Latest Post

Beginners Guides: 99 Performance Tips and Tweaks for Windows Vista

Written By Unknown on Friday, 29 October 2010 | 08:46

People are complaining of vista of not user friendly and all sort. So I got hold of this site PCSTATS. They provide great tips on how to tweak Vista and its well compiled. Take control of Windows Vista with help from PCSTATS. They provided 99 ways to squeeze out better performance, enhance boot times, free up hard drive space and trim away Vista's fat. - Version 1.3.0

Windows Vista was supposed to revolutionize computing. Microsoft's new operating system was going to accomplish the difficult task of succeeding Windows XP (by far the most popular and successful Windows operating system to date) by introducing a raft of new features. We were going to have a new file system to replace the aging NTFS, unprecedented levels of both interactivity and security provided by a new 3D interface and the 'Palladium' secure encryption system, all coupled with a rock solid platform based on Windows XP.

A funny thing happened on the way to the CD press though, as features started to disappear. Away went the Microsoft File System, away too went many of the new security options. In the end, Microsoft Windows Vista launched, yet instead of the promised software miracle we were left with an operating system that didn't significantly improve on its predecessor.

Initial reviews were mixed; users complained about having Windows Vista forced on them, about its apparent sluggishness, over-protective safeguards and unfamiliar interface. Toss in the (expected) teething troubles with hardware and driver support and it was the makings of a Windows ME-like public relations disaster. That was then, by now most users have become familiar with it's new features, and it's becoming apparent that Vista really is a very good operating system.

It's true Vista is power hungry, but it's customizable and feature-laden too. It's large, but it's stable and thoughtfully designed. Many of the features that were an afterthought or an annoyance in Windows XP (think file pre-fetching and indexing) have been molded into useful and integral parts of Vista.
let's begin!

Table of Contents
System Preparation: Tweak Insurance (1-3)
  1. Back up and restore Windows Vista Registry
  2. How to edit the Windows Vista Registry
  3. Creating a system restore point in Windows Vista
System Preparation: Hardware (4-10)
  1. Add more memory (RAM)!
  2. Update the motherboard BIOS
  3. Update hardware drivers
  4. Test the Computer's RAM
  5. Optimize the memory timings and voltage
  6. Overclock the processor and memory
  7. Overclock the videocard
First Boot - The Essential Tweaks (11-20)
  1. Turn off User Account Control (UAC)
  2. Set Automatic Update to download only
  3. Learn to use the search bar as a Run command.
  4. Disable automatic device driver searching and installation
  5. Use Windows Defender to disable startup programs
  6. Power options to high performance.
  7. Enable DVD playback in Vista Basic and Vista Business.
  8. Make the 64-bit version of Windows Media Player 11 the default player in Windows Vista x64
  9. Update vista!
  10. Run programs with administrator rights
Windows Vista Performance Boosting Tweaks (21-53)
  1. Disable search indexing
  2. Limit start menu search options
  3. Remove remote differential compression
  4. Boost external hard drive performance
  5. Enable Readyboost on any flash memory device.
  6. Speed up SATA drives in Vista.
  7. Assign specific CPUs to applications
  8. Assign priorities to applications
  9. Create shortcuts for running applications with certain CPU/Priority settings
  10. Disable unnecessary services
  11. De-automate Windows Defender
  12. Upgrade to Vista Service Pack 1 Beta (SP1-beta)
  13. Disable superfetch for computers with less memory
  14. Boot Vista with all available processors
  15. Force 32-bit Windows Vista to use all your memory by enabling PAE
  16. Used advanced disk cleanup tools to regain more space
  17. Shut down services faster for faster shutdown.
  18. Disable the Vista sidebar
  19. Set the Sidebar to low priority
  20. Kill the RSS feed sidebar gadget
  21. Disable automatic backup/system restore
  22. Disable hibernate on desktops
  23. Stop scheduled disk defragmentation
  24. Move the Vista paging file for better performance
  25. Set a fixed paging file size
  26. Rebuild the paging file to optimize performance
  27. Move search index to another physical drive
  28. Disable the low disk space check
  29. Disable 8.3 name creation
  30. Disable last access file update
  31. Disable unneeded hardware
  32. Check bootup and shutdown times with the Windows Vista Event viewer
  33. Check your system's health in 60 seconds or less
Mastering & Streamlining the Vista Interface
(54-83)
  1. Use checkboxes for multiple file selection
  2. Enable Windows classic desktop appearance
  3. Reduce start menu opening delay
  4. Disable mandatory thumbnail previews
  5. Remove unnecessary Windows Vista features
  6. Start task manager directly
  7. Run sidebar gadgets without the sidebar
  8. Backup your entire computer with Vista Backup and restore (Vista Business and Ultimate only)
  9. Essential hotkey shortcuts for Vista
  10. Return the run command to the start menu
  11. Using the new 'resource overview' monitor in Windows Vista
  12. Use the Vista reliability checker to track system issues
  13. Disable warning sounds and add visual cues
  14. Create desktop shutdown and reboot icons
  15. Good sidebar gadgets to have (and not to have)
  16. Run any application as administrator with a few keystrokes
  17. Configure Windows Vista autoplay manually to suit your preferences
  18. Disable security notifications
  19. Tweak the mouse scroll wheel
  20. Add Encrypt / Decrypt to Right Click Menu
  21. Disable 'GUI boot' to speed startup
  22. Add administrator account to welcome screen.
  23. Change volume levels for individual applications
  24. Display your backed-up DVD media in Vista Media Center (applies to Vista Home Premium and Ultimate only)
  25. Reveal Vista's hidden context menu power tools
  26. Be the super user
  27. Fix the Start Menu Power button
  28. Enable verbose shutdown messages (Vista business and Ultimate only)
  29. Customize Vista desktop performance
  30. The ultimate Vista performance Tweak (not really)
'Aero'-Dynamics - Customizing the Vista Aeroglass Interface (84-86)
  1. Disable Aero (All versions except Vista Basic)
  2. Disable Aero transparency (All versions except Vista Basic)
  3. Disable min/max window animation in Aero (All versions except Vista Basic)
Network & Internet Performance Tweaks
(87-91)
  1. Enable more simultaneous downloads in Internet Explorer 7
  2. Enable more simultaneous Downloads in Firefox
  3. Fix large file copying problems in Windows Vista
  4. Disable IPV6 in Windows Vista
  5. Refresh shortcut for wireless network searching
Vista Tuning Tips for Notebooks (92-94)
  1. Disable Transient Multi-monitor manager to speed up boot times
  2. Tweak your Vista power saving options for more travel time
  3. Disable Aero interface to save big on battery life
Windows Vista Gaming Tips (95-99)
  1. Update Vista's DirectX9 files for better game compatibility
  2. Disable background features while gaming
  3. Run directX 9 games in Windows XP compatibility mode
  4. Fix/enable 3D sound in some games
  5. Poor game performance? Try DirectX9 mode
Note: The Credit goes to PCSTATS.com. You can get the rest of the article here Hope you'll enjoy and please do comment if you notice some important point missing.

1000 Hacking Tutorials (The Best of 2008)


IMPORTANT NOTES- Scanning results of 1000 Hacking Tutorials (The Best of 2008):
****************************************
1- Norton Internet Security: Clean.
2- Kaspersky Anti-Virus Pro: Clean.
3- AVG Anti-Virus Pro: Clean.
4- NOD32 Anti-Virus: Clean.
5- Avast Anti-Virus Pro: Detected in .../1000 Hacking Tutorials (The Best of 2008)
/Tutorials - blacksun.box.sk/net/sendmail2.txt:
- Malwarename: Unix:Sendmail [Expl]
- Malwaretype: Exploitation

The scan result of Avast Anti-Virus is a false positive!
So just stay cool or don't use this!!!

... Also scanned with most well known antispyware. Reported malware detected by
other anti-malware apps probably are false positives!

<--------------------------------------------------------------------------------->
<--------------------------------------------------------------------------------->
> Intimidated by the AV Scan results & scary names??? Then simply don't try this! <
<--------------------------------------------------------------------------------->
<--------------------------------------------------------------------------------->

1000 Hacking Tutorials (The Best of 2008)
Includes the following:

Create Bootable XP SP integrated CD,Create One-click Shutdown & Reboot Shortcuts
Creating a Board aka Forum on your own PC
Creating Universal Ghost Usb Boot Disk And Cd
Data Capacity of CDs [Tutorial]
Debug, Learn how ***** windows
Delete An undeletable File
Delete Files From The Recent File List In Windows
Digital Camera Guide
Digital Faq -learn Everything About Digital, Capture, Edit, Burning and more
Digital Photo Id Cards, Greate Info
Direct Link To Any Page You Want To In Hotmail
Directx Explained
Disable Compression On Xp, NTFS partition, Disk Cleanup
Disable The Send Error Report, to Microsoft
Disable Windows Logo Key
Discover New Music You'll Probably Love
Download Free Music legally,, legally
Download from a paypal site without paying a penny!
Download From Ftpz, Using Ftp Search Sitez
Download Mp3's Without Using Filesharing
Download Music And Video With ,edia Player9, quick and easy!

Download Timeframes
Dual Boot After The Fact
Dvd Copying-ripping Definitions
DVD Regions Information
Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies
Easily Disconnect-reconnect From Broadband
Easily Find Serial Numbers On Google, easy to do and works like a charm
Ebay Hack*****tip
General Keyboard Shortcuts
Get In Windows 2000 As Administrator
Get the Most Out of Your DVD Recorder
Get The Music You Want To Hear
Get unlimited bandwidth from your host for free
Getting A 1gb Yahoo China Account
Getting Counter-strike Source To Work
getting movies, mp3,games using google
Getting older programs to run on Windows XP
Getting started with Linux for nOObs!
Go to Windows updates anonymously
Google ***** Search
Google secrets
Google Tips & Tricks, (utilizing search engine)
Graffiti On Walls 4 Adobe Photoshop Cs 8.0
Guide For Getting Free Stuff
Guide to IIS Exploitation
Guide to Slipstreaming Service Pack 2
Hard drive Gone Bad
Hardware Firewall
How To Add An Option To Print, the Contents of a Folder!
How To Add Your Own Windows Tips
How to Back Up the Registry
How To Backup Ps2 Games
HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING
How To Block Websties Without Software, block websites
How To Boot Xp Faster (updated)
How to build a black box
how to burn quicker in windows xp
How to Bypass BIOS Passwords
How To Bypass Web Filters, tutorial
HOW TO CAPTURE STREAMING MEDIA
How To Change A Cmos Battery
How to change the serial number used in Windows XP, Valid for XP Corporate
How To Change Thumbnail Size And Quality
How to clear Bios info 2
How to clear Bios info
How To Convert File System, fat - fat32 to ntfs
How To Copy A Dvd Which Will Play On A X Box
How to copy songs from your iPod to your PC
How To Customise Your start Button
How To Delete Those Persistent Nasty Files
How To Directly Go To Inbox, Write Msg, w Hotmail, no need for
How to find MP3's real quickly
How To Find Serial Numbers On Google
How to fix corrupted files in XP
How to fix Windows Installer problem
How To Get A Free I-pod Or Flat Screen Tv, check it out
HOW TO GET ANY WINDOWS PASSWORD
How to Get someones ISP password, Get free internet
How To Get Top Ranking, Search Engines
How To Hack Windows Xp Admin Passwords
How to hack-change your Windows XP Boot Screen
how To Hide Yourself From Network Users, and give access to only specific users!
How To Make An Animted Logo
How To Make Free Phone Calls
How to make key generators
How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!
How To Make XP Go Faster
How To make your own Radio Station 2
How To Make Your Own Radio Station
How to Remove DRM Protection for Video Files
How To Remove Ms Java Vm And Install Sun Java
How To Remove Signin Details Of Msn Passport
How To Remove The Default Admin$ Shares
How to remove the Links folder in IE Favorites
How to Remove WinXP Splash and See Operations
How To Rename Extensions With Ease, with a Renamer.bat file!
How to Rename File Extensions
How To Rename Multiple Files In Winxp
How To Restrict Login Hours Allowed
How to safeguard your files when computer crashes
How to save Windows xp updates
how to search google forlinks
How To See Hidden Files, Using Dos
How To Set search For All Files In Winxp
How to set up a http server running from you computer
How To Set Up A Proxy In Flashget, As Requested
How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin
How To Set Up Direct Connect
HOW TO SET UP FTP SERVER
How To Set Up Proxies In Your Browser
How To Set Zone Alarm Settings!, Fix for ZA ports
How To Setup Your Own Dns (Domain Name Server)
How To Speed Up A Slow Computer
How To Speed Up Http Requests On Internet Explorer, as above
How To Stop Spam
How to swear in all languages
How To Unload Cached Dll Files To Free Memory
How to Use and How to Chain Multiple Proxies!
How To Use File Compression In Windows Xp
How To Use Google To Download Mp3's, and applications.....
How To Use Newsgroups
How To Use You Gmail With Msn Messenger
How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free
HOWTO Change Windows XP Home to Windows XP Pro
Important Faqs For Sp2
Improve Doom 3's Performances!!, simple but efficient trick for every1
Improve your dialup modem preformance
Increase XP Folder Settings
Insert Your Serial For Office 2k, auto install office
Install A New Hard-disk
Install Xp From Dos
Installing Apache on Windows
Installing Gentoo Linux, Amazing step by step tutorial
Installing IIS On Windows Xp Pro
Installing Slackware Linux
Instructions For Removal Of Advertising In Msn Messenger
Ip Address Structure, Expilinatin OF IP Address {A short way}
Irc How To Downlaod From, How to downlaod from IRC
Irc Servers On nix, For people who want to start own IRC net
Keep Files Private
Keep Folders Hidden
Keyboard Shortcuts Result in Excel 2000 - Movement
Keyboard Shortcuts, Microsoft Word
Keyboard Shortcuts, must read
Kill Microsoft Instant Messenger
Lamination Tips, Its a Fast TUT......
Leet Way To Get Your Ip In Windows Xp
Linking Your Xbox To Your Computer
Linux Howto's
List Of Sites Not To Go To
Little help for anonymous mailer
Lots Of Windows Xp Tips, Take A Look!
Lyrics With Google
Make A Autorun File For Ur Cd
Make A Batch File To Clean UR PC!!, All In One!!
Make A Roughly 16 Hour Video Dvd
Make Acrobat Reader 6 load faster.txt 0.42 kB
Make Dvd Iso From Suse 9.2 5 Cds Iso, Linux mode and Windows mode ISO creation
Make Mp3 Files Smaller Without Losing Quality
Make Your Own Ringtones For Mobile Phone, also logos, wallpaper, etc
Make Your Pc Faster, Guaranteed
MakeXPgoFaster
making a .cue file, in notepad
Making A .txt Executable Server
Making Bootable Floppy Disk to Boot into Windows
Making Cd Version Of Doom3 Into Dvd Version
Making Web Page Fonts Consistent and Uniform
Manage Saved Ie Passwords
Mastering The Windows XP Registry
Maximize Dial-up Modem Settings
Microsoft's Really Hidden Files, Reveled Hidden files
mIRC Not Just Another Chat Client, Download Anything You Want Almost
mIRCcommands
Misc Linux Tips & Tricks
Missing Administrator Account
Mobile Secret Codes
Modify .exe Files And ***** A Program
More Hacking/A beginners guide to Hacking UNIX
More Hacking/A *****ing Tutorial/C101-90.000
More Hacking/A *****ing Tutorial/C101-90.001
More Hacking/A *****ing Tutorial/C101-90.002
More Hacking/A *****ing Tutorial/C101-90.003
More Hacking/A *****ing Tutorial/C101-90.004
More Hacking/A *****ing Tutorial/ED!SON.NFO
More Hacking/A Guide to Internet Security- Becoming an Ueber*****er
More Hacking/A Guide to the Easiest Hacking there is
More Hacking/A List Of Some OF The Most Useful UNIX Hacking Commands
More Hacking/A Small Guide to Hacking HOTMAIL
More Hacking/A UNIX Hacking Tutorial
More Hacking/Almost Everything You Ever Wanted To Know About Security
More Hacking/An Indepth Guide in Hacking UNIX and the concept of Basic
More Hacking/An Introduction to Denial of Service
More Hacking/An Introduction to the Computer Underground
More Hacking/Basic Networking
More Hacking/BBS Crashing Techniques
More Hacking/BRUTE- A brute force approach to hacking Unix passwords
More Hacking/Closing the Net
More Hacking/Compression and *****s for Dummies
More Hacking/Computer Bulliten Boards and the Law
More Hacking/Computer Chrime - Current Practices, Problems and Proposed So
More Hacking/Computer eMail and Privacy
More Hacking/Computer Hackers News Articles
More Hacking/Computer Rights vs First and Forth Amentment Right
More Hacking/Computer Security
More Hacking/Computer Security_2
More Hacking/Computer Viruii
More Hacking/Computerized Governmental Database Systems Containing Persona
More Hacking/COPS and Robbers-Unix System Security
More Hacking/Copyright Guides for Photographers
More Hacking/Crash Course in X Windows Security
More Hacking/Crime and Puzzlement
More Hacking/Cultural Formations in Text-Based Virtual Realties
More Hacking/Cyberspace and the Legal Matrix- Laws or Confusion
More Hacking/Dark Angel's Phunky Virus Writing Guide
More Hacking/Defamation Liability of Computerized Bulliten Board Operators
More Hacking/Dept of Treasury Letter
More Hacking/Electronic Bulliten Boards and 'Public Goods' Explainations
More Hacking/Electropolos - Communication and Comunity on IRC
More Hacking/Ethload User's Guide
More Hacking/Formulating A Company Policy on Access to and Use and Disclos
More Hacking/Free Speech in Cyberspace
More Hacking/Gender Issues in Online Communications
More Hacking/Government Computer Security Techniques
More Hacking/HACKDICT
More Hacking/Hacker Test
More Hacking/Hackers A-Z
More Hacking/Hackers Who Break into Computer Systems
More Hacking/Hacking Bank Of America's Home Banking System
More Hacking/Hacking Compuserve Infomation Service
More Hacking/Hacking Faq
More Hacking/Hacking GTE Telemail
More Hacking/Hacking IRC - The Definitive Guide
More Hacking/Hacking PC-Pursuit Codes
More Hacking/Hacking Techniques
More Hacking/Hacking TRW
More Hacking/Hacking TYMNET
More Hacking/Hacking Unix System V's
More Hacking/Hacking Wal-Mart Computers
More Hacking/Hacking Webpages
More Hacking/How the Traditional Media Clasifications Fail to Protect
More Hacking/How to crash AOL
More Hacking/How to dial out of a UNIX System
More Hacking/How to find Security Holes
More Hacking/How to get a Shell in 24 hours
More Hacking/How to Hack UNIX System V
More Hacking/How to login to a C.B.I. System
More Hacking/How to send ICQ Bombs
More Hacking/Information of Hacking AngelFire Websites
More Hacking/Introduction to Denail of Service
More Hacking/IP addressing, and gaining IP's
More Hacking/IP Addressing
More Hacking/ISSN Numbers- An Introduction
More Hacking/Junk Mail- How Did They All Get My Address
More Hacking/LENROS~1
More Hacking/LENROS~2
More Hacking/MEMETICS
More Hacking/MINDVOX
More Hacking/MORRIS~1
More Hacking/NEIDOR~1
More Hacking/NFS Tracing
More Hacking/Nightline- FBI,Privacy,and Proposed Wire-Tapping Legislation
More Hacking/NY_2'S Guide to Obtaining An IP Address
More Hacking/Organizational Analysis in Computer Science
More Hacking/PGP Startup Guide
More Hacking/Presumed Guilty
More Hacking/Raising Hell with Unix
More Hacking/Remarks of the President and Vice President to Silicon Valley
More Hacking/RIGGSB~1
More Hacking/RIGGS_~1
More Hacking/RIGHTS~1
More Hacking/RIVERA
More Hacking/Security holes
More Hacking/Seisure Warrent Documents for Ripco BBS
More Hacking/Site Security Handbook
More Hacking/SJ-DEC~1
More Hacking/SJ-RESP
More Hacking/SMTP-Simple Mail Transfer Protocol
More Hacking/Summary of FBI Computer Systems
More Hacking/SUNDEVIL
More Hacking/SUPREM~1
More Hacking/TCP packet fragment attacks against firewalls and filters
More Hacking/Telenet-The Secret Exposed
More Hacking/The Basics of Hacking- Introduction
More Hacking/The Baudy World of the Byte Bandit-A Postmodernist Interpretation
More Hacking/The Constitution in Cyberspace
More Hacking/The *****ing Manual
More Hacking/The Electronic Communication Privacy Act of 1986 - A Laymans
More Hacking/The Greatest Hacker of all time
More Hacking/The Hacker's League
More Hacking/The Inner Circle Book's Hacking Techniques
More Hacking/The Lamahs-Guide to Pirating Software on the Internet
More Hacking/The M.M.C. Guide to Hacking, Phreaking, Carding
More Hacking/The National Information Infrastructure-Agenda for Action
More Hacking/The Newbies Handbook- ' How to beging in the World of Hacking
More Hacking/The Newbies-User's Guide to Hacking
More Hacking/The Pre-History of Cyberspace
More Hacking/The Price of Copyright Violation
More Hacking/The REAL way to hack RemoteAccess
More Hacking/The Secret Service, UUCP,and The Legion of Doom
More Hacking/the UNIX operating system (Berkley 4.2)
More Hacking/Theft of Computer Software-A National Security Threat
More Hacking/Thoughts on the National Research and Education Network
More Hacking/Tips on Starting Your Own BBS.1
More Hacking/undocumented DOS commands
More Hacking/UNIX Computer Security Checklist
More Hacking/UNIX Use and Security - By the Prophet
More Hacking/UNIX Use and Security From The Ground Up
More Hacking/UNIX- A Hacking Tutorial.SIR
More Hacking/Viruii FAQ
More Hacking/Virus-Trojan FAQ
More Hacking/What Files are Legal for Distribution on a BBS
More Hacking/What To Look For In A Code Hacking Program
More Hacking/What To Look For In A Code Hacking Program
More Hacking/What You Should Know About Computer Viruses
More Xp Tips and tricks make your computer more faster
Moving and Removing the Start Button
Msn Messenger & Gmail
My Flash Bookmarks, long list of tutorials
Myth about WPA ( How it is done ), Windows Product Activation Technique
Your Own Home Server - Introduction

...and much more!!!
 
Just right click on the link below and click save as
 
Download Here

Why 360 Marketing Sends You Round In Circles.

Written By Unknown on Thursday, 28 October 2010 | 14:04


My friend who carried this bag had no idea what it meant - she just liked the bag. To me it was simply a further outbreak of the 360 plague that infects our world to very little marketing effect.

Whenever I see it, I am struck that while I know it's meant to indicate something like constant interaction, it primarily reminds me that 365 is a much better known number - and thus 360 seems like taking 5 or 6 days off. It seems to be a diminished claim.

It's all very well for marketers to think they understand what 360 means in their world, but that's not enough to justify pasting it everywhere regardless of the sub-context, under the assumption that your customers understand it and in the misguided belief that it will aid differentiation. That way leads to things like Vodafone360 People.


Vodafone 360 People "brings all your friends together backed up in one place" which I'm not sure has much at all to do with the generally agreed 360 ideal. It strikes me that it's simply been bundled under the heading of Vodafone 360 that they advertise heavily in stores and brochures. It's the branding equivalent of scrambling around for some copy to fill the media space you belatedly realise you've bought. To confuse things further, they also promote Vodafone 340 in the same places. And no, that's not 360-lite. It's simply a phone.

I'm all for marketing making the meme, but when the meme's making the marketing, you've got problems.

How To: Avoid Getting Fleeced By Firesheep

Written By Unknown on Wednesday, 27 October 2010 | 21:42

Over the last 24 hours the world has been abuzz with talk about a small Firefox extension. Usually Firefox extensions don’t make headlines, but in this case one did. Why? This extension is called Firesheep, and it’s scary.

The Firesheep plugin can hijack your Facebook, Twitter, and Flikr sessions while you are connected to unsecured wifi. What do we mean hijack? We mean that it can steal your sessions, pretend to be you, and you won’t even know it.

Yeah, wow.

There is a lot of discussion about the ramifications of releasing something that is simple enough to let anyone become a hacker, and TUAW has some good suggestions for how to guard against Firesheep, but I want to give you my take on it and what practical steps you can take.

First off I want to tell you about my day yesterday (it relates, trust me). Sitting at home working on articles for this joint, I get a call from one of my friends at the CBC. “Have you heard about Firesheep?” I said I saw some headlines, but I hadn’t really looked at it. “Could you look at it and talk about it on camera?”, umm…sure….when? “How about an hour?” Eek. Sure…why not.

I dash to one of my favourite coffee places close by (which I also knew had open wifi) after getting Firesheep all loaded up (it took less than a minute). I order a latte, settle in and …

Holy crap.

Just like everyone said, running Firesheep I could see who was logged into Facebook and a bunch of other sites and with a double-click be that person.

Holy crap.

I’m not usually a terribly paranoid person online, but this gave me the willies. Anyone could have this running and you’d never know it. Oh sure, packet sniffers have been around for a while (that’s how it works), but packet sniffing isn’t easy for most people. Firesheep is easy enough for a kid to use. So how do you combat this? Well let’s get to that now…

First thing, if you have a wireless network at home and you haven’t set up a WPA (or even WEP) password on it, do it now.

Next, for all the businesses that have open wifi, now is the time to bite the bullet and put a password on the network. No, I’m not talking about a “gatekeeper” password that lets you in for a period of time, but WPA/WEP. Encryption. Yes, I know it’s a hassle for people to ask, but just make it obvious. This isn’t about access control, it’s about safety. I showed the manager of the place where the CBC segment was shot what the risk was and he was pretty shocked.

If you frequent a place that has open wifi, ask them to put a password on it. If you lock down your wireless network, then that’s it. Firesheep isn’t a problem. If you’re slightly techie and know how to do this, offer to help. For free.

In the meantime, you can try Firefox extensions like Force-TLS or HTTPS Everywhere or Chrome a extension like KB SSL enforcer all of which force the site you’re on to load the HTTPS (encrypted) version of the site. The problem I ran into with KB SSL today was that a lot of sites don’t have their HTTP and HTTPS versions working together very well. I had to shut it off to read some things…so what does that do? These solutions are only a stop gap as far as I’m concerned.

For those of you lucky enough to have a mobile data stick or can tether your phone for access—both of those are nice and secure. What about your WiFi only mobile devices? Those I don’t have good solutions for. Myself I have both my iPhone and iPad set not to just autoconnect to available networks and I’m going to have them both “forget” several of the local places I go to that don’t have secured wifi. Yes, mobile devices are also vulnerable because this isn’t a vulnerability in a browser or device it’s while how you can the sites connect to each other.

This is what bugs me the most about the whole Firesheep problem. Websites like Facebook and Twitter could force everyone to https like gmail does, but they choose not to. Until now, the risk hasn’t been that huge, but now…now I don’t think they can say that.

From now on, if it’s unsecured WiFi, I’m not using it. Period. If I absolutely have to, then I’ll run a proxy. Yeah, it’s harsh, but even the Firefox and Chrome extensions are only a partial solution. They aren’t 100% and they don’t work with all sites equally well. All you need to do is forget to turn them on or have an application notifier running in the background and …

Done like dinner.

My last tip is for the rather geeky of you who happen to have a web host who lets you have an SSH (shell or terminal) connection (both Dreamhost and Bluehost do) is to use this awesome trick for setting up a secure/encrypted proxy. I use this one all the time, it takes just a moment to set up, but is very, very secure.

If you want to see the entire CBC piece (which gives the right level of urgency I think), the video is up on the CBC site now.

And if you have more suggestions…please let us know in the comments.

Notorious Koobface worm ported to Mac OS X

Security researchers say they've been monitoring a Mac OS X version of the notorious Koobface worm, which uses advanced rootkit techniques to stealthily hijack infected machines.

Although the Mac version isn't yet ready for prime time, it is nonetheless a sophisticated piece of software that developers put a fair amount of effort into implementing. It was designed to use Oracle's Java framework to infect not just Macs, but Linux and Windows machines as well, according to Mac antivirus provider Intego. Once installed, the malware gives attackers complete control over the computer.

“While this is an especially malicious piece of malware, the current Mac OS X implementation is flawed, and the threat is therefore low,” Intego researchers wrote in a blog post published Wednesday. “However, Mac users should be aware that this threat exists, and that it is likely to be operative in the future, so this Koobface Trojan horse may become an issue for Macs.”

For that to happen, attackers will probably have to figure out how to bypass a window OS X prominently displays warning that a self-signed Java applet is requesting access to the computer. Assuming they do, or are able to trick users into clicking “Allow” anyway, they will also need to resolve issues preventing the downloaded files from installing.

Those are high hurdles. But Koobface's considerable success on Windows shows just how gullible many marks are when it comes to scams promising free videos.

Once installed, the downloaded files are stored in an invisible folder and give the infected Mac the ability to run a local webserver or IRC server and to act as an DNS changer.

Intego is calling the malware OSX/Koobface.A, while SecureMac, which also blogged about the attack, calls it trojan.osx.boonana.a.

Lists of Ultimate Wap Sites You Should Know. Enjoy!!!!!

I was searching for a few WAP sites to download ringtones, software, videos, wallpapers, software for mobiles. In the process, I came across all these links that I thought will be helpful for everyone :
Free Ringtones, logos, SMS services : http://twilightwap.com/mobile/

Latest Nokia ringtones : http://tagtag.com/kwapster

Get your own photos on WAP : http://wappy.to/moppylot

Keep track of your movie collection and related information : http://www.leofun.com/m/

Hungarian Portal ENCI: http://tagtag.com/enci

Images and screenshots for SonyEricsson Phones: http://tagtag.com/corradine

Free games and pictures http://users.fireflyuk.net/~queens14/wap/index.wml

Games, wallpapers, applications : http://tagtag.com/all4u

National Flags of all countries : http://tagtag.com/allflags4u

Wallpaper for Nokia 3530 : http://tagtag.com/jignesh

Free games, ringtones, screensavers : http://tagtag.com/skillz

Free graphics : http://www.mrbadger.com/artyfarty

Remove your operator logo : http://www.mrbadger.com/logowash

Wallpapers for Nokia phones : http://tagtag.com/vkfloyd

Email on your mobile phones : http://www.tlogi.com/wap/

Free Polyphonic ringtones, MP3, games, video clips, http://summerston.org/wap/index.php

Games, ringtones, wallpapers : http://abdulsathar.bizhat.com/wap/home.wml

Data Care Point: http://wap.datacarepoint.com

Free Graphics, Wallpapers, Games, Polyphonic, True, Real Ringtones.

WAP-related software download sites on the web : http://www.palowireless.com/wap/downloads.asp

Bollywood polytones, wallpapers, animations, games : www.wapgautam.somee.com/wap

Online image software : www.wap.sayni.net

Bollywod ringtones : www.geocities.com/psychonishtarian/wapsite

Pinoy : www.bestpinoy.wen.ru/main.wml

Orkut mobile login : www.tagtag.com/orkutlogin

WAP Video – http://m.vtap.com

Football livescore and football search : http://www.betscores.mobi

AOL: http://mobile.aol.co.uk

EBay: http://wap.ebay.com

ESPN: http://wap.espn.com

Google: http://wap.google.com

Google for WAP Sites: http://wap.google.com/wml?hl=en&wmlmode=wml

MapQuest: http://wl.mapquest.com

Movie Times: http://wap.hollywood.com

OAG Flight Info: http://www.oag.com

PayPal: http://www.makemoneykingdom.com

Radio Song Info: http://mobile.yes.com

SuperPages: http://superpages.com

Telco Data: http://www.telcodata.us/index.wml

Software: http://www.forexfreedownload.com

Weather Channel: http://cingular.weather.com/myweather/home#start

(National) Weather Service: http://www.srh.noaa.gov/port/

I’ll add more links as I come across new ones and if you have some to share please do comment on the box below


New N900 software update available! (PR 1.3 aka 20.2010.36-2.002)

Written By Unknown on Tuesday, 26 October 2010 | 18:47

http://maemo.nokia.com/img/device-intro-bg.jpg
A new software update is now available for your Nokia N900. The update adds Ovi Suite support to your N900 and makes it even easier to access and sync files and messages between your device and your desktop. In addition, we’ve added hundreds of tweaks and fixes that will make your N900 run faster and smoother than ever.
And there’s even more great news. Ovi Music Store is now accessible right from your N900 (where available). You can use your inbuilt browser to access music.ovi.com and download your favorite tunes straight to your device in DRM-free format.
Be sure to check out the latest games and apps from Ovi Store, like Angry Birds Level Packs 2 & 3, Kroll, Tower Boxx Deluxe 3D and Joiku WiFi Hot Spot. If you receive a not enough memory warning when you try to update the software, just uninstall a few apps and try again.
Also worth noting is that the phone has less lag and is faster along with Qt Applications support. Don't forget dual booting Meego and Maemo at the same time, although I'm not sure if this was implemented yet.
Happy downloading!
Raw computer power Raw computer power

Don't Treat Customers As Revenue Sources.

Written By Unknown on Monday, 25 October 2010 | 14:13


My mobile phone provider frequently fills my time with irrelevant offers designed to bring them more revenue. My mobile phone provider also knows I make a lot of international calls. But when they implemented a new international call plan six months ago, they failed to tell me about it. As someone admitted, "they don't shout about it".

Presumably, they don't expect their customers to shout about it, but I did.

Firstly on the phone where I had to endure a whole bunch of security questions despite making it clear at the outset that I was just seeking to clarify when the plan was implemented.

That just served to remind me of the insurance company with which I once worked. They discovered that they asked a woman more than twenty scripted questions when she rang their emergency claim line before they got to the important question are you ok? At the time she was less than ok - her house was burning down in front of her along with the policy details they were demanding.

Then I tried by letter. I addressed it by name to the customer service director, but received a written response from someone else. Its first words? "Good Morning" followed by an acknowledgment that I had now signed myself up to the plan and the implication that all was now well.

That just served to give me the impression they were an outsourced worker with no authority to deal with my query (other than to fob it off). It also made me realise that this customer was in the middle of a common pincer movement comprised of a cost-cutting exercise and a revenue-maximising approach.

Yes, it maximises marginal profit. But in a world of inert (and thus continually profitable) customers, your focus should be on making them more inert. You really should avoid giving them reasons to contemplate leaving you.

How To "hack" Msn Accounts + Related Questions

I have been seeing a lot of topics lately about users wanting to know how to hack into msn messenger accounts or steal password to msn and so on. I thought I would clear up a few things so that you hopefully will get your questions answered.

Firstly. If you don't have time to learn the background information needed or you simple can't be bothered to research this topic on your own and you just want to Hack MSN then this service
http://www.astalavis...service=hotmail is for you and just let the astalavista autohacking service for hotmail take care of the rest.

Hopefully you want to learn more and are continuing to read my blog entry...


Quick Q & A:

  • Q: I want a program or software that hack msn passwords / accounts for me. Where can I get that and please give me this program.
  • A: There are NO such program that will hack msn passwords. I mean NO available software online. The reason for this statement is simple. Think about who is developing MSN messenger.. Microsoft has thousands of programmers, have introduced numerous security standards, spend billions of dollars on their software. Do you really think that 1) Microsoft would not be able to secure one of its most used services from your little point-and-click program? Think again. 2) If a vulnerability was found it would most likely be with the software in itself (and then you only can extract your own password and not other peoples). 3) Real hacking programs don't come with a messed up graphical user interface screaming "MSN HACK MSN HACK". 4) These programs usually ask for YOUR username / password in order to hack other peoples account. If you are smart enough to give away that information you have just been the victim of a social engineering attack. Stupid...
  • Q: How can I get msn passwords?
  • A: I am assuming you are not interested in your own password. 1) Just ask them for their password. This is known as a "social engineering attack" and is the most effective means of stealing information. "Kevin Mitnick" might be a nice thing to search google for. An example: "Hello, I'm calling from msn tech support. We are currently changing all the passwords and are wondering if you have recieved information about this? No? Then we will have to do it manually... What is you password and username?" 2)Trick the victim into running a file you send them. This file would then contain a trojan that monitores keystrokes and transmits it back to your computer. There are numerous software available for that. Just use google. 3) If all that fails or you again can't be bothered learning "how to hack" by educating yourself. You can again use the autohack service located here: http://www.astalavis...service=hotmail
  • Q: How do I learn how to hack?
  • A: You start by learning how to program. Start with a simple programming language such as Python or Java (not so simple, but anyway). Read books such as Practical Programming: An Introduction to Computer Science Using Python http://pragprog.com/...cal-programming and Learn to Program, 2nd Edition http://pragprog.com/...ram-2nd-edition Once you have read these books you should start learning SQL and trying to understand what SQL Injection is.
  • A v2: Hacking is just knowing a programming language so well that you can see problems that the original developers did not see. Example: A developer that does not sanitize the input to the program, may have create a vulnerable attack point to injection attacks. The hackers SQL injection is dangerous because he/she knows that the developer might not have programmed the application correctly and by inserting values that the original developer did not intent to be handled. One can perform a "hack". In is simplest form this will be entering a string ('abc') when the software / web page wants a number as an input.

  • Q: Teach me how to hack!
  • A: That is not a question and you will recieve no help. Start by asking!
  • Q: CAN you teach me how to hack?
  • A: Still no! If you don't try to learn about SQL atleast and programming in general, you will NOT understand what I am telling you anyway. One must have a common background knowledge in order to teach anything to anybody.

Note: One thing to think about is that "point and click" hacking is dangerous. You should always know what you are asking the program to do. It's still illegal and you WILL be caught because you don't know what you are dooing. Educate yourself, help others. Don't be destructive, be creative. If you are serious about learning hacking you should download backtrack: http://www.remote-ex.../backtrack.html and start webGoat from OWASP: http://www.owasp.org...WebGoat_Project This way you can educate yourself by using your own computer instead of ruining someone else's day.

Advice: If you are so desperate to hack msn passwords, email accounts and so forth I assume you want to spy on your girlfriend/boyfriend. If you are gooing to the step of trying to hack their private accounts you should step back and think about the trust issues you have and consider dumping that person. It's just not worth it.

Web 2.0 Expo: Top ten Web hacking techniques

A large portion of the Web 2.0 Expo attendees are focused on content. They want to create better, more engaging content for social media programs and Web engagement with their customers. But the Web and application developers behind this content need to know how to secure it. This is what Jeremiah Grossman, CTO and founder of WhiteHat Security, discussed today during his presentation, “The Web Just Got A Little More Dangerous.”

“I say a little more dangerous because the Web was already broken,” he said.
Grossman stressed that the more we rely on the Web, the more attractive the Web becomes as an attack vector. Companies need to be concerned both about data security and potential brand damage when it comes to Web security. He shared with the audience a top ten — or most dangerous — list of Web hacking techniques from 2008 of which developers especially should be aware:

10.  Flash Parameter Injection - Using cross-site scripting, this can grant the attacker full control over the page, as well as control over other objects within the movie. Best defense, when you’re developing flash applications be sure to sanitize user input according to context before its reflected back to the user.

9. ActiveX Repurposing - Multi-staged attack to get code execution on victims who were running a vulnerable and popular SSL-VPN attack. Defenses are making sure ActiveX makes use of Sitelock wherever possible and restrict Active X to the maximum degree possible.

8. Tunneling TCP over HTTP over SQL-injection - The best defense against this kind of attack is a good network architecture, solid application design and database hardening.

7. Cross-domain leaks of site logins via authenticated CSS - Checks the contents of a stylesheet property across domains to determine whether the victim is logged in to a given Web site. Do not store anything user-sensitive in a CSS style sheet. It won’t prevent the bad guy from knowing the user uses your site, but it will prevent them for knowing if they are logged in.

6. Abusing HTML 5 structured client-side storage. Attackers could steal or modify sensitive data online or offline. If a Web app uses this kind of client-side storage is vulnerable to attacks. Avoid saving sensitive data on the users machine and clear the client-side storage whenever possible; regularly check the content of the HTML5 client-side storage.


5. A different Opera - Exploit an XSS in Opera, however, upgrading to Opera 9.62 versions and up should take care of the problem.

4. Clickjacking / videojacking - An attacker can invisibly hover buttons, images or links below a user’s mouse so that when a user clicks on what they think is a trusted button or link, but they are actually executing an embedded code . Without the user knowing, it can even capture pictures and video, and even audio. Clickjacking enables corporate espionage, government surveillance, home user spying, etc.  Upgrading to Adobe Flash 10 can help. Also, frame-busting code to make sure any pages you deem important are not as susceptible for clickjacking. Internet Explorer 8 also has some anti-clickjacking functionality.

3. Safari carpet bomb - Allows an attacker to litter a Windows’ user’s desktop or a Mac users’ desktop with arbitrary files and malware. Windows users should download the latest ersion of Safari.

2. Breaking google gears’ cross-origin communication model - The cross-origin comm model could be bypassed so an attacker could gain access to sensitive resources of the victim in other Web sites (even those that do not use Google Gears). Update Google Gears to minimize risk.

1. GIFAR - Content ownership issue. The attacker combines a GIF image file and a Java archive (JAR) that contains class files for a Java Applet. A Web application will then allow the upload the image to a server, but the malicious applet code can be executed. To protect against this do not accept file uploads. Or, upload you get convert it to another image no matter what (Facebook does a good job with this). For an end user, disable the third-party browser extensions and install the latest JVM and remove older versions.

Kick off your day with ProHackingTricks daily e-mail newsletter. It's the freshest tech news and opinion, served hot. Get it.

10 Must-Have applications for your USB PenDrive

Having portable apps in Pen Drive is must for computer geeks. No need to install this softwares in your PC. Just double click on them and they are ready to use.Here is the list of 10 must have portable freewares.
1. Mozilla Firefox Portable Edition
Carry the  “safest browser in the world” with you,  also have your extensions, bookmarks and addons ready to use any time.

2. VLC Media Player Portable
Best media player supports almost all popular media file formats.  Now take it with you anywhere you go.

3. Pidgin Portable
All-in-one instant messaging (supports AIM, ICQ, MSN Messenger, Yahoo, Gtalk, etc)

4. ClamWin Antivirus Portable
If you are a tech-geek you must be already having this on your thumb drive, free professional antivirus to keep your PC safe anytime, anywhere.

5. Notepad++ Portable
Must have tool for programmers and developers. It’s main syntax highlighting feature makes it look different from other common text editors.

6. 7-Zip Portable
Now uncompress all types of compressed files with this cool free app. This is one of the most popular freeware now made portable.

7. CCleaner Portable
Free, easy to use and very useful application. Cleans crap files from your system in few minutes. Makes you PC run faster.

8. Utorrent
Download torrent files from anywhere you go.Tiny bittorrent client.

9. Restoration
Recover accidentally deleted files – even after they were deleted from the recycle bin.

10. Foxit Reader
Foxit Reader is a small and fast PDF viewer that is compatible with PDF Standard 1.7. It includes Javascript support, interactive form filler, annotation tools and built-in text converter.

Reset Your lost Bios Password

Written By Unknown on Friday, 22 October 2010 | 13:17

Here's a DOS trick for Windows 9x, that will reset (delete) your motherboard's BIOS password (aka CMOS password) without any need to open up your computer to remove the battery or mess with jumpers.

This method can come in very handy in the event you ever lose and forget your BIOS password or if you acquire used computers where the unknown previous owners had BIOS passwords set (in fact, this happened to me long ago
was given a used computer, but there was no way I could enter the CMOS to make changes). It's important to note here that the password we are talking about is only the one that prevents a user from entering the BIOS setup at bootup, not the one that stops you from getting past the boot.

Normally, at bootup you can press a key (usually the DEL key) to access your BIOS allowing you to view it or make changes. With a password set, there is no way to enter setup. Though a password can provide a basic and very effective level of PC security, losing it can be a real headache if you don't know how to fix the problem.

The MS-DOS command that will makes this trick possible is the DEBUG command (debug itself is a utility
debug.exe which is located in your Windows Command folder). This is not a command to be taken lightly in other words, it's not a command to play with! You can cause serious corruption with this command and can end up not being able to even boot your computer! Debug is used to work with binary and executable files and allows you to alter (hex edit) the contents of a file or CPU register right down to the binary and byte level.

To begin debug mode, type debug at a MS-DOS prompt or you can specify a file, i.e., DEBUG FILE.EXE. There is a difference in screen output between the two methods. When you type DEBUG alone, debug responds with a hyphen (-) prompt waiting for you to enter commands. The second method, with a file specified, loads the file into memory and you type all the commands on the line used to start debug. In this tip, we will be writing to the BIOS, so the first method is the one that would be used. All debug commands can be aborted at any time by pressing CTRL/C.

Accessing BIOS with DEBUG
The basic trick will be to fool the BIOS into thinking there is a checksum error, in which case it resets itself, including the password. This is done by invalidating the CMOS and to do that we must know how to access the BIOS and where the checksum value of the CMOS is located so that we can change it. Access to the the BIOS content is via what are known as CMOS Ports and it's Port 70 and 71 that will give us the needed access. On almost all AT motherboards, the checksum is located at hexadecimal address 2e and 2f and filling the address 2e with ff is all you should have to do to invalidate the checksum.

Here's what to do if you ever need to reset the password and have no other method, and you don't want to open up your computer to remove the battery or jumpers.
Note! Do this at your own risk. I can only tell you that it has worked for me more than once and has worked for others as well. But I cannot make any guarantees. When I did this, I took a willing risk. The BIOS was Award Modular BIOS v4.51PG

Restart your computer in MS-DOS mode.

When you get to the C:\> or C:\WINDOWS> prompt, type DEBUG and press Enter.

A hyphen (-) prompt will appear waiting for you to enter commands.

Enter the following commands, pressing Enter after each one. Note: the o is the letter o and stands for OUTPUT.
 
o 70 2e
o 71 ff
q

After the q command (which stands for QUIT), enter Exit.

Then try to enter your BIOS at bootup. The password prompt should now be gone and you should now have full access to it again. However, you will now be at the default BIOS setttings and may want to change them to your preference. You may also want to have your drives autodetected again.
In closing, I should state that in the case of a lost BIOS password, your first step should always be to contact your manufacturer to see if a backdoor password is available that will allow you to bypass the forgotten password.

There are many sites on the net that list backdoor passwords you can try, but beware that some BIOS that are set up to lock up if you enter the wrong password more than a certain number of times, usually only 3 times!

Some Useful Nokia mobile phone Secret Codes list

On the main screen type
*#06# for checking the IMEI (International Mobile Equipment Identity).
*#7780# reset to factory settings.
*#67705646# This will clear the LCD display (operator logo).
*#0000# To view software version.
*#2820# Bluetooth device address.
*#746025625# Sim clock allowed status.
*#62209526# - Display the MAC address of the WLAN adapter. This is available only in the newer devices that support WLAN
#pw+1234567890+1# Shows if sim have restrictions.     

*#92702689# - takes you to a secret menu where you may find some of the information below:
 1. Displays Serial Number.
2. Displays the Month and Year of Manufacture
3. Displays (if there) the date where the phone was purchased (MMYY)
4. Displays the date of the last repair - if found (0000)
5. Shows life timer of phone (time passes since last start)

*#3370# - Enhanced Full Rate Codec (EFR) activation. Increase signal strength, better signal reception. It also help if u want to use GPRS and the service is not responding or too slow. Phone battery will drain faster though.
*#3370* - (EFR) deactivation. Phone will automatically restart. Increase battery life by 30% because phone receives less signal from network.
*#4720# - Half Rate Codec activation.
*#4720* - Half Rate Codec deactivation. The phone will automatically restart
 
If you forgot wallet code for Nokia S60 phone, use this code reset: *#7370925538#
Note, your data in the wallet will be erased. Phone will ask you the lock code. Default lock code is: 12345

Press *#3925538# to delete the contents and code of wallet.

Unlock service provider: Insert sim, turn phone on and press vol up-arrow keys) for 3 seconds, should say pin code. Press C, then press * message should flash, press * again and 04*pin*pin*pin#

*#7328748263373738# resets security code.
Default security code is 12345

Trick to Complete Formatting Mobile Phone

Here is the trick for complete formatting of your virus infected or other problem arriving mobile phone...

This trick is for almost all Nokia models.

1. Switch off your phone...
2. Remove SIM card & memory chip...
3. Now press & hold keys - 3,*,call green) ...
4. Then without leaving these three buttons press power button...
5. Formatting task will be started...
6. Remember its a very rare trick....
 Yes its true its call hard format.
 key * , 3 , Call button (green) press and hold when display is on than formatting screen is displayed. 

Wait for formatting to be finished, 
Before carrying out this process make sure you have copied all your contacts and notes onto your Memory, because every thing will be deleted. When its finished the formatted phone may be like new, just like when u have brought it from showroom.

Top 20 Tips To Keep Your System Faster

Follow these tips and you will definitely have a much faster and more reliable PC!

 1. Wallpapers: They slow your whole system down, so if you're willing to compromise, have a basic plain one instead!

2. Drivers: Update your hardware drivers as frequently as possible.  New drivers tend to increase system speed especially in the case of graphics cards, their drivers are updated by the manufacturer very frequently!

3. Minimizing: If you want to use several programs at the same time then minimize those you are not using.  This helps reduce the overload on RAM.

4. Boot Faster: The 'starting Windows 98/XP' message on startup can delay your booting for a couple of seconds.  To get rid of this message go to c:\ and find the file Msdos.sys.  Remove the Read-Only option.  Next, open it in Notepad or any other text editor.  Finally, go to the text 'Options' within the file and make the following changes: Add BootDelay=0.  To make your booting even faster, set add Logo=0 to remove the Windows logo at startup.

5. Restart only Windows: When restarting your PC, hold down Shift to only restart Windows rather than the whole system which will only take a fraction of the time.

6. Turn Off Animations:  Go to Display Settings from the Control Panel and switch to the Effects Tab. Now turn off Show Windows Content While Dragging and Smooth Edges on Screen Fonts.  This tip is also helpful with Windows XP because of the various fade/scroll effects.

7. Faster Start-Menu Access: Go to the Start menu and select Run.  Now type Regedit and hit Enter.  The Registry Editor will appear on the screen.  Now, open the folder HKEY_CURRENT_USER\Control Panel\Desktop.  You should see a MenuShowDelay value.  If you don't then do the following: right click on a blank space in the right pane and select New\String.  Change the name in the new value to MenuShowDelay.  Now that we have the MenuShowDelay value, double click on it and enter 0 in the value data field.  This sets the start menu delay to 0 milliseconds.

8. Resolutions: If you are willing to do anything for faster performance from your PC, then try lowering your display resolution.  The lower it is, the faster your PC.

9. Turn off Active Desktop:  Go to your Display Properties and switch to the Web tab.  Uncheck View My Active Desktop As a Web Page.  Since the Active Desktop option under Windows 98 uses a lot of system resources, this option can have a dramatic effect on the speed of the whole system.

10. Defragment Often:  Windows 98's Defrag tool uses Application Acceleration from Intel which means that when you defragment your drive, data is physically arranged on the drive so that applications will load faster.

11. Take your PC to Bed:  Using the Advanced Power Management feature under Windows 98 gives you the option to use the sleep command.  That way, you can send your PC to sleep instead of shutting it down and then restarting it.  It's as simple as pressing a button and then pressing the same button to wake it up.  You can tell Windows after how many minutes/hours of inactivity to automatically sleep the machine in the Advanced Power Management section of the Control Panel.

12. Faster Internet Access: If you use the internet for reference and the sites you visit are rarely  updated then try the following.  In IE (the same can be done in Netscape) go to Tools, Internet Options.  Next, click on Settings... in the Temporary Internet Files  section.  Finally, select Never for the first option and double the amount of storage space to use, click OK!

13. Benchmarking: Benchmarking can be very useful when run frequently.  It can tell you how your PC's components are performing and then compare them to other machines like yours.  For example, when you overclock your PC, you want to know how much more speed you have and whether it is stable.  All this and more can be discovered using benchmarking.  An excellent piece of software for doing this job is SiSoft Sandra which can be found in the Downloads File Archive!

14. Refresh the Taskbar without restarting: If you in some way change the taskbar, either in Regedit or elsewhere, you can refresh the task bar without restarting.  Hold down Ctrl Alt Del, and double click on Explorer.  Say Yes to close Explorer, but no to closing Windows.  This will refresh the Taskbar and system tray.

15. Quick CD Eject: Instead of pushing the button on your drive, right-click your CD drive letter in My Computer and click on Eject.  This will also remove any icons that have become associated with the CD drive

16. Start Up Programs:  Windows can be slowed down when programs run on start up.  To eliminate this, check your Start up folder.  You can access it from the start menu: Start, Programs, Start Up.  Another way to eliminate programs from loading even before Windows actually starts is by doing the following: Click on Start, then Run.  Type msconfig.  It will take quite a long time for this program to load, but when you finally see it on your screen, explore the different tabs.  They all have to do with how quickly your PC boots, so select what you want, and uncheck what you don't want!

17. Fonts: When Windows starts, it loads every single font in the Fonts folder.  Therefore, the more fonts you have, the slower the booting process.  To get rid of unwanted fonts, simply go to the Fonts folder under c:\windows and remove whatever you don't want.  Fonts that have a red letter 'A' as their icon are system fonts, so don't delete them.

18. Stretching Wallpapers:  Don't "stretch" your wallpaper in Windows 98 since it actually slows Windows down when you drag icons around on the desktop.

19. RAM Matters: If you have less than 32MB then you should seriously think of upgrading it to at least 64MB.  Windows runs much more smoothly with 64MB or higher and tends to use less hard disk space for virtual memory.

20. Partitioning: A very nice little thing you can do to boost system performance.  By partitioning your hard drive, splitting one physical drive into several logical ones, you can gain several advantages.  1. If you get a virus or you accidentally format a drive, not all will be lost.  2. By placing the swap file (Win386.swp) on a separate drive, The swap file will be less fragmented and thus, faster. 3. Place Windows on a separate drive and whenever you need to reinstall it, you rest assured that your data is safe on a separate drive.  Partitioning can be done using a few programs such as FDisk which comes with DOS.  However, FDisk formats everything on the hard disk before partitioning. Alternatively, you can use Partition Magic from Power Quest to partition your hard disk without losing your data.


 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. Turorial Grapich Design and Blog Design - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger