Dec 7, 2008

*Enable the Administrator account on the Welcome Screen

Option 1: Download and install TweakUI from the Powertoys for Windows XP collection। In the Logon section, you can hide, or make visible, User accounts on the Welcome Screen.

Enable the Administrator account on the Welcome Screen

Option 1: Download and install TweakUI from the Powertoys for Windows XP collection. In the Logon section, you can hide, or make visible, User accounts on the Welcome Screen.

Option 2: Click Start, Run and enter REGEDIT Go to:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList (note that there is a space in the Windows NT). Right click in the right pane and select New, DWord value. Give the value the same name as the Username on the Welcome Screen (it must match) for the account you wish to hide/show. Double click the new value and set it to 1 to show the account on the Welcome Screen, or set it to 0 to hide the account.

Example: Doug is a user on the computer, Doug would be the name you give the new value.

*Disable the Windows XP Splash Screen

Ever wonder what's going on behind that splash screen? Well, now you can find out!

Right click My Computer, Properties, Advanced, Startup and Recovery, Edit. Edit BOOT.INI. Add "/SOS" right after "/fastdetect" with a space between. The line will look something like this:

multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetect /SOS. When you're finished. The first part, multi(0)..... may not be the same on your machine. Upon restarting, the splash screen will be gone. It can be re-enabled by removing the new switch.

*Control Programs That Run at Startup

The best way to prevent a program from running at Startup, is to check the program's own options for a way to prevent this। Most good quality programs will provide an option for this.

If you can't find the option there, click Start, Run and enter MSCONFIG. Go to the Startup tab, and uncheck the item there. This method is not always 100% successful. An example is a program that you do use, but you don't want running automatically. Some programs will check to see if the program's own options say it should run at Startup. If the program thinks its supposed to load at startup, it will re-create the autorun entry.

A small utility that can help you determine where things are loading from is Startup Programs Tracker, which can be downloaded here.

*How do I enable CD burning for Limited accounts?

This tip does not apply to Nero users; it is only for XP's built-in CD burning feature.

Allow limited users access to CD Burning:

To allow Limited User's to burn CD's, click Start, Run and enter REGEDIT. Go to:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon

Look in the right pane for AllocateDASD and double click the entry. Set the value to 2.

On PRO, this is exposed in Local Security Policy under Security Settings\Local Policies\Security Options

"Devices: Allowed to format and eject removable media"

For XP Pro, you can do this by clicking Start, Run and entering SECPOL.MSC

Go to Local Policies, Security Options, look in the right pane for Devices: Allowed to Format and eject removable media. Set this option to Administrators and Interactive Users

*Computer Slowed Down?

Computer Slowed Down?

Your registry may be corrupted. Check it now. Free download.

It was introduced to replace the text/ASCII based MS -DOS configuration (.BAT, .SYS) and MS Windows initialization (.INI) files.

Structure of Registry in windows 9X is Different from that of Windows NT,2000 and XP.

Windows 95/98/ME :In these operating systems Registry is stored in these 5 files, with the Hidden, Read-only attributes for write-protection purposes, usually located in the %WinDir% folder (default is C:\Windows) .

* SYSTEM.DAT = stores persistent hardware and software settings related to the system it resides on, contained in the (HKEY_CLASSES_ROOT = Windows 95 and 98 only) and HKEY_LOCAL_MACHINE Hive keys.
* USER.DAT = stores user specific and software settings contained in the HKEY_CURRENT_USER Hive key. If more than one user, then multiple user profiles enable each user to have their own separate USER.DAT file, located in %WinDir%\Profiles\%UserName%. When a user logs on, Windows OS (down)loads both USER.DAT files: the one from the local machine %WinDir% (global user settings), and the most recent one from the local machine %WinDir%\Profiles\%UserName%, or from the central (host) server if user profiles reside on a network (local user settings).
* CLASSES.DAT = stores persistent data contained in the HKEY_CLASSES_ROOT Hive key, found only on Windows ME.
* SYSTEM.DA0 and USER.DA0 = automatically created backups of SYSTEM.DAT and USER.DAT from the last successful Windows GUI startup, and found only on Windows 95

Windows NT/2000/XP :Registration Database is contained in these 5 files located in the %SystemRoot%\System32\Config folder (default is C:\Winnt\System32\Config for Windows NT/2000 or C:\Windows\System32\Config for Windows XP):

* DEFAULT = stores the HKEY_USERS\.Default key.
* SAM = stores the HKEY_LOCAL_MACHINE\Sam key.
* SECURITY = stores the HKEY_LOCAL_MACHINE\Security key.
* SOFTWARE = stores the HKEY_LOCAL_MACHINE\Software key.
* SYSTEM = stores the HKEY_LOCAL_MACHINE\System key and the HKEY_CURRENT_CONFIG Hive key,

these files located in the %SystemRoot%\Profiles\%UserName% folder:
* NTUSER.DAT and USRCLASS.DAT (Windows XP only) = store the HKEY_CURRENT_USER Hive key,

Editing Registry

Always make sure that you know what you are doing when changing the registry or else just one little mistake can crash the whole system. That's why it's always good to back it up!

To view the registry (or to back it up), you need to use the Registry Editor tool. There are two versions of Registry Editor:

:To modify the Registry, you need to use a Registry Editor:

* Regedit.exe (Windows 95/98/ME/NT/2000/XP) = located in %WinBootDir% (%SystemRoot%) has the most menu items and more choices for the menu items. You can search for keys and subkeys in the registry.
* Regedt32.exe (Windows NT/2000/XP) = located in %SystemRoot%\System32,enables you to search for strings, values, keys, and subkeys. This feature is useful if you want to find specific data.

Registry Structure

For ease of use, the Registry is divided into five separate structures that represent the Registry database in its entirety. These five groups are known as Keys, and are discussed below:

This registry key contains the configuration information for the user that is currently logged in. The users folders, screen colors, and control panel settings are stored here. This information is known as a User Profile.

In windowsNT 3.5x, user profiles were stored locally (by default) in the systemroot\system32\config directory. In NT4.0, they are stored in the systemroot\profiles directory. User-Specific information is kept there, as well as common, system wide user information.

This key contains configuration information particular to the computer. This information is stored in the systemroot\system32\config directory as persistent operating system files, with the exception of the volatile hardware key.

The information stored here is used to open the correct application when a file is opened by using Explorer and for Object Linking and Embedding. It is actually a window that reflects information from the HKEY_LOCAL_MACHINE\Software subkey.

The information contained in this key is to configure settings such as the software and device drivers to load or the display resolution to use. This key has a software and system subkeys, which keep track of configuration information.

REG Files

.REG file, which can be in:

* plain text/ASCII format in Windows 95/98/ME and NT/2000/XP or
* binary format in Windows 2000/XP.

Text .REG files can be easily viewed/created/edited by hand using any text/ASCII editor, like Notepad

Their purpose is to add, modify or delete Registry (Sub)Keys and/or Values.

Writing .Reg Files

1.) Header line: this FIRST line is mandatory. MUST contain only these exact words (case sensitive = character capitalization required!):

* REGEDIT4 = for Windows 95/98/ME and NT 4.0 or
* Windows Registry Editor Version 5.00 = for Windows 2000/XP.
This is the only way Windows OS can recognize, validate and run a .REG file.

2.) Empty (blank) line: this second line is optional. Similar to inserting a carriage return (CR).

3.) Remarked (comment) line(s): optional. MUST begin with a semicolon (;) which may be followed by a space (optional). May be inserted anywhere in the .REG file, but NOT before the header, which MUST be present as FIRST line.

4.)(Sub)Key line: MUST be preceded and terminated by square parenthesis ([]). (Sub)Key name MUST start with the Hive Key name (left end) and MUST contain entire Subkey pathway leading to the current Subkey name (right end). Consecutive (Sub)Key names MUST be separated by SINGLE backslash marks (\).
(Sub)Key names not present in the Registry will be automatically created when the REG file is merged into the Registry. Exception: new Hive (Root) Keys can be created ONLY in Windows NT4/2000/XP, but NOT in Windows 95/98/ME.

5.) Value line: MUST contain these elements in this exact order:

* Value name: MUST be preceded and terminated by quotation marks ("").
* Equal mark (=): separates Value name from Value type.
* Value type: MUST be specified (Dword [REG_DWORD], Binary [REG_BINARY], etc) if Value type other than String [REG_SZ].
* Colon mark (:): MUST exist if Value type other than String.
* Value data: MUST be in the same format as defined by Value type: text/ASCII, Unicode/ANSI, (alpha)numeric (decimal, hexadecimal or binary) etc. MUST be preceded and terminated by quotation marks ("") ONLY IF Value type is String.
Value Data syntax
o String Value [REG_SZ] (API Code 1):

Value Data is expressed here in Unicode or ANSI formats: simple text/ASCII, expanded or extended.

o Dword Value [REG_DWORD] (API Code 4):

Value Data is expressed here in Double WORD (4 bytes = 32 bits) formats: decimal, hexadecimal or binary.

o Large Binary (hex) Value (any Binary Value API Code):

"ValueName"=ValueType(API Code):ValueData,ValueData,\

Large Values can span onto more than one line. Each line (except the last one) is terminated by a comma (,) followed by a SINGLE backslash mark (\). Consecutive lines are separated by carriage returns (CR).

Separators and delimiters used in REG files on path name lines to separate drive letters, directory (folder) names and file names, or used on command line parameters lines etc... MUST be typed as DOUBLE backslash marks (\\).

6.) Empty (blank) line: this LAST line is mandatory for proper operation. Similar to inserting a carriage return (CR) at the end of file.

This is how a generic text/ASCII .REG file looks like:

; Comment line:
; String Value format:
; Dword or Binary Value format:

Example of actual .REG file:

; First Value below displays MS Windows version:
; String Value format:
"Version"="Windows ME"
; Dword Value format:
; Binary Value format:

Dec 6, 2008

*Computer Tricks Videos

How to open computer with out password?

How to create a fake virus!!
LOL!!! Great Prank.

Some great XP tricks.

Cool Windows XP trick.

Amazing Paint Trick for Windows

*Make Ultra Strong Passwords

A very good One from Irongeek.
Strong Article Worth Sharin

As some Microsoft Operating System geeks know, you can type many more characters than are on a standard keyboard by using the ALT+NUMPAD combination technique. For example, by holding down the ALT key, typing 234 on the number pad, then releasing ALT gives you the O character. I'm writing this article mostly because when I search around for information on the topic of ALT+Number key combos I find pages that are lacking in details. Most of the pages I found are coming from the angle of using ALT+NUMPAD combinations as shortcuts for typing in non-English languages, but I have another use for them. Using ALT+NUMPAD can make for some very ugly passwords to crack. These odd characters have two major advantages over normal keystrokes:

1. They are unlikely to be in someone's dictionary or brute force list. Try brute forcing a password like "ace of ?s" or "I am the a and the O".
2. Some hardware key loggers will not log these odd characters. Your mileage may vary on this as some key loggers can, so don't rely on it to keep you 100% safe.

I'll cover the 2nd point more in an upcoming article. Using ALT+NUMPAD to type odd characters into your password also has a few disadvantages.

1. The way they are described in this article only works in Microsoft Operating Systems (DOS, Windows 9x, Vista, XP, 2000), and there may be some variation amongst the different versions. If you know of a good way to do the same thing in Linux please email me.
2. Not all applications will let you use these odd characters. For testing I tried the password "Oÿ" (ALT+234 and ALT+0255) on a Windows XP local account,, but not all application will let you use these sorts of characters in your password.

Microsoft has the following to say on the subject of ALT+NUM key codes:


Alt+Numpad: A method of entering characters by typing in the character’s decimal code with the Numeric Pad keys (Num Lock turned on). In Windows:

• Alt+, where xxx is the decimal value of a code point, generates an OEM-encoded character.
• Alt+<0xxx>, where xxx is the decimal value of a code point, generates a Windows-encoded character.
• Alt+<+>+, where xxxx is the hexadecimal Unicode code point, generates a Unicode-encoded (UTF-16) character.

Shortly I'll explain explain the first two methods further. The 3rd is more problematic to work with. First, you may have to edit your registry and add a the REG_SZ value "HKEY_Current_User/Control Panel/Input Method/EnableHexNumpad", then set it to "1". Also, depending on where you are trying to type the character the application may interpret your hexadecimal Fs as attempts to bring down the file menu. Since method three is so problematic I'll focus on the first two methods.
First, make sure you are using the number pad and not the top roll number keys, only the number pad works for this. Second, make sure NUM LOCK is on. It does not have to be on in all cases for these key combos to work, but it helps by keeping the number pad from being misinterpreted.

The chart from the site shows the relevant key codes to get various symbols. The table on the left shows the OEM Extended ASCII character set (AKA: IBM PC Extended Character Set; Extended ASCII; High ASCII; 437 U.S. English). True ASCII is only 7 bit, so the range is 0 to 127. IBM extended it to 8 bits and added more characters. To type these characters you merely have to hold down an ALT key, type the numeric value of the character, then release the ALT key.

The table on the right shows the ANSI character set (AKA: Window's ANSI/ISO Latin-1/ANSI Extended ASCII, though technically they are not exactly the same thing.). To use the ANSI character set you do the same thing as the OEM set, but you preface the number with an extra zero. Notice that the first 127 should be the same in both sets, though values 0-31 may not be viewable in all cases. I've been in "character encoding hell" just trying to get this article on my site in a readable format.

For example, ALT+257 gives me a in Wordpad, but in Notepad it loops back around the character set and gives me?(257-256=1 which is ? in the OEM set) . If you want to know what key code will bring up a particular character in a certain Windows font run Windows Character Map (charmap.exe) and look in the bottom right corner to find out.

some examples :

ALT+130 é
ALT+131 â
ALT+132 ä
ALT+133 à
ALT+134 å
ALT+135 ç
ALT+136 ê
ALT+137 ë
ALT+138 è
ALT+139 ï
ALT+140 î
ALT+141 ì
ALT+142 Ä
ALT+143 Å
ALT+144 É
ALT+145 æ
ALT+146 Æ
ALT+147 ô
ALT+148 ö
ALT+149 ò
ALT+150 û
ALT+151 ù
ALT+152 ÿ
ALT+153 Ö
ALT+154 Ü
ALT+155 ¢
ALT+156 £
ALT+157 ¥
ALT+158 P
ALT+159 ƒ
ALT+160 á
ALT+161 í
ALT+162 ó
ALT+163 ú
ALT+164 ñ
ALT+165 Ñ
ALT+166 ª
ALT+167 º
ALT+168 ¿
ALT+169 ¬

Template by - Abul | Daya Earth Blogger Template