Tuesday, November 6, 2007

How to rename 100 files at a time

I have a problem.
I have 100 images of my sister Marriage.
All images have different file names.I want to rename them at a time?How can i do?
Here is technique.
open folder which contain images or any other files.select images(files) which you want to rename sequentially.
now whatever files you are selected are appear in blue coloured selected files.
just right click on the first image(file) and select rename here type "marriage"then press enter Now you can see that all the files are name as
marriage
marriage (1)
marriage (2)....
,
,
,
marriage (99)
It is the easy way to rename all the file at time.

Have you forgot your user account password

If you forgot your user account password pass word
No problem. Here is a solution.
(This works only when there is no password for Administrator account).
Start windows in Safe mode. (while booting press F8 to start in safe mode)
While entering into the windows it shows
Administrator account
Your account
Click on administrator account
Then you can enter into windows in safe mode
Go to control panel
Open user accounts
Click up on your account
Clik on “remove password”
Reboot windows.
Then you can enter into Your account without password.
It is only one method of troubleshooting. Don’t do this on other’s system.

can you create Folder?

It is looking Funny!So try to create these folders (or files)
CON, .CON, CON. ,COM1 ,COM2 , COM3 ,COM4 ,LPT1 ,LPT2 ,LPT3 ,PRN ,NUL ,
AUXOnce Check it Out.It is impossible. Interesting !
You aren't allowed to create folders with names that are the same as the ones that have been used for various devices on a PC since the DOS era."CON" refers to "console",
in DOS."PRN" refers to "printer,""LPT1," "LPT2," etc., and "COM1," "COM2," etc. refers to the communication ports.The bug has been tried and tested in both Windows XP Home and Professional.
If you try to make a folder named "CON" (case insensitive), Windows XP renames it back to what it was. So creating a new folder with the name "CON" just renames it to "New Folder".
The bug seems like a variable that got treated as a string or vice-versa. Trying to create the folder from a cmd prompt failed with an error "The directory name is invalid.".This also works when you try to create a file called "CON", or "CON.". ".CON" shows up the way it should.
Methods To Create Above Folders:
Method 1:
STEP1: goto command prompt
STEP2: type in prompt e:\> ((mkdir \\.\e:\con))
STEP3: verify by typing ((dir \\.\e:\con))
STEP4: delete the file or folder ((rmdir \\.\e:\con))
Note::Not necessary for to go only E:,u canm create in any Drive.(This method is bulky and confusion. So You can Use}.

Method 2:
Create Folder While name Type CON and then stroke the key ALT+0160 on numeric key pad.
CON -> ALT+0160)Then you can create CON folder and other described folders.It means that when you type a folder name with simple ALT+0160 you can create empty folder.
There is no name for a folder.Here we are using "CON " (CON with space).This is the tricky logic here.

Surfing Internet Using Calculator Or Other Accessories




How to surf the net using any simple window accessory(paint, calculator or notepad)?

1-Open any windows accessories.
2-Press F1 or Open Help Topics from Help menu.
3-Click on the top left icon on the title bar of Help dialog box(it looks like a document with a question mark).
4-From the menu that appears click on Jump to URL option.
5-A dialog box will appear, type the link or website you want to open in it(please type http:// before the website) and press enter key.

The website will open and u can surf the internet now. Enjoy....

Multiple Mail Addresses.... With A Single ID

Do u Know that In Gmail server, something+anything@gmail.com means something@gmail.com.... Didn't got it??? read on....
for gmail server anything after a "+" sign means nothing! that means that if u send a mail to abc@gmail.com or abc+def@gmail.com, both are the same and are going to be delivered at abc@gmail.com.
So you can give ramesh ur mail id YourId+ram@gmail.com, and to Shyam YourId+Shyam@gmail.com...... All these mails will be delivered to your mail address
YourID@Gmail.com

HOWZ DAT????????

Irritating Tricks!

Hi Friends,i Guess this Is going to be a real nasty column and i am sure you guys are going to love it. here are some tips and tricks to Irritate or trouble someone. Please don't use it for any illegal purpose. These are Meant to Just to do some harmless pranks with your friends.

1.MAKE THE DRIVES IN MY COMPUTER INVISIBLE!

You can make the drive list on anyone's (or maybe your) computer invisible.
Just Open Registry editor my going to Start->Run and typing regedit command. Then locate following Key

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
polocies\Explorer


Now in the right pane create a new DWORD item and name it NoDrives(it is case sensitive). Now modify it's value and set it to 3FFFFFF (Hexadecimal) .Now restart your computer. So, now when you click on My Computer, no drives will be shown(all gone...). To enable display of drives in My Computer, simply delete this DWORD item that you created.Again restart your computer.You can now see all the drives again.

2.DISPLAY YOUR OWN MADE WARNING MESSAGE EACH TIME THE COMPUTER BOOTS

You can display your own made warning message each time the computer boots. Like "Yous Computer is Hijacked" etc...All you've got to do is locate following registry key.

HKEY_LOCAL_MACHINE\Software\Microsoft\CurrentVersion\WinLogon
search for a string value named LegalNoticeCaption and LegalNoticeText(create if its not there).Enter the value of LegalNoticaCaption "WARNING" and Put the Message you want to Display is the value field of LegalNoticeText.
Next time the windows boots your message will be displayed

3.DISABLING RUN AND FIND IN START MENU

Again locate following key in registry

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Policies\Explorer


Create a new DWORD Value if its not already there. NoRun to disable Run and NoFind to disable Find. Set its value "1" to disable and "0" to enable it.

4.DISABLING ANY APPLICATION FROM RUNNING!

You can prevent the execution of ALL applications!
Beaware, Its going to be a realy ugly prank!!
locate following Registry Entry
HKEY_CURRENT_USER\Software\Microsoft\windows\CurrentVersion\
Policies\Explorer

Now create a new DWORD Value by the name RestrictRun. Set its value "1" to prevent applications from running and "0" to re-enable it.

Create a new Registry key By the name of DisallowRun in

HKEY_CURRENT_USER\Software\Microsoft\windows\CurrentVersion\
Policies\Explorer


More are Being added EVERYDAY, So keep looking...........

Key Loggers


Long ago a buddy of mine came up to me and told how he received a mail that had the password of his email account!

Like a typical tech guy, I immediately replied his computer may have been infected with password stealing viruses, trojans or key loggers. But in fact, he had a pretty good anti-virus with the latest updates and no harmful programs were found in his computer.So how did that email contain his password? Was the account hacked?

It became very clear after he said who had sent that mail! Apparently, the email was a spam mail sent from a third-party website (let's take xyz.com as an example), where he had registered as a user. The answer was right there!While registering at xyz.com, he had used his Yahoo email id as his username at xyz.com and used the same Yahoo! Mail email account's password as the password for xyz.com.So now, xyz.com had both his email Id and password. The user had disclosed his email id and password, although unintentionally.What to do if I have committed this mistake?

Can this be considered a mistake in the first place? Oh yes! It should be when you have a lot at stake (personal mails, business plans..etc) in your email inbox. Moreover, there are thousands of new websites popping out each day only to disappear weeks later. Always better to be safe than sorry.The very first thing one can do is to :
Change the email password immediately.
Always keep a separate username and password for registering at other sites.
Use the secret Question & Answer password recovery option for your email, in case someone changes your email password. Many still don't use it. This will only work if the person who logged into your account didn't change the secret answer.
Personally, I always keep a separate password just for registering at websites that I find interesting. Do you use your email password while creating accounts at other sites? Have you thought about this while registering at sites? Please let me know in the comments...

Avoiding Keyloggers

First things first! Always try to avoid accessing your online accounts from public computers (cyber cafes…etc). With all the keyloggers that may be stuffed in public computers, they pose a serious security risk to users. Keyloggers mean not just trojans, but commercial keyloggers as well.

What are keyloggers ?
Key Loggers are software or hardware tools to that captures the user’s keystrokes from keyboard. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. However, keyloggers are widely available on the Internet and can be used by private parties to spy on the computer usage of others hence stealing users private data.

Aim of this post on keyloggers
Our aim here is to confuse the keylogger by making it log some gibberish instead of our valid password. Off course, this is not completely foolproof though. Nothing is foolproof on the net. We only have to make it harder for thehacker.
(Note: These are tips I personally follow. If you have better ones, let everyone know by commenting here.)

Types of Key Loggers
We’ll be dealing with two types of keyloggers; software and hardware keyloggers.
Software keyloggers on the other hand are much more complex and hence difficult to deal with. Most of them record keystrokes, mouse events, clipboard activity..etc. So our best bet is to scramble the keystokes smartly.
Hardware keyloggers are much easier to detect. They are mostly attached between the keyboard and the CPU. A manual inspection should be enough in most cases.

How to confuse and avoid the software keyloggers ?
Let’s say we have to enter a password ‘jazz’.
Click the password box, type any random key. Select the entered random key with the mouse and type j. So we entered the first letter of the password.
Click the password box, type a random key. Again click and type a random key. Select the last two letters with your mouse and type the next valid key of your password.
In this case we managed to enter 2 unwanted characters as against one in the first step.
Continue in a similar way to finish typing thepassword. You can choose any number of random characters between your password.
So the keylogger will log something like:[click]b[click]j[click]g[click]m[click]a[click]v[click] z[click]t[click]c[click]z
Note how we used unwanted mouse clicks so that a mouse click is recorded before the random letters also. You can also experiment entering the password in the reverse order, infarct any order.
This method can be used for entering the username too, since most banks have account numbers as username. If you are suffering from some keylogger phobia, use this technique while typing the url too.

Another way is utilizing the browser’s search bar or address bar to camouflage the password.For eg. Click the password box and type a letter of the password. Now click the browser’s address bar or search bar and type some unwanted letters. Alternate between the password box and address/search bar till you finish. The result will be the same as the former method.

How to find the hardware keyloggers ?
Hardware key loggers are easy to find. They are devices which is attached in between keyboard and cpu junction. If you are really suspicious about them just check the back side of cpu and find if something is fishy. The images will give you a better idea.

Feeling secure? Well, this sort of stuff may not work against the really smart keyloggers. Yeah, the one’s that also take a screenshot when a keystroke or mouse event is detected.There’s is a solution for that too, but it is cumbersome. Take a Live CD of any of the Linux distributions. Insert and use ( and hope Linux will detect the hardware so you can start surfing; I have read Ubuntu Linux is good.). Even if you can successfully access from the Live CD, don’t forget to use the above tips to workaround the hardware keylogger.

Again as I mentioned in the beginning, always try to avoid dealing with confidential data from Public Computers. What are the precautions you take? Do you know a better technique? Feel free to comment….

Show Hidden files/folders in Windows (When you can't) using the Command Prompt

A friend of mine once approached me with a simple yet strange request. "How do I view hidden files and folders in Windows XP ? ". The fact that he had been using Windows for years astounded me. Off course, he knew how to view hidden files & folders, but this was a unique case.

He sent me a screenshot of his folder options box. Take a look


Strangely, both 'Do not show hidden files and folders' & 'Show hidden files and folders' were enabled.My initial reaction was it may be a virus, trojan, spyware or some malware. Scanning with various anti-virus and anti-spyware software didn't reveal anything. The funny thing here was all the hidden files were perpetually hidden; we weren't able to get the files in the hidden folders even with a Windows search. So using the command prompt to find hidden files was the best option. How to do it?Let's say you want to see all hidden stuff inside the D:\Temp folder. Check the steps below:

1. Go to Start >> Run. Type cmd and press Enter to open the command prompt.

2. Now navigate to the directory from the command prompt.[For eg. Assume you are in C:\Documents and Setting\Jose. and you want to go to D:\Temp; type D: and press enter. This will take you the root D:\ in the command prompt. Type cd Temp in the command prompt and press Enter. Now you'll be inside D:/Temp from the command prompt.]

3. Type the command dir/ah to list all the files under D:\Temp.

Once you get the name of the files, you can view or run them by entering the file path in the address bar of Windows (The address bar of Windows is similar to the address bar of Internet Explorer, where you type the website or folder address).To delete files use the del [Folder Name] in the command prompt. This will delete the folder you specify under the current directory. Eg del Temp

Delet undeletable with UNLOCKER

This is pretty useful if you have packed the Windows taskbar by opening many applications and files. Do you hate closing all those files individually? If yes, then this is for you!It is unbelievably easy; just press and hold the Ctrl key. Now click all the applications you want to close while still holding down the Ctrl key. Right-click any of the applications you selected and click Close Group.
It is done!So, now you know to get rid of this annoyance.

Delete/Rename locked Windows files with Unlocker




"Cannot delete File4.mp3: It is being used by another person or program".



You may have come across the above message quite a few times. This happens because Windows locks files or folders that are currently used by other applications or shared by other users.


In comes Unlocker! What is that?Unlocker is a small freeware which will help take instant action when you encounter similar situations. Once installed, Unlocker will be available from the right-click context menu


If you get a message when trying to delete or rename a locked Windows file or folder, just right-click the file and select Unlocker.Unlocker will open a window displaying all the processes that are locking the file or folder. Select some of them and click Unlock.You can now proceed with you task

Remove "Folder Options" from Tools menu in Windows XP

I have tried this with Windows XP pro, and I'm not sure whether this will work with other XP variants.

Removing the "Folder Options" menu involves modifying the Windows Group Policy editor (gpedit.msc).

Just follow the below listed steps.

1. Go to Start >> Run

Type gpedit.msc and press Enter.

2. In the resulting window, navigate to the folderUser Configuration >> Administrative Templates >> Windows Components >> Windows Explorer.

Look for the key named "Removes the Folder Options menu from the Tools Menu".Double-click the key and select Enable.

Click OK.


3. To display the "Folder Options" menu, follow the previous steps and select the Not Configured option for the "Removes the Folder Options menu from the Tools Menu" key.

Recover deleted files in Windows

Did you ever delete some files from the Recycle Bin only to discover later those files were important?Many people are unaware that deleting a file from the Recycle Bin doesn't really "Delete" the file from the Hard Drive.In fact, when a file is deleted, Windows marks the file for deletion and removes it from the File System Database.The space occupied by the file is marked as free space for new data, but the old file is still present.If some new data is written in the same part where the old file existed, the old file may become unrecoverable.So, an immediately deleted file has good chances of recovery.There are tools available to recover deleted files. Following are some of the Free tools:

1. PC Inspector File Recovery. (Freeware) (download)

PC Inspector recovers lost files and finds partitions automatically, even when the boot sector of your drive has been erased of damaged, or the file's header information is not available. You can save the recovered files in your machine. Files are recovered with the original date and time stamp.I personally use PC Inspector.

2. Restoration. (Freeware) (download)

You can read more about Restoration here

3. VirtualLab Data Recovery Software. (Free to try) (download)

Read more about VirtualLab Data Recovery Software here.

Set a Video as your Desktop background Wallpaper

This summary is not available. Please click here to view the post.

Capture Movie\Video Screenshots from Windows Media Player

What will happen if you try to capture a screen shot in Windows media player by using the 'Printscreen' button?Chances are you will end up with a black blank screen and not a shot of the video.The following quick tip will help you to easily capture screenshots of videos from Windows Media Player.

Method 1
1. Use 'Ctrl + I' while a video is being played or while it is paused.
2. This displays a Save Captured Image dialog box which allows you to save the captured screenshot.

Method 2
1. In Windows Media Player, go to Tools >> Options.
2. Select the Performance tab in the Options window.
3. Click the Advanced button.
4. In the Video Acceleration section, uncheck 'Use Overlays'.You can also uncheck Use Overlays in the DVD video section to capture stills from DVDs.
5. Click Ok Once you are done with the setting, pause the video in Windows Media Player and click the 'PrintScreen' button on the keyboard. You will find this button next to the F12 key on your keyboard.Now open an image editor and paste or hit 'Ctrl + V' to paste the screenshot image.

View, Recover deleted YouTube Videos

Yesterday i found a kool site which will allows us to watch deleted youtube videos,Delutube, which lets you view and even download videos deleted from YouTube.The working is quite simple.
If you come across a "This video is no longer available" message in YouTube, just copy the video id and provide it to Delutube. Delutube will try to display the video for you.Plus, you are also provided with links to download the videos.Another feature is to view any randomly selected videos.This can only work if YouTube keeps the deleted videos in its servers. Once deleted from YouTube servers, Delutube may not be able to retrieve them.Sooner than later, YouTube will sort this out. I guess!Readers be warned when using Delutube. The contents may be illegal.

Download YouTube videos with a 'Kiss'


This probably is the best way to download a video from YouTube. No Firefox addons, plugins or other third-party apps needed. Just a web browser and the word 'kiss'.KissYouTube is a website that makes this possible. To download a video, you just have to add the word 'kiss' before the words 'youtube' in the YouTube video url.For example, here's a video url of Nora, the piano playing cat:http://www.youtube.com/watch?v=TZ860P4iTaMTo download this video just add 'kiss' to the url as shown below:http://www.kissyoutube.com/watch?v=TZ860P4iTaMWithin KissYouTube, you'll have the option to watch or download this video.

How to watch two YouTube Videos Simultaneously?

Here's some piece of multi-tasking; YouTube video viewing multi-tasking that is!Just head over to YouTube Doubler. Now what is that?YouTube Doubler Beta is a site that allows you to watch two different YouTube videos simultaneously in the same web page.So if you wanna watch two different videos at the same time,
just paste the video URLs of both the videos in the text boxes provided at the site and press the Double Up! button.There is nothing much to do after that. Just sit and watch the movies play.

Download YouTube videos in different formats.




There are much easier ways to download videos from YouTube, but the downloaded videos are in Flash video (FLV) format which can only be played by few media players,
notably VLC player.More often than not, you'll want to convert those videos into a different format. So this would mean using more software on your machine.

Enter Vixy.net! What does it do?First of all, it can be used to download YouTube videos. The second and the important thing is, Vixy.net is a free online Flash video converter. It can convert a Flash Video(FLV) file to MPEG4 (AVI/MOV/MP4/MP3/3GP) file online.You can then download the converted file.How to convert a video?A no-brainer! Just provide the YouTube video url, select a format that you want to convert to, and click Start.Vixy.net will convert the video and provide you a download link.

Hide Files & Messages inside Images

Nothing new here, really! Hiding messages inside images has been around since ages. The digital era has greatly simplified this for us, and we will be doing exactly that;
hide files in images.There are numerous ways to hide messages and files in images. So let's take a look at two of them;
the first one to hide files and the second one to hide text messages.Using the command prompt in Windows This one's quite easy. Create an archive file (i.e a Zip or Rar file) which contains the files you want to hide.Our aim is to hide this archive file inside an image. Let's assume secret files.zip is the archive file and my picture.jpg is the picture file which will be used to hide the archive.
Now open the command prompt and use the following command:
copy /b mypicture.jpg + secretfiles.zip new.jpg
The above command will create a new image file named new.jpg, which contains secret files.zip.Opening new.jpg will only display the image from the original my picture.jpg file, so the zip file stays hidden.
However, to access the archive, you'll have the open the new.jpg file with programs like Winzip,Winrar,7-zip etc.
This trick can also be used with other image formats like png, gif, tif etc. Additionally, the zip or rar archives can be encrypted(password protected), thereby making it difficult to retrieve even if one knows an image contains these files.Hide messages using ImageHideWell, ImageHide 2.0 is a software which is capable of hiding messages in images.

However, unlike the previous method, you can't hide files in a picture with ImageHide. Only messages!As I found out, this isn't the best user-friendly software. It felt awkward sometimes. So I created a quick guide below for using ImageHide.

Hide a message with ImageHide:
Click 'Load Image' to load an image, enter your message in the bottom pane, click 'Write Data' and then hit 'Save Image' to save the image.View a hidden message with ImageHide:
Click 'Load Image' to load an image and hit 'Read Data' to view the message.To Encrypt a hidden message:
Create a message as shown above.
Click Encrypt to open an new window. Click Encrypt again in the new window.
You'll be prompted to enter a password. Type in a password and close.
Now click 'Write Data' and hit 'Save Image' to save the image.
Remember the password. It is used to decrypt the message.

Go more! and Grow more! with your Mobile!!

Now a days Mobile phones are not just phones. They do lot of other things.
It can be used as a GPS, Cardreader, MiniTV, Music player, Digital camera, personal manager etc.
If Your phone has the following specifications, you can simply transform it into a multipurpose cool gadget.Internet access via GPRS/EDGE/HSPA.A camera of minimum 2 mega pixels.Enough space in phone memory for fixing applications in the handset.

1.Check all your e-mails on a single screen!!Do you have multiple email accounts in Yahoo, Gmail, Rediff, AOL, MSN etc??Check all your mails on a single screen and avoid time consuming process of several logins.Just follow these steps ! This is for all phones!!

1.Check your multiple mail accounts in a single screen!!Register at http://www.flurry.com on a computer.You will receive a text message to your phone.
On your phone, click on the link received in SMS and you are taken to appropriate webpage where a software application is available Download the application and load it in your handset.
All e-mails will get downloaded automatically to your phone and you can view,reply,delete,forward them etc.»¤ you have to provide your mobile number, handset model, your mail ids and their corresponding passwords while registration at
step 1. (ehh!!..passwords too..? Yeah..the site claims that your passwords are secure)

2.Convert your Mobile into a GPS receiver!!Buy SE GPS enabler HGE-100 (this will be released in t the market by the end of December 2007 and may costs you around 6000bucks)Simply plug it to the handset and the accessory will act as the antenna to receive GPS signals from the satellite.Log on to the website mentioned in the manual through phone and enter the passcode.
The HGE-100 will verbally guide you if you are looking for a specific location.»¤ This is for SonyEricsson phones only alternatively..Buy Nokia N95. This model has got in built GPS system and GO!!Advantages..Highly essential for forest officers.You can track the distance you walked/traveled.You can check the speed of your walk/travel you can find route to a specific location.

3.Your mobile- Your Card reader!!Felt your purse too heavy because of keeping all visiting cards?Is the card holder on your office table is too bulky?Don’t you have the time to sort out the visiting cards?Heads up!!Go to www.bizreader.com through your mobile.Download cardreader application from the site.Load it on to your mobile,now your handset has cardreader.
Take a snap of the visitingcard with your phone.The cardreader in your phone reads the information and allows you to save it directly in your phonecontacts.

4.New colours of Advertisements!!Found advertisements in dailys, weeklys, magazines etc useful to your friends?Grab them as they are and send to your dear ones.Go to www.colorcode.com.sg from your mobile.Download the application color cam.
Load color cam in your mobile phone.Take a snap shot of the Advertisement with your phone.The color cam of your phone will reveal the information encoded in a design to you.Send the designed ad to your dearest through e-mail/blue tooth/picture message etc.

Bored of typing site address in addressbar?? Here is the way to cut it..

If You Dont Want To Type The Site Name In The Address Bar Then

1. Open Notepad and type exactly as follows:
start iexplore.exe www.sitename.com

2.Now save it as sitename.bat (ex: orkut.bat)at desktop

3.Now double click the batch file name /icon at desktop & the site will open.

Speedup your Browsing experience

Impotant note:Playing with system files can be dangerous , so perform this at your own risk
This tip works with ALL Windows 95/98/NT4/2000/ME/XP/2003
releases And MS Internet Explorer 4/5/6/7.
This Registry fix speeds up internet/remote (using Windows Explorer and/or Internet Explorer) browsing process considerably on most MS Windows 32-bit machines connected to a network/remote computer(s).

This actually fixes a BUG in MS Windows operating System that scan shared (remote) folders/files across network/s for Scheduled Tasks and Shared Printers, and can add a delay as long as 30 seconds/s, because it uses extra time to search the remote computers (thts very sad).

Note -:Before Performing this make sure all Windows Explorer and MS IE instances are closed.

Then run Regedit and goto :
HKEY_LOCAL_MACHINE>>
Software>>
Microsoft>>
Windows>>
CurrentVersion>>
Explorer>>
RemoteComputerNameSpaceIn the left hand pane highlight these 2 subkeys:
{D6277990-4C6A-11CF-8D87-00AA0060F5BF} = Scheduled Tasks{
2227A280-3AEA-1069-A2DE-08002B30309D} = Shared Printersand delete them:
right-click on each -> select Delete -> click OK.
RECOMMENDED: Export (BACKUP) this Registry key to a REG file FIRST, to be able to restore it (by running the REG file) if necessary.
In Regedit: highlight the key name in the left hand pane
-> click “Registry” from the menu
-> select “Export Registry File…”
-> type a file name in the “File name” field
-> browse to the destination of your choice
-> push the Save button.
This Registry change takes effect immediately.

Also Configure Internet Explorer for fast-browsing:-To Do this all u need to do is copy/paste the following code in notepad and then save it as .reg .
Finally double click on the Saved file and then hit enter Windows Registry Editor Version 5.00[HKEY_CURRENT_USER\Software\Microsoft\InternetExplorer\Main]
“Show_ChannelBand”=”No”
“Cache_Update_Frequency”=”Once_Per_Session”
“Show_StatusBar”=”yes”
“Show_ToolBar”=”yes”
“Show_URLinStatusBar”=”yes”
“Show_URLToolBar”=”yes”
“Startpage”=”about:blank”
“Use_DlgBox_Colors”=”yes”
“FullScreen”=”no”
“Show_FullURL”=”no”
“ShowedCheckBrowser”=”Yes”
“Check_Associations”=”No”

Thts it .Enjoy high Speeds
This Registry change takes effect immediately.

chat with all of ur friends with ur multiple yahoo accounts simultaneously...!!

just do the follwing steps..and chat with all of ur friends in all your multiple yahoo accounts..at a time...simultaneously...!!
1. Go to Start ----> Run . Type regedit, then enter .
2.Navigate to HKEY_CURRENT_USER --> Software -->yahoo --->pager-->Test
3.On the right pane , right-click and choose new Dword value .
4.Rename it as Plural.
5.Double click and assign a decimal value of 1.
That's it done!!Now close registry and restart yahoo messenger .
For signing in with new id open another messenger

want to get full control on ur friends system 'or' operate his system from ur system

www.beam2support.com
www.logmein123.com
www.gotomypc.com
subscribe and get login ids. than ask ur frnds to type session id. get control on his system or give him ur system control.its easy just 4 steps

short cuts from run

System Properties = sysdm.cpl
Network Connections = ncpa.cpl
ODBC Administrator = odbccp32.cpl
Display Properties = desk.cpl
Add or remove programs = appwiz.cpl
Internet Properties = Inetcpl.cpl
Game Controllers = joy.cpl
Phone and modem Options = telephon.cpl
Time and Date Properties = timedate.cpl
Region and Language Options = intl.cpl
Power Options = powercfg.cpl
Mouse Properties = main.cpl
Accessibility Options = access.cpl
Add Hardware Wizard = hdwwiz.cpl
Sound and Audio Devices = mmsys.cpl
User Accounts = nusrmgr.cpl
Speech Properties = sapi.cpl

Prevent virus of Orkut is banned you fool

"ORKUT IS BANNED, Orkut is banned you fool`,
The administrators didnt write this program guess who did??
MUHAHAHA!!".

Did you eer found an error wile opening Orkut?
It makes a folder named heap41a in the
C:\ drive with attributes S (System file) and H (Hidden file).
If your pc is infected by this virus then just boot it in safe mode,goto cmd prompt and at
C:\> type attrib -S -H heap41a to make this folder visible and then just delete this folder.
Now use a registry cleaner to delete the registry keys made by thisEasy Method to delete the virus.

open task manager>process tab>there if you find svchost.exe befor your user name (remember also system will use svchost.exe don't end that) just give end process for that then go to run and

type C://heap41a and delete all files of that folder.. now you are done Enjoy orkut....

Page copy protected against web site content infringement by HACKER
Google