Thursday, November 27, 2008

Speed UP your Computer

0 comments
Speed UP your Computer

http://zaicomp.com/wp-content/uploads/2011/05/The-8-Ways-To-Speed-Up-Computer.jpg
Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.
1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.
2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.
3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.
4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.
5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.
6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.
7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.
8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.
9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.
10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.
11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.
12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.
13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.
14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.
15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.
16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.
17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.
18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.
19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.
20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.
21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.
22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.
23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.
Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.
newer post

Tuesday, November 25, 2008

Protect USB Pen-Drive

0 comments
USB Pen Drive Protector
Do you use a Pen-Drive for transferring data across different systems in your office/network, then there is a high possibility of virus infections for transferring across with the pen-drive as a medium.Here are collection of freeware tools that you could as your first line of defense before using your pen drive on other systems.

USB Write Protector –This freeware application prevents write access to a USB drives. This will protect USB drives from viruses, malwares, spywares etc.Using this tool you can just copy data from your pendrive to the system but not copy data into the pen drive from the client system.Its only 190 KB and works with XP with SP2.


HomePage Download
newer post

protect PEN DRIVE from Virus

0 comments
How to protect PEN DRIVE from Virus


Now a days pen drive has become as mendatory to have wather you are having PC ar not , Early days pen was only thing which we you to carry but know time has changed along with that we carry Pen Drive.
What is Pen Drive? Now this questions come into our mind. Actualy pen drive is a device which contain a chip (memory) which store all the data in it or we can call removable Hard Disk of Computer.
This is used to transfer data from one computer to another.

But Now big problem is that It is also becoming dangerious for the PCs , because in large amount it is affected by the virus. This virus is very hurmful it can damge all the data's of computer or some virus's are so dangerious it can damage Hard Disk also.
Don't be panic, Here I am going to show you how you can save or protect your PEN DRIVE from Virus. Just simply follow this steps in your computer and you will ammaged to see it.


Ok Let us try to solve it

Just insert your pen drive in the USB port, now a autorun window(usually it includes Open to view Files andTake no action options) will open to choose the program that will run your pen drive but just ignore it by clicking the Cancel button right after the OK button

Then --------
STEP 1.
Open your Computer or Laptop, Click on START then go to RUN then type CMD now check the letter of your pen drive (eg. H:)

STEP 2. In the command promt now type H: and press ENTER

STEP 3. Now Type dir/w/o/a/p and press ENTER, now you will get list of file. Check this file for "Autorun.inf, new folder.exe, bha.vbs,explore.vbs, info.exe, ravon.exe,ravon.exe, mntdrcore.exe,rvhost.exe or other exe file extention.

STEP 4. If you found any of the above file then run the command [attrib -h -r -s -a*.* ] in comman promt and then press Enter

STEP 5. Now Delete each file one by one using del file name eg. del autorun.inf .

STEP 6. Now scan your pen drive from any anti-virus, Now you will find that your pen drive does't get affected from virus.
newer post

Friday, November 21, 2008

DAP Premium 8.7 Free

0 comments
Download Accelerator Plus Premium 8.7

Download From Here

Download Accelerator Plus (DAP) is the world's leading download manager, allows you to download up to 300% faster* with increased reliability, resume support and errors recovery. It searches for mirror sites that most effectively serve your downloads through multiserver connections for optimal utilization of dial-up or broadband connections. DAP automatically recovers from shutdowns, lost connections, and other errors. It is fully integrated into Netscape, Internet Explorer, and Opera, Mozilla/Firefox and offers a toolbar for Internet Explorer with a links catcher and a highlighter, providing the best possible performance from ANY Internet connection (dial-up, cable, DSL / ADSL, T1 etc.), allowing a Faster and more Reliable download experience. It features auto-hang-up after downloading, proxy settings, scheduling, and a unique AlwaysResume service.

Features:
- Preview pane
– Preview downloads of Music and Video files
- Download list
- Advanced management of downloads queues, priorities and statuses
- File Information pane
– Advanced information of downloaded files and sources
- Completed downloads list
– Separate list of completed downloads
- DAP Drive integration
– Save downloads and Upload files to DAP Drive web storage
- Media Center Tab
– Conveniently manage your media files
- Superior Usability
– New interface with flexible design options
- Integrates with all browsers
– Internet Explorer, Netscape, Opera, Mozilla/Firefox

Download Accelerator Plus registered version includes:
- Zip Extract
- download & extract specific files from zip archive
- Removal of the Banner Advertisement within the application
- DAP Skin Selection
- Management of site passwords and other relevant info (unlimited)
- Tray icon minimization while downloading
- Prioritized technical support
- Extreme acceleration speed
- for faster download rate

Only with DAP Premium:
- Extremely faster
- x10 connections per download!
- Absolutely no advertisements!
- Totally customized download experience!
- Shredder to totally eliminate files you don't need!
- Trace Cleaner -keep your privacy after browsing!
- Preview & extract zip files while downloading!
- Cool new look, more comfortable management features!
newer post

Tuesday, November 18, 2008

Hack Windows XP Password

0 comments
“Hack Windows XP Password”

Another method to login to a password protected Windows even if you do not have the password is by making Windows accepting any passwords.

There is a far better way to get into Windows XP. It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this. Of course, do not do this on anyone elses computer without proper authorisation.




Steps to Hack into a Windows XP Computer without changing password:

1. Get physical access to the machine. Remember that it must have a CD or DVD drive.

2. Download DreamPackPL HERE.

3. Unzip the downloaded dpl.zip and you’ll get dpl.ISO.

4. Use any burning program that can burn ISO images.

5. After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.

6. Press “R” to install DreamPackPL.

7. Press “C” to install DreamPackPL by using the recovery console.

8. Select the Windows installation that is currently on the computer (Normally is “1″ if you only have one Windows installed)

9. Backup your original sfcfiles.dll by typing:“ren C:WindowsSystem32sfcfiles.dll sfcfiles.lld” (without quotes)

10. Copy the hacked file from CD to system32 folder. Type:“copy D:i386pinball.ex_ C:WindowsSystem32sfcfiles.dll” (without quotes and assuming your CD drive is D:)

11. Type “exit”, take out disk and reboot.

12. In the password field, type “dreamon” (without quotes) and DreamPack menu will appear.

13. Click the top graphic on the DreamPack menu and you will get a menu popup.

14. Go to commands and enable the options and enable the god command.

15. Type “god” in the password field to get in Windows.You can also go to Passwords and select “Logon with wrong password and hash”. This option allows you to login with ANY password.

Note: I was unable to bring up the DreamPackPL for the first time because I have Kaspersky Anti-Virus already running in background. I believe most antivirus already labelled this tool as a Hack-Tool. A Hack-Tool is NOT a virus. DreamPackPL helps you bypass the Windows Login screen and it is not destructive.

newer post

Monday, November 17, 2008

Shutdown Computer with a Phone

0 comments
Shutdown your Computer with a Cell Phone

It is real. See the video and try..........


newer post

How To Speed Up XP

0 comments
Speed Up XP
Here is video clip. See it do the works which is given here to do. Your computer will be speed up....
<
newer post

Monday, November 10, 2008

iPHONE-3G

0 comments

Apple - iPhone - Features - 3G:
3G technology gives iPhone fast access to the Internet and email over cellular networks around the world. iPhone 3G also makes it possible to do more in more places: Surf the web, download email, get directions, and watch video — even while you're on a call.


iPhone 3G uses a technology protocol called HSDPA (High-Speed Downlink Packet Access) to download data fast over UMTS (Universal Mobile Telecommunications System) networks. Email attachments and web pages load twice as fast on 3G networks as on 2G EDGE networks. 1 And since iPhone 3G seamlessly switches between EDGE, faster 3G, and even faster Wi-Fi, you always get the best speeds possible.


iPhone 3G meets worldwide standards for cellular communications, so you can make calls and surf the web from practically anywhere on the planet. And if you're in an area without a 3G network, iPhone connects you via GSM for calls and EDGE for data.
iPhone already gives you mobile multitasking. But 3G technology lets you multitask in more places — without connecting via Wi-Fi. Since 3G networks enable simultaneous data and voice, you can talk on the phone while surfing the web, checking email, or using Maps. All from your 3G cellular network.

iPhone 3G delivers UMTS, HSDPA, GSM, Wi-Fi, EDGE, GPS, and Bluetooth 2.0 + EDR in one compact device — using only two antennas. Clever iPhone engineering integrates those antennas into a few unexpected places: the metal ring around the camera, the audio jack, the metal screen bezel, and the iPhone circuitry itself. And intelligent iPhone power management technology gives you up to 5 hours of talk time over 3G networks. 2 That's some of the best in the business.
hasEML = false;




ReplyReply All
JSifyForm("forward_bottom645704434");


Move...My Mail
newer post

Tuesday, November 4, 2008

McAfee's focus as a one-stop shop

0 comments
 


The Web site Dictionary.com defines the word focus as "a central point, as of attraction, attention, or activity." This is an apt description of McAfee's inaugural customer event, McAfee Focus.

McAfee customers received the message that the company is focused in three areas:


1. Growth through acquisition. McAfee is intent on becoming a one-stop shop for governance, compliance, and risk management. To this end, the company purchased outside firms like Reconnex, SafeBoot, and Secure Computing. Look for McAfee to continue this trend by buying companies in areas like application security, identity management, IT operations management, and security management.

2. Product integration. McAfee has two areas for integration: the endpoint (i.e., one agent for security, encryption, network access control, etc.) and its management platform Enterprise Policy Orchestrator (ePO). McAfee wants to surround its customers with broad functionality AND central command-and-control.

3. Industry relationships. In the past few weeks, McAfee announced partnerships with Commvault, HP, Intel, and VMware. The goal? Make McAfee a development nexus for anything related to security integration.


These initiatives come right from the playbook of McAfee CEO, Dave DeWalt, a veteran of the software industry. The results of this game plan seem good so far: McAfee reported record revenue of $410 million (27 percent growth) in the third quarter.

So will this focus and aggressive behavior continue? I expect McAfee to back off the gas pedal a bit to feel its way through muddy economic waters but the company will also capitalize on deflated market capitalization values to acquire more companies and a softening job market to grab top talent. In this growing global recession, McAfee may be one company that is able to swim against the tide.
newer post

Inside Windows 7's new desktop

0 comments
LOS ANGELES--The differences between Vista and Windows 7 are subtle--sometimes so subtle that they can go unnoticed.

This point was exacerbated by the fact that the build that developers were given a chance to take home last week doesn't have the new taskbar that represents the most visual difference between Windows 7 and today's Vista desktop.

Microsoft went to the trouble of shifting all the computer kiosks at the Professional Developers Conference over to Windows 7 on Tuesday. But because the version lacked some of the key visual features, some attendees didn't even notice they were running the newer Windows.

But Microsoft felt that keeping the user interface features out of the developer build was critical to keeping the features a surprise at the conference. The company's earlier M1, M2, and M3 builds all leaked out, said Chaitanya Sareen, a program manager in the Windows unit.

As the conference was winding down on Thursday, Sareen and another program manager--Rebecca Deutsch--offered an in-depth look at the changes Microsoft made to the desktop as well as the rationale for them. To get the best understanding of the changes, check out the two embedded videos (apologies for the lack of tripod).

The new taskbar is, in many ways, more akin to Mac OS X's dock than it is to what most Windows users have seen at the bottom of their screens for years.

With Vista and all its recent predecessors, there are a host of different icons at the bottom of the screen, with one group representing favorite items, another representing open program windows and a third representing notifications and items that launch at start-up.

Window 7 aims to do away with most of that redundancy in favor of one collection of large icons that live at the bottom of the screen. The icons represent applications chosen by the user and live there whether an application is running or not.

The large icons serve several purposes. The icon can, of course, be used simply to switch to or launch an application. It is also home to what is known as a "jumplist," sort of like a mini start menu for each program that can contain a series of actions, a link to recent documents, or even a series of controls that let a user take an action without switching to the program itself.
"This is the one button to rule them all," Sareen said. A left click opens the windows while a right click or the swipe of a finger on a touch-sensitive machine brings up the jumplist.

When a program is open, the icon also allows a user to preview that application's open windows. Clicking on a thumbnail naturally brings that window to the front. Hovering over the preview, though, temporarily previews that window as if it were in front, but doesn't actually complete the change--a feature Microsoft is calling "Aero Peek."

The idea came as the company tried to solve a riddle: what was the perfect size for a thumbnail window? For things like graphical Web pages or a pair of photos, a small representation might do the trick. But when one is trying to, say, flip between two similar Word documents or e-mails, it gets harder.

"The perfect size of the thumbnail is the actual size of the window," Sareen said. And that's how Aero Peek was born.

The goal with that feature and others, Sareen said, is to find ways to remove some of the things that make computing harder, what he calls "paper cuts." They aren't bugs, so much as things that are needlessly complicated or nonintuitive.

"We kind of went on a war against paper cuts," he said.

The company is also trying to reduce all of those annoying notifications that pop up along the right hand side of the computer. Developers can still write code that makes them appear, Deutsch said, but with each one that pops up, users have the option of disabling all such warnings from that program. The idea is to use social engineering to convince developers to bother the user far less often.
newer post

Core Security finds critical Adobe Reader hole

0 comments
Core Security finds critical Adobe Reader hole


A critical security hole in Adobe Reader could allow an attacker to take control of a computer, according to Core Security Technologies.
The vulnerability affects version 8.1.2 of Reader, Core Security said in a statement issued on Tuesday to coincide with Adobe's planned release of a security update to fix the vulnerability.
An attacker could put malicious code in JavaScript embedded in a PDF and spread that via a Web site or e-mail. Once the file is opened, the code could manipulate the program's memory allocation pattern and trigger the vulnerability to execute arbitrary code with the privileges of the user.
Damian Frizza, a CoreLabs researcher, discovered the vulnerability in May while he was investigating a similar vulnerability in a different PDF viewer application called Foxit Reader. Core Security immediately reported the new hole to Adobe.
Adobe representatives did not return a call seeking comment on Monday.
The complexity of desktop software increases the chances of applications having bugs that result from the implementation of the software, said Ivan Arce, chief technology officer of Core Security.
"We've seen similar vulnerabilities in JavaScript engines in Adobe software in the past and in other applications," he said. "It's difficult to avoid implementation bugs like this one."
The fact that both PDF Readers have the same bug indicates that even though vendors are building products with different technologies and code bases, they ought to check for such bugs in their applications when rival software is found to be vulnerable, Arce said.
Elinor Mills covers Internet security and privacy. She joined CNET News in 2005 after working as a foreign correspondent for Reuters in Portugal and writing for The Industry Standard, the IDG News Service, and the Associated Press.
newer post

Yahoo signs up BOSS search partner

0 comments


Delver, a search start-up that personalizes search results by paying attention to a person's social connections, has signed up for Yahoo's BOSS (Build Your Own Search Service).

BOSS lets larger search sites use Yahoo's search results, tailored in any way desired but stripped of any Yahoo branding, in exchange for showing Yahoo ads or sharing revenue. Delver plans to mix those results in with its own technology, which shows results drawn from publicly visible parts of social sites such as profiles, blogs, bookmarks, and videos. Smaller sites and academic projects can use BOSS for free.

"Leveraging Yahoo Search BOSS allows us to keep focusing on social-graph ranking and indexing, while providing our users with a solution that intelligently mixes social results with traditional Web results," Delver Chief Executive Liad Agmon said in a statement Tuesday.
newer post

Saturday, November 1, 2008

Modify XP System Properties logo

0 comments
Modify the Windows XP System Properties logo

The Windows XP System Properties logo is often changed by computer manufacturers. Hardware vendors use this general system information dialog to brand your computer with their own logo and support contact information.

In this tip you can learn how you can insert your own logo in the system properties dialog and complete it with your own contact information.

To invoke the system properties dialog, click the Start button, right-click "My Computer" and select "Properties".

This will open up your general system information dialog. On our Fujitsu-Siemens Amilo Pro laptop, the Windows XP System Properties logo looks like this :






If you want to put your own graphic in there, you should create your image in a .bmp graphic file. It's also a good idea to create this bitmap image with the same background shade of gray (RGB: 192, 192, 192) used in the Properties dialog. Otherwise, you risk letting Windows make its own judgments regarding color contrast and background shading.


The next thing to consider is the image size. The system properties dialog only offers enough real estate for an image of about 180 (wide) x120 (high) pixels. Make sure that you can fit your logo in this area.

Once you have created your logo and saved it as a .bmp file, copy it over to the system32 subfolder of your Windows system folder. If you don't know where your system folder is :

>>Click the Start button and select "Run"
>>In the "open" field, enter "cmd" (without the quotes) and click ok
>>Windows will open up a dos command window
>>In the command window, type "set system" (without the quotes)
>>Look for the line that contains "SystemRoot", this is where your system directory is (generally, the Windows XP system folder is c:\windows)

Now that you know where your system folder is, copy your logo image file over to the system32 subfolder of your system folder. Then rename your logo image file to oemlogo.bmp

Additionally you can create a new file in this same folder and name the new file oeminfo.ini

In this file you can enter your contact information like in the example below :

[General]
Manufacturer=Windows Help Central
Model=ShowCase

[Support Information]
Line1=" "
Line2=" For support, sales, upgrades or questions:"
Line3=""
Line4=" Some text to demonstrate the XP System Properties logo"
Line5=" Windows XP Tips and Tricks "
Line6=" yadayada"
Line7=""
Line8=" +1 (888) 888-888 (voice)"
Line9=" +1 (888) 888-889 (fax)"
Line10=""
Line11=""

Save and close the file and you are ready. From now on, if someone opens up the system


properties dialog, your own Windows XP System Properties logo is in there.



And if someone clicks the "Support Information" button :

newer post

Bypass XP Password

0 comments
How to Bypass a Windows XP Password Without any Programs

newer post

Make your own icons

0 comments

It's shockingly easy to create your own icons in Windows XP. Let's do it: Click Start, click All Programs, click Accessories, and then click Paint. On the Image menu, click Attributes. Type 32 for both the Width and Height of the document, and make sure that Pixels is selected under Units. Click OK to create a new 32x32-pixel document: the size of an icon.


Now add type, color, or do whatever you'd like to your image. I like to shrink photos (headshots work best) to 32x32 and simply paste them into my Paint document. When you're finished, open the File menu and click Save As. Use the dialog box to choose where you want to save your file, then give it a name followed by ".ico" (without the quotes), and click Save. (The extension ".ico" tells Windows that it's an icon file.) You just created an icon! Now you can change any shortcut or folder to your own icon—just browse to it on your hard drive.
newer post
newer post older post Home

Delete this element to display blogger navbar