Wednesday, May 30, 2007

Speed Up Boot and Shutdown Times

Shorten the time it takes for your desktop to appear when you turn on your PC, and make XP shut down faster as well.No matter how fast your PC boots, it's not fast enough. Here are severalhacks to get you right to your desktop as quickly as possible after startup.

Perform a Boot Defragment
There's a simple way to speed up XP startup: make your system do a bootdefragment, which will put all the boot files next to one another on yourhard disk. When boot files are in close proximity to one another, your sys-tem will start faster.On most systems, boot defragment should be enabled by default, but itmight not be on yours, or it might have been changed inadvertently. Tomake sure that boot defragment is enabled on your system, run the RegistryEditor and go to:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction

Edit the Enable string value to Y if it is not already set to Y. Exit the Registryand reboot. The next time you reboot, you'll do a boot defragment.

I've found many web sites recommending a way of speeding up boot times that might in fact slow down the amount of time it takes to boot up and will probably slow down launching applications as well. The tip recommends going to your C:\WINDOWS\Prefetch directory and emptying it every week. Windows uses this directory to speed up launching applications. It analyzes the files you use during startup and the applications you launch, and it creates an index to where those files and applications are located on your hard disk. By using this index, XP can launch files and applications faster. So, by emptying the directory, you are most likely slowing down launching applications. In my tests, I've also found that after emptying the directory, it takes my PC a few seconds longer to get to my desktop after bootup.

Hack Your BIOS for Faster Startups
When you turn on your PC, it goes through a set of startup procedures in itsBIOS before it gets to starting XP. So, if you speed up those initial startupprocedures, you'll make your system start faster.You can speed up your startup procedures by changing the BIOS with thebuilt-in setup utility. How you run this utility varies from PC to PC, but you typically get to it by pressing the Delete, F1, or F10 keys during startup.You'll come to a menu with a variety of choices. Here are the choices to make for faster system startups:

Quick Power On Self Test (POST)
When you choose this option, your system runs an abbreviated POST rather than the normal, lengthy one.

Boot Up Floppy Seek
Disable this option. When it's enabled, your system spends a few extra seconds looking for your floppy drive--a relatively pointless procedure, especially considering how infrequently you use your floppy drive.

Boot Delay
Some systems let you delay booting after you turn on your PC so that your hard drive gets a chance to start spinning before bootup. Most likely, you don't need to have this boot delay, so turn it off. If you run into problems, however, you can turn it back on.

Fine-Tune Your Registry for Faster Startups
Over time, your Registry can become bloated with unused entries, slowing down your system startup because your system loads them every time you start up your PC. Get a Registry clean-up tool to delete unneeded Registry entries and speed up startup times. Registry First Aid, is an excellent Registry clean-up tool. It combs your Registry for outdated and useless entries and then lets you choose which entries to delete and which to keep. It also creates a full Registry backup so that you can restore the Registry if you run into a problem.
Registry First Aid is shareware and free to try, but it costs $21 if you decide to keep using it. Download it from http://www.rosecitysoftware.com/Reg1Aid/index.html. After you clean out your Registry, you might want to try compacting it to get rid of unused space. The Registry Compactor, available from http://www.rosecitysoftware.com/RegistryCompactor/index.html, will do the trick. Compacting your Registry reduces its size and decreases loading time. It's shareware and free to try, but it costs $19.95 if you decide to keep it.

Speed Up Shutdown Times
It's not only startup times that you'd like to speed up; you can also make sure that your system shuts down faster. If shutting down XP takes what seems to be an inordinate amount of time, here are a couple of steps you can take to speed up the shutdown process:

10 Dumb Things Users Do That Can Mess Up Their Computers

We all do dumb things now and then, and computer users are no exception. Inadvertently pressing the wrong keycombination or innocently clicking OK in the wrong dialog box can change important settings that alter acomputer's behavior or even crash the system.Nervous newbies are often fearful that one wrong move might break the computer forever. Luckily, short of takinga sledge hammer to the box, the consequences aren't usually quite that dire. Even so, users often do createproblems for their computers and for your network. Here's a description of common missteps you can share withyour users to help them steer clear of preventable problems.

1 Plug into the wall without surge protection
Here's one that actually can physically destroy your computer equipment, as well as the data it holds. You maythink your systems are in danger only during an electrical storm, but anything that interrupts the electrical circuitand then starts the current back again can fry your components. Something as simple as someone turning on anappliance that's plugged into the same circuit (especially a high voltage one such as a hair dryer, electric heater,or air conditioner) can cause a surge, or a surge may be caused by a tree limb touching a power line. If you havea power outage, you may experience a surge when the electricity comes back on.You can protect your systems against damage from power surges by always using a surge protector, but it'simportant to be aware that most cheap surge protectors will survive only a single surge and need to be replacedafterward. An Uninterruptible Power Supply (UPS) is better than a surge protector; it has a battery that keepspower flowing smoothly even when there's an outage, to give you time to gracefully shut down.


2 . Surf the Internet without a firewall
Many home users plug their computers right into their spiffy new cable or DSL modems and hop onto the Internetwithout realizing that they're putting themselves at risk from viruses and attackers. Every Internet-connectedcomputer should be protected by a firewall; this can be a firewall built into the broadband modem or router, aseparate firewall appliance that sits between the modem/router and the computer, a server at the network's edgerunning firewall software, or personal firewall software installed on the computer (such as ICF/Windows Firewallbuilt into Windows XP or a third-party firewall program like Kerio or ZoneAlarm).One advantage of personal firewalls on laptop computers is that they're still with you when you take the computeron the road and plug into a hotel's DSL or cable port or connect to a wireless hotspot. Just having a firewall isn'tenough, though. You must also be sure it's turned on and configured properly to protect you.



3 Neglect to run or update antivirus and anti-spyware programs
Let's face it: Antivirus programs can be a royal pain. They're always blocking some application you want to use,you often have to disable them to install new software, and they have to be updated on a regular basis to do anygood. Seems like the subscription is always expiring and prompting you to renew it--for a fee, in many cases. Butin today's environment, you can't afford to go without virus protection. The malicious programs that AV softwaredetects--viruses, Trojans, worms, etc.--can not only wreak havoc on your system but can spread via yourcomputer to the rest of the network. In extreme cases, they can bring down the whole network.Spyware is another growing threat; these are programs that install themselves on your computer (usually withoutyour knowledge) and collect information from your system that is then sent back to the spyware program's authoror vendor. Antivirus programs often don't address spyware so it's important to run a dedicated spyware detectionand removal program.

4 Install and uninstall lots of programs, especially betas
You like to be on the cutting edge, so you often install and try out new software. Beta programs are usually freeand give you a chance to sample neat new features before most people. There are also many freeware andshareware programs made available as Internet downloads by their authors. We know you'd never do it, but someusers even install pirated software or "warez."The more programs you install, the more likely you are to run across ones that either include malicious code orthat are poorly written and cause your system to behave improperly or crash. The risk is greater with piratedprograms.Even if you install only licensed, final-release commercial software, too many installations and uninstallations cangunk up the registry. Not all uninstall routines completely remove program remnants and at the least, this practicecan cause your system to slow down over time.You should install only the programs that you really need, stick with legitimate software, and try to minimize thenumber you install and uninstall.



5 Keep disks full and fragmented
One of the results of installing and uninstalling lots of programs (or adding and deleting data of any kind) is that itfragments your disk. Disk fragmentation occurs because of the way information is stored on the disk: On a new,clean disk, when you save a file it's stored in contiguous sections called clusters. If you delete a file that takes up,for example, five clusters, and then save a new file that takes eight clusters, the first five clusters' worth of datawill be saved in the empty space left by the deletion and the remaining three will be saved in the next emptyspaces. That makes the file fragmented, or divided. To access that file, then, the disk's read heads won't find allthe parts of the file together but must go to different locations on the disk to retrieve it all. That makes it slower toaccess. If the file is part of a program, the program will run more slowly. A badly fragmented disk will slow down toa crawl.You can use the disk defragmenter built into Windows (Programs Accessories System Tools) or a third-partydefrag program to rearrange these pieces of files so that they're placed contiguously on the disk.Another common cause of performance problems and application misbehavior is a disk that's too full. Manyprograms create temporary files and need extra free space on the disk to operate. You can use Windows XP'sDisk Cleanup Tool or a third-party program to find and delete rarely used files, or you can manually delete files toclear space on your disk.


6 Open all attachments
Some folks just can't help themselves: Getting an e-mail message with an attachment is like getting anunexpected gift. You just have to peek inside to see what it is. But just as that package left on your doorstep couldcontain a bomb, that file attached to your mail message could contain code that will delete your documents orsystem folder or send viruses to everyone in your address book.The most blatantly dangerous attachments are executable files--those that run code--with extensions like .exe,.cmd, and many others (see http://antivirus.about.com/od/securitytips/a/fileextview.htm for a list of file extensions fordifferent types of executables). Files that aren't themselves executables, such as Word .doc files and Excel .xlsfiles, can contain embedded macros. Scripts (Visual Basic, JavaScript, Flash, etc.) aren't directly executed by thecomputer but are run by other programs.It used to be that you could assume plain text (.txt) or graphics (.gif, .jpg, .bmp) files were safe, but not anymore.File extensions can be "spoofed"; attackers take advantage of the Windows default setting that doesn't displaycommon file extensions to name executables something like greatfile.jpg.exe. With the real extension hidden, itshows up as greatfile.jpg. So the recipient thinks it's a graphic, but it's actually a malicious program.

7 Click on everything
Opening attachments isn't the only type of mouse click that can get you in trouble. Clicking on hyperlinks in e-mailmessages or on Web pages can take you to Web sites that have embedded ActiveX controls or scripts that canperform all sorts of malicious activities, from wiping your hard disk to installing a backdoor program on yourcomputer that a hacker can use to get in and take control of it.Clicking the wrong link can also take you to inappropriate Web sites that feature pornography, pirated music orsoftware, or other content that can get you in trouble if you're using a computer on the job or even get you introuble with the law.Don't give in to "click mania." Think before you click a link. Links can also be disguised in "phishing" messages oron Web sites to appear to take you to a different site from the ones they really point to. For example, the linkmight say www.safesite.com, but it actually takes you to www.gotcha.com. You can often find out the real URL byhovering over the link without clicking it.

8 Share and share alike
Your mother taught you that it's nice to share, but when you're on a network, sharing can expose you to dangers.If you have file and printer sharing enabled, others can remotely connect to your computer and access your data.Even if you haven't created any shared folders, by default Windows systems have hidden "administrative" sharesfor the root of each drive. A savvy hacker may be able to use these shares to get in. One way to prevent that is toturn off file and printer sharing--if you don't need to make any of the files on your computer accessible across thenetwork. This is especially a good idea if you're connecting your laptop to a public wireless hotspot. You can findinstructions on how to do so at http://www.pcmag.com/article2/0,1895,1277222,00.asp.If you do need to make shared folders accessible, it's important that they be protected by both share-levelpermissions and file-level (NTFS) permissions. Also ensure that your account and the local administrative accounthave strong passwords.

9 Pick the wrong passwords
That brings us to another common mistake that can expose you to attacks: picking the wrong password. Even ifyou don't belong to a network where the administrator forces you to select strong passwords and change themregularly, you should do so. Don't pick passwords that are easy to guess, such as your birthdate, loved one'sname, social security number, etc. Longer passwords are harder to crack, so make your password at least eightcharacters long; 14 is even better. Popular password-cracking methods use "dictionary" attacks, so don't usewords that are in the dictionary. Passwords should contain a combination of alpha, numeric, and symbolcharacters for best security.A long string of nonsense characters may create a password that's tough to crack, but if you can't remember it,you'll defeat the purpose by writing it down (where an intruder may be able to find it). Instead, create a phrase youcan remember easily and use the first letters of each word, along with logical numbers and symbols. For example:"My cat ate a mouse on the 5th day of June" becomes "Mc8amot5doJ."

10. Ignore the need for a backup and recovery plan
Even if you follow all these suggestions, an attacker may crash your system or your data may be corrupted or getwiped out by a hardware problem. That's why it's essential that you always back up your important informationand have a plan for recovering from a system failure.Most computer users know they should back up, but many never get around to it. Or they make an initial backupbut don't update it regularly. Use the built-in Windows backup program (Ntbackup.exe in Windows NT, 2000, andXP) or a third-party backup program and schedule backups to occur automatically. Store backed up data on anetwork server or removable drive in a location away from the computer itself, in case of a natural disaster likeflood, fire, or tornado.Remember that the data is the most important thing on your computer. The operating system can be reinstalledand so can applications, but it may be difficult or impossible to recreate your original data. (See "10 ways to protectyour data" for additional suggestions.)Nonetheless, you can save time and frustration by backing up your system information too. You can create mirrorimages of your disks using popular "ghost" or "clone" programs. This will allow you to restore the system quicklyinstead of going through the tedious installation process.

By Debra Littlejohn Shinder, MCSE, MVP
Debra Littlejohn Shinder is a technology consultant, trainer and writer who has authored a number of books on computer operating systems, networking, and security. These include Scene of the Cybercrime: Computer Forensics Handbook, published by Syngress, and Computer Networking Essentials, published by Cisco Press. She is co-author, with her husband, Dr. Thomas Shinder, of Troubleshooting Windows 2000 TCP/IP, the best-selling Configuring ISA Server 2000, and ISA Server and Beyond.

More Power: Registry Hacks to Speed Up XP

Put your Registry-hacking knowledge to good use: hack your way to running Windows XP at top speed.
Creating and marketing tuning and customization utilities for the WindowsXP operating system is quickly becoming big business. A Google search willturn up hundreds of sites and programs dedicated to tweaking Windows XP.But no matter what type of interface is developed to make system tweakingeasier and safer for the average user, the end result is that the changes arereflected in XP by modifying the Registry.

For some people, commercialtweaking utilities might be the method of choice, but with a few precau-tions and safeguards it's possible to enhance system performance using onlythose tools supplied with Windows XP.As you learned in Chapter 7, you can use the Registry Editor [Hack #83] to editthe Registry. Make sure you take the precautions outlined in that chapterand back up your Registry [Hack #86], no matter how comfortable you are edit-ing the thing.No single tweak is going to take an ancient PC and turn it into a gamer'sdream machine. It's even unlikely that a number of tweaks will achieve sub-stantial performance gains, but every little bit does help. As long as you keepyour expectations realistic, you'll learn something about the Registry andhopefully see a performance increase in the process.

Menu Speed
When XP first appeared, there was a lot of conversation about the new inter-face, both good and bad. In spite of the initial complaints, most users stickwith the default settings rather than reverting to the Classic interface foundin previous Windows versions. But you might want to change the delay younotice when you click the Start menu. I see no reason for there to be anydelay when I click the Start menu. Effects are pretty, but I wouldn't click it ifI didn't have business inside, so let's get it open and get moving. The defaultspeed can be adjusted with a quick Registry hack.

Go to the Registry key HKEY_CURRENT_USER\Control Panel\Desktop\MenuShowDelay.
The default value is 400. Set it to 0 to remove the delay completely, but if you do that it will be nearly impossible to move themouse fast enough not to activate All Programs if you mouse over it enroute to your final selection. Pick a number that suits your style, make thechange, and then test it until you find a good compromise between speedand usability.

Place Windows Kernel into RAM
It's a given that anything that runs in RAM will be faster than an item that has to access the hard drive and virtual memory. Rather than have the kernel that is the foundation of XP using the slower Paging Executive functions, use this hack to create and set the DisablePagingExecutive DWORD to a value of 1.

Perform this hack only if the system has 256MB or more of installed RAM!

Edit the Registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\DisablePagingExecutive to 1 to disable paging and have the kernel run in RAM (set the value to 0 to undo this hack). Exit the Registry and reboot.

Alter Prefetch Parameters
Prefetching (the reading of system boot files into a cache for faster loading) is a commonly overlooked component that can have a significant impact on system boot time. This tweak allows you to select which components will make use of the prefetch parameters. To see which files are gathered using each setting, clear the prefetch cache located at
C:\Windows\Prefetch and then enable one of the settings listed in this hack. Clear the cache and repeat for each setting.

Set the Registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters\EnablePrefetcher to 0 to disable prefetching, 1 to prefetch application launch files, 2 to prefetch boot files, or 3 to prefetch as many files as possible.


Disable 8.3 Name Creation in NTFS
Files that use the 8.3 naming convention can degrade NTFS drive performance. Unless you have a good reason for keeping the 8.3 naming convention intact (such as if you're using 16-bit programs), a performance gain can be achieved by disabling it. Set the Registry DWORD key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem\NtfsDisable8dot3NameCreation to 1. Exit the Registry and reboot.

10 Windows XP Tips And Tools To Simplify Your Work

Launch System Restore from a command prompt inWindows XP
It's not unusual to use System Restore to fix strange Windows XP system behavior--but depending on how damaged your system seems to be, you may need to call for more advanced measures. Here's how to launch System Restore from a command prompt.
Note: This tip applies to both Windows XP Home and Windows XP Professional.
If your Windows XP system begins acting strange, a typical fix is to use System Restore to remove anysystem changes made since the last time you created a Restore Point. However, what if the problem is sobad that you can't start Windows XP normally--or even start the system in Safe Mode?The good news is you can run System Restore from a command prompt. Here's how:
1. Restart your computer and press [F8] during the initial startup.
2. When you see the Windows Advanced Options Menu, select the Safe Mode With A Command Prompt option.
3. Select the Windows XP operating system.
4. Log on to your computer with an administrator account or with an account that has administrator credentials.
5. Type the following command at a command prompt:

C:\windows\system32\restore\rstrui.exe

When you see the System Restore window, the graphics may look odd, but you can still follow theonscreen instructions to restore your computer to an earlier state.

14 Web sites worth bookmarking on your Treo, PDA, or smartphone

During the times that I have been traveling this spring, I have had several extended periods when my Palm Treo 700p has been my only device connected to the Internet. As a result, I’ve been on the lookout for Web sites that are optimized for mobile phones.
Below is a list of 14 that I found that are worth sharing. I’ve included the URLs in raw form so that you can copy and paste them or simply type them straight into your mobile phone. Keep in mind that mobile URLs tend to change fairly frequently because there is not currently a standard naming convention for these URLs. I’ll try to keep the list updated, but remember that caveat.

1. Google (http://www.google.com/m/products)
2. Yahoo Messenger (http://mm.yahoo.com)
3. News.com (http://m.news.com)
4. CNET Mobile (http://m.cnet.com)
5. Weather.com (http://palm.xhtml.weather.com/xhtml/)
6. Digg (http://mobits.com/digg/)
7. Reuters (http://mobile.reuters.com/)
8. New York Times (http://mobile.nytimes.com/)
9. Business Week (http://pda.businessweek.com/index.html)
10.Dictionary.com (http://dictionary.com/wml/)
11.StreetIQ podcasts (http://m.streetiq.com/)
12.Amazon.com (http://www.amazon.com/gp/aw/h.html)
13.Flickr (http://m.flickr.com/)
14.GameGeeks (http://www.geek.com/gaming/portable/)

Share Word 2003 Documents With Word 2002 And Word 97 Users

Each time you save a Word 2003 document for users still running older versions, you don't need to manually "save down" -- simply set Word to automatically save your documents to a more universal format.

Are you a Word 2003 user, but some of your colleagues are still using Word 2002 or even Word 97? You can share your documents with them as long as you save them in the standard Word document format. By having Word 2003 save your documents in this format, you can disable features not supported by the earlier versions and allow users to open your documents on their PCs.

If you don't want to do this every time you save a document, you can have Word automatically save your new documents in the correct format. Follow these steps:

1. Go to Tools Options.
2. Click the Save tab.
3. Under Default Format, click the drop-down arrow in the Save Word Files As box and select Word 97-2003 Document(*.doc).
4. Click OK.

When you save your Word 2003 document, you will get a dialog box warning that some of the features that you used may not be available in the earlier versions. Click Yes to save it in the standard format that you'll share with the other users.

Sunday, May 27, 2007

How to Delete Undeletable Files in Windows

Many times when trying to remove an unwanted program, especially a piece of adware or spyware, you may run across a file that is undeletable by any normal method. When you try to remove it you'll receive the error message shown below telling you "access denied" and explaining the file may be in use. You may also receive one of the following messages.

Cannot delete file:
Access is denied
There has been a sharing violation.
The source or destination file may be in use.
The file is in use by another program or user.Make sure the disk is not full or write-protected and that the file is not currently in use.

So if the file is in use, how do you delete it?

Manual Method
If you already know the path to the file, please skip to Step 7

1. Click on Start, Search, All Files and Folders
2. Type the name of the undeletable file in the box shown
3. Make sure the Look In box shows the correct drive letter
4. Click Search and let the computer find the file
5. Once the file is located, right-click on it and choose properties, make a note of the file location. Usually this is something similar to:
c:\windows\system32\undeleteablefilesname.exe
6. Close the search box
7. Click on Start, Run, and type CMD and Press Enter to open a Command Prompt window
8. Leave the Command Prompt window open, but proceed to close all other open programs
9. Click on Start, Run and type TASKMGR.EXE and press Enter to start Task Manager
10.Click on the Processes tab, click on the process named Explorer.exe and click on End Process.
11. Minimize Task Manager but leave it open
12. Go back to the Command Prompt window and change to the directory where the file is located. To do
this, use the CD command. You can follow the example below.

Example: to change to the Windows\System32 directory you would enter the following command and Press Enter
cd \windows\system32
13. Now use the DEL command to delete the offending file. Type DEL where is the file you wish to delete.
14. Use ALT-TAB to go back to Task Manager
15. In Task Manager, click File, New Task and enter EXPLORER.EXE to restart the Windows shell
16. Close Task Manager

OR you can download a program in order to delete it

1. Remove on Reboot Shell Extension
This is a nice extension that loads into the right click menu. All you have to do is right-click on a file and choose "Remove on Next Reboot" and the file will be deleted the next time the computer restarts. Although it probably should only be used by more advanced computer users since it may be TOO easy to delete files using this program.

2. Pocket Killbox
A simple .exe file that you can use to delete undeleteable files, although the program will also delete temporary files, edit the HOSTS file, and more. A definite must have program when you are fighting an annoying spyware or adware program that won't remove.

3. Unlocker
Unlocker is another program that runs from the right click menu. Its simple and very effective. The website even has a side by side comparision of other programs that accomplish this task.