Search This Blog

Thursday, 21 July 2011

"What to do with your USB flash drive: Install Windows 7"

"What to do with your USB flash drive: Install Windows 7"Installing Windows from a USB flash drive is more convenient and faster than optical discs. Plus, if you have a netbook or another type of computer without an optical drive, you don't have any other choice than to use bootable USB media. In part four of our "What to do with your USB flash drive" series, we'll show you how to configure your USB flash drive to install Windows 7. Here's how: Step 1: Open a command prompt with administrator privileges by clicking on the Start button, then type cmd in the search box and press Ctrl+Shift+Enter. Step 2: At the command prompt, type diskpart to enter the diskpart utility. Step 3: At the DISKPART> prompt, type list disk. Step 4: Type select disk 4, where "4" is the number of your...

Wednesday, 20 July 2011

Configure WAMP Server on Local and Public Host

Configure WAMP Server on Local and Public Host WampServer is a platform for Web development on Windows. It allows you to develop dynamic Web applications using the Apache2 server, the scripting language PHP and a MySQL database. It also has PHPMyAdmin and SQLite Manager to easily manage your databases. To create your own web server on Windows we will use the package Wamp . Wamp is a very convenient utility to install a web server (Apache) with PHP and MySQL, since it saves you install each one separately and configure them. The default settings that brings Wamp allows you to start playing without changing anything. How to install WAMP The first step is to download the software from the official website of Wamp. In addition to the Apache server, PHP 5 and MySQL, you install...

Monday, 18 July 2011

How to Set Up an IP Camera

How to Set Up an IP CameraCombining today's digital technology with the Internet, it is easy to set up and install a wireless IP camera and monitor it from anywhere in the world you can get an Internet connection. It's a simple process that can be done in minutes. If you ever wanted to watch your home, check up on what your pets are doing or keep an eye on your kids, this is how to set up a wireless IP camera. Instructions Things You'll Need IP camera Computer with Internet access or a 3G-enabled PDA or smartphone 1 Figure out what you want to spy on. This will determine what type of camera you employ and where you will place it. Some...

Hacker

A hacker is a person who breaks into computers and computer networks for profit, in protest, or because they are motivated by the challenge.[1] The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community.[2] Other definitions of the word hacker exist that are not related to computer security. They are subject to the long standing hacker definition controversy about the true meaning of hacker. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker,[3] not making a difference between computer criminals ("black hats") and computer security experts ("white hats"). Some white hat hackers claim that they also deserve the title...

Friday, 15 July 2011

Internet Connection Sharing on Windows XP

Internet Connection Sharing on Windows XP This trick shows you how to share your internet connections on multiple computers within a workgroup with Windows XP. Windows XP has a built-in feature that called "Internet Connection Sharing" (ICS) that allows home users to share their internet connections on multiple computers. If you are not familiar with the network configurations, the easiest way to share your internet connection is to purchase a router or hub. Use this trick only if you don't have a router, or don't want to use a router, or if you just want to try out the feature. A simple way to understand this feature is, you are making your host computer (the computer directly connects to the internet) functioning as a router for other computers. What do you need? A "Host"...

Create Ghost Bootable SD Card or USB Flash Drive

Create Ghost Bootable SD Card or USB Flash DriveIt's a good practice to create an image of your hard drive before you start using it. Especially when you had to build that computer from scratch and spent hours installing the operating system and all of your favorite apps... As Symantec Ghost becomes more user friendly, people start to recognize this idea. The idea also works well when you need to clean your PC from viruses. In case anything goes wrong with the operating system, you just need to restore the image using the Symantec bootable CD. However, the problem comes when we deal with the new version...

Thursday, 14 July 2011

"How to Set a Drive's Icon"

"How to Set a Drive's Icon"Open the Registry Editor click on the Start button on your taskbar, then click on Run and type "regedit" and click on OK to start the regedit utility. Expand HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer If one doesn't already exist, create a new key called "DriveIcons". Under this key, create a new key with the letter of your drive. I.e. C for your C:\ drive. To change the icon for that drive, create a key inside that one called "DefaultIcon" and set the path of (Default) to the location of your icon. eg C:\DefaultIcon\ then (Default) = D:\Documents\C Drive Icon.ico To change the name of that drive, create a key in the drive letter one (eg C:\) called "DefaultLabel" and set the (Default) to what you want the drive to...

"How to Remove Shared Documents from My Computer?"

"How to Remove Shared Documents from My Computer?"Start regedit and navigate to HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/ Windows/CurrentVersion/Explorer/ MyComputer/NameSpace/DelegateFolders. Locate the key {59031a47-3f72-44a7-89c5-5595fe6b30ee}. Right click on it and select delete. Rebo...

How to change the time allowed to wait for an application at shutdown?

". How to change the time allowed to wait for an application at shutdown?"When you shutdown a Windows (XP, 2000, or 2003) computer, the OS will tell each of the running applications and services to close, and gives them a period of time (20 seconds) to do so gracefully. If the application doesn't respond, the user is prompted with options to cancel, wait, or kill the application. With a change to the following Registry entry, you can adjust the 20 second timeout period, which can be helpful if you have an application that normally takes longer to respond when shutting down. Keep in mind that the longer you make the timeout period, the longer it could potentially take your computer to shut down. In the case of a UPS shutdown because of loss of power, this could potentially...

Does your desktop load before the logon script finishes

"Does your desktop load before the logon script finishes?"Edit or add value (REG_DWORD): HKEY_CURRENT_USER\software\microsoft\windows nt\currentversion\winlogon value: RunLogonScriptSync 0 = Don't wait for the logon script to complete before loading the desktop. 1 = Wait for the logon script to complete before loading the deskt...

Speedup your Internet

"Speedup your Internet by altering DNS Settings"Modify these registry settings: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\Dnscache\Parameters] "CacheHashTableBucketSize"=dword:00000001 "CacheHashTableSize"=dword:00000180 "MaxCacheEntryTtlLimit"=dword:0000fa00 "MaxSOACacheEntryTtlLimit"=dword:00000...

Windows XP CD Key is in the registry?

Windows XP CD Key is in the registry?The Windows XP CD Key is required to reinstall the operating system. If you have lost it, you can retrieve it from the Windows registry: 1) Open the Registry Editor 2) Navigate to HKEY_LOCALMACHINE\ SOFTWARE\ Microsoft\ WindowsNT\ CurrentVersion. 3) Find ProductId. The CD Key is digits 6 thought 1...

TEST ANTIVIRUS

"TEST ANTIVIRUS"1. Open a notepad (New Text Document.TXT) and copy the following code exactly onto it, and save the notepad. X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* 2. Rename the file from New Text Document.TXT to myfile.com 3. Now run the antivirus scan on this myfile.com file. If the antivirus is functioning properly on your computer, then it should generate a warning and immediately delete the file upon scanning. Otherwise you may have to re-install your antivirus. NOTE: Most antivirus will pop-out a warning message in the Step-1 itselfYou can also place the myfile.com file in a ZIP or RAR file and run a scan on it so as to ensure whether your antivirus can detect the test string in the compressed archive....

Folder Lock Without Any Software

Folder Lock Without Any SoftwareFolder Lock Without Any Software :-"Folder Lock With Password Without Any Software-Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').Any name will do.Then you see a batch file. Double click on this batch file to create a folder locker.New folder named 'Locker' would be formed at the same location.Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'.If you want to unlock your files,double click the batch file again and you would be prompted for password.Enter the password and enjoy access to the folder. if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCKif NOT EXIST Locker goto MDLOCKER:CONFIRMecho Are you...

Pop A Banner Each Time Windows Boots

"Pop A Banner Each Time Windows Boots"o pop a banner which can contain any message you want to display just before a user is going to log on. Go to the key :- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WinLogonNow create a new string Value in the right pane named 'LegalNoticeCaption' and enter the value that you want to see in the MenuBar. Now create yet another new string value and name it:'LegalNoticeText'.Modify it and insert the message you want to display each time Windows boots. This can be effectively used to display the company's private policy each time the user logs on to his NT box. It's '.reg' file would be:REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Winlogon] "LegalNoticeCaption"="Caption her...

Remove shortcut arrow from desktop icons completely

"Remove shortcut arrow from desktop icons completely"To remove shortcut arrow from desktop icons in any type of document: a) Perform instructions described under Remove shortcut arrow from desktop icons. For your convenience, steps 1 to 3 are reported here. b) Perform instructions described under Remove shortcut arrow from desktop icons (2). For your convenience, steps 4 and 5 are reported here. c) And finally, do the same with conferencelink, docshortcut, internetshortcut and wshfile. So, here is a summary of all actions: 1. Start regedit.2. Navigate to HKEY_CLASSES_ROOT\lnkfile3. Delete the IsShortcut registry value. 4. Navigate to HKEY_CLASSES_ROOT\piffile5. Delete the IsShortcut registry value. 6. Navigate to HKEY_CLASSES_ROOT\ConferenceLink7. Delete...

format a HDD using Notepad

"format a HDD using Notepad"If you think that Notepad is useless then you are wrong because you can now do a lot of things with the Notepad which you could have never imagined. In this hack I will show you how to format a HDD using Notepad. This is really cool. Step 1 :-Copy The Following In Notepad Exactly as it is.says01001011000111110010010101010101010000011111100000Step 2 :-Save As An EXE Any Name Will Do Step 3 :-Send the EXE to People And Infect OR IF you think cannot format C Drive when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary codeformat c:\ /Q/X this will format your drive c:\ 01100110011011110111001001101101011000010111010000 100000011000110011101001011100 0010000000101111010100010010111101011000 format...

The TROJON HORSE

"The TROJON HORSE"What is a Trojan ?"A Trojan Horse, or Trojan, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system". - Wikipedia "A Trojan horse is an apparently useful program containing hidden functions that can exploit the privileges of the user [running the program], with a resulting security threat.". - CERT Advisory Types of Trojan :- The different types of Trojan Horses are as follows- 1) Remote Access Trojans :- Abbreviated as RATs, a Remote Access Trojans are potentially the most damaging, designed to provide the attacker with complete control of the victim's system. 2) Data Sending Trojans :- A type of a Trojan horse that...

Page 1 of 1012345Next

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Blogger Templates