To change the product ID Xp/ 2003

To change the product ID

•Log in as the local Administrator
•Click Start > Run > and type in Regedit
•Browse to HKEY_LOCAL_MACHINE\Software\Microsoft\Wi

ndows NT \ CurrentVersion\wpaevents

•In the right pane, right-click OOBETimer, and then click Modify
•Change at least one digit of this value to deactivate Windows
•Click OK and close regedit
•Click Start > Run and type in: "%systemroot%\system32\oobe\msoobe.exe /a"
•Click Yes, I want to telephone a customer service representative to activate Windows, and then click Next

•Click Change Product Key (at the bottom)
•Enter your valid Corporate Product Key
•Press Update and close the window.
•If you are returned to the previous window, click Remind me later
•Restart your computer

Verify the change
•After the workstation restarts, click Start > Run
•Type in: "%systemroot%\system32\oobe\msoobe.exe /a" without the quotes.
•Make sure the dialog box says 'your copy of windows is already activated'

If you performed the above steps incorrectly, or used an invalid key, your system may not be able to boot. Use the F8 key to boot to the last known good configuration and retry with a valid key.

Troubleshooting
If you tried the above steps and nothing happens:
•Make sure you are logged in with the local administrator account, not just an account with Administrator privileges.
•Try replacing the %systemroot% variable with the actual drive letter that your actual directory path, especially when dual booting, or if the system path is on a drive other than C:\
•On a normal Windows XP installation, your systemroot should be C:\windows\ so the command should be C:\Windows\system32\oobe\msoobe.exe /a
•On systems upgraded from Windows NT/2000, the systemroot directory may be C:\Winnt\ so the command should be C:\winnt\system32\oobe\msoobe.exe /a

•Make sure you include a space between .exe and /a in the command:
o Correct - C:\winnt\system32\oobe\msoobe.exe /a
o Incorrect - C:\winnt\system32\oobe\msoobe.exe/a

Add A Photo To MyComputer Properties

STEPS R AS UNDER :

1. Open Notepad

2. Type the following:

[General]
Manufacturer="your_name
[Support Information]
Line1=
http://www.blogger.com
Line2= visit http://dhanabalonline.blogspot.com for more info

3. Save as "oeminfo.ini" in the System32 folder.(Without Quote)

4. Create a bmp file(Your Photo) and save it the System32folder as "oemlogo.bmp"(Without Quote).The size of the image should be within 180 (wide) x120 (high) pixels

5. Now Check your My Computer Properties.

It's tested and working

Admin Password Recovery

  1. Insert Windows CD in your cd-rom and start your computer
  2. Keep your eye on the screen messages for booting to your cd Typically, it will be “Press any key to boot from cd”
  3. Once you get in, the first screen will indicate that Setup is inspecting your system and loading files.
  4. When you get to the Welcome to Setup screen, press ENTER to Setup Windows now
  5. The Licensing Agreement comes next - Press F8 to accept it.
  6. The next screen is the Setup screen which gives you the option to do a Repair.It should read something like “If one of the following Windows XP installations is damaged, Setup can try to repair it”Use the up and down arrow keys to select your XP installation (if you only have one, it should already be selected) and press R to begin the Repair process.
  7. Let the Repair run. Setup will now check your disks and then start copying files which can take several minutes.
  8. Shortly after the Copying Files stage, you will be required to reboot. (this will happen automatically – you will see a progress bar stating “Your computer will reboot in 15 seconds”
  9. During the reboot, do not make the mistake of “pressing any key” to boot from the CD again! Setup will resume automatically with the standard billboard screens and you will notice Installing Windows is highlighted.
  10. Keep your eye on the lower left hand side of the screen and when you see the Installing Devices progress bar, press SHIFT + F10. This is the security hole! A command console will now open up giving you the potential for wide access to your system
  11. At the prompt, type NUSRMGR.CPL and press Enter. Voila! You have just gained graphical access to your User Accounts in the Control Panel.
  12. Now simply pick the account you need to change and remove or change your password as you prefer. If you want to log on without having to enter your new password, you can type control userpasswords2 at the the prompt and choose to log on without being asked for password. After you’ve made your changes close the windows, exit.

Creating a Logon Banner

If you want to create a Logon Banner: A message box to appear below your logon on.

  1. Open RegEdit
  2. Go To
    For Windows 9x and ME -
    HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\ Windows\
    CurrentVersion\ Winlogon

    For Windows 2000 XP 2003 Vista -
    HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\
    Windows\ CurrentVersion\ Winlogon
  3. Create a new String value "LegalNoticeCaption "
  4. Enter the Title of the window. What is displayed in the Title Bar.
  5. Create a new string value "LegalNoticeText"
  6. Enter the text for your message box that will appear even before the Logon window.

Track Your Start And Shutdown Computer Time

This small tip helps you to track your start and shutdown time:

event viewer
  • Right click on My Computer > Manager
  • In Computer Management window, choose tab System Tools > Event Viewer > System. In the right panel, click on Source column to sort rows by Source and find “eventlog” attributes there.
  • First three rows with “eventlog” attribute in source column is the time of start and shutdown your computer: first two rows above are this starting time and the third below is the previous shutdown time.

Morro – A New Free Security software from Microsoft

Microsoft MorroMicrosoft has announced a plan to provide a free security software for users to compete with McAfee and Symantec.


According to this, Microsoft will stop selling the security software for personal computers and will allow users to download a free software to prevent viruses and spyware.

Microsoft intend to call this new security software Morro and it will appear in the first half of 2009, after Microsoft officially stopped providing Windows Live OneCare service to the users.

According to the statistics, Windows Live OneCare service after two years was only 2% in the security market. This is also a sign of Microsoft going down on this area compared with McAfee and Symantec.

Morro will be free to download and it is mainly for home users.

This is the top ten cell phone October 2008:



1. Nokia E71

Nokia E71

2. Nokia E66

Nokia E66

3. Samsung SGH-F480

Samsung SGH-F480

4. iPhone 3G

iPhone 3G

5. Sony Ericsson C902 Cyber-shot

Sony Ericsson C902 Cyber-shot

6. Sony Ericsson W910i Walkman

Sony Ericsson W910i Walkman

7. Nokia 6500 slide

Nokia 6500 slide

8. Nokia 6300

Nokia 6300

9. LG Secret KF750

LG Secret KF750

10. Nokia N85

Nokia N85

Can Not Login Windows Because Of Missing File System – How To Fix This Problem?

When can not login Windows XP because of corrupted or missing file system, many people have to reinstall Windows. This takes time and the data may be lost.

Windows missing  file system

In fact, you can fix this problem without having to reinstall Windows by following steps:

1. First, you must have a disk to installation CD of Windows and boot your computer from this CD.
2. When the Windows Installation Screen appears to welcome to the windows setup, select the line repair a windows xp installation using recovery console, (or you just press R).
3. When the notice asks you which operating system need to restore, you just choose your operating system or if you have only one operating system, just press 1 then enter.
Note: if your Windows has Administrator account has a password, you have to enter your password and then choose OK to continue.
4. Now you types these command to restore missing system files (just in the yellow box):

move to the directory System32 where stores Windows XP system files
move to the directory where stores system config files
rename the file system, which stores your current config of your system files, to system.old
copy the original file system from directory Repair to directory System32 to restore the file system

Then reboot, now you can log in your Windows XP.

Difference between FAT,NTFS & NTFSVersion5

NTFS Version 5 features

Encryption is possible

We can enable Disk Quotas

File compression is possible

Sparse files

Indexing Service

NTFS change journal


In FAT file system we can apply only share level security. File level protection is not possible. In NTFS we can apply both share level as well as file level security

NTFS supports large partition sizes than FAT file systems

NTFS supports long file names than FAT file systems

Difference between 2000 & 2003

Application Server mode is introduced in windows 2003

Possible to configure stub zones in windows 2003 DNS

Volume shadow copy services is introduced

Windows 2003 gives an option to replicate DNS data b/w all DNS servers in forest or All DNS servers in the domain.

Difference between NT & 2000

NT SAM database is a flat database. Where as in windows 2000 active directory is a
hierarchical database.

In Windows NT only PDC is having writable copy of SAM database but the BDC is only read only database. In case of Windows 2000 both DC and ADC is having write copy of the database

Windows NT will not support FAT32 file system. Windows 2000 supports FAT32


Default authentication protocol in NT is NTLM (NT LAN manager). In windows 2000 default authentication protocol is Kerberos V5.

Windows 2000 depends and Integrated with DNS. NT user Netbios names

Active Directory can be backed up easily with System state data

The Difference Between POP3 and IMAP

There are two different protocols available to access e-mail: POP3 and IMAP. POP3 is useful when e-mail is checked from only one computer. IMAP is the better choice when you would like to check your mail from multiple computers, at work and home, for example. IMAP has the added benefit of accessing folders on the server, allowing you to organize your e-mail, and access it from anywhere. If you use Webmail, you should use IMAP on all of your e-mail clients. Use of a POP3 mail client in association with Webmail can cause errors in your inbox that will result in a temporary loss of access to your mail.

The Difference

POP3 works by reviewing the inbox on the mail server, and downloading the new messages to your computer. Clients can access their inboxes. no other folders on the server can be accessed. POP3 only handles retrieval of messages from a client's inbox. When using POP3, your mail is stored on your PC.

IMAP downloads the headers of the new messages on the server, then retrieves the message you want to read when you click on it. IMAP4 can be used to access multiple mailboxes and mailbox folders, and public folders, as well. When using IMAP, the mail is stored on the mail server. Unless you copy a message to a "Local Folder" the messages are never copied to your PC.

Webmail (a.k.a. Outlook Web Access) uses HTTP/HTTPS to provide Web browser-based access to clients' inboxes, their other mail folders and to public folders.

Scenarios of Use

POP3

  • You only check e-mail from one computer.

  • You want to remove your e-mail from the mail server.

IMAP

  • You check e-mail from multiple locations. at work and home

  • You use Webmail.

Tips Keep your Inbox small! This will speed up your e-mail retrieval. Checking the e-mail is directly dependent on how many e-mail messages are in your inbox on the mail server.

POP3

  • Set to remove mail from server after 30 days.

  • Don't check more frequently than every 15 minutes.

  • 75 MB is the maximum for POP3 users. POP'ing large mail boxes consumes excessive server resources.

IMAP

Do NOT check all folders for new messages! This slows your e-mail substantially.

  • Use "mail/" ( without the quotes ) as your IMAP folder directory.

  • You can set your client to download the mail and to remove the mail from the server, like a POP3 client.

  • Organize your mail into folders, and archive your older messages. This speeds e-mail retrieval by minimizing the number of messages in the inbox.

POP3

IMAP

Downloads messages to computer and deletes from server.

Downloads only header of the message. It retrieves the message only if you want to read.

Only inbox is accessible. No other folder on the server can be accessed.

Cab be used to access multiple mail box and mail box folders.

Mail is stored in PC

Mail is stored in server, unless you copy the message to local folder.

Choose if You only check e-mail from one computer


  • Choose if You check e-mail from multiple locations. at work and home


Choose if You want to remove your e-mail from the mail server

Choose if You use Webmail.





Difference between Outlook and Outlook Express

Outlook express E-mail client.

Outlook Express is a POP3- and IMAP-compatible mail client with a built-in newsreader. It is available with Internet explorer for Windows (and is the newsreader in outlook ) Outlook Express is designed for home users who gain access to their e-mail messages by dialing in to an Internet service provider. designed for use with Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), and Internet Mail Access Protocol (IMAP). Supports LDAP, MHTML,HTML, S-MIME & NNTP. full support for HTML mail enables you to personalize your messages with custom backgrounds and graphics. Backup file : .dbx

Choose Outlook Express if You require only Internet e-mail and newsgroup functionality

Outlook.

messaging and collaboration client. it is also a personal information manager. perfect client for business users. Complete integration of e-mail, calendaring, and contact management. With Outlook, you can integrate and manage e-mail from multiple e-mail accounts, personal and group calendars, contacts, and tasks. With exchange server, you can use workgroup information sharing workflow communications, group scheduling, public folders, forms, and enhanced Internet connectivity. Outlook is designed for use with the Internet (SMTP, POP3, and IMAP4), Exchange Server, or any other standards-based communication system that supports Messaging Application Programming Interface (MAPI), including voice mail. Supports, LDAP, MHTML, NNTP, MIME, and S/MIME, vCalendar, vCard, iCalendar, and full support for HTML mail. Backup file : .Pst. supports up to 1 gb of data storage.

Choose Outlook if:

You require advanced Internet standards-based e-mail and discussion group functionality.

integrated personal calendars, group scheduling, task, and contact management.

integrated e-mail and calendaring, cross-platform clients for earlier windows.

robust, integrated run-time and design-time collaboration capabilities

Files Used in the Windows Server 2003 Boot Process

File Location Boot Stage
Ntldr System partition root (CA) Preboot and boot
Boot.ini System partition root Boot
Bootsect.dos System partition root Boot (optional)
Ntdetect.com System partition root Boot
Ntbootdd.sys System partition root Boot (optional
Ntoskrnl.exe systemroot\System32 Kernel load
Hal.dll systemroot\System32 Kernel load
System systemroot\System32\Config Kernel initialization

Pre-boot sequence
Initialization of boot partition
Post – to determine amount of memory and hardware’s
Plug and play - enumeration and configuration of hardware devices
Bios -> locates boot device -> Loads and runs MBR

Boot sequence
Loads NTLDR -> Memory
gathers information about hardware and drivers
This haves four Phases
• Initial Boot Loader: Ntldr-> switches the microprocessor from real mode to
32-bit flat memory mode starts the appropriate
the minifile system drivers
(The minifile system drivers are inbuilt in Ntldr )
so that Ntldr can find and load Windows Server
2003 from partitions

• Operating System Selection: Ntldr reads the Boot.ini file and displays os
start menu. If no boot.ini presents Ntldr loads
Windows Server 2003 from the Windows
folder on the first partition of the first disk,
typically C:\Windows.

• Hardware Detection: Ntdetect.com and Ntoskrnl.exe perform hardware
detection.
Ntdetect.com collects a list of installed hardware
components and returns this list to Ntldr for later
inclusion in the registry under the
HKEY_LOCAL_MACHINE\HARDWARE key.

• Configuration Selection: the operating system loader process displays the
Hardware Profile/Configuration
Recovery Menu screen (if more that one hard
profile exists on the computer, the first
hardware profile is highlighted.)

Kernel Load

Ntoskrnl.exe -> Initialize and loads Windows 2003 kernel and device drivers ->
loads services.
• Loads Ntoskrnl.exe but does not initialize it.
• Loads the hardware abstraction layer file (Hal.dll).
• Loads the HKEY_LOCAL_MACHINE\SYSTEM registry key.
• Selects the control set required to initialize the computer.
• Loads device drivers with a value of 0x0 for the Start entry. These are typically
low-level hardware device drivers, such as those for a hard disk.

Kernel Initialization

the kernel initializes and takes control from Ntldr.
four tasks are performed:
• The Hardware key is created.
• The Clone control set is created.
• Device drivers are loaded and initialized.
• The Session Manager (smss.exe) is initialized.

The Session Manager
reads the
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager
registry key to find and initialize entries under Boot Execute. ( like chkdsk )
sets up the paging file (Pagefile.sys).
Loads winlogon.exe to start the authentication verification process.
winlogon.exe starts -> Local Security Authority Subsystem with their
. Print spooler.
supporting function libraries

Loads Screg.exe (Services Controller) which loads the rest of the devices and
services.
Boot .ini ARC Path conventions

Convention Description
multi(x) | scsi(x) -> Indicates hardware adapter or disk controller.
Scsi(x) -> indicate a SCSI controller on which SCSI BIOS is not enabled.
Multi(X) -> indicates All other hardware adapter or disk controllers
( (x) -> indicates the load order of the hardware adapter.
Disk(y) -> ID. For multi, this value is always (0).
Rdisk(z) -> A number that identifies the disk and starts with (0).
Partition(a) -> A number that identifies the partition. Partition numbers start with (1)


Boot.ini Switches

Switch Description
/basevideo Boots the computer using the standard VGA video driver.
/fastdetect Disables serial mouse detection. Without a port specification, this
Switch disables peripheral detection on all COM ports. By default,
this switch is included in every entry in the Boot.ini file.
/maxmem:n Specifies the amount of RAM that the operating system should use.
/noguiboot Boots the computer without displaying the graphical boot status
screen.
/sos Displays the device driver names as they are loading.

Advanced Boot Options

Safe Mode, loads only basic files and drivers that are required to support the
operating system

Safe Mode With Networking, -> safe mode + the drivers and services required to enable
network access

Safe Mode With Command Prompt -> after safe mode, it displays a command prompt.

• Enable Boot Logging -> logs the loading and initialization of drivers and services in
the ntbtlog.txt file, which is located in the windir folder and
can be used for troubleshooting boot problems.
• Enable VGA Mode -> starts Windows Server 2003 with a basic VGA driver.

• Last Known Good Configuration-> Starts Windows using the registry information that
windows saved after the last successful startup.

( After a logon, the system automatically copies the Clone control set to the
LastKnownGood control set making the current control set the Last Known
Good Configuration )

The Recovery Console
The Recovery Console is a command-line interface that can be used to perform a variety of troubleshooting and recovery tasks on the local computer. These tasks include:
• Starting and stopping services;
• Reading and writing data on a local drive; and
• Formatting hard disks.

Basic disk – can Four primary partition but only one extended partition
Dynamic disk -- five types simple volumes;
> default volume type on a dynamic disk.
> no fault tolerance.

spanned volumes;
> contain disk space from up to 32 physical disks.
> enables to group different disks of the same or different sizes
and access them as a single disk.
> provide 100 percent drive utilization
> No fault tolerance.

striped volumes;
mirrored volumes;
striped volumes with parity disk ( Raid 3 )
striped volumes with parity. ( Raid 5 )

Converting basic -> dynamic no data loss
Dynamic -> basic incurs data loss.

Useful RUN Commads

To Access ----------- Run Command
Accessibility Controls ----------- access.cpl
Add Hardware Wizard ----------- hdwwiz.cpl
Add/Remove Programs ----------- appwiz.cpl
Administrative Tools ----------- control admintools
Automatic Updates ----------- wuaucpl.cpl
Bluetooth Transfer Wizard----------- fsquirt
Calculator ----------- calc
Certificate Manager ----------- certmgr.msc
Character Map ----------- charmap
Check Disk Utility ----------- chkdsk
Clipboard Viewer ----------- clipbrd
Command Prompt ----------- cmd
Component Services ----------- dcomcnfg
Computer Management----------- compmgmt.msc
Date and Time Properties ----------- timedate.cpl
DDE Shares----------- ddeshare
Device Manager----------- devmgmt.msc
Direct X Control Panel (If Installed)*-----------directx.cpl
Direct X Troubleshooter-----------dxdiag
Disk Cleanup Utility ----------- cleanmgr
Disk Defragment ----------- dfrg.msc
Disk Management ----------- diskmgmt.msc
Disk Partition Manager ----------- diskpart
Display Properties ----------- control desktop
Display Properties ----------- desk.cpl
Display Properties (w/Appearance Tab Preselected) -----------control color
Dr. Watson System Troubleshooting Utility-----------drwtsn32
Driver Verifier Utility ----------- verifier
Event Viewer -----------eventvwr.msc
File Signature Verification Tool----------- sigverif
Findfast-----------findfast.cpl
Folders Properties-----------control folders
Fonts-----------control fonts
Fonts Folder-----------fonts
Free Cell Card Game-----------freecell
Game Controllers -----------joy.cpl
Group Policy Editor (XP Prof)-----------gpedit.msc
Hearts Card Game-----------mshearts
Iexpress Wizard-----------iexpress
Indexing Service-----------ciadv.msc
Internet Properties-----------inetcpl.cpl
IP Configuration (Display Connection Configuration)-----------ipconfig /all
IP Configuration (Display DNS Cache Contents)-----------ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents)-----------ipconfig /flushdns
IP Configuration (Release All Connections)-----------ipconfig /release
IP Configuration (Renew All Connections)-----------ipconfig /renew
IP Configuration (Refreshes DHCP & Re-Registers DNS)-----------ipconfig /registerdns
IP Configuration (Display DHCP Class ID)-----------ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID)-----------ipconfig /setclassid
Java Control Panel (If Installed)----------- jpicpl32.cpl
Java Control Panel (If Installed)----------- javaws
Keyboard Properties----------- control keyboard
Local Security Settings-----------secpol.msc
Local Users and Groups-----------lusrmgr.msc
Logs You Out Of Windows-----------logoff
Microsoft Chat-----------winchat
Minesweeper Game-----------winmine
Mouse Properties-----------control mouse
Mouse Properties-----------main.cpl
Network Connections-----------control netconnections
Network Connections----------- ncpa.cpl
Network Setup Wizard-----------netsetup.cpl
Notepad-----------notepad
Nview Desktop Manager (If Installed)-----------nvtuicpl.cpl
Object Packager-----------packager
ODBC Data Source Administrator-----------odbccp32.cpl
On Screen Keyboard-----------osk
Opens AC3 Filter (If Installed)-----------ac3filter.cpl
Password Properties-----------password.cpl
Performance Monitor-----------perfmon.msc
Performance Monitor----------- perfmon
Phone and Modem Options -----------telephon.cpl
Power Configuration ----------- powercfg.cpl
Printers and Faxes-----------control printers
Printers Folder-----------printers
Private Character Editor-----------eudcedit
Quicktime (If Installed)-----------QuickTime.cpl
Regional Settings -----------intl.cpl
Registry Editor-----------regedit
Registry Editor-----------regedit32
Remote Desktop-----------mstsc
Removable Storage-----------ntmsmgr.msc
Removable Storage Operator Requests-----------ntmsoprq.msc
Resultant Set of Policy (XP Prof)----------- rsop.msc
Scanners and Cameras-----------sticpl.cpl
Scheduled Tasks-----------control schedtasks
Security Center-----------wscui.cpl
Services-----------services.msc
Shared Folders-----------fsmgmt.msc
Shuts Down Windows-----------shutdown
Sounds and Audio -----------mmsys.cpl
Spider Solitare Card Game-----------spider
SQL Client Configuration-----------cliconfg
System Configuration Editor-----------sysedit
System Configuration Utility-----------msconfig
System File Checker Utility (Scan Immediately)-----------sfc /scannow
System File Checker Utility (Scan Once At Next Boot)-----------sfc /scanonce
System File Checker Utility (Scan On Every Boot)-----------sfc /scanboot
System File Checker Utility (Return to Default Setting)-----------sfc /revert
System File Checker Utility (Purge File Cache)-----------sfc /purgecache
System File Checker Utility (Set Cache Size to size x)-----------sfc /cachesize=x
System Properties -----------sysdm.cpl
Task Manager-----------taskmgr
Telnet Client-----------telnet
User Account Management-----------nusrmgr.cpl
Utility Manager-----------utilman
Windows Firewall-----------firewall.cpl
Windows Magnifier-----------magnify
Windows Management Infrastructure-----------wmimgmt.msc
Windows System Security Tool-----------syskey
Windows Update Launches-----------wupdmgr
Windows XP Tour Wizard-----------tourstart
Wordpad-----------write

Improve Windows-XP Shutdown Speed

This tweak reduces the time Windows-XP waits before automatically closing any running programs when you give it the command to shutdown.

Follow the steps as given below-

1) Go to Start then select Run

2) Type 'Regedit' and click ok

3) Find 'HKEY_CURRENT_USER\Control Panel\Desktop\'

4) Select 'WaitToKillAppTimeout'

5) Right click and select 'Modify'

6) Change the value to '1000'

7) Click 'OK'

8) Now select 'HungAppTimeout'

9) Right click and select 'Modify'

10) Change the value to '1000'

11) Click 'OK'

Display the hidden settings of Nokia mobiles

The secret codes of nokia mobile phones and will work on most of the latest nokia mobile sets. You can display the hidden information of mobile sets and troubleshoot the routine problems using these codes.

Follow the list of latest nokia codes list:

Code Action

*#7780# To restore the factory settings of mobile set

*#3283# To verify the set Manufacturing date

*#746025625# To stop the sim clock

*#67705646# Use to delete the operator logo

*#73# Use to reset game scores and phone timers

*#0000# Use to display the mobile software version

*#06# To display the IMEI Number of the mobile

*#92702689# To display the mobile warranty related settings (Serial no, Made,

Purchasing date, Repaired date, Life time)

Display the hidden settings of Samsung mobile phones

These codes may be not applied to all old models of Samsung mobile, but you can try to all latest Samsung mobiles. You can display the hidden information of mobile sets and troubleshoot the routine problems using these codes.

Follow the list of latest Samsung codes list:

Code Action

*#9999# Use to display the mobile software version

#*3849# Use to reboot the Samsung handsets

*#06# To display the IMEI Number of the mobile

#*2558# To on/off the mobile time

#*7337# Use to unlock the latest Samsung set

#*4760# Use to activate and deactivate the GSM features

*#9998*246# To verify the memory and battery information

*#7465625# To verify the Lock status of mobile

*#0001# To display the Serial Number of the mobile

*2767*637# Use to unlock the mobile code

*#8999*636# To display the storage capacity of the mobile

#*2562# Use to reboot the Samsung handsets

Display the hidden settings of Motorola handsets

These codes may be not applied to all models Motorola handsets, but you can try to configure all latest Samsung mobiles. You can display the hidden information of mobile sets and troubleshoot the routine problems using these codes.

Follow the list of latest Motorola mobile secret list:



Code Action

*7 Use to lock/unlock the mobile keys

19980722 Work as "Master key" to unlock the Motorola sets

*#06# To display the IMEI Number of the mobile

*#403# Press keys to get information about mobile manufacturing

*#301# Use to test the functions of the keys

*#303# Use to reset default language to English

*#300# Use to display the mobile software/hardware version

*#311 Use to reset the default code of mobile

*#402# Use to regulate the mobile display strength/intensity

*#304# Press keys to OFF the engineering mode

*#304*19980722# Press keys to ON the engineering mode

*#0000# Use to reset Motorola mobile default language

1234 Default Motorola mobile code

32*279*1*0*8 Use to verify the mobile model

#PROGRAM# Use to change the default banner of mobile

##33284 Use to run mobile in Debug mode

#02#* Use to display the mobile software version

*#42253646633#
Use to enable COM port

*#987*99#
Use to restore the Motorola factory settings

#32# Reset the mobile timers

###119#1# Use to make active the EFR mode for mobile
###119#0# Use to make deactivate the EFR mode for mobile

Increase the Browsing and Downloading speed in Windows Vista

With windows Vista you have noticed the slow internet speed. The web browsing and downloading speed is very slow as compare to previous versions of windows. You can open the same sites in windows XP and server 2003 with the normal speed.

Follow the given steps to increase the Vista browsing speed:

First go to Advance tab in Internet Explorer and turn off the TLS (Transport Layer Security) encryption option. Here to fix problem with some secure pages turn on the SSL 2.0 (Secure Sockets Layer) feature and click Ok button to close it.

Follow the major fix for this problem:

In windows Vista, the TCP autotuning feature is enabled by default. Some web servers do not respond properly to this feature, so it appears that some sites open with very slow speed.

To use this feature, you will need to be logged into your computer with administrative rights.

First click on Start button and type CMD in Run option then press Enter.

At Command Prompt, type the following command and press enter.

netsh interface tcp set global autotuninglevel= disabled

This command will disable the TCP autotuning feature. Now close the command Prompt and restart your computer after any changes to go into effect.

You can easily restore these setting by typing the following command at Command Prompt.

netsh interface tcp set global autotuninglevel= normal

Now close the command Prompt and again restart your computer after any changes to go into effect.

Increasing The Life Of Hard Disk

Taking care of your hard disk is important because this is the place where all the data is stored and once the hard disk crashes, data in most cases is not recoverable. There are data recovery softwares and programs which recover data from crashed hard disks but that is not for normal computer users.

But why do hard disks crash and what can be done to prevent them from crashing?. At the same time how can a hard disk be made more efficient? Here are the answers.

Hard disks crash due to many reasons. Voltage fluctuations, physical impact, improper alignment and of course mechanical failure due to wear and tear of internal parts. Let us start one by one and get the answers to the above problems.

1. Voltage fluctuations or spikes as they are called can be prevented by using voltage stabilizers or spike guards. This will limit the damage to the hard disk to a great extent.2. Physical impact can be prevented by handling the hard disk carefully when installing/ re-installing. When installing the hard disk care should be taken to see that it sits perfectly horizontal and that it does not vibrate or shake once the computer is started.3. The natural wear and tear of parts can be limited by defragmenting your hard disk from time to time.But what is defragmentation?

All newly created files are stored in various places on the hard disk in a single cluster ( contiguous file ). But, as the number of files and programs increase, these files are not stored as one contiguous file but broken down and scattered in various places on the hard disk. In short files get fragmented. When these files are accessed by the user, the head on the hard disk moves to and fro to locate these fragments. These fragmented files puts lot of mechanical pressure on the internal parts of the hard disk. This leads to crashes.

To start disk defragmenter from the start menu, click the start button and follow this path (All Programs / Accessories / System Tools / Disk Defragmenter). A minimum of 15 percent free space on your disk is needed for disk defragmenter to run. The disk can also be defragmented automatically by using schedule task. This program can can be accessed via system tools.

4. Power management tool can also be used to enhance the life of hard disk. To access this program go to start / control panel / power options and set the parameters for various hardware devices.

5. Disk cleanup increases the efficiency of the hard disk. So delete unwanted files and programs regularly.

Follow the above rules to increase the life of you hard disk.

Know to Recover the corrupted files from Microsoft Excel

There is no need to use any third party software to manage these types of corrupted files, because Microsoft provides the built-in support in Excel to deal with these types of files in better ways. You can use the SYLK (Symbolic Link) format to restore the corrupted files in previous state.

First click on Start button, go to Program then click on Microsoft Excel to run the excel page.


Now go to File menu and click on Open option to open the corrupted file.

Now again go to File menu and click on Save As option to save the file as type SYLK. Click on Save button to continue.

There is no need to use any third party software to manage these types of corrupted files, because Microsoft provides the built-in support in Excel to deal with these types of files in better ways. You can use the SYLK (Symbolic Link) format to restore the corrupted files in previous state.

First click on Start button, go to Program then click on Microsoft Excel to run the excel page.


Now go to File menu and click on Open option to open the corrupted file.

Now again go to File menu and click on Save As option to save the file as type SYLK. Click on Save button to continue.


Here if you want to recover the multiple sheets then save each sheet separately as type SYLK.


Click on Yes button when you receive the message "Book2.slk may contain features that are not compatible with SYLK (Symbolic Link). Do you want to keep the workbook in this format?"

.

Now close the all opened excel files then again go to File menu and click on Open option to open the .slk type file that you saved in previous step.

Now again go to File menu and click on Save As option to save the file as type Microsoft Excel Workbook. Click on Save button to finish the process.

Here if you want to recover the multiple sheets then save each sheet separately as type SYLK.


Click on Yes button when you receive the message "Book2.slk may contain features that are not compatible with SYLK (Symbolic Link). Do you want to keep the workbook in this format?"

.

Now close the all opened excel files then again go to File menu and click on Open option to open the .slk type file that you saved in previous step.

Now again go to File menu and click on Save As option to save the file as type Microsoft Excel Workbook. Click on Save button to finish the process.

Common symptoms of viruses

  • Occurrence of strange messages, symbols or images appear on your screen.
  • Strange things happen when you are doing routine work.
  • The computer makes strange noises at inappropriate times.
  • Files you know you saved are missing.
  • The operating system acts slow, doesn't come on or just isn't working as normal.
  • Files of executable extension such as .BAT, .EXE, .COM, .HLP, .DLL should never be accepted from others as they have the most potential to cause problems or be infected.
  • All computer users should delete any unsolicited emails. We now know due to recent attacks that the Worms have begun to use Microsoft Outlook's address book, so it will appear as if a friend has sent you an email. If you are not expecting an email or the file name is different from the one you are expecting, delete the email and its attachment.
    Electronic Mail text messages cannot in themselves contain viruses. The text portion of a message is just text, and if read, does not contain damaging system codes. If, however, you receive an email message with an attachment, be very careful. File attachments, if executed, CAN launch viruses

Trouble shooting a Printer in General

  • Make sure the printer has power and is on-line. If you are using a manual printer sharing device, make sure the switch is set to activate the correct printer.
  • Turn it off and on again to reinitialize any internal settings that may have gone astray.
  • Ensure that the tape that seals the cartridge ink port is removed prior to installing the cartridge.
  • Use the printer's own self-test, according to the manufacturer's recommendation. If it fails, you have verified that the problem is within the printer. If the print head is not moving at all, the transport motor may have failed.
  • If the printer that you are using is not set as the default printer in Windows or the printer driver is not installed, the printer may print garbled characters. You may also receive errors when you attempt to print from applications.
  • If the printer passes the self-test, try a test print using the Print Screen capability within DOS. If the Print Screen fails, you know the problem is in the relationship between the printer and the computer. Inspect the cable and the cable connections. Replacing the cable with a known good cable is worth trying since cables are so frequently the source of printer problems. Cables can fail with broken wires, loose or broken pins, or incorrect pin-outs.
  • If the printer is connected to the computer through an add-in device, remove the add-in device and connect the parallel cable to the printer and then directly to the port on the back of the computer. Some examples of add-in devices are: switchboxes, parallel port scanners, external disk drives, external tape drives, security lock keys, or external CD-ROM drives. Some add-in devices may interfere with proper communications with the printer. Try printing again. If the printer prints successfully, the cable may not have been connected properly, or the add-in device may have been interrupting communication with the printer.
  • If the combined length of the cables connecting the add-in device and the printer exceeds 10 feet, communication can also be disrupted. In addition, the software that controls some add-in devices may take control of the printer port interfering with any other device attempting to use the same port. In some cases, the software for the add-in device should be disabled or uninstalled. Remove any add-in devices and uninstall the software for those devices, then try printing again.
  • The message "out of paper" is sometimes erroneously reported when there is plenty of paper, and can indicate a physical problem with the printer.
  • If the printer port is not properly identified in CMOS, the printer may not function properly and you may receive errors when trying to print. Check your User’s Guide on how to enter CMOS. Once in the Setup utility, locate the LPT1 settings. The address setting for the LPT1 port should be 3BCh or 378h depending on what kind of video card you have. The IRQ setting for the port should be 7 and LPT1 should be enabled in order for the printer to print correctly.
  • If the Print Screen succeeds, the problem may be with your application or its configuration. For example, your application may be set up to direct output to a file instead of the printer, or you might be directing the output to the wrong communications port.
  • Try connecting a different printer to this computer or try connecting the printer to a different computer and print a test page. If this printer works when connected to another computer, there may be a problem with the port on your PC. If this printer does not work when connected to another computer, there may be a physical problem with the printer.

Know your Computer's BIOS & itsBeep Codes

When a computer is turned on, it goes through what is called a POST (power-on self test) routine. This is a short diagnostic procedure incorporated into the boot sequence by the BIOS manufacture for troubleshooting purposes.

Many times when there is an error in your boot sequence you will receive an on-screen error message. This error was printed by the video card. But, in some cases, the error is detected early in the boot process and the error cannot be received by the video card. The problem may even be caused by the video card or the monitor. This is why the need for beep codes came to be.

Below, you will find some common codes listed by manufacturer.

AMI (American Megatrends') BIOS

Beep Codes

Message

one short DRAM refresh failure (Problem with memory)
two short Parity circuit failure
three short Base 64K RAM failure
four short System Timer failure
five short Processor failure
six short Keyboard Controller / Gate A20 failure
seven short Virtual Mode Exception error
eight short Display Memory Read/Write failure (fault with video card)
nine short ROM BIOS Checksum error (fault with BIOS chip)
ten short CMOS Shutdown Read/Write error
eleven short Cache memory
one long Passed (no errors)
one long, two short Video failure
one long, three short Base / Extended Memory failure
one long, eight short Display / Retrace Test failure

AST Research BIOS

Beep Codes

Message

one short Low level processor verification test failed (POST 1)
two short Clearing keyboard controller buffers failed (POST 2)
three short Keyboard controller reset failed (POST 3)
four short Low level keyboard controller interface test (POST 4)
five short Reading data from keyboard controller failed (POST 5)
six short System board support chip initialization failed (POST 6)
seven short Processor register read/write verify test failed (POST 7)
eight short CMOS timer initialization failed (POST 8)
nine short ROM BIOS checksum test failed (POST 9)
ten short Initialize primary video (POST 10)
eleven short 8254 timer channel 0 test failed (POST 11)
twelve short 8254 timer channel 1 test failed (POST 12)
thirteen short 8254 timer channel 2 test failed (POST 13)
fourteen short CMOS power-on and time test failed (POST 14)
fifteen short CMOS shutdown byte test failed (POST 15)
one long DMA channel 0 test failed (POST 16)
one long, one short DMA channel 1 test failed (POST 17)
one long, two short DMA page register test failed (POST 18)
one long, three short Keyboard controller interface test failed (POST 19)
one long, four short Memory refresh toggle test failed (POST 20)
one long, five short First 64 KB memory test failed (POST 21)
one long, six short Setup interrupt vector table failed (POST 22)
one long, seven short Video initialization failed (POST 23)
one long, eight short Video memory test failed (POST 24)

Award BIOS

Beep Codes

Message

one short Passed (no errors)
two short Any non-fatal error
one long, two short Video failure
one long, three short Keyboard Controller failure (applies to 286, 386 and 486)

Compaq BIOS

Beep Codes

Message

one short Indicates that the system is booting properly
two short General BIOS error - remedy unknown
one short, two long Memory Module
one long, one short BIOS ROM checksum error
one long, two short Video error
7 Beeps: one long, one short, one long, one short, pause, one long, two short AGP Video
one long continuous tone Memory Module

IBM BIOS

Beep Codes

Message

none Power Supply or System Board failure (possible short)
one short Passed (no errors)
one short (blank screen) Video error (check cable)
one short (no boot) Floppy Drive error
two short Configuration Error (displayed on screen)
repeating short Power Supply or System Board failure
continuous Power Supply or System Board / Keyboard stuck
one long, one short System Board failure
one long, two short Video (Mono/CGA) failure (check cable)
one long, three short Video (EGA) failure (check cable)
three long Keyboard Card error

Mylex BIOS

Beep Codes

Message

one Normal boot
two Video adapter error
three Keyboard controller error
four Keyboard error
five PIC 0 error
six PIC 1 error
seven DMA page register error
eight RAM refresh error
nine RAM data error
ten RAM parity error
eleven DMA controller 0 error
twelve CMOS RAM error
thirteen DMA controller 1 error
fourteen CMOS RAM battery error
fifteen CMOS RAM checksum error
sixteen BIOS ROM checksum error

Mylex 386 BIOS

Beep Codes

Message

one long Normal boot
two long Video adapter error
one long, one short, one long Keyboard controller error
one long, two short, one long Keyboard error
one long, three short, one long PIC 0 error
one long four short, one long PIC 1 error
one long, five short, one long DMA page register error
one long, six short, one long RAM refresh error
one long, seven short, one long RAM data error
one long, eight short, one long RAM parity error
one long, nine short, one long DMA controller 0 error
one long, ten short, one long CMOS RAM error
one long, eleven short, one long DMA controller 1 error
one long, twelve short, one long CMOS RAM battery error
one long, thirteen short, one long CMOS RAM checksum error
one long fourteen short, one long BIOS ROM checksum error

Phoenix BIOS

Beep Codes

Message

one, one, three CMOS Read/Write
one, one, four ROM BIOS Checksum failure
one, two, one Programmable Interval Timer failure
one, two, two DMA Initialisation failure
one, two, three DMA Page Register Read/Write failure
one, three, one RAM Refresh Verification error
one, three, three First 64K RAM Chip/Data Line failure
one, three, four First 64K RAM Odd/Even Logic
one, four, one First 64K RAM: Address Line
one, four, two First 64K RAM: Parity failure
one, four, three Fail-Safe Timer Feature (EISA only)
one, four, four Software NMI Port failure (EISA only)
two (followed by various combinations) First 64K RAM Chip/Data Line failure (combinations indicate which bit)
three, one, one Slave DMA Register failure
three, one, two Master DMA Register failure
three, one, three Master Interrupt Mask Register failure
three, one, four Slave Interrupt Mask Register failure
three, two, four Keyboard Controller failure
three, three, four Display Memory failure
three, four, one Display Retrace failure
three, four, two Video ROM search proceeding
four, two, one Timer Tick failure
four, two, two Shutdown failure
four, two, three Gate A20 failure
four, two, four Unexpected Interrupt in Protected Mode
four, three, one RAM test above 64K failure
four, three, two/three Programmable Interval Timer, Channel 2 failure
four, three, four Realtime Clock failure
four, four, one Serial Port error
four, four, two Parallel Port error
four, four, three Math Co-processor failure
(tone) one, one, two System Board Select
(tone) one, one, three Extender CMOS RAM

Quadtel BIOS

Beep Codes

Message

one short Indicates that the system is booting properly
two short CMOS IC error
one long, two short Video error
one long, three short Peripheral controller error