Saturday, July 18, 2009

Simple Tweaks for Peak PC Graphics Performance

Adjust the settings for your graphics board and display to improve image quality.

When it comes to your PC, looks definitely matter. Tiny text, blurry images, and flickering screens aren't just annoying, they can lead to eyestrain, lost productivity, and a bill from the glazier for replacing the window you toss your monitor through out of frustration. But you don't have to give your display the heave-ho: A few simple adjustments to your graphics card and other Windows settings can ensure peak visual performance.

Your PC's graphics card is controlled by its Windows driver, so get the latest driver release for your board. To see what version you have, right-click the desktop and choose Properties to open the Display Properties dialog box, then click Settings, Advanced, Adapter (in Windows XP, also select Properties, Driver).

Visit your graphics-card vendor's Web site to download the most recent version of the driver, but don't install beta drivers. These are works in progress that may cause more trouble than they're worth.

Sight-Saving Settings

Here are a few settings that should be available for all graphics drivers.

Resolution: This is the number of dots--or pixels (short for "picture elements")--displayed on your screen. The higher the resolution, the more dots per inch, and the sharper the displayed image (if your monitor supports the higher resolution). High resolutions increase the processing demands on your graphics board and PC.

The graphics cards in most computers made in the last three or four years support resolutions of at least 1024 by 768--meaning the screen image is composed of an orthogonal array 1024 pixels across and 768 pixels tall--and some support screen resolutions as high as 1600 by 1200. However, many older systems, as well as some newer budget systems, have a top resolution of only 800 by 600.

To adjust screen resolution, open Display Properties and click Settings. Slide the 'Screen area' or 'Screen resolution' bar to a higher (More) or lower (Less) resolution. Though higher resolutions improve image quality, they also shrink icons, text, and other on-screen objects. Experiment to find the setting that's right for you. For most people, 1024 by 768 is the highest resolution they can read easily on a 17-inch CRT monitor.

Color depth: This setting is the number of colors that your graphics card supports. The more colors available for use, the more realistic the image, but again, the more colors on your screen, the greater the processing demands on your system.

Your graphics card's color-depth settings are listed in Display Properties under the Settings tab on the Colors drop-down menu ('Color quality' in Windows XP). Each is named for the number of bits it assigns to each pixel: True Color (also called 24-bit color) makes 16,777,216 colors available, while High Color (16 bits) supports 65,536 colors. At lower than 16-bit color, your images may suffer. Many drivers no longer offer 8-bit (256 colors) or 15-bit (32,536 colors) settings.

New PCs often support 32-bit color, which offers the same 16 million-plus colors as True Color. The extra 8 bits control image opacity. This is useful in fast-moving 3D games but of little help in most business apps.

Refresh rate: Expressed in hertz, or cycles per second, this tells how often the phosphors that glow to create an image on a CRT screen are reenergized--that is, the times per second that the screen's image is redrawn. A refresh rate that's too low can cause annoying screen flicker. Even if you don't see the flicker, slow refreshes can cause eyestrain and headaches.

Conventional wisdom says your refresh rate should be no less than 72 Hz. Some experts say the minimum rate is 80 Hz. Try different refresh rates until you find the one that works for you. Note that if your refresh rate is too high, you could lose image opacity. Still, few of us can discern rates higher than 85 Hz.

To adjust your screen's refresh rate in Windows XP, open Display Properties and click Settings, Advanced, Adapter, List All Modes. Pick a combination of refresh rate, screen resolution, and color depth from the list of supported values.

To change your refresh rate in other versions of Windows, open Display Properties and then click Settings, Advanced, Adapter. Select an option from the 'Refresh rate' drop-down menu. If you see no options there, however, your graphics board and monitor don't support multiple refresh rates.

Even in that case, you might be able to increase your display's refresh rate by decreasing your screen resolution or your color depth. All three specs compete for graphics-processing capacity, so if your graphics system is running at its maximum, try increasing one setting and lowering another. For example, reducing color depth from 32-bit to 16-bit--no big deal if you never look at photos--may free up enough processing power to let you bump your refresh rate from an annoying 60 Hz to an eye-pleasing 72 Hz. Or you may be able to increase resolution from 800 by 600 to 1024 by 768. There's no guarantee, but these tricks might work.

Windows automatically sets your screen refresh rate to a safe but slow 60 Hz when it can't detect your monitor. To confirm that Windows XP correctly recognizes your monitor, open Display Properties and click Settings, Advanced, Monitor. If your monitor isn't listed under 'Monitor type', download and install the device's driver from the manufacturer's Web site.

In other versions of Windows, verify that Plug and Play is enabled. Make sure your monitor is listed under 'Display' on the Settings tab in Display Properties, and then click Advanced, Monitor. Verify that Automatically detect Plug & Play monitors is checked. If it isn't, select it and then reset your refresh rate to a level that is higher than Windows' default 60 Hz.

DirectX: This Windows component controls multimedia functions. To check your current DirectX version, click Start, Run, type dxdiag, and click OK. Choose the System tab and look under System Information on the lower part of the screen. DirectX 9 is the latest version; if you don't have it, download it from Microsoft.
Touch Those Dials!

You can improve the image quality of your monitor via its built-in controls. The options vary by display manufacturer and model, but you should find brightness and other controls on most monitors.

Adjust brightness and contrast: Use this gray-scale image on your screen. Be sure you can see as many of the image's 17 shades as possible; the two or three darkest may be tough to view in a bright room.

Center and align: Few monitors come straight from the factory with optimal screen geometry. Use your monitor's screen-placement controls to center your displayed image, keep its edges straight, and minimize unfilled screen space.

To avoid eyestrain and other physical problems, put the top of the screen at eye level and at arm's length from your head (your best position may vary). Orient your screen to avoid glare from lights and windows. If that's not possible, get a glare filter such as Kensington's $34 GlareMaster.

Clean it: Gently wipe your screen with a soft, lightly moistened cloth. Unless the monitor is really filthy, avoid cleaning solutions, which can damage delicate screen coatings. Clean the dust from the cooling vents in the monitor's case; overheating is your display's lethal enemy.

Graphics Triage

If your screen goes blank, the problem is likely due to a disconnected monitor cable, an unplugged power cord, or a too-low brightness setting. Monitors do die, however. If you smell something burning or hear popping sounds, your monitor could be failing--turn it off immediately. Monitors have been known to spontaneously combust.

Corrupted graphics drivers cause all kinds of PC problems. To check for a damaged graphics driver, install the plain-vanilla VGA driver that comes with Windows. If your troubles disappear, reinstall a clean copy of the monitor's original driver, or an updated version.

Some graphics boards don't work or play well with other hardware devices. Windows allows you to disable graphics-acceleration functions for the sake of compatibility. Open Display Properties and click Settings, Advanced, Troubleshooting in Windows XP and 2000, or Settings, Advanced, Performance in Windows 98 and Me. Move the slider under 'Hardware acceleration' to the left to disable your graphics acceleration.

A shaking or shimmering image on your screen may be due to nearby magnetic fields. Keep clocks and other appliances that use electric motors, and those that use a lot of electricity (such as microwave ovens), far from your monitor. Power lines behind walls can cause interference, so try moving the display away from nearby walls.

If your screen image is washed in blue, red, or green, check for a loose cable connecting your graphics board to your monitor. Look for bent pins inside the cable connector; you can often straighten them with needle-nose pliers. If on-screen objects have a rainbow cast, some monitors have convergence controls that you can use to tune the image.

Living in a Flat World

Notebook displays are fine-tuned in the factory to work with the system's other hardware; your desktop's flat panel likely isn't. And tuning an LCD isn't the same as tuning a CRT monitor. If both your LCD and graphics board support Digital Visual Interface connections, make sure they're using them. Vendors don't always ship a DVI cable with cards that produce both analog and digital signals, so you'll have to replace the analog cable. If your display supports DVI but your graphics card doesn't, upgrade your card.

Make sure your LCD is set to its native resolution. Many flat-panel displays don't look good at other resolutions. Unfortunately, some 15-inch LCDs have a native resolution of 1024 by 768 dpi, which makes text minuscule. The solution is to open Display Properties, click Appearance, and change the setting on the 'Font size' drop-down menu to increase the size of your text. (Most browsers include their own font-size settings.)

In Windows XP, open Display Properties, click Appearance, Effects, and check Use the following method to smooth screen fonts. Select ClearType to see a big improvement in the appearance of many of your fonts.

sick of inserting winxp cd every time your pc asks here is the trick

Occasionally when attempting to install something, you are asked to insert the windows xp cd, and sometimes you’re just too lazy to get up and go get it, or it's not available to you at the moment. Well here’s something that'll solve that problem...

1. Insert your windows xp cd

2. Click on, “Perform Additional Tasks”

3. Now click on, “Browse this CD”

4. Look for the I386 folder, right-click on the folder and copy.

5. Go into, “My Computer”

6. Right click on you C: drive and paste.

How can I change the default location of the i386 folder?

After installing Windows 2000 or XP, if you ever need to add a component to it (like DHCP etc.) it always asks you for the CD, even if you copy the i386 files to your local drive. Can I fix this?

Yes you sure can.

1. Open the registry editor and go to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup

2. Highlight the Setup folder.
3. On the right pane, locate the SourcePath.
4. Double-click the SourcePath and replace the drive letter in the box to C:\ (if you copied the files to your C:\ drive). Make sure it's C:\ and not C:\i386.
5. Close the registry editor.
6. If the system ever needs files from the i386 folder, it will automatically look in the C:\i386 folder.

You can also do the trick with Windows 2000 and XP Professional client computers that were installed from a shared folder on your network, but do not copy the i386 folder to the local drive of each computer. Instead, copy the i386 folder to a share located on a network server. Edit the registry for the Windows 2000 or XP Pro machines and make it point to the UNC path of the network server.

Also, if you installed from a RIS server, keep the RIS server running. Your system is smart enough to grab the files from the RIS server when it needs extra files.

This tip works for service packs too. You'll notice at the registry string from step #1 that it says service packsourcepath. Extract the SP from the command prompt to a folder on your hard drive using the w2ksp# -x switch, make the path in the registry where you put the files, and you won't have to go fishing for service pack disks again.

Well folks, from now on you should never be asked for that cd again…

*BTW, after all my writing, I found a program that takes the place of having to modify the registry manually. It’s called BanishCD from AnalogX. Here’s what they have to say:

One of the best ways to make Windows more convenient is to copy the CAB files from the CD onto your harddrive, so whenever you install any new hardware, you don't need to put the CD in your system. Unfortunately, Windows still ASKS for the CD, and you need to point it to where you copied the CAB files to, until now...

AnalogX BanishCD is a small utility that allows you to change the path that Windows will look for the CAB files. Normally, the only way this could be done would be to modify the registry manually, which is a very tricky process, and if you make a mistake it can be hard to repair. With BanishCD, you can quickly browse through your system and select the path; and just in case you make a mistake it will store the original path!

Download BanishCD from here:
CODE
http://www.analogx.com/contents/download/system/banishcd.htm

Single Click Shutdown

Did you know that in Windows XP you can shut down your computer from the (eventually DOS prompt) command line box? Moreover, you can do this by clicking your mouse only once.

All you need to do is... right-click on an empty Desktop spot -> select New -> Shortcut -> type shutdown followed by a space, and then enter one or more of the parameters listed below -> click Next -> type a suggestive name for your new shortcut -> finally, click Finish.

This is the Shutdown.exe (located in %systemroot%\System32, usually C:\Windows\System32) syntax:


shutdown [-i|-l|-s|-r|-a] [-f] [-m \\computername] [-t xx] [-c "Text"] [-d[u][p]:xx:yy]

Valid command line switches:

-a = Abort system shutdown in progress ONLY IF the -t xx timeout option was already set to ANY value other than 0. ALL switches except -l and -m are ignored during abort.

-c "Text" = Text comment (case insensitive) to be displayed in the Message area of the System Shutdown window. MUST be enclosed between quotes. Maximum allowed 127 ASCII characters.

-d [u][p]:xx:yy = Reason code for shutdown:
u = User code.
p = Planned shutdown code.
xx = Major reason code. Positive integer number less than 256.
yy = Minor reason code. Positive integer number less than 65536.

-f = Force running applications to close without warning.

-i = Display the shutdown interface (GUI). MUST be the first option!

-l = Log off the current user of the local computer (default action). Can NOT be used with the -m option unless the current user has Sysadmin rights, in which case the -m switch takes precedence.

-m \\computername = Remote/network computer name (most always case sensitive) to log off/restart/shut down. Current user MUST have Sysadmin rights to be allowed to use this switch!

-s = Shut down the local computer.

-r = Shut down and restart (reboot) the local computer.

-t xx = Set shutdown timer to timeout for xx seconds. IF NOT specified defaults to 20 seconds. Allowed values between 0 and 99 seconds. The -a switch is the ONLY one that CAN be used during the timeout period.

NOTES:
The dash (-) in front of these switches can be replaced by a forward slash (/).

Spaces are NOT required to separate the shutdown command from ANY following switches, but ARE required to separate ANY switch from its following parameter(s), if any.
For example:

shutdown -s -c "Shutting down!" -t 3

tells your computer to shutdown after waiting for 3 seconds while the System Shutdown window will display text above in the Message area.

Optional: after you're done creating your customized shortcut for shutdown -> right-click on it -> select Properties -> enter your desired key "combo" in the Shortcut Key box (e.g. Ctrl + Alt + End) -> click OK/Apply.
From now on just left-click on your shutdown shortcut or hit that key combination to turn off/restart/log off your computer.

Standard ASCII Character Set

Standard ASCII Character Set= For Bytes
The first 32 values (0 through 31) are codes for things like carriage return and line feed. The space character is the 33rd value, followed by punctuation, digits, uppercase characters and lowercase characters.

0 NUL
1 SOH
2 STX
3 ETX
4 EOT
5 ENQ
6 ACK
7 BEL
8 BS
9 TAB
10 LF
11 VT
12 FF
13 CR
14 SO
15 SI
16 DLE
17 DC1
18 DC2
19 DC3
20 DC4
21 NAK
22 SYN
23 ETB
24 CAN
25 EM
26 SUB
27 ESC
28 FS
29 GS
30 RS
31 US
32
33 !
34 "
35 #
36 $
37 %
38 &
39 '
40 (
41 )
42 *
43 +
44 ,
45 -
46 .
47 /
48 0
49 1
50 2
51 3
52 4
53 5
54 6
55 7
56 8
57 9
58 :
59 ;
60 <
61 =
62 >
63 ?
64 @
65 A
66 B
67 C
68 D
69 E
70 F
71 G
72 H
73 I
74 J
75 K
76 L
77 M
78 N
79 O
80 P
81 Q
82 R
83 S
84 T
85 U
86 V
87 W
88 X
89 Y
90 Z
91 [
92 \
93 ]
94 ^
95 _
96 `
97 a
98 b
99 c
100 d
101 e
102 f
103 g
104 h
105 i
106 j
107 k
108 l
109 m
110 n
111 o
112 p
113 q
114 r
115 s
116 t
117 u
118 v
119 w
120 x
121 y
122 z
123 {
124 |
125 }
126 ~
127 DEL

Name

Abbr.

Size
Kilo

K

2^10 = 1,024
Mega

M

2^20 = 1,048,576
Giga

G

2^30 = 1,073,741,824
Tera

T

2^40 = 1,099,511,627,776
Peta

P

2^50 = 1,125,899,906,842,624
Exa

E

2^60 = 1,152,921,504,606,846,976
Zetta

Z

2^70 = 1,180,591,620,717,411,303,424
Yotta

Y

2^80 = 1,208,925,819,614,629,174,706,176

Slow Loggon Time, one fix for problem

My problem was a 1 min login delay due the aktiveds.dll that loads at startup (thanks to NicTech Networks Inc.). The following advice worked for me so I guess it works for any .dll made by NicTech since they all use the same registry folder....

Open up regedit.exe and find THIS folder. Navigate to it by clicking the +'s to expand
things like you would in Windows explorer:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Guardian


Right click over "Guardian" in the left pane.
Left click on "Permissions"
Left click "SYSTEM" once to highlight it.
Check "deny" in all boxes that you can at the bottom (Probably only 2)
Left click Apply
Left Click OK

Say "OK" to any warnings about permissions
**Reboot** the system

then problems solved

I got this information from another forum. I had this problem for about six weeks and was just about ready to reformat my hard drive. Worked great for me, hope this helps out somebody else.

Reregister All .dll Files Within Registry

I ran across this the other day on another site and I thought that a couple people might find it helpful, so here we go:


1) First go Start/Run, and type in 'cmd' to bring up the Command Prompt.

2) Type 'CD \' and hit enter.

3) Type 'DIR *.dll /s /b > regdll.bat' and hit enter.

4) Type 'Notepad regdll.bat' and hit enter.

Now Notepad is going to bring up a list of your .dll files, nevermind that for a moment.

---

5) Now type 'Path' and hit enter to see your current path. It will bring up something like: Path=c:\Windows;c:\windows\Command

6) (supplement your Windows Version, ex: C:\WINNT, or C:\Windows) Now type: 'Path=c:\windows;c:\windows\Command;c:\Windows\Prog
ram~\Accessories' and hit enter.

7) Verify again by typing 'Path' and hitting enter, and then type: 'C:\WINNT\System32\Regsvr32.exe /s C:\' and hit enter again.

8) Now, go back to Notepad and if you have Win98 use the replace feature in Wordpad (CTRL + H) or notepad to search for 'C:\' and replace it with this: 'C:\Windows\System\Regsvr32.exe /s C:\'

If you have Win2000, etc. use the replace command in note pad to search for 'C:\' and replace it with this: 'C:\WINNT\System32\Regsvr32.exe /s C:\'

*Be sure to type the replace string exactly like above or it won't work*

9) Use "Replace All" to make the changes to the entire file.

10) When it finishes, save it, exit notepad or wordpad, and return to the Command Prompt.

11) Type 'regdll' and press enter. If you followed the above steps correctly it will now go through and re-register all your .dll files.

Creating Universal Ghost Usb Boot Disk And Cd

If you want to use Norton Ghost 2003 to create an image of a PC's primary partition you will find it has 2 serious limitations:
1- The USB support driver they use (from Iomega) can only be installed in USB1 or USB2 mode (not both), and it is not universal - it didn't recognize my external USB IBM mobile HD .
2- You can't create a Ghost bootable CD - only a floppy. How can you clone a newly bought laptop, most of which don't have a floppy anymore?
Here's How to:
1- create a Ghost floppy with USB support (1 or 2 - it won't matter later)
2- download 2 files kxlrw40an.exe and mhairu.zip
CODE

http://panasonic.co.jp/pcc/products/drive/cdrrw/kxlrw40an/driver/kxlrw40an.exe


CODE

http://www.stefan2000.com/darkehorse/PC/DOS/Drivers/USB/mhairu.zip


From the first file (Panasonic driver for a USB CDRW) you will need the file usbaspi.sys found under "F2H" sub directory after extraction of the downloaded archive. From the second archive you need di1000dd.sys
3- Copy these 2 files to the USB folder on the Ghost floppy, and delete any other files in that folder. Also delete the file guest.exe from the floppy's root.
4- And finaly:
edit the AUTOEXEC.BAT file - delete the line: guest.exe
and edit CONFIG.SYS - delete all entries and enter:
device=usb\USBASPI.SYS /v /e /o /u
device=usb\Di1000dd.SYS
LASTDRIVE = Z

That's it. You can now boot with this floppy and have full USB support so you can create the image on an external USB drive.

If you want to create a bootable CD you can use Nero:
Choose to create a "CD-ROM (boot)" from the wizard, under Boot tab leave the default "bootable logical drive: as A:\ . Insert your Ghost floppy to the drive, drag all the files from the floppy to "New compilation" and burn. You now have a bootable Ghost CD that even Symantec doesn't have..

PS if you need Norton Ghost 2003 get the full retail here:
CODE

http://soft.zmdinfo.ha.cn/system/Norton.Ghost.2003%E6%AD%A3%E5%BC%8F%E9%9B%B6%E5%94%AE%E7%89%88.iso.rar

Change The Default Location For Installing Apps

-----------------------------------------------

As the size of hard drives increase, more people are using partitions to separate and store groups of files.

XP uses the C:\Program Files directory as the default base directory into which new programs are installed. However, you can change the default installation drive and/ or directory by using a Registry hack.

Go to :-

- Start > Run

- Type “regedit” (without “” NOOBS!)

- Go to this directory…
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion

- Look for the value named ProgramFilesDir. by default,this value will be C:\Program Files. Edit the value to any valid drive or folder and XP will use that new location as the default installation directory for new programs.

Anonymity of Proxy

The exchange of information in Internet is made by the "client - server" model. A client sends a request (what files he needs) and a server sends a reply (required files). For close cooperation (full understanding) between a client and a server the client sends additional information about itself: a version and a name of an operating system, configuration of a browser (including its name and version) etc. This information can be necessary for the server in order to know which web-page should be given (open) to the client. There are different variants of web-pages for different configurations of browsers. However, as long as web-pages do not usually depend on browsers, it makes sense to hide this information from the web-server.

What your browser transmits to a web-server:
a name and a version of an operating system
a name and a version of a browser
configuration of a browser (display resolution, color depth, java / javascript support, ...)
IP-address of a client
Other information

The most important part of such information (and absolutely needless for a web-server) is information about IP-address. Using your IP it is possible to know about you the following:
a country where you are from
a city
your provider?s name and e-mail
your physical address

Information, transmitted by a client to a server is available (accessible) for a server as environment variables. Every information unit is a value of some variable. If any information unit is not transmitted, then corresponding variable will be empty (its value will be undetermined).

These are some environment variables:

REMOTE_ADDR ? IP address of a client

HTTP_VIA ? if it is not empty, then a proxy is used. Value is an address (or several addresses) of a proxy server, this variable is added by a proxy server itself if you use one.

HTTP_X_FORWARDED_FOR ? if it is not empty, then a proxy is used. Value is a real IP address of a client (your IP), this variable is also added by a proxy server if you use one.

HTTP_ACCEPT_LANGUAGE ? what language is used in browser (what language a page should be displayed in)

HTTP_USER_AGENT ? so called "a user?s agent". For all browsers this is Mozilla. Furthermore, browser?s name and version (e.g. MSIE 5.5) and an operating system (e.g. Windows 98) is also mentioned here.

HTTP_HOST ? is a web server?s name

This is a small part of environment variables. In fact there are much more of them (DOCUMENT_ROOT, HTTP_ACCEPT_ENCODING, HTTP_CACHE_CONTROL, HTTP_CONNECTION, SERVER_ADDR, SERVER_SOFTWARE, SERVER_PROTOCOL, ...). Their quantity can depend on settings of both a server and a client.

These are examples of variable values:

REMOTE_ADDR = 194.85.1.1
HTTP_ACCEPT_LANGUAGE = ru
HTTP_USER_AGENT = Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
HTTP_HOST = www.webserver.ru
HTTP_VIA = 194.85.1.1 (Squid/2.4.STABLE7)
HTTP_X_FORWARDED_FOR = 194.115.5.5

Anonymity at work in Internet is determined by what environment variables "hide" from a web-server.

If a proxy server is not used, then environment variables look in the following way:

REMOTE_ADDR = your IP
HTTP_VIA = not determined
HTTP_X_FORWARDED_FOR = not determined

According to how environment variables "hided" by proxy servers, there are several types of proxies
Transparent Proxies

They do not hide information about your IP address:

REMOTE_ADDR = proxy IP
HTTP_VIA = proxy IP
HTTP_X_FORWARDED_FOR = your IP

The function of such proxy servers is not the improvement of your anonymity in Internet. Their purpose is information cashing, organization of joint access to Internet of several computers, etc.
Anonymous Proxies

All proxy servers, that hide a client?s IP address in any way are called anonymous proxies

Simple Anonymous Proxies

These proxy servers do not hide a fact that a proxy is used, however they replace your IP with its own:
REMOTE_ADDR = proxy IP
HTTP_VIA = proxy IP
HTTP_X_FORWARDED_FOR = proxy IP

These proxies are the most widespread among other anonymous proxy servers.

Distorting Proxies

As well as simple anonymous proxy servers these proxies do not hide the fact that a proxy server is used. However a client?s IP address (your IP address) is replaced with another (arbitrary, random) IP:

REMOTE_ADDR = proxy IP
HTTP_VIA = proxy IP
HTTP_X_FORWARDED_FOR = random IP address
High Anonymity Proxies

These proxy servers are also called "high anonymity proxy". In contrast to other types of anonymity proxy servers they hide a fact of using a proxy:

REMOTE_ADDR = proxy IP
HTTP_VIA = not determined
HTTP_X_FORWARDED_FOR = not determined

That means that values of variables are the same as if proxy is not used, with the exception of one very important thing ? proxy IP is used instead of your IP address.
Summary

Depending on purposes there are transparent and anonymity proxies. However, remember, using proxy servers you hide only your IP from a web-server, but other information (about browser configuration) is accessible!

10 reasons why PCs crash U must Know

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1 Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4 Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5 Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6 Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).

7 Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8 Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

9 Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10 Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

20 Great Google Secrets

http://www.pcmag.com/article2/0,4149,1306756,00.asp

excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif



Google is clearly the best general-purpose search engine on the Web (see

www.pcmag.com/searchengines

But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google's index, it's still a struggle to pare results to a manageable number.

But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google's search options go beyond simple keywords, the Web, and even its own programmers. Let's look at some of Google's lesser-known options.

Syntax Search Tricks

Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at

www.google.com/help/operators.html

. Here are some advanced operators that can help narrow down your search results.

Intitle: at the beginning of a query word or phrase (intitle:"Three Blind Mice") restricts your search results to just the titles of Web pages.

Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you're searching for might commonly appear in URLs. If you're looking for the term HTML, for example, and you don't want to get results such as

www.mysite.com/index.html

, you can enter intext:html.

Link: lets you see which pages are linking to your Web page or to another page you're interested in. For example, try typing in

link:http://www.pcmag.com


Try using site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:"Mark Twain"site:edu. Experiment with mixing various elements; you'll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.

Swiss Army Google

Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature

(www.google.com/help/features.html#calculator)

lets you do both math and a variety of conversions from the search box. For extra fun, try the query "Answer to life the universe and everything."

Let Google help you figure out whether you've got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try "thre blund mise") and Google may suggest a proper spelling. This doesn't always succeed; it works best when the word you're searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you're searching for "three blind mice," underneath the search window will appear a statement such as Searched the web for "three blind mice.") You'll discover that you can click on each word in your search phrase and get a definition from a dictionary.

Suppose you want to contact someone and don't have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you'll see it at the top of the search results along with a map link to the address. If you'd rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you'd rather use a search form for business phone listings, try Yellow Search

(www.buzztoolbox.com/google/yellowsearch.shtml).




Extended Googling

Google offers several services that give you a head start in focusing your search. Google Groups

(http://groups.google.com)

indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: Froogle
CODE
(http://froogle.google.com),

which indexes products from online stores, and Google Catalogs
CODE
(http://catalogs.google.com),

which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google's tools and services at

www.google.com/options/index.html

You're probably used to using Google in your browser. But have you ever thought of using Google outside your browser?

Google Alert

(www.googlealert.com)

monitors your search terms and e-mails you information about new additions to Google's Web index. (Google Alert is not affiliated with Google; it uses Google's Web services API to perform its searches.) If you're more interested in news stories than general Web content, check out the beta version of Google News Alerts

(www.google.com/newsalerts).

This service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)

Google on the telephone? Yup. This service is brought to you by the folks at Google Labs

(http://labs.google.com),

a place for experimental Google ideas and features (which may come and go, so what's there at this writing might not be there when you decide to check it out). With Google Voice Search

(http://labs1.google.com/gvs.html),

you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don't expect 100 percent success.

In 2002, Google released the Google API (application programming interface), a way for programmers to access Google's search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you'll need an API key, which is available free from
CODE
www.google.com/apis

. See the figures for two more examples, and visit

www.pcmag.com/solutions

for more.

Thanks to its many different search properties, Google goes far beyond a regular search engine. Give the tricks in this article a try. You'll be amazed at how many different ways Google can improve your Internet searching.


Online Extra: More Google Tips


Here are a few more clever ways to tweak your Google searches.

Search Within a Timeframe

Daterange: (start date–end date). You can restrict your searches to pages that were indexed within a certain time period. Daterange: searches by when Google indexed a page, not when the page itself was created. This operator can help you ensure that results will have fresh content (by using recent dates), or you can use it to avoid a topic's current-news blizzard and concentrate only on older results. Daterange: is actually more useful if you go elsewhere to take advantage of it, because daterange: requires Julian dates, not standard Gregorian dates. You can find converters on the Web (such as

CODE
http://aa.usno.navy.mil/data/docs/JulianDate.html

excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif


), but an easier way is to do a Google daterange: search by filling in a form at

www.researchbuzz.com/toolbox/goofresh.shtml or www.faganfinder.com/engines/google.shtml

. If one special syntax element is good, two must be better, right? Sometimes. Though some operators can't be mixed (you can't use the link: operator with anything else) many can be, quickly narrowing your results to a less overwhelming number.

More Google API Applications

Staggernation.com offers three tools based on the Google API. The Google API Web Search by Host (GAWSH) lists the Web hosts of the results for a given query

(www.staggernation.com/gawsh/).

When you click on the triangle next to each host, you get a list of results for that host. The Google API Relation Browsing Outliner (GARBO) is a little more complicated: You enter a URL and choose whether you want pages that related to the URL or linked to the URL

(www.staggernation.com/garbo/).

Click on the triangle next to an URL to get a list of pages linked or related to that particular URL. CapeMail is an e-mail search application that allows you to send an e-mail to google@capeclear.com with the text of your query in the subject line and get the first ten results for that query back. Maybe it's not something you'd do every day, but if your cell phone does e-mail and doesn't do Web browsing, this is a very handy address to know.

Friday, July 17, 2009

3 ways of bypass the StarForce CD Protection

Hello, i'm gonna post here 3 ways of bypass the StarForce CD Protection that comes with some games.

First:

1) Do not put any cd...;
2) Run Daemon-Tools with RMPS on (don't know how necessary is this);
3) Run the game...it will say Error, No CD Found or something like this;
4) Turn off Daemon-Tools rpms...
5) Eject the CDrom/DVDrom and put it in...and when it's beginning to retract back the CD tray... i click retry immediately! Before it even goes in.

When doing this i get 100% success loading the game with the backup CD!...If i waited until the CD goes all the way in, it never worked for me.

================================================================================


Second:

1) CD1 & CD2 has to be burned on a 700MB CD-R or CD-RW, burn CD3 on a 700MB CD-RW!!!
2) Select the following preferences with Alcohol 120% and then burn the CD:

Filetype:...............................:Useradvan ced (as the user want´s it?)
Murnmethod:.........................AO/SAO
Buffer Underrun Technology activate:.oh.gifN
Don´t Close The Last Session:........:OFF
Ignore EFM Error :.....................:OFF
Correct Sub-Channel :................oh.gifN (default)
"RMPS" write on disc (or write on medium I don´t know):............:OFF

3) Install the game and start it;
4) Reboot your pc that the Starforce 3 driver is going to activate itsself;
5) Insert the disc 3 an play the game;

NOTE: Before the Start you aren´t allowed to activate Emulations with alcohol or to run any kind of deamontool
Don´t Mount the Images! The game starts only if you have Disc 3 in your drive!

Addition:
Burn CD1, CD2, CD3 as it´s described in the upper part, than remove alcohol 120.

Remove all CD´s of your drives.
Start Deamon-Tools and activate RMPS.

Start Panzers.
Than there is a ERROR: CD not found (or something like that)- but thats ok.

Now deactivate the RMPS in your DeamonTools but still run the program in the background . Deactivate only PMPS . Now insert CD3 to your drive an click on the button retry

Now the game starts.

================================================================================



Third:

1) Install D-Day;
2) Shut Down PC;
3) Turn off the power from yor CD/DVD-Roms manually;
4) Turn on your PC;
5) Mount the D-Day CD1 with Deamon-Tools, use RMPS Emulation;
6) Play and have fun.

Top Five Myths About Safe Surfing

PC Magazine.
November 19, 2003


Recently PC Magazine conducted a survey that asked participants to rate their broadband ISP services. We found out that many users don't completely understand the seriousness of potential threats or how to protect their PCs. The following are responses to the top five security misconceptions we encountered.

I don't keep important things on my PC, so I don't have to worry about security.


There was a time when this statement was partially true, but that time has long since passed. Current viruses, worms, and other threats, including the famous Love Bug, Nimda, and Blaster, spread blindly across the Internet to thousands or millions of PCs in a matter of hours, without regard for who owns them, what is stored there, or the value of the information they hold. The purpose of such attacks is nothing less than to wreak havoc. If you ignore the reality of these attacks, you are certain to be hit at one time or another. Even if your computer is not attacked directly, it can be used as a zombie to launch a denial-of-service or other attack on a network or to send spam or pornography to other PCs without being traced. Therefore, your civic responsibility is to protect your PC so that others are protected.

I can protect my PC if I disconnect from the Internet or turn it off when I'm not using it.

Wrong. If you connect to the Internet at all, you are a target. You could download a virus when you connect and not activate it until days later when you read your e-mail off-line. Even if you rarely connect to the Internet, you can get a virus from a file off of a network, floppy disk, or USB flash memory drive.

I can protect myself from viruses by not opening suspicious e-mail attachments.

Wrong again. The next virus you get may come from your best friend's or boss' computer if his e-mail address book was used to propagate an attack. Nimda and other hybrid worms can enter through the Web browser. And it is possible to activate some viruses simply by reading or previewing an e-mail. You simply must have a PC-based antivirus package.

I have a Macintosh (or a Linux-based system), not a Windows system, so I don't have to worry about being attacked.

It is true that most attacks target Microsoft Windows–based PCs, but there have been attacks against Mac OS and Linux systems as well. Some experts have predicted that the Mac virus problem will get worse, because Mac OS X uses a version of Unix. And although these systems have some useful security features, they can still be attacked.

My system came with an antivirus package, so I'm protected.

Not quite. First, if you haven't activated your antivirus package to scan incoming traffic automatically, you are not protected against e-mail and Web browser attacks. Second, new threats appear daily, so an antivirus package is only as good as its last update. Activate the auto-update features to stay on top of the latest threats. Third, an antivirus package can't protect you from every threat. In most cases you need a combination of solutions, including, at minimum, antivirus, a personal firewall such as Zone Labs' ZoneAlarm Pro, and a plan for keeping your operating system and software up to date with security patches. Antispyware and antispam utilities (such as PepiMK Software's SpyBot Search & Destroy and Norton AntiSpam 2004) will also help keep you safe.

Using Google for searching ebooks

Google has some fantastic potential for you to find whatever you are after on the internet.

To search for a book / program / file perhaps try the following.

Go to Google's search page and use the following criteria in the search dialog

intitle:index.of? file extension Name of item

e.g. intitle:index.of? chm syngress

This will hopefully give you a listing of all websites that google has cached that contain references to files in CHM format that are published by SYNGRESS.

---------------
I use in Google

+("index of") +("/ebooks"|"/book") +(chm|pdf|zip|rar) +syngress

or

allinurl: +(rar|chm|zip|pdf|tgz) Syngress
Enjoy

How to install System restore on server 2003

Found this on Google, may be useful to someone!



Before we begin, you'll need an XP CD. Doesn't matter if it's home or pro. It shouldn't matter if it has a service pack on it, since all the files will be the same source. In testing i used a slipstreamed cd that already had sp1 on it.

In XP, system restore is installed in syssetup.inf under the inf.always section. If you have XP installed, you can open up %windir%\inf\syssetup.inf and search for [Infs.Always], you'll see the section xp looks at for installing system components. You'll notice it has sr.inf, this is the inf for system restore. For server 2003, if you look at syssetup.inf you won't find sr.inf. This doesn't mean system restore won't work in server 2003, it just means they didn't install it.

So first what we're going to need to do is right click on sr.inf and select 'install', to install it on server 2003. If you have xp installed on another computer/partition you can just right click on it. If you don't, then extract \i386\sr.in_ from the XP cd to your desktop, then right click on it and select 'install'. It'll prompt you where the files are, point it to the XP CD. Once done, it'll prompt to restart, say yes.

That was easy, the next part is the tricky part. After restarting you'll get an error saying the service couldn't start. Specifically the error is error 1068. I searched google and found this link -
CODE
http://www.aerdyne.com/Kbase/article_000005.htm.

The error basically means it cannot run under the service it's on. In system restore's case, it runs under the network service. I know this because in services.msc, for path to executable, it says this: C:\WINDOWS\system32\svchost.exe -k netsvcs. This got me thinking so i opened up sr.inf, and found this line:

[SRSvc_delreg]
HKLM,"Software\Microsoft\Windows NT\CurrentVersion\SvcHost","SRGroup"

I opened up regedit, and this registry key didn't exist. So it seems the sr.inf doesn't register system restore to run under the network services group. Using the above registry key as an example, i opened regedit and went to:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost

On the right hand side i saw netsvcs. I double clicked on it, but saw SRService no where (SRService is the name for system restore). On a hunch, at the bottom i added SRService, rebooted, and this time got no error on startup. I opened up rstrui.exe, and system restore opened fine. I also had a System restore tab in system properties now too. I was able to make a restore point fine, then restore the computer to it without any problems. So in the above key, you want to double click on netsvcs, and at the bottom of the list, you want to type in SRService (probably case sensitive).

If you're not good with the registry you can save the following as a whatever.reg file and import it, but because it's binary i can't say if it'll work. I recommend manually adding SRService to the netsvcs key.

---copy below to whatever.reg then double click on it -----

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost]
"netsvcs"=hex(7):41,00,70,00,70,00,4d,00,67,00,6d,00,74,00,00,00,41,00,75,00,\
64,00,69,00,6f,00,53,00,72,00,76,00,00,00,42,00,72,00,6f,00,77,00,73,00,65,\
00,72,00,00,00,43,00,72,00,79,00,70,00,74,00,53,00,76,00,63,00,00,00,44,00,\
4d,00,53,00,65,00,72,00,76,00,65,00,72,00,00,00,45,00,76,00,65,00,6e,00,74,\
00,53,00,79,00,73,00,74,00,65,00,6d,00,00,00,48,00,69,00,64,00,53,00,65,00,\
72,00,76,00,00,00,49,00,61,00,73,00,00,00,49,00,70,00,72,00,69,00,70,00,00,\
00,49,00,72,00,6d,00,6f,00,6e,00,00,00,4c,00,61,00,6e,00,6d,00,61,00,6e,00,\
53,00,65,00,72,00,76,00,65,00,72,00,00,00,4c,00,61,00,6e,00,6d,00,61,00,6e,\
00,57,00,6f,00,72,00,6b,00,73,00,74,00,61,00,74,00,69,00,6f,00,6e,00,00,00,\
4d,00,65,00,73,00,73,00,65,00,6e,00,67,00,65,00,72,00,00,00,4e,00,65,00,74,\
00,6d,00,61,00,6e,00,00,00,4e,00,6c,00,61,00,00,00,4e,00,74,00,6d,00,73,00,\
73,00,76,00,63,00,00,00,4e,00,57,00,43,00,57,00,6f,00,72,00,6b,00,73,00,74,\
00,61,00,74,00,69,00,6f,00,6e,00,00,00,4e,00,77,00,73,00,61,00,70,00,61,00,\
67,00,65,00,6e,00,74,00,00,00,52,00,61,00,73,00,61,00,75,00,74,00,6f,00,00,\
00,52,00,61,00,73,00,6d,00,61,00,6e,00,00,00,52,00,65,00,6d,00,6f,00,74,00,\
65,00,61,00,63,00,63,00,65,00,73,00,73,00,00,00,53,00,61,00,63,00,73,00,76,\
00,72,00,00,00,53,00,63,00,68,00,65,00,64,00,75,00,6c,00,65,00,00,00,53,00,\
65,00,63,00,6c,00,6f,00,67,00,6f,00,6e,00,00,00,53,00,45,00,4e,00,53,00,00,\
00,53,00,68,00,61,00,72,00,65,00,64,00,61,00,63,00,63,00,65,00,73,00,73,00,\
00,00,54,00,68,00,65,00,6d,00,65,00,73,00,00,00,54,00,72,00,6b,00,57,00,6b,\
00,73,00,00,00,54,00,72,00,6b,00,53,00,76,00,72,00,00,00,57,00,33,00,32,00,\
54,00,69,00,6d,00,65,00,00,00,57,00,5a,00,43,00,53,00,56,00,43,00,00,00,57,\
00,6d,00,69,00,00,00,57,00,6d,00,64,00,6d,00,50,00,6d,00,53,00,70,00,00,00,\
77,00,69,00,6e,00,6d,00,67,00,6d,00,74,00,00,00,77,00,75,00,61,00,75,00,73,\
00,65,00,72,00,76,00,00,00,42,00,49,00,54,00,53,00,00,00,53,00,68,00,65,00,\
6c,00,6c,00,48,00,57,00,44,00,65,00,74,00,65,00,63,00,74,00,69,00,6f,00,6e,\
00,00,00,68,00,65,00,6c,00,70,00,73,00,76,00,63,00,00,00,75,00,70,00,6c,00,\
6f,00,61,00,64,00,6d,00,67,00,72,00,00,00,57,00,6d,00,64,00,6d,00,50,00,6d,\
00,53,00,4e,00,00,00,53,00,52,00,53,00,65,00,72,00,76,00,69,00,63,00,65,00,\
00,00,00,00


--- copy above --------------------------------------------------------

That's it! Remember to restart both times.

When Good Discs Go Bad

Ever wonder what makes a disc bad? Here's why they vary in quality, and why you should worry about the discs you've entrusted with your data.

Melissa J. Perenson, PC World
Tuesday, June 15, 2004

Burning CDs and DVDs is the easy part.

Knowing your data will be there when you go back to it days, months, or even years later--well, that's a bit harder. Not all discs are created equal, as Fred Byers, information technology specialist at the National Institute of Standards and Technology, can attest.

Byers is part of a team heading up an independent study of DVD media quality. Based on the first wave of testing results, the situation is murky at best.

"We've found the quality varies, depending upon the type of dye used to make the write-once discs and [on the] the manufacturer," reports Byers. Even discs from the same manufacturer, with the same brand, can test differently, Byers adds. "But there was more of a significant difference when you compared discs between manufacturers," he explains.

DVD Media Quality: The First Tests

In the first phase of testing, completed late last year, NIST focused on the most popular media: write-once, single-layer DVD-R and +R discs. Rewritable discs will be tested in the second phase, slated to start this fall. An interesting footnote to the study's methodology: NIST uses media purchased off store shelves and via Web sites; and while researchers are tracking the media by brand, they are not tracking the specific factory source of the media tested. For example, a given manufacturer's discs could originate from different production lines, which could account for a variation in disc quality by the same manufacturer.

Hearing that there's a difference between the generic, unbranded 100-spindle value-pack of media purchased online and the branded offerings you might find on a Best Buy store shelf is not surprising. After all, as David Bunzel, president of the Optical Storage Technology Association, points out: "With a generic product, there's no consumer recourse. It's buyer beware."

If a disc isn't properly manufactured, the consequences can be dire. At best, the disc will fail immediately during the burn process; this is a best-case scenario because then you know from the start that the disc is faulty. At worst, you may get an abundance of errors during the burn process. These errors won't interrupt the burning process, and since write-once and rewritable DVD media have built-in error correction to compensate for scratches and other abnormalities on the disc (as do their CD cousins), any errors will be virtually invisible to you. You'll only know they're there if you use a disc diagnostics program, such as those offered by Ahead Software or Plextor. Nor will these errors affect the playback of the disc--initially.

Down the road, however, such invisible-to-the-eye errors can reduce the effectiveness of a DVD's built-in error correction so that if some other issue develops on your disc, such as a scratch, you could end up with an unreadable disc when you go back to it months or years later.

But what would cause such a wide disparity in media quality between branded discs from the same vendor?

"We don't know why it's different--it could be a different dye, it could be a different manufacturing process," notes Byers. "Manufacturers are constantly trying to improve their dye formulas--in theory improving the disc."

Nonetheless, at the same time, competitive forces are driving manufacturers to find ways to economize on production costs. And cost-cutting measures can result in discs that don't perform as well as those generated during an earlier production run, either in terms of failing outright or not burning at the maximum possible speed on a given DVD drive. "It varies over time, as the output changes," Byers says.

Brand Disparity

As for the disparity between brands that NIST found, the distinguishing factors come down to quality control and the dyes used in disc production. Declining to name names, Byers points out that "some manufacturers make their own discs, and some purchase them from someplace else--which opens you to variations in the manufacturing plant, or changes in the source [of that media]."

Vendors like Maxell and Verbatim manufacture discs on their own production lines, as do Asian manufacturers CMC Magnetics, RiData, Taiyo Yuden, and others; other name brands contract with a third-party manufacturer to produce discs to their own specs; and still others just buy third-party-produced media wholesale, without imposing their own set of quality controls on the media production.

The intricacies of disc production and quality control aren't the only variables that seem to affect media. More surprising is the number of discs that seem to have a propensity for specific hardware.

"One thing we've found in compatibility testing [of DVD-R and +R media] is that it's a relationship between a specific brand of media and the manufacturer of the hardware," observes Byers. "There was no one drive that played every single type of compatible media, and there was no one media brand that played perfectly in every drive."

And, he adds, sounding as frustrated as any consumer might, "You can't say there's a clear, delineated set of reasons as to why."

A Grading System?

One of the most common questions I hear is, "What's a good brand of media to buy?" DVD and CD media are so commonplace nowadays that it's easy to forget the complexities that go into producing them. And if anything in that production process is off, it could, in time, affect the integrity of the data you've burned to a disc.

"It's very tough to answer that kind of question, because there are so many variables," says Byers. "You don't get 100 percent yield when you manufacture these discs. We can talk about the materials that produce a good disc, but it also has to do with the manufacturing process. So, just to say the materials to look for doesn't necessarily relate to it being a better disc." The same is true vice versa.

So how can you know that the media you're using will last you for the duration, so those archived photos will still be there when you go back to a disc 20 years from now--or more?

For the moment, you can't. All DVD and CD vendors make vague claims about disc life expectancy being somewhere between 60 and 100 years--when the discs are treated with care and stored properly.

But NIST's Byers is seeking to change that. At an OSTA meeting in San Francisco this week, Byers is proposing an industry-wide grading system to indicate disc quality.

Byers is motivated by the desire to see a uniform mechanism in place to guide institutions and individuals who'll be storing data, music, videos, and images for long periods of time. "They need to be confident in their purchasing, so they can plan for their strategies in storing their information," Byers says. "Long-term storage has different meanings: For some, 30 years might be enough. For others, 50 or 75 years might be archive, or long-term, quality."

Longevity

Under Byers's proposal, a series of tests would be developed to determine whether a DVD would last for a given number of years. "If you were to purchase a disc in a store with a grade that indicates it has passed a test to last X number of years, it removes a lot of uncertainty for the consumer, and it can save some expense in premature migration [to a new storage technology], or loss of data because they waited too long [and the disc was no longer playable]," he says.

Although some archivists--both individual and professional--are concerned about whether today's digital storage mediums will be readable 50 or 100 years from now, Byers believes the bigger concern for users will be when to migrate their data to the next technology, "before the existing technology is obsolete."

The Disc Rot Myth

Media obsolescence isn't the only thing people fear after committing a personal library's worth of data to CDs and DVDs. But some worries--namely, fear of disc rot--are not fully warranted.

Like a bad seed, the myth of disc rot self-perpetuates, cropping up every now and again as a sudden and mortal threat to your copious collection of prerecorded and self-created discs.

The myth was once rooted in fact. It is true that back in the 1980s, with the first generation of prerecorded audio CDs, the edges of the discs were not always sealed properly, which allowed moisture to get into the disc. Replicated, prerecorded discs use aluminum for the reflective layer; when moisture came into contact with the aluminum on prerecorded discs, explains Byers, it in turn oxidized, causing the aluminum to become dull. "That's where the term 'rot' started," he says.

But that problem was quickly identified and overcome. "The manufacturers learned what was going on, so now the edges of discs are sealed with a lacquer," according to Byers. Though the problem is typically associated with CDs, Byers notes that the potential for interaction with oxygen is the same with both CD-ROMs and DVD-ROMs.

The so-called rot issue does not apply to recordable discs. For one thing, recordable optical media do not use aluminum; instead, they use silver, and very rarely gold, or a silver-gold alloy, for the reflective layer. "If the silver comes into contact with sulfates [i.e., pollution, or high humidity], it could affect the silver, but the likelihood of that is less than the likelihood of moisture coming into contact with the aluminum on prerecorded discs," says Byers.

Enduring Myth

The term rot has persisted, however inaccurately, as a means of identifying a plethora of problems with optical discs. "If you get a faulty disc and see a problem that you can visually see, you call it rot, but it could be the way the disc was manufactured," says Byers. "Or if it was subjected to extreme moisture and that moisture came into contact with the aluminum, it could be that the reflectivity has changed. It's not really rot, it's oxidation of aluminum. It should be a rare event on a disc, unless it's defective."

Beyond the realm of defective discs, improper handling can cause otherwise good discs to go bad. Since there's little protection between the label side of a CD and the data layer itself, "scratches on the label side can scratch the metal, and that will ruin the data," says Byers. It's not an issue for DVDs, though, since the dye layer is sandwiched between two plastic layers.

Byers observed a similar problem occurring with press-on labels: "For long-term storage, we recommend not using press-on labels on CDs; when these start to dry up, they can peel the metal right up, damaging data."

WinRar Tutorial

FIRST - Set Yer options correctly

Open WInRar

OPTIONS | SETTINGS | COMPRESSSION | CREATE DEFAULT

GENERAL | (ok now that we're there, here's what U do next)

But 1st -> realize that everything U set on the default profile will occur everytime U rar files. So if U only need a password occasionally, or other special settings, then create another profile for those purposes. U can change which profile U need to use when WinRar is open. The Default profile is used otherwise, such as when using WinRar from the context menus in explorer.

General tab:

Archive format RAR
Compression method BEST

size (enter in BYTES the size you want as the max single Rar file). I use 51,200,000 (50,000 KB x 1024). But chose yer max size as U wish.

Update method ADD AND REPLACE FILES

Archiving options: check > PUT RECOVERY RECORD

Archiving options: check > TEST ARCHIVED FILES.

Archiving options: check > DELETE FILES AFTER ARCHIVING ( unless U want yer HDD to fill up with the rars & the original files for some reason)

Archiving options: do NOT check > Put authenticy verification, as this can be a source of Error Messages being generated upon extraction.

Archiving options: check > Create SFX ONLY if U don't expect the person getting the filez to have WinRar. Otherwise leave it UNCHECKED.

Archiving options: do NOT check > Create Solid Archive. This can cause problems in certain cases.

Archiving options: do NOT check > Lock Arhive. This has NOTHING to do with a password.



Advanced tab:


Recovery Record -> U can leave it at 1%. Only set it higher if U expect the rar files to have a high risk of corruption. (very bad internet connections, or use on floppy disks, etc)

All else can be left alone. Don't bother with the Compression button.



Files Tab


File Paths -> STORE RELATIVE PATHS. (unless U have a specific folder U want the files to be extracted to. Such as c:\program files\No Name Appz\link catcher).

The rest leave alone



Backup Tab


No need to change anything.



Time Tab


Files to Process -> OF ANY TIME



Comment Tab


Whatever comment U enter there will be shown on the right hand pane when WinRar opens yer Rar files. Think of something fun, catchy,interesting. I always mention that the files have recovery record set, so if they are corrupted in transfer, the person knows to use REPAIR function.



Click OK, U have now created yer default profile.

==============================================

HOW TO CREATE a PASSWORDED PROFILE, which will NOT be the default:


open WInRar

Click the ADD Icon

ADVANCED | Push the SET PASSWORD Button

Check the SHOW PASSWORD box, so U can see what U typed and also copy/paste it to wherever U need it, such as on yer post. Now only one box will be open to enter the password. COPY/PASTE it to a txt file. I call mine WinRAR_Password.txt. Do this IMMEDIATELY afer entering it, before closing that window, or U may be very sorry later.

Enter the password. It is CASE SENSITIVE. If the password is 8 or more alpha-numeric characters, no one will be able to hack it. Unless they own a super-computer. Avoid using words that are found in dictionaries.

Check the encrypt file names box. That way, even if some nasty person obtains yer Rar file, they won't know what is in it, especially if the name U give the rar file is "Grandma_pix.rar" or whatever.

Back to GENERAL tab | PROFILES button | Save Current Settings to a New Profile

Enter the name of this profile. For example if the passwd is ht*p://www.superforum.com, U might name the profile Superforum. Only U will see this profile name. It does not go into the rar files made from it.

Do NOTHING more, do NOT set this as default profile.

Click OK | Click OK again.

Now U have a Passworded Profile.



================================================

HOW TO USE the PASSWORD PROFILE
Note -> Everything U set on the default profile will occur everytime U rar files. So when U need the password profile, follow these instructions. The Default profile is used otherwise, such as when using WinRar from the contest menus in explorer.



Open WinRar

Browse to the filez/folderz U want to Rar with Password.

Highlight all filez/folderz to be included.

Press the ADD button.

GENERAL tab | PROFILES button

Scoll down to the profile whcih has the password set. In my example Superforum

Click OK

The filez are Rar'd. U can check if U did all correctly by opening the rar filez, and seeing if a password is required.

Until U change back to DEFAULT profile in this same method, or close WinRar, all Rar'z U create after this will have a password.



================================================

HOW TO REPAIR A CORRUPTED RAR FILE:



With Win Explorer create a sub folder REPAIRED

Open WinRar, browse to the folder with the damaged Rar file(z). U can find which one is bad by selecting the 1st RAR file and using TEST button.

Select the damaged file, press REPAIR button.

In dialogue box, enter the path to the REPAIR subfolder, or browse to it.

As long as there is a RECOVERY record in that Rar, it will be repaired.

Copy all the NON-DAMAGED rars to your repair folder and rename the REPAIRED file back to it's original name.

Proceed with extraction in the REPAIR folder as normal.



===============================================

MISC TIPS:



If U select a folder to Rar, later when U extract it inside that folder, U end up with nested folders of same name. (We've all seen this often when extracting rars.

So Instead, go inside the folder, select all the filez & sub-folderz. Now U have a rar inside just one folder.




Note to w***z Groups, how about using WinRar Recovery option finally, and avoiding problems with corrupt DL's ?

WINDOWS TRUE HIDDEN FILES

--ACRONYMS--
DOS = Disk Operating System, or MS-DOS
MSIE = Microsoft Internet Explorer
TIF = Temporary Internet Files (folder)
HD = Hard Drive
OS = Operating System
FYI = For Your Information

1)SEEING IS BELIEVING
No. Enabling Windows Explorer to "show all files" does not show the files in mention. No. DOS does not
list the files after receiving a proper directory listing from root. And yes. Microsoft intentionally
disabled the "Find" utility from searching through one of the folders.

Oh, but that's not all.

To see for yourself simply do as you would normally do to clear your browsing history. Go to Internet
Options under your Control Panel. Click on the [Clear History] and [Delete Files] buttons. (Make sure
to include all offline content.)

So, has your browsing history been cleared? One would think so.

These are the names and locations of the "really hidden files":

c:\windows\history\history.ie5\index.dat
c:\windows\tempor~1\content.ie5\index.dat
If you have upgraded MSIE several times, they might have alternative names of mm256.dat and
mm2048.dat, and may also be located here:

c:\windows\tempor~1\
c:\windows\history\
Not to mention the other alternative locations under:

c:\windows\profiles\%user%\...
c:\windows\application data\...
c:\windows\local settings\...
c:\windows\temp\...
c:\temp\...
(or as defined in your autoexec.bat.)

FYI, there are a couple other index.dat files that get hidden as well, but they are seemingly not very
important. See if you can find them.

2)IF YOU HAVE EVER USED MICROSOFT INTERNET EXPLORER
1) Shut your computer down, and turn it back on.
2) While your computer is booting keep pressing the [F8] key until you are given an option screen.
3) Choose "Command Prompt Only" (This will take you to true DOS mode.) Windows ME users must use a boot
disk to get into real DOS mode.
4) When your computer is done booting, you will have a C:\> followed by a blinking cursor.
Type this in, hitting enter after each line. (Obviously, don't type the comments in parentheses.)

C:\WINDOWS\SMARTDRV (Loads smartdrive to speed things up.)
CD\
DELTREE/Y TEMP (This line removes temporary files.)
CD WINDOWS
DELTREE/Y COOKIES (This line removes cookies.)
DELTREE/Y TEMP (This removes temporary files.)
DELTREE/Y HISTORY (This line removes your browsing history.)
DELTREE/Y TEMPOR~1 (This line removes your internet cache.)

(If that last line doesn't work, then type this

CD\WINDOWS\APPLIC~1
DELTREE/Y TEMPOR~1

(If that didn't work, then type this

CD\WINDOWS\LOCALS~1
DELTREE/Y TEMPOR~1
If you have profiles turned on, then it is likely located under \windows\profiles\%user%\, while older
versions of MSIE keep them under \windows\content\.)

FYI, Windows re-creates the index.dat files automatically when you reboot your machine, so don't be
surprised when you see them again. They should at least be cleared of your browsing history.

3)CLEARING YOUR REGISTRY
It was once believed that the registry is the central database of Windows that stores and maintains the
OS configuration information. Well, this is wrong. Apparently, it also maintains a bunch of other
information that has absolutely nothing to do with the configuration. I won't get into the other
stuff, but for one, your typed URLs are stored in the registry.

HKEY_USERS/Default/Software/Microsoft/Internet Explorer/TypedURLs/
HKEY_CURRENT_USER/Software/Microsoft/Internet Explorer/TypedURLs/
These "Typed URLs" come from MSIE's autocomplete feature. It records all URLs that you've typed in manually
in order to save you some time filling out the address field.

4)SLACK FILES
As you may already know, deleting files only deletes the references to them. They are in fact still sitting
there on your HD and can still be recovered by a very motivated person.
Use window washer to delete slack files. /http://www.webroot.com/download/0506/reg3ww.exe

5)STEP-BY-STEP GUIDE THROUGH YOUR HIDDEN FILES
The most important files to be paying attention to are your "index.dat" files. These are database files
that reference your history, cache and cookies. The first thing you should know is that the index.dat files
is that they don't exist in less you know they do. They second thing you should know about them is that
some will *not* get cleared after deleting your history and cache.

To view these files, follow these steps:

In MSIE 5.x, you can skip this first step by opening MSIE and going to Tools > Internet Options > [Settings] > [View Files].
Now write down the names of your alphanumeric folders on a piece of paper. If you can't see any alphanumeric
folders then start with step 1 here:

1) First, drop to a DOS box and type this at prompt (in all lower-case). It will bring up Windows Explorer
under the correct directory.

c:\windows\explorer /e,c:\windows\tempor~1\content.ie5\
You see all those alphanumeric names listed under "content.ie5?" (left-hand side.) That's Microsoft's
idea of making this project as hard as possible. Actually, these are your alphanumeric folders that was
created to keep your cache. Write these names down on a piece of paper. (They should look something like
this: 6YQ2GSWF, QRM7KL3F, U7YHQKI4, 7YMZ516U, etc.) If you click on any of the alphanumeric folders then
nothing will be displayed. Not because there aren't any files here, but because Windows Explorer has lied
to you. If you want to view the contents of these alphanumeric folders you will have to do so in DOS.

2) Then you must restart in MS-DOS mode. (Start > Shutdown > Restart in MS-DOS mode. ME users use a
bootdisk.)

Note that you must restart to DOS because windows has locked down some of the files and they can only be
accessed in real DOS mode.

3) Type this in at prompt:

CD\WINDOWS\TEMPOR~1\CONTENT.IE5
CD %alphanumeric%
(replace the "%alphanumeric%" with the first name that you just wrote down.)

DIR/P
The cache files you are now looking at are directly responsible for the mysterious erosion of HD space
you may have been noticing.

5) Type this in:

CD\WINDOWS\TEMPOR~1\CONTENT.IE5
EDIT /75 INDEX.DAT
You will be brought to a blue screen with a bunch of binary.

6) Press and hold the [Page Down] button until you start seeing lists of URLs. These are all the sites
that you've ever visited as well as a brief description of each. You'll notice it records everything
ou've searched for in a search engine in plain text, in addition to the URL.

7) When you get done searching around you can go to File > Exit. If you don't have mouse support in DOS
then use the [ALT] and arrow keys.

Next you'll probably want to erase these files by typing this:

C:\WINDOWS\SMARTDRV
CD\WINDOWS
DELTREE/Y TEMPOR~1
(replace "cd\windows" with the location of your TIF folder if different.)

9) Then check out the contents of your History folder by typing this:

CD\WINDOWS\HISTORY\HISTORY.IE5
EDIT /75 INDEX.DAT
You will be brought to a blue screen with more binary.

10) Press and hold the [Page Down] button until you start seeing lists of URLS again.

This is another database of the sites you've visited.

11) And if you're still with me, type this:

CD\WINDOWS\HISTORY
12) If you see any mmXXXX.dat files here then check them out (and delete them.) Then:

CD\WINDOWS\HISTORY\HISTORY.IE5
CD MSHIST~1
EDIT /75 INDEX.DAT
More URLs from your internet history. Note, there are probably other mshist~x folders here so you can
repeat these steps for every occurence if you please.

13) By now, you'll probably want to type in this:

CD\WINDOWS
DELTREE/Y HISTORY

6)HOW MICROSOFT DOES IT
How does Microsoft make these folders/files invisible to DOS?

The only thing Microsoft had to do to make the folders/files invisible to a directory listing is to
set them +s[ystem]. That's it.

So how does Microsoft make these folders/files invisible to Windows Explorer?

The "desktop.ini" is a standard text file that can be added to any folder to customize certain aspects of
the folder's behavior. In these cases, Microsoft utilized the desktop.ini file to make these files
invisible. Invisible to Windows Explorer and even to the "Find: Files or Folders" utility. All that
Microsoft had to do was create a desktop.ini file with certain CLSID tags and the folders would disappear
like magic.

To show you exactly what's going on:

Found in the c:\windows\temporary internet files\desktop.ini and
the c:\windows\temporary internet files\content.ie5\desktop.ini is this text:

[.ShellClassInfo]
UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933}
Found in the c:\windows\history\desktop.ini and the c:\windows\history\history.ie5\desktop.ini is this text:

[.ShellClassInfo]
UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933}
CLSID={FF393560-C2A7-11CF-BFF4-444553540000}
The UICLSID line cloaks the folder in Windows Explorer. The CLSID line disables the "Find" utility
from searching through the folder.

To see for yourself, you can simply erase the desktop.ini files. You'll see that it will instantly give
Windows Explorer proper viewing functionality again, and the "Find" utility proper searching capabilities
again. Problem solved right? Actually, no. As it turns out, the desktop.ini files get reconstructed every
single time you restart your computer. Nice one, Slick.

Luckily there is a loophole which will keep Windows from hiding these folders. You can manually edit the
desktop.ini's and remove everything except for the "[.ShellClassInfo]" line. This will trick windows into
thinking they have still covered their tracks, and wininet won't think to reconstruct them.

Win XP Tweaks

-----------
STARTUP
-----------


Windows Prefetcher
******************
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Session Manager \ Memory Management \ PrefetchParameters]

Under this key there is a setting called EnablePrefetcher, the default setting of which is 3. Increasing this number to 5 gives the prefetcher system more system resources to prefetch application data for faster load times. Depending on the number of boot processes you run on your computer, you may get benefits from settings up to 9. However, I do not have any substantive research data on settings above 5 so I cannot verify the benefits of a higher setting. This setting also may effect the loading times of your most frequently launched applications. This setting will not take effect until after you reboot your system.


Master File Table Zone Reservation
**********************************
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ FileSystem]

Under this key there is a setting called NtfsMftZoneReservation, the default setting of which is 1. The range of this value is from 1 to 4. The default setting reserves one-eighth of the volume for the MFT. A setting of 2 reserves one-quarter of the volume for the MFT. A setting of 3 for NtfsMftZoneReservation reserves three-eighths of the volume for the MFT and setting it to 4 reserves half of the volume for the MFT. Most users will never exceed one-quarter of the volume. I recommend a setting of 2 for most users. This allows for a "moderate number of files" commensurate with the number of small files included in most computer games and applications. Reboot after applying this tweak.


Optimize Boot Files
*******************
[HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Dfrg \ BootOptimizeFunction]

Under this key is a text value named Enable. A value of Y for this setting enables the boot files defragmenter. This setting defragments the boot files and may move the boot files to the beginning (fastest) part of the partition, but that last statement is unverified. Reboot after applying this tweak.

Optimizing Startup Programs [msconfig]
**************************************

MSConfig, similar to the application included in Win9x of the same name, allows the user to fine tune the applications that are launched at startup without forcing the user to delve deep into the registry. To disable some of the applications launched, load msconfig.exe from the run command line, and go to the Startup tab. From there, un-ticking the checkbox next to a startup item will stop it from launching. There are a few application that you will never want to disable (ctfmon comes to mind), but for the most part the best settings vary greatly from system to system.

As a good rule of thumb, though, it is unlikely that you will want to disable anything in the Windows directory (unless it's a third-party program that was incorrectly installed into the Windows directory), nor will you want to disable anything directly relating to your system hardware. The only exception to this is when you are dealing with software, which does not give you any added benefits (some OEM dealers load your system up with software you do not need). The nice part of msconfig is that it does not delete any of the settings, it simply disables them, and so you can go back and restart a startup application if you find that you need it. This optimization won't take effect until after a reboot.

Bootvis Application
*******************
The program was designed by Microsoft to enable Windows XP to cold boot in 30 seconds, return from hibernation in 20 seconds, and return from standby in 10 seconds. Bootvis has two extremely useful features. First, it can be used to optimize the boot process on your computer automatically. Second, it can be used to analyze the boot process for specific subsystems that are having difficulty loading. The first process specifically targets the prefetching subsystem, as well as the layout of boot files on the disk. When both of these systems are optimized, it can result in a significant reduction in the time it takes for the computer to boot.

Before attempting to use Bootvis to analyze or optimize the boot performance of your system, make sure that the task scheduler service has been enabled – the program requires the service to run properly. Also, close all open programs as well – using the software requires a reboot.

To use the software to optimize your system startup, first start with a full analysis of a fresh boot. Start Bootvis, go to the Tools menu, and select next boot. Set the Trace Repetition Settings to 2 repetitions, Start at 1, and Reboot automatically. Then set the trace into motion. The system will fully reboot twice, and then reopen bootvis and open the second trace file (should have _2 in the name). Analyze the graphs and make any changes that you think are necessary (this is a great tool for determining which startup programs you want to kill using msconfig). Once you have made your optimizations go to the Trace menu, and select the Optimize System item. This will cause the system to reboot and will then make some changes to the file structure on the hard drive (this includes a defragmentation of boot files and a shifting of their location to the fastest portion of the hard disk, as well as some other optimizations). After this is done, once again run a Trace analysis as above, except change the starting number to 3. Once the system has rebooted both times, compare the charts from the second trace to the charts for the fourth trace to show you the time improvement of the system's boot up.

The standard defragmenter included with Windows XP will not undo the boot optimizations performed by this application.



-----------------------------------
General Performance Tweaks
-----------------------------------


IRQ Priority Tweak
******************
[HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ Control \ PriorityControl]

You will need to create a new DWORD: IRQ#Priority (where # is the number of the IRQ you want to prioritize) and give it a setting of 1. This setting gives the requisite IRQ channel priority over the other IRQs on a software level. This can be extremely important for functions and hardware subsystems that need real-time access to other parts of the system. There are several different subsystems that might benefit from this tweak. Generally, I recommend giving either the System CMOS or the video card priority. The System CMOS generally has an IRQ setting of 8, and giving it priority enhances the I/O performance of the system. Giving priority to the video card can increase frame rates and make AGP more effective.

You can give several IRQs priority, but I am not entirely certain how the system interacts when several IRQs are given priority – it may cause random instabilities in the system, although it is more likely that there's a parsing system built into Windows XP to handle such an occurrence. Either way, I would not recommend it.

QoS tweak
*********
QoS (Quality of Service) is a networking subsystem which is supposed to insure that the network runs properly. The problem with the system is that it eats up 20% of the total bandwidth of any networking service on the computer (including your internet connection). If you are running XP Professional, you can disable the bandwidth quota reserved for the system using the Group Policy Editor [gpedit.msc].

You can run the group policy editor from the Run command line. To find the setting, expand "Local Computer Policy" and go to "Administrative Templates" under "Computer Configuration." Then find the "Network" branch and select "QoS Packet Scheduler." In the right hand box, double click on the "Limit Reservable Bandwidth." From within the Settings tab, enable the setting and then go into the "Bandwidth Limit %" and set it to 0%. The reason for this is that if you disable this setting, the computer defaults to 20%. This is true even when you aren't using QoS.

Free Idle Tasks Tweak
*********************

This tweak will free up processing time from any idle processes and allow it to be used by the foreground application. It is useful particularly if you are running a game or other 3D application. Create a new shortcut to "Rundll32.exe advapi32.dll,ProcessIdleTasks" and place it on your desktop. Double-click on it anytime you need all of your processing power, before opening the application.

Windows Indexing Services
Windows Indexing Services creates a searchable database that makes system searches for words and files progress much faster – however, it takes an enormous amount of hard drive space as well as a significant amount of extra CPU cycles to maintain the system. Most users will want to disable this service to release the resources for use by the system. To turn off indexing, open My Computer and right click on the drive on which you wish to disable the Indexing Service. Enter the drive's properties and under the general tab, untick the box for "Allow the Indexing Service to index this disk for fast file searching."

Priority Tweak
**************
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ PriorityControl]

This setting effectively runs each instance of an application in its own process for significantly faster application performance and greater stability. This is extremely useful for users with stability problems, as it can isolate specific instances of a program so as not to bring down the entire application. And, it is particularly useful for users of Internet Explorer, for if a rogue web page crashes your browser window, it does not bring the other browser windows down with it. It has a similar effect on any software package where multiple instances might be running at once, such as Microsoft Word. The only problem is that this takes up significantly more memory, because such instances of a program cannot share information that is in active memory (many DLLs and such will have to be loaded into memory multiple times). Because of this, it is not recommended for anyone with less than 512 MB of RAM, unless they are running beta software (or have some other reason for needing the added stability).

There are two parts to this tweak. First is to optimize XP's priority control for the processes. Browse to HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ PriorityControl and set the "Win32PrioritySeparation" DWORD to 38. Next, go into My Computer and under Tools, open the Folder Options menu. Select the View tab and check the "Launch folder windows in separate process" box. This setting actually forces each window into its own memory tread and gives it a separate process priority.

Powertweak application
**********************
xxx.powertweak.com

Powertweak is an application, which acts much like a driver for our chipsets. It optimizes the communication between the chipset and the CPU, and unlocks several "hidden" features of the chipset that can increase the speed of the system. Specifically, it tweaks the internal registers of the chipset and processor that the BIOS does not for better communication performance between subsystems. Supported CPUs and chipsets can see a significant increase in I/O bandwidth, increasing the speed of the entire system. Currently the application supports most popular CPUs and chipsets, although you will need to check the website for your specific processor/chipset combo – the programmer is working on integrating even more chipsets and CPUs into the software.

Offload Network Task Processing onto the Network Card
*****************************************************
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ Tcpip \ Parameters]

Many newer network cards have the ability of taking some of the network processing load off of the processor and performing it right on the card (much like Hardware T&L on most new video cards). This can significantly lower the CPU processes needed to maintain a network connection, freeing up that processor time for other tasks. This does not work on all cards, and it can cause network connectivity problems on systems where the service is enabled but unsupported, so please check with your NIC manufacturer prior to enabling this tweak. Find the DWORD "DisableTaskOffload" and set the value to 0 (the default value is 1). If the key is not already available, create it.

Force XP to Unload DLLs
***********************
[HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer]
"AlwaysUnloadDLL"=dword:00000001

XP has a bad habit of keeping dynamic link libraries that are no longer in use resident in memory. Not only do the DLLs use up precious memory space, but they also tend to cause stability problems in some systems. To force XP to unload any DLLs in memory when the application that called them is no longer in memory, browse to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer and find the DWORD "AlwaysUnloadDLL". You may need to create this key. Set the value to 1 to force the operating system to unload DLLs.

Give 16-bit apps their own separate processes
*********************************************
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ WOW]
"DefaultSeparateVDM"="Yes"

By default, Windows XP will only open one 16-bit process and cram all 16-bit apps running on the system at a given time into that process. This simulates how MS-DOS based systems viewed systems and is necessary for some older applications that run together and share resources. However, most 16-bit applications work perfectly well by themselves and would benefit from the added performance and stability of their own dedicated resources. To force Windows XP to give each 16-bit application it's own resources, browse to HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ WOW and find the String "DefaultSeparateVDM". If it is not there, you may need to create it. Set the value of this to Yes to give each 16-bit application its own process, and No to have the 16-bit application all run in the same memory space.

Disable User Tracking
*********************
[HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer]
"NoInstrumentation"=dword:00000001

The user tracking system built into Windows XP is useless to 99% of users (there are very few uses for the information collected other than for a very nosy system admin), and it uses up precious resources to boot, so it makes sense to disable this "feature" of Windows XP. To do so, browse to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer and find the DWORD "NoInstrumentation". You may need to create this key if it is not there. The default setting is 0, but setting it to 1 will disable most of the user tracking features of the system.

Thumbnail Cache
***************
[HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced]
"DisableThumbnailCache"=dword:00000001

Windows XP has a neat feature for graphic and video files that creates a "thumbnail" of the image or first frame of the video and makes it into an oversized icon for the file. There are two ways that Explorer can do this, it can create them fresh each time you access the folder or it can load them from a thumbnail cache. The thumbnail caches on systems with a large number of image and video files can become staggeringly large. To disable the Thumbnail Cache, browse to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced and find the DWORD "DisableThumbnailCache". You may need to create this key. A setting of 1 is recommended for systems where the number of graphic and video files is large, and a setting of 0 is recommended for systems not concerned about hard drive space, as loading the files from the cache is significantly quicker than creating them from scratch each time a folder is accessed.