a good idea. The ideal size for the Virtual Memory is the default size of Virtual Memory, and it should not be exceed the value of the triple size of system memory.
To determine how much virtual memory you need, since the user's system contains the different amount of RAM, it is based on the system. By default, the OS will set the appropriate size for Virtual Memory. The default and appropriate size of Virtual Memory is:
<Amount_Of_System_Memory> * 1.5 = <Default_Appropriate_Size_Of_Virtual Memory>

For example, if your system contains 256 MB of RAM, you should set 384 MB for Virtual Memory.
256 MB of RAM (Main Memory) * 1.5 = 384 MB for Virtual Memory

If you would like to determine how much the Virtual Memory is for your system and/or would like to configure and add more virtual memory, follow the procedure that is shown below. The following procedure is based on windows XP Professional.
  1. Go to right-click My Computer and choose Properties.
  2. In the System Properties dialog box, go to Advanced tab.
  3. Click Settings button that is from the Performance frame.
  4. Once the Performance Options shows up on the screen, go to Advanced tab.
  5. Under the Advanced tab, click the Change button from the Virtual Memory frame to access to the Virtual Memory setting.
Then the Virtual Memory dialog box appears on the screen. In there, you are able to check how much the Virtual Memory you set. If you would like to modify the size of Virtual Memory, follow the procedure that is shown below.
  1. In there, select the drive letter that is used to install the Operating System.
  2. Choose the option that says, "Custom Size:"
Once you choose that option, the setting for Initial Size and Maximum Size become available for you to set. Initial Size (MB) means the actual size of Virtual Memory, and Maximum Size (MB) means the maximum size of Virtual Memory that is allowed to use.
Let's say if your system contains 512 MB of RAM, then the ideal setting for the Virtual Memory is as follows:
Initial Size (MB): 768
Maximum Size (MB): 1500
Once you are happy with that Virtual Memory size, click the Set button from Paging file size for selected drive to apply the setting for the Virtual Memory size. Then click the OK button to apply the setting.
That's where you can manage and configure for the size of Virtual Memory.

Additional Information:

  • To maintain the good overall system performance, you should be using the default size of actual size for Virtual Memory and the triple the value of the size of the main memory for the maximum size of Virtual Memory. If you find that main memory plus virtual memory is not big enough to load the intensive application, then you will need to add more main memory onto your system.

Lots of Windows XP Tips


Lock XP Workstation (#1):
You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll, LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.
Remove Windows XP system software (#2):
XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.
New commands (#3) :
For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? Will give a list of options -- they're all far too baroque to go into here.
Windows XP supports IPv6 (#4):
XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (It’s OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother.


Kill tasks from the command line (#5):
You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.
Enable Clear Type by default (#6):
XP has Clear Type -- Microsoft's anti-aliasing font display technology-- but doesn't have it enabled by default. It's well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable Clear Type, right click on the desktop, select Properties, Appearance, Effects, select Clear Type from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use Clear Type on the Welcome login screen as well, set the registry entry
HKEY_USERS/.DEFAULT/ControlPanel/Desktop/FontSmoothingType to 2.

Run program as different user (#7):
You can run a program as a different user without logging out and back in again. Right click the icon, select Run As... And enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.
Speed up the Start Menu (#8):
The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.
Rename multiple files at once (#9):
You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetized groups by View, Arrange Icon By... Show In-Groups.
Show covert art in Media Player (#10):
Windows Media Player will display the cover art for albums as it plays the tracks -- if it found the picture on the Internet when you copied the tracks from the CD. If it didn't, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.
Display Hibernate Option on the Shut Down dialog (#11) :
For some reason, Hibernate isn't available from the default Shut Down dialog. But you can enable it simply enough, by holding down the SHIFT key while the dialog is visible. Now you see it, now you don't!
Enable Clear Type on the Welcome Screen! (#12) :
As laptop users and other LCD owners are quickly realizing, Microsoft's Clear Type technology in Windows XP really makes a big difference for readability. But this feature is enabled on a per-user basis in Windows XP, so you can't see the effect on the Welcome screen; it only appears after you logon.
But you can fix that. Fire up the Registry Editor and look for the following keys:
(Default user) HKEY_USERS \ .Default \ Control Panel \ Desktop \
FontSmoothing (String Value)
HKEY_USERS \ .Default \ Control Panel \ Desktop \
FontSmoothingType (Hexadecimal DWORD Value)

Make sure both of these values are set to 2 and you'll have Clear Type enabled on the Welcome screen and on each new user by default.
Change User Picture (#13) :
Click on the Icon at the top of the start menu. Select desired picture from resulting screen Windows 2000 style logon. To revert back to the Win2k style logon so you can log on as the administrator and other options, press ctrl+alt+delete twice at the logon screen. Change the location of the My Music or My Pictures folders:
In Windows 2000, Microsoft added the ability to right-click the My Documents folder and choose a new location for that folder in the shell. With Windows XP, Microsoft has elevated the My Music and My Pictures folders to the same "special shell folder" status of My Documents, but they never added a similar (and simple) method for changing those folder's locations. However, it is actually pretty easy to change the location of these folders, using the following method.
Open a My Computer window and navigate to the location where you'd like My Music (or My Pictures) to reside. Then, open the My Documents folder in a different window. Drag the My Music (or My Pictures) folder to the other window, and Windows XP will update all of the references to that folder to the new location, including the Start menu.
Protect Your Files From Unauthorized Users (#14):
Other users with permission to delete a file (users with Modify or Full Control permission) can't use your encrypted files-but they can make them difficult for you to use. Any such user can rename your files, which can make them difficult to find, and can also delete your files. (Even if the user merely deletes them to the Recycle Bin and doesn't remove them altogether, the deleted files are unavailable to you because you don't have access to any other user's Recycle Bin.) Therefore, if you're concerned about protecting your files from other authorized users as well as from a thief who steals your computer, you should modify the NTFS permissions to prevent any type of modification by other users.
Shutdown Your System in a Hurry (#15):
If you need to shut down in a hurry-or if a frozen application prevents you from shutting down in the normal ways-you can use the following procedure. Be aware, however, that you won't get an opportunity to save open documents. To perform an emergency shutdown, press Ctrl+Alt+Del to display Task Manager. Open the Shut down menu and hold down the Ctrl key as you click the Turn Off command. Poof! If your computer is part of a domain, the procedure is similar. Press Ctrl+Alt+Del and then hold down Ctrl when you click Shut Down. In this situation, you'll get a warning message pointing out-quite correctly-that this should be used only as a last resort.
Provide Personal Support (#16) :
It never fails: when friends, co-workers, or family members discover that you're a Windows expert, you get pressed into service as an unpaid support technician. If the party asking for help is running any edition of Windows XP and has an active Internet connection, your job is much easier. Have the other person send you a Remote Assistance request; when you accept the request, you connect directly to their computer and can edit Registry settings, fix file associations, set System options, and perform just about any other troubleshooting or repair task, just as if you were sitting at the other person's desk.
Quickly Fix Connectivity Problems (#17):
Are you having trouble connecting to other computers on your local area network? If your network uses hardware firewall that assigns IP addresses to each machine and you're certain you've configured all other components correctly, check to see whether the Internet Connection Firewall is enabled. That component can effectively block communication between PCs on the network.
Hack IE Title Bar (#18):
This can be an impressive bit of personalization. Use your name or moniker to brand Internet Explorer. Go to HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\ and left-click on Main to change the string "Window Title" to whatever you wish.
Unload DLLs (#19):
To prevent Windows from caching DLLs after the program using them has closed, follow this procedure: Navigate to
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ then left-click on Explorer. Right-click (as above) and create the DWORD
AlwaysUnloadDLL with a value of 1. This requires a reboot to take effect. This will allow memory to be used more efficiently.
Registry Hacks (#20):
Editing the Windows Registry, while much more common now than in years past, is still not to be entered into lightly. You can break Windows, cause boot failure. I know you're gonna do it anyway; why else would you be reading this. Just be careful, OK?
These are few because, for the most part WinXP can be customized through the interlace or with third-party freeware (as above).
All of the tips below require running regedit. To do so, hit 'Start/Run' then type 'regedit' and follow the instructions.
Naturally, I take no responsibility for any damage or loss of data incurred in the remote possibility that something goes terribly wrong.
The Ultimate Appearance Tweak (#21):
Microsoft said: "You can connect up to 10 monitors to your Windows XP-based computer and display numerous programs or windows at one time. You can use your mouse to move items from one monitor to another. You can open a different file on each monitor. Or several. Or you can stretch one item across several monitors; so for example, you can see more columns in a Microsoft Excel spreadsheet, or the entire layout of a Web page, without scrolling." Consider it. Monitors and PCI video cards are pretty cheap now. Windows recognizes the addition & allows easy adjustments on the 'Display Properties/Settings' menu.
Save Streaming Media (#22):
It's cool to listen to MP3s (or watch movies) over the Internet. Often, saving this media, however, seems impossible. Hey, if it plays on your computer, it's on your hard drive. Once the file is fully loaded and with folder view set to show hidden and systems folders, searches for the media (.mp3 or .mpg). There it is!
Securing the Paging File (#23):
If you're truly concerned about the possibility of your computer falling into the wrong hands, you should be sure that you don't leave any tracks in the paging file. By default, when you shut down your system, the paging file remains intact. People who've access to your computer could conceivably look through the unencrypted paging file to find information they shouldn't have.
Assign a Keyboard Shortcut (#24):
Click in the Shortcut Key field and press a keyboard combination that you want to use for launching or switching to this program. The shortcut key you assign must consist of one character key (a letter, number, or symbol) plus at least two of the following three keys: Ctrl, Alt, and Shift. (If you press a character key only, Windows automatically adds Ctrl+Alt.)
Shortcut keys work only when assigned to a program shortcut on the Start menu, the Programs menu, or the Desktop. The shortcuts you define will not work if it conflicts with a combination used in the program whose window has the focus.
Please remember, we cannot accept responsibility with what you decide to do with these tips. These tips act as a guide to tweaking and changing Windows XP from the default settings. If you are unsure about how to make these changes then don't meddle!

Why it take longer time to copy a file than deleting it?


An Operating System (OS) is a program that acts as an intermediary between a user of a computer and the computer hardware.
Depending on the storage device being used, computers can store information in several physical forms. Each device has its own characteristics and physical organization, and hence different views of information are created. To unify all these views of information, a uniform logical view called a file is created.
A file is a contiguous set of data. It is the job of the OS to map this sequence of data into physical devices. The part of the OS responsible for this is the file system.
So the main task of the file system is to free the users of the details of storing of information in the physical devices. That is, when the storage device is changed, from disk to CD for example, the user still sees the same information.
In the most basic form, a file system consists of two distinct parts: a collection of files and a directory structure. The directory structure organizes and provides information about all the files in the system.
Every file has certain attributes like its name, location (its address in the file system), size, access control information (whether the file can be read or written to or only executed etc), type (whether it is just a collection of data or has other special instructions) , time, date and user identification.
If file A is to be copied to file B, then first a new file called B is created, next the contents of A are read and finally, this is written to B.
For this to happen, three steps are necessary. First, space must be found for B in the file system. Second, an entry for B must be made in the directory. The directory records the name of B and the location of B in the file system. Third, a request is sent to the OS to read the contents of A.
The OS finds the location information of A from the directory and reads the contents. Now to write to B, the OS again searches the directory for the address of B. Finally the content of A is written onto the space provided for B.


On the other hand if a file deletion is to take place, the process is much simpler. If file A is to be deleted, the OS just searches the directory for the named file.
Having found the entry, the space occupied by A is released so that it can be used by other files and the directory entry is erased.
As can be seen, the operations involved while copying a file are much more than those involved while deleting a file.

What is the Registry - Beginners Guide


The Registry is a database used to store settings and options for the 32 bit versions of M*cro$oft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.
The physical files that make up the registry are stored differently depending on your version of Windows; under Windows 95 & 98 it is contained in two hidden files in your Windows directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional CLASSES.DAT file, while under Windows NT/2000 the files are contained separately in the %SystemRoot%\System32\Config directory. You can not edit these files directly; you must use a tool commonly known as a "Registry Editor" to make any changes (using registry editors will be discussed later in the article).
Our Partner's Offer:
---------------------------------------------------------
As a programmer, you deal with software all day. But for your business, do you have the rightpdf converter for your needs. Software from Investintech.com can help you convert pdf to word easily, and affordably.
-----------------------------------------------------------
The Structure of The Registry :
The Registry has a hierarchal structure; although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer.
Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context.
There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:
  • HKEY_CLASSES_ROOT - This branch contains all of your file association mappings to support the drag-and-drop feature, OLE information, Windows shortcuts, and core aspects of the Windows user interface.
  • HKEY_CURRENT_USER - This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the PC and contains information such as logon names, desktop settings, and Start menu settings.
  • HKEY_LOCAL_MACHINE - This branch contains computer specific information about the type of hardware, software, and other preferences on a given PC; this information is used for all users who log onto this computer.
  • HKEY_USERS - This branch contains individual preferences for each user of the computer; each user is represented by a SID sub-key located under the main branch.
  • HKEY_CURRENT_CONFIG - This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration.
  • HKEY_DYN_DATA - This branch points to the part of HKEY_LOCAL_MACHINE, for use with the Plug-&-Play features of Windows, this section is dynamic and will change as devices are added and removed from the system.
Each registry value is stored as one of five main data types:
  • REG_BINARY - This type stores the value as raw binary data. Most hardware component information is stored as binary data, and can be displayed in an editor in hexadecimal format.
  • REG_DWORD - This type represents the data by a four byte number and is commonly used for Boolean values, such as "0" is disabled and "1" is enabled. Additionally many parameters for device driver and services are this type, and can be displayed in REGEDT32 in binary, hexadecimal and decimal format or in REGEDIT in hexadecimal and decimal format.
  • REG_EXPAND_SZ - This type is an expandable data string that is string containing a variable to be replaced when called by an application. For example, for the following value, the string "%SystemRoot%" will replaced by the actual location of the directory containing the Windows NT system files. (This type is only available using an advanced registry editor such as REGEDT32)
  • REG_MULTI_SZ - This type is a multiple string used to represent values that contain lists or multiple values; each entry is separated by a NULL character. (This type is only available using an advanced registry editor such as REGEDT32)
  • REG_SZ - This type is a standard string, used to represent human readable text values.
Other data types not available through the standard registry editors include:
  • REG_DWORD_LITTLE_ENDIAN - A 32-bit number in little-endian format.
  • REG_DWORD_BIG_ENDIAN - A 32-bit number in big-endian format.
  • REG_LINK - A Unicode symbolic link. Used internally; applications should not use this type.
  • REG_NONE - No defined value type.
  • REG_QWORD - A 64-bit number.
  • REG_QWORD_LITTLE_ENDIAN - A 64-bit number in little-endian format.
  • REG_RESOURCE_LIST - A device-driver resource list.
Editing The Registry :
The Registry Editor (REGEDIT.EXE) is included with most version of Windows (although you won't find it on the Start Menu) it enables you to view, search and edit the data within the Registry. There are several methods for starting the Registry Editor, the simplest is to click on the Start button, then select Run, and in the Open box type "regedit", and if the Registry Editor is installed it should now open and look like the image below.
An alternative Registry Editor (REGEDT32.EXE) is available for use with Windows NT/2000, it includes some additional features not found in the standard version, including; the ability to view and modify security permissions, and being able to create and modify the extended string values REG_EXPAND_SZ & REG_MULTI_SZ.
Create a Shortcut to Regedit :
This can be done by simply right-clicking on a blank area of your desktop, selecting New, then Shortcut, then in the Command line box enter "regedit.exe" and click Next, enter a friendly name (e.g. 'Registry Editor') then click Finish and now you can double click on the new icon to launch the Registry Editor.
Using Regedit to modify your Registry :
Once you have started the Regedit you will notice that on the left side there is a tree with folders, and on the right the contents (values) of the currently selected folder.
Like Windows explorer, to expand a certain branch (see the structure of the registry section), click on the plus sign.
  • to the left of any folder, or just double-click on the folder. To display the contents of a key (folder), just click the desired key, and look at the values listed on the right side. You can add a new key or value by selecting New from the Edit menu, or by right-clicking your mouse. And you can rename any value and almost any key with the same method used to rename files; right-click on an object and click rename, or click on it twice (slowly), or just press F2 on the keyboard. Lastly, you can delete a key or value by clicking on it, and pressing Delete on the keyboard, or by right-clicking on it, and choosing Delete.
Note: it is always a good idea to backup your registry before making any changes to it. It can be intimidating to a new user, and there is always the possibility of changing or deleting a critical setting causing you to have to reinstall the whole operating system. It's much better to be safe than sorry!
Importing and Exporting Registry Settings :
A great feature of the Registry Editor is it's ability to import and export registry settings to a text file, this text file, identified by the .REG extension, can then be saved or shared with other people to easily modify local registry settings. You can see the layout of these text files by simply exporting a key to a file and opening it in Notepad, to do this using the Registry Editor select a key, then from the "Registry" menu choose "Export Registry File...", choose a filename and save. If you open this file in notepad you will see a file similar to the example below:
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\Setup]
"SetupType"=dword: 00000000
"CmdLine"="setup -newsetup"
"SystemPrefix"=hex: c5, 0b, 00, 00, 00,40,36,02
The layout is quite simple, REGEDIT4 indicated the file type and version, [HKEY_LOCAL_MACHINE\SYSTEM\Setup] indicated the key the values are from, "SetupType"=dword: 00000000 are the values themselves the portion after the "=" will vary depending on the type of value they are; DWORD, String or Binary.
So by simply editing this file to make the changes you want, it can then be easily distributed and all that need to be done is to double-click, or choose "Import" from the Registry menu, for the settings to be added to the system Registry.
Deleting keys or values using a REG file :
It is also possible to delete keys and values using REG files. To delete a key start by using the same format as the REG file above, but place a "-" symbol in front of the key name you want to delete. For example to delete the [HKEY_LOCAL_MACHINE\SYSTEM\Setup] key the reg file would look like this:
REGEDIT4
[-HKEY_LOCAL_MACHINE\SYSTEM\Setup]

The format used to delete individual values is similar, but instead of a minus sign in front of the whole key, place it after the equal sign of the value. For example, to delete the value "SetupType" the file would look like:
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\Setup]
"SetupType"=-

Use this feature with care, as deleting the wrong key or value could cause major problems within the registry, so remember to always make a backup first.
Regedit Command Line Options :
Regedit has a number of command line options to help automate it's use in either batch files or from the command prompt. Listed below are some of the options, please note the some of the functions are operating system specific.
  • regedit.exe [options] [filename] [regpath]
  • [filename] Import .reg file into the registry
  • /s [filename] Silent import, i.e. hide confirmation box when importing files
  • /e [filename] [regpath] Export the registry to [filename] starting at [regpath] e.g. regedit /e file.reg HKEY_USERS\.DEFAULT
  • /L:system Specify the location of the system.dat to use
  • /R:user Specify the location of the user.dat to use
  • /C [filename] Compress (Windows 98)
  • /D [regpath] Delete the specified key (Windows 98)
Maintaining the Registry :
How can you backup and restore the Registry? :
Windows 95 :
M*cro$oft included a utility on the Windows 95 CD-ROM that lets you create backups of the Registry on your computer. The M*cro$oft Configuration Backup program, CFGBACK.EXE, can be found in the \Other\Misc\Cfgback directory on the Windows 95 CD-ROM. This utility lets you create up to nine different backup copies of the Registry, which it stores, with the extension RBK, in your \Windows directory. If your system is set up for multiple users, CFGBACK.EXE won't back up the USER.DAT file.
After you have backed up your Registry, you can copy the RBK file onto a floppy disk for safekeeping. However, to restore from a backup, the RBK file must reside in the \Windows directory. Windows 95 stores the backups in compressed form, which you can then restore only by using the CFGBACK.EXE utility.
Windows 98 :
M*cro$oft Windows 98 automatically creates a backup copy of the registry every time Windows starts, in addition to this you can manually create a backup using the Registry Checker utility by running SCANREGW.EXE from Start | Run menu.
What to do if you get a Corrupted Registry :
Windows 95, 98 and NT all have a simple registry backup mechanism that is quite reliable, although you should never simply rely on it, remember to always make a backup first!
Windows 95:
In the Windows directory there are several hidden files, four of these will be SYSTEM.DAT & USER.DAT, your current registry, and SYSTEM.DA0 & USER.DA0, a backup of your registry. Windows 9x has a nice reature in that every time it appears to start successfully it will copy the registry over these backup files, so just in case something goes wrong can restore it to a known good state. To restore the registry follow these instruction:[list=1]
  • Click the Start button, and then click Shut Down.
  • Click Restart the Computer in MS-DOS Mode, then click Yes.
  • Change to your Windows directory. For example, if your Windows directory is c:\windows, you would type the following:
cd c:\windows
  • Type the following commands, pressing ENTER after each one. (Note that SYSTEM.DA0 and USER.DA0 contain the number zero.)
Attrib -h -r -s system.dat
attrib -h -r -s system.da0
copy system.da0 system.dat
attrib -h -r -s user.dat
attrib -h -r -s user.da0
copy user.da0 user.dat
Restart your computer :
Following this procedure will restore your registry to its state when you last successfully started your computer.
If all else fails, there is a file on your hard disk named SYSTEM.1ST that was created when Windows 95 was first successfully installed. If necessary you could also change the file attributes of this file from read-only and hidden to archive to copy the file to C:\WINDOWS\SYSTEM.DAT.
Windows NT:
On Windows NT you can use either the "Last Known Good" option or RDISK to restore to registry to a stable working configuration.
How can I clean out old data from the Registry?
Although it's possible to manually go through the Registry and delete unwanted entries, M*cro$oft provides a tool to automate the process, the program is called RegClean. RegClean analyzes Windows Registry keys stored in a common location in the Windows Registry. It finds keys that contain erroneous values; it removes them from the Windows Registry after having recording those entries in the Undo.Reg file.

Internet Explorer Tips and Tricks


You would find lots of tips and tricks for Firefox but here we great collection of tips and tricks for our old Internet Explorer.
  1. Quick jump to Web Site IE:
    Type just the Internet domain name in the URL Address field and hold down ctrl enter keys.
    This will fill in www as the machine name and TLD .com
  2. Quick jump to Web Site Part II IE:
    Type go eBay in the URL address field.
    This will go to MSN search page site and select the best match.
  3. Presentation Mode IE:
    Select the F11 function key to enter Presentation mode.
    Select the F11 function key to toggle back.
  4. Resize Text Size IE:
    Hold down ctrl key and move the wheel on the mouse.
    The page text will enlarge or shrink.
  5. Page forward and back IE:
    Hold down shift key and move the wheel on the mouse.
    This will page forward or backward through the pages selected.
  6. Quick jump to the addresses IE:
    Select the alt and D keys together.
    This will select the URL address field.
  7. Page scroll using mouse wheel button IE:
    Push down on the mouse wheel button and slide the whole mouse up and down.
    This will page up and down the screen.
  8. Select visited web site addresses IE:
    Select the F4 function key.
    This will show a listing of sites you have visited for selection.
  9. Refresh the page IE and Netscape 6 :
    Select the F5 function key.
    This will refresh the current page.
  10. Quick Search IE:
    In the address field type find or ? Then your topic or keyword
    this will go to MSN search engine and search on your topic.
  11. Quick Search part II IE:
    Select the F3 function key.
    This will display the left side search column box.
  12. Open a New IE Window:
    Enter Control N
    A new IE browser window will appear.
  13. Open a New IE Window with One Click:
    Hold down shift and click on the link.
    A new IE browser window will appear.
  14. Page forward and back using arrow keys IE:
    Hold Alt button and use the arrow keys to page forward and back.
  15. Stop flashing images IE:
    Find a site that has flashing images About.com
    after the page loads select the Esc button.
  16. Get to Your Favorites with Keyboard Shortcut IE :
    Enter Control-I will bring up your left pane favorites.
    Enter Control-I will make it disappear
    Enter Control-B to organize your favorites
  17. Print Part of a Web Page IE:
    Select the area you want to print with your mouse.
    Select the print option from the menu bar - not the print icon.
    Change the print range area to selection.
Here is the list of shortcut keys for Internet explorer.
  • CTRL+A: Select all
  • CTRL+C: Copy
  • CTRL+X: Cut
  • CTRL+V: Paste
  • CTRL+F: Find
  • CTRL+E: Search
  • CTRL+W: Close window
  • CTRL+N: New browser window
  • CTRL+R: Refresh web page
  • CTRL+O: new location - esc to close
  • CTRL+D: quickly save a Web page to your Favorites list
  • CTRL+I: Favorites
  • CTRL+P: Print the page
  • CTRL+H: History
  • CTRL+tab: go to URL Address field
  • Alt+Spacebar+X: Window Maximize
  • Alt+Spacebar+R: Window Restore
  • Alt+Spacebar+N: Window Minimize
  • Home key: beginning of page
  • End key: bottom of page
  • Backspace key: move back a page.
  • CTRL+LEFT+ARROW: quickly move the cursor back between parts of the address.
Previous pages quickly, click the small down arrow to the right of the Back button.

Run Commands in Windows


Do you use the Run feature in Windows XP? For most, this feature remains unused (or rarely used). Why is that? Well, first off nearly all of the Run Commands Correspond to a particular Control Panel Item or a Utility, Tool or Task that can be accessed through Windows.
Here is the list of different Run command. To access go to run (Win + R )
  • Accessibility Controls : access.cpl
  • Accessibility Wizard : accwiz
  • Add Hardware Wizard : hdwwiz.cpl
  • Add/Remove Programs : appwiz.cpl
  • Administrative Tools control : admintools
  • Adobe Acrobat (if installed) : acrobat
  • Adobe Designer (if installed) : acrodist
  • Adobe Distiller (if installed) : acrodist
  • Adobe Image Ready (if installed) : imageready
  • Adobe Photoshop (if installed) : photoshop
  • Automatic Updates : wuaucpl.cpl
  • Bluetooth Transfer Wizard : fsquirt
  • Calculator : calc
  • Certificate Manager : certmgr.msc
  • Character Map : charmap
  • Check Disk Utility : chkdsk
  • Clipboard Viewer : clipbrd
  • Command Prompt : cmd
  • Component Services : dcomcnfg
  • Computer Management : compmgmt.msc
  • Control Panel : control
  • Date and Time Properties : timedate.cpl
  • DDE Shares : ddeshare
  • Device Manager : devmgmt.msc
  • Direct X Control Panel (If Installed)* : directx.cpl
  • Direct X Troubleshooter : dxdiag
  • Disk Cleanup Utility : cleanmgr
  • Disk Defragment : dfrg.msc
  • Disk Management : diskmgmt.msc
  • Disk Partition Manager : diskpart
  • Display Properties control : desktop
  • Display Properties : desk.cpl
  • Display Properties (w/Appearance Tab Preselected) control : color
  • Dr. Watson System Troubleshooting Utility : drwtsn32
  • Driver Verifier Utility : verifier
  • Event Viewer : eventvwr.msc
  • Files and Settings Transfer Tool : migwiz
  • File Signature Verification Tool : sigverif
  • Findfast : findfast.cpl
  • Firefox (if installed) : firefox
  • Folders Properties control : folders
  • Fonts control : fonts
  • Fonts Folder : fonts
  • Free Cell Card Game : freecell
  • Game Controllers : joy.cpl
  • Group Policy Editor (XP Prof) : gpedit.msc
  • Hearts Card Game : mshearts
  • Help and Support : helpctr
  • HyperTerminal : hypertrm
  • Iexpress Wizard : iexpress
  • Indexing Service : ciadv.msc
  • Internet Connection Wizard : icwconn1
  • Internet Explorer : iexplore
  • Internet Properties : inetcpl.cpl
  • Internet Setup Wizard : inetwiz
  • IP Configuration (Display Connection Configuration) : ipconfig /all
  • IP Configuration (Display DNS Cache Contents) : ipconfig /displaydns
  • IP Configuration (Delete DNS Cache Contents) : ipconfig /flushdns
  • IP Configuration (Release All Connections) : ipconfig /release
  • IP Configuration (Renew All Connections) : ipconfig /renew
  • IP Configuration (Refreshes DHCP & Re-Registers DNS) : ipconfig /registerdns
  • IP Configuration (Display DHCP Class ID) : ipconfig /showclassid
  • IP Configuration (Modifies DHCP Class ID) : ipconfig /setclassid
  • Java Control Panel (If Installed) : jpicpl32.cpl
  • Java Control Panel (If Installed) : javaws
  • Keyboard Properties control : keyboard
  • Local Security Settings : secpol.msc
  • Local Users and Groups : lusrmgr.msc
  • Logs You Out Of Windows : logoff
  • Malicious Software Removal Tool : mrt
  • Microsoft Access (if installed) : access.cpl
  • Microsoft Chat : winchat
  • Microsoft Excel (if installed) : excel
  • Microsoft Frontpage (if installed) : frontpg
  • Microsoft Movie Maker : moviemk
  • Microsoft Paint : mspaint
  • Microsoft Powerpoint (if installed) : powerpnt
  • Microsoft Word (if installed) : winword
  • Microsoft Syncronization Tool : mobsync
  • Minesweeper Game : winmine
  • Mouse Properties control : mouse
  • Mouse Properties : main.cpl
  • Nero (if installed) : nero
  • Netmeeting : conf
  • Network Connections control : netconnections
  • Network Connections : ncpa.cpl
  • Network Setup Wizard : netsetup.cpl
  • Notepad : notepad
  • Nview Desktop Manager (If Installed) : nvtuicpl.cpl
  • Object Packager : packager
  • ODBC Data Source Administrator : odbccp32.cpl
  • On Screen Keyboard : osk
  • Opens AC3 Filter (If Installed) : ac3filter.cpl
  • Outlook Express : msimn
  • Paint : pbrush
  • Password Properties : password.cpl
  • Performance Monitor : perfmon.msc
  • Performance Monitor : perfmon
  • Phone and Modem Options : telephon.cpl
  • Phone Dialer : dialer
  • Pinball Game : pinball
  • Power Configuration : powercfg.cpl
  • Printers and Faxes control : printers
  • Printers Folder : printers
  • Private Character Editor : eudcedit
  • Quicktime (If Installed) : QuickTime.cpl
  • Quicktime Player (if installed) : quicktimeplayer
  • Real Player (if installed) : realplay
  • Regional Settings : intl.cpl
  • Registry Editor : regedit
  • Registry Editor : regedit32
  • Remote Access Phonebook : rasphone
  • Remote Desktop : mstsc
  • Removable Storage : ntmsmgr.msc
  • Removable Storage Operator Requests : ntmsoprq.msc
  • Resultant Set of Policy (XP Prof) : rsop.msc
  • Scanners and Cameras : sticpl.cpl
  • Scheduled Tasks control : schedtasks
  • Security Center : wscui.cpl
  • Services : services.msc
  • Shared Folders : fsmgmt.msc
  • Shuts Down Windows : shutdown
  • Sounds and Audio : mmsys.cpl
  • Spider Solitare Card Game : spider
  • SQL Client Configuration : cliconfg
  • System Configuration Editor : sysedit
  • System Configuration Utility : msconfig
  • System File Checker Utility (Scan Immediately) : sfc /scannow
  • System File Checker Utility (Scan Once At Next Boot) : sfc /scanonce
  • System File Checker Utility (Scan On Every Boot) : sfc /scanboot
  • System File Checker Utility (Return to Default Setting) : sfc /revert
  • System File Checker Utility (Purge File Cache) : sfc /purgecache
  • System File Checker Utility (Set Cache Size to size x) : sfc /cachesize=x
  • System Information : msinfo32
  • System Properties : sysdm.cpl
  • Task Manager : taskmgr
  • TCP Tester : tcptest
  • Telnet Client : telnet
  • Tweak UI (if installed) : tweakui
  • User Account Management : nusrmgr.cpl
  • Utility Manager : utilman
  • Windows Address Book : wab
  • Windows Address Book Import Utility : wabmig
  • Windows Backup Utility (if installed) : ntbackup
  • Windows Explorer : explorer
  • Windows Firewall : firewall.cpl
  • Windows Magnifier : magnify
  • Windows Management Infrastructure : wmimgmt.msc
  • Windows Media Player : wmplayer
  • Windows Messenger : msmsgs
  • Windows Picture Import Wizard (need camera connected) : wiaacmgr
  • Windows System Security Tool : syskey
  • Windows Update Launches : wupdmgr
  • Windows Version (to show which version of windows) : winver
  • Windows XP Tour Wizard : tourstart
  • WordPad : write

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Powered by Blogger