Here are some list of system processes and threats
Top System Processes
====================
1. lsass.exe-System Process
2. alg.exe-System Process
3. svchost.exe-System Process
4. csrss.exe-System Process
5. smss.exe-System Process
Top Security Threats
====================
1. lsas.exe-Security Risk
2. msbb.exe-Security Risk
3. scvhost.exe-Security Risk
4. gmt.exe-Security Risk
5. rundll.exe-Security Risk
6. saie.exe-Security Risk
POST YOUR TOPICS HERE
Hi friends, This blog welcomes you all to post you own new tricks and tips here. For this you have to just send a mail to sendmytricks@ymail.com
Your post would be posted along with your name and location. For this you have to send a mail to the above mentioned id.
Format for sending mail.
Subject : MY TRICKS
1. Your name [will be displayed if display name not given]
2. Display name [This name would be displayed along with you post]
3. You location [For ex., Chennai, India.]
4. Post topic.
5. Details.
Pictures are also allowed. For that you need to send the pictures as links.
IMPORTANT NOTE : Please do not spam in this mail id. You can send you ideas/problems in this mail id itself.
Your post would be posted along with your name and location. For this you have to send a mail to the above mentioned id.
Format for sending mail.
Subject : MY TRICKS
1. Your name [will be displayed if display name not given]
2. Display name [This name would be displayed along with you post]
3. You location [For ex., Chennai, India.]
4. Post topic.
5. Details.
Pictures are also allowed. For that you need to send the pictures as links.
IMPORTANT NOTE : Please do not spam in this mail id. You can send you ideas/problems in this mail id itself.
Thursday, January 31, 2008
Lock Down Your Pc W/ A Floppy Disk!!!!
1. Click on the Start menu, then click on Run
2. When the Run prompt window opens, type in syskey then click OK.
3. You have now entered the Windows XP Account Database options. Click on the Update button
4. On the next window, your options should say you have a System Generated Password and the Store Startup Key Locally will be selected. Simply choose Store Startup Key on Floppy Disk, click OK and follow the on-screen instructions.
Congratulations, you are done! Make sure your floppy is inside the floppy drive otherwise your computer will not boot up.
2. When the Run prompt window opens, type in syskey then click OK.
3. You have now entered the Windows XP Account Database options. Click on the Update button
4. On the next window, your options should say you have a System Generated Password and the Store Startup Key Locally will be selected. Simply choose Store Startup Key on Floppy Disk, click OK and follow the on-screen instructions.
Congratulations, you are done! Make sure your floppy is inside the floppy drive otherwise your computer will not boot up.
Optimize Hard Disk When Idle
Note: This tweak only works on Windows XP/.NET.
This setting will rearrange files on the hard drive when the computer is idle thus improving the performance of the system.
Steps:
1. Open your registry by clicking on Start > Run > Type: "regedit" and find or create the key below.
2. Create a new DWORD value, or modify the existing value, called "EnableAutoLayout" and set it according to the value data below.
System Key: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\OptimalLayout]
Value Name: EnableAutoLayout
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = disabled, 1 = enabled)
3. Exit your registry, you may need to restart or log out of Windows for the change to take effect.
Note: The computer must be restarted before the changes take effect.
This setting will rearrange files on the hard drive when the computer is idle thus improving the performance of the system.
Steps:
1. Open your registry by clicking on Start > Run > Type: "regedit" and find or create the key below.
2. Create a new DWORD value, or modify the existing value, called "EnableAutoLayout" and set it according to the value data below.
System Key: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\OptimalLayout]
Value Name: EnableAutoLayout
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = disabled, 1 = enabled)
3. Exit your registry, you may need to restart or log out of Windows for the change to take effect.
Note: The computer must be restarted before the changes take effect.
Computer and Internet Terms and Acronyms
Alias
A name that is substituted for a more complicated name. For example, a simple alias may be used instead of a more complicated mailing address or for a mailing list.
Applet
A computer program written in Java for transfer over the web.
Archie
A search utility used on the Internet to locate files in FTP sites, these files are generally public domain files that anyone can download.
Avatar
A graphical representation of a person in a chat room. The word comes from Hindu mythology in which spirits come down and inhabit bodies.
Bandwidth
Describes the capacity at which a given communications channel, such as ordinary copper telephone line, can transfer information; increasing bandwidth increases the speed at which data transfer takes place. The greater the bandwidth, the greater amount of data can be transferred.
Baud Rate
A measurement of how quickly a modem transfers data. Although, strictly speaking, this is not the same as bits per second, the two terms are often used interchangeably.
BBS (Bulletin Board System)
A service accessible via modem or other connection through which users may exchange messages privately or post messages to a publicly accessible forum; may or may not have Internet access.
BIOS
Basic Input Output System. This is the basic set of instructions that tell the computer how to act.
Bit
Short for binary digit; either a 1 or a 0; the smallest unit into which digital information may be broken.
BPS (Bits per Second)
A measure of the speed of data transmission; the number of bits of data that can be transmitted each second. Modems are generally measured by their BPS rate (14.4K - 14400 BPS, 28.8K - 28800 BPS)
Boot up
The process of turning on the computer, which includes a number of functions that are performed automatically every time the power switch is turned on.
Browser
A client software program used to search networks, retrieve copies of files and display them in an easy-to-read, often graphical, format. Browsers such as SPRY Mosaic, Netscape Navigator, and Microsoft Internet Explorer are used to access information on the World Wide Web.
Byte
A collection of eight BITS.
Client
A software program that provides access to network resources by working with information stored on a server.
CMOS
Complimentary Metal Oxide Semiconductor. A CMOS computer circuit consumes very little power and is used in computers to keep track of the system setup information, data, time, type of disk and hard drives, etc. that a computer has installed. The CMOS information is powered by the computer's on-board battery. So if the on-board battery fails, the information in CMOS is lost.
Crash
An unexpected shutdown either of a program or the whole system.; sometimes traumatic, always frustrating ; often fixable by turning off the computer and turning it back on; results in losing any unsaved work. Can also be used in instances of a hard disk physically being damaged.
Cyberspace
A term coined by author William Gibson. It describes the imaginary space in which computer users travel when "surfing" the Internet.
Daemon
In UNIX, a program running all the time in the "background" (that is, unseen by users), providing special services when required. An example of a daemon is biff, which lets you know when mail arrives.
E-mail (Electronic Mail)
A means of sending typed messages from one computer to another, over a network or the Internet.
FAQ
Frequently Asked Question. This is often a file which new users can refer to when using a new service or piece of Internet software. It contains answers to frequently asked questions, hence the name.
File Transport Protocol (FTP)
A service for moving an electronic file of any type from one computer to another over the Internet.
Forum
The dedicated area where people come together to discuss issues, hobbies, or news. Also called newsgroups.
Freeware
Software provided free by its originator. See shareware.
Frequently Asked Questions (FAQ)
An area or document dedicated to answering common questions.
GIF (Graphic Interchange Format)
One of two popular systems used to compress the size of image files so they require less bandwidth to transfer on the Web.
Gopher
An Internet service for locating and delivering electronic files. The Gopher interface includes a directory tree and a set of menus which can be used for exploring the Internet and downloading files.
GUI
This is an acronym for Graphical User Interface. Examples are Windows and Apple's Macintosh operating system. The concept originated in the early 1970s at Xerox's PARC laboratory.
Home Page
The opening page of a World Wide Web document, sometimes called the welcome page.
Host
A computer connected directly to the Internet. A service provider's computer is a host.
HTML (HyperText Markup Language)
This is an acronym for HyperText Mark-up Language which is used to format information so that it can be structured and made accessible to the World Wide Web (WWW). The language itself is a simplified derivative of SGML, a widely used standard developed in the mid 1980's. The technique employed is to encase the information in special markers (called tags) which tell the WWW applications how the text is to be interpreted.
HTTP (Hypertext Transfer Protocol)
The protocol that forms the basis of World Wide Web technology. HTTP is the set of rules governing the software that transports hyperlinked files along the Internet.
IDE
Integrated Drive Electronics. An interface used mainly by hard drives and CD-ROM drives to connect to the computer.
IP (Internet Protocol)
The standard protocol used by systems communicating across the Internet.
IP Address
A digital code that precisely locates a computer connected to the Internet.
IRC (Internet Relay Chat)
A software tool that makes it possible to hold real-time keyboard conversations online.
ISDN (Integrated Services Digital Network)
Large bandwidth telephone line. Allows you to transfer information quickly.
Joint Photographic Experts Group (JPEG) Graphic Format
A commonly used compression technique for graphics images on the Internet.
LAN (Local Area Network)
The regional server or servers your computer is connected to. These in turn are connected to other servers creating a network in your office, home, etc.
MPEG (Motion Picture Experts Group)
A video file compression system used on the web.
PC (Personal Computer)
Usually refers to what 's commonly known as an IBM-compatible computer, made by any one of dozens of manufacturers or backyard entrepreneurs.
PDF
Portable Document Format. A document format read by Adobe System's Acrobat viewer. This format is excellent for displaying instruction manuals and other large documents in a "web-ready" state.
PEM
An acronym for Privacy Enhanced Mail
Plug-in
A helper application that works within a browser. It adds more functionality to a browser commonly associated with the Netscape Navigator browser software.
Port
Generally, port refers to the hardware through which computer data is transmitted; the plugs on the back of your computer are ports. On the Internet, port often refers to a particular application. For instance, you might telnet to a particular port on a particular host. The port is actually an application.
SCSI
Small Computer Systems Interface. An set of standards used by an input device to interface with the computer. SCSI systems can "daisy-chain" up to 7 seven devices to a single connection. In other words, one device can connect to other device, and to another until it connects to the computer. Because several devices can connect to one single input connection, each device must be properly terminated for the entire chain of devices to work.
Search Engine
A tool used which matches key words you enter with titles and descriptions on the Internet. It then displays the matches allowing you to easily locate a subject. Similar to a card catalog, but not as efficient. Common search engines are Webcrawler, Yahoo, Alta Vista, Infoseek, and Lycos.
Server
A computer or its software that "serves" other computers by administering network files and network operations. Three types of Internet servers are Web servers, e-mail servers, and Gopher servers.
Shareware
Software that is freely distributed, but the author expects payment from people who decide to keep and use it.
Surfing
Same as "cruise." The random, aimless exploration of web pages achieved through following links that look interesting within a document.
Upload
The process of transferring information from one computer to another, generally from a client to a server. For example, you upload a file from your computer to another.
Web
see World Wide Web (WWW).
Web Page
A single screen (document) on a Web site.
Web Site
The location of published hypertext content. Physically, a Web site can occupy an entire Web server or a part of a server; or it can be spread out among different servers as long as its sections are all linked, directly or indirectly, to the same home page.
WWW (World Wide Web)
An acronym for the World Wide Web. The WWW is a hypermedia retrieval system for information. The newest medium of the Internet. Based on hypertext, the Web provides a quick and easy method of delivering and receiving information files which are read by a browser. The Webs ability to transfer files containing not just text but also graphics, sound, and video makes it the most versatile of all the Internet services.
WYSIWYG (What You See Is What You Get)
Pronounced "wizziwig," it is a generic term meaning what you see on your screen is what is going to print out on your printer.
A name that is substituted for a more complicated name. For example, a simple alias may be used instead of a more complicated mailing address or for a mailing list.
Applet
A computer program written in Java for transfer over the web.
Archie
A search utility used on the Internet to locate files in FTP sites, these files are generally public domain files that anyone can download.
Avatar
A graphical representation of a person in a chat room. The word comes from Hindu mythology in which spirits come down and inhabit bodies.
Bandwidth
Describes the capacity at which a given communications channel, such as ordinary copper telephone line, can transfer information; increasing bandwidth increases the speed at which data transfer takes place. The greater the bandwidth, the greater amount of data can be transferred.
Baud Rate
A measurement of how quickly a modem transfers data. Although, strictly speaking, this is not the same as bits per second, the two terms are often used interchangeably.
BBS (Bulletin Board System)
A service accessible via modem or other connection through which users may exchange messages privately or post messages to a publicly accessible forum; may or may not have Internet access.
BIOS
Basic Input Output System. This is the basic set of instructions that tell the computer how to act.
Bit
Short for binary digit; either a 1 or a 0; the smallest unit into which digital information may be broken.
BPS (Bits per Second)
A measure of the speed of data transmission; the number of bits of data that can be transmitted each second. Modems are generally measured by their BPS rate (14.4K - 14400 BPS, 28.8K - 28800 BPS)
Boot up
The process of turning on the computer, which includes a number of functions that are performed automatically every time the power switch is turned on.
Browser
A client software program used to search networks, retrieve copies of files and display them in an easy-to-read, often graphical, format. Browsers such as SPRY Mosaic, Netscape Navigator, and Microsoft Internet Explorer are used to access information on the World Wide Web.
Byte
A collection of eight BITS.
Client
A software program that provides access to network resources by working with information stored on a server.
CMOS
Complimentary Metal Oxide Semiconductor. A CMOS computer circuit consumes very little power and is used in computers to keep track of the system setup information, data, time, type of disk and hard drives, etc. that a computer has installed. The CMOS information is powered by the computer's on-board battery. So if the on-board battery fails, the information in CMOS is lost.
Crash
An unexpected shutdown either of a program or the whole system.; sometimes traumatic, always frustrating ; often fixable by turning off the computer and turning it back on; results in losing any unsaved work. Can also be used in instances of a hard disk physically being damaged.
Cyberspace
A term coined by author William Gibson. It describes the imaginary space in which computer users travel when "surfing" the Internet.
Daemon
In UNIX, a program running all the time in the "background" (that is, unseen by users), providing special services when required. An example of a daemon is biff, which lets you know when mail arrives.
E-mail (Electronic Mail)
A means of sending typed messages from one computer to another, over a network or the Internet.
FAQ
Frequently Asked Question. This is often a file which new users can refer to when using a new service or piece of Internet software. It contains answers to frequently asked questions, hence the name.
File Transport Protocol (FTP)
A service for moving an electronic file of any type from one computer to another over the Internet.
Forum
The dedicated area where people come together to discuss issues, hobbies, or news. Also called newsgroups.
Freeware
Software provided free by its originator. See shareware.
Frequently Asked Questions (FAQ)
An area or document dedicated to answering common questions.
GIF (Graphic Interchange Format)
One of two popular systems used to compress the size of image files so they require less bandwidth to transfer on the Web.
Gopher
An Internet service for locating and delivering electronic files. The Gopher interface includes a directory tree and a set of menus which can be used for exploring the Internet and downloading files.
GUI
This is an acronym for Graphical User Interface. Examples are Windows and Apple's Macintosh operating system. The concept originated in the early 1970s at Xerox's PARC laboratory.
Home Page
The opening page of a World Wide Web document, sometimes called the welcome page.
Host
A computer connected directly to the Internet. A service provider's computer is a host.
HTML (HyperText Markup Language)
This is an acronym for HyperText Mark-up Language which is used to format information so that it can be structured and made accessible to the World Wide Web (WWW). The language itself is a simplified derivative of SGML, a widely used standard developed in the mid 1980's. The technique employed is to encase the information in special markers (called tags) which tell the WWW applications how the text is to be interpreted.
HTTP (Hypertext Transfer Protocol)
The protocol that forms the basis of World Wide Web technology. HTTP is the set of rules governing the software that transports hyperlinked files along the Internet.
IDE
Integrated Drive Electronics. An interface used mainly by hard drives and CD-ROM drives to connect to the computer.
IP (Internet Protocol)
The standard protocol used by systems communicating across the Internet.
IP Address
A digital code that precisely locates a computer connected to the Internet.
IRC (Internet Relay Chat)
A software tool that makes it possible to hold real-time keyboard conversations online.
ISDN (Integrated Services Digital Network)
Large bandwidth telephone line. Allows you to transfer information quickly.
Joint Photographic Experts Group (JPEG) Graphic Format
A commonly used compression technique for graphics images on the Internet.
LAN (Local Area Network)
The regional server or servers your computer is connected to. These in turn are connected to other servers creating a network in your office, home, etc.
MPEG (Motion Picture Experts Group)
A video file compression system used on the web.
PC (Personal Computer)
Usually refers to what 's commonly known as an IBM-compatible computer, made by any one of dozens of manufacturers or backyard entrepreneurs.
Portable Document Format. A document format read by Adobe System's Acrobat viewer. This format is excellent for displaying instruction manuals and other large documents in a "web-ready" state.
PEM
An acronym for Privacy Enhanced Mail
Plug-in
A helper application that works within a browser. It adds more functionality to a browser commonly associated with the Netscape Navigator browser software.
Port
Generally, port refers to the hardware through which computer data is transmitted; the plugs on the back of your computer are ports. On the Internet, port often refers to a particular application. For instance, you might telnet to a particular port on a particular host. The port is actually an application.
SCSI
Small Computer Systems Interface. An set of standards used by an input device to interface with the computer. SCSI systems can "daisy-chain" up to 7 seven devices to a single connection. In other words, one device can connect to other device, and to another until it connects to the computer. Because several devices can connect to one single input connection, each device must be properly terminated for the entire chain of devices to work.
Search Engine
A tool used which matches key words you enter with titles and descriptions on the Internet. It then displays the matches allowing you to easily locate a subject. Similar to a card catalog, but not as efficient. Common search engines are Webcrawler, Yahoo, Alta Vista, Infoseek, and Lycos.
Server
A computer or its software that "serves" other computers by administering network files and network operations. Three types of Internet servers are Web servers, e-mail servers, and Gopher servers.
Shareware
Software that is freely distributed, but the author expects payment from people who decide to keep and use it.
Surfing
Same as "cruise." The random, aimless exploration of web pages achieved through following links that look interesting within a document.
Upload
The process of transferring information from one computer to another, generally from a client to a server. For example, you upload a file from your computer to another.
Web
see World Wide Web (WWW).
Web Page
A single screen (document) on a Web site.
Web Site
The location of published hypertext content. Physically, a Web site can occupy an entire Web server or a part of a server; or it can be spread out among different servers as long as its sections are all linked, directly or indirectly, to the same home page.
WWW (World Wide Web)
An acronym for the World Wide Web. The WWW is a hypermedia retrieval system for information. The newest medium of the Internet. Based on hypertext, the Web provides a quick and easy method of delivering and receiving information files which are read by a browser. The Webs ability to transfer files containing not just text but also graphics, sound, and video makes it the most versatile of all the Internet services.
WYSIWYG (What You See Is What You Get)
Pronounced "wizziwig," it is a generic term meaning what you see on your screen is what is going to print out on your printer.
Internet Error Codes
It happens to all of us. We're surfing along, and up comes an error. What do all those error codes mean? Here's a quick rundown of the most common:
400 - Bad Request - You probably typed in a URL wrong, the server has no clue what you're looking for, or you aren't allowed to have access. Usually, it's a matter of the URL being typing in wrong. Maybe you mixed upper and lowercase letters or something.
401 - Unauthorized Request - you tried to get to something on the web server you're not allowed to play with. In other words, you ain't on the party list.
403 - Forbidden - You can't access the page. You may not have access (it may require a password), or it may be blocked from your domain.
404 - Not Found - The page you were trying to look at was not found on the server. This is probably the most common error you'll come across. What has probably happened is that the web page you were going to has been removed or re-named.
500 - Internal error - Usually caused by a CGI error. You fill out a form, but the script used to process it is not working properly.
503 - Service Unavailable - The server may be overloaded, down, or have other similar problems. Try later.
400 - Bad Request - You probably typed in a URL wrong, the server has no clue what you're looking for, or you aren't allowed to have access. Usually, it's a matter of the URL being typing in wrong. Maybe you mixed upper and lowercase letters or something.
401 - Unauthorized Request - you tried to get to something on the web server you're not allowed to play with. In other words, you ain't on the party list.
403 - Forbidden - You can't access the page. You may not have access (it may require a password), or it may be blocked from your domain.
404 - Not Found - The page you were trying to look at was not found on the server. This is probably the most common error you'll come across. What has probably happened is that the web page you were going to has been removed or re-named.
500 - Internal error - Usually caused by a CGI error. You fill out a form, but the script used to process it is not working properly.
503 - Service Unavailable - The server may be overloaded, down, or have other similar problems. Try later.
What is the difference between a Virus, Trojan, and Worm?
Basically, they all fall under the generally category of "viruses". However, there are a few distinctions.
Virus - Technically, a virus infects another file (attaches or inserts itself into it). They usually infect program files or MS Office documents. From there, it can replicate, do damage, etc. Unlike a worm, these do not function as a stand alone (except possibly to infect a given file).
Worm - This is almost identical to a "true virus", except that it lives on its own and generally doesn't infect other files (although it can replace them). Usually, these copy themselves using e-mail, networks, disks, etc. Again, these are very close to a true virus, and can do the same kind of damage.
Trojan Horse - This type of program doesn't copy itself but does do damage to your computer. These types of programs rely on people to pass them around and to run them. They do not e-mail themselves. The idea is to make the program look like it's something harmless, like a screen saver or joke, so it gets sent around.
That's the crash course on virus types. Bottom line, you don't want any of the little nastys on your computer!
Virus - Technically, a virus infects another file (attaches or inserts itself into it). They usually infect program files or MS Office documents. From there, it can replicate, do damage, etc. Unlike a worm, these do not function as a stand alone (except possibly to infect a given file).
Worm - This is almost identical to a "true virus", except that it lives on its own and generally doesn't infect other files (although it can replace them). Usually, these copy themselves using e-mail, networks, disks, etc. Again, these are very close to a true virus, and can do the same kind of damage.
Trojan Horse - This type of program doesn't copy itself but does do damage to your computer. These types of programs rely on people to pass them around and to run them. They do not e-mail themselves. The idea is to make the program look like it's something harmless, like a screen saver or joke, so it gets sent around.
That's the crash course on virus types. Bottom line, you don't want any of the little nastys on your computer!
Compress NTFS Files
If you are using Windows XP, chances are your hard drive uses the NTFS filing system. If you are in NTFS you can save space on your hard drive by using File Compression.
Note: If you compress a file using NTFS it cannot be encrypted or opened on a non-NTFS computer (Windows 95, 98, or ME) without first being uncompressed.
First, open My Computer and double-click a drive or folder.
Right-click the file or folder you want to compress, then choose "Properties". (You could also just right-click a folder or file and choose "Properties" or ALT +double -click)
On the General tab, click "Advanced".
Check the box marked "Compress contents to save disk space" then click OK .
Click OK in the "Properties dialog" box.
Choose the option you want when the "Confirm Attribute Changes" window pops up.
BONUS TIP: Want an easy way to distinguish your compressed folders from the regular ones? Why not have them appear in a different color.
Open Folder Options in the Control Panel , then Start / Control Panel / Folder Options .
On the "View" tab, select the "Show encrypted or compressed NTFS files in color" check box.
This may already be checked by default, in which case the compressed files you just created will already be a different color (probably blue).
Note: If you compress a file using NTFS it cannot be encrypted or opened on a non-NTFS computer (Windows 95, 98, or ME) without first being uncompressed.
First, open My Computer and double-click a drive or folder.
Right-click the file or folder you want to compress, then choose "Properties". (You could also just right-click a folder or file and choose "Properties" or ALT +double -click)
On the General tab, click "Advanced".
Check the box marked "Compress contents to save disk space" then click OK .
Click OK in the "Properties dialog" box.
Choose the option you want when the "Confirm Attribute Changes" window pops up.
BONUS TIP: Want an easy way to distinguish your compressed folders from the regular ones? Why not have them appear in a different color.
Open Folder Options in the Control Panel , then Start / Control Panel / Folder Options .
On the "View" tab, select the "Show encrypted or compressed NTFS files in color" check box.
This may already be checked by default, in which case the compressed files you just created will already be a different color (probably blue).
Where is my Control+Alt+Delete?
Why doesn't my Windows XP have Control+Alt+Delete ?
This could be caused by a virus, b ut before you panic, it could also be missing if, for some unknown reason, Task Manager did not install or was deleted. So, first you should find out if it's there:
Start / Search "all files & folders" for " taskmgr.exe ". This file should be located on your C drive in the Windows / System32 folder.
If not, then all you need to do is restore it from your XP installation disk
Put the Windows XP CD into your CD-ROM. If you have Autoplay enabled, the Welcome screen will come up and you can just close out of it.
Click Start / Run then type " cmd " to get a System 32 command prompt then...
Type in the drive letter of your CD-ROM followed by a colon and hit Enter (for example... D: )
At the D: prompt type in "cd \i386" then Enter. Now type in "expand taskmgr.ex_ %SystemRoot%\SYSTEM32\taskmgr.exe" making sure that you put a space between "ex_" and "%System..."
Then press Enter . The file should extract and install into the proper folder.
This could be caused by a virus, b ut before you panic, it could also be missing if, for some unknown reason, Task Manager did not install or was deleted. So, first you should find out if it's there:
Start / Search "all files & folders" for " taskmgr.exe ". This file should be located on your C drive in the Windows / System32 folder.
If not, then all you need to do is restore it from your XP installation disk
Put the Windows XP CD into your CD-ROM. If you have Autoplay enabled, the Welcome screen will come up and you can just close out of it.
Click Start / Run then type " cmd " to get a System 32 command prompt then...
Type in the drive letter of your CD-ROM followed by a colon and hit Enter (for example... D: )
At the D: prompt type in "cd \i386" then Enter. Now type in "expand taskmgr.ex_ %SystemRoot%\SYSTEM32\taskmgr.exe" making sure that you put a space between "ex_" and "%System..."
Then press Enter . The file should extract and install into the proper folder.
Security for Windows XP
Don't you hate it when people mess with your computer without you knowing it? Here are two ways to prevent this, (and still be lazy): create a desktop icon to lock your computer, and password protect after the screen saver is activated. Both of these only work if you already have your computer password protected on login.
If you already have a password, skip to the next part.
To create a password, go to the control panel , then to user accounts . Click your account, and then the " change my password " button, enter the requested fields and click on " change password " and then close the window.
How to create a lock-down icon:
First, pick any icon on your desktop. Right click it and drag it to another place on the desktop. In the menu that appears select " copy. " Now we need to change the name and the target of the new shortcut. Right click this shortcut, and click " properties. " Make sure you are in the shortcut tab .
In the box labeled " target, " copy and paste this line:
%windir%\System32\rundll32.exe user32.dll,LockWorkStation
In the box labeled " Start in, " copy paste:
%windir%
To apply these changes click " apply. " Next you can change the icon. Just click the " change icon " button. If you're not already there hit the browse button and go to:
C:\WINDOWS\system32\shell32.dll
You'll find a nice selection of icons there.
Select an icon from the ones that appear in the box and click " ok. "
Now move to the general tab . The box on the top contains the name of your icon. Change it to whatever you want. I used "Fun Game" in the hope that if someone comes to the computer and it is not locked that they will click this icon, locking the computer. (This actually worked once!) After you are finished, click " apply ," and then " ok. "
To test your icon, double click it. You should be taken to something like a log on screen. Just enter the password to get back into windows, just as you left it too. This is different from actually logging off. Whenever you know you will be away for a while, just click that icon, and your computer will be safe.
How to lock down on screen saver:
Right click on your desktop in any empty space. Click " properties " in the menu that opens. Go to the screensaver tab. All you have to do now is click the box next to " On resume, password protect ." Click " apply, " and then " ok. "
Let your screen saver run, and see what happens after you move your mouse. This is good in case you leave suddenly and forget to click the icon we made earlier. Unlike hibernation, this will allow other programs, such as Kazaa or iMesh, to run in the background.
If you already have a password, skip to the next part.
To create a password, go to the control panel , then to user accounts . Click your account, and then the " change my password " button, enter the requested fields and click on " change password " and then close the window.
How to create a lock-down icon:
First, pick any icon on your desktop. Right click it and drag it to another place on the desktop. In the menu that appears select " copy. " Now we need to change the name and the target of the new shortcut. Right click this shortcut, and click " properties. " Make sure you are in the shortcut tab .
In the box labeled " target, " copy and paste this line:
%windir%\System32\rundll32.exe user32.dll,LockWorkStation
In the box labeled " Start in, " copy paste:
%windir%
To apply these changes click " apply. " Next you can change the icon. Just click the " change icon " button. If you're not already there hit the browse button and go to:
C:\WINDOWS\system32\shell32.dll
You'll find a nice selection of icons there.
Select an icon from the ones that appear in the box and click " ok. "
Now move to the general tab . The box on the top contains the name of your icon. Change it to whatever you want. I used "Fun Game" in the hope that if someone comes to the computer and it is not locked that they will click this icon, locking the computer. (This actually worked once!) After you are finished, click " apply ," and then " ok. "
To test your icon, double click it. You should be taken to something like a log on screen. Just enter the password to get back into windows, just as you left it too. This is different from actually logging off. Whenever you know you will be away for a while, just click that icon, and your computer will be safe.
How to lock down on screen saver:
Right click on your desktop in any empty space. Click " properties " in the menu that opens. Go to the screensaver tab. All you have to do now is click the box next to " On resume, password protect ." Click " apply, " and then " ok. "
Let your screen saver run, and see what happens after you move your mouse. This is good in case you leave suddenly and forget to click the icon we made earlier. Unlike hibernation, this will allow other programs, such as Kazaa or iMesh, to run in the background.
Mysterious Music
Do you have mysterious music playing from your computer? If you hear "Fur Elise" or "It's a Small Word" emanating from your CPU, this is a signal sent to the PC speaker from the computer's BIOS that the CPU fan is failing or has failed, or that the power supply voltages have drifted out of tolerance. Waltz on over to your nearest repair shop and get it fixed.
DirectX Diagnosis Tool
Direct X components accelerate hardware to enhance sound, graphic, and security performance. Many games install Direct X plug-ins to create 3-D animation.
The DirectX Diagnostic Tool, available in all versions of Windows after Win 98, can help you troubleshoot sound or video issues but is also a great source for specific information about your system and hardware.
Go to Start/Run and type "dxdiag" (without the quotes) into the box then click OK.
You'll see tabs for your display, sound, music, networking, and more. Here's a summery of what each tab is for...
On the System tab you'll find your System Information: Computer name, OS, Manufacturer, BIOS version, Processor, Memory, and DirectX version.
The DirectX Files tab lists the file name and version for each DX component on your computer. In the "Notes" box you'll be told if there are any corrupt DirectX components that need to be deleted or reinstalled.
Display tabs (may be labeled 1 and 2 if you have dual monitors) tells you your display settings. You can find out what DirectX features your graphics card uses (like 3-D acceleration). You can click the "Test..." button next to the component to see if it is working properly. Another great feature is that it shows your graphics card manufacturer and driver so you can update if needed. Any problems will appear in the "Notes" box.
The Sound tab shows your settings and lets you test DirectSound. You can find your sound card name and driver here. The "Hardware Sound Acceleration Level" slider is used to correct audio glitches that might be caused by some audio drivers. By reducing the acceleration a notch you can troubleshoot audio problems. Be careful not to lower it too much because advanced audio processing techniques, such as 3D spatialization, won't work right.
The Music tab shows your MIDI settings and lets you test DirectMusic. Any problems will be displayed in the "notes" box.
Input lists devices connected to your computer like your mouse, keyboard, and USB devices and tells you what drivers they use. As usual, any problems will show in the "notes" box.
The Network tab. This lists DirectPlay service providers. DirectPlay is used mainly for online gaming.
And finally, the More Help tab is the place to go if the previous troubleshooting methods don't solve your issue.
That's just a general run-down of the DirectX Diagnostic Tool. It's pretty easy to use when you get in there. Even if you don't have a problem it's a neat place to go, find out about your system, and test things out.
The DirectX Diagnostic Tool, available in all versions of Windows after Win 98, can help you troubleshoot sound or video issues but is also a great source for specific information about your system and hardware.
Go to Start/Run and type "dxdiag" (without the quotes) into the box then click OK.
You'll see tabs for your display, sound, music, networking, and more. Here's a summery of what each tab is for...
On the System tab you'll find your System Information: Computer name, OS, Manufacturer, BIOS version, Processor, Memory, and DirectX version.
The DirectX Files tab lists the file name and version for each DX component on your computer. In the "Notes" box you'll be told if there are any corrupt DirectX components that need to be deleted or reinstalled.
Display tabs (may be labeled 1 and 2 if you have dual monitors) tells you your display settings. You can find out what DirectX features your graphics card uses (like 3-D acceleration). You can click the "Test..." button next to the component to see if it is working properly. Another great feature is that it shows your graphics card manufacturer and driver so you can update if needed. Any problems will appear in the "Notes" box.
The Sound tab shows your settings and lets you test DirectSound. You can find your sound card name and driver here. The "Hardware Sound Acceleration Level" slider is used to correct audio glitches that might be caused by some audio drivers. By reducing the acceleration a notch you can troubleshoot audio problems. Be careful not to lower it too much because advanced audio processing techniques, such as 3D spatialization, won't work right.
The Music tab shows your MIDI settings and lets you test DirectMusic. Any problems will be displayed in the "notes" box.
Input lists devices connected to your computer like your mouse, keyboard, and USB devices and tells you what drivers they use. As usual, any problems will show in the "notes" box.
The Network tab. This lists DirectPlay service providers. DirectPlay is used mainly for online gaming.
And finally, the More Help tab is the place to go if the previous troubleshooting methods don't solve your issue.
That's just a general run-down of the DirectX Diagnostic Tool. It's pretty easy to use when you get in there. Even if you don't have a problem it's a neat place to go, find out about your system, and test things out.
Viruses that Won't Go Away
Some viruses just won't go away. You try everything from running your anti-virus software to digging through the registry just to have it come back. Well, if you have Windows ME or XP the infected file might be stored as a backup file that your virus scan can't touch.
So, what to do? Try disabling System Restore and running a virus scan.
With Windows XP:
Right-click "My Computer" and select "Properties". Click the "System Restore" tab and check the box "Turn off System Restore" then click OK.
You'll need to restart your computer.
Run a virus scan then follow the same procedure and uncheck "Turn off System Restore".
For Windows ME:
Right-click "My Computer" and choose "Properties". Select the "Performance" tab then click the "File System" button and go to the "Troubleshooting" tab. Put a check mark next to "Disable System Restore" then click OK.
You'll need to restart your computer.
Run a virus scan then follow the procedure above and uncheck "Disable System Restore".
This may or may not solve the problem, but it's worth a try. It might also be a good idea to do this any time you run a virus scan.
So, what to do? Try disabling System Restore and running a virus scan.
With Windows XP:
Right-click "My Computer" and select "Properties". Click the "System Restore" tab and check the box "Turn off System Restore" then click OK.
You'll need to restart your computer.
Run a virus scan then follow the same procedure and uncheck "Turn off System Restore".
For Windows ME:
Right-click "My Computer" and choose "Properties". Select the "Performance" tab then click the "File System" button and go to the "Troubleshooting" tab. Put a check mark next to "Disable System Restore" then click OK.
You'll need to restart your computer.
Run a virus scan then follow the procedure above and uncheck "Disable System Restore".
This may or may not solve the problem, but it's worth a try. It might also be a good idea to do this any time you run a virus scan.
Reactivate DLL's
Somehow the .dll was deactivated. This can sometimes happen when new software or applications are installed. Thankfully, with Windows ME, 2000, and XP Microsoft made a way to re-activate the dll files called Regsvr32.
If you get a missing dll or missing ActiveX message, first do a search for the file. If you find it, then go to Start/Run and type in "regsrv32 (space) dll name" then hit OK.
Hopefully this will solve your problem.
If you get a missing dll or missing ActiveX message, first do a search for the file. If you find it, then go to Start/Run and type in "regsrv32 (space) dll name" then hit OK.
Hopefully this will solve your problem.
Hide Drives and Partitions
Do you have data on a partition or hard drive that you don't want tampered with or easily accessible to other users? Well, you can hide any drive/partition in Windows XP, NT, and 2000. That means that they won't show up in Explorer or My Computer.
If you want access to that drive from your user account you should create a desktop shortcut before proceeding. Once hidden, you can still access by typing the drive letter and a colon in Start/Run, for example, "D:" will bring up a folder of the contents on your D drive.
The easiest way with Win XP is to use the TweakUI power toy from Microsoft. Go to Start/Run and type in "tweakui" (without the quotes).
Go to My Computer/Drives and uncheck the drive/partition(s) you want hidden. Click "Apply" or "OK" when finished.
For "tweakui" give a comment for this topic.
For Win NT, 2000, and XP you can use the following Registry edit:
*Be sure to back up the Registry before proceeding
Open the Registry Editor by going to Start/Run and typing in "regedit" (without the quotes). Find your way to...
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies
Click on "Explorer".
Double-click the "NoDrives" key in the right column. If you don't find a "NoDrives" registry key, just right-click in the right pane and choose "New/DWORD Value" then name the key "NoDrives".
You'll see a value like "0000 00 00 00 00". This is where the fun starts. The four sets of double zeros (after the "0000") are where you'll enter the values for the drive/partitions. Now, stay with me on this, it's not as complicated as it sounds:
The first column is for drives A-H, the second for I-P, the third for Q-X, and the fourth for Y-Z.
The values for each drive are as follows:
1 - A I Q Y
2 - B J R Z
4 - C K S
8 - D L T
16 - E M U
32 - F N V
64 - G O W
80 - H P X
So, let's say you want to hide drive D. In the first column you would put "08". For drive K you would put "04" in the second column.
But what if you want to hide more than one drive in a column? Simply add the values together: D+E = 8+16 = 24. So in the first column you would put "24".
Still baffled? If you have XP then go get TweakUI and save yourself the math.
Whichever method you use, you can rest easy knowing that the files on that drive or partition are less accessible to other users.
If you want access to that drive from your user account you should create a desktop shortcut before proceeding. Once hidden, you can still access by typing the drive letter and a colon in Start/Run, for example, "D:" will bring up a folder of the contents on your D drive.
The easiest way with Win XP is to use the TweakUI power toy from Microsoft. Go to Start/Run and type in "tweakui" (without the quotes).
Go to My Computer/Drives and uncheck the drive/partition(s) you want hidden. Click "Apply" or "OK" when finished.
For "tweakui" give a comment for this topic.
For Win NT, 2000, and XP you can use the following Registry edit:
*Be sure to back up the Registry before proceeding
Open the Registry Editor by going to Start/Run and typing in "regedit" (without the quotes). Find your way to...
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies
Click on "Explorer".
Double-click the "NoDrives" key in the right column. If you don't find a "NoDrives" registry key, just right-click in the right pane and choose "New/DWORD Value" then name the key "NoDrives".
You'll see a value like "0000 00 00 00 00". This is where the fun starts. The four sets of double zeros (after the "0000") are where you'll enter the values for the drive/partitions. Now, stay with me on this, it's not as complicated as it sounds:
The first column is for drives A-H, the second for I-P, the third for Q-X, and the fourth for Y-Z.
The values for each drive are as follows:
1 - A I Q Y
2 - B J R Z
4 - C K S
8 - D L T
16 - E M U
32 - F N V
64 - G O W
80 - H P X
So, let's say you want to hide drive D. In the first column you would put "08". For drive K you would put "04" in the second column.
But what if you want to hide more than one drive in a column? Simply add the values together: D+E = 8+16 = 24. So in the first column you would put "24".
Still baffled? If you have XP then go get TweakUI and save yourself the math.
Whichever method you use, you can rest easy knowing that the files on that drive or partition are less accessible to other users.
Subscribe to:
Posts (Atom)