Thursday, May 28, 2009

Vista User Time Manager v4.1.1.1 (NEW)

No image to display!


If you're concerned your child may be spending much time or the games online
Or you do not want him or her to use your PC when you want to sleep or away from home
Vista User Time Manager allows you to set limits on how much time your child spends on the computer or online.
- Vista User Time Manager allows you to specify exactly when and how long the computer can be used and define users who are allowed to use the computer without any limits. You can schedule time intervals and the number of hours each child can use the computer per day a week. It automatically logs your child out of your computer when it's time for lights out. You can also prevent the PC usage until the specified date, after the specified date or between specified dates.

- Vista User Time Manager can record all actions to a log file so you will know when and how much your child used the computer. The password control prevents unauthorized users to change settings and uninstall the product, the internal file guard system protects all important files so the program can not be deleted by unwanted person. The multylanguages multiuser intuitive interface and will help you manage this software easy and with pleasure.
FEATURES:
* Set time for appropriate user or group
* Manage Groups
* User Logging activities
* Shedule time of working days
* Set time period allowed
* Set extra time to use
* Setting user restrictions
* Avoid changing system of time
* Stop install unwanted software
* Protect files and folders
* Hide / show the icon in the tray
* Weather suspended while a user leaves PC
* Log off Windows after the expiration time
* Restart Windows after the expiration time
* Shut down Windows after the expiration time
* Program password to access authorized
* Schedule information window
Size: 2 MB

Read rest of entry

Kaspersky Anti-Virus 2009 v.8.0.0.454 FINAL

Read rest of entry

NodLogin v9.7 Final 32bit/64bit

No image to display!

This software Updates the login of Nod details automatically (the logins are usually taken from sites that update their login database on a daily basis).

ОS:
- Windows 98
- Windows XP
- Windows Vista

Can be use for:
- Nod32 2.7; 3.0
- ESET Nod32
- ESET Smart Security

*NOTE* You will need to choose the correct 32-Bit or 64-Bit version from within the .rar file depending on what O/S you are running.

Patch Instructions
1. Extract/Copy setup.exe to the folder that you installed Nod32 in, (The default is Program Files - ESET - Nod32...)
2. Double click the file you just copied.
3. Press install
4. The patch is now installed and should run on start up.

Or

1. Follow steps above
2. Remove the file from start up (Using something like WinPatrol or msconfig)
3. Open Nod32/Smart Security - Setup - Click "Enter Entire Advanced Set-up Tree"
4. Press Tools - Scheduler & Planner - Add - Run External Application - Enter your own task name - Repeatedly - Choose how often you want to check for updates - Finish - Click the browse menu beside Executable File - Go to the folder that you installed Nod32 in - Double click "Nodlogin.exe".

Read rest of entry

Norton Internet Security 2009 v.16.0.0.125

No image to display!

Norton Internet Security 2009 is a very useful internet security utility that will protect your computer while you


Norton Internet Security 2009 is a very useful internet security utility that will protect your computer while you surf online. Enjoy your connection to the world. It gives you the confidence to travel the Internet like never before, protected against viruses, hackers, spyware, and spam. A comprehensive set of security tools, Norton Internet Security helps keep you safe online as you surf and email, swap files, download programs, and chat.


Key Technologies:
• Antivirus
• Spyware protection
• Two-way firewall
• Identity protection
• Antiphishing
• Network monitoring
• Bot protection
• Rootkit detection
• Browser protection
• Internet worm protection
• Intrusion prevention
• OS and application protection
• Web site authentication
• Pulse updates
• Norton™ Insight
• SONAR™ behavioral protection
• Antispam
• Parental Controls & confidential information blocking

Key Benefits:
• Proven fastest, lightest security suite available—Spend more time using your computer and less time waiting for your security software to perform.
• Pulse updates for up-to-the-minute protection—Delivered every 5 to 15 minutes to detect and eliminate new threats. NEW
• Intelligence-driven for faster, fewer, shorter scans—By leveraging a unique online intelligence system, Norton™ Insight technology targets only those files at risk. NEW
• Stops viruses, worms, spyware, bots, and more—Keeps your system protected against all types of malicious threats.
• Prevents virus-infected emails and instant messages from spreading—Feel secure while you keep in touch.
• Blocks browser exploits and protects against infected Web sites—Surf the Internet with confidence.
• Blocks online identity theft—Buy, bank, and browse online wherever and whenever you want. IMPROVED
• Secure network connections—Monitor your home network and more safely connect to Wi-fis. IMPROVED
• Blocks threats and hackers—Two-way firewall automatically makes security decisions for you. IMPROVED

Features:
Engineered for Speed
* New! Proven fastest, lightest security suite available
* New! Intelligence-driven Norton™ Insight technology targets only those files at risk for faster, fewer, shorter scans
* New! Installs in under one minute on average, requires less than 10 MB of memory, and only 100 MB of disk space plus definitions

Up-to-the-minute Protection
* New! Delivers up-to-the-minute protection with rapid pulse updates every 5 to 15 minutes.*
* New! The Norton™ Protection System provides multilayered protection technologies that work in concert to stop threats before they impact you. †
* New! Real-time SONAR (Symantec™ Online Network for Advanced Response) helps prevent bots from taking control of your PC.
* Improved! Prevents threats from entering or leaving your firewall.
* Detects and automatically removes online threats.
* Improved! Defends against Web-based attacks with patent-pending technology.
* Automatically detects and removes spyware, viruses, Trojans, bots and Internet worms
* New! Boots and repairs badly infected PCs.
* New! Specialized deep-cleaning technology delivers our most complete scan possible to repair heavily infected computers.

Norton Identity Safe
* Improved! Keeps your online identity safer than ever when you buy, bank, browse, and game online.
* Advanced phishing protection keeps your personal identification out of the hands of fraudulent Web sites.
* Stores and encrypts your passwords and other confidential data.
* Improved! Fills in online forms at your request to save time and protect you from keystroke loggers.

Control without disruptions
* Puts every element of your security at your fingertips
* New! Schedules resource intensive tasks for when you’re not using your PC.
* New! Review the security status of every process on your PC.
* New! Silent mode suspends alerts and updates to avoid interrupting or slowing games and movies.
* Smart two-way firewall automatically makes security decisions for you.

Secure Networking
* Improved! Helps you secure your home network.
* Conceals and secures your PC on public Wi-Fi networks.

Parental Controls
* New! Create individual user profiles with enhanced parental controls.

Spam Blocking
* Filters spam better than ever.

Microsoft® Windows Vista® Home Basic/Home Premium/Business/Ultimate
Microsoft® Windows® XP with Service Pack 2 Home/XP Pro/XP Media Center Edition
* 300 MHz or faster processor
* 256 MB of RAM (*512 MB RAM required for the Recovery Tool)
* 200 MB of available hard disk space
* Standard Web browser

Email scanning supported for POP3- and SMTP-compatible email clients.
Support for AntiSpam feature:
* Microsoft Outlook® 97 or later
* Microsoft Outlook Express 6.0 or later

Supported instant messaging clients:
* AOL®
* Yahoo!®
* Microsoft®
* Trillian™

Browser support for Browser Defense and Phishing Protection features:
* Microsoft Internet Explorer® 6.0 (32-bit only) and later
* Mozilla Firefox® 2.0 and later

Size: 58.3 MB
Quote:
This crack is for Norton Internet Security 2009 & Norton AntiVirus 2009. It just resets the trial period every time you start your computer. It is only for Windows XP (x32) & Vista (x32). I wasn’t able to get Norton 2009 to install on Windows x64. There is a nag screen when you open up Norton 2009.

Installation:
1. Install Norton 2009. (It would be best if you are not connected to the internet.)
2. Install crack and restart your PC.
3. To remove, just use the uninstall.


http://www.mediafire.com/?kgnorz4y2em
Read rest of entry

Raxco PerfectDisk 2008 Build v9.00 Build 64

No image to display!

Delivering a unique set of easy-to-use features and benefits not found in any other solution, PerfectDisk® 2008 will make your computer run like new. Work and play faster - and smarter. PerfectDisk makes everything you do on your computer faster - so you can be more efficient at your work or play. PerfectDisk 2008’s patented SMARTPlacement™ optimization is paired with its exclusive single-pass defragmentation and Space Restoration Technology™ to maximize PC and laptop performance. All controlled and automated according to your unique requirements through AutoPilot Scheduling™ or StealthPatrol™ unattended background processing

http://www.rapidshare.com/files/144655237/Raxco.PerfectDisk.2008.v9.0.0.Build.64.rar
Read rest of entry

AVG Internet Security v.8.0.169

No image to display!

AVG Internet Security 8.0.169
AVG Internet Security 8.0.169 with 10 years keygen.

The antivirus compontent protects your computer with Windows from viruses, worms and trojans.
Antivirus detects viruses, worms and Trojans as well as executable files or Windows DLL libraries that could be potentially unwanted within your Windows Vista or Windows XP system. Antivirus also holds the internal virus database, and therefore it keeps the maximum level of protection when regularly updated.

AVG Internet Security 8.0.169 with 10 years keygen.

The antispyware component protects your computer from spyware, adware and other malicious programs.
Antispyware protects tour computer from all kinds of malware (malicious software), e.g. spyware that secretly gathers information and privacy data from your computer, or adware that generates unwanted advertisement on your computer.

AVG Internet Security 8.0.169 with 10 years keygen.

Firewall enforces an access control policy between your computer running Windows and the network by blocking/permitting traffic.
Firewall defines rules that protect your computer from outside attacks, typically from the Internet, and control (allow/forbid) all communication on every network port. If Firewall recognizes and intrusion attempt, it blocks immediately and does not let the intruder access to your PC with Windows.
If you firewall is active, you are protected against hacker attacks and threats from external networks.

AVG Internet Security 8.0.169 with 10 years keygen.


Anti-Rootkit allows searching for rootkits hidden in your Windows operating system.
Antirootkit scans for dangerous rootkits hidden inside applications, drivers and Windows DLL libraries. A rootkit is usually a collection of malicious software that allows attacker to gain administrator-level rights and access to a computer or possibly whole network in your home or office. Rootkits are generally very well hidden in an operating system which makes them hard to detect or remove by regular security tools.

AVG Internet Security 8.0.169 with 10 years keygen.

Advanced settings for Advanced Users. Shows information about Windows processes, network connections, automatically starting applications, Internet Explorer extensions and Layered Service Providers on your computer.

AVG Internet Security 8.0.169 with 10 years keygen.

LinkScanner blocks dangerous websites and checks links on the most popular search engines such Google, Yahoo and MSN and Live for threats.
LinkScaner works with Internet Explorer and Firefox, and consists of two features. AVG Active Surf-Shield and AVG Search-Shield.
AVG Active Surf-Shield
Prevents you from accidently becoming infected by drive-by downloads and other exploits, ensuring the web pages you visit are safe at the only time that really matters – when you are about to click the link.
AVG Search-Shield
Works with Google, Yahoo, MSN and Live search engines to deliver a real-time safety verdict on all search results, including search ads, displaying an icon to show the safety rating for each site.

AVG Internet Security 8.0.169 with 10 years keygen.

Web Shield checks network traffic for possible threats and disallows dangerous connections.
This component protects you against accidentally downloading infected files or exchanging infected files over instant messaging.

AVG Internet Security 8.0.169 with 10 years keygen.

Resident Shield
Works in the background and is scanning all files that you work with.
Scans files as they are copied, opened and saved and if a threat is found, it forbids its activation. It also provides vital protection for the Windows system areas of your computer

http://rapidshare.com/files/145931679/AIS.rar
Read rest of entry

Universal Translator Deluxe v.4.1.327 (Orginal ISO)

No image to display!

Here it is!Universal Translator Deluxe.It's a trasnlator that includes languages like: Czech, Danish, Dutch, English, Esperanto, Finnish, French, German, Greek, Hungarian, Indonesian, Italian, Latin, Norwegian, Polish, Portuguese, Romanian, Russian, Slovak, Spanish, Swahili, Swedish, Tagalog, Thai, Turkish, Ukrainian, Zulu. All you need!

System Requirements:
  • 166 MHz Pentium processor
  • Microsoft Windows 95, 98, 2000, NT4, or later
  • 32 MB RAM
  • 4 MB hard disk space per language
  • CD-ROM drive
  • VGA monitor
  • Sound card (if using text-to-speech

Installation:
  • Unpack, burn or mount & install
  • 185 MB (.ISO file)


Read rest of entry

Google Earth Pro Gold with GPS Tracking

No image to display!


http://rapidshare.com/files/137228897/Google_Earth_Pro_Gold_www_1_.warez-bb.org.rar
Read rest of entry

Sunday, May 24, 2009

Microsoft Keygens / Utils 18 in 1

This is an All in One package of Microsoft software keygens which includes the following:

* Anti-WPA
* Generic Anti-WPA
* License Viewer
* Key Finder
* MS Business NT
* MS ISA Server
* MS ISA Server Enterprise
* MS Communicator
* MS Office 2k3
* MS Op. Manager
* MS VisualFOX
* MS Server 2k3 x64
* MS Server 2k3 Enterprise
* Windows XP Pro
* Windows XP Pro x64
* Windows XP Home
* Office XP
* RockXP







Scan log (PLEASE NOTE THAT THIS DOES NOT HAVE A 100% CLEAN BILL OF HEALTH, THOUGH DOWNLOADING IT WILL NOT AFFECT YOUR MACHINE, ONLY EXECUTING THE BELOW SPECIFIED KEYGEN!!!):


Download:
Hidden Block (5 post(s) are required, you have 3387):
http://rapidshare.com/files/231198674/Microsoft_keygeneros.rar

Password:
pirator.net
Read rest of entry
Pirator's ESET AiO Made by Little Nicky

Contains The Following:
Programs:
  • Smart Security Business Edition 4.0.424 32 Bit
  • Smart Security Business Edition 4.0.424 64 Bit
  • NOD32 Anti-Virus Business Edition 4.0.424 32 Bit
  • NOD32 Anti-Virus Business Edition 4.0.424 64 Bit


Fixes:
  • NodLogin 9.9b 32 Bit
  • NodLogin 9.9b 64 Bit
  • NodEnabler 3.3 32 Bit
  • NodEnabler 3.3 64 Bit
  • Box4EVER 4.30A 32 Bit
  • Box4EVER 4.30A 64 Bit
  • MiNODLogin 3.4.0.1 32 Bit
  • MiNODLogin 3.4.0.1 64 Bit


Page 1:




Page 2:




Scan log:
Quote:
Scan Log
Version of virus signature database: 4067 (20090512)
Date: 5/12/2009 Time: 4:42:16 PM
Scanned disks, folders and files: C:\Users\Little Nicky\Desktop\Eset AiO.exe
C:\Users\Little Nicky\Desktop\Eset AiO.exe » ZIP » AutoPlay/autorun.cdd » ZIP » _detect.dat - error - password-protected file
C:\Users\Little Nicky\Desktop\Eset AiO.exe » ZIP » AutoPlay/autorun.cdd » ZIP » _proj.dat - error - password-protected file
C:\Users\Little Nicky\Desktop\Eset AiO.exe » ZIP » AutoPlay/autorun.cdd » ZIP » _fonts.dat - error - password-protected file
Number of scanned objects: 4627
Number of threats found: 0
Time of completion: 4:43:11 PM Total scanning time: 55 sec (00:00:55)
Download:
RapidShare: Easy Filehosting
RapidShare: Easy Filehosting

or

http://www.megaupload.com/?d=E7DESOEO

or

http://www.filebox.com/uk9mshvghut1

or

http://uploadbox.com/files/db6717bb8ca
Read rest of entry

Friday, May 15, 2009

Using My Home To Clear My Debt

Becoming a home owner is one amongst the more vital stuffs you will do inside your being alive. It yet ranks wakeful there exhaustive knowledge about achieving got married to with causing a relatives of your own to deal with. Unluckily, owning a property pulls off escort miscelanneous burdens along with those burdens are the expenses that you build inside request to keep the home, flowing because you crave it. There may be immeasurable purpose on why you came down into debt, admire becoming far more than extended in addition to the expenditure you undergo, not calculating the worth of pouring a home correctly or conceivably it was curative reasons that you came across wedged plus someone inside debt along furthermore expenditure.

No matter what the purpose was that received you where you are at the moment you exceedingly may perhaps do what I made ready. By way of my real estate to clear everything my debt was the most excellent fixation I ever made ready. Millions of people imagine they got to thrown in the towel along with admit the debt prevail the struggle but you do not ought to do that. There are preferences that you labor under that more will not tell you as regards to. Along furthermore every hire you style on your real estate you improvement equity. Once a year the merit of your house works conscious in addition to that builds equity. Any mending or upgrades along with improvements you variety to your real estate also will add to its disposition as well as the quantity of equity you have inside your property. You may well purpose the equity in your property to help you lucid your debt in addition to capture your monetary resource back on the right track.

There are uncountable persons that intention a queue of credit on the equity inside their house to class indivisible mending, upgrades with the some well-known of the whole lot is to pay off debt. By using the equity in your house you may well pay off your debt all at once earning it thence you easily tolerate one single payment to class each month. It is a homeowner's systems to consolidate their debt on their own without causing to search outside help out or inducing to go away because far-flung since filing liquidation.

If you pass through along furthermore overwhelming debt at the moment you should talk over with your lender or mortgage broker. They may possibly protection you dig up a loan on the equity in your property as a result you can pay off debt along with meet up with without difficulty lone payment to be anxious near to. You will excepting much money given that you will not have to be compelled to be anxious about the whole thing those curiosity duties on the wonderful debt. There are several choices given that homeowners to help out acquire each other out of debt.

You may accompany your electricity mortgage lender or talk to esoteric lenders to examine who bestow the best inside interest taxes. These forms of loans provide a lot of reduced awareness taxes at that time the rates you pay on your exceptional debt. The lender will see you with see where you are with your fees as well as protection you get your hands on the bulk of capital riches you got to acquire your being alive back on track.
Read rest of entry

Basics Of Debt Consolidation Options

Most of us have heard the term - debt consolidation and debt reduction. Those terms get thrown around with mortgages, credit cards, balance transfers, equity lines of credit and a wide variety of other financial packages.

But what exactly is debt consolidation and how does it work?

The consolidation of debt is not a difficult or complicated process. It simply involves combining all of your debts that are non-secured like medical bills, credit cards, tuition payments all wrapped up into one nice monthly payment. Very often the payment is much lower than all the combined payments totaled up.

This debt reduction plan works by letting consumers (the debtor) pay monthly a fixed amount of money to the consolidation company. The consolidation company in turn functions works as your payment representative and will negotiate lower rates of interest and sometimes a lower balance. Then the company after receiving your payment will make payments each of the creditors on your behalf.

Why would a creditor even consider lowering the balance or interest rate? The reason is it works! Creditors will usually make these financial arrangements since it is in their best interest to get paid. They understand that if a debt company is making the payments they will most likely get paid on time. They also will not need the same amount of resources contacting consumers about the unpaid balances.

How Can the Consolidation of Debt Help A Consumer?

There are various ways a debtor can be helped by reducing their debt load.

* Consolidated payments are usually lower payments

* The debt becomes managed by a professional

* Stops the addition of more debt

* Keeps bill collectors and collection agencies from calling

Is it a Better Route Than Bankruptcy?

Yes, anything is probably better than going the bankruptcy route! Bankruptcy is a serious issue and a decision, which should not be taken lightly. Even with a bad credit score you can begin to rebuild your credit history. When bankruptcy is introduced into the equation all your debts get canceled out and your credit rating completely collapses. Where consolidating debt is a much more manageable option and preserves your credit.

What Consolidation Options Are Available?

There are several ways to go about handling your debt problems. Hiring a company as mentioned above is an option for those with serious financial conditions and issues that need to be resolved. The other method involves taking out a loan for the expressed purpose of eliminating many debts and turning them into one debt.

Using a company who has built relationships with people and represent thousands of creditors can give you some bargaining power with any kind of counseling and debt restructuring plan. Loans for debt consolidation will help you get rid of the unsecured-debt and help reduce the combined interest.

Do your research and find the one that best fits your needs for a bright less debt future.
Read rest of entry

Strategies For Coping With Your Debts

If you're struggling with debt problems it can seem like you're trapped in a never-ending fight to keep your head above water, desperately juggling your finances around to keep your creditors happy. It can also seem like you're alone in your struggle, but this is very far from the truth. Millions of people have at one time or another been in a similar situation, and even though it might currently seem like there's no way out, millions of people have successfully left their debt worries behind.

There are thousands of sites on the internet offering help and advice, sometimes as a free service, but often as a commercial venture which you'll have to pay for in one way or another. With all this information overload, how can you even get started on deciding how to handle your debts? Read on to learn the basics of some of the most popular debt strategies, which will help you decide which strategy is right for you and is worth researching further.

Budgeting

This is the most basic way of getting your finances back in shape. By sitting down and working out all your income and expenses, you can clearly see the parts of your money management that need more attention. Often, this basic step will show up easy ways to economize, giving you a little more breathing space every month, and making it easier to pay those bills.

Debt Consolidation

If, after examining your budget, you find that you really can't make ends meet, then it's worth considering taking out a consolidation loan. The basic idea behind consolidation is to take out one big loan which you use to clear all your other debts, meaning you only have one repayment to make every month. Ideally, your new loan will be at a lower interest rate than your current debts, so your monthly repayment will be lower. You can also spread the repayments over a longer period, taking some of the financial pressure off, but this will mean you're paying more in interest in the long run.

Debt Management

Some people who have serious debt problems might not be able to arrange a consolidation loan. This might be because they've already borrowed to the hilt and no lender is willing to advance any more credit, or it may be that in the course of their debt problems their credit rating has been badly damaged. At this point, debt management is a good option. It works by handing over the management of your debts to a specialist company or agent, who will contact your creditors on your behalf and negotiate a way forward, such as lowering interest rates, extending the repayment term, or cancelling previous fees and charges.

Entering into debt management has the great advantage of relieving the immediate stress and worry of dealing with your debts, but the disadvantage is that in most cases the management company will charge a fee, and the damage to your credit rating will be considerable.

Individual Voluntary Arrangements

This is a step further than debt management, in that the agreements you make with your creditors are legally binding. You will also have any remaining debts cleared after keeping to the arrangment over a period of five years. Should you fail to keep to the arrangement, then bankruptcy is the only remaining option.

Bankruptcy

This is the final step to take when all other attempts to handling your debts have failed. All your assets will be frozen and used to pay off your debt, and most of any income you receive during your bankruptcy period will also be taken from you. The damage to your credit rating will be almost irreperable, and even though many people have started to see bankruptcy as an easy way out of debt, the long term consequences are grave, and it should only be considered as an absolute last resort.
Read rest of entry

Monday, May 4, 2009

Add safe Mode To The Regular Boot Menu

Open the System Properties dialog box. You can do this from Control Panel (click System).
- Click the Advanced tab.
- Click the Settings button under Startup and Recovery.
- Click the Edit button under System Startup. This opens the boot.ini file in Notepad.
- One line should end with "/fastdetect" (NOT "/fastdetect /sos"). Copy that line.
- Paste the line you just copied below the original line. Change "WINDOWS=Microsoft XP Professional" to "WINDOWS="Safe Mode" and add the following text to the end of the line: /safeboot:minimal /sos /bootlog
- Save the file and click OK to exit the dialog boxes. Note: If you named the Windows XP installation folder something other than WINDOWS when you installed XP, that name will appear instead of WINDOWS in step 6.

Or

Right-click My Computer, and choose Properties (or press Windows Key & Break together).
On the Advanced tab, click the Settings button, which brings up the Startup and Recovery window.
Click the Edit button, which will open the boot.ini file in Notepad.
Look under the [Operating Systems] for your default OS. Copy the entire line, and paste it on the line below.
Change the description in the quotations to say ?Safe Mode? or whatever description you want. Then add the following to the end of the line you just copied: /safeboot:minimal /sos /bootlog
If you want networking support, then change ?minimal? to ?network? without the quotes.
Read rest of entry

Another way to Lock folders without any Software

Steps:--
1) open notepad & copy the matter pasted below

cls
@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Private goto MDLOCKER
:CONFIRM
echo Are you sure you want to lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to unlock folder
set/p "pass=>"
if NOT %pass%== Password-here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Private
echo Private created successfully
goto End

2)Replace "Password-here" with your password & save as "whatever you want.bat" anywhere you want to creat locked Folder

3) Now run that .bat file ,Now it will make a folder named "private"

4)Now again run that file,in command promt it will ask u

Quote:
Are you sure you want to lock the folder(Y/N)
press "y",Then Folder will disappear .

4)If you want that folder back again run bat file ,Now it will ask you to put password whih is stored in that file

5) You can hide that file too...

Enjoy.....
Read rest of entry

Dual Boot XP with vista STEP BY STEP GUIDE with pictures

Note that you should not attempt this if you aren't ready to troubleshoot any problems that might occur.

The first issue we encounter is that computers with pre-installed operating systems take up the entire drive. Luckily Microsoft included the Shrink volume feature in Vista, so we can easily shrink the Vista partition down to make room for XP.

Open the Computer Management panel, which you can find under Administrative tools or by right-clicking the Computer item in the start menu and choosing Manage. Find the Disk Management item in the list and select that.




Now we'll shrink our volume down by right-clicking on the main hard drive and choosing Shrink Volume.




Now you can choose the size that you want to shrink, which really means you are choosing the size that you want your XP partition to be. Whatever you do, don't just use the default. I chose roughly 10gb by entering 10000 into the amount.



The next step might be confusing, because we need to change the cd-rom drive that's invariably taking up D: at the moment, because we want to use D: for the Windows XP partition, but it's already taken by the cd-rom drive. If you skip this step than XP will install onto the E: drive, which isn't the end of the world, but it's not quite as tidy.

Right-click on the cd-rom drive in the list and choose Change Drive Letter and Paths from the menu.



Now we'll change the CD drive to use E: by selecting that in the drop-down.



Now we can create a new partition for XP to live on and make sure that the drive letter is set the way we want. If you do not create a partition now the XP install will do so automatically, but it's easier and cleaner to do it this way.

Right-click on the Unallocated free space area and then select New Simple Volume from the menu.




Follow through the wizard and select whatever options you'd like, making sure to use D: as the drive letter.

Now you will need to close out of disk management and reboot your computer. This is because we can't do the next step until we reboot. (you can try, but it won't work)

So we've come back from rebooting… open up Computer from the start menu and then right-click on the D: drive and select properties. Give your partition a meaningful name like "XP". It would be wise to name the C: drive to "Vista" at this point as well.




Now you'll want to pop your XP cd into the drive and boot off it. You may have to configure your BIOS to enable booting off the CD drive, or if your computer says something like "Hit Esc for boot menu" you might want to use that.

Once you come to the screen where you can choose the partition to install on, then choose either the unpartitioned space or the new partition you created. Whatever you do, don't try and install onto your Vista partition! See how much cleaner it is now that we've labeled each partition distinctly?




We'll assume XP is completely installed at this point, and you will have lost your ability to boot into Windows Vista, so we'll need to use the VistaBootPro utility to restore the Vista boot loader.

Download And Install VistaBootPRO


During the install you'll be forced to install the .NET 2.0 framework. Open up VistaBootPRO and then click on the System Bootloader tab. Check the "Windows Vista Bootloader" and then "All Drives" radio buttons, and then click on the Install Bootloader button.



At this point, the Windows Vista bootloader is installed and you'll only be able to boot into Vista, but we'll fix that. Instead of manually doing the work, we'll just click the Diagnostics menu item and then choose Run Diagnostics from the menu.



This will scan your computer and then automatically fill in the XP version.. click on the "Manage OS Entries" tab and then click in the textbox for Rename OS Entry, and name it something useful like "Windows XP" or "The Windows That Works"



Click the Apply Updates button and then reboot your computer… you should see your shiny new boot manager with both operating systems in the list!



If you get an error saying "unable to find ntldr" when trying to boot XP, you'll need to do the following:

Find the hidden files ntldr and ntdetect.com in the root of your Vista drive and copy them to the root of your XP drive.
If you can't find the files there, you can find them in the \i386\ folder on your XP install cd

This is a critical piece of information: Windows XP will be installed on the D: drive, even in Windows XP… so you'll need to keep that in mind when tweaking your system.



You can share information between the drives, but I wouldn't recommend messing with the other operating system's partition too much… it might get angry and bite you. Or screw up your files. What I do recommend is that you store most of your files on a third drive shared between the operating systems… you could call that partition "Data".
Read rest of entry

Monday, April 27, 2009

15 Tips to Improve your Linux Experience

The beauty of Linux is in users ability to do large amount of customization to have a unique user expereince. So today we will look in to some tips for a “better” Linux experience. The term “better” here is relative, because what works for me might seem a distraction for some or plain annoying to others; some of this “tips” might appeal to beginners, while advanced users might find it too easy. Hopefully some of these tips will be helpful to some of you.

1) Turn on your computer remotely by sending “magic network packets” to WakeOnLan supported network cards. This can be very helpful if you run a server at home but only access it occasionally. There is no need for you to have the server running all the time.

2) If you dual boot with windows, accessing Linux file system from your windows installation might be important for you. There are three windows applications that can help you do this: Explore2fs, Ext2 Installable File System, DiskInternals Linux Reader.
3) Similarly to have read/write access for Windows NTFS file system, you can use NTFS-3G. Most recent popular Linux distribution has NTFS-3G installed out of the box.

4) Share a single mouse and keyboard with multiple computers with different operating systems, each with its own display, with support for copy and paste. Thanks to Synergy, the most popular free KVM software switch out there.

linux1

Synergy in action.

5) Recovering data from damaged media can be handled by several Linux tools including some LiveCD, specifically built to help recover data. Parted Magic, Ubuntu Rescue Remix, SystemRescueCd, Foremost (data recovery), Ddrescue.

6) If you are a blogger like me and enjoy using desktop client over web editors, you will find these clients useful: Gnome Blog, Drivel Journal Editor, BloGTK, Thingamablog, Bleezer, QTM.

7) If you are a webdeveloper/designer, you will often find yourself testing a website across many platforms and browsers. IEs4Linux is a great painless way to check how IE browser will render your website. You could use services like browsershots, but I had mixed results with them.

8) Does your iPod miss iTunes? Here are three itunes alternative which will do most of what your iTunes would do, not an exact replacement; but does the job: Amarok, Banshee, Rhythmbox.

9) Follow multiple files by creating multiple windows in your console with the help of MultiTail, also known as tail on steroids.

10) Use Terminator to split your screen space with many terminal windows, both horizontally and vertically.

11) For even better control over your terminal display and customization and complex functions, GNU Screen is a much better choice over terminator; however terminator serves only one purpose.

12) Use RSIBreak to help prevent Repetitive Strain Injury. RSIBreak will force you to take short break, depending on your configuration, so that you don’t over-work yourself.

linux2

RSIBreak

13) If you find yourself working on a dumb terminal (hello sysadmins) or prefer working on terminals, you will find newsbeuter to be an excellent RSS reader for the console.

14) I know some will disagree with me on this, but conky is an excellent compliment to your desktop experience. If properly configured, it can add a lot of value to your desktop environment. Check out this very creative conky setup and read about it here.

15) Do you do podcasts? rootprompt has a great article with huge resources for both Linux podcasters and listeners.

Read rest of entry

10 ways to Tweak your Linux Boot Process

Linux rarely needs to be rebooted. But when it does, it’s often slow to boot. Fortunately, there are ways to speed things up. Some of these methods are not terribly difficult. (although some, unfortunately, are). Let’s take a look.

#1: Disable unnecessary services

Depending upon the use of the machine, plenty of services won’t be needed. Using Linux just for a desktop? Then you won’t need sendmail, httpd, and many other services. If your server is only a Web server, you can shut off many services as well. To do this, you can go to the Administration menu and take a look at the Services entry. Just deselect all of the services you don’t want to start.

#2: Disable unnecessary kernel modules

If your desktop is wired to the Ethernet, you don’t need to have a wireless kernel module loaded. This task is a bit more difficult and will require a kernel recompilation, which is not the easiest task to undertake. To do this, you will need the kernel sources. Then, follow the standard steps for compiling a kernel. The difference is that you’re going to go through your system and disable all of the modules you don’t need.

The best way to find out what kernel modules currently install and run on your system is to install Bootchart. Not only will this give you a good list of modules, it will illustrate for you what is happening during your system boot. You can also issue the command chkconfig –list | grep 3:on to find out what services are running. Once you know what loading modules you don’t need, you can remove them during a kernel recompilation. While you’re at it, compile the kernel to exactly match your architecture.

#3: Use a lightweight window manager instead of GNOME or KDE

I plug smaller footprint window managers for a reason — they drastically reduce graphical boot time. Instead of having to wait that extra 30 to 60 seconds for GNOME or KDE to boot up, why not wait two to 10 seconds for Enlightenment or XFCE to boot up? Not only will they save you boot time, they will save your memory and the headache of dealing with bloatware.

#4: Use a text-based login instead of a graphical login

Most of my Linux machines boot to run level 3 instead of run level 5. This will halt at the text-based login, where I only have to log in and issue startx to start my desktop of choice. The graphical logins do two things: increase load times and create headaches trying to recover from an X windows fubar.

#5: Use a lighter-weight distribution

Instead of loading the heavyweight Fedora, why not try a Gentoo, Arch, or Puppy Linux? The boot times for these smaller distributions are far faster than the more bloated Fedora (and even Ubuntu). Of the larger distributions, OpenSuSE claims to boot the fastest, but I have not personally tested this. Between the latest Fedora and Ubuntu, Ubuntu blows Fedora’s boot times away (and that is out of the box).

#6: Use an OpenBIOS

If you’re savvy enough to upgrade your PC’s firmware, you might consider migrating to an open source BIOS. One caveat to using open firmware is that it allows Linux to actually initialize the hardware as it boots (instead of relying on the BIOS). On top of that, many open BIOSes can be configured to meet your machine’s specific needs. If you don’t go the open BIOS route, you can at least configure your BIOS to not search for a floppy drive that’s not there or to boot directly to the first hard drive (instead of the CD drive first).

#7: Avoid dhcp

If you are working on a home network (or a small business network) where address lease isn’t a problem, go with static IP addresses. This will keep your machine from having to call out to a dhcp server to get an IP address. If you take this approach, make sure you configure your /etc/resolve.conf to reflect your DNS server addresses as well.

#8: If you can spare it, get rid of hotplug

Hotplug is the system that allows you to plug in new devices and use them immediately. If you know your server won’t need this system, delete it. This will cut down on boot time. On many systems, hotplugging consumes much of the boot time. Removing hotplug will vary depending upon the distribution you use. NOTE: udev has, for the most part, replaced hotplug. But if you’re running an older distribution, this does apply.

#9: If you are REALLY daring, you could give initng a try

The initng system serves as a replacement for the sysvinit system and promises to drastically decrease boot times in UNIX-like operating systems. If you would like to see the initng system in action, you can give the Pingwinek livecd a try.

#10: Use a hack with Debian

If you’re using Debian, there is a simple hack you can use to switch your startup scripts to run in parallel. If you look at the /etc/init.d/rc script, you will see: CONCURRENCY=none around line 24. Change this line to CONCURRENCY=shell and you should see a reduction in boot times.

That’s about it. Of course there are always more and better hacks out there. But the above should mostly cover everything. The good news is that you’re most likely already running Linux, so the burden of boot times is generally eased by the infrequency of reboots.

Read rest of entry

Reboot Linux using simple fork()

We all know that the simplest function in Linux is fork(). The fork is used create a child process which is an exact copy of the calling process (parent process). You might be thinking how can such a simple function reboot a linux machine. Well I must tell you that the program I am going to discuss today uses only this fork function and can force a Linux Server which can serve as many as 100 computers to get rebooted. I have tried this on my College’s Linux Server which Serves more than 200 computers at a time and I was lucky to get out of this situation.

Warning: I am not responsible to whatever happens to your computer after exceuting the following program on your computer.

I have found a simple C Program whose source is as follows:

#include

int main()
{
int i;
for(i=1;i<=300;i++)
{
printf(”%d”,fork());
}
return(1);
}

- Open the Linux Shell.
- Write the above program in your vi Editor and save it as reboot.c
- Now compile the program using following command:
gcc -o reboot reboot.c
- Now to execute the program type the following
./reboot
and press Enter.

Explanation: In the above program, I have used a loop of 300 iterations. In the first iteration it will execute the fork command which will create a child process which is the exact copy of the parent process i.e. the child process will have the same code as the parent process and it will execute simultaneously with the parent process. So in the next iteration both parent process and the child process will execute fork command which will in turn create child processes with the exact copy of their parent processes and this process of creation of child processes will be in the power of 2 i.e. after the first iteration the total number of processes will be 1 parent and 1 child = 2 process. After 2nd iteration the number of process will be 1 parent and 3 child = 4 process. And this will continue to double and at the end the total number of processes will be 2300 which is quite a big number. If you try to calculate this value in your calc it will take atleast 1 hour. So when you will execute the above program your linux machine will get overloaded and will be forced to reboot.

I executed this program in college’s Computer Lab and all the computer got hanged and after 1 or 2 mins a Global message was displayed that “Linux server is going to Reboot”. Since nobody knew what had happened I could get away from that situation. Hope that my lab faculty don’t read this Article.

Read rest of entry

Keyboard Shortcuts for Ubuntu

For those who are not familiar with Linux, Ubuntu is one of the most popular and most widely used Linux distributions.

Over the years that I have used Ubuntu, other than the usual Ctrl + C (copy) and Ctrl + V (paste) shortcuts, I have discovered quite a number of keyboard shortcuts that are very useful, but seldom used by many. If you are looking for more keyboard shortcuts to add to your collection, I am sure you will be able to find some new tricks here.

1. Switch to the next/previous workspace

If you make use of the workspace very frequently, you can easily switch between different workspaces by pressing Ctrl + Alt + Left/Right Arrow. The Left key brings you to the previous workspace while the Right key brings you to the next adjacent. If you have enabled Compiz, you can even get it to show all the workspace by pressing Super + E on the keyboard.

2. Move the current window to another workspace

By pressing Shift+ Ctrl + Alt + Left/Right Arrow, you can easily move your current window to another workspace in the specified direction. This keyboard shortcut works very well with the one mentioned above. If you have the habit of opening many applications/windows when doing your work, but don’t like to see your desktop and menubar cluttered with all the application windows, you can use this shortcut key to move your applications to another workspace and get your desktop organized.

3. Show the desktop

Ctrl + Alt + D enables you to quickly minimize all windows and give focus to the desktop. When all windows are minimized, this shortcut can also maximize all the windows to their previous state.

4. Keyboard shortcut for the mouse right-click

In most applications, you can always right-click on the mouse to access the options menu. On the keyboard, you can simply press Shift + F10 to achieve this ‘right-click‘ effect

5. Restart session and recover from crashes

There are very few instances where Ubuntu will crash totally. But if it does, you can press Ctrl + Alt + Backspace to restart the session, and 90% of the time, it will recover from the crashes.

6. Lock the screen quickly

If you need to leave your workstation for a while, you can quickly lock up your screen by pressing Ctrl + Alt + L and prevent unauthorized access by others.

7. Switch between windows in the reverse direction

Alt + Tab is a common shortcut key that allow you to switch between open windows. But do you know that by including the ‘Shift‘ button, you can reverse the windows switching direction? This is useful when you press Alt + Tab too fast and passed the window that you want to switch to. Simply press down the ‘Shift‘ button to go back to the previous window in the switch cycle.

8. Move windows with arrow keys

Press Alt+F7 to activate the Move window function and use any arrows key (up, down, left, right) to move the window around the screen.

9. Show hidden files

Most of the time, you won’t need to view the hidden files in your home folder, but in the event that you need to, you can press Ctrl + H inside the Nautilus (the file manager for Ubuntu) to show all hidden files.

10. Show file properties without right-clicking the mouse

The conventional way to view a file/folder properties is to right-click the mouse and select ‘Properties‘. Now you can just press Alt + Enter to get the Properties window to appear.

Read rest of entry

5 Myths about Internet Safety

“Internet Safety” the term has been getting vague with the increasing virus outbreaks nowdays. PC Magazine once conducted a survey in which they asked the participants to rate their broadband ISP services and the results were astonishing. Most of users didn’t completelty understand the seriousness of potential threats or how to protect their PCs. Here are the top 5 Myths about safe surfing over internet.

Myth 1 - I don’t keep important things on my PC, so I don’t have to worry about security. Your PC can be infected over internet

Long time ago,this was partially true… but the hybrid worms and viruses of today like Blaster, hidrag and others blindly spread across internet to thousands or millions of PCs in a matter of hours, without regard for who owns them, what is stored there, or the value of the information they hold for the sole purpose of wreaking havoc. Even if your computer is not attacked directly, it can be used as a zombie to launch a denial-of-service or other attack on a network or to send spam or pornography to other PCs without being traced. Therefore, your civic responsibility is to protect your PC so that others are protected.

Myth 2 - I can protect my PC if I disconnect from the Internet or turn it off when I’m not using it.

Wrong. You are a target,If you connect to the Internet at all. You could download a virus when you connect to internet and it may not be activated immediately, not until you read your email offline days after. Viruses nowadays spread wildly through USB/Pen drives, pirated cd’s or torrents or file from networks.

Myth 3 - I can protect myself from viruses by not opening suspicious e-mail attachments. Some viruses simply get activated by reading or previewing an e-mail

Wrong again. The next virus you get may come from your best friend’s or boss’ computer if his e-mail address book was compromised for simulating an attack. Hybrid worms can enter through the Web browser through loopholes and it is possible to activate some viruses simply by reading or previewing an e-mail. You simply must have a PC-based antivirus package or a firewall.

Myth 4 - I have a Macintosh (or a Linux-based system), not a Windows system, so I don’t have to worry about being attacked.

It is true that most attacks target Microsoft Windows–based PCs, but there have been attacks against Mac OS and Linux systems as well. Some experts have predicted that the Mac virus problem will get worse, because Mac OS X uses a version of Unix. And although these systems have some useful securityfeatures, they can still be attacked.

Myth 5 - My system came with an Anti-virus package, so I’m protected.

Not quite. Firstly, if you haven’t activated your antivirus to scan incoming web traffic automatically, you don’t have a good Anti-virus and malware protection software. Secondly, new threats appear daily, so an antivirus package is only as good as its last update so its a must to activate the auto-update features to keep your guard up against the latest threats. Thirdly, an antivirus package can’t protect you from every threat. Malwares, spywares are running in the wild out there and every now and then malicious code penetrate weak systems. You need a combination of solutions, including, at minimum, antivirus, a personal firewall ,an anti spyware/malware package and a plan for keeping your operating system and software up to date with security patches.

Read rest of entry

Remove RavMon.exe virus without any anti-virus(Do it your self)

Removing Ravmon Virus without Anti-Virus is easy, btw I haven’t met any Anti Virus which can remove this virus. They can stop your pc from being infected but once you are infected they wont be able to remove it.
I don’t know the Actual Name of this virus nor its effects

Anyways its very easy to remove it.

You will have to follow just few simple steps.

  • check if your Infected.
  • Stop currently running virus.
  • Delete virus files.
  • Remove virus to run from startup.

So here are the following steps explained:

Remember until you delete the virus files please open drives using address bar by typing C:\ D:\ X:\ as the virus is activated if you double click the drive
1. Right click any drive on your computer and see if right click menu shows some invalild characters
like this
Remove RavMon.exe virus without any anti-virus(Do it your self) - www.crack$hack.ws

If yes then you are infected.

2. Press Alt+Ctrl+Del to bring up the task manager (or right click taskbar to run it) there will be a program in processes named “SVCHOST.EXE” there will be few svchost in small case but check one in capital letters, if you see more than one “SVCHOST.EXE” (all caps one) end the one with your username infront of it instead of LOCAL SERVICE, NETWORK SERVICE or SYSTEM(by pressing end process).
3. To delete the virus files you need to show system protected files.
For this goto
My Computer->(Menu) Tools-> Folder Options -> (Tab) View -> uncheck “Hide System protected files” -> press OK
If you are unable to unhide the system files you can use 3rd party software to browse drive and delete files, try ACDsee or WinRAR
Now open drive (by typing drive letter in address bar)
Delete these 2 files

  • Autorun.inf
  • Ravmon.exe

Also delete those in all drives (not CD(WR) or DVD(WR) drives) (and remember don’t double click else you will have to start over from top) Open Windows folder and delete SVCHOST.EXE, SVCHOST.dll and MDM.EXE
Now restart the explorer.exe process by killing it in taskmanager and runing it again [(winkey + R), type “explorer” and hit enter]
cleaned RavMon.exe virus

Now right click the drive letter and ull see a clean menu congrats virus is removed 4. Now remove it from startup (Optional as files are deleted)
Winkey + R type “msconfig” hit enter


remove ravmon virus from windows startup

Goto startup tab-> (uncheck) MDM -> OK -> Exit without Restart
How to prevent from this virus in feature
just right click any USB drive (that includes iPod) you have plugged into your PC
if they have currpoted menu the drive is Infected.
Access drive by typing Drive letter and Delete files from that drive
Remember you double click the curropted drive you get infected else you are safe.
The End
Read rest of entry

3 Reasons Everyone Should Clean Their Windows Registry

Windows Vista Registry

Just like older Windows operating systems, the registry is an important component of the Windows Vista operating system. It is the central database in which your Vista operating system stores configuration information related to installed hardware and software. The registry also stores preferences of various users configured on your PC and the system setup information. Because the registry controls almost all functions that occur on your PC, the chances of registry errors are quite high.

Furthermore, because your operating system, hardware, and applications are dependent on the registry to carry out various activities, registry errors have a direct affect on the performance of your system and the way applications work on it. The top three problems caused by an unhealthy registry are discussed here.

Frequent System Errors

Overtime, a large number of unwanted data accumulates in the registry causing it to grow uncontrollably, making it cluttered and fragmented. A corrupted registry is unstable and generates frequent system errors, application errors, and causes system freezes and crashes.

To prevent these errors and system crashes, you need to regularly scan the registry for errors and get rid of all unwanted information stored in it. Doing this will help you maintain a compact and healthy registry and also prevent system errors.

Deteriorated System Performance

If you monitor the activity of your Windows Vista registry, you will see hundreds of entries being accessed, removed, and added to it within a short amount of time. Due to this constant addition and removal of information, registry files tend to get fragmented. Many times, when a key is removed, it leaves behind a place holder in the registry, which is actually an empty registry key and is of no use. These registry holes also unnecessarily contribute toward increasing registry size and making it unstable.

A fragmented and unstable registry deteriorates the performance of your Vista computer. Therefore, to speed up your PC, you need to regularly clean and defrag the Windows registry to maintain its contiguity and prevent it from growing too large.

Accumulation of Malicious Registry Keys

You know that all programs on your Vista PC have to access the registry to perform various operations. Well, the same goes with malware programs such as viruses, Trojans, spyware and adware too. If your PC is infected by any kind of malware, your registry is likely to be filled up with many malicious registry keys added by these programs. Although you may get rid of malware using antivirus and antispyware tools, a few registry keys may get left behind.

You can easily get rid of these left-behind malicious registry keys when you perform registry cleanup.

How Registry Cleaners Can Help

A large number of registry cleaner tools are available in the market today that you can use to perform registry fix and cleanup. Using a reliable registry cleaner tool you can:

* Scan and remove all unwanted information from the registry and ensure yourself an error-free PC.
* Defrag the registry to make the registry files contiguous and the registry compact, thereby reducing the data access time and boosting the performance of your PC.
* Perform a deep scan of the registry and weed out hidden malware registry keys.
* Make registry backups that you can use to restore the registry in case it fails.

To ensure that your PC is free from system errors and malware and is at its best performance, you should regularly clean your registry. The simplest and the most efficient method to do this is by using a registry cleaner utility.
Read rest of entry

Set Default Search Options

This tweak will modify the standard search parameters so they do not have to be reset for each individual search.



[Start] [Run] [Regedit]



Registry Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\ Explorer


[Any or all of the five Value Names below may be modified to customize search options]


Modify/Create the Value Name [CaseSensitive] according to the Value Data listed below.
Data Type: REG_DWORD [Dword Value] // Value Name: CaseSensitive
Value Data: [0 - Unselected / 1 - Selected as Default]

Modify/Create the Value Name [IncludeSubFolders] according to the Value Data listed below.
Data Type: REG_DWORD [Dword Value] // Value Name: IncludeSubFolders
Value Data: [0 - Unselected / 1 - Selected as Default]

Modify/Create the Value Name [SearchHidden] according to the Value Data listed below.
Data Type: REG_DWORD [Dword Value] // Value Name: SearchHidden
Value Data: [0 - Unselected / 1 - Selected as Default]

Modify/Create the Value Name [SearchSlowFiles] according to the Value Data listed below.
Data Type: REG_DWORD [Dword Value] // Value Name: SearchSlowFiles
Value Data: [0 - Unselected / 1 - Selected as Default]

Modify/Create the Value Name [SearchSystemDirs] according to the Value Data listed below.
Data Type: REG_DWORD [Dword Value] // Value Name: SearchSystemDirs
Value Data: [0 - Unselected / 1 - Selected as Default]


Exit Registry and Reboot
Read rest of entry

Enable/Disable Logon Screen Saver

Note: This applies only to the default Login [login.scr] screensaver and is not the same as screensaver selections made in the [Display Properties] property sheet accessed by right clicking on the desktop and selecting [Properties] from the context menu.

[Start] [Run] [Regedit]


Registry Key: HKEY_USERS\.DEFAULT\Control Panel\Desktop
Data Type: REG_SZ [String Value] // Value Name: ScreenSaveActive


Modify/Create the Value Name [ScreenSaveActive] according to the Value Data listed below.


Value Data: [0 = ScreenSaveActive Disabled / 1 = ScreenSaveActive Enabled]


Exit Registry and Reboot
Read rest of entry

Disable Run Commands

This tweak controls the use of the Run command on the local machine।



[Start] [Run] [Regedit]



Registry Key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion\ Policies\Explorer
Create a DWORD value for each Run function that will be disabled.

Modify/Create the Value Name [DisableLocalMachineRun] according to the Value Data listed below.
Data Type: REG_DWORD [Dword Value] // Value Name: DisableLocalMachineRun


Modify/Create the Value Name [DisableLocalMachineRunOnce] according to the Value Data listed below.
Data Type: REG_DWORD [Dword Value] // Value Name: DisableLocalMachineRunOnce


Modify/Create the Value Name [DisableCurrentUserRun] according to the Value Data listed below.
Data Type: REG_DWORD [Dword Value] // Value Name: DisableCurrentUserRun


Modify/Create the Value Name [DisableCurrentUserRunOnce] according to the Value Data listed below.
Data Type: REG_DWORD [Dword Value] // Value Name: DisableCurrentUserRunOnce


Setting for Value Data: [0 = Disabled / 1 = Enabled]



Exit Registry and Reboot
Read rest of entry

Monday, April 13, 2009

Use Ubuntu Live CD to Backup Files from Your Dead Windows Computer

If you've ever asked for help with your Windows computer that won't boot anymore, you've probably been told to "Backup all your data and then reinstall"… but if you can't boot, how can you get to your data? That's the question we'll be answering today.

One of the easiest methods to access your data is to simply boot off an Ubuntu Live CD… and it's completely free (except for the cost of a blank cd).

Burn an Ubuntu Live CD


If you have another computer, you can download and burn the Ubuntu Live CD using a very simple application called ImgBurn. Otherwise, you can bug one of your friends to help you burn a copy.

Just open up ImgBurn, and click the icon to "Write image file to disc"


Then click on the icon next to "Source", pick the downloaded ISO file, stick a recordable CD into the drive, and click burn.


Now that you have the boot cd (which you should keep in a safe place, as it's very useful), just stick it in the drive of the computer and boot from it. You should see an option to "Try Ubuntu without any change to your computer".


Once the system has started up, the first thing you want to do is choose Places \ Computer from the menu.


This should show you all the drives available in the system, including your Windows drive. In my case, that is the 52.4 GB volume.


You can try and double-click on the drive to open it… and if it immediately works then lucky you! Most of the time it's going to give you an error saying "Unable to mount the volume", because Windows didn't shut it down cleanly.


Click the Details link so that you can see the full message, and leave this window open. You'll see a "Choice 2″ in the message, which includes the commands to force Ubuntu to use that drive even though there's something wrong.


What you'll want to do is open a new Terminal from Applications \ Accessories \ Terminal on the top menu. Once you've done that, then you'll want to type in a bunch of commands, which I'll walk you through.

First, we'll want to switch to "administrator" mode, which in Linux terms is known as "root". The simplest way to do it is with this command:

sudo /bin/bash

Now we'll need to create a directory that we'll mount the drive on. The full explanation of mounting drives is a little complex, so just run this command:

mkdir /media/disk

Now comes the tricky part. You'll need to type out a command very similar to this one, but you'll need to replace /dev/sda1 with what you see in that message box we showed you above. This command tells Ubuntu to use the ntfs-3g driver, and force mount even if there is a problem.

mount -t ntfs-3g /dev/sda1 /media/disk -o force

If your drive is FAT32 instead of NTFS, then you can use the following command instead:

mount -t vfat -o umask=000 /dev/sda1 /media/disk


If you are having problems figuring out whether you have NTFS or FAT32, and you can't figure out which /dev/whatever to use, then type in the following command at your prompt (make sure you already ran the command to run things as root)

fdisk -l

In the output you should see a lot more information about the available drives… you can see in this example that the filesystem type is NTFS and the device name is /dev/sda1.


At this point, you should be able to access your hard drive through the icon in Computer.


Note: If you have more than one drive in the computer, or more than one partition, they should show up separately in Computer. You should perform the same steps as above to open those drives up as well.

Backing Up to External USB

The absolute simplest thing to do at this point is to plug in an external USB drive, which should place an icon on the Ubuntu desktop, and most likely immediately pop up a nautilus window showing the contents of the drive.


Note: I plugged in a USB Flash drive for illustration… it would be better to plug in a full external USB drive so you'll have more space for backups.

What Should I Backup?

If you aren't extremely technical, you might be wondering what on earth you should be backing up… and that's a very good question.

1) Best Method

If you have loads of empty space on your external drive or network share, you should simply backup the entire contents of the drive, and sort through it later. It'll take a little longer, but at least that way you can be sure everything has been backed up.

2) Still Good

You should try and backup your entire user folder… on XP you'll go to "Documents and Settings", and on Vista you'll go to "Users", and you should see your username in the list:


You can simply copy this entire folder to your backup drive, which should contain your music, documents, bookmarks, and most of your important files.

Important Note: This will not backup your application files, and you should look around your drive and see if you've saved anything important somewhere else. This is especially true if you have more than one drive. Again, your best bet is to simply backup everything.

Backing Up to Network Share

If you would rather backup your drive to a network share on another computer, you can use the Places \ Connect to Server item on the menu.


Change the Service type menu to "Windows share"…


And then enter in the details for your network drive, with these being the required fields:
Server: Computer Name
Share: Shared Folder Name
User Name: your username


Once you click the Connect button, you'll be prompted to enter in your password. Typically you can leave Domain set to the default, but if you have a custom workgroup name you should enter that instead. I also chose the "Remember password until you logout" button just so I won't have to enter the password again.


Once you click the Connect button you should have an icon on the desktop for your network share.


Now you can open up the network share, and if everything is setup correctly on the shared folder side of things, you can copy all of your files across the network using the instructions above on which files to choose.


At this point you should have a backup of your data. If you backed up to an external hard drive, you might want to consider also copying those files to another computer just in case, and if you copied across the network you could consider backing that up elsewhere as well.

Now you can proceed with reinstalling or whatever else you'd like to do.
Read rest of entry
 

My Blog List

Term of Use

Empower Your Needs Copyright © 2009 Black Nero is Designed by Ipietoon