Username: Save?
Password:
Home Forum Links Search Login Register
    News: Welcome to the TechnoWorldInc! Community!
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
  Show Posts
Pages: 1 ... 16 17 18 19 20 [21] 22 23 24 25 26 27
281  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Internet / Disposable Email addresses on: October 14, 2006, 01:58:16 PM
Disposable Email addresses

Disposable Email addresses
Simple, most websites ask an email address for some sort of registration,but not all websites are authentic and they may sell your email addresses to spammers.To protect your email address from such spammers, use disposable email addresses and destruct the ID after some time.Create a disposable ID , and the mails sent to that ID will be automatically forwarded to your inbox until that ID is destructed.You have the option to destruct that ID at anytime.
The list given below points to the best of such services on the NET and of course they are all free and simple.
If any doubts, PM me.

[ I have tried spamgourmet.com and mailinator.com]



------------------------------------------------------------------------------------------------------------
1) ZoEmail
ZoEmail restores email as it must have been before spam. Easily accessible via the web and POP, ZoEmail lacks IMAP access, however, and could offer more online storage. The spam-free existence of ZoEmail also comes at the price of a bit of management.

2) Emailias
Create disposable email addresses for use on the Web with Emailias, a flexible and feature-packed disposable email address service, and reduce the amount of spam you get.

3) Spamex
Spamex provides a solid, useful, and almost feature-complete disposable email address service.

4) Spamgourmet
Before you choke on all that spam, try the feature-rich and flexible disposable email addresses from Spamgourmet for protection.

5) E4ward.com
E4ward.com is a down-to-earth and very useful disposable email service that makes it easy to prevent spam to your real email address with easily erasable aliases. You can use your own domain with E4ward.com, but address masking in your replies is a bit cumbersome and auto-expiring aliases are not offered.

6) Mailinator
Mailinator lets you use any email address @mailinator.com and pick up the mail at their site. Since there's no connection to your real address, you sure won't get spam from using Mailinator addresses.

7) Jetable.org Disposable Email
Jetable.org provides easy to use disposable email addresses that auto-expire after a certain time. Useful when you need an address just once, it's not an all-around disposable email solution.

GishPuppy
GishPuppy is a disposable email address service that shines with simplicity and functionality. Unfortunately, GishPuppy's functionality does not encompass replacing your real email address with the appropriate alias in replies.

9) Yahoo! Mail
Yahoo! Mail is a comfortable, reliable and secure email service with a reasonable amount of storage. A pretty good spam filter (including disposable email addresses,but only for PREMIUM accounts) keeps the junk out.

10) Sneakemail
Sneakemail is a nice and useful disposable email address service.
282  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Internet / Virtual Private Networks on: October 14, 2006, 01:57:08 PM
Virtual Private Networks

      The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need: A way to maintain fast, secure and reliable communications wherever their offices are.

Until fairly recently, this has meant the use of leased lines to maintain a wide area network (WAN). Leased lines, ranging from ISDN (integrated services digital network, 128 Kbps) to OC3 (Optical Carrier-3, 155 Mbps) fiber, provided a company with a way to expand its private network beyond its immediate geographic area. A WAN had obvious advantages over a public network like the Internet when it came to reliability, performance and security. But maintaining a WAN, particularly when using leased lines, can become quite expensive and often rises in cost as the distance between the offices increases.

As the popularity of the Internet grew, businesses turned to it as a means of extending their own networks. First came intranets, which are password-protected sites designed for use only by company employees. Now, many companies are creating their own VPN (virtual private network) to accommodate the needs of remote employees and distant offices.


Image courtesy Cisco Systems, Inc.
A typical VPN might have a main LAN at the corporate headquarters of a company, other LANs at remote offices or facilities and individual users connecting from out in the field.


Basically, a VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee.

 A well-designed VPN can greatly benefit a company. For example, it can:

Extend geographic connectivity
Improve security
Reduce operational costs versus traditional WAN
Reduce transit time and transportation costs for remote users
Improve productivity
Simplify network topology
Provide global networking opportunities
Provide telecommuter support
Provide broadband networking compatibility
Provide faster ROI (return on investment) than traditional WAN

What features are needed in a well-designed VPN? It should incorporate:

Security
Reliability
Scalability
Network management
Policy management
283  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Windows / How to get screen shot of desktop on: October 14, 2006, 01:54:36 PM
Hi !

1. "Print Screen" (key on your key board)
if you press that key, it will capture the contents on the screen as image.

2. Open Paint (Start->Programs-> Accessories->Paint)
Paste or Ctrl+V.
Save the file.

Thats it !!!
284  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Windows / How To Take Screen Shot In WMP ? on: October 14, 2006, 01:53:36 PM
Only For Window Media Player

Since many people dont really know how to take a screen shot on Window Media Player ..... many people do this . They play the video and click the botton that say "Print Screen" they go to paint and they paste it ... but watch it wont work cauz if u wanna move it or cut it , it will see the whole thing Black .... because the window media player stay the same position when u click Print Screen and paste on paint ... it will stay exact position .... but when u move it . it stay ...... so i found a solution how to take screen shot on WMP ( Window Media Player )

Here are the step

You go to TOOLS > OPTIONS > PERFORMANCE > then in the bottom panel entitled 'Video Acceleration' drag the indicator to the far left so it is under 'None' > APPLY . ( while u do this play the movie and the bar it move but u arent able to move the bar back and from... ok now Click Paint Screen Go to Paint , Click on the top of paint click Edit > Paste and u will see the screen .. use the square box u see on the left side of the tool that is next to the stars box click the quare ..... click ur mouse and move it ... and go to edit and cut and click file and then new and paste the picture u had cut with the square box Click on save as and

And you are done !!!!

But Remember !

Remember to return the video acceleration back to full after taking ur shots so ur player will be back to its default settings ( Which mean the first step u did on performance and put it default which mean pull the bard to full )

Tutorial By lllAE86lll Aka Tsuchisaka put the whole though there so u guys get it

Hope u understand this tutorial of how to take a screen shot Hope Moderator pin this thread since it took me 15 minute to write this whole tut

Enjoy taking in picture with Window Media Player without having problem

Also sorry for my poor English .... is terrible i know ;(

Any problem u have post here i will try to help u out .... i am here to serve

also some WMP file can take screen shot by pressing CTRL + I .
285  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Techno News / Windows Vienna to follow Vista on: October 14, 2006, 01:41:52 PM
Windows Vienna to follow Vista
_________________________

That's right folks. Windows Vienna is the new codename for Windows Blackcomb the successor to Windows Vista.

Not much is known about Blackcomb officially and Microsoft is not ready to talk about it yet. However, Microsoft's blogging guru, Robert Scoble confirmed in a thread reply to a channel 9 video, "since this video was shot the codename for Blackcomb has indeed changed to Vienna. I haven't gotten the story on this yet, though."

While Windows Vista is intended to be a technologies-based release, with some UI changes (in the form of the Aero set of technologies and guidelines), Vienna is targeted directly at revolutionizing the way we interact with our home and office PCs.

For instance, the "Start" philosophy, introduced in Windows 95, may be completely replaced by a "new interface" which was said in 1999 to be scheduled for Blackcomb, before being moved to the Longhorn project, and then back to Blackcomb. The interface involved some ideas based upon truely 3D Windows and an intergration of what is now known as Sidebar.

The Explorer shell is expected to be replaced in its entirety, with features such as the taskbar being replaced by a new concept based on the last 10 years of research from Microsoft's "Vibe" lab. Projects such as GroupBar and LayoutBar are expected to make an appearance, allowing users to more effectively manage and keep track of their applications and documents while in use, and a new way of launching applications is expected - among other ideas, Microsoft is investigating a pie menu-type circular interface, similar in function to Apple's dock feature.

All features are speculation and rumour at this point. However, with Vista arriving so late (5 years after Windows XP) - will Vista sell to the masses just as many enterprise customers have moved to XP and many home users are comfortable with XP. Time will tell.
_____________________________________________________________________________________________________

News Source : http://www.neowin.net/
286  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Techno News / FAQ: When Google is not your friend on: October 14, 2006, 01:39:12 PM
FAQ: When Google is not your friend
______________________________

Google's recent legal spat with the U.S. Department of Justice highlights not only what information search engines record about us but also the shortcomings in a federal law that's supposed to protect online privacy.
It's only a matter of time before other attorneys realize that a person's entire search history is available for the asking, and the subpoenas begin to fly. This could happen in civil lawsuits or criminal prosecutions.

That type of fishing expedition is not legally permitted for Web mail providers. But because search engines are not fully shielded by the 1986 Electronic Communications Privacy Act--concocted back in the era of CompuServe and bulletin board systems--their users don't enjoy the same level of privacy.

"Back then, providers were very different animals than they are now," says Paul Ohm, a former Justice Department attorney who teaches computer crime law at the University of Colorado at Boulder.
Two solutions are simple to describe, but not likely to happen. First, search engines could voluntarily--or be required by law to--delete search histories after a few months unless the customer objects. Second, federal law could be amended to make it clear that search engines, which serve as a window to the Internet, are fully protected.

CNET News.com has surveyed Google, Microsoft, Yahoo and AOL to find out their privacy practices, and assembled these answers to frequently asked questions.

Q: Does Google collect and record people's search terms whether they're logged in or not?
Yes. Google confirmed this week that it keeps and collates these results, which means the company can be forced to divulge them under court order. Whether Google does anything else with them is another issue.

Given the Department of Justice's recent subpoena to Google, it's likely the police or even lawyers in civil cases--divorce attorneys, employers in severance disputes--eventually will demand that Google, Microsoft, Yahoo, AOL, and other search engines cough up users' search histories.

Q: Has this happened before?
Almost. A North Carolina man was found guilty of murder in November in part because he Googled the words "neck," "snap," "break" and "hold" before his wife was killed. But those search terms were found on Robert Petrick's computer, not obtained from Google directly.

Also, attorneys have already begun introducing searches conducted on Google, Yahoo and AltaVista as evidence.

Q: When I use search engines, I type in a lot of search terms I consider private. What does this mean?
We go into all the details below. But the short answer is that when private companies collect reams of data all the time on nearly every American, and the government and curious attorneys can get to that with few obstacles, this becomes a problem. Search engines provide a look into people's personal lives, and privacy awareness has not kept pace.

Q: Aren't there any privacy laws that protect us?
Not really. There is a federal law called the Electronic Communications Privacy Act. But it was enacted in 1986, long before politicians knew about the Internet, and the wording doesn't prevent police and attorneys from targeting search engines.

Politicians wrote that law in a way that is technology-specific--one key part revolves around the meaning of the pre-Internet term "processing services"--instead of adopting a more flexible approach that would grow with technology. Some states may have laws that are more applicable.

Q: Why does Google store that information about me, anyway?
No law requires Google to delete it, and there are some business justifications for keeping it.

For instance, keeping detailed records can help in identifying click fraud (faking clicks on Web ads to drive up a rival's cost), and in optimizing search results for different geographic areas. Compiling a user profile can aid in tailoring search results in products like Google Personalized Search. Also, disk storage is cheap, and engineers tend to prefer to keep data rather than delete it.
____________________________________________________________________________________________________________________

News Source : http://news.com.com/FAQ+When+Google+is+not+your+friend/2100-1025_3-6034666.html?tag=nefd.top
287  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Yahoo! / How to Recover your Yahoo Password on: October 14, 2006, 01:37:35 PM
If you lose your Yahoo email password, there are three basic methods for you to regain access to your Yahoo email account:

•Reset your Yahoo email password online
•Recover your Yahoo email password from your web browser
•Recover your stored Yahoo email password from the Windows Registry

Reset your Yahoo Email Password

The easiest way to recover a Yahoo email password is to go the the Yahoo! Sign-in Problems page. To use this page, first enter your Date of Birth, Zip Code, and Country to verify your identity. Next, enter your Yahoo Email ID and Yahoo will email your Yahoo password to the e-mail account associated with it. If you can not remember your Yahoo ID, enter the email address you used when you signed up for your Yahoo email account and Yahoo will send your Yahoo ID to that email account. If you no longer have access to the other email account associated with your Yahoo ID, Yahoo will refuse to assist you.

Recover your Yahoo Email Password from your Web Browser

Most Yahoo users allow their web browsers to store their Yahoo password. Every different web browser stores the Yahoo password in a different manner. The method for recovering these stored passwords is different for each web browser.

How Internet Explorer password recovery work?

Internet Explorer stores usernames and passwords for web sites which you have logged in to.
Internet Explorer stores these usernames and passwords in what is called Microsoft Protected Storage.
Password storage is configured in Internet Explorer under <Tools>, <Internet Options>, <Content>, <AutoComplete>:
 
Viewing Microsoft Protected Storage
Microsoft Protected Storage stores the usernames and passwords in a set of registry keys.
Several programs, with widely varying capabilities, are available to help you view Microsoft Protected Storage:
•   Protected Storage Explorer
•   pStoreReader
•   Elcomsoft Advanced Internet Explorer Password Recovery
•   Rixler Software Internet Explorer Password Revealer
•   SecretExplorer
•   IE Key

How Netscape Navigator password recovery work?

Netscape Navigator stores usernames and passwords for web sites which you have logged in to.
Password storage is configured in Netscape Navigator under <Edit>, <Preferences>, <Privacy and Security>, <Passwords>:
 
By default, Netscape Navigator stores all passwords unencrypted.
Viewing Netscape Navigator stored passwords
The usernames and passwords are stored are part of the Netscape Navigator user profile.
The location of the Netscape Navigator user profile varies between versions and installations.
My Netscape Navigator user profile is stored in C:\Documents and Settings\Will\Application Data\Mozilla\registry.dat.
Netscapass will help you view stored Netscape Navigator passwords:
•   Netscapass
Recovering Netscape Navigator encrypted passwords
I am not aware of any currently existing software to decrypt Netscape Navigator encrypted passwords.
Known weaknesses in the password encryption system of Netscape Mail lead me to believe that an application of this nature could be created, and simply has yet to be written.

Getting your Yahoo Email Password from the Windows Registry

If you are running Yahoo Messenger in addition to Yahoo Email, you can use Mail  PassView or Advanced Instant Messengers Password Recovery to retrieve your Yahoo password from the Windows registry.

If you are running Yahoo Pager, you can use Anti-Secure to retrieve your Yahoo password from the Windows registry.
288  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Windows / Window Shortcuts on: October 14, 2006, 01:32:37 PM
Window Shortcuts

CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box Keyboard Shortcuts
CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
m*cro$oft Natural Keyboard Shortcuts
Windows Logo (Display or hide the Start menu)
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard)
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)
Accessibility Keyboard Shortcuts
Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)
Windows Explorer Keyboard Shortcuts
END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
m*cro$oft Management Console (MMC) Main Window Keyboard Shortcuts
CTRL+O (Open a saved console)
CTRL+N (Open a new console)
CTRL+S (Save the open console)
CTRL+M (Add or remove a console item)
CTRL+W (Open a new window)
F5 key (Update the content of all console windows)
ALT+SPACEBAR (Display the MMC window menu)
ALT+F4 (Close the console)
ALT+A (Display the Action menu)
ALT+V (Display the View menu)
ALT+F (Display the File menu)
ALT+O (Display the Favorites menu)
MMC Console Window Keyboard Shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
CTRL+ALT+END (Open the m*cro$oft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
m*cro$oft Internet Explorer Navigation
CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)
CTRL+O (Open the Open dialog box, the same as CTRL+L)
CTRL+P (Open the Print dialog box)
CTRL+R (Update the current Web page)
CTRL+W (Close the current window)
289  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Windows / Easter eggs -- Amazing !!! on: October 14, 2006, 01:30:54 PM
What is an "Easter Egg"?


The term "Easter Egg", as it is used in computer terminology here, means any amusing tidbit that creators hid in their creations. They could be in computer software, movies, music, art, books, or even your watch. There are hundreds of them, and they can be quite entertaining, if you know where to look.

Here I have listed a few easter eggs and will update it as i get hold of new ones..
TRY IT OUT >>>>>>>>>>>>

Windows XP
"0" Blank File, and Clock AVI File
For Windows XP, If you look in your "My Computer\C:\WINDOWS\" In this folder, after all other folders, you find a text file named "0". If you open it, nothing will be in there, hence the filename "0". Another thing would be a file called "Clock".It's an AVI file. It can open it in Windows Media Player. It's a very simple and plain animation.

These 2 files, were probably left in by the Microsoft Programmers as Easter-Eggs for anyone that could find them.

Con Folder
1. In any windows or dos try to make a folder named 'con'.
2. You will be presented by an error that it already exists, or other error preventing you creating this directory.

"Quotes" in windows XP
Ok, there is a secret file in Windows XP called "quotes". In order to get there you must be somewhat familiar with how to use Windows, simply open up My Computer (explorer) and double click on your main drive (probably C next navigate to: C:\WINDOWS\SYSTEM32\DRIVERS\etc This is where the quotes file is. Open the file named quotes in your favorite text editor (notepad, MS Word) then look at the quotes put there by the MS developers!

Easier way to force win in Solitaire
Here is how to make you instantly win a game of solitaire. Simply press Alt + Shift + 2.

Windows XP - Hidden MIDI
I found this once while I was looking for the Windows "error sound".
1. Open "My Computer"
2. Open the "C" drive (or whatever your hardrive name is)
3. Open the "WINDOWS" folder.
4. Open the "Media" folder.
There will be sound a file called "TOWN". Open It and enjoy!
(A quicker way to get to it is to go to C:\WINDOWS\Media\TOWN.MID)

Windows XP - Surf the WEB with Windows Help?
1. Open any application you want to in Windows XP.
2. Click on the "Help" of the applications menu
3. Click on "Contents and Index"
4. After the help opens up, click on the question mark icon located in the top left hand corner of the help screen's title bar.
5. A new menu will open.
6. At the bottom of the new menu (second from the bottom) is another item not usually there. It is "Jump to URL..."
7. Click on "Jump to URL..."
8. A dialog box opens which you can then enter a url into or a location on you drive or network.
9. Make sure you type "http://" (no qoutations) before your address (example: http://www.google.com)
10. After you type in an address, the OK button enables. Click the OK button or hit the ENTER key, and voila, you are surfing the web from inside the Help Screen.


-----------------------------------------------------------------------------------------------------

Flash MX

Flash (Macromedia) - Flash MX
Click on the Help menu and choose About.
Click the very tip of the mouse pointer just underneath the "crotch" of the X.
Note: what you are hunting for is a button only one pixel wide so it may take a number of clicks to get it.
If your screen turns totally dark blue you've found the egg. Be patient it can take a while to load.
One it's loaded, you have a choice of six games.
One from the Flash 4 Easter egg: Gary's Bike Jump.
One from the Flash 5 Easter egg: Gold rush.
Plus four other games - Flash versions of the old arcade games: Asteroids, Lunar Lander, Breakthrough and Flash Blox (Tetris).
Enjoy!

--------------------------------------------------------------------------------------------------------------
Macromedia Flash 8
Flash (Macromedia) - Flash Professional 8 Photo Album
1. Open Flash Pro. 8.
2. Go to Help> About Flash Professional.
3. Now, Click exactly in the middle of the big eight on the right hand side. (It is where the middle of the eight comes together to form an eight)
4. If you have any trouble than just click around the area for a little bit.



--------------------------------------------------------------------------------------------------------------
Flash MX Pro 2004
1. Go to Help/About Flash Professional...
2. Click on the tiny 'TM' near the number 2004.
3. Enjoy.
The About screen will load with a choice of six different games... loads of fun!

--------------------------------------------------------------------------------------------------------------
Yahoo Messenger (latest version)

Yahoo Messenger - new hidden smileys!
:-j - "jk" (just kidding)
:-@ - blabbermouth
:-> - animated flirt face
-----------------------------------------------------------------------------------------
Winamp 5.x
Open About Window in Winamp. Press and hold Ctrl+Alt+Shift. Now pass to the Credits Tab... An interesting screen with authors' photos and fire walls is gonna to appear!
by Russian Eugene
-------------------------------------------------------------------------------------------
Winamp 5.0

Load Winamp 5.0.
Click the "Options" menu, then "Preferences".
Under the "Plug-ins" tree, click "Input".
Click "Nullsoft Vorbis Decoder v1.40", and then "About".
A dialogue box should appear with a fish in front of a diamond. If you click the fish, it'll spin! The longer you hold it, the longer it'll spin.

guys, I havent tried this one , cause i dont use winamp! I think it should work in 5.x also ..
290  GENERALLY GENERAL / Request/Query / Re: how to get screen shot of desktop on: October 14, 2006, 01:27:26 PM
Hi !

Heres Your Answer http://technoarea.org/forums/index.php/topic,195.new.html
291  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Techno News / New Yahoo IM Worm Poses as 'Safety' Browser on: October 14, 2006, 01:17:53 PM
I got this information from another group and copied it to pass on to you.I did not check it out, but feel it is better to be safe than sorry.

Security researchers have identified a new worm spreading across Yahoo's instant messaging network that has been cloaked under the guise of a "safety" browser in an attempt to dupe users.

First discovered by anti-malware researchers at FaceTime Communications, the worm, labeled as yhoo32.explr, is forwarding itself throughout Yahoo's IM system via the contact lists of people whose computers it has already been infected. Once loaded onto a PC, the malicious program automatically hijacks the computer's existing browser home page and encourages users to visit a fraudulent Web site that attempts to load spyware programs onto their devices.

FaceTime researchers said they have observed two versions of the attack, one of which is a stand-alone application with no uninstaller that frequently disguises itself with a faked version of Microsoft's Internet Explorer logo. The second, self-propagating iteration of the worm, uses an .exe file to spread the infection through the Yahoo Messenger directories.

Yahoo representatives didn't immediately return calls seeking comment on the IM virus.
In addition to prompting users to visit the malware-loaded Web site, the virus also plays looped guitar music whenever someone starts up a PC it has infected, or opens the fraudulent safety browser itself. FaceTime researchers said that the attack is the first form of virus they have encountered that installs its own Web browser on a PC without the user's permission.

FaceTime officials said that the worm was first discovered by the India-based arm of its Security Labs division using a so-called honeypot trap designed specifically to attract malware code. The threat's ability to take over a user's browser without any specific interaction on the user's part makes it very unique, company officials said.

"This is one of oddest and more insidious pieces of malware we have encountered in years," Tyler Wells, senior director of research at FaceTime Security Labs, said in a statement. "This is the first instance of a complete Web browser hijack without the user's awareness."

Wells indicated that the existence of the new worm and similar rogue browsers, such as the previously identified Yapbrowser attack, prove that the malware writers are adapting to the use of security programs, and he predicted that there will be more of the sophisticated threats.

Much in the style of phishing schemes, the Web site linked to the yhoo32.explr virus appears to be legitimate, using Explorer logos that look very much like the real thing. Mirroring a trend that threatened the anti-virus industry several years ago, attacks that mimic the same types of applications that are used to defeat them are becoming increasingly popular in the spyware community. Experts have tabbed the technique as an attempt to cash in on the growing awareness of online threats and their links to offline identity fraud.

In a report issued in mid-May, security researchers at Finjan's Malicious Code Research Center highlighted the growth of fake anti-spyware applications that promise to help scan for and delete malicious code. Once downloaded onto a user's computer, the applications may deliver their own virus payloads or expose affected machines to subsequent attacks.

In some cases, said Yuval Ben-Itzhak, chief technology officer at Finjan, the false anti-spyware tools even run fake computer security scans that claim to find existing spyware programs on infected devices. The software then directs the computer's user to a Web site where the user is encouraged to purchase a full version of the free application already on the PC.

"This is just more evidence of the level of professionalism among the people writing the attacks, who are likely involved with organized crime," said Ben-Itzhak. "You can imagine that these types of people will continue to try and disguise malicious programs specifically to appear like the types of programs other people are building to defeat them."
292  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Miscellaneous / Wow..............What a BUSH ? on: October 14, 2006, 01:11:52 PM
See...What a BUSH



1.) Open an empty notepad file
2.) Type "Bush hid the facts" (without the quotes)
3.) Save it as whatever you want.
4.) Close it, and re-open it in notepad.
293  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Internet / Introduction to Cyber Crime on: October 14, 2006, 01:09:20 PM
I think u all want to know about CyberCrime according to IndianLaw.



Introduction to Cyber Crime

The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage.

In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!

Today computers have come a long way, with neural networks and nano-computing promising to turn every atom in a glass of water into a computer capable of performing a Billion operations per second.

Cyber crime is an evil having its origin in the growing dependence on computers in modern life. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants is being run on computers, cyber crime has assumed rather sinister implications. Major cyber crimes in the recent past include the Citibank rip off. US $ 10 million were fraudulently transferred out of the bank and into a bank account in Switzerland. A Russian hacker group led by Vladimir Kevin, a renowned hacker, perpetrated the attack. The group compromised the bank's security systems. Vladimir was allegedly using his office computer at AO Saturn, a computer firm in St. Petersburg, Russia, to break into Citibank computers. He was finally arrested on Heathrow airport on his way to Switzerland

Defining Cyber Crime

At the onset, let us satisfactorily define "cyber crime" and differentiate it from "conventional Crime". 166 Computer crime can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.

Defining cyber crimes, as "acts that are punishable by the Information Technology Act" would be unsuitable as the Indian Penal Code also covers many cyber crimes, such as email spoofing and cyber defamation, sending threatening emails etc. A simple yet sturdy definition of cyber crime would be "unlawful acts wherein the computer is either a tool or a target or both".

Let us examine the acts wherein the computer is a tool for an unlawful act. This kind of activity usually involves a modification of a conventional crime by using computers. Some examples are:

Financial crimes

This would include cheating, credit card frauds, money laundering etc. To cite a recent case, a website offered to sell Alphonso mangoes at a throwaway price. Distrusting such a transaction, very few people responded to or supplied the website with their credit card numbers. These people were actually sent the Alphonso mangoes. The word about this website now spread like wildfire. Thousands of people from all over the country responded and ordered mangoes by providing their credit
card numbers. The owners of what was later proven to be a bogus website then fled taking the numerous credit card numbers and proceeded to spend huge amounts of money much to the chagrin of the card owners.

Cyber pornography

This would include pornographic websites; pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc). Recent Indian incidents revolving around cyber pornography include the Air Force Balbharati School case. A student of the Air Force Balbharati School, Delhi, was teased by all his classmates for having a pockmarked face. Tired of the cruel jokes, he decided to get back at his tormentors. He scanned photographs of his classmates and teachers, morphed them with nude photographs and put them up on a website that he uploaded on to a free web hosting service. It was only after the father of one of the class girls featured on the website objected and lodged a complaint with the police that any action was taken.
In another incident, in Mumbai a Swiss couple would gather slum children and then would force them to appear for obscene photographs. They would then upload these photographs to websites specially designed for paedophiles. The Mumbai police arrested the couple for pornography.

Sale of illegal articles

This would include sale of narcotics, weapons and wildlife etc., by posting information on websites, auction websites, and bulletin boards or 167 simply by using email communication. E.g. many of the auction sites even in India are believed to be selling cocaine in the name of 'honey'.

Online gambling

There are millions of websites; all hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering.

 

Intellectual Property crimes

These include software piracy, copyright infringement, trademarks violations, theft of computer source code etc.

Email spoofing

A spoofed email is one that appears to originate from one source but actually has been sent from another source. E.g. Pooja has an e-mail address [email protected]. Her enemy, Sameer spoofs her e-mail and sends obscene messages to all her acquaintances. Since the e-mails appear to have originated from Pooja, her friends could take offence and relationships could be spoiled for life.
Email spoofing can also cause monetary damage. In an American case, a teenager made millions of dollars by spreading false information about certain companies whose shares he had short sold. This misinformation was spread by sending spoofed emails, purportedly from news agencies like Reuters, to share brokers and investors who were informed that the companies were doing very badly. Even after the truth came out the values of the shares did not go back to the earlier levels and thousands of investors lost a lot of money.

Forgery

Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners. Outside many colleges across India, one finds touts soliciting the sale of fake mark sheets or even certificates. These are made using computers, and high quality scanners and printers. In fact, this has becoming a booming business involving thousands of Rupees being given to student gangs in exchange for these bogus but authentic looking certificates.

Cyber Defamation

This occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information to all of that person's friends.
In a recent occurrence, Surekha (names of people have been changed), a young girl was about to be married to Suraj. She was really pleased because despite it being an arranged marriage, she had liked the boy. He had seemed to be open-minded and pleasant. Then, one day when she met Suraj, he looked worried and even a little upset. He was not really interested in talking to her. When asked he told her that, members of his family had been receiving e-mails that contained malicious things about Surekha's character. Some of them spoke of affairs, which she had had in the past. He told her 168 that, his parents were justifiably very upset and were also considering breaking off the engagement. Fortunately, Suraj was able to prevail upon his parents and the other elders of his house to approach the police instead of blindly believing what was contained in the mails.
During investigation, it was revealed that the person sending those e-mails was none other than Surekha's stepfather. He had sent these e-mails so as to break up the marriage. The girl's marriage would have caused him to lose control of her property of which he was the guardian till she got married.
Another famous case of cyber defamation occurred in America. All friends and relatives of a lady were beset with obscene e-mail messages appearing to originate from her account. These mails were giving the lady in question a bad name among her friends. The lady was an activist against pornography. In reality, a group of people displeased with her views and angry with her for opposing them had decided to get back at her by using such underhanded methods. In addition to sending spoofed obscene e-mails they also put up websites about her, that basically maligned her character and sent e-mails to her family and friends containing matter defaming her.

Cyber stalking

The Oxford dictionary defines stalking as "pursuing stealthily". Cyber stalking involves following a person's movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc.

 
Source:http://cybercrime.planetindia.net/intro.htm
294  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Windows / Re: Windows Tips Complete Chapter on: October 14, 2006, 01:05:28 PM
Open the Registory editor (e.g. regedit.exe) Goto \\HKEY_CURRENT_USER\Control Panel\Desktop Create a string entry called "MenuDropAlignment" Set its value to 1
Reboot
Note: Will not work under NT 4.0.
Repositioning a Background Bitmap
Normally, you only options for displaying a background bitmap are tiled, centered, or stretch to fit (with the Plus Pack).
You can edit the registry and have a third option which is to place the bitmap anywhere on your screen by specifying the X and Y coordinates.
Start Regedit Go to HKEY_CURRENT_USER / Control Panel / Desktop Create new Strings called WallpaperOriginX and WallpaperOriginY Give them values to position them around your desktop
The bitmap must be smaller than your desktop size
Changing Drive Icons
To change a drive's icon when you open My Computer
Create a file called AUTORUN.INF on the root of your hard drive
Enter the lines
[autorun]
ICON=Name of the ICON file
For the name of the icon file you can either specify the path and name (e.g. ICON=C:\WINDOWS\ICONS\MY_ICON.ICO) or
a specific icon in a library (e.g. ICON=ICONFILE.DLL,2)
Adding AnyFolder and Mail to SendTo
Previous examples of adding items to the SendTo usually require editing the Registry.
An easy way around this is to use the following methods.To add ANYFOLDER:
Open the Explorer Go to \Windows\SendTo Right click in the right hand panel Select New / Text Document
Name it anything with a .otherfolder extension
When you want to send files to another folder:
Select the files with Explorer Right Click Select Send to and the name you just created
You them have the option of copying or moving the file to a folder of your choice
To add Mail:
Open the Explorer Go to \Windows\SendTo Right click in the right hand panel Select New / Text Document
Name it anything with a .MapiMail extension (ignore any warnings about the file extension)
When you want to Mail files as attachments:
Select the files with Explorer Right Click Select Send to and the Mail name you just created
This allows you to easily mail multiple files
Adding Shortcuts to Desktop Without "Shortcut To" text
Start Regedit Go to:HKEY_USERS \ .Default \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer Add binary value to Explorer:link="00,00,00,00"
Now You can make Shortcuts to desktop without Shortcut To" text.
Easier User Interface
Add a menu item named "Open THIS folder!" to each of your cascading menus off of the Start menu.
This makes it easier to put items wherever you want them!
Go to Windows \ Start Menu \ Programs \ (etc.) in the Explorer Start right click/dragging folders to the desktop, one by one.
Rename them and left click/drag them back to the same folder.
It takes a little while, but when you are finished you have a much easier interface to work with.
Removing the Start Button
Click on the start menu button twice, so there is a dashed line around the button Press Alt and the minus sign
Choose Close to make the start button disappear, or move to move it to the right!
Note : - You have to re-boot to get it back again, or:
Press Ctrl-Alt-Delete Highlight Explorer Click on the End Task button Select No to doing a full shutdown
Wait a few seconds and the click on the End Task button
Changing the clock to 24-Hour Time
To change the display of the clock on the taskbar to 24-hour format: Open the Control Panel Double-click on the Regional Settings icon Click on the Time tab
In the Time style section select H:mm:ss
Removing the InBox and Recycle Bin Icons from the Desktop
To remove the InBox from your desktop, without needing to run the Policy Editor:
Start Regedit Go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ explorer \ Desktop \ NameSpace Below that should be a few keys Rename the key {00020D75-0000-0000-C000-000000000046}. I usually put another character before or after the curly braces. Restart Windows and the InBox icon should be gone
You can do the same for any other items you don't to show such as the Recycle Bin or The Internet icons
Changing or Removing the Start Menu Icons
Download Microangelo and install it. Create a blank.ico file. Put it in a directory (C:\Windows. Then double click on the Microangelo Engineer to run it. When you get it up on the screen click on the "start" tab. You will see a list of all the icons in the start menu. Highlight the first one (programs) and select "Change". It will bring up a dialog box - select "browse". Go to the directory that contains the blank icon and select it. Hit OK until you get back to the main Engineer window and do all the rest exactly the same way. When you have finished changing them all to the blank icon, Hit "Apply". Hit your start button and look to see if all the icons are invisible. (They should be.)
Close out Micro Engineer and you're finished.
Adding Drive to the SendTo List
I have recently found that if you want to send something from A: drive or from any where to any drive, you can just make a short cut of that drive in subdirectory SENDTO. For example I have two hard drives, a Floppy Drive, and a CDROM
After I have make a copy of each of my drive I will be able to send a whole directory of E:\XXX from the CDROM drive to A: drive or any other drive that i have had made the short c t in the SENDTO subdir of WINDOWS.
Adding a Protected Briefcase
You can make your briefcase a shortcut on the on desktop so if you have multiple users on your PC and you don't want to have a password for your briefcase, you can at least protect it from inadvertent deletion by just making the briefcase a hidden file or in a different location other than \Windows\Desktop\My Briefcase, then send a copy or shortcut to the desktop.
Customizing the Start Button's Name and Icon
To change the name of the Start button:
Copy EXPLORER.EXE in your Windows directory to another directory Start a hex editor (I've been using Diskedit from Norton) Edit EXPLORER.EXE Search for the string 53 00 74 00 61 00 72 00 74 This is the word Start with the letters separated by a null character The section you are in should also have the words "There was an internal error..." also separated with the null character immediately following Now just replace the Start letters with any of your choice (up to 5 characters only) Exit Windows Boot to DOS
Copy your new Explorer file over the original
To change the Start button icon:
Copy USER.EXE in your \WINDOWS\SYSTEM directory to another directory Use an icon editor that can replace icons in executable files Edit USER.EXE and replace the flag icons with the icon of your choice Boot to DOS
Copy the new USER.EXE
The same can be done with NT 4.0, just the offset will be different but the location to just before "There was an internal error..." is the same.
Adding the Device Manager to your Desktop
This allows you to quickly see all the devices attached to your computer.
I use it a lot to select Refresh when I add new external SCSI devices that were not
powered up at startup. This way you do not need to restart the computer. To add the Device Manager Icon:
Right click on an open area of your desktop Select New / Shortcut Type in C:\WINDOWS\CONTROL SYSDM.CPL, SYSTEM, 1 Replace C:\WINDOWS with whatever directory you installed Windows95 Click on the Next box At the next dialog box type in Device Manager
Click on the Finish when you are done
Note: Replacing the 1 with a 3 will bring up the Performance Status
Adding Options to the Right-Click of the Start Menu
To add an option to the Right-Click of the Start button:
Go to Control Panel, View, Options Click on the File Types Tab Scroll down until you see File Folder Click on Edit Click on New Type in the Name you want to in the Action box
Type in the Application you want to use
A good option to add is an MS-DOS Prompt:Try this c:\command.com /k cd %1
It also puts the shortcut on a regular folder.
This command will open a DOS window with that folder as the current directory.
How to make the task bar Auto Hide
Click the right button on a blank area of the task bar Select Properties Select Autohide
Click OK
This will make the task bar slide off the screen when the cursor moves away from it,
and it will slide back on when the cursor is moved near it again.The same can be done for the MS Office task bar. The "sliding" effect is nice, and can free up some desktop space.
More Removing Shortcut Arrows
'lnkfile', 'piffle' and 'internetshortcut' are the three places
that I have seen the isshortcut arrow.
The best way to deal with this is to rename the 'isshortcut' to
'isshortcutbak' by right clicking on the 'isshortcut' then
select rename and add 'bak' to the end.
Closing Nested Folders
If you have several nested folders (folders within folders) and want to close them all,
simply, hold the Shift key while closing the last folder
This will close all previous ones as well.
Changing Application Icons
To have a wider choice of application icons:
Right click on the icon shortcut Chose Properties Click on the Program tab Chose Change icon Click on Browse Select Files of type All Files Browse to the directory where your icon files are kept
You can even use some bitmap files for you icons
Moving and Resizing the Taskbar
You can move the taskbar by pointing on a corner panel and dragging it
It is easier to move if you close all your windows firstYou can also resize it by moving the mouse to the edge and dragging it larger or smaller.
Correcting Corrupted Fonts
If you have a problem with your non-true type fonts, here's what you do:
Open the Control Panel Double click on Fonts Search for the "Monotype Sorts" font
Delete this Font
Changing Desktop Folders - With No Registry Changes
From the Explorer, create a folder somewhere OTHER than the desktop, and call it something like "Desktop Folders." Move all your desktop folders into that folder. Create shortcuts to all of those folders on your desktop.
Now, you are free to change the icons of each shortcut individually, to anything you like!
Updating the Desktop
If you want to update the desktop, for example after you've been changing the registry.
Right-Click anywhere on the desktop
Press F5
Adding the Desktop to your Start Menu
Create a shortcut to the Explorer on your Desktop
Right click on the Start button Choose Open Go into the Programs Folder Drag the Windows Explorer Icon on your Desktop using the RIGHT Mouse button
Choose copy here
Change the command line switch
Right click on the Shortcut you created Choose Properties Choose Shortcut Type in following command line as target:
C:\WINDOWS\EXPLORER.EXE /n, /root,
The last "," is vital!
If you want the two pane Explorer view ad the switch ,/e
Then rename the Shortcut to "Desktop" or whatever you choose and drag the icon onto the start button.
Removing shortcut arrows
One problem when removing shortcut arrows is that
if you delete a desktop item, it will remove it.
If it is a shortcut it will just remove the icon.
If it is not a shortcut, then it will remove the program.
Having the little icon arrow is one way to tell the difference
Getting rid of Click Here to Continue
Start the Registry Editor Open HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Policies / Explorer Create a binary value and call it NoStartBanner Double-click on it and give it a value of 01 00 00 00
You will need to repeat the same steps for HKEY_USERS / .Default / Software / Microsoft / Windows / CurrentVersion / Policies / Explorer
Changing the Desktop and Explorer Folder Icons
The following steps will change the icon that is displayed as the default Folder icon.
Start the Registry Editor. Search for "Shell Icons". This will bring you to HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows / CurrentVersion / explorer / Shell Icons. Double-click on the one has the value name of "3" in the right pane. Type in the new icon you want to use. If you have a DLL file specified, you need to count for the location of the particular icon you want to use, starting at 0.
To reset the icon cache, use a program such as Tweak with comes with the PowerToys from Microsoft.
Note: I haven't experimented with too many of the other icon changes possible.
 
Adding Control Panel Icons to the Desktop
This is an easy one..
Simply open up the Control Panel. Right Click and Drag the icon you want to your desktop or folder. This will create a shortcut for that icon.
It could come in handy if there are always certain items you need to get to quickly.
Create a Control Panel menu directly below the Start Button
Click the Start Button once with your right mouse button. You should see a right-button menu (called a context menu because it offers different choices in different contexts). You should see the items Open, Explore, and Find on the context menu. Click Explore with your left mouse button. An Explorer file management window should open. A directory tree should appear in the left pane, with the right pane displaying the contents of the Start Menu folder. Right-click any empty space within the right pane. A context menu should appear. Click New and then Folder.
The Explorer will create a highlighted icon called New Folder. Type in the following string, all on one line, replacing the words New Folder with this new line. You must type the period, the curly braces, all four hyphens, and the hexadecimal numbers exactly as shown. After the closing curly brace, press Enter.

Control
 Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}
Other Folders can be added following the same instructions.
Dial-Up Networking.{992CFFA0-F557-101A-88EC-00DD010CCC48}
Printers.{2227A280-3AEA-1069-A2DE-08002B30309D}
Inbox.{208D2C60-3AEA-1069-A2D7-08002B30309D}
My Computer.{20D04FE0-3AEA-1069-A2D8-08002B30309D}
Recycle Bin.{645FF040-5081-101B-9F08-00AA002F954E}
Network Neighborhood.{208D2C60-3AEA-1069-A2D7-08002B30309D}
Desktop.{00021400-0000-0000-C000-000000000046}
Briefcase.{85BBD920-42A0-1069-A2E4-08002B30309D}
Fonts.{BD84B380-8CA2-1069-AB1D-08000948F534}
Minimizing All Windows
To minimize all windows:
Press Ctrl-ESC ESC to bring up the Task Bar Right Mouse Click on an open area of the Task Bar
Select Minimize all Windows
This makes it a lot easier to minimize windows when all your open applications are full screen.With the Microsoft Keyboard, you can accomplish the same thing by pressing the Window-M key.
Removing the Shortcut Icon Arrows
Open REGEDIT.EXE Open the Key HKEY_CLASSES_ROOT Open the Key LNKFILE Delete the value IsShortcut Open the next Key PIFFILE Delete the value IsShortcut
Restart the Win95
Turning on AutoArrange for Folders
To make all folders keep AutoArrange turned on:
Open up an existing folder Select View / Arrange Arrange the Icons the way you would like, (e.g. Name, Size,etc.) Select View / Arrange again Select AutoArrange Press the Ctrl-key while you close the window.
This folder should now have AutoArrange always selected.
This should allow you to create new folders that have AutoArrange selected by default.
You only need to specify by Name, Size, etc. if you want to change it from the default you set above.
Note: I have only tested this on a few computers. Please give me feedback regarding any problems.
Creating Document Scraps
If you are using Microsoft Word 7.0,
you can highlight a section of the document then drag and drop the highlighted area to
your desktop. Windows will create a file for you with a name something like
"Document Scrap From..." followed by the first few words you selected
Quick Access to Your Desktop
How do you access your darn desktop when you have a ton of applications open?
Well you could right click on the taskbar and do a minimize all, but that can be slow.
Instead:
Open a browser window (double-click on "My Computer") If there is no toolbar, select View from the menu and select Toolbar. Then from the dropdown list-box in the toolbar select desktop. Now minimize it and forget about it. The next time you want to access your desktop just click the desktop window on the taskbar.
As long as you don't close the window when you shutdown, it will reopen when you start windows again.
Additional Note: You can also drag the Desktop folder to the start menu.
Then you just press Ctrl-ESC and click on Desktop
Restoring Corrupted Icons
If you use a graphic Card and you change the resolution, sometimes the icons are bad. End Win95 and restart. When you see the starting message press F8 then type standard. After this start of Win95 exit and restart. Change back to your Resolution and restart.
The icons should be corrected.
Turn Off Window Animation
You can shut off the animation displayed when you minimize and maximize windows.
This tip makes navigating Windows 95 a lot faster especially for those that don't have
super fast video cards.
Open Regedit HKEY_CURRENT_USER Control panel Desktop WindowMetrics Right Mouse Click an empty space in the right pane. Select new/string value. Name the new value MinAnimate. Doubleclick on the new string value (MinAnimate) and click on "Modify" Enter a value of 0 for Off or 1 for On then hit
Close Regedit and all programs then reboot.
Renaming the Recycle Bin
Start the Registry Editor Type Ctrl-F to bring up the Find Menu In the Find What box type Recycle Double click on the Recycle Bin in the right pane Type in the new name under Value Data
Restart Win95
Turning off Desktop Icons
If you want to turn off all the icons on your desktop:
Start the System Policy Editor Select File / Open Registry Select Local User Select Shell / Restrictions
Select Hide all items on Desktop
All Icons will now be hidden.Note: One side effect is the your CD will no longer automatically play when it is inserted.
Adding in Old Windows Groups
If you are setup to dual boot between your old Win 3.x and want to add in the old groups, just click on the *.GRP file in your old windows directory. The programs will be added to your list under Programs in the task bar.Note: Any DLL's the programs require will need to be copied.
To speed up the Start Menu
Start the REGEDIT program Search for the word desktop This should be in HKEY_CLASSES_ROOT / CLSID / {00021400... Right Click on the right panel Pick NEW / String Value. Name it MenuShowDelay, all one word. Select a value from 1-10, 1 being the fastest. Exit REGEDIT
Restart Windows
To change the My Computer or Recycle Bin icon
Open Regedit Find My Computer or Recycle Bin Tab to the left panel Double click on the highlighted line Double click on DefaultIcon in the left panel Double click on DefaultIcon right panel Type in the value for the new icon
Note: DLL files can be used. Specify the location of the new icon with the filename,#
Remove the tildes in short filenames
Open Regedit Go to Hkey_Local_Machine\System\CurrentControlSet\Control\FileSystem Right Click on the Right pane Select New / Hex
Add the value NameNumericTail= 0
To remove the Network Neighborhood Icon
Start POLEDIT. It is on the CD in \Admin\Apptools\Poledit Open Registry Select LocalUser Select Shell Select Restrictions
Select Hide Network Neighborhood
To change the Startup and Logoff screensStartup Screen
Create a 320x400 bitmap in the root directory and name it LOGO.SYS
You can use LOGOW.SYS file in the Windows directory as a starter
Logoff Screens
There are several files called LOGOX.SYS They are actually bitmaps 320x400 that just have a different extension The hidden one in the root directory LOGO.SYS is the startup logo. There are two files in the Windows directory. LOGOW.SYS is the Wait while Shutting down ... screen LOGOS.SYS is the You may now shut-off or Reboot screen To edit them, rename them with a BMP extension and use your favorite graphic editor You can edit these files or create you own
They just need to be the same size
Pages: 1 ... 16 17 18 19 20 [21] 22 23 24 25 26 27
Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.126 seconds with 23 queries.