19 Mei, 2007

If a Device Doesn’t Work, Try Updating Its Driver

0 komentar

When installing a new device, and it doesn’t work, don’t automatically assume that the device is defective. The problem is more likely to be a driver issue, especially if you are running a different Windows version than the driver was specifically written for.

Visit the device manufacturer’s Web site and download any updated drivers or patches and install them. Only after you have installed the most recent driver and software versions should you seriously suspect a physical problem with the hardware.

If you can’t make a new device work, don’t be shy about calling the toll-free support line for the hardware manufacturer. Their telephone support technicians will be aware of any late-breaking issues with the device, and if they can’t help you make it work they can direct you to the Returns department.

Use MSCONFIG To Turn Off Drivers and Applications that Load at Startup

0 komentar

If you are able to identify the driver or application that’s causing a startup problem, the obvious solution is to remove it or turn it off. Unfortunately, it is not always obvious how to do that. Programs that load at startup can be called from Win.ini, from the Startup program group, or directly from the Registry itself; drivers that load are called from the device’s properties in the Registry, and it’s not easy or safe for a beginning technician to edit the Registry directly.

For example, suppose a user had a scanner with a driver that loaded at startup, but then he removed the scanner and its software. However, for some reason the Registry never got the message and still tries to load the scanner driver at startup. You could look in the Startup folder on the Start menu, and if a utility for the scanner appears there, remove it. You could also look in Add/Remove Programs to see whether the driver can be uninstalled that way. But failing those two, the only thing left to do is edit the Registry to get rid of it.

Most versions of Windows come with a utility called the System Configuration Utility, also known by the name of the executable that starts it: MSCONFIG. This is a handy, safer way of editing the startup options in the Registry; you can turn individual items on or off freely, trying various combinations until you narrow down the problem.

To run it use Start/Run and type MSCONFIG. You can access this utility from Safe Mode, so you can use it to troubleshoot problems that prevent Windows from starting normally as well.

Each of the tabs enables you to deselect individual lines in the startup routine. For example, the Startup tab lists all the programs and utilities that are set to automatically load at startup. You can deselect a line and then try restarting Windows again to see whether that line was the root of the problem. If it wasn’t, come back to MSCONFIG, re-select it, and try deselecting something else.

Try Safe Mode and Step-by-Step Confirmation to Troubleshoot Windows Startup Issues

0 komentar

Suppose you get video, and can get into the BIOS, but Windows won’t start. If it doesn’t even attempt to start — for example, if a hard disk error crops up before you see the Windows splash screen — then you’re probably looking at a hard disk problem. But if the Windows startup process begins and then aborts, a faulty or conflicting device driver is probably the cause. This can occur because of a FAT error, or after upgrading to a new Windows version, after installing a new driver for an existing device, or after installing an entirely new device.

If Windows locks up during startup, the next time you start it, a Windows Startup menu appears offering to allow you to start in Safe Mode. (You can also call up this Windows Startup menu by pressing F8 when you see the message “Starting Windows.”) Safe Mode loads only a minimal set of drivers, so it will probably exclude the driver that is causing you problems and allow Windows to load. If you can get into Windows through Safe Mode but not through a normal boot, it means that the problem is software-related — more specifically, that it’s related to a driver or program that is loading at startup.

The most common driver to cause problems is the video driver. If Windows locks up at the point where the chosen video mode kicks in (that is, after the splash screen but before you see the mouse pointer), an invalid video mode has probably been chosen. Start in Safe Mode and change the video to a relatively conservative setting, such as 256-color 800×600 with Adapter Default for the refresh rate.

In a situation like the one described above — where Windows boots in Safe Mode but not in normal mode — the obvious solution is to find the item that’s causing the problem and eliminate it. This is often easier said than done, however.

One effective way of doing it is to use the Step-by-step Confirmation option on the Windows Startup menu. Press F8 as the PC is booting to display it; if you see the splash screen, you’ve missed the F8 opportunity; reboot and try again. From that Startup menu, choose Step-by-step Conformation. Then press the Y key to step through each line of the startup. When the line executes that is causing the problem, the PC will lock up, and all you have to do is look at the last text that appeared on the screen to see which driver or program did it.

This doesn’t always work because sometimes an item that’s causing a problem will not have its own separate step in Step-by-step Confirmation. However, it can catch many driver-related errors.

Proxifier v2.6

0 komentar

Image Hosted by ImageShack.us

Bypass firewall, tunnel connections through HTTP and SOCKS proxy servers.Work in school to bypass damn firewalls too

http://rapidshare.com/files/32019580/Proxifierv2.6.zip

Personal PC Spy v1.8

0 komentar

Image Hosted by ImageShack.us

Personal PC Spy is the most powerful stealth keylogger software. Personal PC Spy runs silently at the lowest level of windows capturing every keystroke typed including usernames and windows log-on passwords. Personal PC Spy can also capture active window text, text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN AND AIM. All Desktop activity will be recorded through Personal PC Spy's secret! Personal PC Spy can capture websites which can be visited on your computer, keylogger can capture all text sent to clipboard and record more computer activity . Have reports sent to your email address at anytime secretly! Personal PC Spy is so stealth and hides so well not even a computer technician with years of experience could detect it running! The most powerful stealth program at the most affordable price! Easy to use stealth solution for PC and Internet surveillance. Purchase your copy today and feel safe and secure that if you can detect it running once placed it stealth mode.

Personal PC Spy Features:
Completely invisible and undetectable in Windows - Configure Keylogger to hide during monitoring sessions and impossible to detect. Keylogger will not be listed in the task manager and also gives you the option to remove it from the uninstall list.

Windows Startup - Keylogger can be configured to load on windows startup, or not.

E-mail Log Delivery - Keylogger can deliver reports of recorded activity secretly at set intervals. All logs can be sent by email secretly for you to read at anytime.

Keystrokes Capture - Keylogger can record all keystrokes typed in any application window, such as user name, password, e-mail, chat, instant message (MSN/AOL/ICQ/AIM ), etc. The records are time stamped and categorized by the window title they belong to, so you can tell when and what do*****ents were being typed.

Application Monitoring - Keylogger can record all applications ran and the text typed in these applications.

Website Capture - Keylogger will record and time stamp all websites visited. If a user is surfing inappropriate content on your computer or business computers, Personal PC Spy will record this content. You may re-visit all websites directly inside the Keylogger log viewer.

ScreenShots Capture - Keylogger can take picture of the Windows Desktop just like a automatic surveillance camera! It will capture images at set intervals. You have the option of taking pictures of the entire screen or just of active window, and saving the pictures in high quality or low quality JPEG format. Keylogger will also log the active window name and the time stamp when the screen shot was taken.

Automatic Log Clearing - Keylogger can be configured to clear all logs at set intervals as an added security measure. You may also clear logs at anytime and completely remove them from your computer!

Log Exporting - Keylogger recorded logs into an easy to read html do*****ent for later viewing or record keeping. The log files are stored by date and time enabling to go find the information you need quickly.

Startup Alert - Would you like to inform the user they are being monitored? Personal PC Spy offers you the ability display a custom message informing the user they are being monitored.

Download:

http://rapidshare.com/files/31847605/Personal_PC_Spy_v1.8.rar

Start Menu Add-on: Start++

0 komentar

Every Windows power user knows the command line is “the place” to get serious work done. The new Start Menu search box in Windows Vista opens the door to a whole new level of command line possibilities. One utility called Start++ extends the Start Menu search box to add even more features allowing you to use shortcuts to launch web sites and processes.

Would you like to search Google from your start menu search box? Just type g followed by your query such as “g tweak vista”. How about doing a quick search on Wikipedia? Type w and your query in the search box. The possibilities are endless because you can create custom shortcuts just like the examples above.

On top of web shortcuts, you can also create application links that will launch an app and open a file. Almost anything is possible with a little customization of the Start++ utility shown below.

Download Start Menu Add-on: Start++

Learning Linux Commands

0 komentar

If you are a complete newbie to Linux, or if you “know enough to be dangerous,” then here are some pointers that may help.

One of the great things about Linux is that, even though the operating system is extensible through the addition of arbitrary commands, there are standards for documenting such commands. Because of these standards, not only is it easy to find out what a command does and how it works, but it’s easy to find out that these commands exist in the first place, even if you don’t know their names.

Commands About Commands:

- man — Display the manual for a command
- whatis — Display a summary of a command (rather than the entire manual)
- apropos — Display a list of commands that pertain to (are apropos to) a keyword
- whereis — Display information about the location of a command: the executable, the source code (if any), and the man pages.
- which — Display which version of a command will execute (for when there are two, or more, commands with the same name installed on the system).

MAN — In previous tips, we mentioned the MAN command. MAN stands for manual. It is the main resource for displaying the documentation (a.k.a. “man pages”) for any particular command. For example, to find out how the LS command works, you would enter

man ls

The man command brings up the first page of the manual, and then waits for navigation keystrokes. The three most commonly used navigation controls are PageUp, PageDown and the letter q (quit). Of course, man has its own man pages.

man man

WHATIS — The whatis command is actually an alias for using the man command with the -f switch (and -f is shorthand for –whatis). So, all of the following are equivalent.

whatis ls
man -f ls
man –whatis ls

Hackers Target QuickTime and WinZip

0 komentar

Although it seem unlikely virus writers and hackers are going to give up looking for and attempting to exploit loopholes in Microsoft products, it seems some of them may be turning their attention to other popular applications. According to security experts at Symantec the defences on one of its PC’s, used as bait to attract and trap virus writers, was breached through known vulnerabilities in Apple QuickTime and WinZip.

These popular applications are installed on a very high proportion of PCs, and although the security holes have been known about for some time, it wasn’t thought they were being actively exploited. The attacks were carried out through dodgy websites, designed to resemble trusted bank and credit card sites. PC users are being lured onto them through links in Spam messages The sites were laced with a range of malicious hacking tools and unsuspecting. Patches and fixes for these problems are available and users are advised to make sure their software is kept up to date.

18 Mei, 2007

IE7 Update Doesn’t Work For Some PCs

0 komentar

Some users aren’t able to use Internet Explorer 7 (IE7) after installing this month’s six-bug patch, the Microsoft Corp. security team acknowledged late Wednesday as it published a work-around for the problem.

“The issue here is that after applying the update, these users may then see the ‘File Download Security Warning’ dialog box raised when starting IE,” said Christopher Budd, a program manager with the Microsoft Security Response Team in a blog post. “After you close the dialog, you then cannot start IE.”

According to Budd, the dialog box appears only on machines where the Temporary Internet Files directory, which is used as IE’s cache folder, has been moved. IE will not have the proper access rights to the folder in its new location and so will throw up the warning and refuse to run.

Although the IE team said it’s looking into the behavior, the MSRC has generated a support document with two work-arounds that users can apply to fix the problem. The first work-around is to simply return the cache folder to its previous, default location; the second is to grant the required permissions to the folder in its new location.

Windows Vista 20 E-Books

0 komentar

1. Cleaning Windows Vista For Dummies by Allen Wyatt
2. Windows Vista For Dummies by Andy Rathbone
3. Windows Vista Just the Steps For Dummies by Nancy C. Muir
4. Windows Vista For Dummies Quick Reference by Greg PhD Harvey
5. Windows Vista Secrets by Brian Livingston
6. Windows Vista Inside Out by Ed Bott
7. Microsoft Windows Vista: Visual QuickStart Guide by Chris Fehily
8. Windows Vista: The Missing Manual by David Pogue
9. Windows Vista for Starters: The Missing Manual by David Pogue
10. Introducing Microsoft Windows Vista by William R. Stanek
11. Windows Vista: The Definitive Guide by William Stanek
12. Windows Vista(TM) Plain & Simple (Bpg-Plain & Simple) by Jerry Joyce
13. Microsoft Windows Vista Step by Step by Joan Preppernau
14. Breakthrough Windows Vista(TM): Find Your Favorite Features and Discover the Possibilities by Joli Ballew & S. E. Slack
15. Windows Vista(TM) Administrator's Pocket Consultant (Pro - Administrator's Pocket Consultant) by William R. Stanek
16. Alan Simpson's Windows Vista Bible by Alan Simpson
17. Administering Windows Vista Security: The Big Surprises
18. Sybex Mastering Microsoft Windows Vista Home Premium and Basic
19. Wiley Alan Simpsons Windows Vista Bible Desktop Edition
20. Wiley Windows Vista The Express Line to Learning

Download :

http://www.megaupload.com/?d=8DIZDRVY
http://www.megaupload.com/?d=9GMSU5RL
http://www.megaupload.com/?d=EOGBANHX
http://www.megaupload.com/?d=4DKOK9QY
http://www.megaupload.com/?d=VYLLS8EB
http://www.megaupload.com/?d=91I6IOE0
http://www.megaupload.com/?d=OR7GR87S

Windows Genuine Advantage Validation v1.7.36.0

Image Hosted by ImageShack.us

Crack your Windows Genuine Advantage Validation v1.7.36.0

Download :
http://www.badongo.com/file/3097490

17 Mei, 2007

Yahoo Widgets Portable with unlimited sms sending

0 komentar

Free Image Hosting at ImageShack.us

with unlimited sms sending worldwide

Free Image Hosting at ImageShack.us

Download :
http://rapidshare.com/files/31273614/Widgets_Portable.exe

Vista Lite 0.5 - Remove Unwanted components from Windows

0 komentar

Image Hosted by ImageShack.us

Vista Lite 0.5 - Remove Unwanted components from Windows…

Gadgets & Tech – Windows Vista from Microsoft takes a lot of resources, we all know that. So here is the tool for easy removal of unwanted components and bootable ISO creation in order to make Vista run faster and to your liking.
double click on rar file to open password window.

Download :
http://rapidshare.com/files/30695183/vista_Lite.exe

Color your Folder

0 komentar

Image Hosted by ImageShack.us

iColorFolder allows to customize the color of every WindowsXP folder

Organise your files more easily


With iColorFolder, give some color to WindowsXP folders.
With just a right-click, colorize your folders, and discover
a new intuitive way to classify your files. A quick view is
now enough to identify the folder you are looking for !

Classify your folders by Family

You can now classify your folders by Family. Red is an Important
folder, Orange is Urgent, Green is Familial... Choose the attributions
that you like, so you'll never delete an important folder by error.

A fast and light tool

iColorFolder is a very light soft, that doesn't stay in memory. It uses a native
functionnality of WindowsXP to be more efficient. Discover it's simplicity : with a
single right-click on a folder you colorize it ; the necessary and only the necessary. iColorFolder is proudly an Open-Source program.

Fully skinnable

iColorFolder is bundled with three apparences : the default apparence of WindowsXP
folders, a Mac OS X skin and a Snow.E2 skin. If your system is already
customized with shellpacks like WinOSX, you'll keep the same folder apparence. You can find other skins on the Web or even
easily create one yourself.

Some images tells more than a thousand word

You'll find in the Screenshots Section some
images describing iColorFolder and presenting it's functionalities. Try it ! If you
didn't like it, you can uninstall it fully and quickly.

Download :
http://www.badongo.net/file/1914847

Win Disk XP ~ Freeware

0 komentar

Image Hosted by ImageShack.us

WinDiskXP is another powerful product developed
by WEWARE which is designed for making emulate physical disks and emulate
CD on Windows. Based on the vitual driver technology of FileDisk, WinDiskXP
makes encryption disk secure and protect your data from stolen effectively.

WinDiskXP makes an emulate physical disk just as any other disk. You can
use it as usual disk, storing any files (e.g. documents or pictures and
movies),and opening these files directly from the emulate disk. You can
even install application on it.

What is WinDiskXP good for you? It makes emulate disked based on files.All
of your data writen to the emulate disk are storen into the file. So you
can create a emulate disk very conveniently and doesn't need to change your
hard disk partition.

What's more, you can create a encryption emulate disk yourself. When data
are written to the encryption disk, they will automatically be encrypted
and stored on the file. Nobody else can access to the data in encryption
disk without your password

Download :
http://rapidshare.com/files/30720458/WinDiskXP.exe

16 Mei, 2007

How to Upgrade Operating System?

0 komentar

Operating System is essential for a computer to function. The Operating system (for example Windows) get updated very often and newer versions are launched at specified intervals. Windows for instance has many versions from windows 95, 98, ME, NT, 2000 and XP. The latest and widely used version is XP. By upgrading your Windows Operating System to the latest version enables you to use many latest applications. Computer will function more efficiently. For example users of Windows 98 can consider upgrading to Windows XP.

The price of the FULL version of the new OS will be high. But the upgrade version of the new version will be cheaper. You can buy these Upgrade CDs at a cheaper price and upgrade the OS in your computer.

Things to do before Upgrade:

Before you upgrade your OS, find out whether the hardware that you use in your computer will support the new OS. Always, for newer OS versions you will need a computer with higher processing power. Some older hardware devices may not function in the new OS. Even some older applications may not function in the new Operating System.

First take a list of all the hardware connected to your computer. The CPU speed, RAM size, Hard Disk free space are some of the details you need to check and see if these are sufficient for the newer OS. You can find the minimum hardware requirements for the new OS from the vendor’s website.

Generally while upgrading your OS there will not be any problems. However to be on the safe side, take a backup of your important data and copy it into a CD.

Upgrading the OS:

Once you insert the ‘Upgrade CD’ into the CDROM, the upgradation process will start automatically. Now choose ‘Upgrade’ option instead of ‘Fresh Install’ when it prompts.

While upgrading it prompt and ask you regarding the ‘File System’ to choose. It is better to use the same file system as you have been using all along instead of choosing a new file system.

For example, in a Windows 98 Computer, the file system you are using may be FAT16 or FAT32. When you upgrade to Windows XP, it will ask you whether you want to switch to NTFS file system. There is no doubt that the NTFS is a better file system but if you switch to this NTFS then you can never switch back to FAT 16 or FAT32 again. Therefore use the existing file system.

Things to do after upgrading OS:

After the upgrade process is over, check and see every individual application whether it works. If any of them doesn’t work then uninstall the application properly and reinstall them. If you cannot re install then get help from the application vendor’s website.

Also check and see if all the hardware devices function properly. If any of the hardware device does not function after upgrade then install the appropriate driver for the hardware. Get help from the manufacturer’s website.

Some old hardware maynot be supported in the new OS if that is the case then buy and upgrade your hardware device to the latest.

Tutorial to Hide visited websites from others

0 komentar

We search for lots of information on the internet. But it is not necessary that others know about this. Whenever you visit any website this information is captured and stored in your computer in the form of ‘cache’, ‘cookie’, ‘history’, and ‘windows registry’. There is a danger due to this. Whoever uses the same computer after you have used can find out which websites you have been visiting. If you have a personal computer that no one else will ever use, then you don’t have to worry much about this. But if your home or office computer is shared then you better clear this history. In this tutorial let us see how to completely remove the recently visited websites from your computer.

Cache Folder
Every time you visit a website, every browser has the functionality to store the images, websites, urls etc in your hard disk somewhere in the temporary folders. This is useful to save bandwidth. When you visit the same website again, instead of downloading all the images again, the browser will retrieve them from the temporary folders from your hard disks and therefore increasing the speed and saving internet bandwidth. So when you finish browsing you can clear these temporary folders. This temporary folder is usually referred to as Cache. The exact location of this folder will differ based on the browser you are using. For instance if you use Internet explorer then this cache is located in the ‘Temporary Internet Files’ folder under your c:\Windows folder.
You can either delete from this folder or you can delete it from your browser. Goto Tools-> Internet Options. Under the General tab click ‘Delete Files’ button.

History
All the browsers also store the urls of every website you visit. This is used to show the address of the site on the ‘Address Bar’ when you start typing the first few letters of the websited address, the browser will take from the history and prompt you for the full address. This makes your job easier so that you need not type the full address every time. But if you want to hide the sites you visit then you have to remove this history also. Internet explorer stores this history in a folder called ‘History’ under c:\Windows folder.

Or you can delete history from your browser. Goto Tools-> Internet OPtions. Select the ‘General’ tab and click on ‘Clear History’ button. In the confirmation dialog box select ‘OK’. This will clear your history.

Cookies
Whenever you visit websites, some information about you and some information about that website is stored in your computer’s hard disk. When you visit the same site again, the information stored in this cookie file will be read to identify you. This is especially useful for sites that can personlize the site for you and displays messages such as ‘welcome your_name’ etc. But this cookie also stores the name of the site you visit so you should also delete these cookies if you want to hide the sites you visited.

To delete cookies, goto Tools->Internet Options. And click on ‘Delete Cookies’ button. Or you can choose the security tab and click on ‘Custom Level’ button to disable or enable cookies.

Registry
Another place in which the websites you visited are stored is the windows registry. It is not advisible to modify registries if you are not sure how to use them. Only those who are confident and willing to take risk should touch the registry. Click on ‘Start->Run’ and type ‘regedit’ and press enter. The windows registry will open. Now click on ‘Edit->find’ and type ‘URL History’. In the right hand side you can see a list of website addresses that you visited. You can select them one by one and delete them. programs, viruses and hackers.

Facilities of Clipboard in MS Office

0 komentar

MS-Office clipboard is used to copy and past the text, pictures and graphics. The copy of the text or picture is getting stored in clipboard. We can past that in any windows application. When coping any text it will overwrite that previous text. What can we do for copy more than on text in MS-Office? Answer this please.

It’s totally different from clipboard in windows operating system.

In MS-Office all the application software contains office clipboard. We will see the facility in this. If work based on cut, copy, paste command. We can store 24 items in this clipboard. While trying to copy the 25th item in the clipboard it will replace the first item from the clipboard.

Due to the following option the menu will automatically open.

1. When you cut or copy more than 2 items in a program
2. In a same program copy one text and past after that copy a text.
3. When you past the same item twice.

When office clipboard started the icon is displayed in the left side of status bar. To show the number of text you can go to edit menu and active it. In that it shows more facilities. To get that facility put tick mark in the facility.

1. To display the clipboard automatically. (No need to go edit menu)
2. When we press the Ctrl + c twice, it shows clipboard.
3. To get the facility even though it does not display.
4. To display the icon in the task bar.
5. To show the copy clipboard it display the status of copied item.

When we active Office clipboard in on office program it does not show other office program. The items are in office clipboard until the entire office programs are closed. Or we can delete it by clicking delete in the menu. We can delete the item selected from text. We can paste or delete the file by left click the item. If we press delete it will delete the item. If we select the past it will paste the item where the cursor is placed. If we paste all, it will paste all the items to the document.

Now a question arises in your mind. What is the difference between both the clipboards? Lets see the answer. While you pasting the items continuously in office clipboard the last item will store in operating system clipboard. When we delete all files in office clipboard the item in OS clipboard also get erased. When you are using (CTRL + V) and paste command it will paste content from operating system clipboard.

10 Firefox Tricks

0 komentar

i recently wrote about opening a firefox within a firefox. curious about chrome urls i did some reseaerch and came up with a list of 10 urls that will make your browser do some funky things.
chrome://browser/content/browser.xul
Opens another Firefox, inside a tab in the the existing Firefox window.
chrome://browser/content/preferences/preferences.xul
Opens the Options dialog box inside the Firefox tab.
chrome://browser/content/bookmarks/bookmarksPanel.xul
Opens the “Book Marks Manager” inside a tab in the Firefox window
chrome://browser/content/history/history-panel.xul
Opens the History Panel in the Firefox tab
chrome://mozapps/content/extensions/extensions.xul?type=extensions
Opens the Extensions window in the current tab.
chrome://browser/content/preferences/cookies.xul
Opens the “cookies window” inside a tab in the Firefox window.
chrome://browser/content/preferences/sanitize.xul
Opens the “Clear Private Data” window inside the current tab.
chrome://browser/content/aboutDialog.xul
Opens the About Firefox Dialog box inside the Firefox tab.
chrome://browser/content/credits.xhtml
A scrolling list of names.
chrome://global/content/alerts/alert.xul
Dancing Firefox. press ctrl + w to exit

How To Increase Your Internet Speed By 20%

0 komentar

If you use Windows XP Professional then it is possible to squeeze an extra 20% out of your internet connection. By default

Windows XP Pro holds back 20% of your Internet speed for various services like windows update and spyware checks.

If you want to tap into this locked speed then make the following changes:

1. Go to Start-> Run-> and type gpedit.msc
2. Expand the Administrative Templates branch
3. Expand the Network tab
4. Highlight QoS Packet Scheduler
5. Click on Limit Reservable Bandwidth and check the ‘enabled’ box
6. Then Change the Bandwidth limit % to 0 %

Once you’ve done this click apply and restart your PC. After rebooting you should see a noticeable improvement in your net speed.