Archive for the ‘Windows XP’ Category

Master File Table Zone Reservation

**********************************

[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ FileSystem]

Under this key there is a setting called NtfsMftZoneReservation, the default setting of which is 1. The range of this value is from 1 to 4. The default setting reserves one-eighth of the volume for the MFT. A setting of 2 reserves one-quarter of the volume for the MFT. A setting of 3 for NtfsMftZoneReservation reserves three-eighths of the volume for the MFT and setting it to 4 reserves half of the volume for the MFT. Most users will never exceed one-quarter of the volume. I recommend a setting of 2 for most users. This allows for a “moderate number of files” commensurate with the number of small files included in most computer games and applications. Reboot after applying this tweak.

Windows Prefetcher

*************************

[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Session Manager \ Memory Management \ PrefetchParameters]

Under this key there is a setting called EnablePrefetcher, the default setting of which is 3. Increasing this number to 5 gives the prefetcher system more system resources to prefetch application data for faster load times. Depending on the number of boot processes you run on your computer, you may get benefits from settings up to 9. However, I do not have any substantive research data on settings above 5 so I cannot verify the benefits of a higher setting. This setting also may effect the loading times of your most frequently launched applications. This setting will not take effect until after you reboot your system.

Malware – The generic term used for all forms of software designed with malicious intent. Viruses, worms, spyware etc. are all forms of malware. The term virus is often used when malware should really be used as it describes all forms of malicious software.

Virus – A computer virus acts very much like a human virus. Human viruses are spread, via thumb drives, floppy discs, network connections etc., to other PCs. Viruses need a host (like a free screensaver program) to spread. By pure definition: a virus has the ability to spread itself, via a host, to other computers.

Worm – A worm is much like a virus. The key difference is worms can spread between PCs without a host (free screensaver program, downloaded game etc.) These programsrely on computer networks and usually damage files and slow down networks in their path.

Trojan horse (Trojan) – A Trojan horse is a seemingly harmless program that looks to provide value. However, just as in Greek mythology, a Trojan horse has a secret agenda and acts as a backdoor to your computer. This backdoor can be accessed by a hacker to compromise your PC. Trojan horses are not self-replicating and spread due to users installing them manually on their PC.

Privacy-invasive software – A formal term used to describe software that invades your privacy. This software comes in different forms including spyware and adware.

Spyware – Spyware tracks a user’s activity by monitoring browsing habits and keyboard activity and can even take screenshots while you use your PC. This information is sent back to the creator or beneficiary of the spyware. Signs of spyware include: modified browser homepages, slow internet, and suspicious looking sites in place of legitimate sites (for example: banking sites.)

Adware – Like spyware, adware is software that may track visited websites and act as a key logger. Adware tracks this information to automatically display downloaded or installed adverts to a user. You may wonder why you are being offered “PC Super Anti Spyware 2011” when using your PC; this is adware at work. AIM, FlashGet, Deamon Tools, and RealPlayer are all examples of adware.

Backdoor – A backdoor is a point of access to a computer that does not require authentication. An unlocked house back door gives access to an otherwise secure home; a computer backdoor allows access to your PC without your knowledge or permission.

Key logger – Key loggers are used to monitor keyboard activity on a PC. These can be software-based (bundled with Trojan horses, adware, and spyware) or hardware-based (between the keyboard cable and the PC, acoustic etc.) Usually this information is retrieved across a local network, the internet, or from the physical device connected to the keyboard.

Firewall – A firewall both permits and blocks access to a network or PC. Firewalls are included with popular security software (e.g. AVG Internet Security and ESET Smart Security) and limit communication between your PC and devices that are not authorized to communicate with you.

Windows Firewall – Comes bundled with Windows XP, Vista, and 7. This is a great solution; however, due to a lack of comprehensive definition updates, Windows Firewall is not completely effective in blocking threats and allowing safe connections.

Antimalware / Antivirus / Antispyware – Software designed to remove or block malware (e.g. AVG Internet Security and ESET Smart Security.)

Fix the problem with seeing them secure sites (banks or online stores) i found this very useful at my work

Make a new notepad file and write in it the following DLL’s. Just copy-paste these

regsvr32 SOFTPUB.DLL

regsvr32 WINTRUST.DLL

regsvr32 INITPKI.DLL

regsvr32 dssenh.dll

regsvr32 Rsaenh.dll

regsvr32 gpkcsp.dll

regsvr32 sccbase.dll

regsvr32 slbcsp.dll

regsvr32 Cryptdlg.dll

And save it as > all file types, and make it something like securefix.bat.

Then just run the file and ur problem should be gone.

Because of the security features built into Windows XP, it is virtually impossible to get back into the system without the password.

You have several options to try and get around this problem.

If you have access to another user account with administrator rights, you can use that account to change the password

of the account that is locked out. You can also use the default Administrator account that is built into Windows XP.

First you need to boot the system into Safe Mode.

1.Restart your system.

2.When you see the blue Dell globe or screen, press the ( F8 ) key about 3 times a second.

3.You should get the Windows startup menu. Use the (Up or Down) arrow keys to highlight (SafeMode)

4.Press (Enter) on (Safe Mode), then press (Enter) on (Windows XP).

5.The system should boot to Safe Mode.

Once you are at the Account Log on Screen, click on the icon

for the user account with administrator rights, or click on the icon

for the administrators account.

Note: For Home the Administrator account isn’t normally shown & in Safe Mode you have to press Ctrl+Alt+Delete keys twice to show.

For PRO you can do this in normal mode

When the system has booted to the desktop, use the following steps to change the accounts password.

1.Click Start, Control Panel, Administrative Tools.

2.Click Computer Management.

3.Double click Local Users and Groups, double click the folder Users.

4.Right click on the account name that is locked out, and click on Set Password.

5.You may get a warning message about changing the password, simply click proceed.

6.Leave the New Password box blank, also leave the Confirm Password box blank.

7.Click OK, and OK again.

8.Then close all Windows, reboot the system and try to log in.

There are also applications that can recover the password for you.

The following companies provide these applications at a cost.

iOpus® Password Recovery XP here.

Asterisk Password Recovery XP v1.89 here.

If the above information does not help in recovering the password, the only option left is to

format the hard drive then reinstall Windows and the system software.

Follow the following steps

1. Open notepad.exe, type “del c:\windows\prefetch\ntosboot-*.* /q” (without the quotes) & save as “ntosboot.bat” in c:\

2. From the Start menu, select “Run…” & type “gpedit.msc”.

3. Double click “Windows Settings” under “Computer Configuration” and double click again on “Shutdown” in the right window.

4. In the new window, click “add”, “Browse”, locate your “ntosboot.bat” file & click “Open”.

5. Click “OK”, “Apply” & “OK” once again to exit.

6. From the Start menu, select “Run…” & type “devmgmt.msc”.

7. Double click on “IDE ATA/ATAPI controllers”

8. Right click on “Primary IDE Channel” and select “Properties”.

9. Select the “Advanced Settings” tab then on the device or 1 that doesn’t have ‘device type’ greyed out select ‘none’ instead of ‘autodetect’ & click “OK”.

10. Right click on “Secondary IDE channel”, select “Properties” and repeat step 9.

11. Reboot your computer.

Windows XP comes both IPv4 and IPv6 support.

To enable IPv6, you can install the

protocols needed with the command “ipv6 install” in the command-prompt.

Then type ipv6 /? to see the options.

The installation will not remove the IPv4 protocols so your

current configuration will still work.


I’m sure you are familiar with the traditional way to kill or end a process in Windowsusing Task Manager.  This method is effective but not nearly as fun as killing a process in Command Prompt.  Additionally, killing processes in Command Prompt provides much more control and the ability to end multiple processes at once.

All of this is possible with the TaskKill command. First, let’s cover the basics.  You can kill a process by the process ID (PID) or by image name (EXE filename).

Open up an Administrative level Command Prompt and run tasklist to see all of the running processes:

C:\>tasklist

Image Name                     PID Session Name        Mem Usage
========================= ======== ================ ============
firefox.exe                  26356 Console             139,352 K
regedit.exe                  24244 Console               9,768 K
cmd.exe                      18664 Console               2,380 K
conhost.exe                   2528 Console               7,852 K
notepad.exe                  17364 Console               7,892 K
notepad.exe                  24696 Console              22,028 K
notepad.exe                  25304 Console               5,852 K
explorer.exe                  2864 Console              72,232 K

In the example above you can see the image name and the PID for each process. If you want to kill the firefox process run:

C:\>Taskkill /IM firefox.exe /F

or

C:\>Taskkill /PID 26356 /F

The /f flag is kills the process forcefully.  Failure to use the /F flag will result in nothing happening in some cases.  One example is whenever I want to kill the explorer.exe process I have to use the /F flag or else the process just does not terminate.

If you have multiple instances of an image open such as multiple firefox.exe processes, running the taskkill /IM firefox.exe command will kill all instances. When you specify the PID only the specific instane of firefox will be terminated.

The real power of taskkill are the filtering options that allow you to use the following variables and operators.

Variables:

  • STATUS
  • IMAGENAME
  • PID
  • SESSION
  • CPUTIME
  • MEMUSAGE
  • USERNAME
  • MODULES
  • SERVICES
  • WINDOWTITLE

Operators:

  • eq (equals)
  • ne (not equal)
  • gt (greater than)
  • lt (less than)
  • ge (greater than or equal)
  • le (less than or equal)

“*” is the wildcard.

You can use the variables and operators with the /FI filtering flag.  For example, let’s say you want to end all processes that have a window title that starts with “Internet”:

C:\>taskkill /FI “WINDOWTITLE eq Internet*” /F

How about killing all processes running under the Steve account:

C:\>taskkill /FI “USERNAME eq Ignited” /F

It is also possible to kill a process running on a remote computer with taskkill.  Just run the following to kill notepad.exe on a remote computer called IgnitedDesktop:

C:\>taskkill /S IgnitedDesktop /U RemoteAccountName /P RemoteAccountPassword /IM notepad.exe /F

To learn more about taskkill run it with the /? command just like any other Windows command.


One of the most common questions about system processes is what is svchost.exe and why are there so many processes running? First appearing in Windows XP, svchost.exe hosts multiple services within one process.  This allows the operating system to save memory by reducing process overhead by cutting down on the number of processes that need to be running.

Every system service such as Windows Update, Event Log, Terminal Services, Audio Service, etc. runs within svchost.exe.  Depending on the access the services need, they are grouped together and are run in a number of processes which explains why you see so many in Task Manager running under different accounts such as System, Local Service and Network Service.

Identifying what services are running is different depending on the version of Windows you have.

Windows XP

In Windows XP at a command prompt run:

tasklist /svc

The tasklist utility will show you what processes are running under each svchost.exe process.

Windows Vista and Windows 7

Task manager in Windows Vista and Windows 7 has been enhanced so you can easily see what services are running inside a host process such as svchost.exe.

Click on the Start Button, type in taskmgr and hit Enter. When task manager loads, click on the Processes tab and click Show processes from all users to see all of the svchost.exe processes. Then, right click on a svchost.exe process and select Go to Service(s). You will be taken to the Services tab with all services running in that process highlighted.

All Versions of Windows

Microsoft Sysinternals has a great free utility called Process Explorer that is like a task manager on steroids.  It works on all versions of Windows and allows you to easily see services running inside of svchost.exe.  Download Process Explorer here.  Once you have it running right click on any process and select Properties. Then click on the Services tab and you will see all processes running inside the host process.


Keep Folders Hidden

first create a new folder somewhere on your hard drive

when you name it hold down “Alt” and press “0160” this will create and invisible space so it will apper as if it has no name.

then right click in and select “Properties” select the tab “coustimize” and select “change icon” scroll along and you should a few blanc spaces click on any one and click ok when you hav saved the settings the folder will be invisible to hide all your personal files