Archive for October 13, 2009

Optimize Boot Files

*******************

[HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Dfrg \ BootOptimizeFunction]

Under this key is a text value named Enable. A value of Y for this setting enables the boot files defragmenter. This setting defragments the boot files and may move the boot files to the beginning (fastest) part of the partition, but that last statement is unverified. Reboot after applying this tweak.

Advertisement

Master File Table Zone Reservation

**********************************

[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ FileSystem]

Under this key there is a setting called NtfsMftZoneReservation, the default setting of which is 1. The range of this value is from 1 to 4. The default setting reserves one-eighth of the volume for the MFT. A setting of 2 reserves one-quarter of the volume for the MFT. A setting of 3 for NtfsMftZoneReservation reserves three-eighths of the volume for the MFT and setting it to 4 reserves half of the volume for the MFT. Most users will never exceed one-quarter of the volume. I recommend a setting of 2 for most users. This allows for a “moderate number of files” commensurate with the number of small files included in most computer games and applications. Reboot after applying this tweak.

Windows Prefetcher

*************************

[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Session Manager \ Memory Management \ PrefetchParameters]

Under this key there is a setting called EnablePrefetcher, the default setting of which is 3. Increasing this number to 5 gives the prefetcher system more system resources to prefetch application data for faster load times. Depending on the number of boot processes you run on your computer, you may get benefits from settings up to 9. However, I do not have any substantive research data on settings above 5 so I cannot verify the benefits of a higher setting. This setting also may effect the loading times of your most frequently launched applications. This setting will not take effect until after you reboot your system.

Understanding Wi-Fi Networks

Posted: October 13, 2009 in System Information, Wi-Fi
Tags:


You’re on the road and you’ve found a location with a Wi-Fi broadcast device that your

mobile computer can talk to. A Wi-Fi broadcast device is variously referred to as an access

point, an AP, or a hotspot.

With your access point located, you’re ready to sit right down, establish a wireless

connection, and start reading your email and surfing the Web, right? Not so fast, partner.

It’s really important to understand that being able to “talk” with a wireless access point just

means that you can “talk” with a wireless access point. It doesn’t mean that you can connect

to the Internet unless the wireless access point is itself connected to the Internet.

So if Starbucks or whoever wants to provide you with the chance to surf on their turf while

you sip that latte, Starbucks needs to provide an Internet connection. Generally, this

connection is wired, and uses a cable or DSL (digital subscriber line) telephone line for high

speeds.

A high-speed wire brings the Internet to the location, and a Wi-Fi access point broadcasts the

wireless Internet connectivity to wireless devices.

Between the Internet connection and the Wi-Fi access point, there also needs to be some

hardware designed to connect with the Internet and share the connectivity. There are a whole

lot of different ways this can be done, depending on many factors. For now, you need to

understand that connecting to the Internet via Wi-Fi involves four things:

1. Your Wi-Fi device (the client)

2. A Wi-Fi broadcast unit (the access point)

3. Network connectivity hardware (such as a router and modem)

4. The actual Internet connection (usually via cable or DSL)

1. Click on “Start” in the bottom left hand corner of screen

2. Click on “Run”

3. Type in “command” and hit ok

You should now be at an MSDOS prompt screen.

4. Type “ipconfig /release” just like that, and hit “enter”

5. Type “exit” and leave the prompt

6. Right-click on “Network Places” or “My Network Places” on your desktop.

7. Click on “properties”

You should now be on a screen with something titled “Local Area Connection”, or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on “Local Area Connection” and click “properties”

9. Double-click on the “Internet Protocol (TCP/IP)” from the list under the “General” tab

10. Click on “Use the following IP address” under the “General” tab

11. Create an IP address (It doesn’t matter what it is. I just type 1 and 2 until i fill the area up).

12. Press “Tab” and it should automatically fill in the “Subnet Mask” section with default numbers.

13. Hit the “Ok” button here

14. Hit the “Ok” button again

You should now be back to the “Local Area Connection” screen.

15. Right-click back on “Local Area Connection” and go to properties again.

16. Go back to the “TCP/IP” settings

17. This time, select “Obtain an IP address automatically”

18. Hit “Ok”

19. Hit “Ok” again

20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

P.S:

This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back


Here are some tips to ensure malware is not given access to your computer:

• Keep your computer up to date.

• Keep your browser up to date.

• Install good antimalware.

• Download free software only from sites you know and trust.

• Avoid clicking links inside pop-up windows.

• If you are offered antimalware programs while browsing, don’t install them. Stick with the software I outline in this handbook.

By following these rules, you’ll protect yourself and decrease the chances of getting malware on your system. The rest of this handbook will show you how to apply the first three tips listed above.

Malware – The generic term used for all forms of software designed with malicious intent. Viruses, worms, spyware etc. are all forms of malware. The term virus is often used when malware should really be used as it describes all forms of malicious software.

Virus – A computer virus acts very much like a human virus. Human viruses are spread, via thumb drives, floppy discs, network connections etc., to other PCs. Viruses need a host (like a free screensaver program) to spread. By pure definition: a virus has the ability to spread itself, via a host, to other computers.

Worm – A worm is much like a virus. The key difference is worms can spread between PCs without a host (free screensaver program, downloaded game etc.) These programsrely on computer networks and usually damage files and slow down networks in their path.

Trojan horse (Trojan) – A Trojan horse is a seemingly harmless program that looks to provide value. However, just as in Greek mythology, a Trojan horse has a secret agenda and acts as a backdoor to your computer. This backdoor can be accessed by a hacker to compromise your PC. Trojan horses are not self-replicating and spread due to users installing them manually on their PC.

Privacy-invasive software – A formal term used to describe software that invades your privacy. This software comes in different forms including spyware and adware.

Spyware – Spyware tracks a user’s activity by monitoring browsing habits and keyboard activity and can even take screenshots while you use your PC. This information is sent back to the creator or beneficiary of the spyware. Signs of spyware include: modified browser homepages, slow internet, and suspicious looking sites in place of legitimate sites (for example: banking sites.)

Adware – Like spyware, adware is software that may track visited websites and act as a key logger. Adware tracks this information to automatically display downloaded or installed adverts to a user. You may wonder why you are being offered “PC Super Anti Spyware 2011” when using your PC; this is adware at work. AIM, FlashGet, Deamon Tools, and RealPlayer are all examples of adware.

Backdoor – A backdoor is a point of access to a computer that does not require authentication. An unlocked house back door gives access to an otherwise secure home; a computer backdoor allows access to your PC without your knowledge or permission.

Key logger – Key loggers are used to monitor keyboard activity on a PC. These can be software-based (bundled with Trojan horses, adware, and spyware) or hardware-based (between the keyboard cable and the PC, acoustic etc.) Usually this information is retrieved across a local network, the internet, or from the physical device connected to the keyboard.

Firewall – A firewall both permits and blocks access to a network or PC. Firewalls are included with popular security software (e.g. AVG Internet Security and ESET Smart Security) and limit communication between your PC and devices that are not authorized to communicate with you.

Windows Firewall – Comes bundled with Windows XP, Vista, and 7. This is a great solution; however, due to a lack of comprehensive definition updates, Windows Firewall is not completely effective in blocking threats and allowing safe connections.

Antimalware / Antivirus / Antispyware – Software designed to remove or block malware (e.g. AVG Internet Security and ESET Smart Security.)

Fix the problem with seeing them secure sites (banks or online stores) i found this very useful at my work

Make a new notepad file and write in it the following DLL’s. Just copy-paste these

regsvr32 SOFTPUB.DLL

regsvr32 WINTRUST.DLL

regsvr32 INITPKI.DLL

regsvr32 dssenh.dll

regsvr32 Rsaenh.dll

regsvr32 gpkcsp.dll

regsvr32 sccbase.dll

regsvr32 slbcsp.dll

regsvr32 Cryptdlg.dll

And save it as > all file types, and make it something like securefix.bat.

Then just run the file and ur problem should be gone.

Because of the security features built into Windows XP, it is virtually impossible to get back into the system without the password.

You have several options to try and get around this problem.

If you have access to another user account with administrator rights, you can use that account to change the password

of the account that is locked out. You can also use the default Administrator account that is built into Windows XP.

First you need to boot the system into Safe Mode.

1.Restart your system.

2.When you see the blue Dell globe or screen, press the ( F8 ) key about 3 times a second.

3.You should get the Windows startup menu. Use the (Up or Down) arrow keys to highlight (SafeMode)

4.Press (Enter) on (Safe Mode), then press (Enter) on (Windows XP).

5.The system should boot to Safe Mode.

Once you are at the Account Log on Screen, click on the icon

for the user account with administrator rights, or click on the icon

for the administrators account.

Note: For Home the Administrator account isn’t normally shown & in Safe Mode you have to press Ctrl+Alt+Delete keys twice to show.

For PRO you can do this in normal mode

When the system has booted to the desktop, use the following steps to change the accounts password.

1.Click Start, Control Panel, Administrative Tools.

2.Click Computer Management.

3.Double click Local Users and Groups, double click the folder Users.

4.Right click on the account name that is locked out, and click on Set Password.

5.You may get a warning message about changing the password, simply click proceed.

6.Leave the New Password box blank, also leave the Confirm Password box blank.

7.Click OK, and OK again.

8.Then close all Windows, reboot the system and try to log in.

There are also applications that can recover the password for you.

The following companies provide these applications at a cost.

iOpus® Password Recovery XP here.

Asterisk Password Recovery XP v1.89 here.

If the above information does not help in recovering the password, the only option left is to

format the hard drive then reinstall Windows and the system software.

Follow the following steps

1. Open notepad.exe, type “del c:\windows\prefetch\ntosboot-*.* /q” (without the quotes) & save as “ntosboot.bat” in c:\

2. From the Start menu, select “Run…” & type “gpedit.msc”.

3. Double click “Windows Settings” under “Computer Configuration” and double click again on “Shutdown” in the right window.

4. In the new window, click “add”, “Browse”, locate your “ntosboot.bat” file & click “Open”.

5. Click “OK”, “Apply” & “OK” once again to exit.

6. From the Start menu, select “Run…” & type “devmgmt.msc”.

7. Double click on “IDE ATA/ATAPI controllers”

8. Right click on “Primary IDE Channel” and select “Properties”.

9. Select the “Advanced Settings” tab then on the device or 1 that doesn’t have ‘device type’ greyed out select ‘none’ instead of ‘autodetect’ & click “OK”.

10. Right click on “Secondary IDE channel”, select “Properties” and repeat step 9.

11. Reboot your computer.