Sunday, 31 March 2013
Wednesday, 27 March 2013
How to delete viruses manually /no need antivirus
Wednesday, March 27, 2013
No comments
HOW TO DELETE VIRUSES IN DRIVE/USB DRIVE:-
Hello frndz i m here to tell u haw to delete viruses on pendrive/pc drive.
when i go to my college share some data to computers.........................
There is many viruses attaches with file.................................................
Like autorun.inf,RECYCLER.exe/NEW folder.exe etc.etc.............
when i go to my college share some data to computers.........................
There is many viruses attaches with file.................................................
Like autorun.inf,RECYCLER.exe/NEW folder.exe etc.etc.............
my all files being infected with these viruses.can't run, and also infected my pc.
EVEN antivirus can't detect them,can't delete them.some time they copy
with ur files and infect other files./also create copy of them............................
EVEN antivirus can't detect them,can't delete them.some time they copy
with ur files and infect other files./also create copy of them............................
so i m here to tell u solution of this problem:-
- open cmd and type these commands on prompt menu:-
- Type the drive name in cmd you want to remove virus such as H:
- write the command dir/w/a press Enter
- it give the list of file exist in drive-included virus file also.
- Autorun.inf
- Ravmon.exe
- New Folder.exe
- svchost.exe
IF any of these are appeared.THEN start the procedure to delete them.
- ONE of most point is that sometime virus files are hidden.
- to see them type command attrib -r -a -s -h *.* press ENTER
- now just type command del FILENamewith extension(autorun.inf).
- EG:- del New folder.exe
SO the file are deleted. NOw u ready to use ur pendrive.
IT is virus free.
IF u like that give comment /subscribe/like us on facebook/twitter/google+
Monday, 25 March 2013
How to Delete An "undeletable" File
Monday, March 25, 2013
No comments
How to Delete An "undeletable" File:-
Hello frndz here are some steps described below.which help u to done this task easily.
1. Start
2. Run
3. Type: command
4. To move into a directory type: cd c:\*** (The stars stand for your folder)
5. If you cannot access the folder because it has spaces for example Program
Files or Kazaa Lite folder you have to do the following. instead of typing in the
full folder name only take the first 6 letters then put a ~ and then 1 without spaces.
Example: cd c:\progra~1\kazaal~1
6. Once your in the folder the non-deletable file it in type in dir - a list will come up
( with everything inside ).
7. Now to delete the file type in del ***.bmp, txt, jpg, avi, etc.. And if the file name
has spaces you would use the special 1st 6 letters followed by a ~ and a 1 rule.
Example: if your file name was bad file.bmp you would type once in the
specific folder thorugh command, del badfil~1.bmp and your file should be gone.
Make sure to type in the correct extension.
AN unofficial guide to ethical hacking
Monday, March 25, 2013
No comments
AN unofficial guide to ethical hacking:-
I m here to let u know more about ethical hacking.....................................
I took some guide which help u to learn more task easily in under one roof.
so read it and enjoy....................................................................................
I took some guide which help u to learn more task easily in under one roof.
so read it and enjoy....................................................................................
Lets start Reading :-
Saturday, 23 March 2013
How to hide ur folders/stuff/as u want
Saturday, March 23, 2013
No comments
Hide the folders/stuff/anything u want:-
If you would like your desktop Icons to have no text underneath then try this tweak:
NO NAME FOLDER:-
Right click the icon and select "Rename"
1.Now hold the "Alt" key and type "255" and hit Enter
2.Another one is hold "alt" key and type "0160" and press Enter
Hide the Icon:-
- select the icon
- right click on it
- go to properties
- go to custmize
- go to change icon
- scroll the bar
- here u see a invisible icon
- select it-press ok
Now u have done.
Icon is not appearing
Icon is not appearing
wen select all item it show u the invisible icon is there. By this u can hide ur stuff as u want.
NOTE : It may only work with the keypad numbers and not the number keys on top of the keyboard.
NOTE : It may only work with the keypad numbers and not the number keys on top of the keyboard.
IF u like the trick comment/subscribe/like us on (facebook/twitter..)
How to block websites manually -fast way 1 or 2 minute
Saturday, March 23, 2013
No comments
How to block website-in 1 or 2 minute:-
Hello frndz i m(Narender Rathor) here to teach u HOw to block websites
And protect ur children/students/frndz to open website like facebook/youtube.
Steps to follow:-
First of all open ur pc.GO to C: drive or where ur window is installed.- Here browse following path:- C:\WINDOWS\system32\drivers\etc
- IN etc folder u see the file named as: HOSTS
- open it with notepad.
- AT "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com
I WIll show u n example.......
EG:-
127.0.0.1 localhost
127.0.0.2 www.blockedsite.com
Now save it........open the browser and type site u want to block.......u see site is unaccesible.
- FOR more site to block just add last no.to 127.0.0.no.
127.0.0.1 localhost
127.0.0.2 www.youtube.com
127.0.0.3 www.facebook.com
127.0.0.4 www.blabla.com
PLZ if u like it please comment/like us on facebook,gmail,google. IF u have some quries plz ask qus.
Thursday, 21 March 2013
How to rearm window 8/Increase trial period
Thursday, March 21, 2013
No comments
How to rearm window 8:-
To do that we have to open command prompt(cmd)-Run as administrator mode
Type the following command described below:-
- slmgr./rearm after that hit ENTER on command prompt.
- NOW u have seen a window is coming tell that ur 90 days trial period is start.
- I hope u enjoy with that............Wish u good luck.......
For more stuff go to my channel :-https://www.youtube.com/watch?v=24hPIoplHWk
Wednesday, 20 March 2013
How to protect ur windows-creating restore points
Wednesday, March 20, 2013
No comments
Creating restore points:-
- Creating of more restore points .keep ur system/windows protected.
- we all know that system itself made restore points.but sometime not available.
What restore points do:-
- Restore poi nts are those which make ur system to came to same state.
- As it at making of restore point time.
- All changes/affected program are removed.
STEP TO FOLLOW:-
- first of all go to computer.
- right click on it.click on properties tag.
- click on system protection.
- Awindow came named as system properties.
- At last of this window following line is written-
- "Create a system restore points right now for the drives that have system protection on-
- click tab is showed here-click on create
- Enter name of restore point.
- Now u have done.when pc crash / can't boot/registry changes/can't hide from it.
- when click on restore points we created.system goes on that configuration at time of saving restore point.
Sunday, 17 March 2013
HOW to increase system speed by(Increasing virtual memory)
Sunday, March 17, 2013
No comments
For fast system processing - increase virtual memory:-
Hello frndz today i m gonna show u how to increase system speed by Increasing virtual memory.
( Virtual memory gives applications powerful capabilities to create and destroy chunks of memory, map chunks of memory to portions of disk files, and share memory with other processes. )
concept of virtual memory:-
- Processes in the system share some main memory(RAM) & CPU with other processes.
- So we all know that processes run on the Main Memory. For this they share RAM.
- BUT if there is too may processes in the system. THEY recquire memory to RUN.
- Which is not possible in this case.Because memory is full by some limited no.of process.
- Remaining other processes not able to run .
In order to manage memory more efficiently and with fewer errors, modern systems provide
an abstraction of main memory known as virtual memory (VM).
1. It uses main memory efficiently by treating it as a cache for an address space stored on disk,
keeping only the active areas in main memory, and transferring data back and forth between disk
and memory as needed.
2. It simplifies memory management by providing each process with a uniform address space.
3.It protects the address space of each process from corruption by other processes.
WATCH IT:-
Saturday, 16 March 2013
How to increase RAM(Main memory) using Pendrive
Saturday, March 16, 2013
1 comment
Increase RAM using pendrive:-
- This trick help u to increase ur system RAM(Main memory).using pendrive.
- We all know that all processes on the system Run on the main memory........
- So If ur Ram is small there is some problem occours.some processes need more space to run.
- Most probably we face this problems with new games launched in market.
- All these game recquire 3-5 GB Ram to run...............................................
- We can't afford to increase our ram time by time meet system recquirements.
- So we have some solution for this-we increase our Ram by help of external pendrive.
- Every person have pendrives minimum 2-4 GB with them for data transfer.
- SO we use that external pendrive to INCREASE OUR RAM.
HERE WE GO WATCH :-
Friday, 15 March 2013
TIPS TO SECURE UR PC FROM MAILICIOUS VIRUS/SOFTWARE
Friday, March 15, 2013
No comments
![]() |
STEPS TO FOLLOW |
1. Email is one of the common ways by which your computer can catch a virus.So it is always
recommended to stay away from SPAM. NEVER click on any links in the emails that
comes from untrusted sources.
2. Be careful about using MS Outlook. Outlook is more susceptible to worms than other
e-mail programs, unless you have efficient Anti-Virus programs running.
3. Never open any email attachments that come from untrusted sources.
4. As we all know, Internet is the main source of all the malicious programs including
viruses, worms, Trojans .
• Don’t click on pop-up windows that announce a sudden disaster in your city or announce
that you’ve won an hourly prize. They are the ways to mislead Internet users and you should
never trust them.
• You can also use a pop-up blocker to automatically block those pop-ups.
5. USB thumb/pen drives are another common way by which viruses spread rapidly.
So it is always a good habit to perform a virus scan before copying any data onto your computer.
6. Most of us use search engines like Google to find what we are looking for.
It is quite obvious for a malicious website to get listed in the search results.
7. Install a good Antispyware program that operates against Internet malware and spy ware.
8. Set up your Windows Update to automatically download patches and upgrades.
9. While you download files from untrusted websites/sources such as torrents, warez etc.
make sure that you run a virus scan before executing them.
10. And finally it is recommended not to visit the websites that feature illegal/unwanted stuffs such as cracks, serials, warez etc. since they contribute much in spreading of viruses and other malicious programs.
recommended to stay away from SPAM. NEVER click on any links in the emails that
comes from untrusted sources.
2. Be careful about using MS Outlook. Outlook is more susceptible to worms than other
e-mail programs, unless you have efficient Anti-Virus programs running.
3. Never open any email attachments that come from untrusted sources.
4. As we all know, Internet is the main source of all the malicious programs including
viruses, worms, Trojans .
• Don’t click on pop-up windows that announce a sudden disaster in your city or announce
that you’ve won an hourly prize. They are the ways to mislead Internet users and you should
never trust them.
• You can also use a pop-up blocker to automatically block those pop-ups.
5. USB thumb/pen drives are another common way by which viruses spread rapidly.
So it is always a good habit to perform a virus scan before copying any data onto your computer.
- NEVER double-click the pen drive to open it. Instead right-click on it and select the option "open”.
6. Most of us use search engines like Google to find what we are looking for.
It is quite obvious for a malicious website to get listed in the search results.
7. Install a good Antispyware program that operates against Internet malware and spy ware.
8. Set up your Windows Update to automatically download patches and upgrades.
9. While you download files from untrusted websites/sources such as torrents, warez etc.
make sure that you run a virus scan before executing them.
10. And finally it is recommended not to visit the websites that feature illegal/unwanted stuffs such as cracks, serials, warez etc. since they contribute much in spreading of viruses and other malicious programs.
Unix/Linux Command Reference
Friday, March 15, 2013
No comments
Hello frndz i m here to teach u some unix/linux commands.
1. ls Directory listing
2. ls -al Formatted listing with hidden files
3. ls -lt Sorting the Formatted listing by time modification
4. cd dir Change directory to dir
5. cd Change to home directory
6. pwd Show current working directory
7. mkdir dir Creating a directory dir
8. cat >file Places the standard input into the file
9. more file Output the contents of the file
10. head file Output the first 10 lines of the file
11. tail file Output the last 10 lines of the file
12. tail -f file Output the contents of file as it grows,starting with the last 10 lines
13. touch file Create or update file
14. rm file Deleting the file
15. rm -r dir Deleting the directory
16. rm -f file Force to remove the file
17. rm -rf dir Force to remove the directory dir
18. cp file1 file2 Copy the contents of file1 to file2
19. cp -r dir1 dir2 Copy dir1 to dir2;create dir2 if not present
20. mv file1 file2 Rename or move file1 to file2,if file2 is an existing directory
21. ln -s file link Create symbolic link link to file
1. ps To display the currently working processes
2. top Display all running process
Unix/Linux Command Reference
3. kill pid Kill the process with given pid
4. killall proc Kill all the process named proc
5. pkill pattern Will kill all processes matching the pattern
6. bg List stopped or background jobs,resume a stopped job in the background
7. fg Brings the most recent job to foreground
8. fg n Brings job n to the foreground File permission
1. chmod octal file Change the permission of file to octal,which can
be found separately for user,group,world by adding,
• 4-read(r)
• 2-write(w)
• 1-execute(x)
File Commands:-
1. ls Directory listing
2. ls -al Formatted listing with hidden files
3. ls -lt Sorting the Formatted listing by time modification
4. cd dir Change directory to dir
5. cd Change to home directory
6. pwd Show current working directory
7. mkdir dir Creating a directory dir
8. cat >file Places the standard input into the file
9. more file Output the contents of the file
10. head file Output the first 10 lines of the file
11. tail file Output the last 10 lines of the file
12. tail -f file Output the contents of file as it grows,starting with the last 10 lines
13. touch file Create or update file
14. rm file Deleting the file
15. rm -r dir Deleting the directory
16. rm -f file Force to remove the file
17. rm -rf dir Force to remove the directory dir
18. cp file1 file2 Copy the contents of file1 to file2
19. cp -r dir1 dir2 Copy dir1 to dir2;create dir2 if not present
20. mv file1 file2 Rename or move file1 to file2,if file2 is an existing directory
21. ln -s file link Create symbolic link link to file
Process management:-
1. ps To display the currently working processes
2. top Display all running process
Unix/Linux Command Reference
3. kill pid Kill the process with given pid
4. killall proc Kill all the process named proc
5. pkill pattern Will kill all processes matching the pattern
6. bg List stopped or background jobs,resume a stopped job in the background
7. fg Brings the most recent job to foreground
8. fg n Brings job n to the foreground File permission
1. chmod octal file Change the permission of file to octal,which can
be found separately for user,group,world by adding,
• 4-read(r)
• 2-write(w)
• 1-execute(x)
![]() |
install backtrack |
Searching:-
1. grep pattern file Search for pattern in file
2. grep -r pattern dir Search recursively for pattern in dir
3. command | grep
pattern
Search pattern in the output of a command
4. locate file Find all instances of file
5. find . -name filename Searches in the current directory (represented by
a period) and below it, for files and directories with
names starting with filename
6. pgrep pattern Searches for all the named processes , that
matches with the pattern and, by default, returns their ID
System Info:-
1. date Show the current date and time
2. cal Show this month's calender
3. uptime Show current uptime
4. w Display who is on line
5. whoami Who you are logged in as
6. finger user Display information about user
7. uname -a Show kernel information
8. cat /proc/cpuinfo Cpu information
9. cat proc/meminfo Memory information
10. man command Show the manual for command
11. df Show the disk usage
12. du Show directory space usage
13. free Show memory and swap usage
14. whereis app Show possible locations of app
15. which app Show which applications will be run by default
Compression:-
1. tar cf file.tar file Create tar named file.tar containing file
2. tar xf file.tar Extract the files from file.tar
3. tar czf file.tar.gz files Create a tar with Gzip compression
4. tar xzf file.tar.gz Extract a tar using Gzip
5. tar cjf file.tar.bz2 Create tar with Bzip2 compression
6. tar xjf file.tar.bz2 Extract a tar using Bzip2
7. gzip file Compresses file and renames it to file.gz
8. gzip -d file.gz Decompresses file.gz back to file
Network:-
1. ping host Ping host and output results
2. whois domain Get whois information for domains
3. dig domain Get DNS information for domain
4. dig -x host Reverse lookup host
5. wget file Download file
6. wget -c file Continue a stopped download
Thursday, 14 March 2013
Multiple Columns AT the Start Menu
Thursday, March 14, 2013
No comments
Multiple Columns AT the Start Menu
To make Windows use multiple Start Menu Columns instead of a single scrolling column, like Windows 9x had, Also if you are using Classic Mode in XP
1. open run type RegEdit
2. Go to the key
HKEY_LOCAL_MACHINE\ Software\ Microsoft\ Windows\ CurrentVersion\ Explorer\ Advanced
3. Create a string value "StartMenuScrollPrograms"
4. Right click the new string value and select modify
5. Set the value to "FALSE"
Adding an Application to the Right Click on Every Folder
Thursday, March 14, 2013
No comments
Adding an Application to the Right Click on Every Folder :-
Here is how to add any application to the Context Menu when you right click on any Folder. This way you do not have to always go to the Start Menu. When you right click on any folder, you can have access to that application, the same as using Sent To.
1. Open RegEdit
2. Go to HKEY_CLASSES_ROOT\Folder\shell
3. Add a new Key to the "Shell" Key and name it anything you like.
4. Give it a default value that will appear when you right click a folder, i.e. NewKey (use an "&" without the quotes, in front of any character and it will allow you to use the keyboard)
5. Click on the Key HKEY_CLASSES_ROOT\Folder\shell\NewKey
6. Add a New Key named Command
7. Set the (Default) value of the application you want to run
8. For example: c:\program files\internet explorer\iexplore.exe (Include the full path and parameters if you need them)
How to Disable My Computer menu/Icon
Thursday, March 14, 2013
No comments
Disabling My Computer :-
In areas where you are trying to restrict what users can do on the computer, it might be beneficial to disable the ability to click on My Computer and have access to the drives, control panel etc.
.
To disable this:
1.Open RegEdit
2.Search for 20D04FE0-3AEA-1069-A2D8-08002B30309D
3.This should bring you to the HKEY_CLASSES_ROOT\CLSID section
4.Delete the entire section.
Now when you click on My Computer, nothing will happen.
You might want to export this section to a Registry file before deleting it just in case you want to enable it again. Or you can rename it to 20D0HideMyComputer4FE0-3AEA-1069-A2D8-08002B30309D. You can also hide all the Desktop Icons, see Change/Add restrictions.
How to create Automatic Screen Refresh
Thursday, March 14, 2013
No comments
Automatic Screen Refresh :-
When you make changes to your file system and use Explorer, the changes are not usually displayed until you press the F5 keyTo refresh automatically:
1. Open RegEdit
2. Go to
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Update
3. Set the value name "UpdateMode" to 1
Disable Password Caching
Thursday, March 14, 2013
No comments
Disable Password Caching:-
To disable password caching, which allows for the single Network login and eliminates the secondary Windows logon screen. Either use the same password or:
1. Open RegEdit
2. Go to the key
HKEY_LOCAL_MACHINE\SOFTWARE \Microsoft\ Windows\ CurrentVersion\ Policies\ Network
3. Add a Dword value "DisablePwdCaching" and set the value to 1
Remove Open, Explore & Find from Start Button
Thursday, March 14, 2013
No comments
Remove Open, Explore & Find from Start Button :-
When you right click on the Start Button, you can select Open, Explore or Find.
Open shows your Programs folder. Explore starts the Explorer and allows access to all drives.
Find allows you to search and then run programs. In certain situations you might want to disable this feature.
To remove them:
1.Open RegEdit
2.Go to HKEY_CLASSES_ROOT\Directory\Shell\Find
3.Delete Find
4.Scroll down below Directory to Folder
5.Expand this section under shell
6.Delete Explore and Open
Caution: - When you remove Open, you cannot open any folders.
To hide a file behind an image
To hide a file behind an image:-
To hide a file behind a image file which means that if any one opens that image he will see the image only but if you open in a special way then you can open the hidden file behind the image.
So to hide the file behind a image open CMD.exe
1) Select an image to be used for hiding file behind the image.
2) Now select a file to hide behind the image and make it in .RAR/.TXT/or any format.
3) And most important is that paste both the files on desktop and run the following command on the command prompt.
2) Now select a file to hide behind the image and make it in .RAR/.TXT/or any format.
3) And most important is that paste both the files on desktop and run the following command on the command prompt.
4) And then type the following command.
- cd desktop
- Copy /b imagename.jpg + filename.rar finalnameofimage.jpg
Replacing the Welcome screen on Windows
Thursday, March 14, 2013
No comments
Replacing the Welcome screen on Windows:-
1.Click the Start button and select Run.Then type regedit in the box and click the OK button. This will start up the Registry Editor.
2. Expand HKEY_LOCAL_MACHINE, SOFTWARE, Microsoft,Windows NT,
CurrentVersion, and lastly Winlogon. Now you will see several different values on the
right side of the screen for many different logon properties.
The property that we are interested in is named UIHost.
3. The UIHost property specifies the path to the Welcome screen that will be loaded
and displayed. Right-click UIHost from the list and select Modify
CHANGE WELCOME SCREEN
4. Next, just type in the full path to the logonui.exe file or whatever you named your
new Welcome screen. One thing to keep in mind: avoid storing your Welcome screens in
a directory path that has spaces in the names of the directories. I suggest you create a
folder on your hard drive called WelcomeScreens. So you will be changing the value of
UIHost to C:\WelcomeScreens\CoolNewLogonUI.exe.
5. Once you make the change, it will go into effect immediately. If you click the Windows
key L at the same time, this will lock your computer and will bring up the new
Welcome screen.
If you ever want to revert to the default Windows XP Welcome screen, just change the UIHost
property back to logonui.exe. (You may have to change the C to the correct drive letter on
which you installed Windows.)
Creating a System Restore restore point
Thursday, March 14, 2013
No comments
SYSTEM RESTORE is the best way to keep ur system secure.when we install some program they make registry changes to the system.so system low process,hang of computer,some user rights changes.
SO create a system restore point when u feel system good performance.
SYSTEM RESTORE BACK UR SYSTEM TO SAME STATE WHEN RESTORE POINT IS CREATED. SO ALL CHANGES IN SYSTEM DOSEN't EFFECT OUR SYSTEM.
1. Click the Start button, expand All Programs, Accessories, and System Tools, and select
System Restore.
2. When System Restore loads, select Create a Restore Point and click Next.
3. Type in a short description for the checkpoint in the box and click Create.
4. Once the restore point is created, just hit Close.
Wednesday, 13 March 2013
How to hack administrator password
Wednesday, March 13, 2013
No comments
How to hack administrator password :-
I m going to show u how to hack a window administrator password
WATCH IT:-
How to Create One-Click Shutdown and Reboot Shortcuts
Wednesday, March 13, 2013
No comments
How to Create One-Click Shutdown and Reboot Shortcuts:-
Hello frndz tonight i m gonna show u how to create one click butoon .Because it is so clumsy to go to start menu choose diffrent option. so we make it easy by creating shortcut icon of selected application.
- First, create a shortcut on your desktop by right-clicking on the desktop, choosing New, and then choosing Shortcut.
- The Create Shortcut Wizard appears. In the box asking for the location of the shortcut , type shutdown. After you create the shortcut, double-clicking on it will shut down your PC.
- But you can do much more with a shutdown shortcut than merely shut down your PC. You can add any combination of several switches to do extra duty, like this:
- shutdown -r -t 01 -c "Rebooting your PC"
- Double-clicking on that shortcut will reboot your PC after a one-second delay and display the message "Rebooting your PC." The shutdown command includes a variety of switches you use to customize it. Table 1-3 lists all of them and describes their use.
I use this technique to create two shutdown shortcuts on my desktop—one for turning off my PC, and one for rebooting. Here are the ones I use:
shutdown -s -t 03 -c "Bye Bye m8!"
shutdown -r -t 03 -c "Ill be back m8 ;)!"
Switch
What it does
-s
Shuts down the PC.
-l
Logs off the current user.
-t nn
Indicates the duration of delay, in seconds, before performing the action.
-c "messagetext"
Displays a message in the System Shutdown window. A maximum of 127 characters can be used. The message must be enclosed in quotation marks.
-f
Forces any running applications to shut down.
-r
Reboots the PC.
How to crack the bios password in win 95/98
Wednesday, March 13, 2013
No comments
How to crack the bios password in win 95/98:-
Hello frndz follow the steps:-
1) Boot up windows.
2) go to dos-prompt or go to command prompt directly from the windows start up menu.
3) type the command at the prompt: "debug" (without quotes ninja.gif )
4) type the following lines now exactly as given.......
o 70 10
o 71 20
quit
exit
4) exit from the dos prompt and restart the machine
Free Access To Websites Without Registering
Wednesday, March 13, 2013
1 comment
Free Access To Websites Without Registering:-
Go to
-http://bugmenot.com/
and type the URL of the website you want to log into.
Examples:
-http://www.nytimes.com/, -http://www.winnetmag.com/
etcetera.
Another (and better) way is changing the user agent of your browser to:
Googlebot/2.1+
-http://www.googlebot.com/bot.html
This is very easy in Mozilla's Firefox. Download and install the User Agent Switcher from
-http://www.chrispederick.com/work/firefox/useragentswitcher/
and add the Googlebot user agent.
How To: Change Your Ip In Less Then 1 Minute
Wednesday, March 13, 2013
No comments
How To: Change Your Ip In Less Then 1 Minute:-
1. Click on "Start" in the bottom left hand corner of screen2. Click on "Run"
3. Type in "command" and hit ok
You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"
You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again
You should now be back to the "Local Area Connection" screen.
15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address
Monday, 11 March 2013
How to change window 7/XP passwords
Monday, March 11, 2013
1 comment
How to change window 7/XP passwords:-
1.Go to start menu/desktop2 Right click on computer icon
3. Here u see an manage tab,double click on it
4.After that a window is open called computer management
5. Double click on the LOCAL USERS AND GROUPS
6.Here u see two tab named as -1.users 2. GROUP
7.Double click on the USERS, u see acoounts of pc such as--administrator,guest,student
8.u can change password of any account -just right click on any account name
9. u find tabs like set pssword/delete any account etc.
10 TO change password click on set password-
11. window ask for proceed -just proceed
12.another window come for change password.
13.use this knowledge wisely
How to Boot win xp faster
Monday, March 11, 2013
No comments
Boot win xp faster:-
1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.
Subscribe to:
Posts (Atom)