Saturday, April 5, 2014

Types of Malware to Be Aware Of


Computers, laptops and even smartphones are constantly exposed to different malicious programs aimed at causing various damages to the system. These nasty programs are generically known as malware. Malicious software (or shortly malware) is any type of software which can be harmful for your computer. Let's have a closer look at the most common malware types you should be watchful of.
Bots and Trojans
A Bot (short for Robot) is an automated program which allows your computer to be operated by other users. Generally, this malicious software infects several computers which allows sending a huge amount of spam email messages or executing Denial of Service attacks.
A Trojan (short for Trojan Horse) can be contracted with an email message or a usual file download. This software inserts a so-called backdoor to the system making it accessible to the unauthorized users.
Adware and Spyware
Adware and spyware programs are usually contracted when surfing the Internet. The main aim of adware is to expose Net surfers to commercial ads. For example, adware may cause a browser directing you to websites you did not plan visiting, or may trigger the appearance of pop-up advertisements on your computer. Generally, this malware is not dangerous, but its effects can be quite annoying.
Contrary to adware, spyware can be extremely harmful. This piece of software steals information from your PC and sends it to a third party. Spyware may steal your personal or financial information, passwords, bank account details, fax/telephone numbers, addresses, etc. At the same time it can collect information about your browsing habits. This may be information about the sites you visit or files you download.
Viruses
Viruses are the most common malicious programs which have been around for quite a long period of time. Several decades ago viruses were mainly distributed by means of physical media, like floppy disks. However, in the days of Internet technology viruses are distributed online (via hidden documents or email attachments). At the same time, this type of malware can be contracted anytime you connect any type of physical storage (MP3s, flash memory sticks, etc) to your computer. The effects of catching computer viruses can be different, from minor annoying troubles to the severe damages of files and hardware.
Keyloggers
This type of malicious software is extremely dangerous, as it helps executing the most harmful online activity - identity theft. A keylogger records everything computer owner types on the keyboard. This software allows cybercriminals getting access to passwords, logins, bank account information and codes a computer owner uses to access secure information.
With a wide variety of malicious programs ready to attack your PC, you need to learn how to protect yourself and your computer.
To protect your PC from the intrusion of malware it is necessary having a reliable antiviral program. Visit http://malwarelist.net/ to learn more on different types of computer security software.

What Malware Can Do


If you own a small to medium size business you need to be aware of malware. Also called spyware, malware is a devious software program that covertly installs itself on your computer and then performs secret tasks without your permission or knowledge. Malware and spyware used to secretly observe and log web surfing habits of computer users and spawned other programs such as adware, Trojans and worms. However, malware has evolved to do much more harm than observe your web habits.
Chances are your business uses computers and in turn employees will be on the internet. The web has become integral to how society and business operate today and it is essential to know the dangers that lurk in this Wild West frontier. Malware can invade your computer system a number of ways including emails, game demos, MP3 players and just about anything you download from a web page. Anyone in your office has the ability to unknowingly download a malware program and when this happens you may not know until the damage is done.
Malware can be programmed to do a number of tasks in your operating system but the most common functions include stealing personal information, overloading your browser with pop-up ads, spamming your inbox with advertising mail, slowing down your internet connection and in some cases crashing your system. These are only the basics of a malware program and a more serious hacker can create a program that can use your computer as a cloaked server, essentially making your computer a dummy for their own personal use. From this server they can do any number of illegal activities including credit card fraud, identity theft and broadcasting adult videos. This is a serious issue because when the authorities look for the culprit guess whose computer they are led to... yours.
Banning the use of the internet is not a realistic solution. Without access to the web you are going back to the dark ages and will suffer from lack of information. However, there are programs you can install that will protect your system from malware and also block sites that are known to download such viruses. You also need to make employees aware of guidelines for using the internet.
Opening emails from senders you don't recognize is a big no-no as is visiting sites that are used for gambling, pharmaceuticals and adult entertainment. What employees do on their own time is their business but when on the clock at your company they need to know the damage that can occur from their web browsing habits and that they are liable if found to be the cause of malware infecting your system.

Top 6 Tips to Avoid Identity Theft While Shopping Online

Online shoppers are getting savvy these days and they expect the online shopping experience to be seamless. However, malicious programs that steal your personal information have grown from 1 million in 2007 to about 130 million. On top of that, there are almost 12 million identity fraud victims in the US, annually. How can you avoid being a victim? Keep yourself safe online while shopping by using these 6 tips for avoiding identity theft.
Avoid the Lure
Phishing is a term I'm sure you've heard before, but what does it really mean? Just as a fisherman will bait his hook with a tasty worm, so will cybercriminals bait e-mails with tempting offers in an attempt to have you divulge sensitive information such as usernames, passwords, and credit card details. The "bait" is a malicious link in an e-mail that leads to a spoofed website. Avoid getting caught by not clicking any links in the suspicious e-mail, by not giving out any sensitive information via e-mail, and by looking in the lower left hand corner of most browsers. There you can find a preview of where the link will take you.
Get Protection for Your Computer
An unprotected computer can be infected by malware in as little as five minutes while connected to the Internet. Protect your computer and yourself by purchasing anti-virus software. Free anti-virus software is better than nothing, but go for a paid product that performs automatic scans and updates its threat database several times per day.
Use OpenDNS
Every website has a human-readable web address (like http://www.google.com ). It also has a computer-readable address, known as an IP address (74.125.30.105). Your ISP's DNS server does the translation. What it doesn't do is protect you from phishing. OpenDNS blocks phishing websites from loading on your computer using data from Phishtank, a community site.
Create Strong and Unique Passwords for Every Site
Check out this list of the most hackable passwords on the internet:
  • password
  • 123456
  • qwerty
  • Pet Names
  • Place of Birth
  • First Names (of family members or partner)
I am going to show you how to create a very strong password and it will be easy to remember. Create or pick a random sentence, now remove the spaces from the sentence, and then begin to change letters for numbers and change capitalization. In this case, an example is worth a thousand words:
  • An example is worth a thousand words - My initial sentence
  • Anexampleisworthathousandwords - I've taken the spaces out
  • An3xample1$worth1oooWurd$ - Now I'm substituting numbers and symbols for letters
  • N3xmple1$worth1oooWurd$ - Continue the process until you have a strong password
  • An online password checker rated this as "Best" (the highest rating available).
Find the Padlock
Locks are great for protecting valuable items from theft, which is why you should always look for the padlock in your browser while shopping or banking online. Look in the address bar for the padlock and "https:" prefix. Those items mean that your connection to the website is encrypted, usually with 256 bit encryption.
Avoid Public Networks
Public networks don't encrypt their connection so a cyber criminal could be intercepting your passwords and credit details. Save your online shopping for when you are on your own secured network at home.
Avoid the crowds and hassle by shopping online but be smart. Put these 6 tips into practice to enjoy a seamless shopping experience and avoid becoming a victim of identity theft.

5 Tips to Ensuring You Have Secure Passwords Online


In our modern world today, we use passwords for everything.
No doubt you have your favourite, however with increasing security breaches across many big web portals it's critical to ensure you protect yourself as best as you can - without going crazy or paranoid of course.
The very real worry is that the breach of one website exposes your details, particularly username - normally an email and your password - to a vast underworld for sale. You may be thinking, "So what, it's just one site and probably not important", however what are the odds that same email and password are used not just at one other site, but likely at 5 other, 10 other, ALL other websites you use?
So what can you do to minimise the risk as much as possible of either your password being guessed, or otherwise it being hacked and tried on other sites you may have accounts on?
Create Secure Passwords
According to SplashData's annual report of the 25 most common passwords thankfully 'password' is no longer the most popular. Unfortunately the next popular is now number 1 - '123456′...
Microsoft has an excellent page on information and tips on creating secure passwords.
Among the tips, a strong password:
  • Is at least eight characters long.
  • Does not contain your user name, real name, or company name.
  • Does not contain a complete word.
  • Is significantly different from previous passwords.
  • Contains characters from each of the following four categories:
Character category
Examples
Uppercase letters
A, B, C
Lowercase letters
a, b, c
Numbers
0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Symbols found on the keyboard (all keyboard characters not defined as letters or numerals) and spaces
` ~! @ # $ % ^ & * ( ) _ - + = { } [ ] |:; " ' < >,.? /
In creating a new secure password, substitute numbers for letters. For instance instead of 'Monday Tonight' as a password, you could use 'M0nd4Y_2N1t3′ or something similar.
Two Factor Authentication
This is slowly becoming more widely used. First you use your password, but second you have a challenge question, like "What is your Mother's Maiden name?". Other Secondary Authentications can include a code sent to you phone via SMS - so this immediately adds a further layer of complexity towards hackers breaching your security.
There of course is still the question of hacking a site via a backdoor (ie not via the normal above routes... )
Create Unique Passwords
This is the tricky part, to be secure, don't use a password more than once across your sites.
That's the official recommendation and while definitely true, we'd prefer to recommend scales of passwords.
For Instance:
Critical Passwords: Internet Banking, Perhaps Social Media - Create Unique Passwords
Medium Passwords: Online Stores that Store Your Credit Card Info - Create Similar, but maybe slightly changed passwords
Everyday Low Risk: Logins to Forums, Basic Online Stores (that Don't store card details) etc... - Use the same password.
An Online 'Black Book'
Another tip is to use a password storage service, these can integrate with browsers and websites and some can even integrate across platforms.
Some good ones include:
  • LastPass
  • Password Genie
  • SplashID
There are others, but note, do your research as some have also been targeted with hacking attacks...
While we have passwords, unfortunately we will have hackers and they will win some battles. But as long as you mitigate your risk as best you can you go a long way to protecting valuable money and data.

Friday, April 4, 2014

Finding Serial Key Of Any Software Using Simple Google Trick


How To Find Serial Key Of Any Software?
The key 94FBR is a part of Office 2000 Pro CD activation key that is widely distributed as it bypasses the activation requirements of Office 2000 Pro. By searching for 94fbr and the product name, you are guarantee that the pages that are returned are pages dealing specifically with the product you're wanting a serial for. Follow simple steps given below to learn this trick

1. Go to Google
2. Then type Software Name 94FBR

Replace Software Name with the name of software whose serial key you want to find
Eg: To find serial key of Nero i will type Nero 94fbr

3. Now press Enter and you will find serial key of software you are looking for as shown below.



Thursday, April 3, 2014

Reverse the mouse buttons



1) No context menu


What will you see when you right click on the desktop? You will see a context menu which says arrange icons, refresh,..and so on. Are you angry at your friend for not wishing you for you B'day? Do you wanna play a trick on a newbie in your family who is new to computers? This is a cool trick to play. By this tweak, you will be able to disable the right click on the desktop or any icons/files/folders/applications... But right click will work on taskbar of the start button and registry. So, dont worry!!!
Open your registry and you will see all unknown files like HKEY_CLASSES_ROOT....... and so on. Don't panic. Follow this path. HKEY_CURRENT_USER>SOFTWARE>MICROSOFT>WINDOWS>CURRENT VERSION>POLICIES>EXPLORER. On the right side of the registry, you will see two files(in general) named 'default' and 'NoDriveTypeAutoRun'. Right click on the empty space in the registry and goto New>DWORD VALUE and name it as "NoViewContextMenu". Remember, no spaces and N,V,C,M should be capitals. Right click on this and click modify. The default value will be 0. Change it to 1. Note: DONOT CHANGE THE HEXADECIMAL TO DECIMAL. Click OK. Close your registry and logout. Bingo!!! Once you login again, right click wont work. Your friend will be perplexed and the next thing he/she does is call the system administrator not knowing that not all system administrators will be knowing about registry. Now, to enable it again. follow the same path and set the value to 0. Logout and then login to see the effect.

2) Reverse the mouse buttons

This is a cool trick to play on newbies. Actually, there are two ways to do this. One is changing the settings in the Control panel and the other is through editing registry. You can do it either way. But I prefer the second way, which is challenging.
(i) Through Control Panel - goto Start> Control Panel> Printers and other hardware> Mouse. In Button configuration, enable the switch primary and secondary buttons option and click OK. But remember, you have just swapped the mouse buttons. So, for OK, you have to click the right mouse button. The newbie will be perplexed. Well, this trick is good for left handers.
(ii) Editing the registry - By default the left mouse button is the primary and the right is secondary. Open your registry and follow this path:
HLEY_CURRENT_USER>Control Panel>Mouse and on the right side of the registry, create this String value(REG_SZ): 'SwapMouseButtons' and set its value to 1. Bingo!!! You are done. Log out/Restart the computer.

You can try this: Combine tricks 1 and 2. That means, this will result in swapping of the mouse buttons and disabling the left click(once the buttons are swapped). User is ready to call system administrator cuz he feels that the system is behaving wildly.


TAGS: google,hacks,hardware interesting tricks,internet,ip address,miscellaneous information,multimedia tricks,network,programming,tips and tricks,tutorials,usb,video tutorials,windows,windows 7,basic computer,batch file programming,browser tricks,computer,dos command,download,ebooks,facebooks,

Disable CD Burning




Exciting isn't it?

The user can't burn any CDs by this trick. This restriction will disable the use of the inbuilt CD recording functions of Windows.

Open your registry and follow this path: HKEY_CURRENT_USER>Software>Microsoft>Windows>Current Version>Policies>Explorer and
create this key: "NoCDBurning" and set its value to 1. Close you registry and logout/restart your system for the change to take the effect.


TAGS: google,hacks,hardware interesting tricks,internet,ip address,miscellaneous information,multimedia tricks,network,programming,tips and tricks,tutorials,usb,video tutorials,windows,windows 7,basic computer,batch file programming,browser tricks,computer,dos command,download,ebooks,facebooks,

How to Hide the drives(c:,d:,e:,...etc) in Ur Computer




This is a great trick you can play on your friends. To disable the display of local or networked drives when you click My Computer.

1.Go to start->run.Type regedit.Now go to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Now in the right pane
create a new DWORD item and name it NoDrives (it is case sensitive).
Now modify it's value and set it to 3FFFFFF (Hexadecimal) .
Now restart your computer.
So, now when you click on My Computer, no drives will be shown(all gone...).

To enable display of drives in My Computer, simply delete this DWORD item that you created.Again restart your computer.You can now see all the drives again. Magic........lol....


TAGS: google,hacks,hardware interesting tricks,internet,ip address,miscellaneous information,multimedia tricks,network,programming,tips and tricks,tutorials,usb,video tutorials,windows,windows 7,basic computer,batch file programming,browser tricks,computer,dos command,download,ebooks,facebooks, 

Create A Hidden User Account




Create A Hidden User Account
This tweak allows an account that is normally displayed on the Welcome screen to be hidden from view. To log on using the account it's necessary to use the Log On To Windows dialog box similar to the one in Windows 2000. #[Start] [Run] [Regedit]#Registry Key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList#Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.#Data Type: REG_DWORD [Dword Value] // Value Name: Type Name of Account to be Hidden#Setting for Value Data: [0 = Account is Hidden / 1 = Enabled]#Exit Registry and Reboot...

While the account is hidden on the Welcome screen, note that the account profile will be visible in C:\Documents and Settings or wherever user profiles are stored as well as in Local Users and Groups


TAGS: google,hacks,hardware interesting tricks,internet,ip address,miscellaneous information,multimedia tricks,network,programming,tips and tricks,tutorials,usb,video tutorials,windows,windows 7,basic computer,batch file programming,browser tricks,computer,dos command,download,ebooks,facebooks, 

How to find the IP address of the sender in Gmail



How to find the IP address of the sender in Gmail
When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.

Finding IP address in Gmail:

1.Log into your Gmail account with your username and password.

2. Open the mail.

3. To display the headers,* Click on More options corresponding to that thread. You should get a bunch of links.* Click on Show original.

4. You should get headers like this:Gmail headers : nameLook for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is65.119.112.245.That is be the IP address of the sender!

5. Track the IP address of the sende
r.

How to find the IP address of the sender in Hotmail



When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.
Finding IP address in Hotmail
1. Log into your Hotmail account with your username and password.
2. Click on the Mail tab on the top.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on Mail Display Settings
* In Message Headers, make sure Advanced option is checked
* Click on Ok button
* Go back to the mails and open that mail.

5. If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP addressHotmail headers : name ,In this case the IP address of the sender is [68.34.60.59]. Jump to step 9.
6. If you find a header with Received: from followed by a Gmail proxy like thisHotmail headers : nameLook for Received: from followed by IP address within square brackets[].In this case, the IP address of the sender is [69.140.7.58]. Jump to step 9.
7. Or else if you have headers like thisHotmail headers : nameLook for Received: from followed by IP address within square brackets[].In this case, the IP address of the sender is [61.83.145.129] (Spam mail). Jump to step 9.
8. * If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
9. Track the IP address of the sender

How to find the IP address of the sender in Yahoo! mail



When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.

Finding IP address in Yahoo! Mail

1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail.
5. You should see similar headers like this:Yahoo! headers : nameLook for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.That is be the IP address of the sender!
6. Track the IP address of the sender

Recover the lost administrators password in Windows XP




Slightly more work needed if you lose or forget the Windows XP administrator password.

1.First reboot Windows XP in safe mode by re-starting the computer and pressing F8 repeated as the computer starts up.

2.Then (in safe mode) click Start and then click Run. In the open box type "control userpasswords2" without the quotes - I have just used quotes to differentiate what you have to type.

3.You will now have access to all the user accounts, including the administrators account and will be able to reset the lost password.

4.Just click the administrators user account, and then click Reset Password.

5.You will need to add a new password in the New password and the Confirm new password boxes, and confirm by clicking OK.


All done, you have recovered the lost adminitrators password!

Keeping the Windows XP Core in the RAM



If you have 512 MB or more of RAM, you can increase system performance by having the Windows XP 'Core' kept in the RAM instead of paged on the hard disk.

Go to Start -> Run - Type regedit and press enter - On the left hand side tree, navigate to

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\

- On the list on the right side, look for an entry called 'DisablePagingExecutive'
- Double click it
- Press 1 on your keyboard
- Click OK
- Exit regedit and reboot the computer

To revert to the default setting, follow the same steps as above, but this time, press 0(zero) instead of 1 on the keyboard.

Clean out the prefetch folder :



Windows XP uses a system called 'prefetch' to organize and preload some of the data necessary for commonly used applications and files. A folder called prefetch is used to store the information the operating system needs to carry out this operation.
After several months of use, the prefetch folder may become quite overloaded with older references to software and files that may no longer be in use.It's a good idea to manually empty the older files out of the prefetch folder every few months or so.
To do this: Navigate to 'c:\windows\prefetch' and delete all .
PF files that are older than a week or two.

Remove Thumb.db file



Thumb.db is is a cache of the current picture in that directory.to remove it go for following
step1 > open "WINDOWS EXPLORER".
2>go to "TOOLS".
3>open "FOLDER OPTIONS".
4>go to "VIEW".
5>see 1st section "FILES & FOLDERS".
6>click on the "DO NOT CACHE THUMBNAILS".
now the thumbnail file will be removed from ur computer once u do this the file will be never created.

Trick to Show ur name after time in taskbar...Hi freinds !I m here to tell u a trick to add up ur name in place of AM and PM beside time and make urself to feel proud among ur group of frnds.Its simpleStart - Control Pannel - Regional and LAnguage option - Customize (beside English US) - Go to TIME tab - Change AM symbol and PM symbol from AM and PM to ur name - Apply - Ok ...IS it changed ??? Might be not ...



Trick to Show ur name after time in taskbar...


Hi freinds !
I m here to tell u a trick to add up ur name in place of AM and PM beside time and make urself to feel proud among ur group of frnds.
Its simple
Start -> Control Pannel -> Regional and LAnguage option -> Customize (beside English US) -> Go to TIME tab -> Change AM symbol and PM symbol from AM and PM to ur name -> Apply -> Ok ...
IS it changed ??? Might be not ...Now go to time in taskbar and Double Click it to open "Date and time property" ...Look place where time chnges in digital form i.e. 02:47:52 AM , click to arrow to cnage the AM or PM by selecting and press arrow. It will Show ur name or name that was entered by u, Apply -> OK and be HAPPY 8)

Error Reporting in XP




If error reporting in XP is bugging you then turn it off.

When a system error occurs in XP, a little dialog box appears asking if you want to report the error to Microsoft. Click the message box to make it disappear. You don't have to report the error if you don't want to and on today's "Call for Help" Leo shows you how to turn off the feature if you find it distracting.

To disable error reporting, follow these directions:
1. Right-click My Computer and choose Properties.
2. Click the Advanced tab on your System Properties dialog box.
3. Click the Error Reporting button on the Advanced tab.
4. Place a checkmark next to "Disable error reporting."
5. Leave the other radio button unchecked next to the text labeled, "But notify me when critical errors occur."
6. Click OK.

Hidden Programs In Windows XP !



Is it strange to hear , but true that some good programs are hidden in Windows XP !!!

Programs :

1. Private Character Editor :

Used for editing fonts,etc.
** start>>Run
** Now, type eudcedit

2. Dr. Watson :

This an inbuilt windows repairing software !
** start>>Run
** Now, type drwtsn32

3. Media Player 5.1 :

Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!
** start>>Run
** Now, type mplay32

4. iExpress :

Used to create SetupsYou can create your own installers !
** start>>Run
** Now, type iexpress

Multiple Logins in yahoo without Software


1) Go to Start
2) Navigate to HKEY_CURRENT_USER-->Software-->Yahoo-->Pager-->Test
3)ON the Right side if the page , Right click and choose new Dword Value.
4) Rename it as " Plural ".
5)Double click and assign a decimal value of 1.
6) Now close registry and restar yahoo messenger and try Multiple Login

Secret Codes for Nokia



Codes :
1) *#06# For checking IMEI(international Mobile Equipment Identity)
2) *#7780# Reset to factory settings
3) *#0000# To view software version
4) *#2820# Bluetooth device address
5) *#746025625# Sim clock allowed status
6) #pw+1234567890+1# Shows if ur sim as any restrictions

Updated trick for enabling Folder option



Many times Windows users face a common problem. The “Folder Options” in “Tools” menu is not visible. Even It can’t be accessed from Control Panel. Also “Registry Editor” is disabled.
Follow the simple steps mentioned in this tutorial and your problem will be solved:

1. If Folder Options is disabled but Registry Editor is still working in your system, then you can enable Folder Options by editing Windows Registry.
Type regedit in RUN dialog box and press Enter.
it’ll open Registry Editor, now go to following keys:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\ExplorerHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\Policies\Explorer
In right-side pane, check whether a DWORD value named NoFolderOptions exists or not? If it exists, delete it.

2. If you are not familiar with editing the registry, then you can simply download following file, extract it and then run the .REG file:
Folder_option.zip

................................................................................................................
If u cant run regedit ....
Seems like your system is infected with a virus. Pls follow following link:
http://www.askvg.com/is-your-system-infected-with-a-virus-spyware-adware-trojan/

..................................................................................................................
Some ppl find that "show hidden files and folders" option ll not b enabled..
though enabled they cant c the hidden folders...
for that dont worry
--open RUN
--type regedit
--HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Explorer\Advanced
And in right-side pane, change value of “Hidden” to 1 and refresh My Computer window and you’ll be able to see hidden files again

Does When u Double click on Drive... New Window opens



Whenever ppl double-click on any folder in Computer,
it opens in a new window even if selected the option “Always open folders in same window” in “Tools -> Folder Options”.
For this kind of Problem
Download following zip file, extract it and then run .REG file and confirm the action:
Download

Tips to recover scratched CD'



1. Spread a cloth on a flat surface and place the CD on it.
2. Then, hold the disc with one hand, use the other to wipe the polish into the affected area with a soft cloth.
3. Wait for it to dry and buff using short, brisk strokes along the scratch, not across it.
4. A cloth sold to wipe spectacles or camera lenses will work super m8's.
5. When you can no longersee the scratch,, wash the disc with water and let it dry before playing. Intersting isnt it? Try it right now
I have used toothpaste with good effects before Ive also used car paint cutting compound on deeper scratches. It does leave lots of smaller scratches (as it is a cutting compound after all) but it will remove the worst scratches in most cases.
ya u r gng to b surely befinited by this Operation
* Fingermarks/prints cause 43% of disc problems!
* General wear & tear causes 25% of disc problems!
* Player-related issues cause 15% of disc problems!
* Remaining Others

Add Your Name (or) Application to right click Of My Computer


Add Your Name (or) Application to right click Of My Computer
 
 
Caution ..
As it is related to Windows regisrty it can be dangerous
so,Try This at ur own risk


To write your name on right click application
please follow the steps.
1.Copy/Paste the following code in Notepad And then Save it as .reg

Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor]
@="Your Name Or Name of the Application"
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor\command]
@="Location Of The Application"

2.
Now edit it and then Type your name In

Eg:

[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor]
@="Rajesh"

3. If u want to get any application, once you click Your name or name of application
Then , Type the location Of the application Which u want to open In:

[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor\command]
@="Location Of The Application"

For eg.C:\Program Files\Yahoo!\Messenger\messenger.exe
Thats It finally save it And then Run it .


------------------------------------------------------------
To add Application Control Panel

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Control Panel\command]
@="rundll32.exe shell32.dll,Control_RunDLL"

To add Application Add/Remove

[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Add/Remove\command]
@="control appwiz.cpl"

To add Application Reboot

[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\[Reboot]\command]
@="shutdown -r -f -t 5"

To add Application Shutdown

[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\[Shutdown]\command]
@="shutdown -s -f -t 5"

-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-....-......----..--.-...--.-..-

How to "Delete administrator Password" without any software


How to "Delete administrator Password" without any software


Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.

Method 2

Step
1. Put your hard disk of your computer in any other pc .Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).Step 3. Then open that drive in which the victim’s window(or your window) is installed.Step 4. Go to location windows->system32->configStep 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer :-)

All (Ctrl+Alt+Del) Permanently deleted files Recovery solution


All (Ctrl+Alt+Del) Permanently deleted files Recovery solution


Sometimes we delete the files permanently, and realize that deleting them is like a Blunder...

For all those folks,
Here is the solution

Software called "Kissass Undelete" , can bring those files from the hard disk or your flash drive.
Conditions : Only if the data on that drive is not re-occupied(or written). that means the space which was available after the deletion is not been occupied after the deletion.

Click Here to download the .

1)
To start searching for the files,
Select the drive from the Left panel of the Windows and Click the scan button.
the Scan might take upto 10 secs.

2)
When the files search has been completed, it will show you the results with the name, typ, size and the last modified date of the searched file.

3) Now you can select the file to be recover. This is an Open source application and available for All Windows OS(Windows XP/Vista/ 7).

How to Create Folder "CON"


How to Create Folder "CON"

Ever tried to create a folder "CON" or "AUX" or "NUL".

Tried now??? - not working :)

Here you go, a simple method to stop your anxiety

Rename folder from the right click option........
Now press alt and press 255...
press 255 from the right side of the key bords i.e, Num pad.
where only numbers are given.....
now write con and then press enter.....yayyy!!
you ll see a con folder in ur pc
and also you can delete it easily.

Monday, March 17, 2014

Understanding hardware component Archt. & however stuff works - Text Book

Nowadays, there area unit many ways within which we are able to verify info concerning our computersand also the hardware elements enclosed inside them. this sort of data is extremely vital as a result ofthe hardware is that the main laptop half that influences the code still and, during this approach, it influences the approach within which the pc functions. each hardware element is very important to bethought-about once discussing concerning the performance of the pc as a result of they work as a systemfacultative the pc to work.

Among the various ways that within which {we can|we will|we area unit able to} verify basic and a lot ofadvanced notions associated with hardware and computers terribly helpful are thought-about to be the Understanding hardware design & however stuff works? Text Book. They contain vital information which may facilitate U.S.A. higher understand however our laptop functions and the way we would improve itstill. There area unit several Understanding hardware design & however stuff works? Text Book out therefor U.S.A. these days. All we'd like to try and do is to be willing to find out new things concerning our computers as a result of ways that within which to try and do this area unit terribly simply found.
                                 
                                       
DOWNLOAD HERE  

                                Download Rar password                                      

How to Assemble PC? Complete computer hardware collecting Edition for Beginners


How to Assemble PC?  Complete CPU Assembling Edition for Beginners


Building a pc is a awfully appreciated expertise. Since you’re reading this, you’re most likely puzzling overbuilding your next pc rather than shopping for one pre-built. this can be a awfully viable choice currentlyand may bring several benefits; you'll learn lots concerning hardware by building one, you get a completely personalised pc, able to} select higher elements and you will be able to save cash and make merry.


Additionally, if you're the type of one who desires to know however things work, if you are taking broken stuff apart simply to envision however it all fits along, if you have got a drawer somewhere filled with “parts” you think that might are available in handy sometime, then you only could also be within the right place.