Tips & Tricks

                 20 Google Tips and tricks








 NOKIA CODES & TRICKS:

To check the IMEI (International Mobile Equipment Identity) Type-
*#06#
Information you get from the IMEI-
XXXXXX XX XXXXXX X
TAC FAC SNR SP
• TAC = Type approval code
• FAC = Final assembly code
• SNR = Serial number
• SP = Spare
To check the phones Software revision type-
*#0000#
Information you get from the Software revision-
V 05.31
18-02-99
NSE-3
To enter the service menu type-
*#92702689# (*#WAR0ANTY#)
• Serial number (IMEI)
• Production date (MM/YY)
• Purchase date (MM/YY) You can only enter the date once.
• Date of last repair (0000=No repair)
• Transfer user data to another Nokia phone via Infra-Red
Clock Stopping
To check weather your SIM Card supports clock stopping type-
*#746025625# (*#SIM0CLOCK#)
Revealing the Headphone and Car-Kit menus
Please note that if you do these next tricks, the new menus can't be erased without retoring the factory default settings. To do these tricks you need to short-circuit the pins on the bottom of the phone next to where you plug in you charger.
1. To activate the "Headset" menu, you need to short-circuit pins "3" and "4". After a short time the word "Headset" will be shown in the display. Menu 3-6 is now enabled.
2. To activate the "Car" menu, you need to short-circuit pins "4" and "5". After a short time the word "Car" will be shown in the display. Menu 3-7 is now enabled.
EFR CALL QUALITY
To activate EFR (Enhanced Full Rate) Enter the code-
*3370#
This improves call quality but decreases batterylife by about 5%
To deactivate it, Enter the code-
#3370#
More to come…



         Yahoo Messenger, WITH NO ADS !!!

I went into the system registery and found out that Yahoo! moved the 'banner url' key to a slightly different location. Than what it used in version 5.5!

Yahoo! IM no longer uses 'YUrl', but uses 'View' instead. You gotta click on each key inside of 'View' and edit the 'banner url' string to anything you want... I simply cleared mine out completely and it works flawlessly!

Here is what you gotta do:

Run regedit

Code:
Goto HKEY_CURRENT_USER -> Software -> Yahoo -> Pager -> ViewInside the 'View' key there are a several other keys... go through each one and edit the 'banner url' string to your liking. It even works if the string is left blank (this causes it to look as if ads were never even implemented)! 

Restart Yahoo! IM for the effect to take hold.

This is great for Yahoo! IM 5.6 users who don't want to be bothered with ads.

Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.




QUOTE
Windows Registry Editor Version 5.00




Code:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]
"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]
"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]
"WaitToKillServiceTimeout"="1000"




2. Save the file as shutdown.reg
3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.



Auto End Tasks to Enable a Proper Shutdown


This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.


1. Copy the following (everything in the box) into notepad.




QUOTE
Windows Registry Editor Version 5.00




Code:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]
"ClearPageFileAtShutdown"=dword:00000001


[HKEY_USERS\.DEFAULT\Control Panel\Desktop]
"AutoEndTasks"="1"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]
"WaitToKillServiceTimeout"="1000"




2. Save the file as shutdown.reg
3. Double click the file to import into your registry.


NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

   Auto End Tasks to Enable a Proper Shutdown

This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.

1. Copy the following (everything in the box) into notepad.


QUOTE
Windows Registry Editor Version 5.00


Code:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]
"ClearPageFileAtShutdown"=dword:00000001

[HKEY_USERS\.DEFAULT\Control Panel\Desktop]
"AutoEndTasks"="1"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]
"WaitToKillServiceTimeout"="1000"


2. Save the file as shutdown.reg
3. Double click the file to import into your registry.

NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.


      10 reasons why PCs crash U must Know

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1 Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4 Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5 Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6 Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).

7 Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8 Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

9 Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10 Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

      How To Block Websties Without Software

 Steps:

1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will no longer be accessable.
5] Done!

-So-

127.0.0.1 localhost
127.0.0.2 www.blockedsite.com

-->www.blockedsite.com is now unaccessable<--


For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.

IE: 127.0.0.3 www.blablabla.com
127.0.0.4 www.blablabla.com
127.0.0.5 www.blablabla.com 

etc




     Getting administrative rights in windows nt/xp


first of all remember that it is very easy to find the password of an nt machine. in this tutorial i will be looking at the different ways on how to gain the administrative rights in an nt machine.

1. if you want to have administrative rights in an nt machine the very first thing to do is to check whether the administrative account is password protected. normally windows does not show the administrative account in the log on screen, so boot the computer in safe mode. in the log on screen you can see the administrative account. if the administrative account is not password protected you can log in as the administrator now. remember this only works if the computer administrator has not applied a password for the administrator account in other words if the administrator is stupid!

2. now lets see. what if the administrator has put a password. now what are we going to do.
if we can log on to the machine on any other account then what we are going to do is really simple. for this we will be using a tool named SECHOLE.EXE. this tool will make you an administrator instantly.so the first thing you have got to do is get the required files (i.e SECHOLE.EXE and ADMINDLL.DLL [i think you can get these files from http://www.ntsecurity.net). copy the two files on any directry and run the file SECHOLE.EXE. after the file is run the system will crash. but the damage will already be done. then simply reboot the system and you will find that all the non-admin users now belong to administrators means you have the admin right now! Feels good huh??

3. what if all the accounts are password protected and the guest account is disabled but you have physical access to the machine. for this we will have to get the sam file( sam file is the file which windows used to store the password of the accounts. this file cannot be removed, copied, or altered because the file will be in use all the time.) of that machine. to do this we can either load another operating system, use a linux boot disk, use a windows 98 startup disk or use NTFDOS. if the victims machines has an NTFS format drive windows 98 or windows 98 startup disk will not be able to read the drives. so in such cases we use NTFSDOS and copy the sam file to a FAT32 or FAT16 device. the sam file is normally located in c:\windows\system32\config\sam or c:\windir\system32\config\sam. 
   after copying the sam file we need to find the pass from the hashes in it. for this we will be using LC4 (L0pht Crack 4----- get it from http://www.l0pht.com). LC4 is quite good at getting password. it is better if i tell you how LC4 does it. so let me try. windows use LM ands NTLM hash to store the passwords. LM hash is 112 bit and NTLM hash is 128 bit and both uses one way encryption algorithms. LM hash is a very weak hash which was actually made by IBM and it divides the password into two halves of 7 on each side and then make the hash of each side separately and then attaching them together. you just import the sam file to LC4 and it will brute force the password. it will take time but it is very reliable. you can also use CAIN NT VERSION for this purpose.

4. now what if all the accounts are password protected and you dont have physical access to the machine. now what are you going to do. well we still can find the passwords. but first we need to find the ip address of the machine. to find the ip address is upto you! there are lot of tutorials based on how to find the ip address of a machine and most of them are good. so read them if you dont know how to find an ip address of a machine. so after finding the ip address what are we going to do? the first thing we have to do is to find whether the victims's system is alive. to find so, we will use Pinger ( you can download it from http://www.packetstormsecurity.net)
   Lets suppose if you try pinger but the destinations machines are stoping ICMP trfaffic or a Firewall is stopping you to send ICMP traffic then it won't be possible for you to ping them and check them weather they are alive or not. so we can use NMAP and specify port 80 to check as port 80 will be most probably active at your router or firewall so packet can still travel and check the destination machine.
   After finding whether the system is alive we need to find the user name of the administrator of the computer(cause normally administrators used to change the name of there administrator account for security reasons). for this we will use DUMPSEC ( get it from http://www.indianz.ch --- a very cool site). a very nice tool. but before you use this tool you need to make a null session with the victims machines. to make a null session type the following command at the command prompt.
Net use \\XXX.XXX.XXX.XXX\IPC$ "" /user:"" 

 (XXX.XXX.XXX.XXX is the ip address of the victim) if it is successful in making a null session it will say "Command completed successfully"

 now use DUMPSEC and find the name of the administrator account.

 after obtaining it we will use another great tool to find the password of the administrator account.
that is NAT(Netbios Auditing Tool). below i will explain on how to use NAT


 NAT requires 2 files for input before it gets to start its wonderfull work. the first file consists of the administrators username and the second file contains a bunch of passwords known as a dictionary file. so the bigger the dictionay file the higher the probability of getting the password. below is the command to use NAT

NAT –P Passlist.txt –U Userlist.txt XXX.XXX.XXX.XXX


passlist.txt should contain all the passwords and the userlist.txt should contain the name of the administrators name and give the victims ip in the XXX.XXX.XXX.XXX area. that's all!!! now NAT will try every password in the file until it reaches the end of the file or until it reaches the correct password.


                           Shortcut for Run Command 


The shortcut to RUN command is "Windows Key + R" 

Accessibility Controls 
access.cpl 

Add Hardware Wizard 
hdwwiz.cpl 

Add/Remove Programs 
appwiz.cpl 

Administrative Tools 
control.exe admintools 

Automatic Updates 
wuaucpl.cpl 

Bluetooth Transfer Wizard 
fsquirt 

Calculator 
calc 

Certificate Manager 
certmgr.msc 

Character Map 
charmap 

Check Disk Utility 
chkdsk 

Clipboard Viewer 
clipbrd 

Command Prompt 
cmd 

Component Services 
dcomcnfg 

Computer Management 
compmgmt.msc 

Date and Time Properties 
timedate.cpl 

DDE Shares 
ddeshare 

Device Manager 
devmgmt.msc 

Direct X Control Panel (if installed)* 
directx.cpl 

Direct X Troubleshooter 
dxdiag 

Disk Cleanup Utility 
cleanmgr 

Disk Defragment 
dfrg.msc 

Disk Management 
diskmgmt.msc 

Disk Partition Manager 
diskpart 

Display Properties 
control.exe desktop 

Display Properties 
desk.cpl 

Display Properties (w/Appearance Tab Preselected) 
control.exe color 

Dr. Watson System Troubleshooting Utility 
drwtsn32 

Driver Verifier Utility 
verifier 

Event Viewer 
eventvwr.msc 

File Signature Verification Tool 
sigverif 

Findfast 
findfast.cpl 

Folders Properties 
control.exe folders 

Fonts 
control.exe fonts 

Fonts Folder 
fonts 

Free Cell Card Game 
freecell 

Game Controllers 
joy.cpl 

Group Policy Editor (XP Prof) 
gpedit.msc 

Hearts Card Game 
mshearts 

Iexpress Wizard 
iexpress 

Indexing Service 
ciadv.msc 

Internet Properties 
inetcpl.cpl 

Java Control Panel (if installed) 
jpicpl32.cpl 

Java Control Panel (if installed) 
javaws 

Keyboard Properties 
control.exe keyboard 

Local Security Settings 
secpol.msc 

Local Users and Groups 
lusrmgr.msc 

Logs You Out Of Windows 
logoff 

Mcft Chat 
winchat 

Minesweeper Game 
winmine 

Mouse Properties 
control.exe mouse 

Mouse Properties 
main.cpl 

Network Connections 
control.exe netconnections 

Network Connections 
ncpa.cpl 

Network Setup Wizard 
netsetup.cpl 

Nview Desktop Manager (if installed) 
nvtuicpl.cpl 

Object Packager 
packager 

ODBC Data Source Administrator 
odbccp32.cpl 

On Screen Keyboard 
osk 

Opens AC3 Filter (if installed) 
ac3filter.cpl e

Pa**word Properties 
pa**word.cpl 

Performance Monitor 
perfmon.msc 

Performance Monitor 
perfmon 

Phone and Modem Options 
telephon.cpl 

Power Configuration 
powercfg.cpl 

Printers and Faxes 
control.exe. printers or control printers 

Printers Folder 
printers 

Private Character Editor 
eudcedit 

Quicktime (If Installed) 
QuickTime.cpl 

Regional Settings 
intl.cpl 

Registry Editor 
regedit 

Registry Editor 
regedit32 

Removable Storage 
ntmsmgr.msc 

Removable Storage Operator Requests 
ntmsoprq.msc 

Resultant Set of Policy 
rsop.msc 

Resultant Set of Policy (XP Prof) 
rsop.msc 

Scanners and Cameras 
sticpl.cpl 

Scheduled Tasks 
control.exe schedtasks or control schedtasks 

Security Center 
wscui.cpl 

Services 
services.msc 

Shared Folders 
fsmgmt.msc 

Shuts Down Windows 
shutdown 

Sounds and Audio 
mmsys.cpl 

Spider Solitare Card Game (if installed) 
spider 

SQL Client Configuration 
cliconfg 

System Configuration Editor 
sysedit 

System Configuration Utility 
msconfig 

System File Checker Utility 
sfc 

System Properties 
sysdm.cpl 

Task Manager 
taskmgr 

Telnet Client 
telnet 

User Account Management 
nusrmgr.cpl 

Utility Manager 
utilman 

Windows Firewall 
firewall.cpl 

Windows Magnifier 
magnify 

Windows Management Infrastructure 
wmimgmt.msc 

Windows System Security Tool 
syskey 

Windows Update Launches 
wupdmgr 

Windows XP Tour Wizard 
tourstart 

Wordpad 
write 

In run ... if u write the name of the executable 
file it opens the respective application for example: 
winword - will open Mcft word applic     


                        
                                          Hackers Mind



So you wanna be a HACKER huh? <Bwahahaha!> It's a state-of-MIND!
..you can induce it - but only if you are willing to drive yourself
mad enough! Go read and practice until you have mastered at least
Assembly language and Intermediate Level Electronics! Without this
foundation you'll be just another little geek, who might know the magic
words to the spell but dosent understand what he's doing! So RTFM!
..so what does that mean? Read The Fucking Manual! You will be sooo
amazed at how easy most things are if you just try to read the manual
first! The truth is: Most people cant read. Or they read poorly if
they read at all. So if you can't really read...STOP RIGHT HERE. GO
learn to read first. If you can't read at a minimum 12th Grade level
you cant be a hacker. Reading is the basic skill you must have to do
EVERYTHING BEYOND THIS POINT.

 Tell your friends you cant party...you're busy. Spend at least 4
hours a day at your new-found fascination...or decide right here
and now that you cant cut it! If you CAN, get a copy of MINIX or
LINUX...start learning about OPERATING SYSTEMS. Then start your
1st real hack...try building a computer-controlled, DTMF dialer
card for your cheap PC...write the code to use it with, make it
a TSR to keep life interesting...now port it to MINIX or whatever
...better yet, port it as an IOCTL call at kernel level! You keep
reading...

 Now you're ready to take on something more complex - go to the
Library, start a literature search; topic: Telephone Technologies.
RTFM! Learm about the ancient cross-bar, the Pre-ESS systems, the
fab MFTSS, the TELEX boxes and circuits...keep reading...buy up
an older, cheap (like under $50) cellular phone...by this time
you should already have a subscription to 'Nuts & Volts" as well
as a few other grassroots technology pubs....buy a copy of the
"Cellular Hacker's Bible"....start by doing something simple..
..disassemble and re-write the phone`s control ROM to allow it
to function as an 800MHZ scanner...hopefully you've assembled
a large array of tools and test gear by now. You've got a good
dual-trace scope, some pc-based PROM burner, a signal generator,
a logic probe or two, maybe even a microprocessor-emulator for
the 5051, the Z80, the 68010 or something....you may have been
dragged into some fields-afar by life - incorporate them: If
somebody drasgged you into SCUBA, build your own sonar. If you
have gotten interested in amateur radio, you can build a lot
of swell stuff...I recommend you checkout Packet's AX25A level2
protocol...very slick stuff! If your bud's are all into motors,
take a whak at doing your own Performance PROMS for GM's F.I. and
spark advance curves...or try adapting some Volkswagen/BOSCHE
Kjetronics F.I. to a Harley Davidson!..maybe you're into music
so you buy a synthesizer and learn all about electronic music,
you start hacking analog modules and build a nicer synth than you
could buy! Then you interface it to a MIDI port on a cheap 286AT
and then hack up some sequencer software, or buy some and then
disassemble it to fix all the bugs! You keep reading...

 By now most of your friends are also "far into the pudding", you
have either gained 50 lbs or gone totally skinny...your skin tone
is 2 shades lighter from being indoors so long...most of the opposite
sex is either totally freaked by or with you - they either dig you,
or they dont!...you're probably knocking on the door of what will
be a $60K+/yr job as a systems analyst...and you are well-aware that
90% of the people in this world can't talk their way out of a badly
cooked steak at the local eatery, let alone install a new motherboard
in their PC! So you pick up some extra cash on doing shit like that
for the straights...you keep reading, and RTFM'ing higher and higher,
learning about networks...the VCR breaks down and your SO bitches
about having to wait till monday to have it fixed...you fix it in
about 40 minutes....the next day the clothes dryer starts to make
squeeking noises like a 50' mouse, you've never fixed one before -
but somehow it's not that difficult to open the bastard up and find
the squeek and fix it...and suddenly it dawns on you that hacking
code or hardware is pretty much the same! You keep reading...

 Congrats, you are now a real hacker. Absolutly nothing but a lack of
time (or in some cases money) can stop you. You are a true Technologic
Philosopher...you can function in places a mere Engineer or Scientist
would truly FEAR TO TREAD! You can read better than Evelyn Wood, you
have a collection of tools that would make a Master Machinist and a
Prototype EE or ME cry. You can calculate series and parallel resonant
circuits in your head. You can fix any consumer appliance - if you can
get the parts. Your car has either become one of your main hacks or
you'ver deligated the job to a mechanic who you have found to be a
fellow hacker; and you work on his homebrew 68010 unix box...because
you've got a 68010 emulator and he works on your car because that's
the kind he specializes in! Maybe you trade services with people
for 50% of what ordinary people have to BUY WITH CASH!...you keep
reading...

 (this is the stage where the author now finds himself...16 years
  into a career at a Fortune 5 company and age 42...still reading...
  your mileage may vary! <-((that's my code too! I co-wrote VEEP,
  (vehicle-economy-emissions-program, a complete auto-simulator,
  written in Fortran-5 for the Univac 1108 system using punch-cards!)
  for the Ford Foundation and the DOT while at JPL in 1973)) )



WHAT WOULD BE IDEAL PROTECTION OF A SYSTEM?


Password Access- Get rid of simple passwords; routinely change all
                 passwords; regular review/monitoring of password
                 files

Physical Access- Lock up terminals, personal computers, disks when
                 not in use; eliminate unnecessary access lines;
                 disconnect modems when not in use

Other measures-  Know who you are talking to; shred all documents;
                 avoid public domain software; report suspicious
                 activity (especially non-working hours access)

What this all means is that hackers must now rely on the ineptitude
and laziness of the users of the system rather than the ignorance
of SysOps.  The SysOps and SecMans (Security Managers) are getting
smarter and keeping up to date.  Not only that, but they are
monitoring the hack/phreak BBSes and publications.  So the bottom
line is reveal nothing to overinquisitive newbies...they may be
working for the wrong side.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

               WHAT IS A FIREWALL?


(from the comp.security.misc FAQ)
A (Internet) firewall is a machine which is attached (usually)
between your site and a Wide Area Network (WAN).  It provides
controllable filtering of network traffic, allowing restricted
access to certain Internet port numbers and blocks access to
pretty well everything else.


HOW TO HACK WITHOUT GETTING INTO TROUBLE AND DAMAGING COMPUTERS?

 1.  Don't do damage intentionally.
 2.  Don't alter files other than than to hide your presence or to
     remove traces of your intrusion.
 3.  Don't leave any real name, handle, or phone number on any
     system.
 4.  Be careful who you share info with.
 5.  Don't leave your phone number with anyone you don't know.
 6.  Do NOT hack government computers.
 7.  Don't use codes unless you HAVE too.
 8.  Be paranoid!
 9.  Watch what you post on boards, be as general as possible.
10.  Ask questions...but do it politely and don't expect to have
     everything handed to you.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT DO I DO IF I AM GETTING NOWHERE?

1.  Change parity, data length, and stop bits.  The system may not
    respond to 8N1 (most common setting) but may respond to 7E1,8E2,
    7S2, etc.
2.  Change baud rates.
3.  Send a series of carriage returns.
4.  Send a hard break followed by a carriage return.
5.  Send control characters.  Work from ^a to ^z.
6.  Change terminal emulation.
7.  Type LOGIN, HELLO, LOG, ATTACH, CONNECT, START, RUN, BEGIN, GO,
    LOGON, JOIN, HELP, or anything else you can think off.
Screwing with the most widespread operating system on the net
     (UNIX / AIX Hacking)

WHAT ARE COMMON DEFAULT ACCOUNTS ON UNIX?

(from Belisarius)
Common default accounts are root, admin, sysadmin, unix, uucp, rje,
guest, demo, daemon, sysbin.  These accounts may be unpassworded
or the password may possibly be the same (i.e. username uucp has
uucp as the passwd).

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW IS THE UNIX PASSWORD FILE SETUP?
(from Belisarius)
The password file is usually called /etc/passwd
Each line of the passwd file of a UNIX system follows the following
format:


    userid:password:userid#:groupid#:GECOS field:home dir:shell


What each of these fields mean/do---

userid       -=>  the userid name, entered at login and is what the
                  login searches the file for.  Can be a name or a
                  number.

password     -=>  the password is written here in encrypted form.
                  The encryption is one way only.  When a login
                  occurs the password entered is run through the
                  encryption algorithm (along with a salt) and then
                  contrasted to the version in the passwd file that
                  exists for the login name entered.  If they match,
                  then the login is allowed.  If not, the password is
                  declared invalid.

userid#      -=>  a unique number assigned to each user, used for
                  permissions

groupid#     -=>  similar to userid#, but controls the group the user
                  belongs to.  To see the names of various groups
                  check /etc/group

GECOS FIELD  -=>  this field is where information about the user is
                  stored.  Usually in the format  full name, office
                  number, phone number, home phone.  Also a good
                  source of info to try and crack a password.

home dir     -=>  is the directory where the user goes into
                  the system at (and usually should be brought
                  to when a cd is done)

shell        -=>  this is the name of the shell which is
                  automatically started for the login

Note that all the fields are separated by colons in the passwd file.

WHAT DO THOSE *s, !s, AND OTHER SYMBOLS MEAN IN THE PASSWD FILE?
(from Belisarius)

Those mean that the password is shadowed in another file.  You have
to find out what file, where it is and so on.  Ask somebody on your
system about the specifics of the Yellow Pages system, but
discretely!

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT IS A UNIX TRIPWIRE?
(from Belisarius)

Tripwire is a tool for Unix admins to use to detect password cracker
activity, by checking for changed files, permissions, etc.  Good for
looking for trojan horses like password stealing versions of
telnet/rlogin/ypcat/uucp/etc, hidden setuid files, and the like.


    HOW CAN I HACK INTO AN AIX MACHINE?
(from Prometheus)


If you can get access to the 'console' AIX machines have a security
hole where you can kill the X server and get a shell with
ctrl-alt-bkspce.  Also by starting an xterm up from one you are not
logged in the utmp for that session because the xterms don't do utmp
logging as a default in AIX.  Or try the usual UNIX tricks:
ftping /etc/passwd, tftping /etc/passwd, doing a finger and then
trying each of the usernames with that username as a password.


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^


HOW CAN I INCREASE MY DISK QUOTA ON UNIX?
(from Prometheus)


A UNIX disk quota may be increased by finding a directory on another
partition and using that.  Find another user who wants more quota and
create a directory for the other to use, one that is world writable.
Once they've put their subdirectory in it, change the perms on the
directory to only read-execute.  The reason this works is that
usually accounts are distributed across a couple of filesystems, and
admins are usually too lazy to give users the same quotas on each
filesystem.  If the users are all on one filesystem, you may be able
to snag some space from one of the /usr/spool directories by creating
a 'hidden' subdirectory like .debug there, and using that.


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^


HOW CAN I FOOL AROUND ON XTERM / XWINDOWS?
(from Wildgoose)


Most x commands have a -display option which allows you to pick a
terminal to send to. So if you use bitmap to create a bitmap, or
download one, etc then:


xsetroot -bitmap bitmapname
[display the bitmap on your screen]


xsetroot -bitmap bitmapname -display xt2500:0
[display the bitmap on another xterm]


Other uses, try xterm -display xt??:0 will give someone else one of
your login windows to play with.  They are then logged in as you
though, and can erase your filespace, etc. Beware!


Slightly irritating:
xclock -geom 1200x1200 -display xt??:0
[fills the entire screen with a clock]


Slightly more irritating:
Use a shell script with xsetroot to flash people's screens different
colors.


On the nastier side:
Use a shell script with xsetroot to kill a person's window manager.


Downright nasty:
Consult the man pages on xkill.  It is possible to kill windows on
any display.  So to log someone off an xterm you merely have to xkill
their login window.


Protect yourself:
If you use xhost -   this will disable other people from being able
to log you out or generally access your terminal.


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^


HOW CAN I TAKE ADVANTAGE OF THE DECODE DAEMON?
(from Caustic)


First, you need to make sure that the decode daemon is active.
Check this by telnetting to the smtp port (usually port 25), and
expanding user Decode.  If it gives you something, you can use it.
If it tells you that the user doesn't exist, or whatever, you can't.


If the daemon is active, this is how to exploit the decode daemon:
1) uuencode an echo to .rhosts
2) pipe that into mail, to be sent to the decode daemon
(What happens: the decode daemon (1st) decodes the process, but
leaves the bin priveleges resident. (2nd) the echo command is
executed, because now the decoded message assumes the bin priveleges
[which are *still* active, even though the daemon didn't issue the
command]).
3) If this is done right, you will be able to rlogin to the sysem.


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^


HOW CAN I GET THE PASSWORD FILE IF IT IS SHADOWED?
(from Belisarius)
If your system has Yellow Pages file managment:


ypcat /etc/passwd > whatever.filename


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^


HOW IS A PASSWORD ENCRYPTED IN UNIX?
(from UNIX System Security[p.147])


     Password encryption on UNIX is based on a modified version of
the DES [Data Encryption Standard].  Contrary to popular belief, the
typed password is not encrypted.  Rather the password is used as the
key to encrypt a block of zero-valued bytes.
     To begin the encryption, the first seven bits of each character
in the password are extracted to form the 56-bit key.  This implies
that no more than eight characters are significant in a password.
Next, the E table is modified using the salt, which is the first two
characters of the encrypted password (stored in the passwd file).
The purpose of the salt is to makae it difficult to use hardware DES
chips or a precomputed list of encrypted passwords to attack the
algorithm.  The DES algorithm (with the modified E table) is then
invoked for 25 iterations on the block of zeros.  The output of this
encryption, which is 64 bits long, is then coerced into a
64-character alphabet (A-Z, a-z, 0-9, "." and "/").  Because this
coersion involves translations in which several different values are
represented by the same character, password encryption is essentially
one-way; the result cannot be decrypted.



Webcam hack SEE WEBCAM WITOUT PERMISION


This is a TROJAN = virus! this is the only way you can access someones
webcam with out them knowing! Use wisly and you should be fine!






Instructions are included with this but ill also post them here:










OBS: this is a trojan so your antivirus might turn mad and you may have to disable it!






1. fool your victim to run Server.exe (you may rename it) ALREADY RENAMED THE SEVER FOR YOU AS IMAGE1!!!!!!


2. start client.exe yourself and connect to the ip of your victim
(leave port to 285) a way to get the ip is to send something to your
victim over msn and type netstat -b in cmd


3. click Start Capture






You should now be seeing through your victims web cam. If it didn't work your victim has a firewall or something.






Tip: Try it on yourself, this is harmless (simply kill the Server.exe process when finished)






1. run Server.exe


2. run client.exe and connect to 127.0.0.1


3. start capture






You should see through your own web cam.






4. run taskmgr (ctrl+alt+delete) and kill Server.exe




http://coolsharewarez.blogspot.com/2008/07/webcam-hack.html


WINDOWS SECRETS



Special Report
Speed Secrets
Microsoft Doesn’t Want You To Know!
Simple Ways to Increase the Performance of your
Windows XP or Vista PC in 5 Minutes or Less
CAN $39.95
USD $39.95
2
Table of Contents
Windows XP............................................. 3
XP Speed Secret 1 – Disable Startup Programs ................................ 3
XP Speed Secret 2 – Remove Spyware and Malware...................... 4
XP Speed Secret 3 – Optimize Display Settings................................. 5
XP Speed Secret 4 – Speed‐Up File Browsing.................................... 6
XP Speed Secret 5 – Reduce Page File Size ......................................... 7
XP Speed Secret 6 – Clean Your System Registry............................. 8
XP Speed Secret 7 – Run Disk Clean‐Up............................................... 9
XP Speed Secret 8 – Enable Direct Memory Access (DMA) .......10
XP Speed Secret 9 – Disable File Indexing ........................................11
XP Speed Secret 10 – Remove Unused Files & Programs...........12
Windows Vista ....................................... 13
Vista Speed Secret 1 – Turn‐Off User Account Control ...............14
Vista Speed Secret 2 – Disable Graphic Effects ...............................15
Vista Speed Secret 3 – Remove Spyware and Malware...............16
Vista Speed Secret 4 – Shutdown Search Indexing .......................17
Vista Speed Secret 5 – Disable Automatic Disk Defragment.....18
Vista Speed Secret 6 – Clean Your System Registry......................19
Vista Speed Secret 7 – Disable Auto Windows Defender ...........20
Vista Speed Secret 8 – Turn‐Off Un‐Needed Features .................21
Vista Speed Secret 9 – Disable Unused Services ............................22
Vista Speed Secret 10 – Shutdown Remote Compression..........23
Vista Speed Secret 11 – Shut‐Off Windows Hibernation............24
Disclaimer .......................................................................................................25
3
Windows XP
XP Speed Secret #1: Disable Extra Startup
Programs
There are certain programs that Windows will start every time you
boot up your system, and during the startup phase, they're all
competing for a slice of your CPU speed. Extra or unwanted items
in the startup list will definitely increase your startup time, perhaps
by several minutes. Some common examples are things related to
AOL, RealPlayer, Napster, instant messengers, and video managers.
If you're not sure about an item, no big deal. You can turn it off,
restart your PC, and see if everything seems to work. If not, you can
always go back and re-enable an item in the Startup list. This tip
alone should speed up your start-up by 250%. Here are is what
you have to do:
1. Go to Start button  Run
2. Type "msconfig", without quotations
3. Hit enter key or click the OK button
4. A System Configuration Utility window will show up
5. Click the Startup tab
6. In the Startup tab you will see several boxes and some of them
will selected (checked). All you have to do is to uncheck
extra items that are of no use. If you run an antivirus
program it is not recommended to uncheck it.
7. After making you choices press the OK button, you will be
prompted to restart computer to apply changes.
8. After restarting your computer a dialogue will be displayed.
You can check the option for not showing this dialogue every
time your PC reboots.
4
XP Speed Secret #2: Remove Spyware, Adware,
and Malware
Have you scanned your system for spyware, adware and other
unwanted pests? 1 of 6 computers has some sort of Spyware or
Malware! They dramatically slow down your computer because they
use resources to generate popup ads, send spam, and often
interfere with the operation of good programs.
If you haven’t scanned recently, we recommend a free scan from a
good anti-spyware program. We prefer to use stand-alone, high
quality anti-spyware programs like XoftSpy Pro, which give us the
ability to scan and repair these problems in seconds.
FINAL NOTE: Recent testing has shown that stand-alone programs
do a much better job than the “all-in-one” packages (eg. Norton
Internet Security) at detecting spyware, adware, and malware.
5
XP Speed Secret #3: Optimize Display Settings
Windows XP can look sexy but displaying all the visual items can
waste system resources. To optimize:
1. Click the Start button
2. Select Control Panel
3. Double-click the System icon
4. Click the Advanced tab
5. In the Performance box click Settings
6. Leave only the following ticked:
a. Show shadows under menus
b. Show shadows under mouse pointer
c. Show translucent selection rectangle
d. Use drop shadows for icons labels on the desktop
e. Use visual styles on windows and buttons
7. Finally, click Apply and OK
6
XP Speed Secret #4: Speed-Up File Browsing
You may have noticed that every time you open “My Computer” to
browse folders that there is a slight delay. This is because Windows
XP automatically searches for network files and printers every time
you open Windows Explorer. To fix this and to increase browsing
speed significantly:
1. Double-click on My Computer
2. Click the Tools menu
3. Select Folder Options
4. Click on the View tab.
5. Uncheck the Automatically search for network folders and
printers check box
6. Click Apply
7. Click OK
8. Reboot your computer
7
XP Speed Secret #5: Reduce Page File Size

Page file size is not constant by default. Due to this, the operating
system has to resize the file each time more space is required. This
is a performance overhead. All you have to do is to set the file size to
a reasonable limit.
Follow the steps:
1. Right-click My Computer, Select Properties
2. Click the Advanced tab
3. Click the Settings button under the Performance section
4. Click the Advanced tab
5. Under the Virtual
Memory section click
the Change button
6. "Virtual Memory"
dialogue box will appear
(also shown in the figure
below)
7. Highlight the C: drive
containing page file
8. Select the Custom Size
radio button and give
same values in Initial
size and Maximum size
fields:
If you have less than 512MB
of memory, leave the page
file at its default size. If you
have 512MB or more, change the ratio to 1:1 page file size to
physical memory size.
9. Click Set, then OK buttons to apply the changes
8
XP Speed Secret #6: Clean Your System Registry
Of course, the fastest and easiest way to speed-up your computer is
to allow a software program to do it for you! Although you will find
that all of the adjustments in this book will speed up your system,
the most effective and easiest way to give your computer blazing
speed is to clean up your system’s Registry.
Your computer is like your car: it needs periodic maintenance to
keep it running at optimum performance. Installing and un-installing
programs, surfing the Internet, emailing, and other everyday
activities create a sort of “sludge” that builds up in your computer
over time, much like an automobile engine. After a while, it doesn't
startup like when it was new, it stalls unexpectedly, and performance
is sluggish on the (information) highway.
We strongly recommend running a free Registry scan to find out
how many errors you computer is hiding from you. Your computer
will likely have hundreds of Registry errors that are dramatically
slowing down the potential speed and performance.
9
XP Speed Secret #7: Run Disk Clean-Up

Both Windows and application programs tend to leave temporary
files lying around on your hard drive, taking up space. A hard drive
that is close to being “full” can cause Windows to slow down or
interfere with efficient disk access and virtual memory operations.
If you surf the web a lot, your temporary internet files folder can
become quite large, causing Internet Explorer to slow down or
malfunction. Cleaning up unneeded files, scanning for disk errors
and defragmenting the hard drive can help to restore some zip to
your system. Try to run once a month for peak performance.
1. Double-click the
My Computer
icon.
2. Right-click on
the C: drive
3. Select
Properties
4. Click the Disk
Cleanup button
(to the bottomright
of the
Capacity pie
graph)
5. Select / check
Temporary
Internet Files
and Recycle Bin
6. Click OK
10
XP Speed Secret #8: Enable Direct Memory

Access (DMA)
1. Right-click on My Computer, select Properties
2. Select the Hardware tab
3. Click the Device Manager button
4. Double-click IDE/ATAPI controllers
5. Double-click on the Primary IDE Channel
6. Click on the Advanced Settings tab (as shown in figure) The
tab may or may not be available for each option. It is only
available in Primary and Secondary Channels.
7. Set the Transfer Mode to "DMA if Available" both for Device
1 and 0
8. Click OK
9. Perform the same operation for other items in the list, if
applicable.
11
XP Speed Secret #9: Disable File Indexing

Indexing Services is a small little program that uses large amounts
of memory and can often make a computer endlessly loud and
noisy. This system process indexes and updates lists of all the files
that are on your computer. It does this so that when you do a search
for something on your computer, it will search faster by scanning the
index lists. If you don’t search your computer often, this system
service is completely unnecessary. To disable do the following:
1. Click Start button
2. Select the Control Panel
3. Double-click Add/Remove Programs
4. Click the Add/Remove Window Components icon on the left
side of the window
5. This may take a few seconds to load. Be patient.
6. Look for the “Indexing Services” component in the list
7. Uncheck the Indexing Services
8. Click Next
9. Click Finish
12
XP Speed Secret #10: Remove Un-Used Programs

& Files
You may have a bunch of software packages on your hard drive that
are no longer needed, or they were gratuitously installed when you
downloaded some other package. Toolbars, file-sharing
programs, free email enhancers, online shopping "companions"
and download managers are notorious for this practice. These
uninvited guests can put a big drag on your startup time, cause web
pages to load slowly, and generally bog down your computer.
1. Click Start button
2. Select Control Panel
3. Double-click Add/Remove Programs icon
4. See what programs are installed that you don’t typically use
5. Select the Remove button for the ones you know you don't
need
If you’re unsure about some programs, do a web search to learn
about the ones that you need to keep.
13
Windows Vista

Windows Vista is a rather heavy operating system with many neat
features, but unfortunately they all come at a price. As a brand new
operating system, it requires a pretty fast system to run well, if
not optimized.
Before you run out and buy a new computer just so you can run your
base operating system, check out these these simple ways to
speed-up Windows Vista and lighten the load.
14
Vista Speed Secret #1: Turn-Off User Account
Control (UAC)
Now, there’s a lot of talk about the new User Account Control
policy in Vista, and all I can say is that it annoys the heck out of 99%
of users and slows down normal computer usage. To turn it off,
the easiest way is to:
1. Click the Start (Windows) button
2. Select the Control Panel
3. Type in ‘UAC‘ into the search bar
4. It’ll bring up a search result of ‘Turn User Account Control
(UAC) on or off’
5. Just follow the prompts from there
Much better, eh? You might say ‘but what’s that got to do with
speed?’ It prompts you at least a couple times an hour and then
takes several seconds to figure itself out. Without these annoying
prompts, your productivity goes up, so therefore it’s a speed
enhancer.
15
Vista Speed Secret #2: Disable Unnecessary

Graphical Effects
Vista is “sexy” because of its new aero glass transparency effects.
Here is how to enable and disable this new eye candy.
1. Click Start (Windows) button
2. Select the Control Panel
3. Double-click Click Appearance and Personalization
4. Under Personalization, click Change the color scheme
5. In the Appearance Settings dialog box, click Windows Vista
Basic, and then click OK.
Or, if you prefer a Windows 2000-style interface, click Windows
Standard, and then click OK.
16
XP Speed Secret #3: Remove Spyware, Adware,
and Malware
Have you scanned your system for spyware, adware and other
unwanted pests? 1 of 6 computers has some sort of Spyware or
Malware! They dramatically slow down your computer because they
use resources to generate popup ads, send spam, and often
interfere with the operation of good programs.
If you haven’t scanned recently, we recommend a free scan from a
good anti-spyware program. We prefer to use stand-alone, high
quality anti-spyware programs like XoftSpy Pro, which give us the
ability to scan and repair these problems in seconds.
FINAL NOTE: Recent testing has shown that stand-alone programs
do a much better job than the “all-in-one” packages (eg. Norton
Internet Security) at detecting spyware, adware, and malware.
17
Vista Speed Secret #4: Shutdown Search Indexing
Windows Vista Search Indexing is constantly checking the files on
your system to make their information available for quick searching.
This is helpful, but can severely slow system performance as the
average user doesn’t use the search function frequently.
To shut down constant indexing:
1. Click the Start button
2. Select Computer
3. Right-click on the C: Drive icon
4. Select Properties
5. Select the General Tab
6. Uncheck Index this drive for faster searching
7. On the next dialog box, select Apply Changes to Drive C:,
subfolders and files
8. Click OK
18
Vista Speed Secret #5: Disable Automatic Disk
Defragment
Windows Vista uses an always-on defragment set up that isn’t that
necessary and will cause your system to slow down. Remember to
run a defragment manually once a month.
To shut down this feature:
1. Click the Start button
2. Select Computer
3. Right-click on C: Drive icon
4. Select Properties
5. Click the Tools tab
6. Uncheck Run on a schedule
7. Click OK
19
XP Speed Secret #6: Clean Your System Registry
Of course, the fastest and easiest way to speed-up your computer is
to allow a software program to do it for you! Although you will find
that all of the adjustments in this book will speed up your system,
the most effective and easiest way to give your computer blazing
speed is to clean up your system’s Registry.
Your computer is like your car: it needs periodic maintenance to
keep it running at optimum performance. Installing and un-installing
programs, surfing the Internet, emailing, and other everyday
activities create a sort of “sludge” that builds up in your computer
over time, much like an automobile engine. After a while, it doesn't
startup like when it was new, it stalls unexpectedly, and performance
is sluggish on the (information) highway.
We strongly recommend running a free Registry scan to find out
how many errors you computer is hiding from you. Your computer
will likely have hundreds of Registry errors that are dramatically
slowing down the potential speed and performance.
20
Vista Speed Secret #7: Disable Automatic
Windows Defender Operation
Windows Defender real-time protection against malware continues
to run despite having Automatic operation disabled.
In actuality, this built-in malware protector from Microsoft is very
poor at protecting your computer from external threats. You are
much better off using a 3rd-party software program like XoftSpy for
total protection (see Vista Speed Secret #9 for more information).
To disable:
1. Click the Start button
2. Type “services” into the Start Search box
3. Find Windows Defender in the list of programs
4. Double-click on Windows Defender
5. Choose Tools from the top menu
6. Select Options
7. Uncheck Auto Start at the bottom of the window
21
Vista Speed Secret #8: Turn-Off Un-Needed
Features
There are many new features in Windows Vista that are installed by
default that you may not need. These extra and un-needed features
can slow down your computer and take up more storage space.
Windows Features can be un-installed using the Windows Features
utility. Follow these steps to uninstall applications such as the
Windows Fax and Scan and many more.
To Turn-Off Some Un-Needed Features:
1. Click on the Start Button
2. Select Control Panel
3. Under Programs click Uninstall a program
4. On the left side menu, click on Turn Windows features on or
off
5. Scroll through the list as shown below and uncheck from any
feature you do not want installed.
6. Click OK when you are finished making your changes. The
features will now be uninstalled.
22
Vista Speed Secret #9: Disable Unused Services
Services are background processes which keep running waiting for
a response, so if you don’t use the application it still runs and
slows PC speed. The average user doesn’t need many running.
1. Click the Start button
2. Type msconfig in the Start Search box, hit enter
3. Click the Services tab
4. Uncheck the unneeded startup items (examples below)
Desktop Window Manager Session Manager - Provides Desktop
Window Manager startup and maintenance services. Uncheck to
disable.
Diagnostic Policy Service - Enables problem detection,
troubleshooting and resolution for Windows components. Uncheck
to disable.
Diagnostic Service Host - Same as above
Diagnostic System Host - Same as above
Offline Files - The Offline Files service performs maintenance
activities on the Offline Files cache. Uncheck to disable.
Terminal Services - Allows users to connect interactively to a
remote computer. Remote Desktop and Terminal Server depend on
this service. If you don’t use either of these, then you can disable the
service. Uncheck to disable.
Windows Error Reporting Service - Allows errors to be reported
when programs stop working or responding and allows existing
solutions to be delivered. Uncheck to disable.
After you are finished, click Apply then click OK to save changes.
23
Vista Speed Secret #10: Shutdown Remote
Differential Compression
Remote Differential Compression checks the changes of your files
over a network to move them with as little bandwidth as possible
instead of transferring an entire file that has previously been moved.
Obiviously, the average home PC user has NO need for this service.
With it constantly checking for file changes, this service will greatly
slow system performance.
To shut down this service:
1. Click the Start button
2. Select Control Panel
3. Click Classic View on the left side of the window
4. Double-click on Programs and Features
5. Click Turn Windows Features On And Off on the left side of
the window
6. Uncheck Remote Differential Compression
7. Click OK
24
Vista Speed Secret #11: Shut-Off Windows
Hibernation
Windows hibernation background services use a very large amount
of system resources. If you are like most people you don’t use the
Hibernate feature very much so you may want to disable it to give
Vista a performance boost.
To shut down Hibernation:
1. Click the Start button
2. Select Control Panel
3. Click the Classic View on the left hand side
4. Double-click on Power Options
5. Select Change Plan Settings
6. Choose Change Advanced Power Settings
7. Click the Sleep “plus” icon
8. Click the Hibernate After “plus” icon
9. Adjust your selector down to zero minutes
10. Click Apply
11. Click OK
25
Disclaimer
The Windows speed tips presented in this document are provided as
a courtesy to others. Products mentioned are within the scope of a
user's need, in our opinion, and may not be appropriate for you for
your home or commercial use.
While we expect that the information we present here is accurate
and should be helpful, we make no guarantees as to its accuracy,
applicability, or adequacy to protect your system or that the
information is up to date. We do not have experience with all the
speed tips mentioned on these pages. Products and techniques
mentioned here may not be appropriate or adequate for your
individual needs. If you choose to rely on information presented in
this document, you do so at your own risk.
Do the above procedures at your own risk.
WindowsAccelerator.com is not responsible for any damage the
procedures may cause to your computer.

Join IN OR Sign IN

what would you like on this blog ?

Popular Posts