promte......:)

ADBRITE

promote

live cricket scores

Wednesday, November 12, 2008

WAYS TO SPEED UP XP::NOT ONLY DEFRAG

1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.

2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.

3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.

The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.

Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.

Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.

5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.

6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.

7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.

8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.

9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.

10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.

11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.

13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.

14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.

15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.

16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.

17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.

18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.

19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.

20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.

21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.

22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.

23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.


Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.
(credits-prateek)

Thursday, October 2, 2008

HACKING BASICS - FAQ'S

How do I hack?-
There is no easy way how to hack. Google is your best friend.. REMEMBER THAT! Read any information you can find on hacking. Read hacking forums and check out hacking websites. Learn a programming language like C++. Get a book like Hacking for Dummies which will teach you alot.

What do I need to be able to hack? -
Firstly you need to understand how your computers operating system works, networks and protocols works, security settings and general PC knowledge. After you understand how it works you need hacking tools which helps you to hack.

What is command prompt (cmd- the little dos Windows)? -
Go START, RUN and type in: "cmd"What can I do in cmd? - You can can do various things with it like run exploits or do a ping request.

Why does some of the hacking tools I download just close itself when I open them? -
Lot's of hacking tools are DOS based and has to be run through CMD. If you double click on the program it will open a DOS box and automaticly close the box. From CMD you can navigate to the directory which your hacking tool is stored in and run it from there. Other hacking tools are GUI ( graphical user interface ) based and it will open like a normal Windows based program.

What is a IP address? -
Every computer connected to the Internet or some network has a IP address. Goto START, RUN and type in "cmd" then type in "ipconfig" it will show you your IP adress or adresses. It will look something like this : 81.35.99.84. IP = internet protocol.

How do I find someone's IP adress? - Look further down in this tutorial and use IPSTEALER

What can I do with a IP? -
Well you need someone's IP before you can hack, portscan or DOS them.

What is IP ping ? -
It's a command you can use to check if someone's IP address is online, to check it they connected to the Internet or a network. In command prompt type in "ping 192.168.0.21" - this will show you something like this : Pinging 192.168.0.21 with 32 bytes of data:Reply from 192.168.0.21: bytes=32 time<1ms TTL=128Reply from 192.168.0.21: bytes=32 time<1ms TTL=128Reply from 192.168.0.21: bytes=32 time<1ms TTL=128Reply from 192.168.0.21: bytes=32 time<1ms TTL=128Ping statistics for 192.168.0.21:Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),Approximate round trip times in milli-seconds:Minimum = 0ms, Maximum = 0ms, Average = 0msThat means you can succesfully PING IP 192.168.0.21 which means the IP is online. If you get a message "request timed out" it means the IP is not online. Bytes=32 is the ammount of data which was sent to the host. Time<1ms is the time the host took to reply.

Why can't I ping a certain IP? -
Either the IP is not online/ in use or the person your trying to ping is running a firewall which blocks ping requests or maybe your firewall is blocking outgoing ping requests

What is 127.0.0.1 IP? - It is your PC's local loopback IP address.

Why do I have two IP addresses when I do a ipconfig? -
Well if your on a local LAN (Local area network) you will have a IP like 192.168.0.1. If your also directly connected to the internet you will have another IP address like 80.87.34.56. 192.168.0.1 is your local IP which you use to comunicate with your local internet network (lan) and 80.87.34.56 is your internet IP.

What is a static and dynamic IP address? -
Static means permanent set IP address - like a website will have a static IP address, it never changes. Dynamic means temporary IP address - dailing up to the Internet with a modem or most ADSL connections has dynamic IP's. Everytime you logon to the Internet your ISP ( Internet Service Provider ) will issue you a new IP address.

I have sent someone a trojan but I cannot connect to their PC? -
Either they are running a firewall which blocks you from connecting to their PC, or they are connected to the internet through a router.

What do I do when someone is behind a router and I want to control their PC with a trojan? - You will need to use a trojan which uses reverse connections - meaning you don't connect to the host, the host connects to you. Bifrost is a trojan which has the mentioned function. Remember when someone is behind a router and your using IPstealer to get hold of their IP address, you are actually getting their routers IP, not their actual PC's IP. The router will have the persons internet IP (WAN IP) and their PC will have a difirent IP - their LAN IP.

How do I check if my own PC is infected with a trojan? -
Do a port scan on your PC and check which ports are open. If you find any open ports in this trojan port list you might be infected with a trojan. Download the trojan you think you might be infected with and connect to that specified port.

What is a router? -
A device which is used to route data on a network. a Router decides where certain traffic should be sent to.

What is a firewall? -
Its a software or hardware device which can block or permit certain ports or IP's or certain kinds of data.

What is a port and what can I do with it? -
Every program running on your PC which has some network function uses a specific port to send an receive data though. If you do a port scan you will see which ports are open on the host you scanned. Port 80 is normally a web server. Port 21 a FTP server ect ect.. Trojans also uses ports. Check this list of trojan ports, if you find an open port in this list, the host might be infected with a trojan, download the trojan and try connecting to the port.

How do I do a port scan? -
You need a program like superscan to do a portscan. Then all you do is add the ip you want to scan.Why do you want to scan ports? - If you scan a PC with a port scanner, it will show you which programs or services are running on the PC.Common ports:
Ping : 7
Systat : 11
Time : 13
NetStat : 15
SSH : 22
Telnet : 23
SMTP : 25
Whois : 43
Finger : 79
HTTP : 80
POP : 110

What is an exploit? -
It's a poorly coded piece in software which you can use to gain access to the system. There is many exploits available for the various MS Windows's out there.

How do I use a exploit? -
You first need to compile the exploit with a program like Bloodshed C++ compiler. Then you can start the exploit through command prompt and see if the system your trying to exploit is vulnerable to that specific exploit. Scroll down for more information about exploits.

What is a exploit POC? - POC stands for proof of concept and it the proof that a exploit works.

What is a DOS attack? -
It is when too much data is being sent to a host and it cannot handle all the data and disconnects from the Internet.

How do I see what connections is currently made to my PC? -
In cmd type in "netstat" - it will show you IP addresses of connections to your PC and what port it is using.

What is a MAC address? -
Its a hard coded number, almost like a name which is embedded into a network card. It identifies the manufacturer of the card and a unique number for the card. No two network cards in the world has the same MAC address.

How do I find out my own or someone else's MAC address? -
Your own MAC = Goto cmd and type in "ipconfig /all" MAC address looks something like this : 00-13-20-A3-0B-4CSomeone else's MAC address you need their IP address and then goto cmd and type in "nbtstat -a 192.168.0.5" or whatever IP they use. This will show you their MAC address as well as their currently logged on user.

What is a Windows Registry and how do I access it? -
Its where Windows stores most of the configurations of your operating system and most programs installed. You might used it to make a trojan server file you uploaded to the PC run automaticly when Windows starts up. To access the registry go START, RUN and type in "regedit"Carefull what you change in the registry, it might screw up you PC.. First make a backup of the registry.

How do I hack a webpage/ web server? -
Read the IIS hacking tutorial in the MISC download section on Windows Hacker. Remember not all webservers run IIS!

What is IIS? -
It is Microsoft's web server. IIS - Internet information server. Most webservers run on port 80.

How do I check if a website is running on IIS? -
Telnet to the website URL through CMD - "telnet www.siteyouwanttocheck.com 80"

What is telnet?-
Program which can be used to connect to remote computers or routers and to run commands by simply typing them in its window.

How do I hack into a Gmail, Yahoo or Hotmail email account? -
Every now and then someone discovers a way to get into those email servers, but the service provider fixes the security hole so fast, there is no straight answer for that. Best way is to install a keylogger on the victims PC and get their login details. Otherwise download THIS program which you can use to brute force a hotmail account.

How do I hack into a POP3 email account? -
Hydra 5.3 is a program which you can use to crack POP3 accounts. You will need a wordlist which Hydra will use to crack the POP3 password.

What is a keylogger? -
It is a program you install on someone's PC which captures every key that is pressed on their keyboard which is emailed to you or stored into a file.

How do I get the administrator account password while logged in to the PC? -
Locally run a program like Adminhack for local administrator account cracking. If you need to do it remotely run a program like Venom or Starbrute.

What is a SAM file? -
SAM file is the file which stores all the user accounts and their password hashes like the Administrator account. SAM file is stored in "C:\WINDOWS\system32\config" but it is locked and inaccessable while you are busy using Windows - meaning you can't copy it while your in Windows. You need to boot up with another operating system like NTFSDOS or Linux with NTFS support. When you copied the SAM file you can crack the passwords stored in the SAM file with a program like LC5. With Pwdump6 it is possible to get access to the SAM file while logged into windows. It can also connect to a remote PC and grab the password hashes from the SAM file. Administrator account is needed.

How do I reset a administrator or some other account password on Win2K/WinXP/WinNT/Win2003? - Download Offline NT Password & Registry Editor which you can use to create a bootup disk or CD and then boot up the PC and then you can reset the password. Just remember that this program will not show you the password, you can only change the password.

How do I crack a administrator password? - If you need to crack a administrator password you will need to copy the SAM file to another machine and crack it. Download this NTXP-Cracker program which has included everything you need to boot up the PC, copy the SAM file and crack the SAM file on another machine.

How do I find out what operating system does my target run? -
Download Detect and use it against your targets IP address.
Result:
C:\>detect.exe 127.0.0.1
[*]------------------------------[*]
[*] XP/2K OS Detector [*]
[*] by: illwill & phr0stic [*]
[*]------------------------------[*]
[+] Finding Host 127.0.0.1
[+] Connected to 127.0.0.1
[+] Bytes Sent: 222
[?] The box seems to be Windows XP

Thursday, September 18, 2008

HACK MANY WEBSITES IN FEW SECONDS

recntly while browsing thru the net i came across this article which i thought to be interesting



hack many websites in few seconds.

this is nt trick .this is a total basic concept based very explosive information .
see if u vant 2 know d technique directly then u can jump on d red lines nd if u vant 2 understand whole d condcept then u shud read whole d stuff.oki?

see,dis moment in dis world nearly 65% sites r being hosted by apache server[linux based]nd 25% r based on iis[microsoft server .ohi...then bcoz linux is free nd hosting is free der most of d person r using linux hosting it is free der4 very secure whether iis is less secured ...now.

we vl learn 2 hack microsoft server hosting based websites.then this moment microsoft is using iis version 7 nd d trick i am going 2 tell u works only on iis5 but it still works on many websites.i hv hacked many nd many websites till d moment nd even u vl do also.
now plz read very carefuly.
wenever we type ../
i mean dot dot slash in a website name then we jump on 1 more level means suppose that a website has been made .d person who is making suppose that he has made a login page 4 dealing by his official persons then definetaly he vl nt show dis page 2 all users ,he vl hide it but on d iis server ..iis server has put dis page on most uppar side of dt website ..oki?then all d passwords nd login information ,dis is also saved in website memory.nd we can nt see dt page but wen we type ../
we reach a page up....then d method is


wenever u hv 2 hack a website just go on thats login link..i mean click on login nd if u watching der something written index.php?page=bla bla bla
then after of bla bla bla type
../etc/password
nd do click .if done then ok..if nt then type after of bla bla bla
../../etc/password
nd again enter if got d password list then ok nd if nt then in next try type one more
../,i mean like dis after of bla bla bla
../../../etc/password again enter nd try like dis untill u dont get d password nd login list ..d trick vl work only on small site ..dont imagine reliance,rapidshare,windows type site 2 be hacked by dis methode.....

preocessing in background-------------->wenever u tyope
../
u reach on 1 more page up nd thus as much type u vl type dis string u vl reach mor e nd more up ...start typing nd start hacking ..enjoi frends ...most of d websites shud be hacked by u now..

credits:-
anurag

Monday, August 18, 2008

Delete an"undeletable file"

Open a Command Prompt window and leave it open.Close all open programs.Click Start, Run and enter TASKMGR.EXEGo to the Processes tab and End Process on Explorer.exe.Leave Task Manager open.Go back to the Command Prompt window and change to the directory the AVI (or other undeletable file) is located in.At the command prompt type DEL where is the file you wish to delete.Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell.Close Task Manager.

Or you can try this

Open Notepad.exeClick File>Save As..>l

ocate the folder where ur undeletable file is

Choose 'All files' from the file type box

click once on the file u wanna delete so its name appears in the 'filename' box

put a " at the start and end of the filename(the filename should have the extension of the undeletable file so it will overwrite it)
click save,
It should ask u to overwrite the existing file, choose yes and u can delete it as normal
Here's a manual way of doing it. I'll take this off once you put into your first post zain.
1. Start
2. Run
3. Type: command
4. To move into a directory type: cd c:\*** (The stars stand for your folder)
5. If you cannot access the folder because it has spaces for example Program Files or Kazaa Lite folder you have to do the following. instead of typing in the full folder name only take the first 6 letters then put a ~ and then 1 without spaces. Example: cd c:\progra~1\kazaal~1
6. Once your in the folder the non-deletable file it in type in dir - a list will come up with everything inside.
7. Now to delete the file type in del ***.bmp, txt, jpg, avi, etc... And if the file name has spaces you would use the special 1st 6 letters followed by a ~ and a 1 rule. Example: if your file name was bad file.bmp you would type once in the specific folder thorugh command, del badfil~1.bmp and your file should be gone. Make sure to type in the correct extension.

Tuesday, August 5, 2008

10 ways why your pc crashes and u must know it

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.
"You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1. Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.
If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.
Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2. Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3. BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).
4. Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5. Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6. Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Nod32, made by Eset ( www.eset.com).

7. Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8. Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org.

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

9. Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10. Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

Wednesday, July 30, 2008

bandya ho - lyrics and meaning

Bandya Ho Lyrics
Song : Bandya Ho
Movie : Khuda ke liye

Bundeya hoo Bundeya
Bundeya hoo..oo…ooo
Bundeya hoo Bundeya
Bundeya hoo..oo…ooo
{Banda means person…. Bandeya Means ‘Man/Mankind’….}
Bullay Noun Samjhawan Ayaan
Bheynaan Tay Bherjaiyaan
Man Lay Bulleya Sada Kena
Chad Day Pala Rayaan
{Bulleh’s sisters and bhabhiaan (sister in laws) came to convince him. Bulleh, Please do as we tell you and leave araain’s (a caste) company}
Aal Nabi Ullad Nabi Noun
Tu Kyoun Leekaan Layaan
“Jeyra Saanoun Syed Saday
Dozukh Milan Sazaiyaan”
{Why do you want to insult Prophet’s and Ali’s decendant (by having lower caste in your company)? The one who address us as syed will go to hell. But the one who addresses us as Araain will enjoy comforts of heaven}
Bundeya hoo Bundeya
Bundeya hoo..oo…ooo
Bundeya hoo Bundeya
Bundeya hoo..oo…ooo
Face the world with a smile
No one knows what hid inside
They see only happiness
they cant see the tears i have cried
Raain, Saain, Sabhan Thaain
Rab Deyaan Bay Parwaaiyaan
Sohniyaan Paray Hatayaan Tay
Khoojiyaan Lay Gall Laiyaan
{Arain and masters are born at every place, God doesn’t discriminate against anyone. Beautiful people (at heart) doesn’t care for such differences, only ugly ones do}
Jay To Loorain Baagh Baharaan
Chaakar Hoo Ja Raiyaan
Bulley Shah Dee Zaat Kee Puchni
Shakar Ho Razayaan
{If you need gardens of heaven, be servant to araains. Why do you ask caste of Bulleh Shah? Instead be grateful to God.}
Bundeya hoo Bundeya
Bundeya hoo..oo…ooo
Bundeya hoo Bundeya
Bundeya hoo..oo…ooo
(English verse missing)
Bundeya hoo Bundeya
Bundeya hoo..oo…ooo
Bundeya hoo Bundeya
Bundeya hoo..oo…ooo..!!!

Saturday, July 26, 2008

HOW TO HIDE UR HARD DRIVES WITHOUT ANY REGISTERY EDIT

1.First goto start->run->type “diskpart” and enter(with out quotations)
2.Type “list volume” (with out quotations)
3.select the volume of drive u want to hide by this command “select volume3” (with out quotations)
4.Then type “remove letter f” (with out quotations)(It removes the drive f)
5.If u want re-assign the drive
a. First goto start->run->type “diskpart” and enter(with out quotations)
b. Type “list volume” (with out quotations)
c. select the volume of drive u (before) hide by this command “select volume3” (with out quotations)
d.THEN type “assign letter f” (with out quotations)

EXAMPLE:
DISKPART> list volumeVolume
### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
Volume 0 D DVD-ROM 0 BVolume 1 C NTFS Partition 20 GB Healthy System
Volume 2 E New Volume NTFS Partition 49 GB Healthy
Volume 3 F New Volume NTFS Partition 78 GB Healthy
Volume 4 G New Volume NTFS Partition 86 GB Healthy
Volume 5 H SUBBU FAT32 Removeable 978 MB
DISKPART> select volume 3
Volume 3 is the selected volume.
DISKPART> remove letter f
DiskPart successfully removed the drive letter or mount point.
DISKPART> select volume 3
Volume 3 is the selected volume.
DISKPART> assign letter f
DiskPart successfully assigned the drive letter or mount point.

Friday, July 25, 2008

PLACEBO EFFECT -- read it u'll like it

this is a piece of info which i read in the times of india and really liked it....
it was on the editorial page.....hope u will like it too......just go thru it

The Turing Test, named after the English mathematician Alan Turing, is still thought to be the best test to determine whether a machine is intelligent or not. It goes something like this: a human judge engages in a natural language conversation with two other parties who remain hidden from sight — one, another human, and the other a machine. If the judge cannot reliably tell which is which, then the machine is said to pass the test. Fair enough. After all, that's how we normally judge other people to have the same kind of intellectual capacity as ourselves. But some critics say this test can be rigged. What if the machine had been programmed to give exactly the type of responses that one would expect from a human under the same circumstances? In which case, even if it passed the judge's pronouncement, wouldn't the rest of us know that the intelligence being certified was merely that of the programmer and not the machine? It would not prove to us that there was a consciousness — or at least even a psychological entity — under that silicon circuitry. No, to prove the existence of an awareness inside a machine, we need another type of test altogether. One which would have to demonstrate an internal mind in operation. That would be something like the placebo test. A placebo is an inert treatment, a dummy medicine containing no active ingredient of any real benefit to the body but that nevertheless makes lot of people feel better after receiving it. Scientists believe this happens because when administered by an authority figure like a physician or researcher, a placebo tricks the mind into causing the brain to effect physiological changes in the body. Now a placebo wouldn't work on a horse because the animal doesn't even know it's receiving medication — much less a fake drug. However, if it still works, we would have to conclude the horse has a mind that can be fooled into healing itself. Similarly, the day a phoney antivirus patch can cause a computer's operating system to get rid of an infection by using its own existing hardware capability, we would know there was awareness in there. One which, ironically, didn't know what was actually going on when the inactive remedy was being administered.

USEFUL RUN PROMPTS

  • Accessibility Controls - access.cpl
  • Add Hardware Wizard - hdwwiz.cpl
  • Add/Remove Programs - appwiz.cpl
  • Administrative Tools - control admintools
  • Automatic Updates - wuaucpl.cpl
  • Bluetooth Transfer Wizard - fsquirt
  • Calculator - calc
  • Check Disk Utility - chkdsk
  • command Prompt - cmd
  • Computer Management - compmgmt.msc
  • Date and Time Properties - timedate.cpl
  • Device Manager - devmgmt.msc
  • Direct X Control Panel (If Installed)* - directx.cpl
  • Direct X Troubleshooter - dxdiag
  • Disk Cleanup Utility - cleanmgr
  • Disk Defragment - dfrg.msc
  • Disk Management - diskmgmt.msc
  • Disk Partition Manager - diskpart
  • Display Properties - control desktop
  • Display Properties - desk.cpl
  • Display Properties (w/Appearance Tab Preselected) - control color
  • Fonts - control fonts
  • Fonts Folder - fonts
  • Hearts Card Game - mshearts
  • Iexpress Wizard - iexpress
  • Internet Properties - inetcpl.cpl
  • IP Configuration (Display Connection Configuration) - ipconfig /all
  • java Control Panel (If Installed) - jpicpl32.cpl
  • Java Control Panel (If Installed) - javaws
  • Keyboard Properties - control keyboard
  • Local Security Settings - cpol.msc
  • Local Users and Groups - rmgr.msc
  • Logs You Out Of Windows -logoff
  • Microsoft Chat - chat
  • Minesweeper Game - winmine
  • Mouse Properties - control mouse
  • Mouse Properties - main.cpl
  • Network Connections - ncpa.cpl
  • Network Setup Wizard - netsetup.cpl
  • Notepad - notepad
  • On Screen Keyboard - osk
  • password Properties - password.cpl
  • Performance Monitor - perfmon.msc
  • Phone and Modem Options - telephon.cpl
  • Power Configuration - powercfg.cpl
  • Printers and Faxes - control printers
  • Printers Folder - printers
  • Quicktime (If Installed) - QuickTime.cpl
  • Regional Settings - intl.cpl
  • Registry Editor - regedit
  • Registry Editor - regedit32
  • Remote Desktop - mstsc
  • Removable Storage - ntmsmgr.msc
  • Removable Storage Operator Request - sntmsoprq.msc
  • Scanners and Cameras - sticpl.cpl
  • Scheduled Tasks - control schedtasks
  • Security Center - wscui.cpl
  • Services - services.msc
  • shared Folder - sfsmgmt.msc
  • Shuts Down Windows - shutdown
  • Sounds and Audio - mmsys.cpl

music albums

akon
http://vmp3.eu/mp3/Akon/

enrique
http://vmp3.eu/mp3/Enrique/

back street boys
http://www.mp3s.pl/music/Back%20Street%20Boys/

high school musical
http://www.mp3s.pl/music/High%20School%20Musical/

jennifer lopez
http://www.listen77.com/mp3/jennifer-lopez/

hilary duff
http://vmp3.eu/mp3/Hilary%20Duff/

50 cent
http://www.mp3s.pl/music/50%20Cent/

linkin park
http://vmp3.eu/mp3/Linkin%20Park/

avril lavigne
http://www.vmp3.eu/mp3/Avril%20Lavigne/

lamb of god

http://www.mp3s.pl/music/Lamb%20Of%20God/

venga boys
http://www.mp3s.pl/download/3704/Venga_Boys_-_We_Like_The_Party

blue-full album
http://vmp3.eu/mp3/Blue/

shakira

http://vmp3.eu/mp3/Beyonce%20And%20Shakira/

shaggy
http://vmp3.eu/mp3/Shaggy/

jay sean
http://www.mp3s.pl/music/Jay%20Sean%20Ft.%20Trina/

u sure DELETED the files????

A common misconception is that the data is actually removed from the hard drive (erased) when you delete a file. Any time that a file is deleted on a hard drive, it is not erased. Instead, the tiny bit of information that points to the location of the file on the hard drive is erased. This pointer, along with other pointers for every folder and file on the hard drive, is saved in a section near the beginning of the hard drive and is used by the operating system to compile the directory tree structure. By erasing the pointer file, the actual file becomes invisible to the operating system. Eventually, the hard drive will write new data over the area where the old file is located.There are several utilities that you can find on the Internet that allow you to recover "deleted" files. What these utilities do is search for data on the hard drive that does not have corresponding pointer information and present you with a list of these files. Your chances of fully recovering a file diminish the longer you wait after you deleted the file since the probability that the file has been overwritten increases. Sometimes you can recover portions of a file that has not been completely overwritten.
"tune up undelete" is one of those utilities.......

Sunday, July 20, 2008

hey!!!
all you who spent dere precious time having a look at my blog.
this is my effort of providing you with the little bit of information i have collected
about computers.
i know the title says variety but as of now i have decided to concentrate on computers.
the tips and tricks basically wich i have come across.
till now i was being very lazy and was just copy pasting the info in my blog though
it is what is the best considering the ocean of info dat is being posted.
but still i felt dat atleast something should be dere in my writing[:)].
so i came up with this.
hope you like my work(read my blog)
keep visiting

Saturday, July 19, 2008

CRACKS OF GAMES

Games CD keys

1503 A.D.: A New World
----------------
5447-7278892-7648258-2126
9750-0553133-8300899-5758
2012-1236143-5723266-5867
3475-0914223-0632734-6745
9385-8677964-7296207-4572

1503 A.D.: Treasures, Monsters and Pirates
----------------
7TWN-CFQM-T2B3-7F2K-KEPX
HGEE-77DC-J86W-F9WG-S8FN
V9L4-5L3C-BQKF-J6AJ-JW37
P99R-H5W5-GM62-NETL-URNP
PPDM-UNW3-7VRQ-3NWE-RPE2

Age of Mythology
----------------
XDWXF-2JCVG-VTX6T-6KYQ9-QDC4G
RD4D4-B94XK-QVWFP-K9PJD-GVRV3
QVW83-4MC67-FDPTH-49PT8-6HGRD
P3HM4-WDM27-662XW-9BPTV-CFVMQ
HYQRH-FV79R-RHHPW-23G37-BDM76

Age of Mythology: The Titans
----------------
B23B7-JTKPR-4TQT3-HXGD6-HXY96
T2HB2-G4PK6-MQPDR-CTYPQ-64JK6
XG9Q9-TJCWG-MKV2Q-TGBFK-KP8K6
BQBBY-4T8MK-8TP28-GRHJ4-2RP7G
JXFTX-YRVX6-YRRYQ-PBTXP-4YKHG

Axis and Allies
----------------
1005-493D-C922-17D3
1201-7333-7458-686D
1705-3453-2570-A0F9
1022-7053-5324-7ACC
1627-4420-0243-523D

Battlefield 1942
----------------
6349-9020371-9806846-2830
4964-1668346-7637006-2960
6599-4055214-4745454-2456
2203-7294876-7652422-1340
6801-1528034-1442448-3626

Battlefield 1942: Secret Weapons of WWII
----------------
3QHZ-KBBE-ZPQV-VDS3-U5MA
ANXX-ZKF8-5RZG-SWFK-M2UZ
SST3-A9PL-G7GN-856A-PMAW
QFC4-T7Q6-33EQ-LUHP-96ZP
NH2J-AJ5Y-8JJ9-KFGE-QLKK

Battlefield 1942:The Road to Rome
----------------
0777-4826524-6288328-2359
6413-6941923-0559983-3822
1768-8264649-8295359-3044
0741-8677977-4365014-4911
0256-0695274-2401207-5319

Battlefield Vietnam
----------------
HJSJ-ND22-REVP-QH5N-J67W
WA77-2BMM-2TLG-CR43-2L5M
TPKK-QJ8R-BBVY-4TVM-8XLX
MXZZ-WTZ2-YELT-L8QQ-SGZ2
CDF7-2L2D-4QKK-2329-VG9J

Big Scale Racing
----------------
A4FL-2BTO-E8WN-2ESU
93GI-44MP-80GI-B4MP
1EGO-E5AI-66SG-23AY
D303-CA11-8356-E548
7A84-EB75-7454-4282

Black and White
----------------
5615-5218520-3198589-3037
9545-4379446-1230565-7092
1334-5330370-2292790-4422
7450-7423821-6747420-6866
4796-5617828-4021917-4194

Black and White: Creature Isle
----------------
7622-1467955-6016762-0529
2891-6593534-1909669-1431
7310-9173434-7386602-0753
4153-8092897-3409943-5649
9688-6176943-7166216-4217

Breed
----------------
HK7H9-RM4WL-N97NR-TGMXH-RTR3C
XXEME-W99GG-W7ERH-39RGT-MW7HE
R34RE-KNHLH-HTERG-LMKMH-CG7T9
4C3N4-XTEEG-GE9KE-4CHMG-9R3L7
N3KEN-3KHNN-GCM9R-RL7XN-9CMH9

Call of Duty
----------------
HKPH-WT3S-8XHU-2YHW-46C4
Y2SG-8W4P-4YYU-SXY8-5A89
KUP8-GX2H-K8SY-P2KG-90EF
TGYT-UPEK-GKUE-WTTU-F9E3
X42D-8GXD-HXS2-TGX8-1AD0

Call of Duty: United Offensive
----------------
74B3-JN4N-4WT4-WRHN-64BF
BZTZ-UWG7-UNTN-J7RN-BDE5
DUSU-3TSU-GETW-TYHY-7146
81C5-AB2T-8ZQ9-ESSE-46TZ
N4XK-7TRU-WRDB-JDUT-C4D4

Catwoman
----------------
7JEN-FFXT-E9JW-QN99-BJB6
DC4L-ACZF-W9J6-8EVA-7QVK
KLHH-EWUM-NL7L-9EFK-55GQ
KZ2J-YGTH-BMRK-A53R-NHVH
T5NW-7TWB-4F5F-L27D-BD22

Chrome
----------------
7XBYF-E7BW2-FCAP3-YPIFL
6TLMS-5UVWA-F8333-G2PCR
TAPES-7W9GJ-BPE4Z-8IGLW
6JMYB-CTGPT-ESR4X-Z7UMX
2MWZF-C7FWI-6TJK2-PCSLX

Command & Conquer Generals
----------------
8647-5232955-9878125-6046
9870-3450510-3133911-0726
4511-1729151-9897130-2429
5755-2361463-3448299-3710
5773-7726562-6842888-1323

Command & Conquer Generals: Zero Hour
----------------
YNEN-2FQN-JRYA-G3AB-JSX3
47HH-LWW6-F8AG-AQ7V-2GDP
47P7-JEQX-3CLY-7X53-S5K4
TDLU-665P-JYU5-5ASP-R246
XEJ2-L8YD-D7T3-6RCV-2G6V

Command & Conquer Red Alert 2
----------------
023093-408048-703486-5751
026929-458543-625750-0149
024971-477113-030353-1433
022921-207519-387995-8278
030119-499472-709335-3679

Command & Conquer Red Alert 2:Yuri's Revenge
----------------
046289-119931-094801-3903

047653-310394-811521-8281
049442-251271-777606-6959
051293-740133-308111-8676
046259-657889-882161-5974

Command & Conquer Renegade
----------------
061991-914060-171113-5190
056629-874691-293836-0722
064016-686792-796977-2716
057225-538796-853287-6511
060596-686641-669815-8850

Command & Conquer Tiberian Sun
----------------
685618-936422-961962-7039
835452-395171-622239-3092
257044-656814-148128-3482
601662-875090-962214-1926
169044-690442-019375-9514

Comanche 4
----------------
KGQJ-8M68-7JQW-DUCV-WLC6
3S2D-FLT1-CLS2-RULE-7865
36V8-BLMT-MXWY-EULX-YMSJ

Counter Strike
----------------
9271-77260-7184
6996-03006-9065
5902-51615-6065
3727-25598-3910
8940-76820-2401

Counter Strike:Condition Zero
----------------
5Z62F-CEKQD-4WCZT-TAWQH-JGLFQ
54RT2-843TJ-79UJC-ZGVC5-AR3R2
5ZN2H-NWHEY-RRM7H-PZAXA-GIFQJ
5Z62E-MTXQZ-Z32IY-NW22l-A3C4Q
5RP2E-EPH3K-BR3LG-KMGTE-FN8PY

Delta Force 2
----------------
288T-9AJ2-CVXN-BYSS-NNZW
293C-RQQ7-W2X8-DAQR-YSC4
JTUH-LTHD-BCZV-HFBY-SSNN
24XZ-GHAT-H7W7-C2UP-G559
JSZZ-PPPW-T8BC-TV46-5WSS

Delta Force: Black Hawk Down
----------------
QZP3-EPZW-SP5N-2XEX-H7JG
QTZ3-RHZT-P5TB-LQXH-7JD3
QKMT-LYAB-HIWB-ZMNW-FYPV
QMVQ-NF78-GJMG-XU2B-TZ5K
87HJ-AIFM-AMAO-PFCR-SMSQ

Delta Force: Black Hawk Down Team Sabre
----------------
AV4E-YVQE-NACM-DD3M-KBW3
ABRR-65QC-S4AQ-S2G7-CKCG
ACWY-D9VK-72CJ-5S5A-9MQU
A587-HGH6-HZ47-GNBT-HRNA
A7YL-R5SH-MY2E-4JPA-ZJB3

Delta Force:Land Warrior
----------------
6B4T-3BBC-DASD-D97Q-59HX
N5E3-YXH2-G983-9WYB-B3ZS
N7Q9-UX77-KZ3Z-332A-W4TR
NTEG-6HCF-VU5D-HDMC-47S9
NMBP-8MX8-ESD4-RB7S-9HKZ

Delta Force:Task Force Dagger
----------------
7S5E-MVLM-NS6Y-4X64-HMAK
7NXF-L5VB-T2AX-KSR8-EHSH
743L-HGSU-SK5P-YCKS-HQLZ
72YL-R4SB-GKG6-3WKS-HQ27

Diablo 2
----------------
6PNP-D7PG-HZ8M-PZNP
FX7D-82PH-FTWB-2BR2
2P8D-897Z-BNNJ-PJRM
EBPE-F7XN-9HWC-K97K
496B-6N7G-RCV4-27EN


C & C Generals: 1116-0553323-4206438-6378
C & C Generals: 1529-4165093-5283471-0961
C & C Generals: 1554-3519303-5863106-2960

C & C Generals: Zero Hour: AZNE-P748-W8C4-SSWS-4E8S

C & C Red Alert 2: 020736-428526-011875-6507
C & C Red Alert 2: 022121-905624-825895-4992
C & C Red Alert 2: 030645-633345-452378-0580
C & C Red Alert 2 Yuri's Revenge: 303440-222764-534487-73438
C & C Red Alert 2 Yuri's Revenge: 662875-454133-344823-08464
C & C Red Alert 2 Yuri's Revenge: 075420-663711-111417-71038

C & C Renegade: 056894-929488-118387-9679
C & C Renegade: 056430-651581-593164-8339
C & C Tiberian Sun: 008302-889914-451062-6091
C & C Tiberian Sun: 010436-881681-537098-4027
C & C Tiberian Sun: 263877 906189 200291 2883
C & C Tiberian Sun: 266127 314485 240039 3713
C & C Tiberian Sun: 781866 616595 819275 5016
C & C Tiberian Sun: 781866 616595 819275 5016

Chaser: 52QJY-10K8V-CLNPI-1EISW-7VNP3

Chaser: 3RVXB-6ICGE-PYX7T-KJ9L9-LSG5H
Chrome: 53ZFH-CKE6T-3TPXJ-82W00

Commanche 4: 3s2d-flt1-cls2-rule-7865
Dark Age of Camelot: HAVDVIL-YATYBA9-WX18VXE-MP43QAQ-HUGUTMX
Dark Reign 2: gad6-teb4-cup9-pap6-5529
Deep Raider: 102050000000001
Der erste Kaiser: RED2-DAD2-RAD2-DAD2-888
Devastation: 5B36F-976AA-6A471-58B8D-92B7B
Devastation: GUHW6-TC9VN-IMSAA-9B162-6RBR9
Devastation: BQEE6-UWZM3-IMSSZ-6A2B1-3D5F3

Diablo 2: LOD 6PNP-D7PG-HZ8M-PZNP
Diablo 2: 4CHW-RT4M-9JPN-2G4B
Diablo 2: 6EPM-27Z9-99D2-KM7B
Diablo 2: 79ER-XTM4-HNDK-DWE6
Diablo 2: 848J-XN72-9NZP-82FP
Diablo 2: 879K-9G4N-B9CV-2CTK
Diablo 2: 8DRR-VTH6-RGZ7-RT2V
Diablo 2: B2PF-JGJ9-J74C-H7T2
Drome Racers: 0252-2798728-8952823-5920
Drome Racers: 2186-7410760-3617868-5920
Drome Racers: 2574-0811768-6410528-5503
Drome Racers: 1439-8808778-3837107-0023
Drome Racers: 3496-5109968-3484992-4129
Drome Racers: 5533-3743808-8068198-0827
Drome Racers: 9722-8289078-1586124-0933
Drome Racers: 2586-2653924-6182119-2114
Drome Racers: 7629-5200391-8195325-1003

Diablo 2: Lord of Destruction
----------------
FX7D-82PH-FTWB-2BR2
6PNP-D7PG-HZ8M-PZNP
VCV9-N7RN-H9C4-VDBT
M4ND-6TPT-GH4N-FCKX
HCJJ-4DPH-988V-8HNN

Doom 3
----------------
2DR3-ABTC-AJLB-BLJH-4C
G4GE-JUMZ-BJYV-FEJU-02
WHUT-TLKX-PDV3-EAQ6-70
GURD-YVDJ-3LD2-W9Q8-91
MZK7-4LB8-42FJ-HCNA-75

Doom 3: Resurrection of Evil
----------------
PSBC-TASC-33WB-PH7L-C0
(Later...)
T7LB-BD27-TWLC-SDGD-F6

Dope Wars
----------------
373B30292B1131240889MI8770MMI7I573M288MH
2D3917122B2A1F380988M8890M85J9J773M28481
19123D212D19301C0I8M87MI0K84I7JI0H898884
15353C253A3A3A310I8MM8857387I7JM0I8J8581
381A3A3B151E1C18758987MH0K81I5I70IM48785

Drome Racers
----------------
0252-2798728-8952823-5920
2186-7410760-3617868-5920
3496-5109968-3484992-4129
7629-5200391-8195325-1003
2574-0811768-6410528-5503

Empires: Dawn of The Modern World
----------------
CGAT-NPZZ-NZW8-NC8X-D096
THXH-39CZ-N898-TT44-5DF5
KH9W-AWGX-4J4H-48AP-53B1
XA9Z-4JW8-C9GN-KJGP-C490
8P49-PP4T-WGCX-KP33-FB7B

Empire Earth
----------------
LES9-RUC2-TYM8-CEJ3-2727
TUS5-LEF6-TEM9-MER6-7453
NYR2-BAD2-GYM5-CEZ6-7337
RAN6-MUG2-SYJ2-GYL7-3385

Empire Earth: Art of Conquest
----------------
GER2-MAN2-RAP2-PER5-2252
BYB2-SAB8-WYZ5-DEB2-8489
TUS2-GAC4-BAM9-SUL6-8545

Emperor: Battle For Dune
----------------
035921-492715-312032-5217
038351-947039-933217-1729
040222-570718-012757-3830
041392-991953-129963-0491
033312-198585-776746-4264

Emperor:Rise of the Middle Kingdom
----------------
BAC9-RAL8-SAS2-SAX2-9999
RED2-DAD2-RAD2-DAD2-8888
BAB2-DAD2-BAB2-DAD4-2247
GAG2-FAF2-GAG2-FAF5-2257
GAD2-ZUC2-GAD2-ZUC3-2225

F1 2001
----------------
0742-8228816-4870198-0680
3611-4905481-0068168-6105
5094-4170872-5161062-5968
8696-4686736-6168757-6367
7743-2166283-2840552-8106

F1 2002
----------------
2319-2017512-5876312-1450
4812-5611292-5122399-1214
9961-9180844-0056338-1331
6421-9723052-9340789-0414
0072-7944183-8202464-0356

F1 Challenge 99-02
----------------
2420-1755665-2896902-5443
5342-6345206-6715881-1712
7454-6168039-6622391-6613
0833-7134974-9213172-0365
8594-3514538-3685029-2547

FIFA 2002
----------------
4431-4955408-1776254-7055
6821-3066382-6339801-8786
0199-7350209-7377613-5972
7967-4956526-7887198-1118
1834-9368868-6082203-4882

FIFA 2003
----------------
68M5-3DEU-JU8S-M7HX
52JT-ZVDW-QNBH-2CRW
K4LC-UKAW-CMDS-756J
FY8E-E4GH-JF75-EKQ9
TDN9-TNW8-K9PG-8NXE

FIFA 2004
----------------
2MGQ-WYAN-24DJ-XJBJ-AJE2
KUR9-QE7C-Y559-ZWC9-27Y8
WUEW-VGVM-AUP3-4YPC-CMJ5
MFPP-BWC8-LNFK-55WP-ZAZF
HVDD-YMXN-UQAE-R4ZW-Z9AJ

FIFA 2005
----------------
7UMD-DH24-2RKP-DSAA-Y45Y
2K7X-4H5D-MLM8-6WJG-BR9H
QE3K-Z3VT-QYS8-25B9-9WLM
GVWW-A78X-NGTZ-BKTP-UBBY
B9AJ-XBMB-DUSG-YVGR-7G3T

FIFA World Cup 2002
----------------
7603-5024040-4434988-2569
7134-0040778-6000898-4059
0973-0765382-4012472-2529
3610-9093190-1324091-5676
6308-7762342-7527510-3056

Freedom Fighters
----------------
PLLC-8WAZ-TRSH-6QC7-NSCY
PJ7F-GMAS-TRCU-4PUM-RUNH
PR33-WMAH-TJV3-JSNE-8KL6
PX8G-CUAT-T6Z4-6G4T-QUHU
P5JA-MUAV-TEW5-3A47-AJEZ

Freedom Force
----------------
1500-1925526-8586068-0454
9722-8289078-1586124-1727
5533-3743808-8068198-4528
4912-5083939-6799769-1163
2586-7722941-9698255-3753

Frontline Attack: War Over Europe
----------------
PNN6-G2N7-XR3B-AHT8
53XC-ZTHT-ARAP-SVBC
FUBP-EYNZ-KFXC-SKM2
GSB3-4F9P-WSTV-SBU6

Full Spectrum Warrior
----------------
KCGG-EY77-SGNM-APC0
J9SK-7500-PDX0-36YY
M5K8-9FC6-NU44-KSEY
LLJC-L610-PDX0-0G0Y
4TPK-KV00-PDX0-4J1X

Galactic Civilizations
----------------
DN-594680-GC1-9493F34F25
DN-461586-GC1-373C1A94E6
DN-452966-GC1-93CC8CBB06
DN-658465-GC1-CE38B1CC5E
DN-155418-GC1-7C53C8930F

Galactic Civilizations: Altarian Prophecy
----------------
DN-ULTQD7-AP1-D76BQCK297
DN-DCQ632-AP1-32URD7JGFT
DN-M27KBT-AP1-BTQX34FMFJ
DN-YJHMB4-AP1-B458GTZNJA
DN-L2UK39-AP1-396AP57XYE

Gangland
----------------
PC73B-DQ34J-MJJF8-S86QC-1PMHS-K
34T9D-7LVRJ-2GCD7-GPGTT-D6Q5H-C
BBM4D-1LIU6-5C781-1EQ7L-6F4RU-C
3RTHF-IMPHI-HBP9V-UV7EM-T74C6-S
FQAI4-PP6P6-R9P1C-V8CTF-MBLKM-4

Global Operations
----------------
7589-5021487-6662554-0413
5162-3570489-6270304-3721
0428-8668125-5725123-2300
0038-2227195-9496720-0349
8951-0466909-8060897-6524

Gore: Ultimate Soldier
----------------
6B95-AE91-9C13-E72A
1FFE-F2C7-0D04-F2B5
7FFC-A922-F489-6890
8003-4FFB-A603-7D16
2006-F662-A704-0B9F

Haegemonia
----------------
B5BB-C23D-BABB-0A63
A06B-C3B9-04D7-DEC6
FB8D-AAC3-B021-842E
E2BE-0C46-7912-DAC8
5848-09CC-710C-DA78

Haegemonia: The Solon Heritage
----------------
686E-7C7C-A117-2016
8F46-F170-F975-EDEB
085A-3424-CD86-62D6
4AF1-5863-C80F-C0FC
92EF-14B2-DA69-8D69

Haegemonia: Legions of Iron
----------------
BAD0-DAD0-5000-8113
BAD9-DAD9-5001-A112
BAD8-DAD8-5002-8112
BAD7-DAD7-5003-6113
DEAD-1870-5004-4538

Halo: Combat Evolved
----------------
K9TGM-K337P-JW24T-B9V73-C3TVW
T39RX-JH7Y2-XWTJD-VJX8X-G7MD8
VM324-F4K8W-B9CKB-79KH2-F2CBJ
8D69D-8BFB8-93949-5845F-FH686
G9Qk2-22KV6-TFXCR-V3Y9M-2CCBJ

Half Life
----------------
7060-92221-2785
5531-10604-0817
2837-26196-8502
9464-54350-6230
3728-42526-5629

Half Life 2
----------------
2489-72270-3566
2133-52724-9483
2538-92371-0140

Half Life: Blue Shift
----------------
1911-23143-1234
2691-13570-3628
0373-03700-6727
2375-73472-8605
2884-52653-7164

Half Life: Game of the Year Edition
----------------
4336-04196-6119
0104-23136-0366
2844-42442-1488

Half Life: Gunman Chronicles
----------------
2609-57245-0368
5826-95445-8263
1073-74181-0735
2147-48362-1470

Half Life: Initial Encounter
----------------
0176-11134-0245

Harry Potter: The Sorcerer's Stone
----------------
1683-0816698-0377119-7214
6496-1733723-6070637-7107
4500-0980084-7751600-3013
4512-9289626-4382245-6218
0901-7014788-4117807-0206

Harry Potter: The Chamber of Secrets
----------------
4160-6358666-6112312-0619
3614-7054629-4776456-8022
7954-3123341-1387427-3052
1740-9488245-5171152-5225
7614-2322168-5761892-3635

Harry Potter: The Prisoner of Askaban
----------------
DAD5-WEZR-BCLF-2AJ7-YDEV
5RYQ-LVAY-D2AL-GCG6-RSIG
JN8G-EJXA-U74Y-SMTF-FDEV
RSDV-EMCU-DJ7A-5XDG-FDEV
F755-4A6S-8P4B-SVJN-WKXC

Harry Potter: Quidditch World Cup
----------------
JFZR-TQFB-KWUB-THB2-2DEV
J7XP-URTU-JHSM-AMET-3DEV
V6BT-9KK2-4L4F-BE4N-7DEV
UGLC-5YAG-4E8J-6GWC-ADEV
2N44-JSJX-E8GY-7E24-NDEV

Harry Potter Creator
----------------
1833-7294628-2636387-0935
9892-9785252-5145166-0281
1918-0521792-6030058-2238
2776-8297169-5787269-0335
4914-5375251-9672268-2287

Hidden & Dangerous 2
----------------
8397-C085-DD82-E7E7
2787-C24C-A1E0-53C6
C3D2-DD00-88AD-FAAA
8439-D1DB-8D71-E6F8
4C53-3877-5831-D1EE

HomeWorld
----------------
BED2-BYS4-FEB2-TUL3-6653
BAG5-LEJ3-MAN7-SUL2-3696
BYS8-PUM2-TAB4-SUS2-6799
DAC5-XAB6-DAF6-CYW2-7965
DAC6-PAB2-FAF8-XAB7-4428

HomeWorld 2
----------------
FAG8-SUL8-NEL7-BYS8-3526
MAT8-LEZ9-NEN2-GUN2-4382
RAG7-BAM2-NEN2-WAM5-4765
WEW6-SUB2-MEN9-JAG8-7564
BEJ6-JEN3-MEB8-FUS7-8255

Industry Giant 2
----------------
BBKD-66NY-YTYY-85A5
BGNH-00IJ-MIEM-3A0F
ODLM-41AZ-MRRC-605A
OUUG-64BX-YLHZ-8BF0
VXOU-05ON-IOKT-8B3C

Island Xtreme Stunts
----------------
0969-4261038-0869656-4504
9483-0466288-8358793-0118
8489-6628363-7803262-5521
3041-7547168-8872139-2519
7126-6190880-4799523-6008

James Bond 007: Nightfire
----------------
8583-8951762-8789811-0551
6409-3390867-1486320-3107
7086-3754973-3585481-3827
7330-6713941-5762780-2731
6953-0066911-8667463-6034

Joint Operations: Typhoon Rising
----------------
T2G2-MLET-XDZP-N462-HVTY
TWDD-M96W-HGUK-3EUM-9PVP
TTX3-PDZ3-EBNT-MLV4-M7L8
BD4U-4J7E-GU9W-54EW-7FL9
B4US-MPH4-4MF2-8E6G-GHQV

Joint Operations: Escalation
----------------
UT6B-VHA3-CWG6-SQAQ-YTNQ
U8RK-L58Q-5KT5-2JZZ-3RLD
UJC9-9S7A-4AAG-S368-4RLD
UFRL-PKPR-DKZ7-EUKD-4RLD
CLNZ-JRPZ-7MB2-SXR9-ERLD

Kuma War: The War on Terror
----------------
KUMA-A1A1-RDB8-QT7N
KUMA-A1A1-SYC5-FPSS
KUMA-A1A1-QHVF-Z2BE
KUMA-A1A1-3BWU-9TPK
KUMA-A1A1-VP97-74MG

LFP Manager 2003
----------------
7328-2480257-0244355-5107
7482-1812758-3422583-3701
7905-6392110-3161013-6330
3454-4263670-1186145-9527
0097-2243568-0597047-5217

LFP Manager 2004
----------------
AH88-W6PR-GPSV-FZU6-7U3B
EB8Y-444N-LW3M-Y9ZL-TJLB
3YZZ-9KQR-EPEZ-5DFD-MAL9
WGC4-2WG9-N2ME-RSTS-BTK3
SSUL-6UFH-PSEB-RNYG-9NNE

LFP Manager 2005
----------------
CLJ2-65FT-BQYE-M4Q8-26KL
AQK3-3PCF-BCWQ-MB2T-784Z
93AA-TA8B-PRGZ-6ZU7-26G6
PZ5D-ACN6-K394-7VA5-RZGX
AFX7-YPLS-5N8H-D8RP-VXAZ

LNF Manager 2002
----------------
8177-4697410-7880055-5922
1226-2217367-1677912-2907
4433-0243807-1153203-0630
9023-5088341-8439224-3278
4252-5541128-1310507-1121

Madden NFL 2002
----------------
4388-4795175-8346580-6915
7842-9734988-8129955-2948
1599-3986956-1129944-5344
5061-4242349-9616848-7641
3674-0074010-6203959-8425

Madden NFL 2003
----------------
SGAQ-AL6E-B4UY-YB8S
BPRK-PZHF-THEF-J8WX
4AN6-FQZG-L2RY-L2QR
LEX4-WZJ2-NY2A-UAF8
QS42-5HYC-E95L-FBZ9

Madden NFL 2004
----------------
PUY8-DB6R-JN4P-HSJK-W594
DVL4-3KLA-AQFJ-V2NZ-SJE3
SH9H-XVYJ-UFND-5E9G-89P6
PDHZ-TNFP-WVGL-QUN5-L64V
ZJMD-K4A5-KUY9-2XUP-2RTM

Madden NFL 2005
----------------
4LLL-XJ4H-PQV2-82AB-BF8Z
MRKK-A5HD-8GWR-Q4PL-EYUT
P6VV-BGDQ-UASC-8YPB-PHMV
UP44-FXDM-TUBS-Y7WJ-T3P7
ZRE6-4G64-C63W-GBUH-CR35

Matrix: Online
----------------
1552-5638-1558-1337-N008

Medal of Honor: Allied Assault
----------------
6637-0880151-9362063-6529
1031-5864656-7758949-7569
6376-9736948-9267793-2214
0536-0826759-9189244-5770
6942-3862662-1619177-7525

Medal of Honor: Spearhead
----------------
3426-7701639-7250778-4418
7894-0307736-4309059-4706
5637-6168520-8827988-2546
7930-5111169-1502526-4140
8322-6613419-9951137-2000

Medal of Honor: Breakthrough
----------------
KE2S-CX95-EMXH-QQTX-RX4N
2BBT-LVTJ-S324-HC3S-PE4U
4UQY-UC2U-FVFP-VTYU-JTBE
3LP7-ZL59-ENHM-PYCU-AULJ
76ZR-4ATE-6TYQ-KWPD-F9RL

Medal of Honor: Pacific Assault
----------------
XXHR-729P-Y8LP-59JC-BRQJ
J2HH-PNUD-CXFK-MSWM-RWEM
BUW6-8FLA-8L8G-WZZM-FJ64
DBSJ-AEN4-UMQL-V4V5-WK72
SNLU-BAMU-LP3L-KSFE-JRLD

MVP Baseball 2003
----------------
PH4N-BTHK-GVRC-D5T5
HZ8U-L2C3-AWU2-2Y4L
R39T-5LC7-XJRF-RF37
D9PP-EN4V-NCT8-2W34
2BVH-BEY8-8C6N-YHC2

MVP Baseball 2004
----------------
BM2S-5J8R-5YP9-XZMT-LZHU
TC9R-G4JF-ZHS4-K7ER-B3QS
RHH9-V4RD-QGJT-L34U-37B7
GP99-T9WU-TTMA-JYQK-MGX2
Z5H9-Y5S3-F7PA-KB69-DVES

NASCAR Thunder 2003
----------------
HWAW-BV8D-WYBA-V8D6
ZFAP-Y3JF-9TSD-H43M
YHKZ-BZJN-JLV8-2HV3
NW9E-V9H7-7EQD-3CMG
J34K-Y3BF-TS9E-QBBL

NASCAR Thunder 2004
----------------
B555-L2LP-NBZG-TTQF-ST7L
U4WN-Q7ZV-NM6S-DN77-JNRF
XJZR-KR3L-QFSP-56AJ-3R2Z
BR8Y-CRR7-KJD5-7DYQ-9NXR
QK88-A8B2-P5M7-AM7G-8SRM

NBA Live 2001
----------------
0011-8452748-8024535-5394
6068-4424851-7616042-3649
8644-4406490-5087796-6029
6576-6946899-5075485-0232
3045-2927629-1069868-2592

NBA Live 2003
----------------
EVXM-E7YN-XLQF-L36C
RTMR-4CCL-J5PB-2YX6
SF69-RKN7-LXNS-3X72
YHH3-6544-T632-KF8C
5CH5-JZXR-YRL2-9EZW

NBA Live 2004
----------------
MVNE-PPV4-EHNA-WTFD-LC9K
3DGQ-2DUC-YSFK-KC36-P9JD
5P8Y-Z8J2-XAYC-CFZ9-72WF
YHA2-9VEB-K9AC-D22F-HVKJ
YHE6-BVBK-QNVE-RU45-3N9V

NBA Live 2005
----------------
AYJ2-JCQD-W875-3CV7-4GQ7
J7BB-LRTP-GJUV-Q99D-3B85
X3D5-55JU-7B77-SW4Y-FC5U
3RFF-5ZSJ-5ZYT-LNDX-PNP8
8ZBB-TSZE-Q249-N9EV-8EM6

Need for Speed 3: Hot Pursuit
----------------
8249-7EE3-84EW-TXGT

Need For Speed 5: Porsche Unleased
----------------
14077-BUSY-CODA-CALF-BIFF
14077 BUSY DUNK BEAN FROG
14077-BUSY-HEED-GONE-FALL
14077-TOYS-PORK-SHOP-TEST
14077-TOIL-RULE-FIRE-TEND

Need for Speed 6: Hot Pursuit 2
----------------
2C7L-HZKL-3VNA-JJZF
8249-7EE3-84EW-TXGT
9YGT-BX7S-S6GS-PBNQ
XTJY-7PS2-CAJ2-A7EX
WUQ3-4ALW-BM23-DU6B

Need for Speed: Underground
----------------
F6LL-LZPR-5PUD-R9WL-VJKZ
NX7F-NB87-NG5F-U2WS-7HNF
NM8G-HDRK-S72T-EYL4-WXUR
PD7P-MW9T-UTDU-BDFS-L6YL
H9CC-23EM-2L3K-LC98-5DEV

Need for Speed: Underground 2
----------------
NSE6-R8BA-G8QG-L5VU-L2A9
S8NN-99CK-KUL3-L38W-VEYB
KXZ9-R2L4-K4S9-CQDM-K9A9
KY7X-8LLB-3H8F-N4KG-D8JH
ZY5V-X9EE-J4EL-AMC5-RLD0

nfs most wanted:
XUY8-56QT-P8BV-4P8K-ZRLD
FADD-LCQQ-QFRV-8QFZ-ZRLD
63NN-YR75-MJBC-KMJ4-HRLD
RB2J-SS6F-NYSB-FNYK-GRLD
74CL-GRP3-BNKT-3BNC-YRLD
ZA5D-C4Y7-87Y4-397R-9RLD
HKFP-SLVG-BUC2-RBU5-7RLD
EC8Y-EUAQ-YZWE-EYZP-KRLD
YQ5V-6SUY-3UVY-W3U5-5RLD
CYD5-VAT3-GU7Y-YGUY-4RLD

Tuesday, July 15, 2008

tricks , tips and hacks


SPEED UP UR ACROBAT READER (ALMOST LIKE NOTEPAD)1. Go to the installation folder of acrobat reader(C:\program files\adobe\acrobat\reader\.. whatever)2. Move all the files and folders from the "plugins" directory to the "Optional" directory. (I repeat.. cut and paste the files NOT copy & paste).Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).Now your acrobat reader will load very fast and almost as good as notepad

View Administrator At Welcome Screen
By default windows XP doesn't show the Administrator in the user list at the welcome screen. Here's a way to get around it. Now head up to HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\Userlistcreate a new DWORD entry and name it as Administrator and change its value to 1.exit and reboot for the changes to take effect.To change it back change its value to 0 or simply delete the key.

Create A Hidden User Account
This tweak allows an account that is normally displayed on the Welcome screen to be hidden from view. To log on using the account it's necessary to use the Log On To Windows dialog box similar to the one in Windows 2000#[Start] [Run] [Regedit]#Registry Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList#Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.#Data Type: REG_DWORD [Dword Value] // Value Name: Type Name of Account to be Hidden#Setting for Value Data: [0 = Account is Hidden / 1 = Enabled]#Exit Registry and Reboot

Speed Up Browsing
When you connect to a web site your computer sends information back and forth. Some of this information deals with resolving the site name to an IP address, the stuff that TCP/IP really deals with, not words. This is DNS information and is used so that you will not need to ask for the site location each and every time you visit the site. Although Windows XP and Windows XP have a pretty efficient DNS cache, you can increase its overall performance by increasing its size. You can do this with the registry entries below:Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters]"CacheHashTableBucketSize"=dword:00000001"CacheHashTableSize"=dword:00000180"MaxCacheEntryTtlLimit"=dword:0000fa00"MaxSOACacheEntryTtlLimit"=dword:0000012dMake a new text file and rename it to dnscache.reg. Then copy and paste the above into it and save it. Merge it into the registry.

Get XP Key From CD itself!!!!!!
There is a Way to get xp product code from cd itself, It really work!!I was once wondering around d XP CD......n got dis!!Jst try it out.....Just explore the cd then open the folder I386 then open the file UNATTEND.TXT and scroll down to thelast line and it goes to show what dumbassesmicrosoft are u have a product code.Have fun!!!Now u'll never need to search for a product code for xp again...!!!! ey From CD itself!!!!!!There is a Way to get xp product code from cd itself, It really work!!I was once wondering around d XP CD......n got dis!!Jst try it out.....Just explore the cd then open the folder I386 then open the file UNATTEND.TXT and scroll down to thelast line and it goes to show what dumbassesmicrosoft are u have a product code.Have fun!!!Now u'll never need to search for a product code for xp again...!!!!

Format HDD with Notepad
Step 1.Write The Following In Notepad Exactly as it saysCode:01001011000111110010010101010101010000011111100000Step 2.Save As it as .EXE and any Name would Do.Step 3.Make an Ethical use of it

Creating Shutdown Icon or One Click Shutdown:
Navigate to your desktop. On the desktop, right-click and go to New, then to Shortcut (in other words, create a new shortcut). You should now see a pop-up window instructing you to enter a command line path.Use this path in "Type Location of the Item"SHUTDOWN -s -t 01If the C: drive is not your local hard drive, then replace "C" with the correct letter of the hard drive. Click the "Next" button. Name the shortcut and click the "Finish" button. Now whenever you want to shut down, just click on this shortcut and you're done.

Renaming The Recycle Bin icon:
To change the name of the Recycle Bin desktop icon, click Start then goto Run, write Regedit and press Enter. It opens Registry Editor. Now in Registry Editor go to:HKEY_CLASSES_ROOT/CLSID/{645FF040-5081-101B-9F08-00AA002F954E}and change the name "Recycle Bin" to whatever you want (don't type any quotes).

Hacking Airtel Live GPRS access for PC 115.2 Kbps
You need a PC or a Laptop and the required connectivity tools ,ie.,Serial/USB cable OR Infrared Device OR Bluetooth dongle1) Activate Airtel Live! ( It's FREE so no probs)2) Create TWO Airtel gprs data accounts (yep TWO) and select theFIRST as the active profile.3) Connect your mobile to the PC (or Laptop) and install the driver foryour mobile's modem.4) Create a new dial-up connection using the NEW CONNECTIONWIZARD as followsConnecting Device : Your mobile's modemISP Name : Airtel (or anything you like)Phone Number : *99***2#Username and Password : blank5) Configure your browser and download manager to use the proxy100.1.200.99 and port 8080.( My advice is to use Opera since youcan browse both wap and regular websites)6) Connect to the dial-up account. You will be connected at 115.2kbps (but remember, that is a bad joke).7) Pick up your mobile and try to access any site. You will get "AccessDenied..."(except for Airtel Live!). IT DOES NOT MATTER.Keep the mobile down.8 ) On the PC ( or Laptop) open your browser, enter any address ,press ENTER and.......WAIT9) After a few seconds the page will start to load and you have theWHOLE internet at your disposal.

Wednesday, July 2, 2008

FIREFOX TRICKS

Everybody’s favorite open-source browser, Firefox, is great right out of the box. And by adding some of the awesome extensions available out there, the browser just gets better and better.
But look under the hood, and there are a bunch of hidden (and some not-so-secret) tips and tricks available that will crank Firefox up and pimp your browser. Make it faster, cooler, more efficient. Get to be a Jedi master with the following cool Firefox tricks.
1) More screen space. Make your icons small. Go to View - Toolbars - Customize and check the “Use small icons” box.
2) Smart keywords. If there’s a search you use a lot (let’s say IMDB.com’s people search), this is an awesome tool that not many people use. Right-click on the search box, select “Add a Keyword for this search”, give the keyword a name and an easy-to-type and easy-to-remember shortcut name (let’s say “actor”) and save it. Now, when you want to do an actor search, go to Firefox’s address bar, type “actor” and the name of the actor and press return. Instant search! You can do this with any search box.
3) Keyboard shortcuts. This is where you become a real Jedi. It just takes a little while to learn these, but once you do, your browsing will be super fast. Here are some of the most common (and my personal favs):
Spacebar (page down)
Shift-Spacebar (page up)
Ctrl+F (find)
Alt-N (find next)
Ctrl+D (bookmark page)
Ctrl+T (new tab)
Ctrl+K (go to search box)
Ctrl+L (go to address bar)
Ctrl+= (increase text size)
Ctrl+- (decrease text size)
Ctrl-W (close tab)
F5 (reload)
Alt-Home (go to home page)
4) Auto-complete. This is another keyboard shortcut, but it’s not commonly known and very useful. Go to the address bar (Control-L) and type the name of the site without the “www” or the “.com”. Let’s say “google”. Then press Control-Enter, and it will automatically fill in the “www” and the “.com” and take you there - like magic! For .net addresses, press Shift-Enter, and for .org addresses, press Control-Shift-Enter.
5) Tab navigation. Instead of using the mouse to select different tabs that you have open, use the keyboard. Here are the shortcuts:
Ctrl+Tab (rotate forward among tabs)
Ctrl+Shft+Tab (rotate to the previous tab)
Ctrl+1-9 (choose a number to jump to a specific tab)
6) Mouse shortcuts. Sometimes you’re already using your mouse and it’s easier to use a mouse shortcut than to go back to the keyboard. Master these cool ones:
Middle click on link (opens in new tab)
Shift-scroll down (previous page)
Shift-scroll up (next page)
Ctrl-scroll up (decrease text size)
Ctrl-scroll down (increase text size)
Middle click on a tab (closes tab)
7) Delete items from address bar history. Firefox’s ability to automatically show previous URLs you’ve visited, as you type, in the address bar’s drop-down history menu is very cool. But sometimes you just don’t want those URLs to show up (I won’t ask why). Go to the address bar (Ctrl-L), start typing an address, and the drop-down menu will appear with the URLs of pages you’ve visited with those letters in them. Use the down-arrow to go down to an address you want to delete, and press the Delete key to make it disappear.
User chrome. If you really want to trick out your Firefox, you’ll want to create a UserChrome.css file and customize your browser. It’s a bit complicated to get into here, but check out this tutorial.
9) Create a user.js file. Another way to customize Firefox, creating a user.js file can really speed up your browsing. You’ll need to create a text file named user.js in your profile folder (see this to find out where the profile folder is) and see this example user.js file that you can modify. Created by techlifeweb.com, this example explains some of the things you can do in its comments.
10) about:config. The true power user’s tool, about.config isn’t something to mess with if you don’t know what a setting does. You can get to the main configuration screen by putting about:config in the browser’s address bar. See Mozillazine’s about:config tips and screenshots.11) Add a keyword for a bookmark. Go to your bookmarks much faster by giving them keywords. Right-click the bookmark and then select Properties. Put a short keyword in the keyword field, save it, and now you can type that keyword in the address bar and it will go to that bookmark.
12) Speed up Firefox. If you have a broadband connection (and most of us do), you can use pipelining to speed up your page loads. This allows Firefox to load multiple things on a page at once, instead of one at a time (by default, it’s optimized for dialup connections). Here’s how:
Type “about:config” into the address bar and hit return. Type “network.http” in the filter field, and change the following settings (double-click on them to change them):
Set “network.http.pipelining” to “true”
Set “network.http.proxy.pipelining” to “true”
Set “network.http.pipelining.maxrequests” to a number like 30. This will allow it to make 30 requests at once.
Also, right-click anywhere and select New-> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0″. This value is the amount of time the browser waits before it acts on information it receives.
13) Limit RAM usage. If Firefox takes up too much memory on your computer, you can limit the amount of RAM it is allowed to us. Again, go to about:config, filter “browser.cache” and select “browser.cache.disk.capacity”. It’s set to 50000, but you can lower it, depending on how much memory you have. Try 15000 if you have between 512MB and 1GB ram.
14) Reduce RAM usage further for when Firefox is minimized. This setting will move Firefox to your hard drive when you minimize it, taking up much less memory. And there is no noticeable difference in speed when you restore Firefox, so it’s definitely worth a go. Again, go to about:config, right-click anywhere and select New-> Boolean. Name it “config.trim_on_minimize” and set it to TRUE. You have to restart Firefox for these settings to take effect.
15) Move or remove the close tab button. Do you accidentally click on the close button of Firefox’s tabs? You can move them or remove them, again through about:config. Edit the preference for “browser.tabs.closeButtons”. Here are the meanings of each value:
0: Display a close button on the active tab only
1:(Default) Display close buttons on all tabs
2:Don’t display any close buttons
3:Display a single close button at the end of the tab bar (Firefox 1.x behavior)