Sunday, October 30, 2011

Benefits of keeping a clean Windows desktop

The Windows desktop comprises the large background image along with the icons that are displayed behind any open Windows, but excludes the taskbar. In terms of PC speed the number of icons on your desktop is unlikely to make a significant difference to performance.

However, it would be wrong to say that it had absolutely no impact at all since everything that “appears” on the screen is represented by an image, and these images, including the background image on the desktop, do take up memory. So it follows that more images on your desktop mean more images stored in memory, which in turn mean less memory available for other applications.

Icon file sizes are pretty small so you would probably need a few hundred of them to take up even 1MB of memory; add to this another couple of megabytes for the background image on your desktop and you have a total of, say, 3MBs taken up by your desktop. But your PC will probably have at least 1GB of RAM (ie 1000MBs of RAM) and so you can see that there is very little chance of even the most cluttered desktop having any impact on overall PC performance.

By contrast to the desktop, the number of applications that load at start-up can have a big impact on your computer’s performance, either by making your PC take longer to boot, or by running in the background and using up memory. Applications are set to launch on start-up either: because they are essential utilities which need to run at all times in order to perform their function (this class of application might include security tools such as virus scanners or firewalls); or because they will inevitably be used in the course of using the computer (for example a word processor or an email package) and so it makes sense to make them immediately available at the outset.

As you install trial and full versions of applications, over time, the ranks of useful applications, worthy of their place in the start-up process, can be bloated by a number of forgotten or unnecessary programs. You can get an idea of which applications start-up automatically by looking at the icons listed in the notification area of the taskbar (ie, assuming a standard taskbar layout, the area on the bottom right of your screen, which includes the clock).

Alternatively you can view an authoritative list of auto-start applications using the System Configuration Utility. This tool also allows you to remove applications from the list of auto-start programs. To access the System Configuration Utility access the Start menu and type “msconfig” (in the text entry field at the bottom of the menu that pops up) and click Enter. Then select the “Startup” tab from the application Window that appears. Here you will see a full list of all the auto-start applications and can disable any one of them by unselecting the tick box next to each program.

What to do if your computer is infected

Here is a step by step guide and some tips on how to approach your computer if it is infected:
  • Disable your computer’s Internet connection.
  • Disconnect the computer from a Local Area Network to avoid further infection of other computers.
  • Boot the computer from the boot disk or restart it using the Safe Mode if an error occurs during startup.
  • Create backups of all your important data and save the information in an external drive (such as floppy disks, CDs, DVDs, flash drives, or external hard drives).
  • Procure reputable antivirus software and install according to the instructions.
  • If your system already has an installed antivirus program, get the most recent updates for its database. Avoid using the infected computer for gathering updates. Instead, use another computer. This is vital as an Internet connection can transmit your data to other parties or forward itself to all entries in your email’s address book. You can also get updated antivirus programs from official vendors or dealers.
  • Execute a scan of your entire system. Antivirus solutions can inform you of any viruses encountered in a scan, and give you choices on how to quarantine and eliminate the infections. These programs can also produce reports on what viruses managed to infiltrate your system.
  • Corrupted data may necessitate specialized tools for recovery. Information can be found at your antivirus’ website. Use the information from the last step to download the recommended utilities.
  • The virus may have infiltrated your computer through weak points in Microsoft Outlook. In this case, clean the computer by erasing the infected objects. Scan and clean the client databases. The result? The malicious code will not reactivate and re-instate itself when infected messages are accessed. Gather the requisite updates or patches and install these.
  • Some viruses may prove difficult to remove. A virus can potentially corrupt your data while it infects the system. The corrupted data is not always recoverable, so delete the infected file if the virus cannot be eliminated.
  • If the symptoms of infection still occur after scanning the computer and testing its hardware and software with the proper tools, technical support is your last hope. Send your vendor a message detailing your problem as soon as possible.
  • Scan all storage media and disks that may have been infiltrated by the virus. Do this after cleaning up the infection. Check if your antivirus software has been properly installed and configured.
  • Above all, practice common sense and ‘defensive’ computing. These tips will aid you in securing your computer against any infections.

What is a Server?

A Server is a (pretty much) normal computer that through a network receives requests and executes them. It is not defined by its hardware configuration but rather by the software (function) it runs and as such the requests it can service.

HARDWARE
Whilst there are generally some differences when comparing a PC to a Server, these differences are mainly in number of components and are there for 2 reasons;
  1. More speed and power. Whilst a normal home PC has to service the requests of one user, a server needs to service hundreds and even thousands of users at any given time. As such, whilst a home PC might have 4GB or RAM, a server will have 16 times that much. Servers will also generally have more than 1 CPU and multiple Power Supply Units.
  2. Redundancy. Servers can experience the same issues as a normal home PC! Since so many people depend on a server, more of the same hardware is built into a server so if something fails an online backup takes over and no downtime is experienced (Online backup means something that’s already installed and working in standby mode). In fact, no one would notice a server’s power supply just went bust as a secondary power supply unit will immediately take over.
To debunk myths and common misconceptions about servers, any normal PC or laptop could potentially act as a server. Whilst hardware requirements are generally higher than your typical home computer (due to the amount of requests it needs to service) there isn’t much difference between the hardware of a home computer and a server…
What a typical home computer setup might look like:
home computer
And a server…
server
Whilst they certainly look different, the differences we see here serve specific functions…
When it comes to home computing, one PC is enough to get the job done. Servers on the other hand need to service thousands and sometimes millions of users and as such they require working in larger numbers. To use space efficiently, they need to be stackable. This allows more servers to be placed in less space, generally in a rack:
rack
Hey, where are the monitor and keyboard?
Since servers are accessed through a network, there is no need for any input devices such as a mouse and a keyboard or a monitor… If a technician or an administrator needs to work on a server, it is accessed remotely. Should there be an issue with the server that’s making it inaccessible through the network, a normal monitor, keyboard and mouse can still be hooked up to the server.

What’s inside a Server?
If we had to look inside a server and a home computer to compare them, we can see a number of similarities:
server
As we can see, both home PCs and Servers have the same type of components, only in larger numbers.
Whilst the PC has 2 sticks of RAM, the server has 16! The PC in picture has 2 hard-drives and the server has 3 located at the front. A server might have more CPUs that a normal home PC to help it process requests faster.
Why are the hard disks located at the front? Well, hard-disk are the components most likely to fail (and they do!) due to having mechanical, moving parts. So they are located at the front foreasy, quick access should one need to be replaced.

SOFTWARE
As the defining aspect of a Server, robust and stable software runs atop powerful hardware to enable servers to perform a certain function.

The Operating System
Just like your normal home PC, servers need an operating system. Windows have their own Server-based Operating Systems the latest one being Windows Server 2008 R2 (R2 means Release 2). Windows Server Operating Systems look very much alike Windows XP or Windows 7, with a host of added features and functions! The still have a ‘Start’ button and can run Office pretty much the same way as Windows XP however it is built to service multiple users at the same time rather than just one.
Of course, Windows is not the only Server Operating System out there. Linux is widely used as are UNIX, VMware ESXi and Mac’s latest OS X Lion Server amongst others.

Services
Services running on a server characterize the Server’s function:
Web Server
IIS (Windows) and Apache are the 2 most common services that provide web services. Ever visited a website? A Web Server provides the webpage you see and handle requests you might send and receive during your session.
Email
To send and receive email, a service handling this type of information process and handles all requests. Microsoft’s Exchange is used the world over employed by business world-wide. IBM has its own solution bearing the name of Lotus Notes. Open Source programs exist in abundance and include Postfix, Cyrus IMAP and others…
Of course, Web and Email are just the tip of the iceberg when it comes to listing all the services that we interact with every day. DHCP and DNS, OSPF and HTTP are services and protocols we use everyday yet few of us tend to know about. The internet is very clever at masking the cogs and gears that turn this huge machine we have come to rely on so heavily.

How to find which virus is on computer

Does your PC frequently appear to act in a sluggish manner? Beware; this may indicate a virus infection in your PC. You should take steps to find out whether your PC has really been infected. In case of a real virus attack, the slowing down of your PC is only the tip of the iceberg. Newer viruses can erase your hard disk, corrupt system files or worse; send copies of the virus through e-mail to everyone having their e-mail IDs in your address book. You must remove the virus from your PC as fast as possible. Not sure how to do it? Then read on.

The first thing you need to learn is how to find which virus is on computer. To do this run a thorough scan of your hard disk with the antivirus software you have installed in your PC. Remember to select all the partitions of your hard disk before you run the scan. However, if your PC has already been infected, and the antivirus has been unable to prevent the infection, then there is a fair chance that the scan will reveal nothing. In that case, you can go for some kind of online scanning with some reputed antivirus software. Symantec and McAfee are good examples. Once the virus shows up in the report generated after the scan, note down the name of it, even if the antivirus reports that it has successfully cleaned it.

Now you know how to find which virus is on computer and you’ve discovered the name and identity of the culprit you need to know what to do when your computer is infected. Perform a search on Google with the name of the virus. You will find some guide with detailed instructions on how to remove the virus from PC. If the virus was cleaned by your resident antivirus, or the online antivirus service, you should still save or print a copy of these instructions, for future reference. If the virus has not been cleaned, however, you will have to use these guidelines to rid your PC of the virus.

In some cases, Microsoft Knowledge base may also have a set of guidelines regarding removal of a particular virus from your system. Perform a search on Knowledge base with the name of the virus. You may come across guidelines about the removal of that specific virus. Follow the instructions to rid your PC of this menace.

If everything fails, then you can contact Microsoft technical support (provided you are using Windows operating system in your PC) and get their help for removing the virus. You may also contact a system engineer to help you with the problem.

How to get Genuine XP in 5 minutes (Free)

If your Window XP is not genuine and you want to make it genuine then there is a simple tip for you. This is free and  no need to pay a single penny for making your Window XP genuine. Use the features of a full version and enjoy a genuine windows for free.

FIRST CHOOSE AND USE ONE OF THESE METHODS

METHOD 1
1) start > run > “regedit” (without the quotes of course)
2) go to the key:

HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\WPAEvents\OOBETimer

Double click on it. Then change some of the value data, anything. Edit, delete or type. now close out regedit.

3) go to start > run > “%systemroot%\system32\oobe\msoobe.exe /a” (again, dont type the quotes)

4) the activation screen will come up, click on register over telephone, then click on CHANGE PRODUCT KEY, enter in this key:

JG28K-H9Q7X-BH6W4-3PDCQ-6XBFJ (Professional XP ONLY)
BQJG2-2MJT7-H7F6K-XW98B-4HQRQ ( Home Edition ONLY)

METHOD 2
 1) Download the activation files here: http://www.wupload.com/file/193115388/Windows_XP_Activator.zip
2) Right-click the file and EXTRACT it to your desktop. The password is seatrade
3) There should be two files in the folder. So open WINDOWS XP ACTIVATOR.exe
4) When you open WINDOWS XP ACTIVATOR.exe, hit the ACTIVATE button.
5) Go back to the folder, and open/double-click 2nd Activation.reg
6) Restart your computer.

METHOD 3
Follow the below steps to make windows XP genuine.

1:- Open NotePad from Start Menu and paste the following code in your notepad program.

    Windows Registry Editor Version 5.00
    [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersion]
    “CurrentBuild”=”1.511.1 () (Obsolete data – do not use)”
    “ProductId”=”55274-640-1011873-23081?
    “DigitalProductId”=hex:a4,00,00,00,03,00,00,00,35,35,32,37,34,2d,36,34,30,2d,
    31,30,31,31,38,37,33,2d,32,33,30,38,31,00,2e,00,00,00,41,32,32,2d,30,30,30,
    30,31,00,00,00,00,00,00,00,86,56,4e,4c,21,1b,2b,6a,a3,78,8e,8f,98,5c,00,00,
    00,00,00,00,dd,da,47,41,cc,6b,06,00,00,00,00,00,00,00,00,00,00,00,00,00,00,
    00,00,00,00,00,00,00,00,00,00,00,38,31,30,32,36,00,00,00,00,00,00,00,b5,16,
    00,00,83,83,1f,38,f8,01,00,00,f5,1c,00,00,00,00,00,00,00,00,00,00,00,00,00,
    00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,66,e5,70,f3
    “LicenseInfo”=hex:33,b7,21,c1,e5,e7,cd,4b,fd,7c,c6,35,51,fd,52,57,17,86,3e,18,
    d3,f4,8c,8e,35,32,7b,d1,43,8d,61,38,60,a4,ca,55,c9,9a,35,17,46,7a,4f,91,fc,
    4a,d9,db,64,5c,c4,e2,0f,34,f3,ea
    [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWPAEvents]
    “OOBETimer”=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd

2. Now save the file on the name of Genuine.reg (Make sure to save it with .reg extension.).
Save the file on Desktop
3:- Now close the file and go to Desktop and double click on the file you just saved.
4:- Guys your Windows XP is now genuine. Restart your windows

[ Please report any broken keys]
now your windows xp is now genuine. Have fun!
Still need support? Comment here

Why does my computer freeze up all the time?

There are a number of reasons why your computer could be freezing on a regular basis. While the reasons are numbered, there are quite a few common problems that are generally the root cause of many computer mishaps that I’ll cover in this article. If your computer is running slowly and would like to find out some easy fixes to the problem, keep on reading.

Virus
The first possibility, and maybe the most common computer ailment, is a virus. Viruses can do any number of things to a computer, but while they’re stealing your data or ruining your files, they’re using up precious system resources that could be used for other important tasks. By running in the background without your knowledge, a virus could sap away all of your processing power or available system memory to cripple your machine into unusability.
If you think that you might have a virus, the first thing you’ll want to do is obviously download anti-virus software to help hunt it down and remove it. With it removed, your computer will have less tendency to freeze on basic tasks and will generally run smoother.

Hardware
In terms of actual freezing, or “blue screening” in the case of some computer users, the problem may actually be hardware. Hardware malfunctions “confuse” the computer by not allowing it to do the tasks it’s trying to do, and when it runs into a broken or malfunctioning chip within the motherboard, it may not know how to continue. The easiest thing for an operating system to do when this happens is to freeze to prevent any data loss or further damage to the computer.

Disk Defragment
Another possibility as to why your computer freezes on a regular basis is because you haven’t defragmented your hard drive in quite some time. Defragmenting your hard drive takes all of your “scrambled” data and reorganizes it so that it’s easier for the computer to find. Just like a messy desk with papers all over the place, a computer sometimes needs to take time to reorganize the data it has so that everything is easier to find. The defragmentation program is located in different places on each Windows operating system, so check online for where yours is located.

Full Diagnostic
Because the number of possibilities are endless as to why your computer could be freezing or running extremely slowly, the best thing to do is to take your machine to a computer technician for a full diagnostic. I’ve done my best to let you know of some of the most common reasons why a computer may freeze, but without being able to actually investigate in person, it’s impossible to be able to determine the actual cause of the freezing.

Operating System Installation
If possible, a full operating system reinstallation is often the best way to stop freezing from occurring. If after you reinstall your operating system you still have trouble with freezing, chances are the problem is hardware related and you’ll have to talk to a technician to determine what needs to be replaced

Saturday, October 29, 2011

Add a customized music player to Your Blog

So this tutorial will help you to add a customized music player and create your own playlist. The first 2 steps of this tutorial will let you add the songs to your blog (Repeat these steps whenever you want to add more songs to your blog/posts), and step #3 will add a floating MP3 player to your blog.

For this tutorial you will have to open an account here:
1. OpenDrive (online storage).

STEP #1:
Upload songs (MP3 files) to your newly registered OpenDrive account,
right click on the file and then click on the hyperlink "links" as shown in the screenshot below:


Then copy the "DIRECT LINK" (Streaming) to that file.

STEP #2:
Now, paste it as a hyperlink in to your blog:
1. Either paste it in the sidebar (Blogger -> Design -> Page Elements -> "Add a Gadget -> HTML/JavaScript") to play the songs site-wide,
2. Or paste it in a blog-post (anywhere in the post), if you want to play the songs only in a particular post.
(List all the songs you want to play as these hyperlinks)

The hyperlinks to the songs should look like this:
<a href="http://DIRECT_LINK_TO_SONG_1" style="display:none;">Song_1_Title</a>
<a href="http://DIRECT_LINK_TO_SONG_2" style="display:none;">Song_2_Title</a>

Replace the links highlighted in RED with the DIRECT LINKS you got from OpenDrive in STEP #1.
The code style="display:none;" will hide the hyperlinks (song titles). If you want to show the links to your visitors, then delete the code highlighted in BLUE, before saving the widget/post.

STEP #3
Finally, to play these songs we will add the floating MP3 player to the blog.
Go to this page: StreamPad

And click on the Blogger logo:

Before copying the code, go to the bottom of the page:
And customize the player as you want: Enable Autoplay, change colors, Allow popout etc.

Finally copy the code from Step 5 in that page.
If the code in Step 5 does not get updated when you customize the options, then simply use this code:
<script type="text/javascript" src="http://o.aolcdn.com/art/merge?f=/_media/sp/sp-player.js&f=/_media/sp/sp-player-blogger.js&expsec=86400&ver=11&clicktext=Click%20to%20Play%20the%20DEMO%20Song&showplaylist=false&showplaylistbutton=true&autoplay=true&showpop=true&popup=false"></script>

Change the values highlighted in RED from true to false or vice-versa And paste that code in to your blog:
Go to Blogger -> Design -> Page Elements -> Add a Gadget -> HTML/JavaScript"
Paste the code and save widget.

NOTE 1 (Important): In case you want to "show" this widget only in a single post or in a group of posts, then instead of pasting the above code in the sidebar widget, paste it inside the post (anywhere in the post) where you want to display the widget (floating bar MP3 player).
NOTE 2: If you paste the code in the sidebar, then the bar is shown across all the pages on your blog and wherever (either the sidebar/blog posts) songs are detected, it will be added to the floating bar as long as the visitor remains in a particular page.
NOTE 3: As an alternative MP3 player, you may try the media Player from Yahoo (with Video support) instead of the one from Streampad (in step #3).

This widget can detect all the links to songs on any page (which you have already added in STEP #2 of this tutorial) and will start playing them as a playlist, in a floating bar from the bottom of the page.

Now sit back & Let The Music Play

Top 10 futuristic concept laptop designs

main futuristic laptops Top 10 futuristic concept laptop designs
The technology world is always exciting and unpredictable. It changes  all the  time. You never know what technology will be there in the next  5, 2, or even the next year. 30 years ago,  nobody thought that everyone would need a  personal computer. 20 years  ago, our parents would never dream of a small,  portable PC that we call  laptop nowadays. Over time, thousands of models of  laptops of all  sizes have been introduced, but nobody knows what else is to come.  The  best we can do is to take a look into the future with our  Top 10 Futuristic Concept laptop designs, They are astoundingly sexy concept laptops with  spellbinding features and cutting technology.


It’s gonna be the jaw-dropping and fanciful world of the future laptops, if so ever, they happen to be real . Extremely lightweight, ultra-sleek and surprisingly flexible, the future laptop designs amazingly gulp all the clutter for a most handy and convenient experience.

Vaio Zoom

Vaio Zoom Top 10 futuristic concept laptop designs
Vaio Zoom notebook features a holographic glass screen that goes transparent and a keyboard that turns opaque when turned off. Turn it on and the touchscreen holographic festivities begin.
plant book1 Top 10 futuristic concept laptop designs
The system uses an external water tank, hence the Plantbook continuously absorbs water when soaking it in water and generates electrolysis using power stored in a solar heat plate installed on the top. In this process, it is operated using hydrogen as energy source and discharges oxygen. If put it into a water bottle while do not use it, it automatically charges a battery and discharges oxygen. A leaf-shaped strap hanging on the top is made with silicon. It plays a role of a hand ring and a green LED indicates when the battery is charged. Using this LED, users can check how much spare capacity the batter has.

LG Ecological

LG Ecological Top 10 futuristic concept laptop designs
LG Ecological laptop concept uses fuel cell batteries and features organic light-emitting diode (OLED) display technology, it received a Red Dot Award nomination for best concept design.

COMpenion

Compenion Top 10 futuristic concept laptop designs
Compenion concept laptop by Felix Schmidberger consists of two sliding OLED screens, one of which can be used as a keyboard, where necessary.

Flexi PDA

Flexi PDA Top 10 futuristic concept laptop designs
Flexi PDA concept which is very cool but not for those that prefer something stylish or neutral. What’s unique here is the flexible display that would allow us to open the system and change its form, as Daniel Alexander, its designer describes it. According to him, this laptop would fold base on the flexible screen technology, allowing us to use it as a mobile phone even outside because it is also waterproof.

Fujitsu Fab PC

Fujitsu Fab PC Top 10 futuristic concept laptop designs
Closer to reality is Fujitsu Fab PC laptop concept that has an electronic paper display type, e-ink, with tissue covering, which makes it very flexible and lightweight. It would look like an office folder when opened.

Moonlight Laptop

Moonlight Laptop Top 10 futuristic concept laptop designs
The Moonlight by Teo Braun seems to be the most unrealistic concept so far, yet is pretty fascinating. It looks like a moon and features dual-curved screens with the bigger measuring 16:9 and the smaller 4:3. The lower display works as the annex of the bigger screen, and is also touchscreen and mouse for the system.

MAC Folder

mac folder Top 10 futuristic concept laptop designs
After Macbooks, there could be Mac Folders. Designer Tryi Yeh has designed it to work like iPod Touch to iPhone interfaces, which is multi-touch enabled. 12. MacTab. Wow, it makes you crave for it withsuch sleek-built. The Mac Tab itself is surprisingly thin plus also has an ultra-thin keyboard, which is also used as the notebook’s protective shield.

DRoll

D Roll Top 10 futuristic concept laptop designs
Hua Hua’s D-roll, or Digital roll, laptop concept is a proof that roll up laptops are the future. It has super thin screen and keyboard that you can wrap around the axle lookalike part. The straps double as USB ports and the detachable webcam can either be used on the computer or worn on your wrist.

Top 10 Google Chrome Extensions



Top 10 Google Chrome Extensions


Although FireFox is still king of browser add-ons, Google’s Chrome is surely gaining a greatselection of extensions to make it an even more powerful and versatile browser. Checkout our top 10 Google Chrome extensions after the jump.


For the web developers out there, this one will be an absolute must. This extension adds a selection of tools, accessible via toolbar button, web developers will find very useful. Another great option is Pendule.

Hide flash content when browsing the web and selectively load the flash content when you want. This is a great way to keep Flash from stealing system resources and save your eyes from some of those hideous advertisements.

Why Google built Chrome without RSS auto-detection, I do not know. But, with this extension you can add that capability.

Another must have, the Webpage Screenshot extension makes it easy to capture a full web page screenshot in PNG format. For web designers and developers, this will be very handy.

If you use more than one computer or more than one browser, you’ll want to install the Xmarks extension. Keeping your bookmarks in sync across multiple systems and browsers has never been easier.

If you aren’t using a password manager on the web, you likely aren’t using safe enough passwords. LastPass is a great way to manage your passwords in Chrome, also available for several other browsers.

Speed Tracer is a great extension for analyzing website and web application performance. There are a few additional requirements in order to run the plugin, but they’re easy to accomplish and well worth it for this extension.

Chromed Bird is essentially a Twitter client integrated into Chrome, and a great way to stay up to date on your Twitter network without running a fully dedicated Twitter client. If you spend the large majority of your time in Chrome, this extension could save you some time.

Google Wave made quite the splash when introduced but lacked many important features, namely some form of notification system. Using this extension you’ll know when you have new waves, be able to read unread waves and more.

AdBlock will likely be a popular extension for many people but keep in mind, advertisements are what pay for the great content you see on many of your favorite sites. It’s certainly a great tool for blocking the intrusive and obnoxious advertisements though.
Share Yours!

Thursday, October 27, 2011

NT Configuration:: Reg-edits to boost Performance.

Performance
Disable paging of NT executive - disable kernel 
Reg Key: HKLM\System\CurrentControlSet\Control\SessionManager\MemoryManagement\DisablePagingExecutive
Procedure: registry value from 0 to 1, (making sure it's not in hex but decimal); (you should have at least 128 megs of RAM to do this)

L2 cache size
Reg Key: HKLM\System\CurrentControlSet\Control\SessionManager\MemoryManagement\SecondLevelDataCache
Procedure: enter processor's L2 size

Disk Cache
Reg Key: HKLM\System\CurrentControlSet\Control\SessionManager\MemoryManagement\LargeSystemCache
Procedure: enter from 0 (def) to 1 (you should have at least 96 megs of RAM to do this)

Clear Swapfile at Shutdown
RegKey:HKLM\System\CurrentControlSet\Control\SessionManager\MemoryManagement\ClearPageFileAtShutdown
Procedure: Set to 1 to clear at shutdown. 

Run Explorer in Separate Memory
Reg Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
Procedure: Add DesktopProcess (REG_DWORD). Set it to 1 and reboot.

NTFS Last Access Date
Reg Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem
Procedure: Add Value name NtfsDisableLastAccessUpdate of type REG_DWORD. Set it to 1 to prevent the LastAccess time stamp from being updated. 

Shut Down Apps Faster:
Reg Key: HKEY_USER\YourUserId\Control Panel\Desktop
Procedure: 
Add AutoEndTasks - "1" kills not responding (Reg_SZ)

WaitToKillAppTimeout - This specifies how long NT waits before killing an app.The default is 20000 milliseconds (20 seconds), but you can reduce this to five seconds (5000 milliseconds).

Also, you can do this for DEFAULT so all new users get it

Shut Down Services Faster:
Reg Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control
Procedure: Modify WaitToKillServiceTimeout to 10,000 milliseconds (10 seconds)

Disable Extra Services Reg Key: None
Procedure: In Control Panel, Services, disable Computer Browser and Network services. You can also turn off the Messenger and Server services. Disable RAS services and AutoDial Manager if you're not connecting to an ISP or using RAS.

Increase IP speed:
Reg Key: HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Services/TCPIP/Parameters
Procedure: Add "TcpMaxDupAcks" REG_DWORD and set number of ACKs (acknowledgements) you want. The range is 1 to 3, and the default is 2 (recommended)

Improving Serial Performance:
Reg Key: KEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Serial
Procedure: ForceFifoEnable : Change from 0 to 1 ( decimal )
RxFIFO : Default is 8 and the Maximum is 14 ( decimal ). If you do not have a fast processor, Limit this number to 12.
TxFIFO : Default value is 1 and the Maximum is 16 ( decimal ), 16 works well on a dual processor or a fast uni-processor system.

Disable TCP/IP Source Routing
Reg Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
Procedure: Normally, on a computer running Windows NT 4.0, you cannot disable the source routing feature for the TCP/IP protocol. By using this tweak it is possible to disable it. Create a new DWORD value named 'DisableIPSourceRouting' and set the value to either '1' to disable source routing, or '0' to enable source routing.

Reboot Immediately
Reg Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon
Procedure: Control-Alt-Delete+SHIFT after adding EnableQuickReboot and set to "1"

Compress Registry Reg Key: None
Procedure: As Registry entries are added and deleted, the Registry may get bloated and need to be cleaned up. Run RDISK /S to compact the Registry.

Cut down on file cache
Reg Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem
Procedure: Add a Reg_DWORD Value name of MaximumTunnelEntryAgeInSeconds. Set it to the desired number of seconds, from 1 to 30, and 0 if you never use 16-bit apps.

Disable Short-name Generation
Reg Key: SYSTEM\CurrentControlSet\Control\Filesystem\NtfsDisable8dot3NameCreation
Procedure: DWORD value of 1 disabling short name generation on an NTFS partition will greatly increase directory enumeration performance especially in the case where individual directories contain a large number of files/directories with non-8.3 filenames.

Swap File - Size, Location
Reg Key: None
Procedure: 2 megs on system root, min = RAM and max = 2xRAM place on an NTFS partition
Autocomplete in CMDReg Key: HKEY_CURRENT_USER\Software\Microsoft\Command Processor
Procedure: Change the value of "CompletionChar" to 9

Security

Prevent Login Screen Saver
Reg Key: HKEY_USERS\.DEFAULT\Control Panel\Desktop
Procedure: ScreenSaveActive (0 = disabled, 1 =enabled)

Disable Registry Editing Tools
Reg Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
Procedure: DisableRegistryTools (0 = disabled, 1 = enabled)

Disable Registry Editing Tools (via network)Reg Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg
Procedure: Add key if not present

Disable the Lock Workstation Button
Reg Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
Procedure: DisableLockWorkstation (0 = disabled, 1 = enabled)

Require Alpha Numeric Password 
Reg Key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Network
Procedure: AlphanumPwds (0 = disabled, 1=enabled)

Remove common program groups from Start menu
Reg Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Procedure: NoCommonGroups (0 = disabled, 1 = enabled)

Power Down Computer After Shutdown
Reg Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Procedure: PowerdownAfterShutdown (0 = disabled, 1 = enabled)

Stealth Login (most amazing)
Reg Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Procedure: change the REG_SZ value DontDisplayLastUserName to 0.

Welcome Notice
Reg Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon.
Procedure: change the LegalNoticeCaption subkey to a text string that you like

Change Name of Admin 
Reg Key: None
Procedure: Make it something not guessable using User Manager 

Disabling "shutdown"
Reg Key:
Procedure: select Edit/Find and search Values for ShutdownW and when ShutdownWithoutLogon appears, change to 0

Tuesday, October 25, 2011

Latest PC Walkthrough Guides

Latest PC Walkthrough Guides

Call Of Duty: Black OpsCall Of Duty: Black Ops
Available on: XBOX 360, Playstation 3, PC
Walkthrough Guide

Alan WakeAlan Wake
Available on: XBOX 360, PC
Walkthrough Guide

Bioshock 2Bioshock 2
Available on: XBOX 360, Playstation 3, PC
Walkthrough Guide

James Cameron's Avatar: The GameJames Cameron's Avatar: The Game
Available on: XBOX 360, Playstation 3, PC
Walkthrough Guide

Assassin's Creed 2Assassin's Creed 2
Available on: XBOX 360, Playstation 3, PC
Walkthrough Guide

Operation Flashpoint: Dragon RisingOperation Flashpoint: Dragon Rising
Available on: XBOX 360, Playstation 3, PC
Mission Guide

Call Of Duty: Modern Warfare 2Call Of Duty: Modern Warfare 2
Available on: XBOX 360, Playstation 3, PC
Walkthrough Guide

Grand Theft Auto 4Grand Theft Auto 4
Available on: XBOX 360, Playstation 3, PC
Mission Guide

New Firefox add-on hijacks Facebook, Twitter sessions

A new Firefox add-on lets "pretty much anyone" scan a Wi-Fi network and hijack others' access to Facebook, Twitter and a host of other services, a security researcher warned today.
The add-on, dubbed "Firesheep," was released Sunday by Eric Butler, a Seattle-based freelance Web application developer, at the ToorCon security conference, which took place Oct. 22-24 in San Diego.
Butler said he created Firesheep to show the danger of accessing unencrypted Web sites from public Wi-Fi spots.
Although it's common for sites to encrypt user log-ons with HTTPS or SSL, few encrypt the actual traffic. "This leaves the cookie, and the user, vulnerable," said Butler in a post to his personal blog. "On an open wireless network, cookies are basically shouted through the air, making these attacks extremely easy."
With a user's cookie in hand, a criminal can do anything the user can do on a site, Butler noted. Among the sites that Firesheep can hijack are Facebook,Twitter, Flickr, bit.ly, Google and Amazon.
Butler did not reply to an interview request Monday.
"None of this is new, the flaw certainly isn't," said Richard Wang, the U.S. manager of SophosLabs, the research arm of Abingdon, England-based security company Sophos. "But Firesheep makes it so easy to discover [unencrypted traffic and cookies] that pretty much anyone can use it to listen to what others are doing at public hot spots."
Firesheep adds a sidebar to Mozilla's Firefox browser that shows when anyone on an open network -- such as a coffee shop's Wi-Fi network -- visits an insecure site. "Double-click on someone [in the sidebar] and you're instantly logged on as them," said Butler in his short description of his add-on.
The add-on appears to be irresistible: Since Butler posted Firesheep on Sunday it's been downloaded nearly 50,000 times.
Butler created Firesheep to illustrate the wide-ranging problem of unencrypted sites and public networks. "Web sites have a responsibility to protect the people who depend on their services," he said. "They've been ignoring this responsibility for too long, and it's time for everyone to demand a more secure Web. My hope is that Firesheep will help the users win."
Wang said he was hopeful that the add-on would prompt more sites to encrypt their sessions. "The hope here is of increased use of HTTPS," he said. But he also urged more public networks to secure users, although he acknowledged the logistics -- handing out the passwords that users would need in order to connect -- would be daunting. "It's the old 'security-vs.-convenience' argument," he noted.
Users can protect themselves, said Wang, by refusing to access insecure sites while at open networks.
He added that people who are more technically inclined could rely on a secure proxy server, perhaps one run on their work machine, which their laptops would in turn access. "But that's not a solution for the average user," Wang admitted.
Firesheep, which works with the Windows and Mac OS X versions of Firefox, can be downloaded free of charge at the GitHub site.

Unlock Super Administrator Account in Windows Vista

Deep inside the bowels of Windows Vista, there’s a secret Administrator account, and it’s different from the normal administrator account you most likely have set up on your PC. This Administrator account is not part of the Administrator group. (Confused yet? You should be.) It’s a kind of superadministrator, akin to the root account in Unix, and by default it’s turned off and hidden. (In describing this hack, we’ll always use the capital “A” for the secret Administrator account, and a lowercase “a” for a normal administrator account.)

In versions of Windows before Windows Vista, the Administrator account wasn’t hidden, and many people used it as their main or only account. This Administrator account had full rights over the computer.
In Windows Vista, Microsoft changed that. In Vista, the Administrator account is not subject to UAC, but normal administrator accounts are. So the Administrator can make any changes to the system and will see no UAC prompts.

Turning on the Administrator account is straightforward. First, open an elevated command prompt by typing cmd into the Search box on the Start menu, right-clicking the command prompt icon that appears at the top of the Start menu, then selecting Run as administrator — or just use the shortcut you created in the previous hack.

Then enter this command and press Enter:

Net user administrator /active:yes

From now on, the Administrator account will appear as an option on the Welcome screen, along with any user accounts you may have set up. Use it like any other account. Be aware that it won’t have a password yet, so it’s a good idea to set a password for it.

If you want to disable the account and hide it, enter this command at an elevated command prompt and press Enter:

Net user administrator /active:no

Friday, October 21, 2011

Learn C by example in just 5 hours.C tutorial on-line.

Have you always wanted to master a programming language. Well today if you are glancing at this page you have chosen a language which perhaps without doubt is the most versatile. But to learn C for say basic programmers is a challenge. While the old basic used interpreters C uses compilers and basically is very portable. But let quit all this jibrish and get to the heart of this page. I say you can learn C programming in 3 hours. Well atleast the basics that will help you to build more powerful programs.You say I can't show you C in 5 hours. Well let's test that; A simple hello program.(demonstrates the const function in all c programs--the main() function.)
(example-1)

main()
{
puts("hello world guess who is writing a c program");
return(0);
}

That's it. In all c programs there is a main function which is followed by a { and closed by a } after a return()function.It doesn't have to be return(0) but that depends upon the type of c compiler you have. Check your compiler before you start your programming. You saw above that puts function is used to put a whole sentence on the screen; but are there functions that will put characters on the screen/take characters: Yes and next is a table of what they are and what they do. Read them and the examples that follow.

getchar() Gets a single character from the input/keyboard.
putchar() Puts a single character on the screen.
The printf function is a function used to print the output to the screen.printf() needs to know if
the output is an integer,real,etc example-2

main()
{
printf(hello);
}
Assuming hello was defined earlier say by #define hello "Hello!" the output is Hello!. But if the output is an integer then %d has to be attatched to the printf statement. This above can be shown as printf("I am %d years old",12) which will result in the following result:I am 12 years old The %d tells that an integer is to be placed here. Now we will look into a function called scanf().This lets you input from the kewyboard and for that input to be taken by the program and processed.Once again it is important to tell scanf() what type of data is being scanned. Here is an example of a program that demonstrates both scanf and printf in unison. Example-3

main() {
int count;
puts("Please enter a number: ");
scanf("%d", &count);
printf("The number is %d",count);
}

That concludes the first hour of your tutorial.Now this is a list of data type identifiers. %f=float %c=char %s =s tring %e=inputs number in scientific notation. As you saw in the first hour of our tutorial c is a language in which you program using functions. Functions are usually identified by the following characteristic:>> functionname() In c the main() function is essential. Think of it as a constant function for all your programs and all other functions can be accessed from the main().Before I show you how we do that let us have an example where we want to pause a program before the screen is changed. This would involve the following procedure:>> write a main function then use puts function to put statements on the screen like we did in section 1 above and then before the next set of puts statements declare a pause. This is how it is done: example-4

main()
{
puts("hello there");
puts("what is your name?")
pause()
puts("It is nice to meet you")
}
pause();
{
int move_on;
printf("press entere to continue");
move_on=getchar();
return(0);
}

This above will pause until a key is pressed on the keyboard. Granted that the above program makes no sense from a practical point of view but I want to show is the use of another function inside the main function. C has many functions that comes with it. See your compiler manual to see what you have.Now we are going to look at conditions in c programming:>> the if command and do command. Here is an example of the if command: example-5

main()
{
float cost,tax,luxury,total;
luxury=0.0;
printf("Enter the cost of the item: ");
scanf("%f", &cost);
tax=cost*0.06;
if(cost>40000.0)
luxury=cost*0.005;
total=cost+tax+luxury;
printf("the total cost is %0.2f",total);
}

This is a simple example of one if statement. Another If statement is the if -else statement. This can be shown as this example-6

if(cost >40000)
{
luxury=cost*0.005;
printf("The luxury tax is %.2f",luxury);
}
else
{
puts("There is no luxury tax for the items");
luxury=0.0;
}
Now the format a do statement is as follows:
do
{
instruction;
instruction
}

while(condition);
The format for a FOR statement is as follows:

for(initial=value;condition;increment)
instruction; Now for an example: Example-7

main()
{
int row,column;
puts("\t\tMY Handy multipication table");
for(row=1;tow<=10;row++)
{
for(column=1;column<=10;column++)
printf("%6d", row*column);
putchar('\n');
}}
The output is a multipication table of 10x10 size. example-8
main()
{
int temp;
float celsius;
char repeat;
do
{
printf("Input a temperature:");
scanf("%d", &temp);
celsius=(5.0/9.0)*(temp-32);
printf(%d degrees F is %6.2f degrees celsius\n",temp, celsius);
printf(("do you have another temperature?");
repeat=getchar();
putchar('\n');
}
while(repeat=='y'|| repeat=='y');
}

This shows you to how to use the do command for conditional programming in c. Now we are in our 3rd hour. Now we will concentrate on arrays:
What is a flag? A flag is an algorithm that informs the program that a certain condition has occurred. example-9

main()
{
int temp;
float celsius;
char repeat;
char flag;
do
{
flag='n";
do
{
if(flag=='n')
printf("Input a valid temperature :");
else
printf("input a valid temperature,stupid:");
scanf("%d",&temp);
flag='y';
}
while (temp<0||temp >100);
celsius=(5.0/9.0)*(temp-32);
printf("%d degrees F is %6.2f degrees celsius\n",temp,celsius);
printf("Do you have another temperature?");
repeat=getchar();
putchar('\n');
}
while (repeat=='y' || repeat=='Y");
}

That was an example of how flags work.
What is the break command? The break command ends the loop in which it is placed just as if the while condition, or the condition in a for loop becomes false. How to declare an array? An array can be defined as follows:

int temp[5]={45,56,12,98,12};
This would mean the following: temp[0]=45....temp[4]=12 This was a single dimension array with 5 elements of the integer type.If you wanted to depict
float variables just use float temp instead of int temp. Let us now see an example of using an array for two tasks.

main()
{
int temps[31];
int index,total;
float average,celsius;
total=0.0;
for(index=0;index<31;index++)
{
printf("enter temperature #%d:",index);
scanf("%d",&temps[index]);
}
for(index=0;index<31;index++)
total+=temps[index];
average=total/31.0
printf("average is:%f\n\n", average);
puts9"fahrenheit\tcelsius\n");
for(index=0;index<31;index++)
{
celsius=(5.0/9.0)*(temps[index]-32);
printf("%d\t\t%6.2f\n",temps[index],celsius);
}}

Now I am going to show you how to pass an array. When you pass an array you are actually passing the address of the array. example-10

#define count 31
main()
{
int temps[count];
int index;
float celsius;
for(index=0; index< count;index++)
{
celsius=(5.0/9.0)*(heat[index]-32);
printf("%d\t\t%6.2f\n",heat[index],celsius);
}}

Now we are in the fourth hour of our tutorial.We are now going to look at 1)comparing strings 2)determining string lengths. 3) combining strings 4)structures. Comparing 2 strings:>> In c it is not possible to directly compare two strings so a statementlike if (string1==string2) is not valid. Most c libraries contain a function called the strcmp().This is used to compare two strings in the following manner.

if(strcmp(name1,name2)==0)
puts("The names are the same");
else puts("The names are not the same.");
Determining string length.:>> This is done using the strlen() function.
a simple programming bit showing this function looks like this:
gets(name);
count=strlen(name);
printf("the string %s has %d characters",name,count);
Combining strings:>>We use the function strcpy() an example follows: Example-11

strcpy(name,"Adam");
strcpy(name1,"and eve");
strcat(name,name1);
puts(name);

The assumption being that adam and eve are two values of the variables name1 and name2. The end result is the combination of the 2 names. What are structures? A structure variable is a collection of other variables comprising different types. What are pointers? Ponters are variables which refer to the memory locations of other variables. This is how a structure is defined. example-12

struct cd
{
char name[20];
char description[40];
char category[12];
float cost;
int number;
};
main()

Notice how the main function comes after the definition of the structure. In the example above the cd was a cd disk and I was writing the definition of a cd collection program. Now in the fifth hour I will show you how to output your data onto a disk.After all what is the use of the program if you can't save output to a disk. Inorder to do this we have to use a pointer. The pointer in this case is FILE. The syntax to declare a file is :FILE*file_ponter; The link between your program, the file and the computer is established with the fopen() function using the syntax shown below:

pointer=fopen("FILENAME","mode");
For example to create a file by the name cd.dat we do the following:
FILE*cdfile;
cdfile=fopen("CD>DAT","w");
If you will be reading from the file above use "r" instead "w" in the second sentence.
In order to rpint information use the following command:
FILE*cdfile;
cdfile=fopen("PRN","w");
A file is closed by using the fclose() command.Next we will look at an exam ple of reading from a file.
example-13

#include "stdio.h"
main()
{
FILE*fp;
int letter;
if((fp=fopen("MYFILE","r"))==NULL)
{
puts("Cannot oepn the file");
exit();
}
while((letter=fgetc(fp)) !=eof)
printf("%c",letter);
fclose(fp);
}

The eof statement means end of file and this is included in the stdio.h header file which was declared at the start of the example. The stdio.h header file is one of many that comes with your compiler. So check your compiler specifics for other header files which will help perform other functions. Now that you went through this tutorial you should be in a position to write simple programs and save it to a disk so you can give it your friends or even your boss. In no way the depth of c can be done in 5 hours but the nut and bolts can be learned that fast.Where you go from there depends upon your ambitions and hard work.

Wednesday, October 19, 2011

Install Windows XP

This procedure demonstrates how to install Windows XP Professional. The procedure to install Windows XP home edition is very similar to the professional edition. Since Windows XP Pro is more advanced operating system, it will be used to demonstrate the installation procedure.
The best way install Windows XP is to do a clean install. It is not difficult to perform a clean installation. Before you perform the installation I recommend that you check Windows XP Compatibility List to ensure that your hardware is supported by XP. If your hardware is not on the compatibility list you can check your hardware manufactures website to download the drivers for Windows XP. Save all the necessary drivers onto floppy disks or CD before you start the installation.
All versions of Windows XP CD are bootable. In order to boot from CD/DVD-ROM you need to set the boot sequence. Look for the boot sequence under your BIOS setup and make sure that the first boot device is set to CD/DVD-ROM. You can then perform the following steps to install Windows XP:
Step 1 - Start your PC and place your Windows XP CD in your CD/DVD-ROM drive. Your PC should automatically detect the CD and you will get a message saying "Press any key to boot from CD". Soon as computer starts booting from the CD your will get the following screen:
Windows XP Screenshot - Click to enlarge
Step 2 - At this stage it will ask you to press F6 if you want to install a third party Raid or SCSI driver. If you are using a an IDE Hard Drive then you do not need to press F6. If you are using a SCSI or SATA Hard drive then you must press F6 otherwise Windows will not detect your Hard Drive during the installation. Please make sure you have the Raid drivers on a floppy disk. Normally the drivers are supplied on a CD which you can copy to a floppy disk ready to be installed. If you are not sure how to do this then please read your motherboard manuals for more information.
Windows XP Screenshot - Click to enlarge
Step 3 - Press S to Specify that you want to install additional device.
Windows XP Screenshot - Click to enlarge
Step 4 - You will be asked to insert the floppy disk with the Raid or SCSI drivers. Press enter after you have inserted the disk.
Step 5 - You will see a list of Raid drivers for your HDD. Select the correct driver for your device and press enter.
Step 6 - You will then get a Windows XP Professional Setup screen. You have the option to do a new Windows install, Repair previous install or quit. Since we are doing a new install we just press Enter to continue.
Step 7 - You will be presented with the End User Licensing Agreement. Press F8 to accept and continue
Windows XP Screenshot - Click to enlarge
Step 8 - This step is very important. Here we will create the partition where Windows will be installed. If you have a brand new unformatted drive you will get a screen similar to below. In our case the drive size is 8190MB. We can choose to install Windows in this drive without creating a partition, hence use the entire size of the drive. If you wish to do this you can just press enter and Windows will automatically partition and format the drive as one large drive.
However for this demonstration I will create two partition. The first partition will be 6000MB (C: drive) and second partition would be 2180MB (E: drive). By creating two partition we can have one which stores Windows and Applications and the other which stores our data. So in the future if anything goes wrong with our Windows install such as virus or spyware we can re-install Windows on C: drive and our data on E: drive will not be touched. Please note you can choose whatever size partition your like. For example if you have 500GB hard drive you can have two partition of 250GB each.
Press C to create a partition.
Windows XP Screenshot - Click to enlarge
Step 8 - Windows will show the total size of the hard drive and ask you how much you want to allocate for the partition you are about to create. I will choose 6000MB. You will then get the screen below. Notice it shows C: Partition 1 followed by the size 6000 MB. This indicates the partition has been created. We still have an unpartitioned space of 2189MB. Next highlight the unpartitioned space by pressing down the arrow key. Then press C to create another partition. You will see the total space available for the new partition. Just choose all the space left over, in our case 2180MB.
Windows XP Screenshot - Click to enlarge
Step 9 - Now you will see both partition listed. Partition 1 (C: Drive) 6000MB and Partition 2 (E: Drive) 2180MB. You will also have 8MB of unpartitioned space. Don't worry about that. Just leave it how its is. Windows normally has some unpartitioned space. You might wonder what happened to D: drive. Windows has automatically allocated D: drive to CD/DVD-ROM.
Select Partition 1 (C: Drive) and press Enter.
Windows XP Screenshot - Click to enlarge
Step 10 - Choose format the partition using NTFS file system.This is the recommended file system. If the hard drive has been formatted before then you can choose quick NTFS format. We chose NTFS because it offers many security features, supports larger drive size, and bigger size files.
#Windows will now start formatting drive C: and start copying setup files as shown on the image below :
Windows XP Screenshot - Click to enlarge


Step 11 - After the setup has completed copying the files the computer will restart. Leave the XP CD in the drive but this time DO NOT press any key when the message "Press any key to boot from CD" is displayed. In few seconds setup will continue. Windows XP Setup wizard will guide you through the setup process of gathering information about your computer.
Windows XP Screenshot - Click to enlarge
Step 12 - Choose your region and language.
Step 13 - Type in your name and organization.
Windows XP Screenshot - Click to enlarge
Step 14. Enter your product key.
Windows XP Screenshot - Click to enlarge
Step 15 - Name the computer, and enter an Administrator password. Don't forget to write down your Administrator password.
Step 16 - Enter the correct date, time and choose your time zone.
Step 17 - For the network setting choose typical and press next.
Step 18 - Choose workgroup or domain name. If you are not a member of a domain then leave the default settings and press next. Windows will restart again and adjust the display.
Step 19 - Finally Windows will start and present you with a Welcome screen. Click next to continue.
Windows XP Screenshot - Click to enlarge
Step 20 - Choose 'help protect my PC by turning on automatic updates now' and press next.
Windows XP Screenshot - Click to enlarge
Step 21 - Will this computer connect to the internet directly, or through a network? If you are connected to a router or LAN then choose: 'Yes, this computer will connect through a local area network or home network'. If you have dial up modem choose: 'No, this computer will connect directly to the internet'. Then click Next.
Step 22 - Ready to activate Windows? Choose yes if you wish to active Windows over the internet now. Choose no if you want to activate Windows at a later stage.
Step 23 - Add users that will sign on to this computer and click next.
Windows XP Screenshot - Click to enlarge
Step 24 - You will get a Thank you screen to confirm setup is complete. Click finish.
Step 25. Log in, to your PC for the first time.
Windows XP Screenshot - Click to enlarge
Step 26 - You now need to check the device manager to confirm that all the drivers has been loaded or if there are any conflicts. From the start menu select Start -> Settings -> Control Panel. Click on the System icon and then from the System Properties window select the Hardware tab, then click on Device Manager.
If there are any yellow exclamation mark "!" next to any of the listed device, it means that no drivers or incorrect drivers has been loaded for that device. In our case we have a Video Controller (VGA card) which has no drivers installed.
Your hardware should come with manufacturer supplied drivers. You need to install these drivers using the automatic setup program provided by the manufacturer or you need to manually install these drivers. If you do not have the drivers, check the manufacturers website to download them.
To install a driver manually use the following procedure:
(a) From the device manager double click on the device containing the exclamation mark.
(b) This would open a device properties window.
(c) Click on the Driver tab.
(d) Click Update Driver button. The Wizard for updating device driver pops up as shown below:
Windows XP Screenshot - Click to enlarge
You now get two options. The first option provides an automatic search for the required driver. The second option allows you to specify the location of the driver. If you don't know the location of the driver choose the automatic search which would find the required driver from the manufacturer supplied CD or Floppy disk. Windows would install the required driver and may ask you to restart the system for the changes to take affect. Use this procedure to install drivers for all the devices that contain an exclamation mark. Windows is completely setup when there are no more exclamation marks in the device manager