Sunday, April 27, 2008

Antivirus software is must-have protection. This review picks the best antivirus software based on its virus detection abilities, features, and breadth of protection. Whether you're seeking total system coverage or an ala carte solution, each of the following products provides superb virus protection for Windows-based PCs. Because every system is unique, evaluate several of these antivirus products to find the software best suited for your PC and your level of experience.

1. Avira Antivir Personal Edition Premium

AntiVir is a consistent leader in independent antivirus tests. Avira's AntiVir PersonalEdition Premium is a low-impact, easy to use virus scanner that also includes rootkit detection and phishing protection. Five euros of each purchase is automatically donated to the Auerbach Foundation, a non-profit that supports various charity and community-related services. AntiVir PersonalEdition Premium should be used in conjunction with a firewall.

2. Kaspersky Antivirus Personal

Kaspersky Anti-Virus Personal offers excellent antivirus protection, perhaps unsurpassed in its ability to unpack and scan compressed files - something that trips up a lot of other vendors. Should be used in conjunction with a firewall.

3. BitDefender Antivirus Plus

Softwin's BitDefender Professional protects against viruses, spyware, and instant messaging threats, as well as offering firewall rules to block undesirable traffic and a privacy gateway to keep your identity and preferences private while surfing the Internet.

4. McAfee VirusScan Plus

McAfee VirusScan Plus is an ideal candidate for those seeking an antivirus/firewall combination without all the bloat of traditional Internet security suites. McAfee VirusScan Plus makes an easy job of removing adware and spyware, something not all antivirus products deliver.

5. Panda Antivirus 2007

Panda Antivirus 2007 combines antivirus, antispyware, and antiphishing with its highly touted behavior-based TruPrevent Technology. License covers use on two computers and includes free tech support via email (telephone support options are also available.

6. F-PROT Antivirus

F-PROT Antivirus for Windows offers a feature that's increasingly harder to find - it includes a command-line scanner that can be used to create a rescue CD for scanning the system in Safe Mode. This is a particularly effective way to remove stubborn resuscitators. Firewall not included.

7. G Data AntiVirusKit(AVK)

AntiVirusKit (AVK) provides a double layer of protection, bundling two of the best antivirus engines - Kaspersky and BitDefender - under a single, easy-to-use console. Like Nod32, you'll also want to bolster G Data's AVK with a firewall.

8. AVG Anti-Malware

AVG Anti-Malware combines traditional virus protection with adware and spyware scanning, in a low impact footprint ideal for resource-strained PCs or those who just want the best performance possible out of their computers. Free tech support is available via email and the standard license includes two years of protection. Should be used in conjunction with a firewall.

9. Eset Nod32

Nod32 features a small footprint, low performance hit, and fast scan speeds, providing focused virus protection ideal for gamers or those with an older PC. Should be used in conjunction with a firewall.

Ways to Secure Windows XP

1. Turn on Automatic Updates in Windows XP

Automatic Updates is a Windows XP utility that allows your computer to download security updates from Microsoft automatically. Turning on Automatic Updates helps to secure your computer since you'll always have the latest critical security updates.

2. Turn on the Free Tirewall in Windows XP

If you have Service Pack 2 installed, you have a free firewall that you can use to protect your computer from attacks. However, you must turn the free firewall on.While the free firewall in Windows XP provides some protection,but its not enough.

3.Use Internet Explorer wisely

Internet Explorer 6 provides four zones for which you can establish seperate security settings. By using the four zones, you'll reduce your chances of being the victim of an attack when you inadvertently visit a malicious Web site.

4. Use Anti-Virus Software

Viruses can reak havoc on your computer. Protect yourself by using antivirus software. There are many antivirus programs to choose from, but the About Guide to Antivirus Software provides a list of the Top 7 Antivirus Programs for Windows.

5. Use Spyware and Adware Software

Spyware is software that allows companies to monitor what websites you visit or even access your computer. Adware is software that displays advertisements. Protect your computer by using spyware and adware software.

6. Be Careful What You Click On

Often, attackers must entice you to open an email attachment or visit their Web site in order to attack your computer. If you open the attachment or visit their site, malicious code is executed on your computer. To protect your computer, be careful what you click on.

7. Use Limited Accounts to Better Secure Your Windows XP Computer

It's harder for someone to attack your computer through the Internet if you're using a limited account. Learn why it's best to use limited accounts for daily use and how to create a limited account.

Monday, April 21, 2008


Now, two different but similar explanations can be given.

The first is that, after the ASCII-to-hex conversion of the string, Notepad rearranges the hex codes not according to ASCII standards, but to Unicode, and that messes it up. Here's the example:

Take "bush hid the facts". The hex codes (they can be seen with any hex editor you want to download) for the string are:

62 75 73 68 20 68 69 64 20 74 68 65 20 66 61 63 74 73

Arrange the codes to make up Unicode characters and you get:

7562 6873 6820 6964 7420 6568 6620 6163 7473

You'll notice that every code is hyperlinked. If you click on each one of them, you'll see that each one represents a Chinese (I think) "letter".

So this whole thing's cause is the coincidence that the 18 ASCII characters happen to represent 9 Unicode characters. And, of course, Windows' inability to determine the right encoding of the file.

The second explanation is slightly different, but the basics are the same: the difference between ASCII and Unicode. It's just a matter of Notepad defaults. You see, when you save the file, in the "Encoding" field, the default drop-down is set to ANSI. So, by default, Notepad saves as ANSI. But if you do a File -> Open, the default Encoding is set to Unicode. That's exactly what happens when you double click a saved file. Notepad knows the path, but not the Encoding. So it uses the default Unicode encoding, which spits the Chinese characters as explained above.

And that's about it. No easter eggs, no conspiracies, no Bush interventions. Just plain old Microsoft.

It is a bug in notepad.exe and it is called 4335 series bug.Means a line with 4 3 3 5 letter words will always pose the same problem..

Another amazing is not a bug..jus try this..
Did you know that the flight number of the plane that had hit WTC ...on9/11 was Q33N ....Open your Notepad in ur computer and type the flightnumber i.e "Q33N"... Increase the Font Size to 72, Change the Font toWingdings.
U will be amazed by the findings.

Simple way...just type:

*ur file name* filetype:torrent
You must not write ( * ) when you search....


smallville MPEG:torrent

You have lots of photos in some folder on your computer, all have numbers-names, and you want to name them like Holliday1.jpg, Holliday2.jpg, ... Don't need to do that one by one. You can do that automatically with this little trick.

Open that folder and chose View - Thumbnails

Left click on any picture and CTRL + A. That way you will select all files in that folder.

Right click on first pic and chose "Rename" from drop-down menu.

Windows XP will highlight name of that file and you will be able to name it. After filling the name, click somewhere outside, in white space. You're done. If you named firs file "Anything" all selected files will get names "Anything1", "Anything2", "Anything3", and so on.

1. start>run type in cmd

2. type shutdown -i

3. browse and shut it down !

Enjoy !

http:// & https://

HTTP is Hyper Text Transform Protocol and is transmitted over the wire via PORT 80(TCP). You use HTTP when you are browsing the web.

HTTPS (Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL) is a Web protocol developed by Netscape and built into its browser that encrypts and decrypts user page requests as well as the pages that are returned by the Web server. HTTPS is really just the use of Netscape's Secure Socket Layer (SSL) as a sublayer under its regular HTTP application layering. (HTTPS uses port 443 instead of HTTP port 80 in its interactions with the lower layer, TCP/IP.) SSL uses a 40-bit key size for the RC4 stream encryption algorithm, which is considered an adequate degree of encryption for commercial exchange.

Although it may be encrypted does not mean its safe, there are tools out there to decrypt the information being sent over the wire, although its more difficult to do so.

Here's a great tip to speed up your browsing of Windows XP machines. Its actually a fix to a bug installed as default in Windows 2000 that scans shared files for Scheduled Tasks. And it turns out that you can experience a delay as long as 30 seconds when you try to view shared files across a network because Windows 2000 is using the extra time to search the remote computer for any Scheduled Tasks. Note that though the fix is originally intended for only those affected, Windows 2000 users will experience that the actual browsing speed of both the Internet & Windows Explorers improve significantly after applying it since it doesn't search for Scheduled Tasks anymore. Here's how :

Open up the Registry and go to :

HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteComputer/NameSpace

Under that branch, select the key :


and delete it.

This is key that instructs Windows to search for Scheduled Tasks. If you like you may want to export the exact branch so that you can restore the key if necessary.

This fix is so effective that it doesn't require a reboot and you can almost immediately determine yourself how much it speeds up your browsing processes.

Wi-Fi Without Routers

Here is a short guide to help have the benefits of a wifi router without actually having it on Windows XP.


1. Go to Control Panel -> Network Connection.
2. Right click on Your Ethernet connection and click on “Properties”.
3. Go to “Advanced” Tab.
4. Check “Allow Other NEtwork….. Internet Connection”
5. In the Drop down Below select the Wifi connection of your pc. If it is disabled, it will be showing your wifi connection already.
6. Click on “Settings”
7. Check the protocols you need to share. Jamal has explained on them.I normally use only http and https.
8. Click on “Ok”.you reach the network connection page. The sharing part is now over.


1. Click on Start -> Run
2. Type in cmd in the Run prompt
3. In the new window type “ipconfig /all” and press enter.
4. Note down your DNS server ip address from the screen.


1. Go again to Control Panel -> network connections.
2. Right click on your WIFI connection and click “properties”.
3. Go to”Wireless Network” Tab.
4. The “use windows to configure my wireless network connection” should be checked.
5. In the preferred network connection section click on add button
6. Enter a name of your wish to the network name.
7. Network authentication is “open”
8. Change Data Encryption to “Disabled”
9. Check the “this is a computer to computer …. not used” connection.
10. Click “Ok”.
11. Click on general tab. select “internet protocol(tcp/ip) and click on properties button.
12. Now type in ip address, in subnet mask, leave default gateway empty.
13. Fill in the DNS server entry which you had noted down earlier.
14. Click on “OK” and your network is set.Your network should appear on the wifi network list now. Search for wlan on your phone. Connect and enjoy browsing on your phone.


Speed up ur browsing

For firefox users only*

Type "about:config" into the address bar and hit return.
Scroll down and look for the following entries:


* Alter the entries do as follows:
Set "network.http.pipelining" to "true"
Set "network.http.proxy.pipelining" to "true"
Set "network.http.pipelining.maxrequests" to some number like 30.

* Lastly right-click anywhere and select New-> Integer.Name it "nglayout.initialpaint.delay" and set its value to "0".

Saturday, April 19, 2008

If you remove a piece of hardware, particularly USB devices that may be frequently swapped out, without first Uninstalling it in Device Manager, the drivers remain behind, but the device no longer shows up in Device Manager by default.

Plug and Play, when it works, makes life simpler by automatically detecting and configuring new hardware as it is attached to the computer. With today's USB, smartcard and other removable media, it makes life much more efficient. But, while Windows is fairly good at detecting the hardware and installing the appropriate drivers, it is not so good at realizing that the device is gone and purging the drivers from the system.

If you actually right-click the device in Device Manager and select Uninstall, the device and its associated drivers will be removed. But, if you just remove the device, it will disappear from the Device Manager, but may leave the drivers behind. Those drivers, aside from taking up space, could later be found to contain vulnerabilities and expose your system to compromise even though you aren't aware the drivers exist.

With the device physically removed from the computer, the only way to view, and thereby have access to uninstalling, the drivers is to alter Device Manager to Show hidden devices. Follow the steps below to display the hidden device information:

1. Right-click My Computer and select Properties
2. Click on the Advanced tab
3. Click on Environment Variables
4. Below the bottom Environment Variables window pane (System Variables), click on New
5. For Variable Name, enter devmgr_show_nonpresent_devices
6. For Variable Value, enter 1
7. Click OK to close Environment Variables and OK again to close System Properties

Now that you have created this entry, when you open Device Manager, you can click on View and then select Show hidden devices from the menu. You can identify the hidden devices by their grayed-out icons.

This works in XP and Vista.

Wednesday, April 16, 2008

Voice and Speech Recognition

An easy software solution to enable you to control your computer, dictate emails and letters, and have the computer read documents back to you.

10 Reasons for Trying
e-Speaking's Software

1. Free Download of software
2. Over 100 commands built-in
3. Ability to add more commands
4. Runs in Windows2000 and WindowsXP
5. Small file size
6. Utilizes latest technologies from Microsoft
7. Seamlesly integrate with Office
8. Voice commands of Mouse events
9. Based on SAPI and .NET technologies
10. Easy to Use

What Is It?
Command and control your Window's computer through your voice. Operate your computer using a minimum of keystrokes or mouse clicks. If you want to move the cursor down one line, simply say: Down One. Want to check your emails? Simply say: Open Email. Add commands to open and control any Window's document or program.

What is Speech Recognition? What is Voice Recognition?]
These are exciting technologies that change the way you interact with your computer. Now you can speak to your computer and it can speak back. The speech that you and your computer exchange is scripted. In other words, you can't just ask your computer how he/she is feeling? Rather, you can talk to your computer using a set of pre-defined commands and instructions (i.e., a script). Your computer will respond in the same way (also using a scripted language). For example, you can say: "File Open", and the computer would respond: "Select the file". Or you can say: "Edit Find" and the computer would ask: "Find What?".

Why speak to your computer?
People have been speaking to each other for tens of thousands of years. Our brains have evolved to perform a fantastic and complex set of analyses of auditory input (i.e., sounds). Our brains convert the sounds we hear into conceptual ideas and thoughts which in turn form the basis of instructions, commands, information, and entertainment. Though the computer is just beginning its evolution in this area, most computers are capable of hearing your speech and acting on it. This is the promise of voice recognition technology today. Using speech to interact with your computer--both you speaking to your computer and your computer speaking back.

How Does It Work?
Utilizing Microsoft's Speech Application Program Interface (SAPI) and Microsoft's .NET Framework, we have developed a very small and efficient voice command and recognition application. SAPI and .NET are both required to use this software.

Dictation as Well?
Voice Dictation is integrated into the e-Speaking application including 26 different Dictation Voice Commands.

Why e-Speaking?
Our intent in developing this product was to suppliment your ability to command and control your computer through your voice. To enable you to have access to dictation software using Microsoft's SAPI speech engine. And to allow the computer to read documents and emails to you.

How Expensive is It?
It is Shareware. That means: You can download it and try it out for 30 days to see if you like it. The 30 day trial period is Free! That's right. You can download it with over 100 built-in commands and begin using it today at no cost. If you really like the program and want to use it beyond the first 30 days, the cost is $14.

Users Guide?
Access the on-line user's guide.
What is Speech Recognition?

Speech Recognition is a technology that allows the computer to identify and understand words spoken by a person using a microphone or telephone. The ultimate goal of the technology is to be able to produce a system that can recognize with 100% accuracy all words that are spoken by any person.

Even after years of research in this area, the best speech recognition software applications still cannot recognize speech with 100% accuracy. Some applications are able to recognize over 90% of words when spoken under specific constraints regarding content and previous training to recognize the speaker's speech characteristics.

Computer software that understands your speech enables you to have conversations with the computer. These conversations would include you and the computer speaking as commands or in response to events, input, or other feedback.

Speaking is easier and more intuitive than selecting buttons and menu items. Human speech has evolved over many thousands of years to become an efficient method of sharing information and giving instructions.

You can download this from e-speaking

Tuesday, April 15, 2008

Now send mails to anyone from any1's id..

have fun!

Check these links :


One Beep :
DRAM refresh failure
This may be due to - Bad memory chips
- A bad DMA Chip
- Bad memory addressing chips on the motherboard

Two Beeps :
Parity error or Parity Circuit failure
-Your memory may not be seated properly on the mother board.
-Unplug and plug it properly

Three Beeps :
Bad memory or bad mother board

Four beeps :
Timer failure in the RAM.

Five Beeps :
CPU chip may be dead

Six Beeps :
Keyboard controller may have failed

Seven beeps :
CPU is dead. Retry the connections and test.
-Replace the whole motherboard.

Eight Beeps :
Video card is missing or Bad.

Nine Beeps :
Damaged ROM BIOS.
-BIOS chip has to be replaced if it persists.

Ten Beeps :
CMOS shutdown.
-Replace CMOS memory and associated chips.

Eleven Beeps :
Cache memory test has failed.
-To enable cache memory try CTRL+ALT+SHIFT++.

One long Beep and Three short Beeps:
Memory failure

One long Beep and Eight short Beeps :
Video card failure.
-Try to install video card in another slot.

No Beeps :
Check Power supply
-Check mother board connections
-Remove all cards except video card and check for system power up
-Insert all cards one at a time and check their operation.
-If system hangs on the installation of a particular card, then it is the cause for the problem and replace it with another of that type and check

Strange, but true that some good programs are hidden in Windows XP !!!

Programs :

1. Private Character Editor :
Used for editing fonts,etc.

** start>>Run
** Now, type eudcedit

2. Dr. Watson :
This an inbuilt windows repairing software !

** start>>Run
** Now, type drwtsn32

3. Media Player 5.1 :
Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!

** start>>Run
** Now, type mplay32

4. iExpress :
Used to create Setups

You can create your own installers !

** start>>Run
** Now, type iexpress


Rapidshare hacking methods

Rapidshare Method 1

1.Delete the cookies in your browser(internet explorer or firefox or opera or whatever u use).

2.Press start->run,type cmd.

3.In the command prompt,type ipconfig/flushdns press enter.Then type ipconfig/release,then ipconfig/renew .Now type exit.

4.Now try downloading,for many people this may work if their ISP provides a dynamic ip.

Rapidshare Method 2

1.Just switch off your router(or modem) and switch it back on.

2.This may work for some users(Mtnl and Bsnl) and maybe some others too.

Actually these methods generally work for those people whose ISP gives them dynamic ip.

If these dont work then one more thing that can be done is to use proxies.

Rapidshare Method 3

1.Donwload the software Hide ip platinum from here
Hide IP platinum.

Password : .

2.Run it,then it will automatically chose a proxy(ip of a different country) for you.So you can easily download without any restrictions.You just have to change the proxy each time you download.

rapidshare Premium acc. Generator

Sunday, April 13, 2008

There are so many different ways to turn off your Windows XP computer, let's look at some of them:

1. The standard approach - click the Start Button with your mouse, then select the Turn Off menu and finally click the Turn Off icon on the Turn Off computer dialog. blink.gif

2. Press Ctrl+Esc key or the Win key and press u two times - the fastest approach.

3. Get the Shutdown utility from - it add the shut down shortcuts for you. Else create them yourself using approach 4.

4. Create a shutdown shortcut on your desktop. Right click on the desktop, choose New Shortcut and type shutdown -s -t 00 in the area where you are asked to specify the location of the program file. Now you can just double click this icon to turn off the computer. The best location would be your quick launch bar.

5. Press the Win key + R key to open the run window. Type shutdown -s -t 00. [s means shutdown while t means the duration after which you want to initiate the shutdown process].

If some open processes or application won't let you turn off, append a -f switch to force a shut down by closing all active processes.

6. Win+M to minimize all windows and then Alt+F4 to bring the Turn Off computer dialog.

7. Open Windows Task manager (by right clicking the Windows Task bar or Alt+Ctrl+Del) and choose Shut down from the menu. Useful when the Windows are not responding.

8. open task manager--->click on shutdown--->hold the ctrl key and click on Turn off::::::: pc will be turned off in 3 secs.. fastest method other than hard shutdown

Saturday, April 12, 2008

Google Search Tips !

You can make your search more efficient by learning some search basics !

Try these tips :
1. Use Of '+' sign :
This ensures that the results returned to you will definatly consist of the word following the '+' sign. For Eg :
Search: reviews of +iPhone and iPod
This will show results containing the word reviews or iPod but the results will definatly consist of iPhone !

2. Use Of '-' sign :
Using '-' sign before any word will ensure that the particular word will not be included in the results !

3. Use Of '~' sign :
Using '~' before any word will return the results also containing the synonyms of the word !

4. Search a particular site :
To search a particular website you can use the following syntax in the google search :
Search: abc
For Eg :
Search: site: Google Search Tips

5. Define a word :
To get the definition of a word just use :
Search: define:abc
For Eg : Search: define:Computer
This will return you results which define 'Computer'.

6. Find Pages similar to a page :
To find a page similar i.e. consisting of same type of content, use the following syntax :
Search: related:

7. Search for exact phrase :
To search a set of words exactly together i.e.
For Eg :
Search: "contact us"
This will return the results containing both contact and us together !

8. Using the wild card '*' :
The * sign can be used in places where the whole word is not known.
For Eg:
Search: friend*
This will return the results containing friend , friends , friendship.

9. Using the '?' sign :
This is used when the full spelling of the word is not known.
For Eg:
Search: fri??d
This will result that in the results in which any alphabet can take the place of '?' sign.

10. Use of boolean operators :
The boolean operators like AND,OR,NOT can be used in search box to connect the words !
The search engine understands them as what they mean but the must be in capital letters !
For Eg:
Search: swim OR float
This will return the results containing either swim or float !

Friday, April 11, 2008

Windows weak point

Point #1
For those of you using Windows, do the following:

1.) Open an empty notepad file
2.) Type "Bush hid the facts" (without the quotes)
3.) Save it as whatever you want.
4.) Close it, and re-open it.

is it just a really weird bug? :-??

Point #2

microsoft crazy facts

This is something pretty cool and neat...and unbelievable... At Microsoft the whole Team, including Bill Gates, couldn't answer why this happened!

It was discovered by a indian name is ome k . Try it out yourself...

Open Microsoft Word and type

=rand (200, 99)

And then press ENTER
then see the magic.....................

Point #3

someone discovered that nobody can create a FOLDER anywhere on the computer which can be named as "CON". This is something pretty cool...and unbelievable... At Microsoft the whole Team, couldn't answer why this happened!


The reason for not providing access for creating such folders is as when kernel is created in the file system. It creates aliases for each port and related IRQ status of the designated port. When we wanna make con or COM1 or LPT1. then a scaript which is turned on by the kernel of O/s. prevent or restict the user to create such keyword folders which are previously aliased by the kernel of O/S. thats the main reason. There can also be any other reason as con is already ment for copy con command to create a console bounded file in pre historic DOS. Grand Father of Current MS Windows and other members of this clan. So they are usually inheriting the same property for con (Specifically I am mentioning here con not about COM or LPT port). For them the previous reason is best as per my knowledge and workouts.

Thursday, April 10, 2008

How to clone a Hard Drive

Did know that you could clone your current Hard Drive without having to by extra software? Maybe you didn't know that all that you needed, was already set up on your current system? Well, it is... and if you follow this tut, you shouldn't have much of a problem.

Make sure that you have a Master and a Slave setup on your system. The Slave drive, in this case, is where all the data on the Master is going to go to.
First: Perform a Scandisk your Master drive and follow that with a thorough Defrag. If you have an Antivirus program, do a thorough sweep with the AV first, then do the Scandisk, followed by the Defrag.
Second: Do the same thing to the target drive, as you did the Master: Scandisk then a thorough Defrag.
Third: Right-click on the Target drive and click on Format. When the box comes up, click your mouse onto the "Full" button.
Fourth: After Formatting the Target drive, run a Scandisk again and click on the button that says "Autofix Errors".
Fifth: In this final part, you might want to cut-and-paste to code in, unless you are sure that you can do it without making any mistakes:
Click on the "Start" button, then click on the "Run..." button, then place the following into the Runbox:
"XCOPY C:\*.*D:\ /c/h/e/k/r" (minus the quotes, of course) then press the "Enter" button.
If you receive an error message, then remove the space from between XCOPY and C:\
Anything that should happen to come up in the DOS box, just click "Y" for "Yes". When its all finished, pull the original Master from the system, designate the Slave as the Master (change your jumpers), then check your new Master out.

Tuesday, April 8, 2008

disable any unnecassary services tat u dont use...

goto to control panel
>administrat tools
>below r usless for me so i disabled and can fell the difference..

Automatic Updates: This service enables Windows XP to check the Web
automatically for updates. If you don't want to use Automatic Updates, you can
disable the service.

Computer Browser: If your computer is not on a network, you don't need this service.
If you are on a network, leave it alone.

DHCP Client: If you are not on a network, you do not need this service. If you are on
a small workgroup, you can still increase boot time by configuring manual IP.
DNS Client: If you are not on a network, you do not need this service.
Error Reporting and Event Log: You don't have to use these services but they can be
very helpful, so I would leave them configured as automatic.

Fax: If you don't use your computer for fax services, you can disable this one.
Help and Support: Disable if you never use the Windows XP Help and Support
IMAPI CD-Burning COM: This service enables you to burn CDs on your computer.
If you never burn CDs, you can disable the service without any second thoughts.
Indexing Service: Your computer keeps an index of all the files. But if you rarely
search for files, the service is just a resource hog. You can stop it
Windows Firewall/Internet Connection Sharing: If you do not use these features, plz

Messenger: This service sends alert messages on a local area network (it is not the
same as Windows Messenger). If you are not on a network, you can disable this

Print Spooler: If you do not do any printing from the computer, you can disable this
service. If you print, make sure you leave it as automatic.

Run any of these applications: go to Start > Run and type the executable name (ie charmap).

Windows XP hidden apps:

1) Character Map = charmap.exe (very useful for finding unusual characters)

2) Disk Cleanup = cleanmgr.exe

3) Clipboard Viewer = clipbrd.exe (views contents of window$ clipboard)

4) Dr Watson = drwtsn32.exe (Troubleshooting tool)

5) DirectX diagnosis = dxdiag.exe (Diagnose & test DirectX, video & sound cards)

6) Private character editor = eudcedit.exe (allows creation or modification of characters)

7) IExpress Wizard = iexpress.exe (Create self-extracting / self-installing package)

Micro$oft Synchronization Manager = mobsync.exe (appears to allow synchronization of files on the network for when working offline. Apparently undocumented).

9) window$ Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).

10) ODBC Data Source Administrator = odbcad32.exe (something to do with databases)

11) Object Packager = packager.exe (to do with packaging objects for insertion in files, appears to have comprehensive help files).

12) System Monitor = perfmon.exe (very useful, highly configurable tool, tells you everything you ever wanted to know about any aspect of PC performance, for uber-geeks only )

13) Program Manager = progman.exe (Legacy window$ 3.x desktop shell).

14) Remote Access phone book = rasphone.exe (documentation is virtually non-existant).

15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the window$ Registry).

16) Network shared folder wizard = shrpubw.exe (creates shared folders on network).

17) File siganture verification tool = sigverif.exe

1Cool Volume Control = sndvol32.exe (I've included this for those people that lose it from the System Notification area).

19) System Configuration Editor = sysedit.exe (modify System.ini & Win.ini just like in Win98! ).

20) Syskey = syskey.exe (Secures XP Account database - use with care, it's virtually undocumented but it appears to encrypt all passwords, I'm not sure of the full implications).

21) Micro$oft Telnet Client = telnet.exe

22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the actions of drivers, might be useful for people having driver problems. Undocumented).

23) window$ for Workgroups Chat = winchat.exe (appears to be an old NT utility to allow chat sessions over a LAN, help files available).

24) System configuration = msconfig.exe (can use to control starup programs)

25) gpedit.msc used to manage group policies, and permissions..!

How to Access Locked Drives

goto registry

Hkeycurrent user>software>microsoft>windows>current version>policies>explorer>

in the right side u will see "NoViewOnDrive" set it to 0 and reboot

Converting NTFS to FAT32

Convert C: /FS:NTFS

"C" being the drive you wish to convert. Make sure there is a space between the C: and the foward slash (/). Once you press enter it will ask you for confirmation and press Y. Then press Y and enter once more to reboot.. This also works for windows XP Home.