Best4Hack

Best4Hack is the site where you can learn Ethical Hacking and Cracking get latest Tips and Tricks free Hacked and Cracked Software get SEO.

Best4Hack

Best4Hack is the site where you can learn Ethical Hacking and Cracking get latest Tips and Tricks free Hacked and Cracked Software get SEO.

Best4Hack

Best4Hack is the site where you can learn Ethical Hacking and Cracking get latest Tips and Tricks free Hacked and Cracked Software get SEO.

Best4Hack

Best4Hack is the site where you can learn Ethical Hacking and Cracking get latest Tips and Tricks free Hacked and Cracked Software get SEO.

Best4Hack

Best4Hack is the site where you can learn Ethical Hacking and Cracking get latest Tips and Tricks free Hacked and Cracked Software get SEO.

Showing posts with label Windows XP Tricks. Show all posts
Showing posts with label Windows XP Tricks. Show all posts

Tuesday, 3 December 2013

How To Build your own Browser within few Minutes


Build your own Browser
MakeMyBrowser.com is a unique and exclusive site that helps you to create your own personalized browser. It will perform just like any other browser; simple internet explorer (e), Google, or Google Chrome and Mozilla Firefox, but you can now make your own personalized browser for free. MakeMyBrowser.com has come up with the distinctive idea of having one’s own browser.

Yes, you can have your own browser with your own photo as a logo on it and with your own Bookmarks, Homepages, and Addons, i think that yes it is very easy.. isn't it cool yes. well it will take you only Five steps and then an option will appear to download your browser and the browser is based on Chromium, Chromium is an open source browser which can be modified as anyone wants it with your Won Names, Bookmarks, Logo, Homepages, and Addons Features.

Okay, so now lets, get started!

1. First Visit to this website → www.makemybrowser.com. and click on "Start now".


Build your own Browser



2. You'll get an option the give the browser your name and upload logo! and click on "Select Bookmarks".

Build your own Browser

3. Set up your bookmarks and your homepage! and click on "Add Features".

Build your own Browser

 4. Then You will get options for some cool free features for your browser after selecting the features for your browser click on "Select Themes".

Build your own Browser

 5. Select the theme you want and check "I agree to the terms of use." and click on "Finish and Download".

Build your own Browser

 6. Download it, Install it, and enjoy your own Browser.

And Have A Fun :-)

Wednesday, 20 November 2013

How To Access Windows without a password and backdoor!

Windows hack


You've read the title, you know what it's about; Getting into any windows computer without a password. So let's get started!

You need:
-A USB
-A Windows computer with access to the BIOS
-Kon-Boot which can be downloaded from here:Click Here To Download Kon-Boot
(157kb, no biggie)

After downloading the needed files, delete everything on the USB. Now extract everything from the zip archive you just downloaded.
There will be a file called KonBootInstall.exe, run it and wait for the cmd box to open up, it will ask you for the letter of the drive you want to install kon-boot onto. The letter of the USB drive you inserted will
be next to it in "My Computer". e.g. if the drive is "F:\" you can enter just the letter F and press enter.

Open the USB drive and it should have 3 files in it (after you deleted everything prior to running the USB installer).

The files should be:
grldr
konFLOPPY.img
menu.lst


You're USB is now ready!

Implementing the USB:
To use your new USB you will need to plug it in (if it isn't already) and restart your computer.

Getting to the BIOS menu:
As soon as your computer starts up there SHOULD be a boot menu. It will only give you a split second to choose your option from the menu so this may require a few restarts before you actually make into the BIOS menu. Typical keys to enter the BIOS is Esc or F2, but this may vary depending on your computer or the computer you are trying to get into.
Once you know how to get into one BIOS, it won't be hard to get into most others because they are all basically the same.

You're in the BIOS:
Now that you're in the BIOS, you're looking to make the USB you inserted boot before anything else on the computer does. This is called changing the boot sequence. To do this, look for an option such as Boot Order, Boot Sequence, First Boot Device or Boot Management and select it using the arrow keys and enter to open it. YOUR MOUSE WON'T WORK!

Once you've opened the Boot Sequence option you now have to select the USB that you have inserted as the device to boot first. This is either by moving it to the top of the list or simply scrolling down and pressing enter on it.

Pretty much done:
Now that you've made it this far, you can consider yourself a "L337 HAXX0R" (or whatever you wish to deem yourself). Your computer should boot and come to a menu with one option "Kon-Boot" or "Kon-Boot Floppy Image". Either way, the option should be obvious, and if you can't figure it out, I'm surprised you made it this far. So hit enter and let the computer start up.

NOW you should be at the point where you need to put the password in...
write in the password and login... right?

Actually, just leave it blank and click login. Who needs a password anyway?

Part 2:
The backdoor (Will be done if requested) Thumbsup

Please feel free to point out where I could make this better :)

And please let me know if the uploaded files don't work! Once again, I have tried and tested it on my computer with these exact files and it's worked on Windows XP, Windows 7 32 & 64bit.
NOT YET TRIED ON WINDOWS 8! Let me know if it works!

P.S. I take no credit for the Kon-boot program itself, I am only showing you how to implement it.
You may also find your own copy of kon-boot, although I tried to take the hard work out of it by weeding out the infected and not working copies.

edit: uploaded files updated with automatic installer.

Thursday, 25 April 2013

How To Rename "Refresh" Option In Windows XP




Hey guys welcome to Best4Hack today I am going to tell you How To Rename "Refresh" Option In Windows XP you have to follow just some simple steps and your work will be done.

What is Resource Hacker :-

1. View resources in Win32 executable files (*.exe, *.dll, *.cpl, *.ocx) and in Win32 resource files (*.res) in both their compiled and decompiled formats.
2. Extract (save) resources to file in: *.res format; as a binary; or as decompiled resource scripts or images. Icons, bitmaps, cursors, menus, dialogs, string tables, message tables, accelerators, Borland forms and version info resources can be fully decompiled into their respective formats, whether as image files or *.rc text
files.
3. Modify (rename or replace) resources in executable. Image resources (icons, cursors and bitmaps) can be replaced with an image from a corresponding image file (*.ico, *.cur, *.bmp), a *.res file or even another *.exe file. Dialogs, menus, stringtables, accelerators and messagetable resource scripts (and also Borland forms) can be edited and recompiled using the internal resource script editor.Resources can also be replaced with resources from a *.res file as long as the replacement resource is of the same type and has the same name.
4. Add new resources to executable.Enable a program to support multiple languages, or add a custom icon or bitmap (company logo etc) to a program's dialog.
5. Delete resources.
Most compilers add resources into applications which are never used by the application. Removing these unused resources can reduce an application's size.

Hope you all got enough information about Resource hacker,  Now can continue with our trick.

Step 1 :- Download Resource Hacker and Replacer tool for free Click here to download
Step 2 :- Open Resource Hacker and click open.
Step 3 :- Choose Shell32.dll>Menu>215>1033
Step 4 :- change the word ‘Refresh' to ‘Any name that you want'
Step 5 :- After Changing the appropriate options,Compile the script by Compile script option.
Step 6 :- Save as the file at another location.Please ensure that it must not be the original location of Shell32.dll 
Step 7 :- Now open Replacer tool
Step 8 :- Drag & Drop Shell32.dll file from system32 in Replacer than press Enter Key.
Step 9 :- Now Drag & Drop new Save as file on Replacer. Than press enter
Step 10 :- Press y and reboot the System

Thats it your are done, Now after rebooting your system, when you right click from your desktop you can see that the Refresh option name has been changed.

Wednesday, 14 November 2012

30 Simple Ways To Make Your Pc Fast as Lightning

fast pc
Following are more than 80 ways which can boost your PC performance right now and make PC work faster as new.
  1. Use the Windows Performance Toolkit and the trace logs to speed up Windows boot time.
  2. Perform a virus scan on your computer regularly. If you don’t want to install virus protection, use some of the free online virus scanners.
  3. Use web accelerators, which are programs that try to prefetch and cache the sites you are going to visit.
  4. Make sure that there are no bad sectors or other errors on your hard drive.
  5. If you have a SATA drive and you’re running Windows Vista, you can speed up your PC by enabling the advanced write caching features.
  6. Reduce the number of fonts that your computer has to load up on startup to increase performance.
  7. Remove unnecessary old programs from the Add/Remove dialog of the Control Panel often.
  8. Update all of your drivers in Windows, including chipset and motherboard drivers to their latest versions.
  9. Partition your hard drives correctly to maximize performance.
  10. Speed up Mozilla Firefox by tweaking the configuration settings and by installing an add-on called FasterFox.
  11. Speed up the Start Menu in Windows by customizing or adding the ‘MenuShowDelay’ key in the registry.
  12. Make sure that you have selected “Adjust for best performance” on the Performance tab in Computer System Properties.
  13. Make sure to download all the latest Windows Updates, Service Packs, and hot fixes as they normally help your computer work better.
  14. Clean registry by removing broken shortcuts, missing shared DLLs, invalid paths, invalid installer references and more.
  15. If you are running a 32-bit version of Windows and have 4GB of RAM or more, you can force Windows to see and use all of the RAM by enabling PAE.
  16. If you are not using some of the hardware on your computer, i.e. floppy drive, CD-ROM drive, USB ports, IR ports, etc, then go into your BIOS and disable them so that they do not use any power and do not have to be loaded during boot up.
  17. Enable DMA mode in Windows XP for IDE ATA/ATAPI Controllers in Device Manager.
  18. Replace a slow hard drive with a faster 7200 RPM drive, SATA drive, or SAS drive.
  19. Turn visual effects off by going to Performance Options.
  20. Speed up the Send To menu in Explorer by typing “sendto” in the Run dialog box and deleting unnecessary items.
  21. Disable unnecessary Windows services, settings, and programs that slow down your computer.
  22. Make icons appear faster while browsing in My Computer by disabling search for network files and printers.
  23. Tweak Windows using free programs
  24. If you already have anti-spyware software installed, turn off Windows Defender protection.
  25. If you do not use the Recent Documents feature in Windows, then disable it completely.
  26. Disable UAC (User Account Control) in Windows Vista or Windows 7.
  27. Clean out the Windows prefetch folder to improve performance.
  28. If you are technically savvy and don’t mind taking a few risks, you can try to overclock your processor.
  29. Speed up browsing of pictures and videos in Windows Vista by disabling the Vista thumbnails cache.
  30. Do not clear your paging file during shutdown unless it is needed for security purposes because clearing the paging file slows down shutdown.

PrinceMahen


Sunday, 16 September 2012

Create Ghost Bootable SD Card or USB Flash Drive

Binary Research developed Ghost in Auckland, New Zealand. After the Symantec acquisition, a few functions (such as translation into other languages) were moved elsewhere, but the main development remained in Auckland until October 2009 at which time much was moved to India. Technologies developed by 20/20 Software were integrated into Ghost after their acquisition by Symantec in April 2000.


Although disk cloning programs are not primarily backup programs, they are sometimes used as such. A key feature of a backup program is to allow the retrieval of individual files without needing to restore the entire backup. Disk cloning programs either provide a Windows Explorer-like program to browse image files and extract individual files from them, or allow an image file to be mounted as a read-only filesystem within Windows Explorer.
Ghost is marketed as a backup program. It comes with an ISO file that needs to be written to a CD. This provides a recovery environment to perform a full system recovery. There is also provision to mount a drive and select backed-up files from that drive and recover them to the primary hard disk.
Ghost can copy the contents of one hard drive to another and can convert a hard drive′s contents to a virtual disk format such as VMware′s VMDK file.


It's a good practice to create an image of your hard drive before you start using it. Especially when you had to build that computer from scratch and spent hours installing the operating system and all of your favorite apps...

As Symantec Ghost becomes more user friendly, people start to recognize this idea. The idea also works well when you need to clean your PC from viruses. In case anything goes wrong with the operating system, you just need to restore the image using the Symantec bootable CD.

However, the problem comes when we deal with the new version of those small laptops: The netbooks! which usually don't come with a built-in CD-ROM drive to bootup the PC.
The most simple solution would be buying an external CD-ROM drive, which costs you money. And in some cases, you just want to bootup the Symantec Ghost.... with whatever available!


Almost every recent laptop/netbook comes with a card reader, and even if you wasn't lucky enough, your laptop/netbook should have a USB port!

This guide will tell you how to create a bootable SD card or a USB flash drive with Symantec Norton Ghost.
This task can be done with several different versions of Symantec Ghost; however, the steps from this articles are based on Symantec Ghost 14.

What you need?
  • Symantec Ghost 14 bootable CD. (Some other versions might also work)
  • A PC with bootable CD/DVD drive.
  • An SD card (either SD or SDHC), or a USB thumb drive. The size can be as minimum as 1 GB. You can also pick a large SD card if you want to store your hard drive image to the card as well.
  • An SD slot or a card reader (for SD card) or a USB slot (for thumb drive) 
Follow the steps in order. Use this guide at your own risks.

  1. First, check to make sure your CD/DVD drive is bootable. (See your BIOS manual or PC user guide for details since this is out of the scope of this article).
  2. - For SD card: Make sure the SD slot or the card reader is available. if it's a card reader, connect it to the PC. Also insert the card.
    - For USB thumb drive: Make sure the drive is inserted into one of the USB slots.
  3. Bootup the computer using the Symantec Ghost CD (Details vary on different computers). On Windows XP, during the startup, you should see the prompt "Press any key to boot from CD...".
  4. Once the Symantec Recovery startup is complete, you should see the main screen of Symantec Ghost 14 Recovery similar to this image:


  5. Select "Analyze" from the left menu.


  6. Then click on "Open Command Shell Window". A command prompt window will display.

  7. At this command prompt window, type: "diskpart" (one word, without quotes) and hit enter. The prompt now changed to "DISKPART>"

  8. Now type "list disk" and hit enter. You should now see a list of all available disks. Base on the size of each disk listed, find the one that matching your SD card (or thumb drive) and note its disk number under "Disk ###". If you don't see your SD card (or flash drive) listed, verify if it is inserted or plugged in (you might need to restart the computer and try again).

  9. Type "select disk <n>" (replace <n> with the disk # noted from the previous step) then hit enter.
    Important!! Besure to select the correct disk (your SD card or thumb drive) as you will be erasing the drive.
    Sample image with a 4-GB SD selected:



  10. Create a primary partition for the the disk by executing the following sequence of commands:
    clean
    create partition primary
    select partition 1

  11. Set the primary partition active, type: "active" and hit enter

  12. Perform a quick format with the following command:
    format fs=fat32 quick

  13. Then type:
    assign
    exit

  14. Your SD card (or the flash drive) is now bootable and will act similar to a local hard drive. In order to boot this card with Symantect Ghost Recovery, copy all contents from the Symantec Ghost disc to the SD card (or the flash drive). Besure to copy everything including any hidden files/folders.

    The SD card or flash drive is now bootable and will boot your laptop/netbook to Symantec Ghost Recovery utilities exactly the same way as of the CD (To boot with the card on your laptop/netbook, don't forget to set your bios to search for the SD card or USB external devices in the boot sequence).
 

Version history

Ghost 3.1

The first versions of Ghost supported only the cloning of entire disks, however version 3.1 in 1997 allowed the cloning of individual partitions. Ghost could clone a disk or partition to another disk or partition or to an image file. Ghost allowed for writing a clone or image to a second disk in the same machine, another machine linked by a parallel or network cable, a network drive, or to a tape drive.

Ghost 4.0 and 4.1

Version 4.0 of Ghost added multicast technology, following the lead of a competitor, ImageCast. Multicasting allows sending a single backup image simultaneously to other machines without putting greater stress on the network than by sending an image to a single machine. This version also introduced Ghost Explorer, a Windows program which allowed a user to browse the contents of an image file and extract individual files from it. Explorer was subsequently enhanced to allow users to add and delete files on FAT, later on ext2, ext3 and NTFS filesystems in an image. Until 2007, Ghost Explorer could extract files from NTFS images but not edit NTFS images. Ghost Explorer could work with images from older versions but only slowly; version 4 images contained indexes to find files rapidly. Version 4.0 also moved from real-mode DOS to 286 protected-mode. The additional memory available allowed Ghost to provide several levels of compression for images, and to provide the file browser. In 1998, Ghost 4.1 allowed for password-protected images.

Ghost 5.0

Version 5.0 moved to 386 protected mode. Unlike the character-based user interface of earlier versions, 5.0 used a GUI. The Binary Research logo, two stars revolving around each other, played on the main screen while the program idled. In 1998 Gdisk, a script based partition manager, was integrated in Ghost. Gdisk serves a role similar to Fdisk, but has greater capabilities.

Ghost for NetWare

There was also a Norton Ghost version (called 2.0) for Novell NetWare around 1999, with supported NSS partitions (although it ran in DOS, like the others).

Ghost 6.0 (Ghost 2001)

Ghost 6.0 included a Console application in 2000 to simplify the management of large numbers of machines. The Console communicates with client software on managed computers to allow a system administrator to refresh the disk of a machine remotely.
As a DOS-based program, Ghost required machines running Windows to reboot to a DOS environment to run it. Ghost 6.0 required a separate DOS partition when used with the Console.

Ghost 7.0 / Ghost 2002

Released March 31, 2001 Norton Ghost version 7.0 (retail) was marketed as Norton Ghost 2002 Personal Edition. Help|About reveals version 7.00.

Ghost 7.5

Released December 14, 2001
Ghost 7.5 in 2002 created a ‘Virtual Partition’ instead – a DOS partition which actually exists as a file within a normal Windows filesystem. This significantly eased systems management because the user no longer had to set up their own partition tables. Ghost 7.5 could also write images to CD-R drives, and later versions can also write DVDs.

Symantec Ghost 8.0

Ghost 8.0 includes a standalone executable (filename: ghost32.exe) that runs directly from Windows, without the need to reboot. It is very well-suited for placement on bootable media, such as BartPE′s bootable CD. The Corporate edition supports Unicast, Multicast and peer-to-peer transfers via TCP/IP. Ghost 8.0 also allows an image to be saved on, or read from, an NTFS filesystem, although NTFS is not normally accessible from a DOS program.

Norton Ghost 2003

Norton Ghost 2003, a consumer edition of Ghost, was released on September 6, 2002. Available as an independent product, Norton Ghost 2003 was also included as a component of Norton SystemWorks 2003 Professional. A simpler, non-corporate version of Ghost, Norton Ghost 2003 does not include the Console but has a Windows front-end to script Ghost operations and create a bootable Ghost diskette (third-party CD burning software can be used to create a bootable Ghost CD based on a bootable Ghost diskette). The machine still needs to reboot to the Virtual Partition, but the user doesn′t need to interact with DOS. Symantec deprecated LiveUpdate support for Norton Ghost 2003 in early 2006.

Symantec Ghost Solution Suite 1.0 (Ghost 8.2)


Symantec Ghost 8.2
In 2004, Symantec renamed the Enterprise version of Ghost to Symantec Ghost Solution Suite 1.0. This helped to clarify the difference between the consumer and business lines of the product. This was further defined in February 2006, with the Release of Norton Save And Restore (some packages are labelled Norton Backup And Restore), a standalone backup application based on Ghost 10.0.
Released November 15, 2004

Symantec Ghost Solution Suite 1.1 (Ghost 8.3)

Ghost Solution Suite 1.1 was released December 2005. Some of the new features include the ability to create an image file that is larger than 2 GB (in Ghost 8.2 or earlier versions, such image files are automatically split into two or more segments, so that each segment has a maximum size of 2 GB), more comprehensive manufacturing tools, and the ability to create a universal boot disk. Ghost Solution Suite is a bundle of an updated version of Ghost, Symantec Client Migration (a user data and settings migration tool) and the former PowerQuest equivalent, DeployCenter (using PQI images).

Norton Ghost 9.0 (includes Ghost 2003)


A screen shot of Norton Ghost 9.0 as seen in Windows 2000
Ghost 9.0 was released August 2, 2004. It represents a significant shift in the consumer product line from Ghost 2003, in several ways:
  • It uses a totally different code base, based on the DriveImage/V2i Protector product via Symantec′s acquisition of PowerQuest.
  • The main product is a Windows-based application that must be installed on the target system.
  • Images of the system can be made while Windows is running, rather than only when booted directly into DOS-mode Ghost.
  • Incremental images (containing only changes since the last image) are supported.
  • The Windows application requires Product Activation in order to function fully.
  • The bootable environment on the Ghost 9 CD is only useful for recovery of existing backups – it cannot be used to create new images.
Since the DriveImage-based Ghost 9 did not support the older .gho format disk images, a separate CD containing Ghost 2003 was included in the retail packaging for users needing to access those older images.
The limitations of Ghost 9 compared to Ghost 2003 were not well communicated by Symantec, and resulted in many dissatisfied customers who purchased Ghost 9 expecting the previous version′s features (like making images from the bootable Ghost environment, no installation required, and no product activation).

Norton Ghost 10.0

Supported media CDR/RW and DVD+-R/RW drives, USB and FireWire (IEEE 1394) devices, and Iomega Zip and Jaz drives. Enables the encryption of backups and support for Maxtor external drives with Maxtor OneTouch buttons. The Ghost version 10.0 are compatible with previous revisions, but not with future revisions.

Norton Save And Restore 1.0 (Ghost 10.0)

Norton Save And Restore 1.0, released February 2006, was the renamed consumer version of Ghost. The system utilized Ghost 10.0′s engine, with the addition of features to allow backup and restoration of individual files.

Symantec Ghost Solution Suite 2.0 (Ghost 11.0)

Ghost Solution Suite 2.0 was released in November 2006. This version provides significant improvements in performance, as well as the ability to edit NTFS images. This version also adds support for Windows Vista, x64 versions of Windows, and GUID Partition Table (GPT)-based disks (although the software does not yet fully support systems with Extensible Firmware Interface (EFI)-compliant firmware). Running Live Update from Ghost Explorer will update Ghost to 11.0.2.1573.
Ghost 11.0 supported image formats to save and restore: *.GHO, *.GHS, *.IMG, *.RAW

Norton Ghost 12.0

Ghost 12.0 includes Windows Vista support with an updated and more thorough user interface. It allowed for a full system backup & one where individual files or folders can be selected & backed up.
This version also provided a “LightsOut Restore” feature. This restored a system with an on-disk software recovery environment, thereby allowing a recovery without a bootable CD. Upon computer boot-up, a screen will ask which drive to boot from, the regular drive, or the LightsOut restore virtual drive.
LightsOut restore would augment the ISO disk, which came with the Ghost program, that had to be burned to a CD. That contained a recovery environment that allowed one to recover files even if Windows didn′t start up, but the computer could turn on. The latest update to that program was 12.0.5.29804.

Norton Save & Restore 2.0 (Ghost 13.0)

NSR 2.0 has fewer features when compared to Norton Ghost 12. NSR 2.0 offers one-time backups, file and folder backup, simplified schedule editor, Maxtor OneTouch integration and modifiable Symantec recovery disc.
This version also supports 32-bit and 64-bit versions of Windows XP and Vista.

Norton Ghost 14.0


The window where you can set Norton Ghost to automatically back up a drive based upon the level of global computer based threats, as judged by Symantec′s ThreatCon grading system.
Version 14.0 preserves the features of version 12.0, with the ability to make full Volume Snapshot Service (VSS) backups and the option to make remote backups to an FTP site as another storage option. Ghost also leverages data from ThreatCon, which monitors malware activity around the world, and performs incremental backups when a specific threat level is reached. However, this functions only when connected to the Internet, so it will not resist any local attack.
Other features include the ability to back up to Network-attached storage devices and support of NTFS partitions up to 16TB. Ghost can manage other installations of version 12.0 or later across a network. Version 14 supports XP and Vista. The latest version is 14.0.5.34587. This version no longer supports opening of older version .gho image files. Rather, it stores images in .v2i format. Incremental backup images created with Norton Ghost saved with the file extension .IV2I on a regular basis after the initial volume backup (.V2I). The .iv2i file must be saved along with the initial .v2i backup file in order to function correctly. Older .gho image files can be restored using Ghost Explorer, a separate utility.

Symantec Ghost Solution Suite 2.5

This is the current version of the enterprise software, and includes Ghost 11.5. It was released in May 2008. New features include DeployAnywhere, Hot Imaging, logical volume support, additional image formats, and new PreOS (boot disk) operating systems. As of January 6, 2010, the latest build from Live Update is 11.5.1.2266 (Live Update 5 (LU5)). This update provides support for Windows 7 and 2008 R2. Furthermore Ghost 11.5 is compatible with BartPE's bootable CD using a PE Builder plug-in for Symantec Ghost 11.
Ghost 11.5 supported image formats to save: *.GHO, *.GHS, *.VMDK
Ghost 11.5 supported image formats to restore: *.GHO, *.GHS, *.VMDK, *.V2I, *.IV2I, *.PQI
  • Improved support for virtual formats
New Features Description
DeployAnywhere Allows drivers to be injected during image deployment to lessen the need for hardware dependent images.
Hot Imaging Allows live machines to be used as the source to keep images from becoming stale and out of date.
Image Formats
PreOS (boot disk) operating systems

Norton Ghost 15.0

Ghost was updated in November 2009 to v15.0.0.35659. According to the manual on Symantec′s site, the following features are available in Ghost 15:
New Features Description
Improved support for virtual formats Norton Ghost now includes support for the following virtual platforms:
  • VMware ESX 3.5i and 4.0i
  • VMware ESX 3.5 and 4.0
Improved platform support Norton Ghost now includes support for the following platforms:
  • Windows 7
  • Windows Vista with SP2 (includes Home Basic, Home Premium, Business-Retail, and Ultimate)
  • BitLocker-encrypted volume support
Create recovery points from within Symantec Recovery Disk You can now create independent recovery points using the new Back Up My Computer feature in Symantec Recovery Disk. Sometimes known as a cold backup or offline backup, you can create recovery points of a partition without the need to install Norton Ghost or its Agent.
Convert recovery points to virtual disks using a schedule You can now create schedules to convert recovery points to VMware Virtual Disk and Microsoft Virtual Disks, or directly to a VMware ESX 3.5 server.
Support for Microsoft Hyper-V You can now convert recovery points to Hyper-V format and also import recovery points to a Hyper-V server.
Support for Blu-ray disc media Back up your computer directly to Blu-ray, DVD, or CD. Or, you can copy recovery points to Blu-ray, DVD, or CD.
30-day trial If you choose to delay installation of the product license, all features will not be enabled during the 30-day trial period. The 30-day trial period begins when you do a particular task.
On April 1, 2010 an updated version of Norton Ghost 15 was released. The current version is 15.0.1.36526



Tuesday, 28 August 2012

Most used and simple methods to reset Windows password


 windows hacking trick

Windows give you the option of having a Windows password to log on.This is useful when more than one user profiles are enabled. "I forgot Windows password. How do I reset my Windows password?" is a hot topic nowadays. You should set strong Windows password for better security. But you should also know how to make a password reset disk in advance to in case that you forget the password in future, or how to eliminate the password for more convenient login. Now you will see some cases and the solution of problem.


You can't log into computer

The problem that how to reset Windows password is linked with a forgotten Windows password for most of the time. Many people look for a solution to this problem is easily because they forgot Windows password and can't log into the computer anymore. If you came have a similar problem, you can reset Windows password by using several methods.

1.Free Windows password recovery tools
Windows password recovery tools are applications used to recover, or reset lost user and administrator passwords in Windows operating systems. Password recovery tools can "crack" passwords. Here are the best, free tools available.

-Ophcrack http://ophcrack.sourceforge.net/ The Ophcrack Windows password cracker is the best free Windows password recovery tool now. With Ophcrack, you don't need to access to Windows to retrieve the lost passwords. Download for free, burn it to a CD and boot from the CD. The Ophcrack application starts, recovers the passwords automatically. Ophcrack can run on Windows 7, Windows Vista, and Windows XP.

-Offline NT Password & Registry Editor http://pogostick.net/~pnh/ntpasswd/cd110511.zip Offline NT Password & Registry Editor operates differently than most password recovery tools in that it deletes the Windows password covering it. Download it , burn it to CD. You boot from a burned CD. After you run the app, you can log in to your Windows account without entering a password at all.
Offline NT Password & Registry works on Windows 7, Windows Vista, Windows 2000, and Windows NT.

-PC Login Now http://www.pcloginnow.com/ works differently than other password recovery programs. Instead of finding and displaying your current Windows password, PC Login Now erases it, letting you to access Windows without a password.
Download it , burn it to CD. Then your computer will boot with PC Login Now
The PC Login Now causes Windows to notice a possible hard drive problem on the first reboot after erasing the password. PC Login Now supports Windows 7, Windows Vista, and Windows XP.

2.Use Windows password reset disk
A Windows password reset disk can be created in advance to reset Windows password if you have such a CD here are the steps recover your Windows password.

-Boot your computer and insert the password reset CD in computer.
-Click your user account name and hit Enter.
-Click OK when an error message comes out.
-Click the “Reset password” under the password box.
-When Password Reset Wizard comes out, follow the steps to create a new password.
-Log on with your new password.


When you can log in as Administrator

Usually every user has numerous user accounts on his computer. If you forgot Windows password you can still log into the computer through another admin account. Please follow the steps to reset that forgotten password.

1.Use “lusrmgr.msc”
-Click the Start button, type "lusrmgr.msc" in the Search box, and click OK.
-Then "Local Users and Groups" opens.
-Expand the folder titled users on the Local users and groups window.
-Double-click "Local Users and Groups", and then click Users.
-Right-click the username which you need to change the password, and select Reset Password.
-Type and verify the new password.

2.Reset Windows password from the Command Prompt
With Command Prompt you can monitor all the user of the computer.
-Click the Start button, type "cmd" in the Search box, and click OK.
-Type net user amf newpass (amf is the locked admin account's name and newpass is the new password) and press Enter. Now you have successfully created a new password on the locked admin account.
-Type shutdown -r -t 00 and press Enter.

Your computer should be rebooted automatically and then you can log in Windows with the new password. It is a very simple way to change the password of any users from the Command Prompt. But you can change the password if you have Administrator privileges.


You can log in with the correct Windows password

It’s very simple to change your current Windows password.
-Log into your user account using a password.
-Open the User Accounts window by clicking Start - Control Panel - Family Safety and User Accounts - User Accounts.
- Click the “Change your password” link.
-Type your current password, type the new password, then enter it again, click Change password button.


Thursday, 26 April 2012

Turn on pc in 10 sec

Wanna to know how to turn the pc on in 10 seconds (may vary)

Sart ->Run
type Regedit
press enter
this will open Registery Editor
now look for the key

HKEY_LOACAL_MECHINE\SYSTEM\CurrentControlSet\Control\ContentIndex

now there find the Key Called
"Startup Delay"
Double Click On It
Now where its Base
Click Decimal
Now its Default Value Is 4800000 (75300:hexadecimal)
Change The Value To 40000
here u go u have done it
now close the Registery Editor and Restart Your Computer

Saturday, 11 February 2012

Windows Remote Desktop Worm “Morto” Spreading

F-Secure Lab just found a new Internet worm, and it’s spreading in the wild. The worm is called Morto and it infects Windows workstations and servers. It uses a new spreading vector that we haven’t seen before: RDP (Remote Desktop Protocol). Windows has built-in support for this protocol via Windows Remote Desktop Connection. Once you enable a computer for remote use, you can use any other computer to access it.
Windows Remote Desktop Worm Morto
When you connect to another computer with this tool, you can remotely use the computer, just like you’d use a local computer.
Windows Remote Desktop Worm Morto
Once a machine gets infected, the Morto worm starts scanning the local network for machines that have Remote Desktop Connection enabled. This creates a lot of traffic for port 3389/TCP, which is the RDP port.
When Morto finds a Remote Desktop server, it tries logging in as Administrator and tries a series of passwords:
admin
password
server
test
user
pass
letmein
1234qwer
1q2w3e
1qaz2wsx
aaa
abc123
…….
………..
Once you are connected to a remote system, you can access the drives of that server via Windows shares such as \\tsclient\c and \\tsclient\d for drives C: and D:, respectively. Morto uses this feature to copy itself to the target machine. It does this by creating a temporary drive under letter A: and copying a file called a.dll to it.
The infection will create several new files on the system including \windows\system32\sens32.dll and
\windows\offline web pages\cache.txt.
Morto can be controlled remotely. This is done via several alternative servers, including jaifr.com and qfsl.net.
F-Secure Lab detected Morto components as Backdoor:W32/Morto.A and Worm:W32/Morto.B.

Wednesday, 1 February 2012

How to Recover Deleted Files from Windows and Mac

How to Recover Deleted Files

Recover Deleted Files from Windows and MacHave you accidentally deleted your files from the Hard disk? Do you desperately want to recover them back? Well, you need not panic!
It is possible to recover the deleted files back from the hard disk  (even after you have Shift+Deleted)  provided you act as soon as you realize that the files are deleted and use the best deleted files recovery software.
In this post you will find a detailed information on how to recover the deleted files from your Windows PC or Mac.

How Does the File Recovery Process Works?

When you delete a file from your computer, (or even from the recycle bin) the file is not actually deleted. Unlike what most people think, the file is not permanantly deleted or dropped from your hard disk even if you have deleted them from the recycle bin.
Let’s take up a small example of a book containing 50 pages. Suppose when you delete the page 25, assume that only the entry in the index which points to the page 25 is deleted and not actually the page 25 itself. Likewise, when you delete a file from your hard disk, only the pointer which points to this file is removed and not actually the file itself. This file still exists intact and is 100% possible to recover it back in the original condition. In this condition, the file becomes invisible and hence appears to have been deleted.
Recovering the deleted files 100% back in the original condition is very much dependent on the efficiency of the Data Recovery software you use. So, it is necessary to make a right choice when it comes to the selection of file recovery software.  
Today, there exists hundreds of data recovery tools and softwares on the market which boast to recover 100% of all the deleted files back in the original condition. But in reality, most of these softwares are neither effective nor capable of recovering your files back. So, when it comes to Data Recovery, I recommend the following software as the best:
1. Stellar Phoenix Data Recovery (for Windows)
2. Stellar Phoenix Mac Data Recovery (for Mac)
Stellar Phoenix is one of the best company specializing in deleted files recovery services and solutions since 1993. Stellar’s Data Recovery Solutions encompasses a wide range of software for almost any data loss situation ranging from accidental formats to virus attacks to software malfunctions. Hence Stellar provides the best tools to recover deleted files with over 1,000,000 satisfied customers across 137 countries.

What are the Chances of Recovering my Files Back?

Since the operating system doesn’t immediately re-use the space from the deleted files, it is most certainly possible to recover the deleted files back in 100% original condition. It may take up a very long time for those files to be completely deleted since the modern hard disks have ample capacity. Hence the chances are too less that the space from the deleted files are re-used immediately.
So, it is really worth to try out the file recovery softwares like Stellar Data Recovery for Windows or Stellar Data Recover for Mac. Some files are reported to have been recovered even after years of it’s deletion. However, for the best results, it is recommended that you use the file recovery software as immediately as possible to recover your deleted files.

Recovering the Deleted Files

In order to recover the deleted files all you need to do is perform a scan (search) for the deleted files using a File Recovery Software. Please be informed that there is no manual way to recover the deleted files. The Phoenix Data Recovery software performs a thorough scanning of the hard disk sector by sector and will locate the existence of deleted files to restore them back in the original condition. It is the only software that supports 185 popular file types including Windows NT Registry, JPEG, MP4, GIF, BMP and MS Word files. The software offers rich graphical support and incorporates advanced scanning methods to completely scan and recover deleted files from your hard drive. With this recovery software, it is possible to
  • Recover FAT16, FAT32, VFAT, NTFS, and NTFS5 file system partitions
  • Recover deleted emails
  • Recover deleted documents
  • Recover deleted photos
  • Recover deleted music
  • Formatted Hard-Drive recovery
  • Recover files from USB Drives, CDs, DVDs and memory cards
  • Recover almost all the camera format files
Visit the following links for more information on Stellar Data Recovery
1. Stellar Phoenix Data Recovery (for Windows)
2. Stellar Phoenix Mac Data Recovery (for Mac)

Wednesday, 30 November 2011

Cool Computer Tricks

Looking cool computer tricks? Here is something that should pique your interest: Use Keyboard As Mouse, On Screen Keyboard and Transform your Windows XP in to Windows 7.

Use Keyboard As Mouse

When mouse isn’t working properly , this trick can be very helpful. To activate mouse keys all you do is press Alt+Left shift key + NumLock and click OK or press enter .

Use the Numerical pad for controlling the mouse pointer.
5 is for click.
+ is for double click
- for right click.

On Screen Keyboard

On screen keyboard is one of the coolest windows features that displays a virtual keyboard on the computer screen that allows people with mobility impairments to type data by using a pointing device or joystick..
To use it go to start-> run and type osk


Transform your Windows XP in to Windows 7

If you are using Windows XP and want to experience Windows 7 without installing then here is Seven Remix XP transformation pack to transform Windows XP to Windows 7.With this simple app you can make your XP look like Windows 7 in just few clicks. It supports Windows XP, Windows 2003, Windows Media Center Edition and some other flavors of XP. Will work with only 32 bit edition of Windows.
Just download it and install .
click here to Download Seven Remix XP and transform your windows xp .

 

Wednesday, 23 November 2011

Hacking on XP part 2

How to Telnet with Windows XP
The queen of hacker commands is telnet. To get Windows help for
telnet, in the cmd.exe window give the command:
C:\>telnet /?
Here's what you will get:
telnet [-a][-e escape char][-f log file][-l user][-t term][host
[port]]
-a Attempt automatic logon. Same as -l option except uses
the currently logged on user's name.
-e Escape character to enter telnet client prompt.
-f File name for client side logging
-l Specifies the user name to log in with on the remote system.
Requires that the remote system support the TELNET ENVIRON
option.
-t Specifies terminal type.
Supported term types are vt100, vt52, ansi and vtnt only.
host Specifies the hostname or IP address of the remote computer
to connect to.
port Specifies a port number or service name.
****************
Newbie note: what is a port on a computer? A computer port is sort of like a seaport. It's where things can go in and/or out of a computer. Some ports are easy to understand, like keyboard, monitor, printer and modem. Other ports are virtual, meaning that they are created by software. When that modem port of yours (or LAN or ISDN or DSL) is connected to the Internet, your computer has the ability to open or close any of over 65,000 different virtual ports, and has the ability to connect to any of these on another computer - if it is running that port, and if a firewall doesn?t block it.
****************
****************
Newbie note: How do you address a computer over the Internet? There are two ways: by number or by name.
****************
The simplest use of telnet is to log into a remote computer. Give the
command:
C:/>telnet targetcomputer.com (substituting the name of the computer you want to telnet into for targetcomputer.com)
If this computer is set up to let people log into accounts, you may
get the message:
login:
Type your user name here, making sure to be exact. You can't swap between lower case and capital letters. For example, user name Guest is not the same as guest.
****************
Newbie note: Lots of people email me asking how to learn what their user name and password are. Stop laughing, darn it, they really do. If you don't know your user name and password, that means whoever runs that computer didn't give you an account and doesn't want you to log on.
****************
Then comes the message:
Password:
Again, be exact in typing in your password.
What if this doesn't work?
Every day people write to me complaining they can't telnet. That is
usually because they try to telnet into a computer, or a port on a
computer that is set up to refuse telnet connections. Here's what it
might look like when a computer refuses a telnet connection:
C:\ >telnet 10.0.0.3
Connecting To 10.0.0.3...Could not open connection to the host, on port 23. A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.
Or you might see:
C:\ >telnet techbroker.com
Connecting To techbroker.com...Could not open connection to the host, on port 23.
No connection could be made because the target machine actively
refused it.
If you just give the telnet command without giving a port number, it
will automatically try to connect on port 23, which sometimes runs a
telnet server.
**************
Newbie note: your Windows computer has a telnet client program,
meaning it will let you telnet out of it. However you have to install
a telnet server before anyone can telnet into port 23 on your
computer.
*************
If telnet failed to connect, possibly the computer you were trying to
telnet into was down or just plain no longer in existence. Maybe the
people who run that computer don't want you to telnet into it.
How to Telnet into a Shell Account
Even though you can't telnet into an account inside some computer, often you can get some information back or get that computer to do something interesting for you. Yes, you can get a telnet connection to succeed -without doing anything illegal --against almost any computer, even if you don't have permission to log in. There are many legal things you can do to many randomly chosen computers with telnet. For example:
C:/telnet freeshell.org 22
SSH-1.99-OpenSSH_3.4p1
That tells us the target computer is running an SSH server, which enables encrypted connections between computers. If you want to SSH into an account there, you can get a shell account for free at
<http://freeshell.org/> . You can get a free SSH client program from
<http://winfiles.com/> .
One reason most hackers have shell accounts on Internet servers is because you can meet the real hackers there. When you've logged in, give the command w or who. That gives a list of user names. You can talk to other users with tht talk command. Another fun thing, if your shell account allows it, is to give the command
ps -auxww
It might tell you what commands and processes other users are running. Ask other users what they are doing and they might teach you something. Just be careful not to be a pest!
***************
You can get punched in the nose warning: Your online provider might kick you off for making telnet probes of other computers. The solution is to get a local online provider and make friends with the people who run it, and convince them you are just doing harmless, legal explorations.
*************
Sometimes a port is running an interesting program, but a firewall won't let you in. For example, 10.0.0.3, a computer on my local area network, runs an email sending program, (sendmail working together with Postfix, and using Kmail to compose emails). I can use it from an account inside 10.0.0.3 to send emails with headers that hide from where I send things.
If I try to telnet to this email program from outside this computer,
here's what happens:
C:\>telnet 10.0.0.3 25
Connecting To 10.0.0.3...Could not open connection to the host, on
port 25.
No connection could be made because the target machine actively
refused it.
However, if I log into an account on 10.0.0.3 and then telnet from
inside to port 25, here's what I get:
Last login: Fri Oct 18 13:56:58 2002 from 10.0.0.1
Have a lot of fun...
cmeinel@test-box:~> telnet localhost 25
Trying ::1...
telnet: connect to address ::1: Connection refused
Trying 127.0.0.1... [Carolyn's note: 127.0.0.1 is the numerical
address meaning localhost, the same computer you are logged into]
Connected to localhost.
Escape character is '^]'.
220 test-box.local ESMTP Postfix
The reason I keep this port 25 hidden behind a firewall is to keep
people from using it to try to break in or to forge email. Now the
ubergeniuses reading this will start to make fun of me because no
Internet address that begins with 10. is reachable from the Internet.
However, sometimes I place this "test-box" computer online with a
static Internet address, meaning whenever it is on the Internet, it
always has the same numerical address. I'm not going to tell you what its Internet address is because I don't want anyone messing with it. I just want to mess with other people's computers with it, muhahaha. That's also why I always keep my Internet address from showing up in the headers of my emails.
***************
Newbie note: What is all this about headers? It's stuff at the
beginning of an email that may - or may not - tell you a lot about
where it came from and when. To see full headers, in Outlook click
view -> full headers. In Eudora, click the "Blah blah blah" icon.
****************
Click here to see Hack on XP part 1

Tuesday, 22 November 2011

Hacking on XP part 1

Part I: The Magic of DOS
In this guide you will learn how to telnet <beginninea.shtml>, forge email, <beginnineb.shtml> use
nslookup <beginninec.shtml> and netcat <beginnined.shtml> with Windows XP.
So you have the newest, glitziest, "Fisher Price" version of Windows: XP. How can you use XP in a way that sets you apart from the boring millions of ordinary users?
****************
Luser Alert: Anyone who thinks this GTMHH will reveal how to blow up people's TV sets and steal Sandra Bullock's email is going to find out that I won't tell them how.
****************
The key to doing amazing things with XP is as simple as D O S. Yes, that's right, DOS as in MS-DOS, as in MicroSoft Disk Operating System. Windows XP (as well as NT and 2000) comes with two versions of DOS. Command.com is an old DOS version. Various versions of command.com come with Windows 95, 98, SE, ME, Window 3, and DOS only operating systems.
The other DOS, which comes only with the XP, 2000 and NT operating systems, is cmd.exe. Usually cmd.exe is better than command.com because it is easier to use, has more commands, and in some ways resembles the bash shell in Linux and other Unix-type operating systems. For example, you can repeat a command by using the up arrow until you back up to the desired command. Unlike bash, however, your DOS command history is erased whenever you shut down cmd.exe. The reason XP has both versions of DOS is that sometimes a program that won?t run right in cmd.exe will work in command.com
****************
Flame Alert: Some readers are throwing fits because I dared to compare DOS to bash. I can compare cmd.exe to bash if I want to. Nanny nanny nah nah.
****************
DOS is your number one Windows gateway to the Internet, and the open sesame to local area networks. From DOS, without needing to download a single hacker program, you can do amazingly sophisticated explorations and even break into poorly defended computers.
****************
You can go to jail warning: Breaking into computers is against the law if you do not have permission to do so from the owner of that computer. For example, if your friend gives you permission to break into her Hotmail account, that won't protect you because Microsoft owns Hotmail and they will never give you permission.
****************
****************
You can get expelled warning: Some kids have been kicked out of school just for bringing up a DOS prompt on a computer. Be sure to get a teacher's WRITTEN permission before demonstrating that you can hack on a school computer.
****************
So how do you turn on DOS?
Click All Programs -> Accessories -> Command Prompt
That runs cmd.exe. You should see a black screen with white text on it, saying something like this:

       





Your first step is to find out what commands you can run in DOS. If you type "help" at the DOS prompt, it gives you a long list of commands. However, this list leaves out all the commands hackers love to use. Here are some of those left out hacker commands.
TCP/IP commands:
telnet
netstat
nslookup
tracert
ping
ftp
NetBIOS commands (just some examples):
nbtstat
net use
net view
net localgroup
TCP/IP stands for transmission control protocol/Internet protocol. As you can guess by the name, TCP/IP is the protocol under which the Internet runs. along with user datagram protocol (UDP). So when you are connected to the Internet, you can try these commands against other Internet computers. Most local area networks also use TCP/IP.
NetBIOS (Net Basic Input/Output System) protocol is another way to communicate between computers. This is often used by Windows computers, and by Unix/Linux type computers running Samba. You can often use NetBIOS commands over the Internet (being carried inside of, so to speak, TCP/IP). In many cases, however, NetBIOS commands will be blocked by firewalls. Also, not many Internet computers run NetBIOS because it is so easy to break in using them. We will cover NetBIOS commands in the next Guide to XP Hacking.

Monday, 7 November 2011

Windows Xp Tips 'n' Tricks


Please note that some of these tips require you to use a Registry Editor (regedit.exe), which could render your system unusable. Thus, none of these tips are supported in any way: Use them at your own risk. Also note that most of these tips will require you to be logged on with Administrative rights.

Unlocking WinXP's setupp.ini
============================


WinXP's setupp.ini controls how the CD acts. IE is it an OEM version or retail? First, find your setupp.ini file in the i386 directory on your WinXP CD. Open it up, it'll look something like this:

ExtraData=707A667567736F696F697911AE7E05
Pid=55034000

The Pid value is what we're interested in. What's there now looks like a standard default. There are special numbers that determine if it's a retail, oem, or volume license edition. First, we break down that number into two parts. The first five digits determines how the CD will behave, ie is it a retail cd that lets you clean install or upgrade, or an oem cd that only lets you perform a clean install? The last three digits determines what CD key it will accept. You are able to mix and match these values. For example you could make a WinXP cd that acted like a retail cd, yet accepted OEM keys.

Now, for the actual values. Remember the first and last values are interchangable, but usually you'd keep them as a pair:

Retail = 51882 335
Volume License = 51883 270
OEM = 82503 OEM

So if you wanted a retail CD that took retail keys, the last line of your setupp.ini file would read:

Pid=51882335

And if you wanted a retail CD that took OEM keys, you'd use:

Pid=51882OEM



How do I get the "Administrator" name on Welcome Screen?
========================================================

To get Admin account on the "Welcome Screen" as well as the other usernames, make sure that there are no accounts logged in.

Press "ctrl-alt-del" twice and you should be able to login as administrator!

finally worked for me after i found out that all accounts have to be logged out first



Fix Movie Inteferance in AVI files
==================================

If you have any AVI files that you saved in Windows 9x, which have interference when opened in Windows XP, there is an easy fix to get rid of the interference:

Open Windows Movie Maker.
Click View and then click Options.
Click in the box to remove the check mark beside Automatically create clips.

Now, import the movie file that has interference and drag it onto the timeline. Then save the movie, and during the rerendering, the interference will be removed.



Create a Password Reset Disk
============================

If you’re running Windows XP Professional as a local user in a workgroup environment, you can create a password reset disk to log onto your computer when you forget your password. To create the disk:

Click Start, click Control Panel, and then click User Accounts.
Click your account name.
Under Related Tasks, click Prevent a forgotten password.

Follow the directions in the Forgotten Password Wizard to create a password reset disk.

Store the disk in a secure location, because anyone using it can access your local user account



Change Web Page Font Size on the Fly
====================================

If your mouse contains a wheel for scrolling, you can change font size on the fly when viewing a Web page. To do so:

Press and hold Ctrl. Scroll down (or towards yourself) to enlarge the font size. Scroll up (or away from yourself) to reduce the font size.

You might find it useful to reduce font size when printing a Web page, so that you can fit more content on the page.


WinXP Clear Page file on shutdown
=================================

WINXPCPS.REG (WinXP Clear Page file on shutdown)

This Registration (.REG) file clears the Page file when you power off the computer.
Restart Windows for these changes to take effect!
ALWAYS BACKUP YOUR SYSTEM BEFORE MAKING ANY CHANGES!

Browse to: HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ Control \ Session Manager \ Memory Management

and add the DWORD variable "ClearPageFileAtShutdown"=dword:00000001

You can also do this without reg hacking.
Go to Control panel Administartative tools, local security policy. then goto local policies ---> security options.
Then change the option for "Shutdown: Clear Virtual Memory Pagefile"


Group Policy for Windows XP
===========================

One of the most full featured Windows XP configuration tools available is hidden right there in your system, but most people don't even know it exists. It's called the Local Group Policy Editor, or gpedit for short. To invoke this editor, select Start and then Run, then type the following:

gpedit.msc

After you hit ENTER, you'll be greeted by gpedit, which lets you modify virtually every feature in Windows XP without having to resort to regedit. Dig around and enjoy!


Forgetting What Your Files Are?
===============================

This procedure works under NTFS.

As times goes along you have a lot files on your computer. You are going to forget what they are. Well here is way to identify them as you scroll through Windows Explorer in the future.

This procedure works under NTFS.

1.. Open up a folder on your system that you want to keep track of the different files you might one to identify in the future.

2.. Under View make certain that you set it to the Details.

3.. Highlight the file you want to keep more information on. Right click the file and you will get a pop up menu. Click on properties.

4.. Click on the Summary Tab (make sure it says simple not advanced on the button in the box), You should now get the following fields,

Title,Subject, Author, Category, Keywords, Comments

You will see advanced also if you have changed it to simple, Here will be other fields you can fill in.

5.. Next you can fill in what ever field you want.

6.. After you finished click the apply button then OK.

7.. Next right click the bar above your files, under the address barand you should get a drop down menu. Here you can click the fields you want to display.

8.. You should now see a list with the new fields and any comments you have done.

9.. Now if you want to sort these just right click a blank spot and then you sort the information to your liking.


Temporarily Assign Yourself Administrative Permissions
======================================================

Many programs require you to have Administrative permissions to be able to install them. Here is an easy way to temporarily assign yourself Administrative permissions while you remain logged in as a normal user.

Hold down the Shift key as you right-click on the program’s setup file.

Click Run as.

Type in a username and password that have Administrative permissions.

This will also work on applications in the Start menu.


Create a Shortcut to Lock Your Computer
=======================================

Leaving your computer in a hurry but you don’t want to log off? You can double-click a shortcut on your desktop to quickly lock the keyboard and display without using CTRL+ALT+DEL or a screensaver.

To create a shortcut on your desktop to lock your computer:

Right-click the desktop.
Point to New, and then click Shortcut.

The Create Shortcut Wizard opens. In the text box, type the following:
rundll32.exe user32.dll,LockWorkStation

Click Next.

Enter a name for the shortcut. You can call it "Lock Workstation" or choose any name you like.

Click Finish.

You can also change the shortcut's icon (my personal favorite is the padlock icon in shell32.dll).

To change the icon:

Right click the shortcut and then select Properties.
Click the Shortcut tab, and then click the Change Icon button.

In the Look for icons in this file text box, type:
Shell32.dll.

Click OK.

Select one of the icons from the list and then click OK

You could also give it a shortcut keystroke such CTRL+ALT+L. This would save you only one keystroke from the normal command, but it could be more convenient.



Create a Shortcut to Start Remote Desktop
=========================================

Tip: You can add a shortcut to the desktop of your home computer to quickly start Remote Desktop and connect to your office computer.

To create a shortcut icon to start Remote Desktop

Click Start, point to More Programs, point to Accessories, point to Communications, and then click on Remote Desktop Connection.

Click Options.

Configure settings for the connection to your office computer.

Click Save As, and enter a name, such as Office Computer. Click Save.

Open the Remote Desktops folder.

Right-click on the file named Office Computer, and then click Create Shortcut.

Drag the shortcut onto the desktop of your home computer.

To start Remote Desktop and connect to your office computer, double-click on the shortcut


Instantly Activate a Screensaver
================================

Turn on a screensaver without having to wait by adding a shortcut to your desktop:

Click the Start button, and then click Search.
In the Search Companion window, click All file types.

In the file name box, type *.scr

In the Look in box, choose Local Hard Drives (C or the drive where you have system files stored on your computer.

Click Search.

You will see a list of screensavers in the results. Pick a screensaver you want. You can preview it by double-clicking it.

Right click on the file, choose Send To, and then click Desktop (create shortcut).

To activate the screensaver, double-click the icon on your desktop


Add a Map Drive Button to the Toolbar
=====================================

Do you want to quickly map a drive, but can’t find the toolbar button? If you map drives often, use one of these options to add a Map Drive button to the folder toolbar.

Option One (Long Term Fix)

Click Start, click My Computer, right-click the toolbar, then unlock the toolbars, if necessary.

Right-click the toolbar again, and then click Customize.

Under Available toolbar buttons, locate Map Drive, and drag it into the position you want on the right under Current toolbar buttons.

Click Close, click OK, and then click OK again.

You now have drive mapping buttons on your toolbar, so you can map drives from any folder window. To unmap drives, follow the above procedure, selecting Disconnect under Available toolbar buttons. To quickly map a drive, try this option.

Option Two (Quick Fix)

Click Start, and right-click My Computer.
Click Map Network Drive.

If you place your My Computer icon directly on the desktop, you can make this move in only two clicks!


Software not installing?
========================

If you have a piece of software that refuses to install because it says that you are not running Windows 2000 (such as the Win2K drivers for a Mustek scanner!!) you can simply edit HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows NT/CurrentVersion/ProductName to say Microsoft Windows 2000 instead of XP and it will install. You may also have to edit the version number or build number, depending on how hard the program tries to verify that you are installing on the correct OS. I had to do this for my Mustek 600 CP scanner (compatibility mode didn''t help!!!) and it worked great, so I now have my scanner working with XP (and a tech at Mustek can now eat his words).

BTW, don''t forget to restore any changes you make after you get your software installed

You do this at your own risk.


Use your Windows Key
====================

The Windows logo key, located in the bottom row of most computer keyboards is a little-used treasure. Don''t ignore it. It is the shortcut anchor for the following commands:

Windows: Display the Start menu
Windows + D: Minimize or restore all windows
Windows + E: Display Windows Explorer
Windows + F: Display Search for files
Windows + Ctrl + F: Display Search for computer
Windows + F1: Display Help and Support Center
Windows + R: Display Run dialog box
Windows + break: Display System Properties dialog box
Windows + shift + M: Undo minimize all windows
Windows + L: Lock the workstation
Windows + U: Open Utility Manager
Windows + Q: Quick switching of users (Powertoys only)
Windows + Q: Hold Windows Key, then tap Q to scroll thru the different users on your pc



Change your cd key
==================

You don't need to re-install if you want to try the key out ... just do this:

1. Go to Activate Windows
2. Select the Telephone option
3. Click "Change Product Key"
4. Enter NOT ALLOWED ~ Zabref
5. Click "Update"

Now log off and log back in again. It should now show 60 days left, minus the number of days it had already counted down.

Note: If your crack de-activated REGWIZC.DLL and LICDLL.DLL, you are going to have to re-register them.



Remove the Shared Documents folders from My Computer
====================================================

One of the most annoying things about the new Windows XP user interface is that Microsoft saw fit to provide links to all of the Shared Documents folders on your system, right at the top of the My Computer window. I can't imagine why this would be the default, even in a shared PC environment at home, but what's even more annoying is that you cannot change this behavior through the sh*ll
: Those icons are stuck there and you have to live with it.
Until now, that is.

Simply fire up the Registry Editor and navigate to the following key:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ My Computer \ NameSpace \ DelegateFolders

You'll see a sub-key named {59031a47-3f72-44a7-89c5-5595fe6b30ee}. If you delete this, all of the Shared Documents folders (which are normally under the group called "Other Files Stored on This Computer" will be gone.

You do not need to reboot your system to see the change.


Before: A cluttered mess with icons no one will ever use (especially that orpaned one). After: Simplicity itself, and the way it should be by default.


This tip For older XP builds
===================

Edit or remove the "Comments" link in window title bars

During the Windows XP beta, Microsoft has added a "Comments?" hyperlink to the title bar of each window in the system so that beta testers can more easily send in a problem report about the user interface. But for most of us, this isn't an issue, and the Comments link is simply a visual distraction. And for many programs that alter the title bar, the Comments link renders the Minimize, Maximize, and Close window buttons unusable, so it's actually a problem.
Let's get rid of it. Or, if you're into this kind of thing, you can edit it too.

Open the Registry Editor and navigate to the following keys:
My Computer \ HKEY_CURRENT_USER \ Control Panel \ Desktop \ LameButtonEnabled
My Computer \ HKEY_CURRENT_USER \ Control Panel \ Desktop \ LameButtonText

The first key determines whether the link appears at all; change its value to 0 to turn it off. The second key lets you have a little fun with the hyperlink; you can change the text to anything you'd like, such as "Paul Thurrott" or whatever.

Editing either value requires a restart before the changes take effect.


Before: An unnecessary hyperlink. Have some fun with it! Or just remove it entirely. It's up to you.



Rip high-quality MP3s in Windows Media Player 8
================================================

The relationship between Windows Media Player 8 and the MP3 audio format is widely misunderstood. Basically, WMP8 will be able to playback MP3 files, but encoding (or "ripping" CD audio into MP3 format will require an MP3 plug-in. So during the Windows XP beta, Microsoft is supplying a sample MP3 plug-in for testing purposes, but it's limited to 56 Kbps rips, which is pretty useless. However, if you have an externally installed MP3 codec, you can use WMP8 to rip at higher bit rates. But you'll have to edit the Registry to make this work.
Fire up the Registry Editor and navigate to the following key:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ MediaPlayer \ Settings \ MP3Encoding

Here, you'll see sub-keys for LowRate and LowRateSample, which of course equates to the single 56 Kbps sample rate you see in WMP8. To get better sampling rates, try adding the following keys (Using New then DWORD value):

"LowRate" = DWORD value of 0000dac0
"MediumRate" = DWORD value of 0000fa00
"MediumHighRate" = DWORD value of 0001f400
"HighRate" = DWORD value of 0002ee00

Now, when you launch WMP8 and go into Tools, then Options, then Copy Music, you will have four encoding choices for MP3: 56 Kbps, 64 Kbps, 128 Kbps, and 192 Kbps. Note that you will not get higher bit rate encoding unless you have installed an MP3 codec separately; the version in Windows Media Player 8 is limited to 56 Kbps only.


Find the appropriate location in the Registry... ...add a few DWORD values... ...And then you'll be ripping CDs in higher-quality MP3 format!



Speed up the Start Menu
=======================

The default speed of the Start Menu is pretty slow, but you can fix that by editing a Registry Key. Fire up the Registry Editor and navigate to the following key:
HKEY_CURRENT_USER \ Control Panel \ Desktop \ MenuShowDelay

By default, the value is 400. Change this to a smaller value, such as 0, to speed it up.



Speed up the Start Menu (Part two)
==================================

If your confounded by the slow speed of the Start Menu, even after using the tip above, then you might try the following: Navigate to Display Properties then Appearance then Advanced and turn off the option titled Show menu shadow . You will get much better overall performance.



Speed up Internet Explorer 6 Favorites
======================================

For some reason, the Favorites menu in IE 6 seems to slow down dramatically sometimes--I've noticed this happens when you install Tweak UI 1.33, for example, and when you use the preview tip to speed up the Start menu. But here's a fix for the problem that does work, though it's unclear why:
Just open a command line window (Start button -> Run -> cmd) and type sfc, then hit ENTER. This command line runs the System File Checker, which performs a number of services, all of which are completely unrelated to IE 6. But there you go: It works.


Do an unattended installation
=============================

The Windows XP Setup routine is much nicer than that in Windows 2000 or Windows Me, but it's still an hour-long process that forces you to sit in front of your computer for an hour, answering dialog boxes and typing in product keys. But Windows XP picks up one of the more useful features from Windows 2000, the ability to do an unattended installation, so you can simply prepare a script that will answer all those dialogs for you and let you spend some quality time with your family.
I've written about Windows 2000 unattended installations and the process is pretty much identical on Windows XP, so please read that article carefully before proceeding. And you need to be aware that this feature is designed for a standalone Windows XP system: If you want to dual-boot Windows XP with another OS, you're going to have to go through the interactive Setup just like everyone else: An unattended install will wipe out your hard drive and install only Windows XP, usually.

To perform an unattended installation, you just need to work with the Setup Manager, which is located on the Windows XP CD-ROM in D:\SupportTools\DEPLOY.CAB by default: Extract the contents of this file and you'll find a number of useful tools and help files; the one we're interested in is named setupmgr.exe. This is a very simple wizard application that will walk you through the process of creating an answer file called winnt.sif that can be used to guide Windows XP Setup through the unattended installation.

One final tip: There's one thing that Setup Manager doesn't add: Your product key. However, you can add this to the unattend.txt file manually. Simply open the file in Notepad and add the following line under the [UserData] section:

ProductID=RK7J8-2PGYQ-P47VV-V6PMB-F6XPQ

(This is a 60 day cd key)

Then, just copy winnt.sif to a floppy, put your Windows XP CD-ROM in the CD drive, and reboot: When the CD auto-boots, it will look for the unattend.txt file in A: automatically, and use it to answer the Setup questions if it's there.

Finally, please remember that this will wipe out your system! Back up first, and spend some time with the help files in DEPLOY.CAB before proceeding.


For Older builds or not using setupreg.hiv file
===============================================

Remove the Desktop version text

During the Windows XP beta, you will see text in the lower right corner of the screen that says Windows XP Professional, Evaluation Copy. Build 2462 or similar. A lot of people would like to remove this text for some reason, and while it's possible to do so, the cure is more damaging than the problem, in my opinion. So the following step will remove this text, but you'll lose a lot of the nice graphical effects that come in Windows XP, such as the see-through icon text.

To remove the desktop version text, open Display Properties (right-click the desktop, then choose Properties) and navigate to the Desktop page. Click Customize Desktop and then choose the Web page in the resulting dialog. On this page, check the option titled Lock desktop items. Click OK to close the dialog, and then OK to close Display Properties. The text disappears. But now the rest of your system is really ugly. You can reverse the process by unchecking Lock desktop items.

There's also a shortcut for this process: Just right-click the desktop and choose Arrange by then Lock Web Icons on the Desktop.


--------------------------------------------------------------------------------
Enable ClearType on the Welcome Screen!
=======================================

As laptop users and other LCD owners are quickly realizing, Microsoft's ClearType technology in Windows XP really makes a big difference for readability. But the this feature is enabled on a per-user basis in Windows XP, so you can't see the effect on the Welcome screen; it only appears after you logon.

But you can fix that. Fire up the Registry Editor and look for the following keys:

(default user) HKEY_USERS \ .Default \ Control Panel \ Desktop \ FontSmoothing (String Value)
HKEY_USERS \ .Default \ Control Panel \ Desktop \ FontSmoothingType (Hexadecimal DWORD Value)

Make sure both of these values are set to 2 and you'll have ClearType enabled on the Welcome screen and on each new user by default.



Stop Windows Messenger from Auto-Starting
=========================================

If you're not a big fan of Windows Messenger simply delete the following Registry Key:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS


Display Hibernate Option on the Shut Down dialog
================================================

For some reason, Hibernate may not be available from the default Shut Down dialog. But you can enable it simply enough, by holding down the SHIFT key while the dialog is visible. Now you see it, now you don't!


Add album art to any music folder
=================================

One of the coolest new features in Windows XP is its album thumbnail generator, which automatically places the appropriate album cover art on the folder to which you are copying music (generally in WMA format). But what about those people that have already copied their CDs to the hard drive using MP3 format? You can download album cover art from sites such as cdnow.com or amguide.com, and then use the new Windows XP folder customize feature to display the proper image for each folder. But this takes time--you have to manually edit the folder properties for every single folder--and you will lose customizations if you have to reinstall the OS. There's an excellent fix, however.

When you download the album cover art from the Web, just save the images as folder.jpg each time and place them in the appropriate folder. Then, Windows XP will automatically use that image as the thumbnail for that folder and, best of all, will use that image in Windows Media Player for Windows XP (MPXP) if you choose to display album cover art instead of a visualization. And the folder customization is automatic, so it survives an OS reinstallation as well. Your music folders never looked so good!


Album cover art makes music folder thumbnails look better than ever!


Change the location of the My Music or My Pictures folders
==========================================================

In Windows 2000, Microsoft added the ability to right-click the My Documents folder and choose a new location for that folder in the sh*ll
. With Windows XP, Microsoft has elevated the My Music and My Pictures folders to the same "special sh*ll
folder" status of My Documents, but they never added a similar (and simple) method for changing those folder's locations. However, it is actually pretty easy to change the location of these folders, using the following method.

Open a My Computer window and navigate to the location where you'd like My Music (or My Pictures) to reside. Then, open the My Documents folder in a different window. Drag the My Music (or My Pictures) folder to the other window, and Windows XP will update all of the references to that folder to the new location, including the Start menu.

Or use Tweak UI


Add/Remove optional features of Windows XP
==========================================

To dramatically expand the list of applications you can remove from Windows XP after installation, navigate to C:\WINDOWS\inf (substituting the correct drive letter for your version of Windows) and open the sysoc.inf file. Under Windows XP Professional Edition RC1, this file will resemble the following by default:

[Version] Signature = "$Windows NT$"
DriverVer=06/26/2001,5.1.2505.0

[Components]
NtComponents=ntoc.dll,NtOcSetupProc,,4
WBEM=ocgen.dll,OcEntry,wbemoc.inf,hide,7
Display=desk.cpl,DisplayOcSetupProc,,7
Fax=fxsocm.dll,FaxOcmSetupProc,fxsocm.inf,,7
NetOC=netoc.dll,NetOcSetupProc,netoc.inf,,7
iis=iis.dll,OcEntry,iis.inf,,7
com=comsetup.dll,OcEntry,comnt5.inf,hide,7
dtc=msdtcstp.dll,OcEntry,dtcnt5.inf,hide,7
IndexSrv_System = setupqry.dll,IndexSrv,setupqry.inf,,7
TerminalServer=TsOc.dll, HydraOc, TsOc.inf,hide,2
msmq=msmqocm.dll,MsmqOcm,msmqocm.inf,,6
ims=imsinsnt.dll,OcEntry,ims.inf,,7
fp_extensions=fp40ext.dll,FrontPage4Extensions,fp40ext.inf,,7
AutoUpdate=ocgen.dll,OcEntry,au.inf,hide,7
msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7
msnexplr=ocmsn.dll,OcEntry,msnmsn.inf,,7
smarttgs=ocgen.dll,OcEntry,msnsl.inf,,7
RootAutoUpdate=ocgen.dll,OcEntry,rootau.inf,,7
Games=ocgen.dll,OcEntry,games.inf,,7
AccessUtil=ocgen.dll,OcEntry,accessor.inf,,7
CommApps=ocgen.dll,OcEntry,communic.inf,HIDE,7
MultiM=ocgen.dll,OcEntry,multimed.inf,HIDE,7
AccessOpt=ocgen.dll,OcEntry,optional.inf,HIDE,7
Pinball=ocgen.dll,OcEntry,pinball.inf,HIDE,7
MSWordPad=ocgen.dll,OcEntry,wordpad.inf,HIDE,7
ZoneGames=zoneoc.dll,ZoneSetupProc,igames.inf,,7

[Global]
WindowTitle=%WindowTitle%
WindowTitle.StandAlone="*"

The entries that include the text hide or HIDE will not show up in Add/Remove Windows Components by default. To fix this, do a global search and replace for ,hide and change each instance of this to , (a comma). Then, save the file, relaunch Add/Remove Windows Components, and tweak the installed applications to your heart's content.


Cool, eh? There are even more new options now under "Accessories and Utilities" too.


Remove Windows Messenger
========================

It seems that a lot of people are interested in removing Windows Messenger for some reason, though I strongly recommend against this: In Windows XP, Windows Messenger will be the hub of your connection to the .NET world, and now that this feature is part of Windows, I think we're going to see a lot of .NET Passport-enabled Web sites appearing as well. But if you can't stand the little app, there are a couple of ways to get rid of it, and ensure that it doesn't pop up every time you boot into XP. The best way simply utilizes the previous tip:

If you'd like Windows Messenger to show up in the list of programs you can add and remove from Windows, navigate to C:\WINDOWS\inf (substituting the correct drive letter for your version of Windows) and open sysoc.inf (see the previous tip for more information about this file). You'll see a line that reads:

msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7

Change this to the following and Windows Messenger will appear in Add or Remove Programs, then Add/Remove Windows Components, then , and you can remove it for good:

msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,7

Related Posts Plugin for WordPress, Blogger...