Best-Tweaks

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 17 January 2007

Messy Trick

Posted on 20:01 by Unknown



Trick with which your yahoo messenger will show you offline but ur id will appear in bold letter.It's very easy anyone can do it. Just follow these steps.










1) Download this picture from this link.
http://i112.photobucket.com/albums/n171/sexc_boy/um.png

2) Put it in ur Display picture on messenger.

3) Now it should show you offline with bold id.

Follow step 4 only if trick isnt working after ur done with 1st 3 steps.
4) Restart your messenger.
Read More
Posted in Yahoo-Tweaks | No comments

Cool Browser Trick

Posted on 00:27 by Unknown
Paste this into your address bar. ( Works on IE )

For Circles:

javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);

For Tan curve Water falls:

javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.tan(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.tan(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);
Read More
Posted in Browser-Tweaks | No comments

Sunday, 14 January 2007

Put Muscle in Your Device Manager!

Posted on 18:58 by Unknown
In WindowsXP and 2000, the Device Manager is an indispensible tool for keeping your system healthy. There are several different ways to access Device Manger, and they all require at least two steps before the console opens. In order to effectively diagnose problems you should always click the 'view' button and select "show hidden devices".

I've written a small batch file I keep handy on the desktop, that opens Device manager with a simple double-click. Just copy and paste this in Notepad:

set DEVMGR_SHOW_NONPRESENT_DEVICES=1
start devmgmt.msc

Then "Save as type" = "All Files", and name the file "setdev.bat" (without the quotes!).

When the console opens you'll still need to select "show hidden devices", only now you really will be able to see ALL the hidden devices that Windows so dutifully keeps in the registry.

How does that affect performance? Simple; Unless you already are in the habit of keeping things tidied up on a regular basis, every device you've ever installed then later removed will be right there with a greyed-out icon. And every time you boot, Windows has to sort through all that garbage before it can run the devices that actually are installed.

To demonstrate the difference: In the view below is the standard Device Manager on the left, and on the right is the Device Manger opened with the "setdev.bat" file.



On the left you can see nine generic volumes {which represents two hard drives partitioned into four volumes each, and one USB flash drive}. On the right you can see those same nine generic volumes and seven 'hidden' volumes. Those hidden volumes reflect the fact that I recently replaced a hard drive, and repartitioned the remaining drive. This is only one example of what you can clean-up. The same is true for all the rest of the devices.

I'm gonna' get busy and uninstall all this crap!

Read More
Posted in Computer-Tweaks | No comments

How to Bypass BIOS Passwords

Posted on 18:48 by Unknown
BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS

DISCLAIMER
This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to crack the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. LabMice.net is not responsible for the use or misuse of this material, including loss of data, damage to hardware, or personal injury.


Before attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:

Using a manufacturers backdoor password to access the BIOS

Use password cracking software

Reset the CMOS using the jumpers or solder beads.

Removing the CMOS battery for at least 10 minutes

Overloading the keyboard buffer

Using a professional service

Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.


--------------------------------------------------------------------------------

Backdoor passwords

Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.

WARNING: Some BIOS configurations will lock you out of the system completely if you type in an incorrect password more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords

Award BIOS backdoor passwords:

ALFAROME ALLy aLLy aLLY ALLY aPAf _award AWARD_SW AWARD?SW AWARD SW AWARD PW AWKWARD awkward BIOSTAR CONCAT CONDO Condo d8on djonet HLT J64 J256 J262 j332 j322 KDD Lkwpeter LKWPETER PINT pint SER SKY_FOX SYXZ syxz shift + syxz TTPTHA ZAAADA ZBAAACA ZJAAADC 01322222
589589 589721 595595 598598

AMI BIOS backdoor passwords:

AMI AAAMMMIII BIOS PASSWORD HEWITT RAND AMI?SW AMI_SW LKWPETER A.M.I. CONDO

PHOENIX BIOS backdoor passwords:

phoenix, PHOENIX, CMOS, BIOS

MISC. COMMON PASSWORDS

ALFAROME BIOSTAR biostar biosstar CMOS cmos LKWPETER lkwpeter setup SETUP Syxz Wodj

OTHER BIOS PASSWORDS BY MANUFACTURER

Manufacturer Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
TMC BIGO
Toshiba Toshiba

TOSHIBA BIOS

Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot

IBM APTIVA BIOS

Press both mouse buttons repeatedly during the boot


--------------------------------------------------------------------------------

Password cracking software

The following software can be used to either crack or reset the BIOS on many chipsets. If your PC is locked with a BIOS administrator password that will not allow access to the floppy drive, these utilities may not work. Also, since these utilities do not come from the manufacturer, use them cautiously and at your own risk.

Cmos password recovery tools 3.1
!BIOS (get the how-to article)
RemPass
KILLCMOS

--------------------------------------------------------------------------------

Using the Motherboard "Clear CMOS" Jumper or Dipswitch settings

Many motherboards feature a set of jumpers or dipswitches that will clear the CMOS and wipe all of the custom settings including BIOS passwords. The locations of these jumpers / dipswitches will vary depending on the motherboard manufacturer and ideally you should always refer to the motherboard or computer manufacturers documentation. If the documentation is unavailable, the jumpers/dipswitches can sometimes be found along the edge of the motherboard, next to the CMOS battery, or near the processor. Some manufacturers may label the jumper / dipswitch CLEAR - CLEAR CMOS - CLR - CLRPWD - PASSWD - PASSWORD - PWD. On laptop computers, the dipswitches are usually found under the keyboard or within a compartment at the bottom of the laptop.
Please remember to unplug your PC and use a grounding strip before reaching into your PC and touching the motherboard. Once you locate and rest the jumper switches, turn the computer on and check if the password has been cleared. If it has, turn the computer off and return the jumpers or dipswitches to its original position.


--------------------------------------------------------------------------------

Removing the CMOS Battery

The CMOS settings on most systems are buffered by a small battery that is attached to the motherboard. (It looks like a small watch battery). If you unplug the PC and remove the battery for 10-15 minutes, the CMOS may reset itself and the password should be blank. (Along with any other machine specific settings, so be sure you are familiar with manually reconfiguring the BIOS settings before you do this.) Some manufacturers backup the power to the CMOS chipset by using a capacitor, so if your first attempt fails, leave the battery out (with the system unplugged) for at least 24 hours. Some batteries are actually soldered onto the motherboard making this task more difficult. Unsoldering the battery incorrectly may damage your motherboard and other components, so please don't attempt this if you are inexperienced. Another option may be to remove the CMOS chip from the motherboard for a period of time.
Note: Removing the battery to reset the CMOS will not work for all PC's, and almost all of the newer laptops store their BIOS passwords in a manner which does not require continuous power, so removing the CMOS battery may not work at all. IBM Thinkpad laptops lock the hard drive as well as the BIOS when the supervisor password is set. If you reset the BIOS password, but cannot reset the hard drive password, you may not be able to access the drive and it will remain locked, even if you place it in a new laptop. IBM Thinkpads have special jumper switches on the motherboard, and these should be used to reset the system.


--------------------------------------------------------------------------------

Overloading the KeyBoard Buffer

On some older computer systems, you can force the CMOS to enter its setup screen on boot by overloading the keyboard buffer. This can be done by booting with the keyboard or mouse unattached to the systems, or on some systems by hitting the ESC key over 100 times in rapid succession.


--------------------------------------------------------------------------------

Jumping the Solder Beads on the CMOS

It is also possible to reset the CMOS by connecting or "jumping" specific solder beads on the chipset. There are too many chipsets to do a breakdown of which points to jump on individual chipsets, and the location of these solder beads can vary by manufacturer, so please check your computer and motherboard documentation for details. This technique is not recommended for the inexperienced and should be only be used as a "last ditch" effort.


--------------------------------------------------------------------------------

Using a professional service

If the manufacturer of the laptop or desktop PC can't or won't reset the BIOS password, you still have the option of using a professional service. Password Crackers, Inc., offers a variety of services for desktop and laptop computers for between $100 and $400. For most of these services, you'll need to provide some type of legitimate proof of ownership. This may be difficult if you've acquired the computer second hand or from an online auction.
Read More
Posted in Computer-Tweaks | No comments

Wednesday, 10 January 2007

Speed DSL

Posted on 09:58 by Unknown
To improve download performance, certain parameters being used by Windows for the TCP/IP protocol can be modified or tweaked. We have done testing here in our office that shows these modfications can reduce download (receiving) time, i.e. increase the speed of the download, by more than 50%. The improvements can be seen the most on systems using the Windows 98 operating system, though even Windows 2000 systems should see a benefit.

Please note that you are not required to "tweak" your system to use DSL. These suggestions are made only to allow you to enhance the performance of your system and it is your decision whether to implement these changes on your system or not.Our tests have shown that with the Windows 2000 system, download speeds averaged around 200Kbps to 300Kbps (25 KBps to 37.5 KBps) without tweaking. After tweaking the TCP/IP settings for Windows 2000, speeds averaged around 450Kbps to 600Kbps (56.25 KBps to 75 KBps).With the Windows 98 system, download speed averaged around 150Kbps to 250Kbps (18.75KBps to 31.25KBps) without tweaking. After tweaking the TCP/IP settings, speeds averaged around 350Kbps to 550Kbps (43.75KBps to 68.75KBps). Here are the "tweaks" that you can try on your system to improve performance.The Received Window (RWIN) size is the most specific parameter that can be changed. For an in-depth explanation on TCP/IP settings for the curious or technically inclined, see the following link.

http://www.dslreports.com/tweaks/RWIN
Our test systems included a Windows 2000 Professional and a Windows 98 machine.To help in checking for any improvements during tweaking, the following site was used for test comparisons.
http://www.dslreports.com/stest
Do speed tests in the morning to eliminate any issues with network congestion and use the Linkline test site since it has fewer hops (number of routers to reach the site) compared to Megapath. The number of hops is one factor that affects the speed of downloads from different sites. The software utility being used for tweaking TCP/IP settings on Windows can be downloaded from this site.
http://www.dslreports.com/front/drtcp.html
Answers to frequently asked questions (FAQs) regarding tweaking could be found at this link
http://www.dslreports.com/faq/tweaks
Read More
Posted in Internet-Tweaks | No comments

Internet Explorer 7 Useful Settings

Posted on 09:57 by Unknown
These are some tips for IE7..

How to change the ClearType font
Open Internet Explorer and go to Tools -> Internet Options -> Advanced. Under the settings panel you will find the Multimedia Options. Uncheck the first option “Always use ClearType for HTML” and click OK. Restart IE7 and you are done. The standard font will be used.

Use the new implemented RSS function
This new function will let you view RSS feed on webpages. As you already know, RSS feeds are very useful to inform Internet users about changes that take place on websites. For example, Softpedia provides a RSS feed with all the latest downloads and news available on softpedia.com.

You can subscribe to Softpedia feed to be informed very quickly with the latest downloads. So, open Softpedia.com and - in the right corner of Internet Explorer - click the orange button representing the RSS icon. A preview page of the feed will be displayed.

On top of the page, you will be able to subscribe to the feed. Click “Subscribe to this feed”. In the window that will be displayed you can change the name of the feed and organize the feeds using folders. Click Subscribe and you are up to date!

More Tabs, multiple homepages

Just go to Tools -> Internet Options and, under the General tab, in the Homepage field type in your main sites, then click OK. Next time you start IE7 you will have your sites served.
Read More
Posted in Browser-Tweaks | No comments

Show your MSN Status in your Signature on Forums, u will lov

Posted on 05:14 by Unknown
This will show your msn status in your sig or wherever you want to put it

You have to have msn, and add a new contact, Add:

msnbot9@bencastricum.nl

Too your contact list. Open a conversation with the contact you just added (msnbot9@bencastricum.nl) and type:

!uid

A long code like this (ccfb48cc-00b7-4472-bc90-581e23f3be30) should show up on the screen DONT CLOSE THE CONVO YET!

*NOTE* If you are getting an error “uid is not available, contact not on FL contact list”
DELETE the bot you added and add a new bot. So if you added msnbot9@bencastricum.nl Change the 9 to a 7 *there are 30 bots* and repeate the last step.

Now go into edit your signature for this forum. and enter this, under or above what ever you already have there.

Now delete the part and replace it with the code you got from the bot before. Then put it in your sig!

It works Also works with away and busy
Read More
Posted in Other-Tweaks | No comments

Monday, 8 January 2007

Lock a folder without any software

Posted on 02:46 by Unknown
Suppose you want to lock the folder games in d: which has the path D:\Games.In the same drive create a text file and type
ren games games.{21EC2020-3AEA-1069-A2DD-08002B30309D}
Now save this text file as loc.bat

create another text file and type in it
ren games.{21EC2020-3AEA-1069-A2DD-08002B30309D} games
Now save this text file as key.bat

Now you can see 2 batch files loc and key.Press loc and the folder games will change to control panel and you cannot view its contents.Press key and you will get back your original folder.
Read More
Posted in Computer-Tweaks | No comments

Friday, 5 January 2007

How To Trace The Spam Mail

Posted on 05:53 by Unknown
Spammers often forge the headers of their email in an attempt to avoid losing their accounts and to evade email filters. These notes may help you track the source of spam. The most important thing is to have a mail reader that can show you the full headers of an email in question. The important lines are as follows:
From:
Who the message is from. This is the easiest to forge, and thus the least reliable.

From
As distinct from the "From:" line. This line is not actually part of the email header, but mail transfer software often inserts it when the mail is received. Many Unix mailers use this line to separate messages in a mail folder. This line will always be the first line in the headers.
This line can also be forged, but not always.


Reply-To:
The address to which replies should be sent. Often absent from the message, and very easily forgeable. However, it often provides a clue. For example, forged spam often has a legitimate Reply-To: field so that the spammer can receive mail orders.

Return-Path:
The email address for return mail. Same as Reply-To:

Sender:
The account that sent the message. Mail software is supposed to insert this line if the user modifies the From: line. Most Mail software is broken in this respect, so this line is rarely present. Some mailers provide an X-Sender: line.

Message-ID:
A unique string assigned by the mail system when the message is first created. This is also forgeable in most cases, but requires a little more specialized knowledge than forging the From: line. Also, the Message-ID: often identifies the system from which the sender is logged in, rather than the actual system where the message originated.
The format of a Message-ID: field is @

Each kind of mail software has its own style of unique string. Sloppy forgeries often get it wrong, thus a forgery can be confirmed by comparing the message id with some legitimate messages from that same site.


Received:
These are the most reliable lines in the header. They form a list of all sites through which the message traveled in order to reach you. They are completely unforgeable after the point where it was injected. Up to that point, they may be forgeries.
Received: lines are read from bottom to top. That is, the first Received: line is your own system or mail server. The last (non-forged) Received: line is where the mail originated.

Each mail system has their own style of Received: line. A Received: line typically identifies the machine that received the mail and the machine that the mail was received from. I.e.:


Received: from foo.com by bar.com id AA15057; Fri, 25 Jul 97 09:39:02

The "foo.com" part is the name that the sending machine used to identify itself. This may be forged in the case of spam. The id is for logging purposes and may help system administrators track the spam if you can get them to cooperate with you.
Many mailers will add extra information. For example:

Received: from foo.com ([129.2.3.4]) by bar.com id AA15057; Fri, 25 Jul 97 09:39:02

In this case, bar.com has inserted the IP address of the sending system. If the machine name does not match the IP address, then you have likely identified the point where the mail was forged. In other words, the machine whose address is 129.2.3.4 lied when it identified itself as foo.com. Any Received: lines that follow are likely to be forgeries.
If the IP address does not make sense (for instance, no component may be greater than 255), then this entire Received: line is a fake. Contact a system admin for more advice in determining if an IP address is bogus. If the entire Received: line is fake, then the injection point is somewhere above in the headers.

Sometimes you will see

Received: from foo.com (x.y.alterdial.uu.net [129.2.3.4]) by bar.com id AA15057; ...

In this case, the mailer has inserted both the IP address and the real name of the sending system. This will help you identify forgeries and eliminate the need to look up the IP address by hand.

Comment:
Some mailers may add additional information to the headers, such as "Authenticated sender is doe@foo.com". Forged Comment: lines can be easily added to outgoing mail, so this line is likely to be fake, but not always.
Other mailers may insert their own authentication information in the headers.

Here is an example of a forgery:
From webpromo@denmark.it.earthlink.net Tue Jul 8 13:05:02 1997
Return-Path:
From: webpromo@denmark.it.earthlink.net
Received: from denmark.it.earthlink.net (denmark-c.it.earthlink.net
[204.119.177.22]) by best.com (SMI-8.6/mail.byaddr) with ESMTP id
NAA21506 for ;
Tue, 8 Jul 1997 13:05:16 -0700
Received: from mail.earthlink.net (1Cust98.Max16.Detroit.MI.MS.UU.NET
[153.34.218.226]) by denmark.it.earthlink.net (8.8.5/8.8.5)
with SMTP id NAA12436; Tue, 8 Jul 1997 13:00:46 -0700 (PDT)
Received: from adultpromo@earthlink.net by adultpromo@earthlink.net
(8.8.5/8.6.5) with SMTP id GAA05239 for ;
Tue, 08 Jul 1997 15:48:51 -0600 (EST)
To: adultpromo@earthlink.net
Message-ID: <199702170025.GAA08056@no-where.net>
Date: Tue, 08 Jul 97 15:48:51 EST
Subject: Hot News !
Reply-To: adultpromo@earthlink.net
X-PMFLAGS: 12345678 9
X-UIDL: 1234567890x00xyz1x128xyz426x9x9x
Comments: Authenticated sender is
Content-Length: 672
X-Lines: 26
Status: RO

Obviously, the To: line is a forgery; the actual recipients list was hidden, probably with a blind carbon-copy (Bcc: header)
The "From", "Return-Path:" and "From:" all identify the same email address, but that may be a forgery. You can try mailing to the given address and see if your complaint bounces.

The "To:", "Reply-To:" and "Authenticated sender" lines all identify a different account. Again, these may all be forgeries.

The Message-ID: line is an obvious fake.

The first Recieved: line shows the mail arriving at my service provider from Earthlink. I trust my service provider, so this line is almost certainly valid.

The second Received: line shows this inconsistency:


... from mail.earthlink.net (1Cust98.Max16.Detroit.MI.MS.UU.NET [153.34.218.226])

In other words, the machine that delivered the mail to denmark.it.earthlink.net identified itself as mail.earthlink.net but was actually named 1Cust98.Max16.Detroit.MI.MS.UU.NET. This is very likely a lie. However, Earthlink rents POPs from Uunet, so this might be an Earthlink customer dialing in from Uunet.
The third Received: line is completely bogus. If the mail came from a dial-in customer at Uunet, there wouldn't be any more Recieved: lines. If the mail was being relayed from Uunet, this Received: line would indicate Uunet, not Earthlink. Further, this Received: line contains email addresses, not machine names.

Clearly, this email was forged to make it look like it came from Earthlink but was actually injected from Uunet. Whether this was by an Earthlink customer or some other Uunet customer is impossible to tell without cooperation from Earthlink sysadmins.

Here is another forgery:

Received: from cola.bekkoame.or.jp (cola.bekkoame.or.jp [202.231.192.40])
by srv.net (8.8.5/8.8.5) with ESMTP id BAA00705
for ; Wed, 30 Jul 1997 01:15:27 -0600 (MDT)
From: beautifulgirls585@aol.com
Received: from cola.bekkoame.or.jp
(ip21.san-luis-obispo.ca.pub-ip.psi.net [38.12.123.21]) by
cola.bekkoame.or.jp (8.8.5+2.7W/3.5W) with SMTP id OAA11439;
Wed, 30 Jul 1997 14:35:50 +0900 (JST)
Received: from mailhost.aol.com(alt1.aol.com(244.218.07.32)) by
aol.com (8.8.5/8.6.5) with SMTP id GAA00075 for <"">;
Tue, 29 Jul 1997 22:19:42 -0600 (EST)
Date: Tue, 29 Jul 97 22:19:42 EST
Subject: You can have what you want...
Message-ID: <574857638458.HWF39862@aol.com>
Reply-To: beautifulgirls585@aol.com
X-PMFLAGS: 56354433 0
Comments: Authenticated sender is
X-UIDL: vjg79u26gfkjjrty38jf983j309jfyrw

Here, the second Received: line indicates that "cola.bekkoame.or.jp" received the mail from a machine which identified itself as "cola.bekkoame.or.jp", but was in fact "ip21.san-luis-obispo.ca.pub-ip.psi.net". This mail was probably forged from a Psi.net dial-in account.
As a final proof, the IP address mentioned in the third Received: line cannot be matched via whois or traceroute. It certainly doesn't match AOL, indicating that this line is bogus.
Read More
Posted in Other-Tweaks | No comments

Wednesday, 3 January 2007

Ten steps to a more secure computer

Posted on 15:55 by Unknown
1.Use antivirus software and keep it updated daily- UCI has several software purchase programs for discounted pricing
2.Apply software updates regularly and consistently
3.Use a desktop firewall whenever possible- check with your local desktop support team first
4.Use strong passwords with a minimum of 6 characters- uppercase, lowercase letters, symbols and numbers
5.Change all of your passwords regularly
6.Make routine backups of your critical files
7.Do not open emails that you don't recognize the author or that look suspicious to you- you can call your local support team for more information
8.Don't post passwords or usernames in plain sight- post it notes on your monitor with passwords and usernames break most security processes
9.Turn off your computer at night and on weekends- check with your local desktop support team first if this will break nightly updates or backup procedures
10.Don't leave old computers online- disconnect them or turn them off


Apply software updates regularly and consistently
We recommend that you use an automated software update service for your software. NACS and AdCom each have support services for updating desktops and servers with the latest hot fixes. Please contact the Help Desks for more information on these services.

Use a desktop firewall whenever possible- check with your local desktop support team first
Using a firewall on your local desktop will normally help you mitigate network attacks that exploit security flaws in your operating system. The decision to use a firewall is going to be determined by the way your local support team operates. If you have a formal support team then they will et you know if you need a firewall, but if you are self supported then you will definitely want to consider using the host based firewalls that work on Linux, UNIX and Windows XP.

Use strong passwords with a minimum of 6 characters- uppercase, lowercase letters, symbols and numbers
A three digit password of lower case letters can be cracked in seconds. A complex password usually will take days or weeks to break. Using a number or symbol in the middle of your password is a simple way to make your password more secure.

Change all of your passwords regularly
If your password changes regularly you will make it harder for someone to use your password without your knowledge. If you change a password and you notice a few days later that your account is locked out then you might have someone trying that old password.

Make routine backups of your critical files
If you don't use a server to store your critical files and you don't have a desktop backup service such as Backup Exec, NetBackup or Legato then you should consider using a CD-Recordable drive to copy files to a secure location. A disk failure usually will happen quickly and you may not have time to copy files at that point

Do not open emails that you don't recognize the author or that look suspicious to you
New viruses usually try to get your attention with Subject lines that look unique. If the email doesn't look legitimate then don't open it. You can look up the latest email and virus issues at the NACS Security site in the Symantec Security Alerts window. The easiest way to stay secure is to use the campus mail servers to get your email, or make sure your local mail server uses Antivirus software on them.

Don't post passwords or usernames in plain sight
One of the most common methods of hacking is internal exploitation of resources. If you have a truly complex password, writing it down defeats the purpose. Use a naming scheme or question to help you remember the password. You can usually remember those passwords easily and keep your security standards high.

Turn off your computer at night and on weekends
A computer that is always on is easily probed for security problems. Turning off a computer on weekends saves power and can prevent unnoticed network abuse. If your local support team uses weekends or weeknights for software updates then you may want to keep the system online, but if that isn't the case then save energy and shut the system down.

Don't leave old computers online- disconnect them or turn them off
Read More
Posted in Security-Tweaks | No comments

How to get/import movies subtitles

Posted on 15:54 by Unknown
What are subtitles?
A subtitle is the text at the bottom of the screen in a movie. The purpose of a subtitle is usually to translate the movie dialogue from a language the viewer doesn't understand to one they do. Subtitles can also be helpful for people who for some reason have trouble following the dialogue in a movie.

Watching movies with subtitles
To watch DivX movies or XviD movies with subtitles you first need to install a DirectShow filter for Windows Media Player which is called DirectVobSub. To install DirectVobSub, follow these easy steps:

1) Download DirectVobSub
http://download.divxmovies.com/VobSub_2.23.exe

2) Run the exe-file to start the installation

After you've installed DirectVobSub on your system, Windows Media Player should be able to show subtitles in DivX and XviD movies. However, you will also need to download a separate subtitle file before you get subtitles in a movie. Once you've downloaded a subtitle for a movie you simply place it in the same folder as the DivX or XviD movie you want to watch. Then you have to make sure the filename of the movie and subtitle is the same. Otherwise you will have to rename the subtitle file, so the player understands that they are associated. Also make sure that the subtitle file has the ".sub" or ".srt" file-extension. Finally, you play the movie and hopefully you have subtitles in it.

Where can I download subtitles?
Multi-language sites:

OpenSubtitles
http://www.opensubtitles.org/
DivX Station
http://www.divxstation.com/subtitles.asp
DivX Subtitles
http://www.divxsubtitles.net/


What is DivX?
DivX is the name of a popular new video compression technology developed by DivX, Inc. The format was developed to enable users to play and create high-quality videos in a fast and convenient way, while still maintaining the best quality possible. The DivX codec is currently the most popular MPEG-4 based codec because of its quality, speed and efficiency as well as the wide range of DVD players that support DivX.

If you compare DivX movies to DVDs they're able to offer the same image quality at one-tenth (1/10) the size, which makes them perfectly suited for movie downloads where the bandwidth available usually is limited. This means that you can easily fit a full movie on a single CD, while still maintaining the original image quality of the DVD. The video is usually combined with AC3 or MP3 audio to provide both high quality audio and video. All of these things have contributed to the popularity of the format among those that download movies and videos online.

When you install the DivX codec it essentially works as an add-on to your system, which enables you to compress and decompress video in the DivX format. Once you've installed the DivX codec on your system you will be able to watch DivX videos using Windows Media Player or any other player that supports DivX.

Hardware requirements to play DivX movies
All that is needed is a fast enough computer. We don't know the exact minimum requirements, but anything less than a Pentium 300MHz running Windows 9X/NT/2000/XP is likely to encounter problems with skipping. For AMD K6/K6-2 computers we have found that the minimum requirements are higher and we recommend at least an AMD K6-2 400MHz for proper playback.

Lowering image quality to reduce skipping
If your computer isn't fast enough to play DivX movies it is possible to change the image quality. Goto the File menu in Windows Media Player and select Properties (make sure that you have a DivX movie loaded or the Properties option will be disabled). Then click the Advanced tab and select the "DivX MPEG-4 DVD Video Decompressor", then click Properties. A new window with a slider which ranges from CPU to DVD Video will be displayed. If you move the slider to the left your computer will compromise some of the image quality, but instead you will get less skipping. If you move the slider to the right your computer will display the DivX movie at full quality, but it will be slower to decode and might start to skip. We recommend users to not change this setting unless they are having playback problems.

Please note that the above instructions only work in Windows Media Player v6.4. If your system has a newer version of Windows Media Player installed you can still access the older version to make the needed changes. Simply goto the Start menu in Windows, select "Run..." and enter "mplayer2" in the box. Then click the OK button to start Windows Media Player v6.4.
Using older DivX codec to reduce skipping
If you're trying to play older DivX movies that were created using the DivX codec v3.11 alpha and you run into problems with skipping you can try and uninstall the latest version of the DivX codec and reinstall the DivX codec v3.11 alpha instead. Even though the latest version of the DivX codec is fully backwards compatible with the original DivX codec it isn't as optimized for playback of older DivX movies, so the original version of the codec is faster.
Read More
Posted in Other-Tweaks | No comments

Monday, 1 January 2007

Poweroff at Shutdown

Posted on 04:09 by Unknown
If your computer does not turn off the power when doing a shutdown,
you may need to edit the registry. I have all the correct BIOS and Power settings and still needed to do this.

1.Start Regedit
2.Go to HKEY_CURRENT_USER\Control Panel\Desktop
3.Edit the key PowerOffActive and give it a value of 1
4.You can do the same in HKEY_USERS.DEFAULTControl PanelDesktop
Read More
Posted in Computer-Tweaks | No comments

Disable The Send Error Report

Posted on 03:49 by Unknown
probably most of the computer users know this but it might be use full 2 someone

Disable the stupid feature in WinXP which tries to send a report to microsoft every time a program crashes you will have to do this:

open Control Panel
Click on Preformance and Maintenance.
Click on System.
Then click on the Advanced tab
Click on the error reporting button on the bottom of the windows.
Select Disable error reporting.
Click OK
Click OK
Read More
Posted in Computer-Tweaks | No comments

Freecell Tricks

Posted on 03:43 by Unknown
Instant Victory
At any time during the game enter the following code....
Ctrl + Shift + F10
A screen with three options will appear, choose Abort then make a play and you should win the game.

Easter Eggs
Hidden games
From the game menu, choose 'Select game'. Enter -1 or -2 when the game asks you to enter a number.
Read More
Posted in Games-Tweaks | No comments

Disable Picture And Fax Viewer

Posted on 03:42 by Unknown
We all know that WinXP likes to keep itself held together, and how it doesnt like you uninstalling certain components. Well The Picture and Fax Viewer, is one of these programs which can cause problems if removed incorrectly. It can be disabled safely as follows:

[Start] [Run] type regedit and click [OK]

Navigate to :

HKEY_CLASSES_ROOT/ SystemFileAssociations/ image/ ShellEx/ ContextMenuHandlers

then delete the Folder ShellImagePreview under ContextMenuHandlers

Note: If you want to restore the Picture and Fax Viewer :

Create the ShellImagePreview folder and create the String Value (Default)
Assign it the value {e84fda7c-1d6a-45f6-b725-cb260c236066}

NOTE: This tweak doesnt uninstall the program. It removes the association and therefore it cannot be run.

Think before what u r doing
Read More
Posted in Computer-Tweaks | No comments

Rename your digital photos automatically in Windows XP

Posted on 03:42 by Unknown
Unless you really have a lot of time on your hands, I doubt you want to go through the massive folder that contains your European vacation photos and rename them Europe_1.jpg, Europe_2.jpg, and so on down the line. If you're running Windows XP on your computer, you don't have to do this. Simply apply this hack to quickly apply a meaningful label to every picture in the folder.

* First, open the folder and select View > Thumbnails.

*Click the last picture in the folder you want to rename, hold down the Shift key, and click the first picture; this will select them all.

*Right-click the first photo, and select Rename from the drop-down menu.


Windows XP will highlight the filename for the first photo, enabling you to give it a descriptive name. After you type in the name, click the white space outside of the photo and watch as Windows applies the name with a sequential number to each picture in the folder.
Read More
Posted in Computer-Tweaks | No comments

Solitaire Trick (Quick Win)

Posted on 03:41 by Unknown
While playing a solitaire press alt+shift+2. Then you'll have a quick win
Read More
Posted in Games-Tweaks | No comments

Install Xp From Dos

Posted on 03:40 by Unknown
If XP will not install from the CD or if you have a new drive with no operating system on
it yet try these:

Install Windows XP from the hard drive with Windows 98 already installed:

Boot Windows 98
Insert the XP CD into your CD reader
Explore Windows XP through My Computer
Copy i386 folder to C:\
Go into C:\i386 folder and double click on winnt32.exe to launch the setup from the hard drive

Install Windows XP from DOS (ie. no OS on a new hard drive):

Boot with a Windows 98 Start Up disk
Insert the Windows 98 CD into the CD reader
Run smartdrv.exe from the Win98 directory on the windows 98 CD (file caching)
Type cd.. to back up to the root directory
Insert Windows XP CD into the CD reader
Copy the i386 folder to C:\
Go into C:\i386 folder on C: and type winnt.exe to launch the setup from the hard drive.
Read More
Posted in Computer-Tweaks | No comments

Windows XP shortcuts on your keyboard

Posted on 03:40 by Unknown
Keyboard shortcuts are a great way to keep things moving when you're using your computer, and they let you perform tasks without lifting your hands from the keyboard. These are some of the basics that you should know--at least if you want to cut down on the number of times you reach for the mouse every day.

* Ctrl Alt Del is the mother of all keyboard shortcuts, affectionately known as the "three-fingered salute," since it's so useful when your Windows box locks up. Pressing the combo once (simultaneously) opens the Windows Task Manager. (From within the Task Manager, you can force-quit a crashed program, see a list of processes or applications running on your machine, check performance parameters such as how hard your CPU is working, or track your network usage.) Is your machine totally locked up? Reach over, grab the mouse and click Shut Down.

* Ctrl S saves the file you're working on. Ever lost your homework, a spreadsheet at work, or some video you've been editing? Hit Ctrl S (simultaneously) to save. Hit it early and often! (Want to open a file from within the program you're running? Ctrl O universally opens the File/Open window.)

* Ctrl C copies text, files, or icons that you've highlighted, Ctrl V pastes them where you point your mouse (hey, you can't completely eliminate using it), and Ctrl X cuts whatever you've highlighted out of the document (or folder, photo, movie clip, or whatever it is you're working on). Ctrl A highlights the entire file you're working on or everything in a folder or on your desktop.

* Alt Tab lets you switch on the fly between all of your open windows. Press the combination once to switch to your last open window or multiple times to switch to any other open window. Holding down Alt Tab will bring up a system window that shows you what apps are running and which one you're switching to.

* Ever wonder why almost every Windows program has the F in File underlined, not to mention the E in Edit, and so on so forth across the top of the Window? Hit Alt that letter to open that particular menu; you can either use the arrow keys to move around within that window, or keep your eyes peeled for more underlined letters to use more Alt key combinations.

* The Windows key (the one that looks like the Windows logo, or a flag) R opens the Run dialog. From here, you can launch a command-line window by typing cmd, but you can do a lot more. You can, for example, paste in a folder path, such as C:\Documents and Settings\[username]\My Documents\Expenses, and Windows will open it automatically. You can also use the Run dialog to open Microsoft applications such as Word, Excel, or Notepad. Just type winword to launch Word, type excel to launch Excel, and notepad to launch Notepad.

* Windows E launches Windows Explorer, defaulting to My Computer.

* F2 renames a selected file or folder. (This is so much easier than right-clicking!)

* F3 launches Search if you're on the desktop or in a folder.

* Windows M minimizes all open windows, and Windows D shows your desktop. (These results look similar, but they're slightly different; Windows M minimizes all windows that support the command, while Windows D actually raises the desktop to the top.) This is a great one for when the boss pops up in your cubicle. Once the boss gone, hit Shift Windows M to bring up your minimized windows, or Windows D to drop your desktop back down again.<
Read More
Posted in Computer-Tweaks | No comments

What a mobile phone can actually do

Posted on 03:37 by Unknown
Some one posted it before.I had the backup I am reposting this..

Your mobile phone can actually be a life saver or an emergency tool for survival. Check out the things that you can do with it: -

*EMERGENCY*
*I*

*The Emergency Number worldwide for **Mobile** is 112.* If you find yourself out of coverage area of your mobile network and there is an emergency, dial 112 and the mobile will search any existing network to establish the emergency number for you, and interestingly this number 112 can be dialed even if the keypad is locked. **Try it out.**

*II*

*Subject: Have you locked your keys in the car? Does you car have remote keys?*

This may come in handy someday. Good reason to own a cell phone:
If you lock your keys in the car and the spare keys are at home, call someone at home on their cell phone from your cell phone.

Hold your cell phone about a foot from your car door and have the person at your home press the unlock button, holding it near the mobile phone on their end. Your car will unlock. Saves someone from having to drive your keys to you. Distance is no object. You could be hundreds of miles away, and if you can reach someone who has the other "remote" for your car, you can unlock the doors (or the trunk).


*III*

Subject: Hidden Battery power

Imagine your cell battery is very low, you are expecting an important call and you don't have a charger. Nokia instrument comes with a reserve battery. To activate, press the keys *3370# Your cell will restart

with this reserve and the instrument will show a 50% increase in battery. This reserve will get charged when you charge your cell next time.

AND FINALLY

*IV*

How to disable a STOLEN mobile phone?

To check your Mobile phone's serial number, key in the following digits on your phone: * # 0 6 #

A 15 digit code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere safe. when your phone get stolen, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless. You probably won't get your phone back, but at least you know that whoever stole it can't use/sell it either. If everybody does this, there would be no point in people stealing mobile phones.
Read More
Posted in Mobile-Tweaks | No comments

Configure XP for Auto-Logon

Posted on 03:35 by Unknown
If you are the only person using the computer and what to have it automatically log you on,

Start / Run / "control userpasswords2" - no quotes
Uncheck "User must enter a user name and password to use this computer".
Read More
Posted in Computer-Tweaks | No comments

Hiding Drives

Posted on 03:34 by Unknown
Ever wish you could make one of your computer's drives invisible to anyone snooping around on your system? Well, happy days are here my friend! Whether you have sensitive docs, pictures, or any other private data, this is one of the easiest ways to keep them safe. Keep in mind that you'll still be able to access your hidden drives; you just won't see that they exist in Windows Explorer or the My Computer folder. Back up your registry before you start!

1. Open Regedit.

2. Navigate to one of these strings:

HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Policies\Explorer - this only changes the settings for the current logged in user

HKEY_LOCALMACHINE\Software\Microsoft\Windows\
CurrentVersion\Policies\Explorer - this changes the settings for all users on the machine. You may have to create the key folder "Explorer" manually.

3. In the Explorer key folder, create a new DWORD value by right-clicking Explorer, then choosing New DWORD value. Name the value "NoDrives" (without the quotes). This value defines local and network drive visibility for each logical drive on the computer. All drives will be visible as long as this value's data is set to 0.

4. Following the table below, enter the decimal number corresponding to the drive(s) you want to hide as NoDrives value data. When you right-click on NoDrives and choose Modify, make sure you select Decimal base, not Hexadecimal.

Drive Number to hide
A: 1
B: 2
C: 4
D: 8
E: 16
F: 32
G: 64
H: 128
I: 256
J: 512
K: 1024
L: 2048
M: 4096
N: 8192
O: 16384
P: 32768
Q: 65536
R: 131072
S: 262144
T: 524288
U: 1048576
V: 2097152
W: 4194304
X: 8388608
Y: 16777216
Z: 33554432
All drives 67108863

If you want to hide more than one drive, you simply add the drive amounts together for a combined total.

For example, to hide the D:/ and T:/ drives, add the decimal value for the D:/ drive to the decimal value to the T:/ drive.

8 (D) + 524288 (T) = 524296

To disable all of your visible drives, set the value to 67108863.

You must reboot your PC to see your changes.




Code:
Alternatively - A much easier solution to both.

Start > Run > GPEDIT.MSC > User Configuration > Administrative Templates > Windows Components > Windows Explorer
"Hide these specified drives in My Computer"
"Prevent access to drives in My Computer"

Only really works with Drives A, B, C, D.

However if you have tweak UI installed you can pick and choose any drive letter.

Throw in NTFS permissions and user accounts that don't have administrator privilages and you are set.

Of course if you want to truely hide and protect your data - you need to looking into third party encryption.
The HD on my laptop is encrypted for this reason.
__________________
Read More
Posted in Computer-Tweaks | No comments

Hide your clock

Posted on 03:33 by Unknown
If you want to hide your clock, open notepad copy the following down, and make it a .reg file, then run it. Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer]
"HideClock"=dword:00000001
Read More
Posted in Computer-Tweaks | No comments

Recycle Bin Edits

Posted on 03:31 by Unknown
Fooling with the recycle bin. Why not make the icon context menu act like other icon context menus.

Add rename to the menu:
[HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\ShellFolder]
"Attributes"=hex:50,01,00,20

Add delete to the menu:
[HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\ShellFolder]
"Attributes"=hex:60,01,00,20

Add rename and delete to the menu:
[HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\ShellFolder]
"Attributes"=hex:70,01,00,20

Restore the recycle bin to win 95 defaults including un-deleting the icon after deletion:
... Restore the icon.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\explorer\Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA002F954E}]
@="Recycle Bin"
... reset win 95 defaults
. [HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\ShellFolder]
"Attributes"=hex:40,01,00,20

Other edits to the recycle bin icon:
[HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\ShellFolder]
"Attributes"=hex:40,01,01,20 ... standard shortcut arrow
"Attributes"=hex:40,01,02,20 ... another shortcut arrow
"Attributes"=hex:40,01,04,20 ... and another shortcut arrow
"Attributes"=hex:40,01,08,20 ... make it look disabled (like it's been cut)
Read More
Posted in Computer-Tweaks | No comments

Easy way to increase your Cable/DSL speed!!!

Posted on 03:24 by Unknown
Here is a simple way to boost your Cable/DSL speed, just copy the ENTIRE ITALIC text in the "quote" box to Notepad, then save them as *.reg files - Then all you have to do to modify/restore is double-click the *.reg file!!

IF YOU WANT TO INCREASE YOUR SPEED, PASTE THE RED CODE BELOW AND ONLY THE RED CODE BELOW INTO NOTEPAD!!!
Quote:
Originally Posted by INCREASE Cable/DSL SPEED
REGEDIT4

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\Tcpip\Parameters]
"GlobalMaxTcpWindowSize"=dword:0000ffff
IF YOU WANT TO DEFAULT/UNDO THE INCREASE OF SPEED, PASTE THE RED CODE BELOW AND ONLY THE RED CODE BELOW INTO NOTEPAD!!!
Quote:
Originally Posted by DEFAULT Cable/DSL SPEED
REGEDIT4

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\Tcpip\Parameters]
"GlobalMaxTcpWindowSize"=dword:00007fff
It has worked wonders with me as it increased my speed from 5.0mbps all the way to 9.9mbps or sometimes a whole damn lot more like once it hit 15.7mbps youve got to try it!! If u want to test your speed before and after the hack.......goto this link for a free test of speed http://www.bandwidthplace.com/speedtest/ .................Remember that its for Cable/DSL only and not for crazy Dial-up.....ENJOY!!

Note: Some people confuse "Servic es" and change it to "Services". DON'T do this because it makes the hack not work!! Also, it took me a while to find out where I saved this so please thank me for this!!! BTW: PLEASE make sure the "Hide extensions for known file types" option is unchecked........this will enable you to change the file type from *.txt to *.reg and activate the hack. If there are any problems, just post it here of PM me!!

Here is the link to a little vid I made to help someone who had a problem. I'm posting this for all to clear the confusion: Click Here to Download
Read More
Posted in Internet-Tweaks | No comments

How to Overclock Your Video Card

Posted on 03:20 by Unknown
Introduction

You can increase the gaming performance of your computer by overclocking your video card. Overclocking is a technique that makes a given hardware part to operate at a clock frequency above its standard frequency, thus increasing its performance. In this tutorial we will explain in details how to overclock your video card, with several tips and tricks.

If your PC has a video card embedded on the motherboard (i.e. “on-board video”) you won’t be able to overclock it, as you PC doesn’t have a real video card installed – the video is produced by the motherboard chipset. In this tutorial we deal exclusively with real video cards, the ones that are connected to your PC thru an expansion slot.

To learn how to overclock you video card you need to learn first how a video card works. On Figure 1 you can see a very basic diagram showing the video card main components and how they are connected together.



The heart of a video card is its graphics chip, also known as GPU, Graphics Processing Unit. It works at a certain clock rate, also known as “core clock” or “engine clock”. When we think of overclocking a video card, usually the first thing that comes to mind is to increase the GPU core clock.

The new GeForce 8 GPU series from nVidia has two clock signals, one used by its shader engines and another used by the rest of the chip (the core clock we’ve just described). So far we don’t know if this second signal (shader clock) can be overclocked or not, or if it is somehow connected to the core clock. We will update this tutorial as soon as we get one video card based on this new architecture in order to clarify this issue.

The GPU is connected to the video memory (which is physically located on the video card) using a dedicated memory bus (yellow on Figure 1). This bus also works at a certain clock rate, also known as “memory clock”. We can also increase this clock rate in order to increase the performance of your video card and of course we will show you how to do that.

One important thing to keep in mind right now is that the memory bus nowadays usually works transferring two data per clock cycle, technique known as DDR, Double Data Rate. Because of this technique the memory clock can sometimes be referred as the double of its real clock rate, because the transfer rate achieved by DDR technique is double the transfer rate of a regular memory transferring just one data per clock cycle. In order to avoid confusion during our tutorial we will add the letters DDR after clock rates that are “doubled”. For instance 300 MHz and 600 MHz DDR are the same thing, as this 600 MHz DDR clock rate is really 300 MHz transferring two data per clock cycle.

The memory bus – which can also be referred to as memory interface – transfers a certain number of bits per time between the GPU and the video memory – 64 bits, 128 bits, 256 bits, etc. This number is fixed and you cannot change it. In other words there is no way for you to transform your 128-bit video card into a 256-bit one. This is a physical limitation: each bit is transferred thru an individual wire on the video card printed circuit board, so a video card with a 128-bit memory interface has 128 wires connecting the GPU to the memory. So it is impossible to change this number, as you would need to add 128 more wires between the GPU and the memory chips (and also probably add or change the memory chips). The same thing goes for the video memory size: you cannot transform your 128 MB video card into a 256 MB one simply because you would need to add more memory chips to it.

The GPU is connected to the motherboard thru an I/O slot such as PCI Express and AGP. This connection is also done at a certain clock rate (100 MHz for PCI Express and 66 MHz for AGP) and some motherboards allow you to increase this clock rate, giving a third option to overclock your video card. Notice that this option depends on the motherboard and not on the video card, as it is the motherboard that controls the I/O slot where the video card is installed. Some overclocking-oriented motherboards also provide an option for you to increase the I/O slot voltage (i.e. the video card voltage), which can make your video card to achieve a higher overclocking.
Read More
Posted in Computer-Tweaks | No comments

Give each hd its own icon.

Posted on 03:09 by Unknown
Give each hd its own icon.

1) Create a file called "Autorun.inf" in the root of the drive

2) Put this text in the file
[autorun]
ICON=drive.ico

*where drive.ico is the icon file you want to use*

reboot. thats it.
not really a great tip but seen people asking for it
Read More
Posted in Computer-Tweaks | No comments

How to Install Apache , PHP , MySQL , Perl on Windows

Posted on 02:33 by Unknown
How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin
by Aolex from Projectw.org
edited by Heiko from x92.org

=====

Let's start by installing apache (http server) . you can download the
apache installer on www.apache.org . download the verion you like ,
even thought , in win systems i recomand verion 2 (this tutorials is
for apache 2) . here is a link for it :

http://apache.mirror.nedlinux.nl/dist/http...-x86-no_ssl.msi


After downloading the file (.msi installer) , run it . The installation wizard
is a next , next , finish 'work' ... The installer will ask you some details like
your server name , your server adress and the admin's mail adress . if
you have a domain name or a hostname , enter the info's like this :


Code:
Server Name : your_domain.org

Server Adress : www.your-domain.org

Admin Email : admin@yourdomain.org

if you don't have one , you should get one free at :


http://www.no-ip.org/


Check the 'Run as a service for all users on port 8080' option and click
next , finish to fiinish the instllation . Advice : Install it in c: (he creates
a folder for it , don't worry) to make sure you configure it easyer .
If you are finished , open up a browser and write in the adress bar :


http://localhost/


If you will see a 'Test Page for Apache Installation' , everything works .

=====

Let's install PHP . download the archives from www.php.net . Here is a
direct link for verion 4.3.9 :

http://nl.php.net/get/php-4.3.9-Win3...om/this/mirror


Make sure you download the archive and not the installer . Ok! after
downloading it , extract the archive in c:/php (this is to simplify paths) .
Now , open up c:/apache/conf/httpd.conf and search for this line :

Code:
#LoadModule ssl_module modules/mod_ssl.so

under that line , add this :
Code:
LoadModule rewrite_module modules/mod_rewrite.so

LoadModule php4_module "c:/php/sapi/php4apache2.dll"
AddType application/x-httpd-php .php
AddType application/x-httpd-php .php3
AddType application/x-httpd-php .php4
Now search for this line :

Code:
Directory "C:/Apache2/htdocs"

Change :
Code:
Options Indexes FollowSymLinks

#
# AllowOverride controls what directives may be placed in .htaccess files.
# It can be "All", "None", or any combination of the keywords:
# Options FileInfo AuthConfig Limit
#
AllowOverride None
into :

Code:
Options Indexes Includes FollowSymLinks MultiViews ExecCGI

#
# AllowOverride controls what directives may be placed in .htaccess files.
# It can be "All", "None", or any combination of the keywords:
# Options FileInfo AuthConfig Limit
#
AllowOverride All
This will allow .htaccess support on your server and make sure you can
see the content of a folder without getting a 403 forbidden error .

Now search for :

Code:
DirectoryIndex index.html index.var.html
and change it into :

Code:
DirectoryIndex index.html index.php
Save the file and restart apache . (you can restart it by pressing the
Restart apache server shortcut in the start menu or by writing :

Code:
net apache restart
in a command prompt window . Ok!

you have php working for your server icon_wink.gif . Now let's configure php and
make sure it really works ! Open up c:/php/php.ini (php.ini-dist renamed)
and search for this paragraph :

Code:
max_execution_time = 60 ; Maximum execution time of each script, in seconds
max_input_time = 60 ; Maximum amount of time each script may spend parsing request data
memory_limit = 5M ; Maximum amount of memory a script may consume (8MB)
you should change this to whatever you want . here is an option i use :

Code:
max_execution_time = 300 ; Maximum execution time of each script, in seconds
max_input_time = 300 ; Maximum amount of time each script may spend parsing request data
memory_limit = 5M ; Maximum amount of memory a script may consume (8MB)
Now search for :

Code:
register_globals = Off
and change it into :
Code:
register_globals = On
Search for :

Code:
extension_dir = ".\"
and change it into :

Code:
extension_dir = "c:/php/extensions"
assuming you have installed php in c: ...

Search for :

Code:
;Windows Extensions
;Note that MySQL and ODBC support is now built in, so no dll is needed for it.
and uncomment (delete the ; in the front) the following modules :

Code:
extension=php_bz2.dll
extension=php_db.dll
extension=php_gd2.dll
extension=php_java.dll
extension=php_msql.dll
extension=php_pdf.dll
extension=php_pgsql.dll
extension=php_sockets.dll
Ok! now let's change the smtp settings (this is good icon_smile.gif for you mail()
function . you need this !!!) Search for :

Code:
[mail function]
; For Win32 only.
SMTP =
smtp_port = 25

; For Win32 only.
;sendmail_from =
and change to :

Code:
[mail function]
; For Win32 only.
SMTP = mail.isp.org
smtp_port = 25

; For Win32 only.
sendmail_from = mail@your_domain.org
if you don't have a mail server or :

Code:
[mail function]
; For Win32 only.
SMTP = localhost
smtp_port = 25

; For Win32 only.
sendmail_from = mail@your_domain.org
if you have a mail server ...

Save the files . Now let's finalize the php installation . copy all the dll's
from c:/php/dlls into c:/windows/system32 . copy c:/php/php4ts.dll into
c:/windows/system32/ and copy php.ini from your folder php into
windows and system32 folder . restart apache . open up notepad and
add this into the file :


Code:
< ? php   phpinfo () ; ? >
save this file in your htdocs folder (c:/apache/htdocs) as info.php and
open up a browser . in the adress bar write :


http://localhost/info.php


you should see php's configuration in a table . a looong file icon_smile.gif
you can optionaly install zend optimizer . i am using it ... it doesn't
needs a tutorial . to install the PEAR modules for php , just run the
go-pear batch from the php folder and 2click the reg file to finish the
instllation .

=====

let's install mysql . download mysql from http://www.mysql.com/ .
this tutorial applyes to verion 4.0.* ... i don't recomand using mysql
4.1 . here is a direct link :

http://dev.mysql.com/get/Downloads/MySQL-4...ql.proserve.nl/


after downloading , extract the arhive somewhere and run the setup.exe .
install mysql in c:/mysql and complete the installation . open up command
prompt and write this :

Code:
cd mysql
cd bin
mysqld-max-nt --install
this will install mysql as a service . recomended . now you would probably
consider downloading mysql control center . a gui tool to administrate the
server in a graphical mode . here is a link :

Code:
http://dev.mysql.com/get/Downloads/MySQLCC...ql.proserve.nl/
install it like any other program and run the shortcut in the desktop . a
window will pop-up . it will ask you to add a new connection . here are the
info's you need to fill in :

Code:
name : localhost or main or whatever :)
host : localhost
user : root
pass :
click add , expand the databases menu and delete databse text . now
expand the users menu and delete all users except root@localhost . right
click it and select edit user . change it's password to whatever you want icon_smile.gif
now right click the server and select edit . change the password to the
pass you chosed for user root . as easy as that . mysql is installed !

=====

phpMyAdmin . you can download it from http://www.phpmyadmin.net/ .
i recommend using verion 2.5.1 pl1 . the last verion is still bugy icon_smile.gif
download , unzip the contecnt into a folder in htdocs (phpMyAdmin) and
open up config.inc.php with a text editor .

search for :

Code:
$cfg['PmaAbsoluteUri'] = '';
change it to your phpmyadmin url . eg. :
Code:
$cfg['PmaAbsoluteUri'] = http://www.your_domain.org/phpMyAdmin/';
now search for :

Code:
$cfg['blowfish_secret'] = '';
and change it to your mysql root password like this :

Code:
$cfg['blowfish_secret'] = 'password';
now search for :

Code:
$cfg['Servers'][$i]['auth_type'] = 'config';
and change it to :

Code:
$cfg['Servers'][$i]['auth_type'] = 'cookie';
save and exit . that's it ! phpMyAdmin works

=====

Perl . Optioanl for your server , very usefull . i recomend you to install
it . you can download it from http://www.activestate.com/ . here is a
direct link :

http://downloads.activestate.com/ActivePer...MSWin32-x86.msi


download , install and you are ready . put your perl scripts in the /cgi-bin/
folder (c:/apache/cgi-bin) .[code]
Read More
Posted in Other-Tweaks | No comments
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • Easy way to increase your Cable/DSL speed!!!
    Here is a simple way to boost your Cable/DSL speed, just copy the ENTIRE ITALIC text in the "quote" box to Notepad, then save the...
  • Increase Harddisk Speed In Xp2003!
    How can I increase my hard disk speed in Windows XP/2003? First Common method is Defragment.. dat is too common ..so v talk sumthng new..her...
  • Amazing Hidden Features in XP
    1. Application Secrets. Defrag Secret - Hidden Command Line Switch Instructions - Go to "Start", "Run" and Type defr...
  • xp 2000 commands
    New and improved! Here's a list of some new tools mixed up with the old favorites that will make any Linux user feel at home with the co...
  • Cool Browser Trick
    Paste this into your address bar. ( Works on IE ) For Circles: javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200...
  • Boot Your PC in STYLE
    Note : I recommend making a copy of you " Boot.ini " first, just in case you do something wrong and your window is not booting, r...
  • Give each hd its own icon.
    Give each hd its own icon. 1) Create a file called "Autorun.inf" in the root of the drive 2) Put this text in the file [autorun] I...
  • Changing your Mouse Pointer
    This is sort of a stupid, frivolous, useless little tip, but hey, who ...
  • Setting your Home Page
    These steps are pretty similar for most of the browsers out there, I...
  • Using Msconfig to shut off Auto-Start programs
    So you want to speed up your booting process, well here's a tip for you to shut off those programs that start in ...

Categories

  • Browser-Tweaks
  • Computer-Tweaks
  • Designing-Tweaks
  • Email Account Tricks
  • Games-Tweaks
  • Google-Tweaks
  • Internet-Tweaks
  • Mobile-Tweaks
  • Other-Tweaks
  • Security-Tweaks
  • Torrent Tweaks
  • WebMaster Tweaks
  • Windows Tweaks
  • Yahoo-Tweaks

Blog Archive

  • ►  2010 (1)
    • ►  June (1)
  • ►  2009 (12)
    • ►  September (5)
    • ►  August (1)
    • ►  July (2)
    • ►  May (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ▼  2007 (43)
    • ►  November (2)
    • ►  October (2)
    • ►  September (1)
    • ►  May (3)
    • ►  April (1)
    • ►  March (2)
    • ►  February (4)
    • ▼  January (28)
      • Messy Trick
      • Cool Browser Trick
      • Put Muscle in Your Device Manager!
      • How to Bypass BIOS Passwords
      • Speed DSL
      • Internet Explorer 7 Useful Settings
      • Show your MSN Status in your Signature on Forums, ...
      • Lock a folder without any software
      • How To Trace The Spam Mail
      • Ten steps to a more secure computer
      • How to get/import movies subtitles
      • Poweroff at Shutdown
      • Disable The Send Error Report
      • Freecell Tricks
      • Disable Picture And Fax Viewer
      • Rename your digital photos automatically in Window...
      • Solitaire Trick (Quick Win)
      • Install Xp From Dos
      • Windows XP shortcuts on your keyboard
      • What a mobile phone can actually do
      • Configure XP for Auto-Logon
      • Hiding Drives
      • Hide your clock
      • Recycle Bin Edits
      • Easy way to increase your Cable/DSL speed!!!
      • How to Overclock Your Video Card
      • Give each hd its own icon.
      • How to Install Apache , PHP , MySQL , Perl on Windows
  • ►  2006 (55)
    • ►  December (55)
Powered by Blogger.

About Me

Unknown
View my complete profile