Friday, March 25, 2011

Update My Computer


How to Updating your computer?

What are updates?
Microsoft offers important updates, which include security and other critical updates, to help protect your computer against new viruses and other security threats that can spread over the Internet or a network. Other updates contain enhancements, such as upgrades and tools that can help your computer run more smoothly.

Update your Computer Follow This Steps:
1. Click Start, and then click Control Panel.

2. Depending on which Control Panel view you use, Classic or Category, do one of the following:
Click System, and then click the Automatic Updates tab.
Click Automatic (recommended) Option and select the day and time you want Windows to install updates. (Your Select Time Every Day 3:00 AM. Your Computer Update Every Day 3:00 AM)
Click Apply -> OK.

Adjusting your cookie security policy

How to Adjusting your cookie security policy?
If you do not want your computer to accept third-party cookies so that marketing companies cannot identify what ads they have shown you, or if you just want to adjust your cookie acceptance settings, then follow these steps:

1. Open Internet Explorer.

2. Click the Tools menu bar item and select Internet Options.

3. Click on Privacy tab.

4. You will see the up and down slider that allows you to select different levels of cookie security. I recommend that you bypass this and just click the Advanced button instead.

5. Once you click the Advanced button and see the Advanced Privacy Settings window, check the box that says Override Automatic Cookie Handling.

6. Your settings for first- and third-party cookies will now be available for adjustment. I recommend that you always accept first-party cookies. You can decide if you want to block or select the prompt to accept third-party cookies. Prompt will pop up a dialog box notifying you that a cookies request has been received.

7. Once you are finished with your settings, click the OK button to save your changes and return to Internet Options.

8. Click OK once more to close Internet Options.

Now that you have set the cookie privacy setting manually. you can eliminate cookies from being stored on your hard drive in the first place. Doing so will allow you to protect your privacy and still be able to use Web sites that need cookies.

Speed Up Internet


How to Speed Up Internet?

Windows XP


1. First, open the Windows Registry using Regedit, and navigate to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\ServiceProvider

2. Note the following lines (all hex dwords):

Class = 008 ( biggrin.gif - indicates that TCP/IP is a name service provider, don't change
LocalPriority = 1f3 (499) - local names cache
HostsPriority = 1f4 (500) - the HOSTS file
DnsPriority = 7d0 (2000) - DNS
NetbtPriority = 7d1 (2001) - NetBT name-resolution, including WINS

3. What we're aiming to do is increase the priority of the last 4 settings, while keeping their order. The valid range is from -32768 to +32767 and lower numbers mean higher priority compared to other services. What we're aiming at is lower numbers without going to extremes, something like what's shown below should work well:


4. Change the "Priority" lines to:

LocalPriority = 005 (5) - local names cache
HostsPriority = 006 (6) - the HOSTS file
DnsPriority = 007 (7) - DNS
NetbtPriority = 008 ( biggrin.gif - NetBT name-resolution, including WINS

5. Reboot for changes to take effect


2. Windows 9x/ME

1. The tweak is essentialy the same as in Windows 2000/XP, just the location in the Registry is slightly different. For a more detailed description see the Windows 2000/XP section above

2. Open the Windows Registry using Regedit, and (after backing up) navigate to:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VxD\MSTCP\ServiceProvider

3. You should see the following settings:

Class=hex:08,00,00,00
LocalPriority=hex:f3,01,00,00
HostsPriority=hex:f4,01,00,00
DnsPriority=hex:d0,07,00,00
NetbtPriority=hex:d1,07,00,00

4. The "priority" lines should be changed to:

LocalPriority=hex:05,00,00,00
HostsPriority=hex:06,00,00,00
DnsPriority=hex:07,00,00,00
NetbtPriority=hex:08,00,00,00

5. Reboot for changes to take effect

3. System.ini IRQ Tweak - Windows 9x/ME ONLY

1. Find your Network Card's IRQ

1. In order to add the entry to your System.ini file, you'd first have to find your NIC's IRQ

2. Right-click on My Computer icon on your Desktop, then left-click on Properties (a shortcut for that would be to press the 'Windows' + 'Pause' keys). Navigate to Device Manager and double-click on Computer. Under "View Resources" you will find a list of IRQs, each with description of the device that's using it. Note the IRQ number used by your Network Adapter


2. Adding the entry to System.ini

1. Once you've found the IRQ of your Network Card, you need to reserve some RAM for its use, by adding an entry to the System.ini file. You can edit the file in any text editor, however the easiest way is to use Windows' built in "System Configuration Editor"

2. Navigate to Start > Run and type sysedit . Find the [386enh] Section in the System.ini file and add Irq[n]=4096 under it, where [n] is the IRQ number of your NIC and 4096 is the amount of RAM you want to reserve in Kbytes. We recommend using 4096, however you can experiment with different values if you want. Save changes in the file, exit and reboot for changes to take effect.

Note: If you choose to try different values, keep in mind that reserving too much RAM for your NIC will decrease the amount of RAM available for applications, while reserving too little might not give the desired effect

3. Additional Thoughts

1. The only negative effect of the System.ini IRQ tweak is that it will reduce the amount of RAM available for running applications a bit, by reserving some specifically for your Network Card's use. The gain in performance usually outweighs the negative effect by far, considering any Computer with 32Mb of RAM or more


2. This tweak may or may not work for you. It is not a documented tweak by Windows
.

3. Keep in mind that if you add hardware to your system the IRQ of the Network Adapter might change, in which case you will need to modify the setting in System.ini

4. In systems with multiple NICs, you might want to add the setting for both IRQs. Also, you could reserve RAM for other IRQs if you wish, just use common sense and don't forget it reduces the amount of RAM available for running applications.

5. If you are using an USB device, it does not have a specific IRQ, however you can try adding the entry using the IRQ of the USB Controller.

6. For internal Cable Modems, you'd have to add the entry using the IRQ of your modem, rather than the IRQ of a Network Card

RESULTS WILL VARY
No matter how good your systems may be, they're only as effective as what you put into them.

Speed Up Bandwidth


How to Speed Up Bandwidth?

Windows uses 20% of your bandwidth Here's how to Get it back


A nice little tweak for XP. Microsoft reserve 20% of your available bandwidth for their own purposes (suspect for updates and interrogating your machine etc..)

Here's how to get it back:

Click Start ->Run -> type gpedit.msc

This opens the group policy editor. Then go to:

Local Computer Policy ->Computer Configuration ->Administrative Templates ->Network ->QOS Packet Scheduler ->Limit Reservable Bandwidth

Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab :

"By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."

So the trick is to ENABLE reservable bandwidth then set it to ZERO.

This will allow the system to reserve nothing, rather than the default 20%.

Speeding up menu


How to Speeding up menu

Go to Start --> Run --> Regedt32


Go to HKEY_CURRENT_USER\Control Panel\Desktop

Locate the key called "MenuShowDelay" and it is probably set to 400.

Change that value to 150.

Reboot your computer.

You should notice a slight increase in the speed of your menus

Stop Restart Process


Stop Restart Process

Some times we need to stop some restart process quickly. In windows XP some times it gives auto restart warning and here is good solution for it.


1. Go to Start menu
2. Click on RUN
3. Enter the following command excluding hashcodes "shutdown -a"

its Done.

Stop Annoying Add

How to Stop Annoying Add?

Did you ever go to warez/cracks sites only to be bombarded with 3 -4 windows opening up at a time, with porn, spam etc?

I discovered a VERY easy way to block about 90-95% of this, without using any pop-up stopping programs.

Here's how you do it...

1) open Internet Explorer and Go to TOOLS and then INTERNET OPTIONS.

2) Click the SECURITY tab, move the slider up to HIGH and click APPLY.

This applies the highest security settings to IE, which blocks EVERYTHING, including JavaScript, Applets and so on that pop-ups are based upon.

The catch is this... Some places like online banks and other web sites need these functions to work properly... So you'll need to re-enable one important thing..

1) Go to TOOLS and then INTERNET OPTIONS.

2) Click the SECURITY tab, CUSTOM LEVEL, scroll down to SCRIPTING, and under ACTIVE SCRIPTING, select the ENABLE radio button.

3) Click APPLY and you're pretty much done.

Note: This does NOT completely remove pop-ups and other annoyances, but it sure helps ALOT, without having to trash your computer with pop-up blockers.

Thursday, March 24, 2011

Burn image Files

How to Burn image Files with Nero?

1. Install Nero.

2. Insert Blank CD.

3. Open it, choose what is the storage type you gonna use to burn the image, or is a CD or a DVD.

4. Go to Copy and Backup > Burn Image to Disc.

5. Choose the image you want to burn > Next.

6. Done.

How to work with Daemon Tools?


1. Install the software into your Hard Drive. After installing reboot (or not) your PC.
2. After 1. , open Daemon-Tools. It will appear in your startup bar.
3. Right click on it, go to Virtual CD/DVD-ROM � Set number of devices � 2 Drives. If you want to use more drives you can set it on. I personally use 2. It's your decision.
4. Right click on it, go to Virtual CD/DVD-ROM � Device x: [X:](....). Here you will mount your image. Just choose the image to open it (x means Device 1 or 2, etc.)([X:] the letter of your device).
5. Done, now your image is working like a CD.

What is a image file?


A image file is a CD/DVD, but instead of insert it into your CD/DVD-Rom,

you open it from inside your Hard Disk.

So, it's a file that replaces a normal CD/DVD.

Inside the image are the CD/DVD files like if it were a CD/DVD.

Speed Up Internet


Your computer slow down when you browse your local area network and connect to other computers that are sharing data? One of the most common causes of this slowdown is a feature of Windows Explorer that looks for scheduled tasks on remote computers. This effort can take some time on some computers and can really slow down your browsing. The window with which you are browsing the network may appear to freeze momentarily, as the system is waiting for a response from the remote computer.

Windows XP: Speeding Disk Access

Although this problem is a complex one, the solution is very simple. Instead of having to wait for the remote scheduled tasks, which is useless information to anyone who is not a system administrator remotely configuring scheduled tasks, you can disable this feature.

In order to do this, you will have to change the System Registry and delete a reference to a key so that this feature will not be loaded. To do this, follow these steps:

1. Open up the Registry Editor by clicking the Start Menu and selecting Run. Then type regedit in the text box and click the OK button.

2. Once the Registry Editor has loaded, expand the HKEY_LOCAL_MACHINE key.

3. Next, expand Software and then Microsoft.

4. Locate Windows and expand that as well.

5. You will want to be editing the main system files, so expand CurrentVersion.

6. Because this feature is a feature of the Windows component known as Explorer, expand the Explorer key.

7. Next, you will want to modify the remote computer settings, so expand the RemoteComputer key and then expand the NameSpace key to show all of the features that are enabled when you browse to a remote computer.

8. In the NameSpace folder you will find two entries. One is "{2227A280-3AEA-1069-A2DE-08002B30309D}" which tells Explorer to show printers shared on the remote machine. The other, "{D6277990-4C6A-11CF-8D87-00AA0060F5BF}," tells Explorer to show remote scheduled tasks. This is the one that you should delete. This can be done by right-clicking the name of the key and selecting Delete.

Tip:
If you have no use for viewing remote shared printers and are really only interested in shared files, consider deleting the printers key, "{2227A280-3AEA-1069-A2DE-08002B30309D}", as well. This will also boost your browsing speed.

Once you have deleted the key, you just need to restart and the changes will be in effect. Now your network computer browsing will be without needless delays.

Wednesday, March 23, 2011

Xp Hidden APPS


To run any of these apps go to Start > Run and type the executable name (Eg. charmap.exe).

WINDOWS XP HIDDEN APPS:

1) Character Map = charmap.exe (very useful for finding unusual characters)

2) Disk Cleanup = cleanmgr.exe

3) Clipboard Viewer = clipbrd.exe (views contents of Windows clipboard)

4) Dr Watson = drwtsn32.exe (Troubleshooting tool)

5) DirectX diagnosis = dxdiag.exe (Diagnose & test DirectX, video & sound cards)

6) Private character editor = eudcedit.exe (allows creation or modification of characters)

7) IExpress Wizard = iexpress.exe (Create self-extracting / self-installing package)

8) Microsoft Synchronization Manager = mobsync.exe (appears to allow synchronization of files on the network for when working offline. Apparently undocumented).

9) Windows Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).

10) ODBC Data Source Administrator = odbcad32.exe (something to do with databases)

11) Object Packager = packager.exe (to do with packaging objects for insertion in files, appears to have comprehensive help files).

12) System Monitor = perfmon.exe (very useful, highly configurable tool, tells you everything you ever wanted to know about any aspect of PC performance, for uber-geeks only )

13) Program Manager = progman.exe (Legacy Windows 3.x desktop shell).

14) Remote Access phone book = rasphone.exe (documentation is virtually non-existant).

15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the Windows Registry).

16) Network shared folder wizard = shrpubw.exe (creates shared folders on network).

17) File siganture verification tool = sigverif.exe

18) Volume Contro = sndvol32.exe (I've included this for those people that lose it from the System Notification area).

19) System Configuration Editor = sysedit.exe (modify System.ini & Win.ini just like in Win98! ).

20) Syskey = syskey.exe (Secures XP Account database - use with care, it's virtually undocumented but it appears to encrypt all passwords, I'm not sure of the full implications).

21) Microsoft Telnet Client = telnet.exe

22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the actions of drivers, might be useful for people having driver problems. Undocumented).

23) Windows for Workgroups Chat = winchat.exe (appears to be an old NT utility to allow chat sessions over a LAN, help files available).

24) System configuration = msconfig.exe (can use to control starup programs)

25) gpedit.msc used to manage group policies, and permissions

Reboot Whitout Rebooting


Have you ever been using your computer and your system suddenly stops responding in ways like it if you try to open something it just hangs? One time I tried deleting a folder and it said it was in use, but it really wasn't. If this ever happens to you, you can follow these simple steps to 'reboot' your computer without 'rebooting' it.

Press CRTL + ALT + DEL

Go to the 'processes' tab and click explorer.exe once and then click 'end process'.

Now, click File -> New Task and type explorer.exe

Everything should be fine now! If the problem is major, I would recomend actually shutting down then starting up again.

Clear Page File on Shutdown


WINXPCPS.REG

This Registration (.REG) file clears the Page file when you power off the computer.
Restart Windows for these changes to take effect!
ALWAYS BACKUP YOUR SYSTEM BEFORE MAKING ANY CHANGES!

Browse to: HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ Control \ Session Manager \ Memory Management

and add the DWORD variable "ClearPageFileAtShutdown"=dword:00000001

You can also do this without reg hacking.
Go to Control panel -> Administartative tools -> local security policy. then goto local policies -> security options.

Then change the option for "Shutdown: Clear Virtual Memory Pagefile"

Administrative Permissions


Temporarily Assign Yourself Administrative Permissions

Many programs require you to have Administrative permissions to be able to install them. Here is an easy way to temporarily assign yourself Administrative permissions while you remain logged in as a normal user.

Hold down the Shift key as you right-click on the program�s setup file.

Click Run as.

Type in a username and password that have Administrative permissions.

This will also work on applications in the Start menu.

Lock My Computer Desktop


Create a Shortcut to Lock Your Computer

Leaving your computer in a hurry but you don�t want to log off? You can double-click a shortcut on your desktop to quickly lock the keyboard and display without using CTRL+ALT+DEL or a screensaver.

To create a shortcut on your desktop to lock your computer:

Right-click the desktop.
New and then click Shortcut.

The Create Shortcut Wizard opens. In the text box, type the following:
rundll32.exe user32.dll,LockWorkStation

Click Next.

Enter a name for the shortcut. You can call it "Lock Workstation" or choose any name you like.

Click Finish.

Map Drive Button


Do you want to quickly map a drive, but can�t find the toolbar button? If you map drives often, use one of these options to add a Map Drive button to the folder toolbar.

Option One (Long Term Fix)

Click Start, click My Computer, right-click the toolbar, then unlock the toolbars, if necessary.

Right-click the toolbar again, and then click Customize.

Under Available toolbar buttons, locate Map Drive, and drag it into the position you want on the right under Current toolbar buttons.

Click Close, click OK, and then click OK again.

You now have drive mapping buttons on your toolbar, so you can map drives from any folder window. To unmap drives, follow the above procedure, selecting Disconnect under Available toolbar buttons. To quickly map a drive, try this option.
Option Two (Quick Fix)

Click Start, and right-click My Computer.
Click Map Network Drive.

If you place your My Computer icon directly on the desktop, you can make this move in only two clicks!

Tuesday, March 22, 2011

Windows Key Shortcuts


Windows: Start menu
Windows + D: Minimize or restore all windows
Windows + E: Windows Explorer
Windows + F: Search for files
Windows + Ctrl + F: Search for computer
Windows + F1: Help and Support Center
Windows + R: Run dialog box
Windows + break: System Properties dialog box
Windows + shift + M: Undo minimize all windows
Windows + L: Lock the workstation
Windows + U: Open Utility Manager
Windows + Q: Quick switching of users (Powertoys only)
Windows + Q: Hold Windows Key, then tap Q to scroll thru the different users on your pc

Change your cd key


You don't need to re-install if you want to try the key out ... just do this:

1. Go to Activate Windows
2. Select the Telephone option
3. Click "Change Product Key"
4. Enter NOT ALLOWED
5. Click "Update"

Now log off and log back in again. It should now show 60 days left, minus the number of days it had already counted down.

Note: If your crack de-activated REGWIZC.DLL and LICDLL.DLL, you are going to have to re-register them.

Stop Windows Messenger Autostart


click on start and click run and type REGEDIT and enter and delete the following Registry Key:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS

Friday, March 18, 2011

Auto Disconnect Internet Explorer


Use this edit to automatically disconnect from Internet Explorer after a specified length of time has elapsed. Use this trick on anyone whom you don?t like using your computer with net J

Go to Start -> Run -> and type run in Regedit.

Go to: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Parameters

Modify/Create DWORD Value of Data type REG_DWORD Named [Autodisconnect]
Value Data: [Enter a new disconnect time. Use Hexadecimal if you are unfamiliar with Binary]

Exit Registry / Reboot

Auto Reboot on System Crash


By default Windows XP operating system crashes an automatic reboot of the system occurs. While this behavior can be convenient, the downside is the error message accompanying the crash is not visible. Often times this information can be a great help in troubleshooting the source of the crash. This behavior can be modified in two ways; via the registry or using the System Properties property sheet.

Go to Start -> Run -> and type run in Regedit

Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl

Modify/Create DWORD Value of Data type REG_DWORD Named [AutoReboot]
Setting for Value Data: [0 = AutoReboot Disabled / 1 = AutoReboot Enabled]

Exit Registry / Reboot

Open System Properties via Start -> Control Panel -> Performance and Maintenance > System

[System Properties may also be opened using the WinKey+Pause key combination]

Select the Advanced tab and then click Settings in the Startup and Recovery section In System Failure section, clear the checkbox next to Automatically Restart

Click OK and OK to exit

Modify Control Panel


Even if you like the new style for Control Panel, you might at times wish you could shift some items around into a different category. It's possible.

Go to Start -> Run -> and type run in Regedit.

Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Control Panel\Extended Properties\{305CA226-D286-468e-B848-2B2E8E697B74} 2

Modify/Create DWORD Value of Data type REG_DWORD Named [Choose one of the applets with .cpl extension]

Setting for Value Data: [Select the value from table below]

Other Control Panel Options 0
Appearance and Themes 1
Printers and Other Hardware 2
Network and Internet Connections 3
Sounds, Speed, and Audio Devices 4
Performance and Maintenance 5
Date, Time, Language, and Regional Options 6
Accessibility Options 7
Add or Remove Programs 8
User Accounts 9

Exit Registry / Reboot

To further customize the items that appear in the new Control Panel, do a search of your system for all files that end in .cpl extension. If they aren't already listed, you can add them with a new DWORD value and then assign them to a category of your choosing.

Uninstall Programs Manually


Follow This Step:

1 - Go to Start -> Control Panel -> Add or Remove Programs.

2 - Select 1 option Change or Remove Programs

3 - Select any Remove Programs and Click Remove.

Create Right Click Command Prompt option


You can right-click a folder to get a list of actions you can apply to it. Here?s a way to create an action on that right-click menu that opens a command prompt window with that folder as the current directory. In a text editor such as Notepad, type the following exactly:

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\Folder\shell\Cmd Here]

@=?Command &Prompt Here?

[HKEY_CLASSES-ROOT\Folder\shell\Cmd Here\command]

@=?cmd.exe /k pushd %L?

Save the file with any name you want, with a .reg extension. Then double-click the saved file and choose Yes to merge the file?s information into the Registry. You can delete the file. Right-click any folder and you?ll see the CommandPrompt Here option.

Use Vista Without Activation


The following describes the Registry key that�s involved

Step 1.
While running a copy of Windows Vista that hasn�t yet been activated, click the Start button, type regedit into the Search box, then press Enter to launch the Registry Editor.
Step 2.
Explore down to the following Registry key:HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ SL
Step 3.
Right-click the Registry key named SkipRearm and click Edit. The default is a Dword (a double word or 4 bytes) with a hex value of 00000000. Change this value to any positive integer, such as 00000001, save the change, and close the Registry Editor.
Step 4.
Start a command prompt with administrative rights. The fastest way to do this is to click the Start button, enter cmd in the Search box, then press Ctrl+Shift+Enter. If you�re asked for a network username and password, provide the ones that log you into your domain. You may be asked to approve a User Account Control prompt and to provide an administrator password.

Step 5.
Type one of the following two commands and press Enter:slmgr -rearmorrundll32 slc.dll,SLReArmWindowsEither command uses Vista�s built-in Software Licensing Manager (SLMGR) to push the activation deadline out to 30 days after the command is run. Changing SkipRearm from 0 to 1 allows SLMGR to do this an indefinite number of times. Running either command initializes the value of SkipRearm back to 0.
Step 6.
Reboot the PC to make the postponement take effect. (After you log in, if you like, you can open a command prompt and run the command slmgr -xpr to see Vista�s new expiration date and time.

Step 7.
To extend the activation deadline of Vista indefinitely, repeat steps 1 through 6 as necessary.

Create CON folder


Create a new folder and try to rename it to any one of the above specified names, you know what happens! In Windows XP the folder name automatically changes back to �New Folder� no matter you try any number of times.Where as in Windows Vista when you try to rename the file you get an error message �The specified device name is invalid�.

What is the reason for this? Simple, These names represent the internal devices and hence we cannot create folders with the above names.

Yes because it is still possible to create these folders using the command prompt. Follow this step.

1. Start -> Run -> Type in run CMD and ok and open command prompt.

2. Type in prompt (Eg. To Create Con Folder in D: Drive)
C:\>md \\.\d:\con

NOTE:�con� can be replaced by any other names such as �prn�, �nul� �com1? �com2? �lpt1? etc.

3. To delete the folder use the following command
C:\>rd \\.\d:\con

NOTE:The folder can only be deleted from the command prompt.You cannot remove it by right-click delete

Compile C Programs


How to install Borland C++ compiler

1. Download Borland C++ compiler 5.5 (for Windows platform) from the following link.

http://www.codegear.com/downloads/free/cppbuilder

2. After you download, run freecommandlinetools.exe. The default installation path would be

C:\Borland\BCC55
How to configure Borland C++ compiler

1. After you install Borland C++ compier, create two new Text Documents

2. Open the first New Text Document.txt file and add the following two lines into it

-I�c:\Borland\Bcc55\include�
-L�c:\Borland\Bcc55\lib�

Save changes and close the file. Now rename the file from New Text Document.txt to bcc32.cfg.

3. Open the second New Text Document (2).txt file and add the following line into it
-L�c:\Borland\Bcc55\lib�
Save changes and close the file. Now rename the file from New Text Document (2).txt to ilink32.cfg.

4. Now copy the two files bcc32.cfg and ilink32.cfg, navigate to C:\Borland\BCC55\Bin and paste them.

How to compile the C source code (.C files)

1. You need to place the .C (example.c) file to be compiled in the following location

C:\Borland\BCC55\Bin

2. Now goto command prompt (Start->Run->type cmd->Enter)

3. Make the following path as the present working directory (use CD command)
C:\Borland\BCC55\Bin

4. To compile the file (example.c) use the following command
bcc32 example.c

5. Now if there exists no error in the source code you�ll get an executable file (example.exe) in the same location (C:\Borland\BCC55\Bin).

6. Now you have successfully compiled the source code into an executable file(.exe file).

NOTE: The above tutorial assumes that you�ve installed the compiler onto the C: drive (by default).

Create Restore Point in XP


1. Click the Start button -> All Programs -> Accessories -> System Tools -> System Restore.

2. When System Restore loads, select Create a Restore Point and click Next.


3. Type in a short description for the checkpoint in the box and click Create.


4. Once the restore point is created and Close.

Removing Temporary Files


Over time, your hard drive can become cluttered with temporary files left behind from applications and the operating system. These files not only take up space, but they can be tracks of activity on your computer. Removing the temporary files is a great way to clean up any garbage information that was left behind you'll then increase your privacy and also free up some disk space.

Windows has advanced greatly over the course of its existence. Back in the early versions of Windows, there was just one temp folder that all temp files were located in. With Windows XP, there are temp folders all over the place. To remove the files, you could go to all of the different folders and manually erase the files.

Clean your hard drive of temporary files, follow these step:

1. Click on Start -> Run -> Type in Run %temp% -> ok.

2. Open Windows Select All Items And Delete.

This Process Run Every 6 - 7 Day After.

Removing Stored User Name and Password in Mozila Firefox


When you visit a Web site that requires authentication or attempt to connect to remote computers, you are given the option to save your password so that the next time you visit the page or attempt to access a remote resource, you do not have to reenter your password. This feature can be a huge convenience, especially if you access a particular Web site or resource frequently. The downside to this convenience is the potential for horrible security and privacy problems. Essentially, you are taking the password off all of the sites and resources for which you saved a password. Anyone who has physical access to your computer can get in using your username and password, even if they do not know your password.

1. Open Mozila Firefox.

2
. C
lick on Tools -> options -> Security -> Seved Passwords -> Show Passwords -> Yes.

3. The Stored User Names and Passwords window will load, showing you a list of all of the accounts that are saved on your computer.

4. To remove a saved password, select the account on the list and click the Remove
button.

5. Repeat the previous steps for any other accounts that you want to remove.

6. When you are finished, just click Close.

You can also use the Stored User Names and Passwords window to add more user names and passwords to your computer.

File and Folder Permissions


Windows XP Professional boxes running the NTFS file system have the capability to set individual file permissions on both files and folders. File and folder permissions allow you to

specify exactly who will be able to read, write, execute, and even list or access a folder. So, file and folder permissions can be a very powerful tool to protect your data from others' eyes.

If your file system is FAT32, then you will not be able to set permissions. Fortunately, an easy way exists for you to convert your FAT32 file system to NTFS. Do a search in the Windows Help and Support Center for Convert to NTFS and you will be shown directions on how you can go about converting your drive's file system.

Setting the permissions on with a lot of control requires you to disable simple file sharing and security. To do so, follow these steps:

1. Open up any folder on your computer and expand the Tools menu and select Folder Options.

2. Click the View tab and scroll to the bottom of the Advanced Settings box.

3. Uncheck the Use Simple File Sharing option at the bottom of the list.

4. Click OK, and you are finished restoring full control over your file permissions.

Now that you have disabled simple file sharing, you can proceed and easily configure the permissions on any file or folder that you desire. Setting the permissions is very easy once you do it a few times. Follow these directions to set the permissions to maximize your privacy:

1. Right-click any file or folder for which you want to modify permissions and select Properties.

2. Then, click the Security tab. (When simple file sharing was enabled, this tab did not exist.)

3. First, remove all users from the group or username list to whom you do not want to give
access. It is a good idea to remove the Everyone group because this does include everyone that can access your computer. However, make sure that you do not accidentally remove your username from the list. Also watch out for the SYSTEM account. This is one account that the operating system uses to access files. Removing it may cause unexpected results. But, fortunately, if the system actually does need it, you can always add it again if you remove it and it causes problems.

If you are having difficulties removing users from the username list, this could be because the user is inherited from a parent folder. Permissions are passed down to all subfolders and files. If you want a user to have access to a folder but not its subfolders, then you will have to click the Advanced button on the security tab of the Properties window. Once the Advanced Security Settings window loads, uncheck the option that says Inherit from Parent the Permission Entries
that Apply to Child Objects. A Security notification box will pop up. Click the Remove button to remove all of the inherited permissions so that you can have full control of the folder.

4. Now that you have the list of users and groups taken care of, set the specific permissions that the user has on the file or folder. Select the name of the user that you want to modify, then check the corresponding boxes in the Permissions For list for the activities that you want them to be able to do.

5. When you have finished setting the permissions for all of the users, click OK to exit the Permissions screen.

Once you have set the permissions for all of sensitive directories, you will have greatly increased your security and privacy. Also keep in mind that file permissions are inherited. Every folder within a folder inherits the permissions of the parent folder unless they are specifically removed. Therefore, if you set the file permissions for a folder, all of the subfolders and files will be automatically set with the same permissions. File and folder permissions can be very useful. If you have a program on your computer that you do not want anyone else running, simply set the permissions on that folder so that only you can read and execute.

Encrypting Files


Another cool feature of Windows XP Professional's NTFS file system is its ability to encrypt files. Permissions on files and folders work well to protect them when the operating system is running. However, if special software and hardware are used, the raw data can be accessed on the hard drive. With the absence of the operating system running to protect its data, anyone can very easily lift the data off the drive no matter what permissions were set on the file. Such software and hardware is usually expensive and primarily used by data recovery companies and law enforcement agencies.

To protect your computer's files and folders from conventional recovery methods, you can encrypt the files. Doing so will scramble and encode the data within the files so that the only

data lifted off the hard drive with recovery tools when the operating system is not running will be scrambled garbage.

Encrypting files is not just for personal use. If you work for a company that has very sensitive information on their computers and laptops, you would be wise to encrypt the folders and files that contain important and confidential data. If you do so, the confidential information is a lot less likely to get out in the open should the hardware ever be stolen.

Before I go any further, I should mention that encrypting files is not always 100 percent secure. All files that are encrypted can eventually be cracked. It is only a matter of time before a high- speed computer that is trying every possible encryption key finds the correct key. Nevertheless, there are millions, if not billions, of possible keys. As you can imagine, even with the fastest computers in the world, cracking the key will take some time (several, if not hundreds of
years). But there always is the chance that someone could randomly pick the correct key, although the odds of that happening are about equal to winning the lottery twice in your lifetime.

Now that you know about how encrypting files can help your privacy and security, get started encrypting files. Encrypting a file is as simple as changing a file attribute. Follow these steps to tell Windows to encrypt a file:

1. Right-click a file or folder and select Properties.

2. Then, click the Advanced button next to Attributes.

3. The Advanced Attribute window will load. Check the box to enable encryption.

4. Click OK to return to save your change.

5. Select OK once more to close the Properties window and activate encryption.

Once all of your sensitive files are encrypted, your privacy and security are greatly increased. Setting your file permissions and enabling encryption is the perfect combination for protecting your sensitive files.

Sunday, March 6, 2011

Rename and Assign password guest account


Windows XP includes a guest account that is disabled by default. However, at some time, this account may be enabled by an application. If you have Windows XP Professional, I recommend that you disable this account using the old Windows 2000 Local User and Group application. Just in case it becomes enabled again, I recommend that you rename the guest account and also assign it a password. Follow these steps to disable the guest account:

1. Click the Start button and select Run.

2. Key in lusrmgr.msc and click OK.

3. The Local User and Group application will launch. click on user account and Right-click the Guest username and select Set Password.

4. You will be prompted with a warning screen. Just click Proceed.

5. Type a complex password in both boxes and click OK.

6. The password has now been set. Next, rename the account by right-clicking it and selecting Rename.

7. Type in a new name, such as Disabled, and click Enter to save the changes.

The vulnerable guest account is now less of a problem.