Wednesday, October 8, 2008

Window XP Hidden Applications Shortcuts

Window XP Hidden Applications Shortcuts

To run any of these apps go to Start > Run and type the executable name:


1) Character Map = charmap.exe (very useful for finding unusual characters)


2) Disk Cleanup = cleanmgr.exe


3) Clipboard Viewer = clipbrd.exe (views contents of Windows clipboard)


4) Dr Watson = drwtsn32.exe (Troubleshooting tool)

5) DirectX diagnosis = dxdiag.exe (Diagnose & test DirectX, video & sound cards)


6) Private character editor = eudcedit.exe (allows creation or modification of characters)


7) IExpress Wizard = iexpress.exe (Create self-extracting / self-installing package)


8) Microsoft Synchronization Manager = mobsync.exe (appears to allow synchronization of files on the network for when working offline. Apparently undocumented).


9) Windows Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).


10) ODBC Data Source Administrator = odbcad32.exe (something to do with databases)


11) Object Packager = packager.exe (to do with packaging objects for insertion in files, appears to have comprehensive help files).


12) System Monitor = perfmon.exe (very useful, highly configurable tool, tells you everything you ever wanted to know about any aspect of PC performance, for uber-geeks only )


13) Program Manager = progman.exe (Legacy Windows 3.x desktop shell).


14) Remote Access phone book = rasphone.exe (documentation is virtually non-existant).


15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the Windows Registry).


16) Network shared folder wizard = shrpubw.exe (creates shared folders on network).


17) File siganture verification tool = sigverif.exe


18) Volume Control = sndvol32.exe (I've included this for those people that lose it from the System Notification area).


19) System Configuration Editor = sysedit.exe (modify System.ini & Win.ini just like in Win98! ).


20) Syskey = syskey.exe (Secures XP Account database - use with care, it's virtually undocumented but it appears to encrypt all passwords, I'm not sure of the full implications).


21) Microsoft Telnet Client = telnet.exe


22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the actions of drivers, might be useful for people having driver problems. Undocumented).


23) Windows for Workgroups Chat = winchat.exe (appears to be an old NT utility to allow chat sessions over a LAN, help files available).


Windows XP Shortcuts:

Windows XP Shortcuts:

ALT+- (ALT+hyphen) Displays the Multiple Document Interface (MDI) child window's System menu
ALT+ENTER View properties for the selected item
ALT+ESC Cycle through items in the order they were opened
ALT+F4 Close the active item, or quit the active program
ALT+SPACEBAR Display the System menu for the active window
ALT+TAB Switch between open items
ALT+Underlined letter Display the corresponding menu
BACKSPACE View the folder one level up in My Computer or Windows Explorer
CTRL+A Select all
CTRL+B Bold
CTRL+C Copy
CTRL+I Italics
CTRL+O Open an item
CTRL+U Underline
CTRL+V Paste
CTRL+X Cut
CTRL+Z Undo
CTRL+F4 Close the active document
CTRL while dragging Copy selected item
CTRL+SHIFT while dragging Create shortcut to selected iteM
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word
CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word
CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph
CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph
SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin
ESC Cancel the current task
F1 Displays Help
F2 Rename selected item
F3 Search for a file or folder
F4 Display the Address bar list in My Computer or Windows Explorer
F5 Refresh the active window
F6 Cycle through screen elements in a window or on the desktop
F10 Activate the menu bar in the active program
SHIFT+F10 Display the shortcut menu for the selected item
CTRL+ESC Display the Start menu
SHIFT+CTRL+ESC Launches Task Manager
SHIFT when you insert a CD Prevent the CD from automatically playing
WIN Display or hide the Start menu
WIN+BREAK Display the System Properties dialog box
WIN+D Minimizes all Windows and shows the Desktop
WIN+E Open Windows Explorer
WIN+F Search for a file or folder
WIN+F+CTRL Search for computers
WIN+L Locks the desktop
WIN+M Minimize or restore all windows
WIN+R Open the Run dialog box
WIN+TAB Switch between open items

Run Commands:

Run Commands:

compmgmt.msc - Computer management
devmgmt.msc - Device manager
diskmgmt.msc - Disk management
dfrg.msc - Disk defrag
eventvwr.msc - Event viewer
fsmgmt.msc - Shared folders
gpedit.msc - Group policies
lusrmgr.msc - Local users and groups
perfmon.msc - Performance monitor
rsop.msc - Resultant set of policies
secpol.msc - Local security settings
services.msc - Various Services
msconfig - System Configuration Utility
regedit - Registry Editor
msinfo32 _ System Information
sysedit _ System Edit
win.ini _ windows loading information(also system.ini)
winver _ Shows current version of windows
mailto: _ Opens default email client
command _ Opens command prompt

Saturday, October 4, 2008

How To: Get Commercial Softwares For Free Every Day

How To: Get Commercial Softwares For Free Every Day

Giveawayoftheday.com gives you a commercial piece of application software daily for free.

  • You have to install the software within 24 hours or the installation file expires


www.Giveawayoftheday.com

How To: Scare Your Friends With a Fake Virus.

How To: Scare Your Friends With a Fake Virus.

Step 1: Right click on your desktop and go to "New > Create Shortcut"
  • It will create a shortcut icon on your desktop and a window will pop up
Step 2: Paste "shutdown -s -t"(without quotes) in the location box

Step 3: Click next (name it whatever you want)

Step 4: Click Finish and you're done all
  • The fake virus is totally harmless all it does is shuts down the users computer


You can send the fake virus to your friend through email or IM

Wednesday, October 1, 2008

4 steps to protect ur computer................!

4 steps to protect your computer
Step 1. Keep your firewall turned on

What is a firewall?
A firewall helps protect your computer from hackers who might try to delete information, crash your computer, or even steal your passwords or credit card numbers. Make sure your firewall is always turned on.

How to turn on your firewall

How to choose a firewall

Learn more about firewalls for your operating system
Step 2. Keep your operating system up-to-date

What are operating system updates?
High priority updates are critical to the security and reliability of your computer. They offer the latest protection against malicious online activities. Microsoft provides new updates, as necessary, on the second Tuesday of the month.

How to update your operating system

Microsoft security updates: Frequently asked questions

Learn about using Microsoft Update

Go to Microsoft Update
Step 3. Use updated antivirus software

What is antivirus software?
Viruses and spyware are two kinds of usually malicious software that you need to protect your computer against. You need antivirus technology to help prevent viruses, and you need to keep it regularly updated.

How to get antivirus software

Get regular antivirus scanning with Windows Live OneCare

Get a free safety scan

Learn about viruses

Learn more about virus protection for your operating system
Step 4. Use updated antispyware technology

What is antispyware software?
Viruses and spyware are two kinds of usually malicious software that you need to protect your computer against. You need antispyware technology to help prevent spyware, and you need to keep it regularly updated.

Get antispyware technology

Use Windows Defender, free antispyware for Windows XP SP2

Learn about spyware

Learn more about spyware protection for your operating system

improving safety of ur browsing............

improve the safety of your browsing and e-mail activities
Related Links

Get Windows XP SP2

Windows Vista
Are you on a network?
If your computer is part of a managed network, contact your system administrator before making any changes.
Malicious hackers and virus writers can infect your computer by taking advantage of low security settings in your e-mail and Web browsing software. They can do this by sending you a malicious e-mail message or by enticing you to visit a malicious Web site.
You can help limit your chances of being attacked by increasing your security settings. Here are four steps you can do right now to help increase your security.

1: Set your browser security to High
To raise the browsing security level in Internet Explorer:
1.
On the Internet Explorer Tools menu, click Internet Options.
2.
In the Internet Options dialog box, click the Security tab, and then click the Internet icon.
3.
Under Security level for this zone, move the slider to High. This sets the security level for all Web sites you visit to High. (If no slider is visible, click the Default Level button and then move the slider to High.)
Note Setting the level to High may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly even with the High security setting.
Top of page
2: Add safe Web sites to trusted sites
Designating a Web site as trusted allows the site to work correctly under the High security setting.
Microsoft strongly recommends that the first Web site you add to your trusted sites be Microsoft Update (http://update.microsoft.com/microsoftupdate/) so that you can continue to install important software updates directly from the Microsoft Update Web site.
To add a Web site to your list of trusted sites:
1.
On the Internet Explorer Tools menu, click Internet Options.
2.
In the Internet Options dialog box, click the Security tab.
3.
Click the Trusted sites icon, and then click the Sites button.
4.
In the Trusted sites dialog box, enter the Web site URL in the Add this Web site to the zone box, and then click Add.
The Trusted sites feature allows you to restrict trust to only sites that begin with https:. To include sites that begin with http:, including Microsoft Update, clear the Require server verification (https:) for all sites in this zone checkbox.
Trusted site added. We recommend that you make Microsoft Update the first site you add.
5.
Click OK.
6.
Under Security level for this zone, move the slider to Medium. This sets the security level for all of the sites that you trust to Medium. (If no slider is visible, click the Default Level button and then move the slider up to Medium.)
Top of page
3: Read e-mail messages in plain text
To help increase your e-mail security, set your e-mail program to read all messages you receive as plain text.
To read messages in plain text in Microsoft Outlook Express:
1.
From the Outlook Express Tools menu, click Options.
2.
In the Options dialog box, click the Read tab.
3.
Select the Read all messages in plain text checkbox.
4.
Click OK.
To read messages in plain text in Microsoft Outlook 2003:
1.
On the Outlook Tools menu, click Options.
2.
In the Options dialog box, click the Preferences tab, and then click the E-mail Options button.
3.
In the E-mail Options dialog box, select the Read all standard mail in plain text checkbox.
4.
Click OK to close the E-mail Options dialog box, and then click OK to close the Options dialog box.
To read messages in plain text in Microsoft Outlook 2002:
To read messages in plain text, you have to modify the registry. For instructions, see Knowledge Base article KB307594, "Description of a new feature that users can use to read non-digitally-signed e-mail or nonencrypted e-mail as plain text in Office XP SP-1."
Important Always back up the registry before modifying it, and understand how to restore the registry if a problem occurs. Do not modify the registry unless you are confident you can recover from unintended mistakes.
Top of page
4: Block pop-up windows in your browser
A pop-up blocker is a utility that prevents small additional windows from opening when you visit Web pages. Some Web sites use these small windows to display helpful information, but many pop-up windows contain advertisements or offensive content.
Malicious attackers also may use pop-up windows disguised as special offers to install malicious code on your computer.
Windows XP SP2 users can take advantage of the Pop-up Blocker built into Internet Explorer.

Learn more about the Pop-up Blocker in Internet Explorer


Free Blogspot Templates by Isnaini Dot Com and Porsche Cars. Powered by Blogger