Learn about your PC

Some Computer Terms

RTM

Short for release to manufacturing, the version of a software product that is given to manufacturers to bundle into future versions of their hardware products. RTM versions are typically released to manufacturers before they are released to the general public so that the manufacturers can work out any bugs the software may encounter with hardware devices. The release of an RTM version does not necessarily mean that the creators have worked out all the problems with the software; there still may be more versions of the product before it is released to the general public.

OEM
Short for original equipment manufacturer, which is a misleading term for a company that has a special relationship with computer producers. OEMs are manufacturers who resell another company's product under their own name and branding. While an OEM is similar to a VAR (value-added reseller), it refers specifically to the act of a company rebranding a product to its own name and offering its own warranty, support and licensing of the product. The term is really a misnomer because OEMs are not the original manufacturers; they are the customizers.

IHV
Short for Independent hardware vendor, a hardware-manufacturing company that specializes in a specific type of hardware device and not a complete computer system. The IHV typically also provides the software drivers for its hardware devices

Pulling wire


A phrase used to describe the act of running network cable from one location to another.

SURGINET
SURGINET is one of the most well-known e-mail mailing list for General Surgeons that serves as a forum for academic and clinical discussions and knowledge sharing specific to the specialty of General Surgery. While officially the list membership is restricted to Surgeons, members are also from many disciplines, such as nursing, med students, basic scientists, pharmacists, residents, even veterinarians. The SURGINET mailing list is run by list owner Tom Gilas.

BlackBerry
BlackBerry is a line of mobile e-mail devices and services from Research In Motion (RIM). BlackBerry is a complete package that includes airtime, software and choice of BlackBerry mobile device. BlackBerry is currently available in the United States, Canada and the United Kingdom.
In the United States and Canada, BlackBerry depends on either narrowband PCS 800 MHz DataTAC networks or narrowband PCS 900 MHz Mobitex networks. In the UK, BlackBerry works over GPRS networks.
BlackBerry's popularity may be attributed to its easy-to-use interface and keyboard.

Bluejacking
Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. These business cards often have a clever or flirtatious message rather than the typical name and phone number. Bluejackers often look for the receiving phone to ping or the user to react. They then send another, more personal message to that device. Once again, in order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking

Bluebugging
Bluebugging allows skilled individuals to access the mobile phone commands using Bluetooth wireless technology without notifying or alerting the phone’s user. This vulnerability allows the hacker to initiate phone calls, send and read SMS, read and write phonebook contacts, eavesdrop on phone conversations, and connect to the Internet. As with all the attacks, the hacker must be within a 10 meter range of the phone. This is a separate vulnerability from bluesnarfing and does not affect all of the same phones as bluesnarfing

Bluesnarfing
Bluesnarfing allows hackers to gain access to data stored on a Bluetooth enabled phone using Bluetooth wireless technology without alerting the phone’s user of the connection made to the device. The information that can be accessed in this manner includes the phonebook and associated images, calendar, and IMEI (International Mobile Equipment Identity). By setting the device in non-discoverable, it becomes significantly more difficult to find and attack the device. Without specialized equipment the hacker must be within a 10 meter range of the device while running a device with specialized software. Only specific older Bluetooth enabled phones are susceptible to bluesnarfing

MIN
Short for Mobile Identification Number it is a unique 24-bit number assigned by the wireless service provider (carrier) to each mobile phone it sells or includes in service plans.

Wi-Fi
Short for wireless fidelity and is meant to be used generically when referring of any type of 802.11 network, whether 802.11b, 802.11a, dual-band, etc. The term is promulgated by the Wi-Fi Alliance.
Any products tested and approved as "Wi-Fi Certified" (a registered trademark) by the Wi-Fi Alliance are certified as interoperable with each other, even if they are from different manufacturers. A user with a "Wi-Fi Certified" product can use any brand of access point with any other brand of client hardware that also is certified. Typically, however, any Wi-Fi product using the same radio frequency (for example, 2.4GHz for 802.11b or 11g, 5GHz for 802.11a) will work with any other, even if not "Wi-Fi Certified."
Formerly, the term "Wi-Fi" was used only in place of the 2.4GHz 802.11b standard, in the same way that "Ethernet" is used in place of IEEE 802.3. The Alliance expanded the generic use of the term in an attempt to stop confusion about wireless LAN interoperability.

Moblog
Acronym used to combine the terms "mobile" and "Web log". Where a Web log (also called a blog) is a Web page that serves as a publicly accessible personal journal for an individual, a moblog is a blog which has been posted to the Internet from a mobile device such as a mobile phone or PDA.

3G
3G is an ITU(International Telecommunication Union) specification for the third generation (analog cellular was the first generation, digital PCS the second) of mobile communications technology. 3G promises increased bandwidth, up to 384 Kbps when a device is stationary or moving at pedestrian speed, 128 Kbps in a car, and 2 Mbps in fixed applications. 3G will work over wireless air interfaces such as GSM, TDMA, and CDMA. The new EDGE air interface has been developed specifically to meet the bandwidth needs of 3G.

E-nag
A slang term used to describe a person who nags (annoys or torments persistently) through electronic means such as e-mail, instant messaging, forums or online chat rooms. An e-nagger typically is a person who sends a successive stream of messages without allowing adequate time for a response from the recipient.

Spim
Also spelled as spIM, spam over instant messaging (IM). Spim is perpetuated by bots that harvest IM screen names off of the Internet and simulate a human user by sending spam to the screen names via an instant message. The spim typically contains a link to a Web site that the spimmer is trying to market.
Also referred to as instant spam or the less-intrusive sounding IM marketing.
(v.) To send someone spam through an instant messaging application.
A spimmer is the individual or organization responsible for sending the spim.

Bot
Short for robot, a computer program that runs automatically.

Hammering
The act of trying repeatedly to connect to an unavailable FTP server with little or no time between connection attempts. It can be compared to repeatedly hitting the "redial" button on a telephone when dialing a phone number that is busy until the other phone is no longer busy.
Trading servers have a limit on the number of active connections that may be present at one time. A server cannot process an unlimited number of requests, so when servers are occupied to full capacity they will deny further access until they have free space. Hammering consumes bandwidth, slowing down the server. In addition to already working at capacity, the server has to then send a busy response to the device that was unable to connect every time that device attempts a connection, which further depletes the server's resources and slows the system down in its connections with other devices.
Most FTP sites have policies against hammering and require FTP clients to set retry times at specific intervals, commonly at least 120 seconds between each attempt to connect. Most FTP sites can also monitor for devices that hammer, and once detected the server will ban access to the offending IP address either permanently or for a limited amount of time.

Cuckoo Egg
A Cuckoo Egg is an edited MP3 file that appears to be a copyright protected song being distributed via the Internet without the permission of the copyright owner. The initial portion of the song (first 30 seconds or so) will be of the real song. The remainder of the song however, has been overwritten by something other than the initial song; usually cuckoo clock sound effects or or a series of random sounds and noises which are free of any copyright ownerships. Cuckoo Eggs will have the correct file size and playing time as the original copyrighted MP3 file will have.
Hoax
In e-mail terminology a hoax is a message which is written to deliberately spread fear, uncertainty and doubt.
Cloaking
1) Also known as stealth, a technique used by some Web sites to deliver one page to a search engine for indexing while serving an entirely different page to everyone else. There are opposing views as to whether or not cloaking is ethical. Opponents see it as a bait-and-switch, where a Web server is scripted to look out for search engines that are spidering in order to create an index of search results. The search engine thinks it is selecting a prime match to its request based on the meta tags that the site administrator has input. However, the search result is misleading because the meta tags do not correspond to what actually exists on the page. Some search engines, such as Lycos, Hotbot and Excite, even ban cloaked Web sites. Proponents of cloaking assert that cloaking is necessary in order to protect the meta data, as only the spider is supplied with the meta tags.
(2) In e-mail distribution, cloaking is the act of masking the name and address of the sender so that the recipient does not know who sent the e-mail.
Leech
Slang term frequently used by those actively engaged P2P and unethical file sharing. A leech or leecher is considered to be a user who downloads files and provides few or no uploads in return. Crackers also uses this term to describe those who constantly request sources and information and offer nothing in return.
Flame
A searing e-mail or newsgroup message in which the writer attacks another participant in overly harsh, and often personal, terms. Flames are an unfortunate, but inevitable, element of unmoderated conferences.
Sporn
A slang term used to describe e-mail spam specifically of adult content or of a pornographic nature. Sporn tends to be more aggressively marketed and deceitfully packaged than other types of spam.
Snailmail
Normal postal mail, where an actual physical letter or package is delivered. The term didn't exist until electronic mail (e-mail) became so prevalent that there was a requirement to differentiate the two. Obviously, the term was invented by e-mail aficionados as a small barb directed at the relative slowness of physical ransportation.

Spamdress
Slang term for spam e-mail address, a person's secondary e-mail address, which is used for registering to receive newsletters, discussion forums and for other Web sites requiring sign-ups where you may receive frequent e-mails. The spamdress is used in place of a primary e-mail address to assist in keeping spam out of the primary account. Also called spamaddress.

IMAP
Short for Internet Message Access Protocol, a protocol for retrieving e-mail messages. The latest version, IMAP4, is similar to POP3 but supports some additional features. For example, with IMAP4, you can search through your e-mail messages for keywords while the messages are still on mail server. You can then choose which messages to download to your machine.
IMAP was developed at Stanford University in 1986.
Hard bounce
When e-mailing, hard bounce is used to describe an e-mail that has bounced back to the sender undelivered without having been accepted by the recipient's mail server.
Soft bounce
When e-mailing, soft bounce is used to describe an e-mail that has bounced back to the sender undelivered after it has already been accepted by the recipient's mail server

:tea:
 
Removing Startup Items located in the registry

Removing Startup Items located in the registry

The System Configuration Utility displays items that start with your PC. These items are generally located in one of two areas. The registry or in Common Startup.

Should you decide to prevent specific items from starting up you can uncheck them in the System Configuration Utility. Though this method is fine it is ultimately best to remove them from the source. To access the common registry locations of these items take a look in the following areas:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\Run

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\RunOnce

HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Run

HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\RunOnce

If you have disabled items in the System Configuration Utility and would like to remove them from the registry also they can be found in one of the following locations:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SharedTools\
MSConfig\startupfolder

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\
MSConfig\startupreg

Note: Always make a backup of the Registry prior to making changes. TweakXP.com takes no responsibility for problems that may result from using the Registry Editor incorrectly.


:SugarwareZ-191:
 
Removing password from hibernate / suspend

Removing password from hibernate / suspend


Removing password from returning from hibernate / suspend

Go to Control Panel and open the Power Options Properties dialog box. Open the Advanced tab and clear the "Prompt for password when computer resumes from standby" check box.


Now you don't have to worry about putting your password everytime you want to save power and money However, you will be less secure!

:tea:
 
Remove programs from uninstall list

Remove programs from uninstall list

If you deleted a program instead of uninstalling it, most likely the program will still be listed in the windows uninstall list. Follow the directions below to remove programs from list manually.

Start regedit, if you are unfamiliar with regedit please see our FAQ.
Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\Uninstall.
Delete the folder of the program.

:SugarwareZ-098:
 
Remove Control Panel Items

Remove Control Panel Items

This tweak is useful for uncluttering your Control Panel and removing unused functions:

Open Regedit and go to:
[HKEY_CURRENT_USER\Control Panel\]
Add a key named Don't Load
Next add String values within the "don't load" Key. You will use one String value for each control panel applet you want removed. For example, if one want to remove the System applet he will make a string value with the name sysdm.cpl and no value set and the System applet will no longer be available under the Control Panel.
To restore a full control Panel to default just delete the "don't load" key.

Here are the Windows XP Pro Control Panel applets:
System Properties = sysdm.cpl
Network Connections = ncpa.cpl
ODBC Administrator = odbccp32.cpl
Display Properties = desk.cpl
Add or remove programs = appwiz.cpl
Internet Properties = Inetcpl.cpl
Game Controllers = joy.cpl
Phone and modem Options = telephon.cpl
Time and Date Properties = timedate.cpl
Region and Language Options = intl.cpl
Power Options = powercfg.cpl
Mouse Properties = main.cpl
Accessibility Options = access.cpl
Add Hardware Wizard = hdwwiz.cpl
Sound and Audio Devices = mmsys.cpl
User Accounts = nusrmgr.cpl
Speech Properties = sapi.cpl


:bump:
 
Remote Shutdown Computers on LAN

Remote Shutdown Computers on LAN

Right click on desktop, create new short-cut.

Type shutdown.exe -i

Click next, type in name for your short-cut e.g. shutdown computers

Click finish.

Run the short-cut you just created. Now you can browse the network for computers to shutdown/reboot etc. or just type in the IP/Name of the computer.

You can even broadcast a message, and schedule the shutdown.

Cool for sysadmins.

NOTE: You will only be able to shut down computers that you have admin access on!

:tea:
 
Re-Install IE6

Re-Install IE6

If you find you need to reinstall Internet Explorer from the XP CD or if you want to do it for troubleshooting purposes:

1) Insert the Win XP CD

2) Open Start / Run and type:
rundll32.exe setupapi,InstallHinfSection DefaultInstall 132 c:\windows\inf\ie.inf

Press ENTER

:SugarwareZ-191:
 
Quick System Access

Quick System Access

Simply click and drag your My Computer icon onto the Task Bar near the right side icons next to the clock. This will create a cascading menu from where you can easily access just about anything on your system.
:SugarwareZ-064:
 
Quick Date & Time Insert

Quick Date & Time Insert
This is a very handy method of inserting the date and time (according to the Windows calendar) into a text document. As far as I know, this only works in Notepad, not in MS Word or Wordpad.

Steps to insert date and time into a Notepad .txt file:

1) Click Start > Run
2) Type "notepad" without the quotes
3) Push F5 on your keyboard

This simple shortcut can be very useful, especially when making logs or recording any kind of time-sensetive observations.

:SugarwareZ-191:
 
Open Internet Explorer without Home Page

Open Internet Explorer without Home Page
1. Create a shortcut to the Internet Explorer executable and place it on the desktop or quick launch area.

2. Right click the shortcut and select Properties.

3. Change the "target" value to "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome

Note: Substitute C:\ for the drive letter Program Files is present on.

:SugarwareZ-064:
 
Do u have MMC author mode problem??

Do u have MMC author mode problem??
You try to load your MMC but you get an error message stating you can't open MMC in author mode??

1. Enter to regedit.

2. HKEY_CURRENT_USER\software\policies\Microsoft\MMC

3. on the right side change RestrictAuthorMode to 0

Note: You can of course also just revert the group policy setting that causes this behaviour.


:bump:
 
Hw to setup a new sys from a scratch??

Hw to setup a new sys from a scratch??

The question frequently comes up about how to format and install XP from scratch. Following are the steps I take when I get a new system. I mention the "brand names" of software I use not as an endorsement or recommendation, but just for the sake of example.

After unpacking and connecting all hardware, here's what I do:

1. Partition the HD according to my preference, thus deleting everything on the drive (the number and size of partitions is entirely up to the individual user – I prefer several, keeping the OS on c: and various programs, cache folders, swap file and data on other partitions).
2. Format all partitions (I prefer NT, but again that’s up to the user)
3. Install the latest release of the OS (for now and for me that’s XP, SP-1)
4. Install the Blaster patch before going online
5. Install Norton Anti-Virus (or whatever AV you use) before going online
6. Install SpywareGuard and Spyware Blaster before going online

7. Install Chipset Driver

8. Go online and update AV and spyware utilities

9. Install all drivers, making sure to obtain and install the latest version of the drivers from the OEM web site and not Windows Update.

10. Set Pagefile per my own preference

11. Set System Restore and Recycle Bin preferences (I use Norton here too)

12. Get all critical Windows Updates (alternatively, some may prefer to have these already downloaded and ready for offline update – again, personal preference prevails)

13. Set all visual, performance and internet options within XP to my preferences

14. Install PerfectDisk and defrag drive c:

15. Install Drive Image and create basic image of drive c:

16. Download ERUNT and create first registry backup

17. Begin installing applications to other partitions

18. Create other image(s) as appropriate

:SugarwareZ-064:
 
Working with registry....

Working with registry....
Opening the registry editor

This is step number one, just opening the editor to view the registry.

This is easy, just click on the start button and then on run. Once run is open, type in regedit and click OK.

Navigating the registry

Once you have regedit open, it is fairly easy to get where you want to.

Now you see the "folders" HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, HKEY_USERS, and HKEY_CURRENT_CONFIG

First lets get some basic terminology down. These five main "folders" are calles hives, and their subfolders are called keys.

Click on the + next to HKEY_CURRENT_USER to expand the hive.

Now if you wanted to open HKEY_CURRENT_USER\Software\Microsoft, click the + next to Software, then the + next to Microsoft.

This is how you can get to any place within the registry.

Exporting registry keys

This should be done to any and all registry keys before changing them.

It will give you an easy way of changing back any changes that you make editing the registry.

Right click the key that you want to export, and select Export.

Then give it a name so you remember what it is. I use the name of the key as an example.

Importing registry files

Now that you have exported keys to change back your changes, you need to know how to import them into the registry.

Usually a double-click on a registry file will merge it for you unless you have changed the default action, then you have to right-click the file and select Merge.

Changing existing values

You now know how to navigate to different keys in the registry and how to back up these keys before you make changes to them.

Logically next you need to know how to make these changes.

There are three main types of registry values that you will deal with: STRINGS, DWORDS, and BINARY values.
There are others, but these are 99% of what you will deal with doing normal editing.

To change an existing STRING value, just double click it and enter in the new value data.

To change an existing DWORD value you have two options, hexadecimal and decimal. Be sure you know what type the value should be, 200 hexadecimal is 256 decimal, c8 is hexadecimal for 200 decimal, for example.

To change binary values it is a little more complicated because they are written in hex.

The applicable values are entered in 2's and have the format 00 01 02 - 0F - FF and each have a different value associated with them.

Having to change a binary value from something other than 01 to 00 or 00 to 01 is pretty rare.

Adding new values

Adding values is very similar to changing them with the exception that you have to name the value.

Right click in the left-hand-side of the registry editor and select New > String (or whatever value type you want to add) and then name it what you need.

Then you change its value by doing the same method as if it was an existing value.

Adding new keys

Along with adding values, this is most helpful if you are trying to add group policy values through the registry.
Most of the keys that are needed for them are not there by default.

So, you need to add a key under HKEY_CURRENT_USER\Software\Policies\Microsoft, how?

Easily, just right-click on HKEY_CURRENT_USER\Software\Policies\Microsoft in the folder tree, and then New > Key

Now you need to change the name of the key to the desired name.

Deleting keys and values

The first thing that must be realized when deleting keys or values is that there is no 'Recycle Bin' for the registry, once its gone its gone.

To delete keys or values, just right-click them and select delete. Also keep in mind that deleting a key also deletes all subkeys of that key.

Writing registry files

Now you can automate the manual entry and deletion of registry values and keys with .reg files. Use notepad or wordpad to write registry files, you just save them with a .reg extension.

The first line in the registry file for XP or 2000 has to be:

Windows Registry Editor Version 5.00


NOTE: For windows 98, ME, NT 4.0, [also works with XP and 2k] replace with:

REGEDIT4

Put a line in between Windows Registry Editor 5.00 and the next entry.

Now you have to declare the key that you want to change values in by writing it in brackets.

This will also create the key if the one declared doesn't exist:

[HKEY_CURRENT_USER\Key\Subkey]

Now the next line will either create the string "String 1" equal to "Value 1" if "String 1" doesn't exist,
or change the value of the string "String 1" to "Value 1" if it does:

"String 1"="Value 1"


The (default) value is a string and you use the "at" symbol for this.

@="Default 1"

To change or create dword values, you must know the value in hexadecimal, for that is how they are written.

The next line will create the dword "Dword 1" equal to a decimal 20, by setting it equal to dword:00000014,
or if "Dword 1" already exists, it will change it's value to a decimal 20.

Just remember dword:00000010 is actually decimal 16, dword:0000000a is decimal 10

"Dword 1"=dword:00000014

Now binary values. This line will create or change a binary value "Binary 1" equal to 01 AA 05 55.

"Binary 1"=hex:01,AA,05,55

So this is the reg file to add a string, default, dword, and binary value to HKEY_CURRENT_USER\Key\Subkey:

Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Key\Subkey]
"String 1"="Value 1"
@="Default 1"
"Dword 1"=dword:00000014
"Binary 1"=hex:01,AA,05,55

Now how to delete values or keys with regfiles.

If you want to delete a key just put a minus sign in front of it in the file:

[red[-HKEY_CURRENT_USER\Key\Subkey]

If you want to delete a value, it doesn't matter what kind, set the value equal to a minus.

"String 1"=-

@=-

"Dword 1"=-

"Binary 1"=-

So if you wanted to add a dword "Dword 1" that equals 1,
and delete the value "String 1" in HKEY_CURRENT_USER\Key\Subkey1 and delete the HKEY_CURRENT_USER\Key\Subkey2, the file would look like:

Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Key\Subkey1]
"Dword 1"=dword:00000001
"String 1"=-

[-HKEY_CURRENT_USER\Key\Subkey2]

The final thing to learn is how to comment the files,
add a semiclon in front of any line and it will be ignored:

Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Key\Subkey1]
;This changes the dword to equal 1
"Dword 1"=dword:00000001
;This deletes the string value
"String 1"=-

;This deletes the key Subkey2
[-HKEY_CURRENT_USER\Key\Subkey2]

This should help you navigate and hack through the registry with atleast a partial map to guide you.


:SugarwareZ-191:
 
how to send instant messages over secure

How to send instant messages over secure
If you have ever used a computer at a high school or college, then you might have seen that pesky software that prevents you from installing any programs or web content filters that prevent you from accessing instant chat sessions. Well here is a way to send instant messages to your friends over such networks as long as you have their ip or the name of the computer on the network. An easy way to find a computer's ip address is to type cmd in the run box on your start menu. This will start the command prompt. Type "ipconfig /all" with a space between "ipconfig and /all". That will list the computer's ip address along with other network specs. Now that you have the ip of that computer, you may send instant messages to it.

Go to the run command in your start menu. Type cmd in the box which will open the command prompt just like above. Type: net send "ip address" message. If the computer you were trying to send a "Hello" message to had the ip address of 127.10.1.1, you would type "net send 127.10.1.1 Hello"

Additionally, it is possible to use a wild card such as * in the ip address parameter.

Example: net send * message

The above command will send your message to every computer on your subnet. This is great for system administrators to send out messages to all windows computers on the network notifying them that you are going to be taking down the server or something. However, if you are a student and feel like pulling a prank at school by sending some message across the school network, you will screw yourself. With today’s zero tolerance policies in schools, you will be suspended possibly even expelled. Trust me; its happening all over the USA.


:tea:
 
How autocheck & perfect disk work together??
Autocheck always runs at boot. Only if it detects that the dirty bit has been set on a partition (indicating an abnormal shutdown of the system OR that the file system has detected an inconsistency during normal operation and automatically scheduled chkdsk to run) will it actually run CHKDSK on the indicated partitions. Chkdsk as run by Autocheck does not do as comprehensive a repair as chkdsk /r.

PerfectDisk is first in the bootexecute list. When the system boots, here's what happens:

- PD's boot time defrag code runs.
- It looks to see if it is even supposed to run. If not, it exits.
- It checks to see if the dirty bit has been set - if so, it exits to let CHKDSK run.
- If volume is "clean", then PD performs it's own consistency check of the file system to make sure that things are "ok" (as CHKDSK doesn't always fix errors with the file system). If this check passes, then PD's boot time defrag actually runs. If not, then it exits.

:SugarwareZ-299:
 
Having trouble in reading small fonts in IE??

Having trouble in reading small fonts in IE??
This tip allows you to change the font size in Internet Explorer.

Just hold crtl and move the mouse wheel.

Happy reading

:SugarwareZ-064:
 
Get to system properties faster...

Get to system properties faster...

This tweak is for those of you who consider right-clicking on My Computer, and then going down to the properties menu, a bit time consuming. Instead, to bring up the System Properties menu faster, do the following:

1. Hold down the Windows Key on the keyboard, and then press Pause/Break. (WinKey + Pause)

That's all there is to it! Have fun avoiding the mouse like I try to do.


:SugarwareZ-299:
 
Fun with a wheel mouse and IE...

Fun with a wheel mouse and IE...
Are you interested in browing the internet the fastest way possible? Save time by using keyboard mouse shortcuts desiged for a wheel scroll mouse. Below are a few tips to help you naviagte the web faster.

To change the size of the text using your wheel mouse:

Hold down the CTRL button on your keyboard
Scroll the wheel on your mouse up to decrease size of text
Scroll the wheel on your mouse down to increase the size of text
To use you mouse to navigate back and fourth between pages instead of the buttons:

Hold down the Shift button on your keyboard
Scroll the wheel on your mouse up to navigate forward one page
Scroll the wheen on your mouse down to navigate back one page
All of the above tips require a mouse with a scroll wheel.


:tea:
 
Focus priority tweak..

Focus priority tweak..

Windows XP is a learning operating system. It also has certain usability features that are designed to make the user's XPerience more enjoyable. One thing I have noticed is that the foremost application or the most recently active application gets a slight priority boost compared to things running in the background. Some applications like to steal focus or Windows will shift off that priority boost once the application has been idle for a while. When doing operations like file copying etc, bringing the copy window to the foreground and clicking on it every so often to keep it from becoming idle will allow the operation to be done faster.

:SugarwareZ-191:
 
Back
Top