Subscribe to our RSS Feeds
Welcome to my Place...
This blog is for those folks who are interested in computer tweaks..
Do it on your own risk !!, i am not responsible for any sort of misuse
All posts are tested, nothing fake over here.. If you like, comments on it..

✔ Remove Windows Genuine Advantage notification

A single easy step to disable Windows Genuine Advantage Notification..
1]Start> Run >type regedit
2] go to 'HKEY_LOCAL_MACHINE\ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Winlogon 
\ Notify
3] delete that Notify folder by right clicking on it..
4] Restart..

Done.. no more WGA notification !!
Wednesday, May 26, 2010

✔ How to remove Quick Heal from Registry?

"Quick Heal is One of the Best Antivirus & Internet Security Software."

Quick Heal trial version runs only for 30 days, after 30days goes all function scanning functions OFF but runs only Online Protection..

After evaluation period you can't turn ON all other protection.. so you need register and activate your account or uninstall quick heal from your PC.

Quick heal have one bug, that is when you uninstall quick heal from your computer then automatically clean its registry from your computer..
So you can use trial version again for 30 days.. means you can use quick heal for unlimited period..

(Removing Quick Heal from Registry is not necessary but then also if you are facing problem, remove it.)

Now i'll tell you how to remove quick heal and use it for one more month..

First: How to Remove or Uninstall Quick Heal from Your PC ?????

1] Go to Start> Control Panel
2] Control Panel> select Add or Remove Programs (hit Enter or Double click to open it)
3] Select Quick Heal Total Security from list..
4] Press Change/Remove button to remove Quick Heal from your PC..
5] Yes to Proceed
6] Select check mark for Remove report files
7] Restart your computer to completely remove quick heal (Restart is must)

After restart:

if in case you want to remove Quick Heal from your Registry follow these 3 steps:
Open registry editor and then
1] Start-> Run-> type 'regedit' (without Quotes)
and delete Complete Quick Heal Key..
2] HKEY_USERS > .DEFAULT > Software > Quick Heal and delete this key too..
3] HKEY_USERS > S-1-5-18> Software > Quick Heal and delete this key too.. Restart again

After that,

Run your Setup of Quick Heal form your PC or Download Latest version of Quick Heal from web to your PC.
Install Completely Quick Heal and it runs with all protection for 30 days again..
After 30 days do the same n use quick heal for 30 days again...

And if it is does not working at all.....
Use Torrent & Go For....

Quick Heal Total Security 2009 with Crack

& follow the proper instructions given :

Click start > Run
Type 'msconfig' and press enter
go to the startup tab
and uncheck all the programs related to Quick heal
then restart your computer
paste the crack in the Quick heal directory and patch it..

..Have Quick heal till death..

Thank You.....
:) .....Enjoy..... :)

Tuesday, May 25, 2010

✔ Increase/optimize your Hard Disk I/O - R/W speed..

If you like to increase/optimize your Hard Disk I/O - read/write speed without buying expensive software utilities to do that job or changing the HD, just follow next steps. With doing these steps you will increase Hard disk speed (depends of manufacture and specification, but its worth to try). The most speed improvement is visible with IDE drives; however there are reports that this tweak also does good for SCSI disks.

In any case, it won't harm your system, so try it yourself and let me know what you find!

Steps to be follow:-

1. Go to Run & type "sysedit" (without quotes) , press OK.
2. Expand the system.ini file window.
3. Scroll down almost to the end of the file untill you find a line called [386enh].
4. Press Enter to make one blank line, and in that line type
5. Irq14=4096 (note: This line IS CASE SENSITIVE, copy as it is)
6. Click on the File menu, then choose Save.
7. Close SYSEDIT and reboot your computer.
8. Restart windows!

The speed improvement will be noticed just after the system reboots, any system info. software can be used to check the improvement.
Monday, May 24, 2010

✔ Command Prompt Tricks

Useful Things to do on CMD!First, open your Network Connection and right click and select Properties. Then Select TCP/IP and click on Properties again. Now Click on Advanced and WINS tab. Select Default for NeBIOS.

Now back to the main Local Area Connection window, select File and Print Sharing for Mic*ft Networks and hit enter.........

This is just to make sure you have NetBIOS enabled. We will have some fun with NetBIOS on CMD.
First thing you need to know is some very helpfull commands to use on CMD(Command Prompt).
In case you don't know how to get CMD open in your box, then click on Start, then Run, then type "cmd" (no quotes, off course... you know the drill).

Back to commands:
net view
net use
net user

1) ping : This command will allow you to know if the host you pinging is alive, which means if it is up at the time of executing the "ping" x.x.x.x (x is the IP address)
ping ( is the website you want to ping, but you don't know the IP)
OBS: Keep in mind that if the host you pinging is blocking ICMP packets, then the result will be host down.

2) nslookup : This command has many functionalities.One is for resolving DNS into IP.Lets say you know the website URL but you don't know its IP(and you want to find out).
nslookup ( is the website you want to find out the IP)Now, another really nice function of nslookup is to find out IP of specific Mail Severs
nslookup (enter)
set type=mx (enter)
This command will give you the mail server IP of You can use whatever server you want and if it is listed on DNS, then you get the IP. Simple, isn't it?
OK, now why would you want to have an IP of a mail server?
To send spoofed mail to your friends or even for SE.In case you looking for "How to spoof email", then look for my "How to spoof email tutorial"

3) tracert : This command will give you the hops that a packet will travel to reach its final destination.
OBS: This command is good to know the route a packet takes before it goes to the target box.tracert x.x.x.x (x is the IP address)
tracert ( is the website you don't know the IP)

4) arp : This command will show you the arp table. This is good to know if someone is doing arp poisoning in your LAN. E.g. arp -a

5) route : This command will show you the routing table, gateway, interface and metric.Code:route print

6) ipconfig : This command will show tons of very helpful things.
Your IP, gateway, dns in use.
:ipconfig /all
this command will give all that info but for all networks you might have it.
Also, in case you have a dynamic IP and want to change it, then type...Code:ipconfig /release (this will release your IP)ipconfig /renew (this will renew your iP)
OBS: Keep in mind that those commands will change your IP, but the new IP will still be tighed up to you. So don't do anything stupid.

7) netstat : This command will show you connection to your box.
netstat -a (this will show you all the listening ports and connection with DNS names)
netstat -n (this will show you all the open connection with IP addresses)
netstat -an (this will combined both of the above)
net view x.x.x.x or computername (will list the available sharing folders on the target box)

Now some hints:
net use \ipaddressipc$ "" /user:administrator
(this command will allow you to connect to the target box as administrator)
Now if you want to connect to the target box and browse the entire C drive, then use this command:
Code:net use K: \computernameC$
(this will create a virtual drive on your "my computer" folder)
OBS: Keep in mind that this will only works if the target box doesn't have an administrator password set.
And least but not last, the "help" command.
Quote:whatevercommand /help
Quote:whatevercommand /?
This command will help you to understand what it does and all the switchs available for each command.Very useful if you know the command, but forgot the right switch.
Sunday, May 23, 2010

✔ Increase BROADBAND Speed

This is for broadband connections, though it might work for dial up.
(i tried in hathway & mtnl network..... it works well)

· Make sure your logged on as actually "Administrator".
· Start->Run->type gpedit.msc
· Expand the "Computer configuration" branch.
· Expand the "Administrative Templates" branch.
· Expand the "Network Branch".
· Highlight the "QoS Packet Scheduler" in left window.
· In right window double-click the "Limit Reservable Bandwidth" setting.
· On setting tab check the "Enabled" item.
· Where it says "Bandwidth limit %" change it to read 0.
Effect is immediate on some systems, some need to re-boot. This is more of a "counter
what XP does" thing. In other words, programs can request up to 20% of the bandwidth be
reserved for them, even with QoS disabled
Sunday, May 23, 2010

✔ Turn Off Autoplay of CD/DVD or external drive

How can you stop Windows XP from launching Program in CD/DVD drive or external drive?

· Click Start, click Run, type GPEDIT.MSC to open Group Policy in the Microsoft
Management Console.
· Double-click Computer Configuration, double-click Administrative templates,
double-click System, and then click Turn off autoplay.
· The instructions on your screen describe how to configure this setting. Click
Properties to display the setting dialog.
· Click Enabled, and choose CD-ROM drives, then click OK, to stop CD autoplay.
(This setting does not prevent Autoplay for music CDs).
· or Click Enabled, and choose All drives, then click OK, to stop autoplay of all drive(include CD/DVD & all external) like pen drive.


Sunday, May 23, 2010

✔ Change The Default Location For Installing Apps


(If you don't want to take risk about registry then Back up Your Registry before editing it.)
As the size of hard drives increase, more people are using partitions to separate and store groups of files.

XP uses the "C:\Program Files\" directory as the default base directory into which new programs are installed. However, you can change the default installation drive and/ or directory by using a Registry hack.

Click Start->Run, type regedit to open registry editor and go to

HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion

Look for the value named ProgramFilesDir. by default, this value will be "C:\Program Files\". Edit the value to any valid drive or folder and XP will use that new location as the default installation directory for new programs.

Note: This information is just for your knowledge... I recommend you to keep default directory only for your convenience (because i know you are more familiar with default directory) .. Even if you change it, it wont affect you or your system..
Saturday, May 22, 2010

✔ How to Back Up the Registry..


Before you edit the registry, export the keys in the registry that you plan to edit, or back up the whole registry. If a problem occurs, you can then follow the steps how-to restore the registry to its previous state.

● How to Export Registry Keys

Click Start then Run(or simply "winKey+R").

In the Open box, type "regedit", and then click OK.

On the File menu, click Export.

In the Save in box, select the boxs at the bottom the bottom according to weather you want to export all or only selected branches of the registry.

Next select a location in which to save the backup .reg file. In the File name box, type a file name, and then click Save.
 ● How to Restore the Registry

To restore registry keys that you exported, Simply double-click the .reg file that you saved. or 

You can use Import Option in file menu.
Thursday, May 20, 2010

✔ Make invisible folder

Folder will be there but it will be invisible........... ha ha ha

You can make folder invisible , it means you won't see it...but your Double Click on that folder area will open it..... Great trick to hide folder from other users which are not more familiar with computer !!

Its Very Simple..
follow the Simple Steps..
1) Make new folder anywhere by right clicking in open area, select New, then select Folder
2) Right click and rename it. To rename, press "alt + 0160" (press down alt button > press 0160 > then leave alt button..) . Then press "Enter"
3) This folder won't hav any name...ok
4) Then right click on that folder, select "Properties", select "Customize" tab, click on "Change Icon..."
5) It will take you to this window
select Blank space in it as shown in above picture and press OK
Here you go.....
Thats it!!
The folder will be invisible......
But how will you open this invisible folder?????

Don't Worry.. Double Click on invisible folder area.. That Folder window will get
Wednesday, May 19, 2010

✔ Firefox Speed Tweaks

Yes, firefox is already pretty damn fast but did you know that you can tweak it and improve the speed even more?

That's the beauty of this program being open source.
Here's what you do:
In the URL bar, type “about:config” and press enter. This will bring up the configuration “menu” where you can change the parameters of Firefox.

Note that these are what I’ve found to REALLY speed up my Firefox significantly - and these settings seem to be common among everybody else as well. But these settings are optimized for broadband connections - I mean with as much concurrent requests we’re going to open up with pipelining… lol… you’d better have a big connection.

Double Click on the following settins and put in the numbers below - for the true / false booleans - they’ll change when you double click.

browser.tabs.showSingleWindowModePrefs – true
network.http.max-connections – 60
network.http.max-connections-per-server – 32
network.http.max-persistent-connections-per-proxy – 16
network.http.max-persistent-connections-per-server – 8
network.http.pipelining – true
network.http.pipelining.maxrequests – 100
network.http.proxy.pipelining – true
network.http.request.timeout – 300
network.http.pipelining boolean -true

One more thing… Right-click somewhere on that screen and add a NEW -> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0”. This value is the amount of time the browser waits before it acts on information it receives. Since you’re broadband - it shouldn’t have to wait.

Now you should notice you’re loading pages MUCH faster now!
Tuesday, May 18, 2010

✔ Create Your Own Logon Message

(If you don't want to take risk about registry then Back up Your Registry before editing it.)

Want to see a custom message when you or someone else on your network logs onto your Windows box ?
If yes, then follow these steps:

1. Click on the Start button then select Run.
2. Type in 'regedit' and press OK
2. Look for the follow key:

HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon

3. Right-click on 'LegalNoticeCaption', select 'Modify' and type in the Caption you'd like to appear when you log in.That text will Show you in title bar of message.

3. Then Right-click on 'LegalNoticeText', select 'Modify' and type in the Text you'd like to appear in that box.
5. Close regedit and reboot your computer

Your new message will appear at every logon,After system loading & right before the Welcome screen.
After pressing OK button of message, Computer will start..

Thats it!!
Tuesday, May 18, 2010

✔ Change your Hard Drive's Icon

This is what i did on ma PC..
Example (Screenshot),

(If you don't want to take risk about registry then Back up Your Registry before editing it.)
If you want change the boring icon of your hard drive to some other icon of your own choice, then here are ways to do so.

☛ The First & Simple Option using the Registry. but Its more simple than below two options. 
Click on the Start button and select Run. Type in 'regedit' and press OK. Look for the following key:

HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer

In the right pane right-click on an empty space and select 'New->Key'. Name the new key 'DriveIcons'. Now create another new key and name it 'C' or the letter of the drive you are changing. Now, create one last key and name it 'DefaultIcon'. And finally, right click on the 'Default' key in the right pane and select 'Modify'. Insert the full path with icon name (e.g. D:\Pictures\Icons\heart.ico ). Immediately icon will get change, if not Restart your computer and your hard drive icon should now be changed..

[ C:\WINDOWS\system32\mshearts.exe  - path of Heart Icon (actually its .exe) already there in your system, i put this on ma friend's PC n it WORKS !! ]

☛ The Second Option is to create an .inf file, but its little-bit difficult.

First you must find the icon you want to use then the icon's index number. To find the index number, right-click on any shortcut on your Desktop (except for folders) and select 'Properties'. Click on the 'Change Icon' button then click on the 'Browse' button and look for the icon you want to use. Now count all of the icons with the first icon being number zero. Count each row from top to bottom then work your way to the right counting each row. The number you end at will be your index number. Now click on the 'Cancel' button twice to exit the windows so you actually change the icon for that shortcut. Now open Notepad and copy these lines into it:


Change 'C:\WINDOWS\SYSTEM\SHELL32.DLL' to where your icon is located and change '23' to your icon's index number. Now save the file as 'autorun.inf' to the 'C:\' folder. Restart your computer and your hard drive icon should now be changed.

☛ The Third Option also requires using the Registry, but its little-bit difficult than first option. 

Click on the Start button and select Run. Type in 'regedit' and press OK. Look for the following key:

HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer

In the right pane right-click on an empty space and select 'New->Key'. Name the new key 'DriveIcons'. Now create another new key and name it 'C' or the letter of the drive you are changing. Now, create one last key and name it 'DefaultIcon'. And finally, right click on the 'Default' key in the right pane and select 'Modify'. Insert the full path and name where your icon is located followed by a comma then the icon's index number (no spaces). Restart your computer and your hard drive icon should now be changed.

Thats it!!
Tuesday, May 18, 2010

✔ Remove Items from the Add/Remove list

(If you don't want to take risk about registry then Back up Your Registry before editing it.)
If you share your computer with other people in your house and they have a habit of uninstalling programs from the Add/Remove list, or you don't want them seeing what is installed on your computer, you can take out any program from the list without actually uninstalling it. Just follow these steps.

1. Click on your Start button, select Run and type in "regedit" (without quotes).
2. Look for this key:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Uninstall
3. Look for the program you want to hide under the Uninstall subkey and highlight it (If you see all numbers and letters, highlight that key and look in the right pane for the programs name).
4. Select Export from the File menu and select a name and location for the .reg file that will be created.
5. Now delete the program under the Uninstall subkey.

If you ever decide to uninstall a program, simply double-click on the .reg file to restore the uninstall data then launch the Add/Remove Programs.
Tuesday, May 18, 2010

✔ Secure/hide folders without any software -1

Secure/hide folders without any software(Great trick ever)
This tip is very helpful to hide and secure your personal data from other users, particularly on your home computer. You can use third party softwares but at times they can be costly. There is a way to hide your folders using the built-in Windows (XP, 2003, Vista) Attrib commands option. With the Attrib command, you can change the attributes of a folder (Read only, Hidden and System attributes) and safeguard your data.

Follow the given steps to edit the folders attributes to secure your data:

1. Create a folder that you want to hide on any computer drive. (For example, you have created a folder on D drive with the name 'Data'.
2. Click on Start button and type cmd in the Run box then press OK. button to display the Windows Command Prompt,
3. Now type the command "attrib +s +h D:\Data" (without quotes) and press Enter button to execute it

This command will hide your "Data" folder from D drive and now you can verify it.

This is a Great trick ever, as Any one cannot unhide this folder using the Windows 
"Show hidden files and folders" option also.

When you want to unhide this folder,
Open command prompt and type the command "attrib -s -h D:\Data" (without quotes) and press Enter button. If you want to hide some files, then simply move them to this 'Data' folder.

Note: To enable this feature, you will need to be logged into your computer with administrative rights.
Tuesday, May 18, 2010

✔ Auto Logon in XP

Auto Logon in XP (changing Password without remembering old password)

Would you ever like to login in Windows without putting in login details ?? Well, if you are the administrator of your computer then you can force a user to login without putting in the login details. You can easily save some time by skipping the login screen completely, and coming directly to the desktop.

For automatically Login to XP just follow these steps ..

1. Click Start, click Run, and type control userpasswords2" (without quotes)
2. You will see a new Window, now in that window, Untick “Users must enter a user name and password to use this computer”.
3. Click OK, and the you will see a new window asking you to type in the username and password with default username as Administrator.
4. There you can put in the username you want to specify and put in the login details, click OK, and thats it, you are done with this.

This was so simple. Do try that if you are having different user accounts on a single computer, you can type in the guest account login details as well.
Tuesday, May 18, 2010

✔ Creating a Shutdown/Reboot/LogOff Icon

Windows XP has a program called SHUTDOWN.EXE which allows you to easily create icons to shutdown or restart your computer.
To create a shutdown shortcut on the desktop:

1. Right click on an open area of the desktop
2. Select New -> Shortcut
3. Enter in "shutdown -s -t 00" (without quotes)
[ 00- indicate the time (sec.),, e.g. 05- will shutdown PC after 5 sec.]
4. Press the Next button
5. For the name, enter in anything you like. I just use shutdown. Click on the Finish button.

To create a Restart shortcut on the desktop:
follow the above same procedure just little-bit change is,
For a reboot/restart icon, enter "shutdown -r -t 00" (without quotes)

To create a LogOff shortcut on the desktop:
follow the above same procedure just little-bit change is, 
For a reboot/restart icon, enter "shutdown -l -t 00" (without quotes)

Syntax is :-

"Shutdown [{-l/-s/-r/-a}] [-f] [-m[\\ComputerName]] [-t xx] [-c "message"] [-d[u][p]:xx:yy]" 
(without quotes/brackets)

-l - Logs off the current user, this is also the defualt. -m ComputerName takes precedence.
-s - Shuts down the local computer.
-r - Reboots after shutdown.
-a - Aborts shutdown. Ignores other parameters, except -l and ComputerName. You can only use -a during the time-out period.
-f - Forces running applications to close.
-m [\\ComputerName] - Specifies the computer that you want to shut down.
-t xx - Sets the timer for system shutdown in xx seconds. The default is 20 seconds.
-c "message" - Specifies a message to be displayed in the Message area of the System Shutdown window. You can use a maximum of 127 characters. Here, You must enclose the message in quotation
marks (It's mandatory).

(e.g. shutdown -s -t 60 -c "bye, windows is shutting down in one minute" )
Thats it!
Use this icon to easily shut down/reboot your windows with a click of a button..
Tuesday, May 18, 2010

✔ Add Items to the "Send To" Menu in Windows XP

When you right click a file or a folder, you see a 'Send To' menu in the right click menu. This menu makes the task of transferring files from one place to another easy and without opening the destination folder. By using the Send To command, you can quickly send a file to different locations including a floppy disk, your desktop, another person using e-mail, or the My Documents folder. The SendTo folder contains the shortcuts for the destinations that are displayed on the Send To menu. Every user on the computer has a SendTo folder and can customize its contents.

By default, the Send To menu in Windows XP lists the following commands (destinations):
• Compressed (zipped) Folder
• Desktop (create shortcut)
• Mail Recipient
• My Documents
• 3 ½ Floppy (A:)
• DVD/CD-RW Drive (F:)

To add a destination to the Send To menu, you must add a shortcut to the SendTo folder. To do this, follow these steps:
1. Click Start, and then click Run.
2. In the Open box, type "sendto" (without quots), and then click OK.
3. "SendTo folder" will get execute.
4. Add a destination by doing one of the following:

If u want any folder (eg. "songs") or drive( eg. "Local Disk (D)" ) to be added in
"SendTo menu" then create shortcut of that folder or drive by right clicking on it..
(Folder shortcut will create shortcut thereself only.. & Drive Shortcut will be created shortcut on desktop directly..)
After that Cut & paste that shortcut in to "SendTo folder"


Point to New on the File menu & then click Shortcut ( and put address of the destination ).

Thats it !! it is displayed on the "SendTo menu".

To delete a destination from the "SendTo menu", just delete that shortcut file from the "SendTo folder".
Plezz leave Comments on it
Monday, May 17, 2010

✔ Computer Acronyms


--- A ---
ADSL - Asymmetric Digital Subscriber Line
AGP - Accelerated Graphics Port
ALI - Acer Labs, Incorporated
ALU - Arithmetic Logic Unit
AMD - Advanced Micro Devices
APC - American Power Conversion
ASIC - Application Specific Integrated Circuit
ASPI - Advanced SCSI Programming Interface
AT - Advanced Technology
ATI - ATI Technologies Inc.
ATX - Advanced Technology Extended
ASCII - American Standard Code for Information Interchange

--- B ---
BFG - BFG Technologies
BIOS - Basic Input Output System
BNC - Barrel Nut Connector

--- C ---
CAS - Column Address Signal
CD - Compact Disk
CDR - Compact Disk Recorder
CDRW - Compact Disk Re-Writer
CD-ROM - Compact Disk - Read Only Memory
CFM - Cubic Feet per Minute (ft�/min)
CMOS - Complementary Metal Oxide Semiconductor
CPU - Central Processing Unit
CTX - CTX Technology Corporation (Commited to Excellence)

--- D ---
DDR - Double Data Rate
DDR-SDRAM - Double Data Rate - Synchronous Dynamic Random Access Memory
DFI - DFI Inc. (Design for Innovation)
DIMM - Dual Inline Memory Module
DRAM - Dynamic Random Access Memory
DPI - Dots Per Inch
DVD - Digital Versatile Disc
DVD-RAM - Digital Versatile Disk - Random Access Memory

--- E ---
ECC - Error Correction Code
ECS - Elitegroup Computer Systems
EDO - Extended Data Out
EEPROM - Electrically Erasable Programmable Read-Only Memory
EPROM - Erasable Programmable Read-Only Memory
EVGA - EVGA Corporation

--- F ---
FC-PGA - Flip Chip Pin Grid Array
FDC - Floppy Disk Controller
FDD - Floppy Disk Drive
FPS - Frame Per Second
FPU - Floating Point Unit
FSAA - Full Screen Anti-Aliasing
FS - For Sale
FSB - Front Side Bus

--- G ---
GB - Gigabytes
GBps - Gigabytes per second or Gigabits per second
GDI - Graphical Device Interface
GHz - GigaHertz

--- H ---
HDD - Hard Disk Drive
HIS - Hightech Information System Limited
HP - Hewlett-Packard Development Company
HSF - Heatsink-Fan

--- I ---
IBM - International Business Machines Corporation
IC - Integrated Circuit
IDE - Integrated Drive Electronics
IFS- Item for Sale
IRQ - Interrupt Request
ISA - Industry Standard Architecture
ISO - International Standards Organization

--- J ---
JBL - JBL (Jame B. Lansing) Speakers
JVC - JVC Company of America

--- K ---
Kbps - Kilobits Per Second
KBps - KiloBytes per second

--- L ---
LG - LG Electronics
LAN - Local Are Network
LCD - Liquid Crystal Display
LDT - Lightning Data Transport
LED - Light Emitting Diode

--- M ---
MAC - Media Access Control
MB � MotherBoard or Megabyte
MBps - Megabytes Per Second
Mbps - Megabits Per Second or Megabits Per Second
MHz - MegaHertz
MIPS - Million Instructions Per Second
MMX - Multi-Media Extensions
MSI - Micro Star International

--- N ---
NAS - Network Attached Storage
NAT - Network Address Translation
NEC - NEC Corporation
NIC - Network Interface Card

--- O ---
OC - Overclock (Over Clock)
OCZ - OCZ Technology
OEM - Original Equipment Manufacturer

--- P ---
PC - Personal Computer
PCB - Printed Circuit Board
PCI - Peripheral Component Interconnect
PDA - Personal Digital Assistant
PCMCIA - Peripheral Component Microchannel Interconnect Architecture
PGA - Professional Graphics Array
PLD - Programmable Logic Device
PM - Private Message / Private Messaging
PnP - Plug 'n Play
PNY - PNY Technology
POST - Power On Self Test
PPPoA - Point-to-Point Protocol over ATM
PPPoE - Point-to-Point Protocol over Ethernet
PQI - PQI Corporation
PSU - Power Supply Unit

--- R ---
RAID - Redundant Array of Inexpensive Disks
RAM - Random Access Memory
RAMDAC - Random Access Memory Digital Analog Convertor
RDRAM - Rambus Dynamic Random Access Memory
ROM - Read Only Memory
RPM - Revolutions Per Minute

--- S ---
SASID - Self-scanned Amorphous Silicon Integrated Display
SCA - SCSI Configured Automatically
SCSI - Small Computer System Interface
SDRAM - Synchronous Dynamic Random Access Memory
SECC - Single Edge Contact Connector
SODIMM - Small Outline Dual Inline Memory Module
SPARC - Scalable Processor ArChitecture
SOHO - Small Office Home Office
SRAM - Static Random Access Memory
SSE - Streaming SIMD Extensions
SVGA - Super Video Graphics Array
S/PDIF - Sony/Philips Digital Interface

--- T ---
TB - Terabytes
TBps - Terabytes per second
Tbps - Terabits per second
TDK - TDK Electronics
TEC - Thermoelectric Cooler
TPC - TipidPC
TWAIN - Technology Without An Important Name

--- U ---
UART - Universal Asynchronous Receiver/Transmitter
USB - Universal Serial Bus
UTP - Unshieled Twisted Pair

--- V ---
VCD - Video CD
VPN - Virtual Private Network

--- W ---
WAN - Wide Area Network
WTB - Want to Buy
WYSIWYG - What You See Is What You Get

--- X ---
XGA - Extended Graphics Array
XFX - XFX Graphics, a Division of Pine
XMS - Extended Memory Specification
XT - Extended Technology
Monday, May 17, 2010

✔ Change Text on windowsXP Start Button


Step 1 - Modify Explorer.exe File 

In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems. 

Click here to Download1 ( by Resource HackerTM) or

Click here to Download2 ( by Resource HackerTM)

The first step is to make a backup copy of the file explorer.exe located at
C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. After download extract zip file. 
Start 'ResHacker.exe' and open explorer.exe located at C:\Windows\explorer.exe.
The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033 ( for XP Layout ). The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.
There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case i used Tushar .

You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the "Save" command – Make sure to use the "Save As" command and choose a name for the file. Save the newly named file to C:\Windows\inf or C:\Windows subfolder.

Step 2 – Modify the Registry
!!!make a backup of your registry before making changes!!!

Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. It will Navigate to :

HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon

In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, Change the explorer.exe to inf/explorer.exe or wherever you saved the modified explorer. Click OK.

Yup, now you have done!! now just Close Registry Editor and either log off the system and log back in, or simply reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the Your text.....

If u like post comments...
Sunday, May 16, 2010

✔ Tips for a Total Online & Offline Security

Whether you’re at work or at home, your computer probably contains documents with personal information such as client data or sensitive household records (budgeting spreadsheets and tax calculations). These are the files you’d prefer that a stranger not see if your computer were to be lost, stolen or accessed by hackers.
With the sudden rise in the Internet usage across the globe over the past few years, there has also been a rise in the amount of online scams and frauds. Today most of the Internet users are unaware of the most prevailing online threats which pose a real challenge for their safe Internet usage. As a result, Online Security has become a questionable factor for the most Internet users. However it is still possible to effectively combat online insecurity provided that the users are well aware of the common scams and frauds and know how to protect themselves. A study shows that over 91% of the Internet users are unaware of the online scams and are worried about their security. Well if you are one among those 91% then here is a list of 10 tips to ensure your total online & Offline security.

1. Use a secure web browser. Internet Explorer is also (arguably) consistently the worst as far as computer security is concerned. Even its latest version IE7, still contains several vulnerabilities that are easily exploitable by hackers. Plus, its lack of add-on capability means that you cannot customize it with security enhancements. For these reasons, you should consider using browsers with better security performance ratings, such as Mozilla Firefox, Chrome or Opera.

Use a personal firewall. A firewall is a program that protects your computer from unauthorized access by filtering all information that comes through it. Windows comes with its own firewall, although some anti-virus programs may also have their own versions. You may adjust the setting from highly restrictive to highly permissive, but the default setting is recommended for optimal browsing. Whatever your choice, having a firewall running at all times is a must for safe system operation.

3. Always install a good antivirus software like Quickheal, Kaspersky, ESET Nod32, McAfee, BitDefender, avast!, Norton etc and keep it up-to-date. Also install a good anti-spyware to keep your PC away from spywares.. i recommend you to use anti-spyware softwares like Doctor,Windows Defender, Malwarebytes Anti Malware, Spy Sweeper etc.

4. Be responsible in choosing the sites you visit. Always visit known and trusted websites. If you are about to visit an unknown website, ensure that you do not click on suspectable links and banners.

Your web browser should show a little "Golden lock" symbol on the bottom. It is usually in the bottom right corner on most browsers. If the "Golden lock" is closed, then you are on a secure page. If the lock is open, then you are not.

5. Perform a Virus scan on the files / email attachments that you download before executing them.

6. Any external storage devices like Pen Drive are Most dangerous devices which allow viruses to get spread into the system very very easily.. So the solution is to Perform a virus scan of every external devices before executing them..... After scanning also if you are not sure then open 'My Computer' , Right-click on the external storage device and choose "Explore".
Never open any devices directly by double clicking or by using Enter Button.

7. Regularly Update your operating system and browser software. For a better security it is recommended that you surf the Internet through the latest version of your browser programs.

8. Never share your password (email, bank logins etc.) with any one for any reason. Choose a strong password (A blend of alphanumeric + special symbols) and change it regularly, eg. every 4-5 months. Avoid using easy-to-guess or Weak passwords. (eg. pet’s name or kid’s name)

9. Before you enter your password on any login page, ensure that you see https instead of http. ex. instead of . HTTPS protocol implements SSL (Secure Sockets Layer) and provide better security than a normal HTTP. For more information on HTTPS and SSL see Know More About Secure Sockets Layer (SSL).

10. At the time of login please be sure you unchecked your 'Remember me' check box below user name & Password.
Beware of phishing emails! Do not respond to any email that request you to update your login details by clicking on a link in the body of the email. Such links can lead to dummy/ duplicate or Fake Login Pages (Spoofed Pages). Here is a one of the example of dummy Orkut login Page. This page is at ">> <<" (If you click on this link, Please DON'T try to Login... your user name & password will get Hacked by that site owner)..

11. Always hit the logout button to close your login session rather than abruptly terminating the browser window. Also clear your web browser caches after every session to remove the temporary files stored in the memory and hard disk of your PC.

12. Avoid (Stop) using any public computers or computers in the Internet cafes to access any sensitive/confidential information. Also avoid such computers to login to your email/bank accounts. You cannot be sure if any spyware, keystroke-logger, password-sniffer and other malicious programs have not been installed on such a PC.

13. Ask yourself who you are actually giving your credit card information to. Very often when you go to pay through a website it actually takes you off their website to a credit card processing service. There are lots of these out there and some are more reliable and secure than others. Some of the more well known companies are PayPal and VeriSign.

14. Regularly create back-ups of your data. Sometimes, despite your best efforts, your computer might still become compromised or damaged beyond repair by malware. Just in case this happens, make sure you have back-up copies of the files you cannot afford to lose. Burn them onto CDs or store them on portable hard drives. This way, if you ever have to reformat your computer to rid it of a virus, your files will still be safe.

By following the above tips your online security can be guaranteed upto 90%. I hope this will help my readers for keeping themselves safe from any of the online insecurities.
Yup!! Pass your comments.
Saturday, May 15, 2010