Monday, August 31, 2009

Services You Can Disable

There are quite a few services you can disable from starting automatically. This would be to speed up your boot time and free resources. They are only suggestions so I suggestion you read the description of each one when you run Services and that you turn them off one at a time.

Some possibilities are:

  • Alerter - Sends alert messages to specified users that are connected to the server computer.
  • Application Management - Allows software to tap directly into the Add/Remove Programs feature via the Windows Installer technology.
  • Background Intelligent Transfer Service - The Background Intelligent Transfer service is used by programs (such as Windows AutoUpdate) to download files by using spare bandwidth.
  • Clipbook - ClipBook permits you to cut and paste text and graphics over the network.
  • Error Reporting Service - Allows applications to send error reports to Microsoft in the event of an application fault.
  • Fast User Switching - Windows XP allows users to switch quickly between accounts, without requiring them to log off.
  • Help and Support - Allows the XP Built-in Help and Support Center to run.
  • IMAPI CD-Burning COM Service - You don't need this if you have other software to create CDs.
  • Indexing Service - Indexes contents and properties of files on local and remote computers; provides rapid access to files through flexible querying language.
  • IP SEC - Manages IP security policy and starts the ISAKMP/Oakley (IKE) and the IP security driver. If you are not on a domain, you likely don't need this running.
  • Messenger - Transmits net send and Alerter service messages between clients and servers. This is how a lot of pop-up windows start appearing on your desktop.
  • Net Logon - Supports pass-through authentication of account logon events for computers in a domain. If you are not on a domain, you don't need this running
  • Network DDE - Provides network transport and security for Dynamic Data Exchange (DDE) for programs running on the same computer or on different computers.
  • NT LM Security Support Provider - Provides security to remote procedure call (RPC) programs that use transports other than named pipes.
  • Performance Logs and Alerts - Collects performance data from local or remote computers based on preconfigured schedule parameters, then writes the data to a log or triggers an alert. If you don't need to monitor your performance logs, then you don't need this service.
  • Portable Media Serial Number - Retrieves the serial number of any portable music player connected to your computer
  • QOS RSVP - Provides network signaling and local traffic control setup functionality for QoS-aware programs and control applets.
  • Remote Desktop Help Session Manager - Manages and controls Remote Assistance. If you are not using Remote Desktop you don't need this service.
  • Remote Registry - Enables remote users to modify registry settings on this computer.
  • Routing & Remote Access - Offers routing services to businesses in local area and wide area network environments. Allows dial-in access.
  • Secondary Login - Enables starting processes under alternate credentials. This is what allows you to run an application as another user.
  • Smart Card - Manages access to smart cards read by this computer.
  • Smart Card Helper - Enables support for legacy non-plug and play smart-card readers used by this computer.
  • SSDP Discovery Service - Enables discovery of UPnP devices on your home network.
  • TCP/IP NetBIOS Helper - Enables support for NetBIOS over TCP/IP (NetBT) service and NetBIOS name resolution. This should not be needed in today's network environment.
  • Telnet - Enables a remote user to log on to this computer and run programs, and supports various TCP/IP Telnet clients.
  • Uninterruptible Power Supply Service - Manages an uninterruptible power supply (UPS) connected to the computer.
  • Universal Plug and Play Device Host - Provides support to host Universal Plug and Play devices
  • Upload Manager - Manages synchronous and asynchronous file transfers between clients and servers on the network.
  • Volume Shadow Copy Service - Manages and implements Volume Shadow Copies used for backup and other purposes.
  • Web Client - Enables Windows-based programs to create, access, and modify non-local files across the Internet.
  • Wireless Zero Configuration - Provides automatic configuration for the 802.11 adapters
  • WMI Performance Adapter - Provides performance library information from WMI HiPerf providers.

Tuesday, August 25, 2009

Converting FAT32 to NTFS is simpler than thought??

How to Convert your FAT32 WINXP to NTFS WINXP?

1. Go start Menu.
2. Run
3. Type CMD.
4. here Type D: and enter
5. Now Type convert C:/FS:NTFS and enter
Note: This will convert only C Drive, to convert the other Drives, follow the same process by changing C: to D: / E: / F:..... or whatever Drive you want to convert.

Conversion Process will take place only after a restart.

cheers

by Shakti

Tuesday, August 18, 2009

Increase the maximum number of simultaneous downloads

You can tweak the registry so that Windows will let you download 10 files at a time:
1. Navigate through the Registry Editor to
HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings.
2. Create a new DWORD named MaxConnectionsPerServer and assign it a value of 0000000a.
3. Create a new DWORD named MaxConnectionsPer1_0Server and assign it a value of 0000000a.

Disable AutoPlay

It's easy to create a registry setting that disables AutoPlay:
1. Navigate through the Registry Editor to; HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer.
2. Create a DWORD named NoDriveTypeAutoRun.
3. Set the value to 000000FF.

Monday, August 17, 2009

How to Change MAC Address

Notice:
People says MAC/Physical Address cannot be changed, there are ways to Spoof your MAC address.

Here is the simple steps to get it done:
  • Go to Network Neighbourhood
  • Properties.
  • Here LAN Connection
  • properties
  • Configure
  • Advance
  • network address,
  • here change the value to anything you want "0000000S9740"
  • Click ok
Your MAC address is changed as well as your internal IP Address.

Note: External IP Address will be same for any number of user under certain "workgroup" or "domin"

Monday, August 3, 2009

How to Create a Shortcut for your Favourite folder, accessing from RUN Command.

Here are the Simplest Tips on how to Add your favourite folder and Access it using a Run Command:
  1. First Select You Favourite Folder in any Drive. e.g.: D:\My Videos
  2. Create Shortcut of this particular folder. e.g.: D:\Shortcut to My Videos.lnk
  3. Rename the Folder as simplest as you care. e.g.: D:|Vid.lnk
  4. Open Windows Folder in the C Dirve.
  5. Copy this Shortcut file and Paste is in the windows folder.
  6. Now Go to Start Menu
  7. Open RUN
  8. Type "<Given shortcut name>" and enter. e.g.: "vid"
See, your favourite folders are 2 commands away, Cheers:)

By Shakti


Add and Remove Programs has been restricted









How to Enable this Applet.

  1. Simply go to start menu.
  2. Open Run.
  3. Type "regedit" and enter.
  4. Here Locate:
    HKey_Current_User\Software\Microsoft\Windows\CurrentVersion\Policies\uninstall
  5. Now in the Right Pane/windows, Delete the DWord string "NoAddRemoveProgram"
  6. Now endprocess the Explorer.exe.
This process will enable the Add and Remove Programs restriction.

System Alert popup instructions for windows xp and vista.

Are you one of those who got the annoying ad blinking system alert popup on the taskbar? If you are, then yu are in the right Page.

The rapidly-developing internet has poseted a lot of treats to our daily online activities and securities. To name a few spyware, adware, torjan and viruses etc... They can potentially steal your data oor even bring down you computer.
Fake or false system alert popup, one of many syndromes of the potential treats you might see, is usually installed via a Torjan called Zlob (Torjan.Zlob). MOst people get the ZLob torjan by installing a video codec from one of those social networking. The Zlob Torjans then generats fake system popup alert to trick you into buying of their product.

To Remove this completely, it takes patients and some basic computer skills.

Manual Removal Instruction: (For Windows 2000/XP/Vista)
Stop the following running processes if exists:
How to stop a process: Press “Ctrl+Alt+Del” key or “Ctrl+Shift+Esc” key to open task manager, click on process tab, then select the required process and click end process.
Note: End Process can happen only one at a time.

Here are the Processes that needs to be killed:


spydawn.exe, dfrgsrv.exe, ismon.exe, pmsnrr.exe, Spy-Locked.exe, pesttrap.exe, mscornet.exe, isnotify.exe, regperf.exe, SpywareLock.exe, antivermins.exe, mssearchnet.exe, issearch.exe, ishost.exe, SpywareLocked 3.5.exe, AntiVerminsPro.exe, nvctrl.exe, pmmon.exe, SpywareLocked.exe, SpyLocked 3.6.exe, spywarequake.exe, spyfalcon.exe, pmsngr.exe, spylocked.exe.


Unregister the following DLL Files if exists:
How to unregister a dll file: Go to “start menu”, “Run”, type “regsvr32 /u ” and enter, this will uninstall that dll file.

msvcp71.dll,
czxtyx.dll, qvjpt.dll, oyopu.dll, dxovx.dll, Ygjun.dll, higehsg.dll, bpvol.dll, oyopu.dll, yronl.dll, czxtyx.dll, yuspej.dll, xkrdk.dll, splug.dll, yronl.dll, isadd.dll, bpvol.dll, uimcu.dll, cthkpcv.dll, dxovx.dll, tahxqcj.dll, pkgvyg.dll, splug.dll, pkgvyg.dll, axlet.dll, lcsrsrv.dll, iesbpl.dll, qzviz.dll, qzviz.dll, ginuerep.dll, heur003.dll, Ygjun.dll, isadd.dll, tahxqcj.dll, heur001.dll, higjxe.dll, heur002.dll, yuspej.dll, imfdfcj.dll, lcsrsrv.dll, heur000.dll, bolnyz.dll, hvnwm.dll, yhbdupd.dll, qvjpt.dll, iesplg.dll, dxmpp.dll, wfkduei.dll, winrge32.dll, ywbicim.dll, wfkduei.dll.

Remove the following Registry Values if Exists:

How to delete a registry value: Go to “start menu”, “Run”, type “Regedit” and Enter, Here locate the following Locations and delete the key/String.
  1. HKEY HKEY_LOCAL_MACHINE\SOFTWARE\SpyDawn
  2. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows \CurrentVersion \App Paths\SpyDawn.exe
  3. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows \CurrentVersion \Uninstall\SpyDawn
  4. HKEY_CLASSES_ROOT\TypeLib\{661173EE-FA31-4769-97D4-B556B5D09BDA}
  5. HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{661173EE-FA31-4769-97
  6. HKEY_LOCAL_MACHINE\software\antivermins
  7. HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\antivermins.exe
  8. HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run antivermins
  9. HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\antivermins
  10. HKEY_CURRENT_USER\Software\SNO2 HKEY_CURRENT_USER\Software\PestTrap
  11. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SpywareQuake
  12. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\E2CA7CD1-1AD9-F1C4-3D2A-DC1A33E7AF9D
  13. HKEY_LOCAL_MACHINE\SOFTWARE\SpywareQuake\refid:”1″
  14. HKEY_LOCAL_MACHINE\SOFTWARE\SpywareQuake\Language:”1033″
  15. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SpyQuake2.com

Find and Delete the following Files if Exists:

msvcp71.dll,
ginuerep.dll, kuhmk.dll, vwfps.dll, heur000.dll, wfkduei.dll, higehsg.dll, oqipt.dll, fyhhxw.dll, kcaofg.dll, twain32.dll, hvnwm.dll, xkrdk.dll, iqzv.dll, msvcr71.dll, cthkpcv.dll, higjxe.dll, imfdfcj.dll, geplxss.dll, htey.dll, appmagr.dll, axlet.dll, bolnyz.dll, yhbdupd.dll, tvomnc.dll, ulztc.dll, msvcp71.dll, heur003.dll, wfkduei.dll, dxmpp.dll, hjpprpu.dll, oerucu.dll, reglogs.dll, heur002.dll, winrge32.dll, spydawn.exe, cvnzie.dll, mssearchnet.exe, rosdzop.dll, heur001.dll, ywbicim.dll, ismon.exe, isnotify.exe, spywarequake.exe, regperf.exe, sbnudh.dll, pmsngr.exe, nvctrl.exe, issearch.exe, spywarequakeinstaller.exe, dfrgsrv.exe, spyfalcon.exe, pmsnrr.exe, nvctrl.exe, pmmon.exe, AntiVerminsPro.exe, pesttrap.exe, antivermins.exe, ishost.exe, mscornet.exe.

That’s it! In order to avoid the malicious spyware and adware in the future, educate yourselves and be careful with ActiveX Components, Toolbars and JavaScript plugins.

My Best Suggestion is to Download a Free Antvirus, Update it completely and Scan you computer.

Saturday, August 1, 2009

Error: “Excel cannot access example.xls. The Document may be read only or encrypted”

Notice:
This is happening because you are accesssing a file which has read only permission or permission not set at all...
Resolution:

- In case of FAT file format, Simply go to properties of that particular file and uncheck the read only check box. if the box is not ticked, then tick and un-tick it and apply. This will replace the file permission.

- If NTFS file format, Go to folder Option > View > Uncheck “use simple file sharing”.
Note: This will enable the security tab in "XP NTFS File Format"
- Now right click on the file or folder you are accessing.

- Properties > security tab

- If the entire or required user groups exist, check for the recommended permissions for the particular users.
Now click on advance tab and check “replace permissions entries on all child objects....”
- If the entire or required user groups doesn’t exists, Click on Add, Select users > Type the users name as per the recommendation.
Click advance tab and “replace permissions entries on all child objects…”
This will Enable the required permission to access that particular file.