Saturday, December 17, 2011

How to "Delete administrator Password" without any software

Method 1
Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.

Method 2

Step 1. Put your hard disk of your computer in any other pc .
Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).
Step 3. Then open that drive in which the victim’s window(or your window) is installed.
Step 4. Go to location windows->system32->config
Step 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer :-)

Thursday, December 1, 2011

Step 2: Registration at NEOBUX !

STEP1: ALERT PAY SIGN UP !

Wednesday, May 11, 2011

Acer One Series ZG5 Bios Recovery

When Aspire One powers on, the screen remains blank. How can I fix this?
Updating the BIOS will require a USB flash drive to store the BIOS information on during the update. To perform the update to the BIOS:
  1. Go here and download the latest BIOS for the netbook.
  2. Extract the files from the downloaded zipped BIOS file.
  3. In the Dos_Flash folder, rename the BIOS file from 3310.fd to ZG5IA32.FD, in all capital letters.
  4. Copy ZG5IA32.FD and Flashit.exe to the USB flash drive
  5. Ensure that the AC adapter is plugged in.
  6. Insert the USB flash drive into a USB port.
  7. Press and Hold down the Fn and the Esc keys together and press the power button.
  8. When the unit's power light comes on wait a few seconds and release the Fn and Esc keys.
  9. After the keys have been released the power light will start to blink.
  10. During the BIOS update process the display will be blank.
  11. Let the unit run and after approximately 1 to 7 minutes, the unit should reboot and the BIOS will be updated.
If the unit fails to reboot, or the BIOS was not updated sucessfully, try the steps again. If the unit continues to fail to reboot, the unit may need service.

good luck and you will need this link for the bios and apps for makin a boot usb
http://macles.blogspot.com/2009/04/acer-aspire-one-bios-3310.html

Wednesday, January 12, 2011

10 ways to make old software run on Windows 7

Whether it's a critical application or an old game you want to play again, the march of progress doesn't mean you're cut off from the past.
So what do you do to make Windows XP programs work in Windows 7? And how do you make Windows 3.1 programs or DOS apps run in Windows 7?
Follow our tips to run old software on Windows 7 and you can get your retro kicks on your ultra-modern PC.



     
XP Mode is free if you have the Professional,
Enterprise or Ultimate edition of Windows 7

1. Download XP mode
Most Windows software retains its compatibility with Windows 7, with the main exceptions being drivers (which you'll want to upgrade anyway), installation programs (which have an annoying tendency to assume that any operating system they don't recognise is old) and 32-bit applications in a 64-bit OS.
If you have the Professional, Enterprise or Ultimate edition of Windows 7, you can download XP Mode – which is really Virtual PC – for free.
Otherwise, grab Virtual PC 2007 from the same place. For an alternative, try VMWare Server (free) or Workstation (£143), from www.vmware.com/products/server. You'll have to supply the copy of Windows yourself though, and install it from scratch.

2. Try out a compatibility mode
Short of emulation, your only option for old Windows programs is a compatibility mode. Right-click a program, choose 'Properties' and open the Compatibility tab. This rarely seems to work, but it's worth a shot.
Set the program to run in compatibility mode for any of the supported OSes, which range from Windows 95 to Windows Vista, along with their service packs. The other options on this screen, including 'Run in 256 colors' and 'Run in 640x480 screen resolution' do exactly what they sound like, but are rarely useful these days.

3. Set up a dual-boot
If your software doesn't run directly, you can set up a dual-boot system and install both operating systems. It's not just a case of running the setup routines, though – you'll need to install them in the right order, partition your drive and have devices that each version can use.
That modern soundcard driver won't work on a ten-year-old operating system, even if it works the other way round. See this page for a full guide to dual-booting almost every major combination.

4. Downgrade Windows 7
If you have a lot of old software that you need to get running, you can't simply switch into a compatibility mode to get 32-bit programs running in a 64-bit OS. They may work, but they may not.
If you get an error message when you try to run one, your only recourse is to step back yourself. Windows 7 comes with an installation disc for its 32-bit version. You lose out overall if you have more than 2GB of memory though, so don't downgrade on a whim.

5. Use older hardware
The nuclear option is to pick up old hardware and build a new PC. Look on Ebay and in second-hand markets, or ask friends and family if they have an old clunker they're willing to donate. You can pick them up dirt cheap, but a Windows 3.1-era PC is the perfect machine for Windows 3.1 and its games and applications.
It's worth taking the emulation route first, though. Virtual machines are happy to translate for these old operating systems, letting your existing soundcard and processor do the talking. They'll be slower, but on systems that old, there'll be no shortage of power.

6. Install DOSBox
DOSBox is a great tool, especially for old games. You can just run the executable, but it won't do much. While it doesn't actually sandbox itself from your files in the same way as a virtual machine, it doesn't give itself automatic access to them either.

7. Drag and drop
To run most games or applications in DOSBox, just drag the folder containing its files onto the 'DOSBox' icon. DOSBox treats this as a drive, with the folder as the root. If you run an installer, it can't break out of there to copy any files without permission.

8. Download DOG
For more complicated applications, especially involving CDs, it's worth downloading a shell. We recommend DOG, which you can get from the main DOSBox site. You create profiles for each application, along with their specific needs, then click their name to fire them up.

9. Use hotkeys
DOSBox has many useful hotkeys, but the main ones are [CTRL]+[F11] to slow down the emulation speed, and [CTRL]+[12] to increase it. Press [ALT]+[F12] to turn off any limiters. Avoid [Alt]+[Tab]bing out. You can do it, but it may causes problems with colours.

10. Edit a config file
For games that won't play ball, you can hand-tweak DOSBox's settings by editing a configuration file. This is a very complicated looking document, but it's nothing more than a list of options. Visit www.dosbox.com/wiki/Configuration to see the parameters available.

Windows 7 Keyboard Shortcuts

Let's kick off with keyboard shortcuts – the first thing every power user must memorize with working with a new operating system. In Windows 7, we’ve uncovered several new sets of essential time-saving shortcuts that will make your mouse jealous with neglect.

Alt + P

















In Windows Explorer, activate an additional file preview pane to the right side of the window with this new shortcut. This panel is great for previewing images in your photos directory.

Windows + + (plus key)

Windows + - (minus key)



Pressing the Windows and plus or minus keys activates the Magnifier, which lets you zoom in on the entire desktop or open a rectangular magnifying lens to zoom in and out of parts of your screen. You can customize the Magnifier options to follow your mouse pointer or keyboard cursor. Keep in mind that so far, the Magnifier only works when Aero desktop is enabled.

Windows + Up

Windows + Down

 If a window is not maximized, pressing Windows + Up will fill it to your screen. Windows + Down will minimize that active window. Unfortunately, pressing Windows + Up again while a window is minimized won’t return it to its former state.

Windows + Shift + Up

Similar to the shortcut above, hitting these three keys while a window is active will stretch it vertically to the maximum desktop height. The width of the window will however stay the same. Pressing Windows + Down will restore it to its previous size.

Windows + Left

Windows + Right


 

One of the new features of Windows 7 is the ability to automatically make a window fill up half of your screen by dragging to the left or right. This pair of shortcuts performs the same function without your mouse. Once a window is fixed to one side of the screen, you can repeat the shortcut to flip it to the other side. This is useful if you’re extending a desktop across multiple monitors, which prevents you from executing this trick with a mouse.

Windows + Home

This shortcut performs a similar function to hovering over a window’s peek menu thumbnail in the Taskbar. The active window will stay on your desktop while every other open application is minimized. Pressing this shortcut again will restore all the other windows.

Windows + E

 

Automatically opens up a new Explorer window to show your Libraries folder.

Windows + P

 

Manage your multiple-monitor more efficiently with this handy shortcut. Windows + P opens up a small overlay that lets you configure a second display or projector. You can switch from a single monitor to dual-display in either mirror or extend desktop mode.

Windows + Shift + Left

Windows + Shift + Right

If you are using two or more displays (and who isn’t, these days?), memorize this shortcut to easily move a window from one screen to the other. The window retains its size and relative position on the new screen, which his useful when working with multiple documents. Utilize that real estate!

Windows + [Number]

Programs (and new instances) pinned to your Taskbar can be launched by hitting Windows and the number corresponding to its placement on the Taskbar. Windows + 1, for example, launches the first application, while Windows + 4 will launch the fourth. We realize that this is actually one key-press more than just clicking the icon with your mouse, but it saves your hand the trouble of leaving the comfort of the keyboard.

Windows + T

 

Like Alt + Tab (still our all time favorite Windows specific shortcut), Windows + T cycles through your open programs via the Taskbar’s peek menu.

Windows + Space

 

This combo performs the same function as moving your mouse to the bottom right of the Taskbar. It makes every active window transparent so you can view your desktop. The windows only remain transparent as long as you’re holding down the Windows key.

Ctrl + Shift + Click

Hold down Ctrl and Shift while launching an application from the Taskbar or start menu to launch it with full administrative rights.

Ctrl + Click

Hold down Ctrl while repeatedly clicking a program icon in the Taskbar will toggle between the instances of that application, like multiple Firefox windows (though not browser tabs).

 


 

Tuesday, January 11, 2011

How to Run Multiple Yahoo! Messenger Accounts on Your PC [Registry Hack]

If you are wondering how to run multiple Yahoo! Messenger accounts within the same PC, here’s how it can be done by just applying a simple registry hack.
  1. Go to Start > Run.
  2. In the Run box, type regedit and click OK button to launch the Registry Editor.
  3. Now, navigate to HKEY_CURRENT_USER > Software > Yahoo > Pager > Test.
  4. On the right pane, right click , choose New > DWORD value 

5. Rename the new registry key as Plural.





6. Double click on the “Plural” registry key and assigns 1 as the value data.




Now, you can login to multiple Yahoo! Messenger accounts on your PC. If you want to login to two YM accounts, you will need to launch the application twice in order to get two login screens.





To disable or cancel this hack, just proceed and delete the “Plural” registry key.

Yahoo Room Booter - Y! WhiteOut ( Y!Apocalyse Update )

Yahoo Room Booter - Y! WhiteOut ( Y!Apocalyse Update)



Craziest Yahoo Messenger Room Booter ! One yahoo toy to play with .

+ Multi Yahoo Login Bot Booter using SSL login

+ Multi Yahoo Join Chat Room

+ Charge - Release Captcha

+ Disconnect Single Victim

+ Yahoo Room Boot


Login 10 Yahoo bots then join to 10 Yahoo chat room all at one ( 1 bot 1 room ) to get all user in 10 room !

Single Yahoo messenger Victim Option :

1. Silent DC Yahoo messenger
2. Y!A DC
3. Yahoo Room Invite - Join bot on one room to use this packet
4. Yahoo Conference DC
5. Yahoo Messenger Add DC
6. Yahoo Proto DC

Yahoo Messenger Room Boot Option :

1. Messenger Dc - Freeze all Yahoo messenger User Silently
2. Yahoo messenger Conference Freeze
3. Skull Audible Freeze
4. Add All User Freeze
5. Script Freeze
6. games Freeze



Feature :

1. Auto Yahoo Booter, kicks out when user Join
2. Save Yahoo User name list
3. Mode grab user, as long bots in room, program will
grall all user join , no leaves will show
4. Join bots to one Yahoo chat room
5, Join Bots to multi room , 1 bot per one room
6. Boot user not in room


How to use :

Ex Login 10 Bots, then add or load room list as much as your bots login !
Prepare Join then Join Bots !
When captcha show simply click the link then captcha will automatically show up
Type captcha then Enter do it till no more captcha ,
when all captcha alreay typed then just click SEND
ALL Bots will join room all at one ! and all user in room will grabbed !
( Charge - Release Captcha Join )

If You gonna join all bot in only one room, simply type the Room then join, no need to add
room to the list !

Download Yahoo Room Booter
http://www.easy-share.com/1912770658/yahoo_room_booter.exe

Yahoo Messenger Room Booter: Messenger Smasher

Latest 2011 Yahoo Messenger Room Booter: Messenger Smasher




Download Yahoo Messenger Room Booter: Messenger Smasher
http://www.easy-share.com/1913492620/Yahoo-room-booter.rar

Yahoo Messenger 11 Exploit Booter by psycho666

Yahoo Messenger 11 Exploit Booter by psycho666




This Booter can boot yahoo messenger 11 beta version.

Download Yahoo Messenger 11 Exploit Booter 
http://www.easy-share.com/1913491159/Yahoo-messenger-booter.rar

ULTIMATE GUIDE TO BYPASS BIOS PASSWORDS!

How to Bypass BIOS Passwords

BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS

DISCLAIMER
This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to crack the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. LabMice.net is not responsible for the use or misuse of this material, including loss of data, damage to hardware, or personal injury.


Before attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:

Using a manufacturers backdoor password to access the BIOS

Use password cracking software

Reset the CMOS using the jumpers or solder beads.

Removing the CMOS battery for at least 10 minutes

Overloading the keyboard buffer

Using a professional service

Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.


--------------------------------------------------------------------------------

Backdoor passwords


Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.

WARNING: Some BIOS configurations will lock you out of the system completely if you type in an incorrect password more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords

Award BIOS backdoor passwords:

ALFAROME ALLy aLLy aLLY ALLY aPAf _award AWARD_SW AWARD?SW AWARD SW AWARD PW AWKWARD awkward BIOSTAR CONCAT CONDO Condo d8on djonet HLT J64 J256 J262 j332 j322 KDD Lkwpeter LKWPETER PINT pint SER SKY_FOX SYXZ syxz shift + syxz TTPTHA ZAAADA ZBAAACA ZJAAADC 01322222
589589 589721 595595 598598

AMI BIOS backdoor passwords:

AMI AAAMMMIII BIOS PASSWORD HEWITT RAND AMI?SW AMI_SW LKWPETER A.M.I. CONDO

PHOENIX BIOS backdoor passwords:

phoenix, PHOENIX, CMOS, BIOS

MISC. COMMON PASSWORDS

ALFAROME BIOSTAR biostar biosstar CMOS cmos LKWPETER lkwpeter setup SETUP Syxz Wodj

OTHER BIOS PASSWORDS BY MANUFACTURER

Manufacturer Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox  central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
TMC BIGO
Toshiba Toshiba

TOSHIBA BIOS

Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot

IBM APTIVA BIOS

Press both mouse buttons repeatedly during the boot


--------------------------------------------------------------------------------

Password cracking software

The following software can be used to either crack or reset the BIOS on many chipsets. If your PC is locked with a BIOS administrator password that will not allow access to the floppy drive, these utilities may not work. Also, since these utilities do not come from the manufacturer, use them cautiously and at your own risk.

Cmos password recovery tools 3.1
!BIOS (get the how-to article)
RemPass
KILLCMOS

--------------------------------------------------------------------------------

Using the Motherboard "Clear CMOS" Jumper or Dipswitch settings

Many motherboards feature a set of jumpers or dipswitches that will clear the CMOS and wipe all of the custom settings including BIOS passwords. The locations of these jumpers / dipswitches will vary depending on the motherboard manufacturer and ideally you should always refer to the motherboard or computer manufacturers documentation. If the documentation is unavailable, the jumpers/dipswitches can sometimes be found along the edge of the motherboard, next to the CMOS battery, or near the processor. Some manufacturers may label the jumper / dipswitch CLEAR - CLEAR CMOS - CLR - CLRPWD - PASSWD - PASSWORD - PWD. On laptop computers, the dipswitches are usually found under the keyboard or within a compartment at the bottom of the laptop.
Please remember to unplug your PC and use a grounding strip before reaching into your PC and touching the motherboard. Once you locate and rest the jumper switches, turn the computer on and check if the password has been cleared. If it has, turn the computer off and return the jumpers or dipswitches to its original position.


--------------------------------------------------------------------------------

Removing the CMOS Battery

The CMOS settings on most systems are buffered by a small battery that is attached to the motherboard. (It looks like a small watch battery). If you unplug the PC and remove the battery for 10-15 minutes, the CMOS may reset itself and the password should be blank. (Along with any other machine specific settings, so be sure you are familiar with manually reconfiguring the BIOS settings before you do this.) Some manufacturers backup the power to the CMOS chipset by using a capacitor, so if your first attempt fails, leave the battery out (with the system unplugged) for at least 24 hours. Some batteries are actually soldered onto the motherboard making this task more difficult. Unsoldering the battery incorrectly may damage your motherboard and other components, so please don't attempt this if you are inexperienced. Another option may be to remove the CMOS chip from the motherboard for a period of time.
Note: Removing the battery to reset the CMOS will not work for all PC's, and almost all of the newer laptops store their BIOS passwords in a manner which does not require continuous power, so removing the CMOS battery may not work at all. IBM Thinkpad laptops lock the hard drive as well as the BIOS when the supervisor password is set. If you reset the BIOS password, but cannot reset the hard drive password, you may not be able to access the drive and it will remain locked, even if you place it in a new laptop. IBM Thinkpads have special jumper switches on the motherboard, and these should be used to reset the system.


--------------------------------------------------------------------------------

Overloading the KeyBoard Buffer

On some older computer systems, you can force the CMOS to enter its setup screen on boot by overloading the keyboard buffer. This can be done by booting with the keyboard or mouse unattached to the systems, or on some systems by hitting the ESC key over 100 times in rapid succession.


--------------------------------------------------------------------------------

Jumping the Solder Beads on the CMOS

It is also possible to reset the CMOS by connecting or "jumping" specific solder beads on the chipset. There are too many chipsets to do a breakdown of which points to jump on individual chipsets, and the location of these solder beads can vary by manufacturer, so please check your computer and motherboard documentation for details. This technique is not recommended for the inexperienced and should be only be used as a "last ditch" effort.


--------------------------------------------------------------------------------

What is A Registry ?

 What is the Registry?
The Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.

The physical files that make up the registry are stored differently depending on your version of Windows; under Windows 95 & 98 it is contained in two hidden files in your Windows directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the %SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a tool commonly known as a "Registry Editor" to make any changes (using registry editors will be discussed later in the article).

The Structure of The Registry
The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer.

Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context.

There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:


* HKEY_CLASSES_ROOT - This branch contains all of your file association mappings to support the drag-and-drop feature, OLE information, Windows shortcuts, and core aspects of the Windows user interface.
* HKEY_CURRENT_USER - This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the PC and contains information such as logon names, desktop settings, and Start menu settings.
* HKEY_LOCAL_MACHINE - This branch contains computer specific information about the type of hardware, software, and other preferences on a given PC, this information is used for all users who log onto this computer.
* HKEY_USERS - This branch contains individual preferences for each user of the computer, each user is represented by a SID sub-key located under the main branch.
* HKEY_CURRENT_CONFIG - This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration.
* HKEY_DYN_DATA - This branch points to the part of HKEY_LOCAL_MACHINE, for use with the Plug-&-Play features of Windows, this section is dymanic and will change as devices are added and removed from the system.



Each registry value is stored as one of five main data types:


* REG_BINARY - This type stores the value as raw binary data. Most hardware component information is stored as binary data, and can be displayed in an editor in hexadecimal format.
* REG_DWORD - This type represents the data by a four byte number and is commonly used for boolean values, such as "0" is disabled and "1" is enabled. Additionally many parameters for device driver and services are this type, and can be displayed in REGEDT32 in binary, hexadecimal and decimal format, or in REGEDIT in hexadecimal and decimal format.
* REG_EXPAND_SZ - This type is an expandable data string that is string containing a variable to be replaced when called by an application. For example, for the following value, the string "%SystemRoot%" will replaced by the actual location of the directory containing the Windows NT system files. (This type is only available using an advanced registry editor such as REGEDT32)
* REG_MULTI_SZ - This type is a multiple string used to represent values that contain lists or multiple values, each entry is separated by a NULL character. (This type is only available using an advanced registry editor such as REGEDT32)
* REG_SZ - This type is a standard string, used to represent human readable text values.



Other data types not available through the standard registry editors include:


* REG_DWORD_LITTLE_ENDIAN - A 32-bit number in little-endian format.
* REG_DWORD_BIG_ENDIAN - A 32-bit number in big-endian format.
* REG_LINK - A Unicode symbolic link. Used internally; applications should not use this type.
* REG_NONE - No defined value type.
* REG_QWORD - A 64-bit number.
* REG_QWORD_LITTLE_ENDIAN - A 64-bit number in little-endian format.
* REG_RESOURCE_LIST - A device-driver resource list.



Editing The Registry

The Registry Editor (REGEDIT.EXE) is included with most version of Windows (although you won't find it on the Start Menu) it enables you to view, search and edit the data within the Registry. There are several methods for starting the Registry Editor, the simplest is to click on the Start button, then select Run, and in the Open box type "regedit", and if the Registry Editor is installed it should now open and look like the image below.

An alternative Registry Editor (REGEDT32.EXE) is available for use with Windows NT/2000, it includes some additional features not found in the standard version, including; the ability to view and modify security permissions, and being able to create and modify the extended string values REG_EXPAND_SZ & REG_MULTI_SZ.

Create a Shortcut to Regedit
This can be done by simply right-clicking on a blank area of your desktop, selecting New, then Shortcut, then in the Command line box enter "regedit.exe" and click Next, enter a friendly name (e.g. 'Registry Editor') then click Finish and now you can double click on the new icon to launch the Registry Editor.

Using Regedit to modify your Registry
Once you have started the Regedit you will notice that on the left side there is a tree with folders, and on the right the contents (values) of the currently selected folder.

Like Windows explorer, to expand a certain branch (see the structure of the registry section), click on the plus sign [+] to the left of any folder, or just double-click on the folder. To display the contents of a key (folder), just click the desired key, and look at the values listed on the right side. You can add a new key or value by selecting New from the Edit menu, or by right-clicking your mouse. And you can rename any value and almost any key with the same method used to rename files; right-click on an object and click rename, or click on it twice (slowly), or just press F2 on the keyboard. Lastly, you can delete a key or value by clicking on it, and pressing Delete on the keyboard, or by right-clicking on it, and choosing Delete.

Note: it is always a good idea to backup your registry before making any changes to it. It can be intimidating to a new user, and there is always the possibility of changing or deleting a critical setting causing you to have to reinstall the whole operating system. It's much better to be safe than sorry!

Importing and Exporting Registry Settings

A great feature of the Registry Editor is it's ability to import and export registry settings to a text file, this text file, identified by the .REG extension, can then be saved or shared with other people to easily modify local registry settings. You can see the layout of these text files by simply exporting a key to a file and opening it in Notepad, to do this using the Registry Editor select a key, then from the "Registry" menu choose "Export Registry File...", choose a filename and save. If you open this file in notepad you will see a file similar to the example below:

Quote:

REGEDIT4

[HKEY_LOCAL_MACHINE\SYSTEM\Setup]
"SetupType"=dword:00000000
"CmdLine"="setup -newsetup"
"SystemPrefix"=hex:c5,0b,00,00,00,40,36,02


The layout is quite simple, REGEDIT4 indicated the file type and version, [HKEY_LOCAL_MACHINE\SYSTEM\Setup] indicated the key the values are from, "SetupType"=dword:00000000 are the values themselves the portion after the "=" will vary depending on the type of value they are; DWORD, String or Binary.

So by simply editing this file to make the changes you want, it can then be easily distributed and all that need to be done is to double-click, or choose "Import" from the Registry menu, for the settings to be added to the system Registry.

Deleting keys or values using a REG file
It is also possible to delete keys and values using REG files. To delete a key start by using the same format as the the REG file above, but place a "-" symbol in front of the key name you want to delete. For example to delete the [HKEY_LOCAL_MACHINE\SYSTEM\Setup] key the reg file would look like this:

Quote:

REGEDIT4

[-HKEY_LOCAL_MACHINE\SYSTEM\Setup]


The format used to delete individual values is similar, but instead of a minus sign in front of the whole key, place it after the equal sign of the value. For example, to delete the value "SetupType" the file would look like:

Quote:

REGEDIT4

[HKEY_LOCAL_MACHINE\SYSTEM\Setup]
"SetupType"=-


Use this feature with care, as deleting the wrong key or value could cause major problems within the registry, so remember to always make a backup first.

Regedit Command Line Options
Regedit has a number of command line options to help automate it's use in either batch files or from the command prompt. Listed below are some of the options, please note the some of the functions are operating system specific.


* regedit.exe [options] [filename] [regpath]
* [filename] Import .reg file into the registry
* /s [filename] Silent import, i.e. hide confirmation box when importing files
* /e [filename] [regpath] Export the registry to [filename] starting at [regpath]
e.g. regedit /e file.reg HKEY_USERS\.DEFAULT
* /L:system Specify the location of the system.dat to use
* /R:user Specify the location of the user.dat to use
* /C [filename] Compress (Windows 98)
* /D [regpath] Delete the specified key (Windows 98)

Maintaining the Registry

How can you backup and restore the Registry?

Windows 95
Microsoft included a utility on the Windows 95 CD-ROM that lets you create backups of the Registry on your computer. The Microsoft Configuration Backup program, CFGBACK.EXE, can be found in the \Other\Misc\Cfgback directory on the Windows 95 CD-ROM. This utility lets you create up to nine different backup copies of the Registry, which it stores, with the extension RBK, in your \Windows directory. If your system is set up for multiple users, CFGBACK.EXE won't back up the USER.DAT file.

After you have backed up your Registry, you can copy the RBK file onto a floppy disk for safekeeping. However, to restore from a backup, the RBK file must reside in the \Windows directory. Windows 95 stores the backups in compressed form, which you can then restore only by using the CFGBACK.EXE utility.

Windows 98
Microsoft Windows 98 automatically creates a backup copy of the registry every time Windows starts, in addition to this you can manually create a backup using the Registry Checker utility by running SCANREGW.EXE from Start | Run menu.

What to do if you get a Corrupted Registry
Windows 95, 98 and NT all have a simple registry backup mechanism that is quite reliable, although you should never simply rely on it, remember to always make a backup first!

Windows 95
In the Windows directory there are several hidden files, four of these will be SYSTEM.DAT & USER.DAT, your current registry, and SYSTEM.DA0 & USER.DA0, a backup of your registry. Windows 9x has a nice reature in that every time it appears to start successfully it will copy the registry over these backup files, so just in case something goes wrong can can restore it to a known good state. To restore the registry follow these instruction:
[list=1]
* Click the Start button, and then click Shut Down.

* Click Restart The Computer In MS-DOS Mode, then click Yes.

* Change to your Windows directory. For example, if your Windows directory is c:\windows, you would type the following:

cd c:\windows

* Type the following commands, pressing ENTER after each one. (Note that SYSTEM.DA0 and USER.DA0 contain the number zero.)

attrib -h -r -s system.dat
attrib -h -r -s system.da0
copy system.da0 system.dat
attrib -h -r -s user.dat
attrib -h -r -s user.da0
copy user.da0 user.dat

* Restart your computer.



Following this procedure will restore your registry to its state when you last successfully started your computer.

If all else fails, there is a file on your hard disk named SYSTEM.1ST that was created when Windows 95 was first successfully installed. If necessary you could also change the file attributes of this file from read-only and hidden to archive to copy the file to C:\WINDOWS\SYSTEM.DAT.

Windows NT
On Windows NT you can use either the "Last Known Good" option or RDISK to restore to registry to a stable working configuration.

How can I clean out old data from the Registry?
Although it's possible to manually go through the Registry and delete unwanted entries, Microsoft provides a tool to automate the process, the program is called RegClean. RegClean analyzes Windows Registry keys stored in a common location in the Windows Registry. It finds keys that contain erroneous values, it removes them from the Windows Registry after having recording those entries in the Undo.Reg file.

Your Home Page Nevr Being Changed

Your Home Page Nevr Being Changed

Some websites illegally modify your registry editor and set their website as default home page, for stop this,


1. Right-click on the Internet Explorer icon on your desktop and select "Properties".

2. In the "Target" box you will see "C:\Program Files\Internet

Explorer\IEXPLORE.EXE".

3. Now by adding the URL of the site to the end of this it overrides any
Homepage setting in internet options:

"C:\Program Files\Internet Explorer\IEXPLORE.EXE" www.google.com

Sunday, January 9, 2011

Microsoft Office Professional 2010 ACTIVATED

http://www.fileserve.com/file/2Que8FU/Mic_Office_2010_Activated.part1.rar
http://www.fileserve.com/file/SDb72Cf/Mic_Office_2010_Activated.part2.rar
http://www.fileserve.com/file/C6GNJGy/Mic_Office_2010_Activated.part3.rar
http://www.fileserve.com/file/rwzM36t/Mic_Office_2010_Activated.part5.rar
http://www.fileserve.com/file/sAjZHCm/Mic_Office_2010_Activated.part6.rar
http://www.fileserve.com/file/nkpPGdK/Mic_Office_2010_Activated.part7.rar
http://www.fileserve.com/file/drVpEuR/Mic_Office_2010_Activated.part8.rar

Over 5GB of E-books on FTP

A Brief Glimpse of The Contents:-


active directory bible.pdf
addison wesley - a programmer's guide to java certification. second edition.chm
addison wesley - an introduction to parallel computing, second edition.chm
addison wesley - building solutions with the mi*****ft .net compact framework.chm
addison wesley - code reading. the open source perspective.chm
addison wesley - database design for mere mortals.chm
addison wesley - designing storage area networks. 2nd edition.chm
addison wesley - eclipse modeling framework.chm
addison wesley - hypertransport system architecture.chm
addison wesley - ip storage networking. straight to the core.chm
addison wesley - java development on pda's. building applications for pocket pc and palm devices.chm
addison wesley - managing software requirements, second edition.chm
addison wesley - mda explained. the model driven architecture.chm
addison wesley - moving to linux. kiss the blue screen of death goodbye!.chm
addison wesley - open source web development with lamp.chm
addison wesley - pci express system architecture.chm
addison wesley - perl medic. transforming legacy code.chm
addison wesley - pocket pc network programming.chm
addison wesley - principles of the business rule approach.chm
addison wesley - rational unified process made easy.chm
addison wesley - real 802.11 security. wi-fi protected access and 802.11i.chm
addison wesley - rtp. audio and video for the internet.chm
addison wesley - software architecture in practice, second edition.chm
addison wesley - text processing in python.chm
addison wesley - understanding and deploying ldap directory services, 2nd edition.chm
addison wesley - xml data management. native xml and xml-enabled database.chm
addison-wesley - software engineering and computer games.chm
addison-wesley - wi-foo. the secrets of wireless hacking.chm
Administering Cisco QoS.pdf

a-list publishing - advanced 3ds max 5 modeling and animating.chm
a-list publishing - pc hardware tuning and acceleration.chm
a-list publishing - windows .net server 2003 domains & active directory.chm
a-list publishing - windows server 2003 registry.chm
alm os programming bible.pdf
Apache Server 2 Bible - HUNGRY MINDS.pdf
apress - professional php4.chm
artech house - gprs for mobile internet.chm
artech house - lans to wan's the complete management guide.chm
artech house - mission-critical network planning.pdf
artech house - voice over 802.11.pdf
artech house - wireless ip and building the mobile internet.pdf
autocad 2002 bible bonus_appd.pdf
autocad 2002 bible bonus_appe.pdf
autocad 2002 bible.pdf
beginning php4.zip
Bluetooth Application Developers Guide.pdf
Building an Intranet with Windows NT 4.zip
Building Cisco Networks for Windows 2000.pdf
Building Cisco Remote Access Networks.pdf
c++ footprint and performance optimization.chm
c++ standard library, the a tutorial and reference.chm
C++ByDissection.pdf


Just Click on Below Link:
----------->>>>>>>>   ftp://194.44.214.3/pub/e-books/

A Good FTP Collections for English Songs

A good Ftp Collections for english songs
ftp://194.44.214.3 /pub/music/Music%20sorted/
ftp://194.44.214.3 /pub/music
ftp://193.43.36.131 /Radio/MP3/
ftp://206.248.136.77 /Audio/MP3%20Files/
ftp://81.95.186.234 /download/music/
ftp://87.240.36.174 /pub/Files_One/Music/
ftp://82.199.102.119 /Incoming/Music/
ftp://80.92.99.201 /Pub/Music
ftp://195.208.208.22 /pub/music
ftp://194.190.136.25 /music.mp3/

MOVIE, GAMES, MUSIC ---- FTP

Movie - Indiana Jones 4 Kingdom of the Crystal Skull (DVDRip)
ftp://91.121.41.25/Indiana.Jones.4.Crsytal.Skull-DVDRip.XviD_2008_WwW.DivXuP.CoM_DxP.rar
Game - FIFA '09 Reloaded
Download:
ftp://212.143.143.36/taglitnewsite/wwwroot/Taglit_BackOffice/App_Code/ .com10/ TaGGeD aux/ 4 MB dot COM/ UpLo4d_h3r3/FIFA.09-RELOADED/
^^ Copy the whole code above. The whole code is the URL
Game - Unreal Tournament 2004
Download:
ftp://ftp.mgts.by/game/ut2004/
Counter Strike - Frags n Tricks Videos
ftp://ftp.groza.ru/clients/cs16/kreedz/Videos/
Music - This contains huge lists
ftp://195.218.197.3/music/
92 GB Of Music:

Difference between HTTP and FTP

BHAI JAISE HTTP SITES HOTI HAIN VAISE HI FTP SITES HOTI HAIN....
INMEIN KAAFI MAAL HOTA HAI...
CHECK THIS-->
ftp://194.187.207.98/games/
^^^^
PASTE THIS INTO ADDRESS BAR AND ENTER....
ITZ A FTP SITE WITH DIRECT DOWNLOAD LINKZ.....

GAMES------>

300 SPARTANS
ftp://207.71.8.54/games/300_Spartans.z*ip
======================================================
3D MAZES
ftp://207.71.8.54/games/3D-Mazes.z*ip
======================================================
3D SHOGI
ftp://207.71.8.54/games/3DShogi.z*ip
======================================================
3D XIANGQI
ftp://207.71.8.54/games/3DXiangQi.z*ip
======================================================
3D HOOK MOVE CHESS
ftp://207.71.8.54/games/3D_Hook-Move_Chess.z*ip
======================================================
3D CHESS
ftp://207.71.8.54/games/3dchess.z*ip
======================================================
3D HEX CHESS
ftp://207.71.8.54/games/3dhexchess.z*ip
======================================================
MUSK
ftp://207.71.8.54/games/3musk.z*ip
======================================================
HANDED CHATURANGA
ftp://207.71.8.54/games/4-handedChaturanga.z*ip
======================================================
HANDED SHATRANJ
ftp://207.71.8.54/games/4-handedShatranj.z*ip
======================================================

Saturday, January 8, 2011

Computer Acronyms

 -----A--------

ADSL - Asymmetric Digital Subscriber Line
AGP - Accelerated Graphics Port
ALI - Acer Labs, Incorporated
ALU - Arithmetic Logic Unit
AMD - Advanced Micro Devices
APC - American Power Conversion
ASCII - American Standard Code for Information Interchange
ASIC - Application Specific Integrated Circuit
ASPI - Advanced SCSI Programming Interface
AT - Advanced Technology
ATI - ATI Technologies Inc.
ATX - Advanced Technology Extended


--- B ---
BFG - BFG Technologies
BIOS - Basic Input Output System
BNC - Barrel Nut Connector

--- C ---
CAS - Column Address Signal
CD - Compact Disk
CDR - Compact Disk Recorder
CDRW - Compact Disk Re-Writer
CD-ROM - Compact Disk - Read Only Memory
CFM - Cubic Feet per Minute (ft�/min)
CMOS - Complementary Metal Oxide Semiconductor
CPU - Central Processing Unit
CTX - CTX Technology Corporation (Commited to Excellence)

--- D ---

DDR - Double Data Rate
DDR-SDRAM - Double Data Rate - Synchronous Dynamic Random Access Memory
DFI - DFI Inc. (Design for Innovation)
DIMM - Dual Inline Memory Module
DRAM - Dynamic Random Access Memory
DPI - Dots Per Inch
DSL - See ASDL
DVD - Digital Versatile Disc
DVD-RAM - Digital Versatile Disk - Random Access Memory

--- E ---
ECC - Error Correction Code
ECS - Elitegroup Computer Systems
EDO - Extended Data Out
EEPROM - Electrically Erasable Programmable Read-Only Memory
EPROM - Erasable Programmable Read-Only Memory
EVGA - EVGA Corporation
--- F ---
FC-PGA - Flip Chip Pin Grid Array
FDC - Floppy Disk Controller
FDD - Floppy Disk Drive
FPS - Frame Per Second
FPU - Floating Point Unit
FSAA - Full Screen Anti-Aliasing
FS - For Sale
FSB - Front Side Bus

--- G ---
GB - Gigabytes
GBps - Gigabytes per second or Gigabits per second
GDI - Graphical Device Interface
GHz - GigaHertz

--- H ---
HDD - Hard Disk Drive
HIS - Hightech Information System Limited
HP - Hewlett-Packard Development Company
HSF - Heatsink-Fan

--- I ---
IBM - International Business Machines Corporation
IC - Integrated Circuit
IDE - Integrated Drive Electronics
IFS- Item for Sale
IRQ - Interrupt Request
ISA - Industry Standard Architecture
ISO - International Standards Organization

--- J ---
JBL - JBL (Jame B. Lansing) Speakers
JVC - JVC Company of America

- K ---
Kbps - Kilobits Per Second
KBps - KiloBytes per second

--- L ---
LG - LG Electronics
LAN - Local Are Network
LCD - Liquid Crystal Display
LDT - Lightning Data Transport
LED - Light Emitting Diode

--- M ---
MAC - Media Access Control
MB � MotherBoard or Megabyte
MBps - Megabytes Per Second
Mbps - Megabits Per Second or Megabits Per Second
MHz - MegaHertz
MIPS - Million Instructions Per Second
MMX - Multi-Media Extensions
MSI - Micro Star International

--- N ---
NAS - Network Attached Storage
NAT - Network Address Translation
NEC - NEC Corporation
NIC - Network Interface Card

--- O ---
OC - Overclock (Over Clock)
OCZ - OCZ Technology
OEM - Original Equipment Manufacturer

--- P ---
PC - Personal Computer
PCB - Printed Circuit Board
PCI - Peripheral Component Interconnect
PDA - Personal Digital Assistant
PCMCIA - Peripheral Component Microchannel Interconnect Architecture
PGA - Professional Graphics Array
PLD - Programmable Logic Device
PM - Private Message / Private Messaging
PnP - Plug 'n Play
PNY - PNY Technology
POST - Power On Self Test
PPPoA - Point-to-Point Protocol over ATM
PPPoE - Point-to-Point Protocol over Ethernet
PQI - PQI Corporation
PSU - Power Supply Unit

--- R ---
RAID - Redundant Array of Inexpensive Disks
RAM - Random Access Memory
RAMDAC - Random Access Memory Digital Analog Convertor
RDRAM - Rambus Dynamic Random Access Memory
ROM - Read Only Memory
RPM - Revolutions Per Minute

--- S ---
SASID - Self-scanned Amorphous Silicon Integrated Display
SCA - SCSI Configured Automatically
SCSI - Small Computer System Interface
SDRAM - Synchronous Dynamic Random Access Memory
SECC - Single Edge Contact Connector
SODIMM - Small Outline Dual Inline Memory Module
SPARC - Scalable Processor ArChitecture
SOHO - Small Office Home Office
SRAM - Static Random Access Memory
SSE - Streaming SIMD Extensions
SVGA - Super Video Graphics Array
S/PDIF - Sony/Philips Digital Interface

--- T ---
TB - Terabytes
TBps - Terabytes per second
Tbps - Terabits per second
TDK - TDK Electronics
TEC - Thermoelectric Cooler
TPC - TipidPC
TWAIN - Technology Without An Important Name

--- U ---
UART - Universal Asynchronous Receiver/Transmitter
USB - Universal Serial Bus
UTP - Unshieled Twisted Pair

--- V ---
VCD - Video CD
VPN - Virtual Private Network

--- W ---
WAN - Wide Area Network
WTB - Want to Buy
WYSIWYG - What You See Is What You Get

--- X ---
XGA - Extended Graphics Array
XFX - XFX Graphics, a Division of Pine
XMS - Extended Memory Specification
XT - Extended Technology

Change The Default Location For Installing Apps (Program Files)

As the size of hardrives increase, more people are using partitions to seperate and store groups of files.

XP uses the C:\Program Files directory as the default base directory into which new programs are installed. However, you can change the default installation drive and/ or directory by using a Registry hack.

Run the Registry Editor (regedit)and go to

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion

Look for the value named ProgramFilesDir. by default,this value will be C:\Program Files. Edit the value to any valid drive or folder and XP will use that new location as the default installation directory for new programs.

Change Text on XP Start Button

Step 1 - Modify Explorer.exe File

In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.

get this from h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip

The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.

The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.

There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!

You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.


Step 2 Modify the Registry

!!!make a backup of your registry before making changes!!!

Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:

HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon

In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.

Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.[/b]

Cannot use my password to get back into Windows XP

Because of the security features built into Windows XP, it is virtually impossible to get back into the system without the password.
You have several options to try and get around this problem.



If you have access to another user account with administrator rights, you can use that account to change the password
of the account that is locked out. You can also use the default Administrator account that is built into Windows XP.


First you need to boot the system into Safe Mode.
1.Restart your system.
2.When you see the blue Dell globe or screen, press the ( F8 ) key about 3 times a second.
3.You should get the Windows startup menu. Use the (Up or Down) arrow keys to highlight (SafeMode)
4.Press (Enter) on (Safe Mode), then press (Enter) on (Windows XP).
5.The system should boot to Safe Mode.


Once you are at the Account Log on Screen, click on the icon
for the user account with administrator rights, or click on the icon
for the administrators account.
Note: For Home the Administrator account isn't normally shown & in Safe Mode you have to press Ctrl+Alt+Delete keys twice to show.
For PRO you can do this in normal mode

When the system has booted to the desktop, use the following steps to change the accounts password.
1.Click Start, Control Panel, Administrative Tools.
2.Click Computer Management.
3.Double click Local Users and Groups, double click the folder Users.
4.Right click on the account name that is locked out, and click on Set Password.
5.You may get a warning message about changing the password, simply click proceed.
6.Leave the New Password box blank, also leave the Confirm Password box blank.
7.Click OK, and OK again.
8.Then close all Windows, reboot the system and try to log in.



There are also applications that can recover the password for you.
The following companies provide these applications at a cost.
iOpus® Password Recovery XP here.
LostPassword.com, here.
Asterisk Password Recovery XP v1.89 here.
Windows XP / 2000 / NT Key here.


If the above information does not help in recovering the password, the only option left is to
format the hard drive then reinstall Windows and the system software.

Saturday, January 1, 2011

Boot Windows XP Fast................

Boot Winxp Fast

Follow the following steps

1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\
2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.

Broken Internet Explorer, How to Fix it..................

So one of your friends, “not you of course”, has managed to nuke Internet Explorer and they are unsure how they did it. You’ve eliminated the possibility of viruses and adware, so this just leaves you and a broken IE. Before you begin to even consider running a repair install of the OS, let’s try to do a repair on IE instead.

  • THE REPAIR PROCESS

Start the Registry Editor by typing regedit from the Run box. Go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Active Setup \ Installed Components \ {89820200-ECBD-11cf-8B85-00AA005B4383} and then right-click the “IsInstalled value.” Click Modify. From there, you will change the value from 1 to 0. All right, go ahead and close the editor and reinstall IE from this location. /http://www.microsoft.com/windows/ie/default.mspx


  • IF SOMETHING GOES WRONG

If messing with the registry and something goes horribly wrong, you can use “Last Known Good Configuration (F8 Safe Mode)” or a Restore Point to get back to where you were before, with your settings. Then you can try again, this time taking care to watch the portion of the registry you are changing. Most people who have troubles with this end up changing the wrong registry key.


Hope this tut helps some members.