Showing posts with label COMPUTER. Show all posts
Showing posts with label COMPUTER. Show all posts

Apple iMac - Style Redefined

Apple computers have recently launched the new Apple iMac, the all in one desktop computer loaded with splendid features and newly induced advanced technology.Apple iMac - The new all-in-one desktop computer loaded with splendid features for flexible computingThe Apple iMac is more than just a regular desktop, with its high features and functionalities it provides the users with an ultimate all in one solution for flexible computing.

Wireless connectivity is the highlighting feature of the new Apple iMac, say good-bye to wires and complex connections as this amazing desktop computer comes with wireless keyboard & mouse and the processing unit is attached internally to the display.Apple-iMac wireless keyboard and mouse with Multi-Touch technologyAlso there are no buttons for clicking or scrolling wheel as with the new Multi-Touch technology in magic mouse you can click, scroll, or swipe anywhere.

The fully fledged Apple iMac is loaded with some other amazing features and technical specifications like:
  • Intel Core 2 Duo processor (or) optional Intel Core i5 processor for high speed processing.

  • Hard disk of up to 1TB

  • Intelligent control system which monitors the temperatures and adjusts the airflow to critical components according to the different situations

  • High responsive speakers that delivers clearer and louder sound with minimum distortion

The new Apple iMac comes with an optional 21.5 inch or 27 inch display screen with edge to edge glass that covers the entire front enclosure. It has a High aspect ratio of 16:9 inches and LED backlight display.Apple iMac 21.5 inch and 27 inch display screens with edge to edge glass and aspect ratio of 16:9 inches
With all these new innovative features that provide a smooth computing environment for the users, this amazing Desktop computer from Apple is available at a starting price of $1169 USD for 21.5 inches and $1699 USD for 27 inches display.

Different ways to shutdown ur pc

http://upload.wikimedia.org/wikipedia/en/5/5e/Windows_XP_Shutdown.png
Different ways to shutdown ur pc

There are so many different ways to turn off your Windows XP computer, let's look at some of them:


1. The standard approach - click the Start Button with your mouse, then select the Turn Off menu and finally click the Turn Off icon on the Turn Off computer dialog. blink.gif

2. Press Ctrl+Esc key or the Win key and press u two times - the fastest approach.

3. Get the Shutdown utility from Download.com - it add the shut down shortcuts for you. Else create them yourself using approach 4.

4. Create a shutdown shortcut on your desktop. Right click on the desktop, choose New Shortcut and type shutdown -s -t 00 in the area where you are asked to specify the location of the program file. Now you can just double click this icon to turn off the computer. The best location would be your quick launch bar.

5. Press the Win key + R key to open the run window. Type shutdown -s -t 00. [s means shutdown while t means the duration after which you want to initiate the shutdown process].

If some open processes or application won't let you turn off, append a -f switch to force a shut down by closing all active processes.



6. Win+M to minimize all windows and then Alt+F4 to bring the Turn Off computer dialog.

7. Open Windows Task manager (by right clicking the Windows Task bar or Alt+Ctrl+Del) and choose Shut down from the menu. Useful when the Windows are not responding.


8. open task manager--->click on shutdown--->hold the ctrl key and click on Turn off::::::: pc will be turned off in 3 secs.. fastest method other than hard shutdown

Most Common Computer Problems and Their Solution


1. Task Manager Disabled:


If you are working on Windows XP pro, following steps will help u to enable Task Manager

SOLUTION 1:
Click Start --> Run
Enter gpedit.msc in the Open box and click OK
In the Group Policy settings window, select User Configuration
Select Administrative Templates
Select System
Select Ctrl+Alt+Delete options
Select Remove Task Manager
Double-click the Remove Task Manager option
Disable that option

SOLUTION 2:
Click on Start >> Run and in the Open box type:

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 0 /f

Click OK.


2. Double-clicking any drive opens search option:

Solution 1:
That's a virus named as ravmon.exe and autorun.inf
Scan first with a good antivirus [Nod32 Recommanded]
then try this trick.

First show the hidden files and folders options then try this method

1. Go to Start-->run and type cmd then click ok

2. If u want to remove the infected file from c drive then type C: in command prompt and press enter

3. Type autorun.inf and press enter
autorun.inf file is opened

4. Now type "attrib autorun.inf -s -h -r" and press enter

5. Now delete the file by typing
"del autorun.inf" and press enter

6.Now type autorun.inf and press enter now, u will find no infected autorun.inf file.

7. same way do for all other drives then restart ur pc


3. I accidentally deleted my "mspaint.exe"/"notepad.exe"/etc. file, how can I get it back?


Solution::

You can use any of following methods:

A. Goto "%windir%\System32\DLLCache" folder and look for the file, if its there then copy it to "%windir%\System32\" folder.

B. Insert your Windows Setup CD and goto "I386" folder. Now look for the same file, it'll present there but the last letter of extension will be "_". e.g., u'll get "mspaint.ex_"/"notepad.ex_"/etc. Now open Command Prompt and goto "I386" folder and give following command:

expand mspaint.ex_ mspaint.exe
expand notepad.ex_ notepad.exe
etc.

Now u can copy the file to "%windir%\System32" folder.

C. Give following command in Command Prompt:

sfc /SCANNOW

It'll automatically restore the files.


4. When I right-click on Start button and select "Open", a "Copy To" or "Move To" dialog box opens automatically.
Solution:
Open regedit and goto:
Code:
HKEY_CLASSES_ROOT\AllFilesystemObjects\shellex\ContextMenuHandlers\

Now under this key, delete following 2 keys:
Copy To
Move To


5. Windows is showing some wrong icons of files. How can I reset the corrupted icons?
Solution:

You can use any of following methods:

A. Download TweakUI and then click on "Repair Icons" in "Repair" section.

B. Open My Computer and goto:
C:\Documents and Settings\User_Name\Local Settings\Application Data

Replace C:\ with your system drive and "user_Name" with your username.
Now there'll be a HIDDEN file "iconcache.db", delete it and restart your system.


6. A strange process "ctfmon.exe" always runs in background and if I click on "End Process" button, it restarts automatically.

Solution:
Open Control Panel and goto Add/Remove Programs list. Now click on the Microsoft Office entry and then click on "Change" button. Now select "Add/Remove Features" and click on "Next". Now expand "Office Shared Features" and click on "Alternative User Input" and then select "Not Available" and finally click on Update. It'll permanently remove that ctfmon.exe and your problem will be solved.


7. My Windows Login Screen has changed to "Classic Logon Box". I want the new Welcome Screen back.

Solution:
Type "control userpasswords" in RUN dialog box or Open "User Accounts" in Control Panel. Then click on "Change the way Users log on and off". Now check the option "Use Welcome Screen". If you get following error:

Uninstall client services for netware.

Then Open "Network Connections" and open Properties of your Internet Connection. Now goto "Networking" tab and select "Client services on Netware" option and click on the"Uninstall" button.


8. Whenever I start my computer, Scandisk starts running even I proper shut down the PC last time.

Solution:
Do as following:

A. Open regedit and goto:

Code:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager

In right-side pane, change the value of BootExecute to:

autocheck autochk *

B. If the above trick doesnt help then give following commands in Command Prompt:

chkntfs /x drive_name

for e.g., if ScanDisk runs automatically for C: and D: drives, then give following commands one by one:

chkntfs /x C:
chkntfs /x D:


9. When I start my computer, I get error message:

"Windows\System32\config\system" file missing or corrupt

Solution::
Boot using Windows Setup CD and enter into "Recovery Console" by pressing "R". Now Log into windows installation and enter admin password. Now give following commands at prompt:

copy %windir%\Repair\system %windir%\System32\Config

If it doesnt work, then again boot into "Recovery Console" and give following commands:

fixmbr
bootcfg /scan
bootcfg /rebuild
fixboot


Win XP Tweaks

STARTUP

Note: All the information here is collected form various sites and forums.

1. I can't see Hidden files/folders in my computer. Even I enable the option "Show hidden files/folders" in "Tools -> Folder Options", its automatically disabled again.

Solution1: Go to your Start menu, click on Run and open up your Registry Editor by typing "regedit" without the quotes and pressing OK.

Once there go to: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folde r\Hidden\SHOWALL

Delete the value CheckedValue. (Its type should be REG_SZ and data should be 0 or 1.)

Create a new DWORD value called CheckedValue (same as above, except that the type is REG_DWORD) by right clicking on the right pane->New->DWORD Value. Modify the value data to 1 (0x00000001).
Solution 2: Open regedit and goto:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
In right-side pane, change value of "Hidden" to as following:

1 - To show hidden file
2 - To not show hidden files

If it doesn't work, then scan your computer with an anti-virus software.


2. Task Manager Disabled:

Using Group Policy Editor - for Windows XP Professional to Enable Task Manager.

* Click Start, Run, type gpedit.msc and click OK.
* Navigate to this branch:

User Configuration / Administrative Templates / System / Ctrl+Alt+Delete Options / Remove Task Manager

* Double-click the Remove Task Manager option.
* Set the policy to Not Configured.

Enable RegEdit [It is not tested]

REGEDIT4
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersio
n\Policies\System]
"DisableRegistryTools"=dword:00000000

Save the text file as any name u with extension .reg
example:- "enable.reg"
After that double click to run the file.

Note:DO SCAN YOUR MACHINE WITH A GOOD ANTIVIRUS. BECAUSE THIS PROGRAMS DON'T TURNED OFF BY HIMSELF OR AUTOMATICALLY. IT HAS TO A VIRUS EFFECT OR A ADMINISTRATOR HAS TO MANUALLY DISABLE THIS PROGRAMS.


3. Restore Deleted Recycle Bin Icon from Desktop:

Method #1:
1. Right-click an empty area of your desktop
2. Select Properties
3. Click the Desktop tab
4. Click the Customize button
5. Click Restore Default
6. Exit all windows and restart your computer

Method #2:
Note: Be sure to make a backup copy of your registry prior to making any changes.

Go to Start>> Run. Type in: regedit [Enter]

Navigate to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace

Hold the mouse on NameSpace and right-click once. From the resulting menu, select Edit>> New>> Key

Copy and Paste the following Key code (including the brackets):

{645FF040-5081-101B-9F08-00AA002F954E}

Press Enter on your keyboard, exit the registry editor and restart your system.



4. Blank User Accounts Applet :

Problem:
When you double-click User Accounts applet in the Control Panel, the User Accounts applet opens, but it may be completely blank.

The buttons Back | Forward | Home are displayed in the dialog.

Resolution:
To resolve the problem, type these commands from Start, Run dialog:

regsvr32 jscript.dll

If that does not help, execute the following commands as well.

regsvr32 nusrmgr.cpl
regsvr32 /i mshtml.dll


5. Force windows XP to reboot upon crashing:

This registry edit will cause your system to reboot itself automatically upon crashing. This can be useful if you have a reason for keeping your system on 24/7:


Open REGEDIT

Navigate to 'HKEY_LOCAL_MACHINE\SYSTEM
\CurrentControlSet\Control\CrashControl'

Edit the 'AutoReboot' value to '1'


6. Stand By Icon Disabled:

Problem:
I reinstalled my windows and now "Stand By" option is Grey out in shutdown dialog box and I can't use it.

Sol: Install VGA drivers from your motherboard CD and the option will be enabled. If you don't have the motherboard CD, then go to the manufacturer site and download the required drivers.

7. Improving the Slow Boot up time:

There are a variety of reasons why your windows XP system would boot slowly. Most of the times it this has to do with the startup applications. If you would like to speed up the bootup sequence, consider removing some of the startup applications that you do not need. Easiest way to remove startup apps is through System Configuration Utility. Go to Start then Run and enter MSCONFIG and go to the Startup tab. Deselect/UnCheck application(s) that you do not want to startup at boot time.


8. Regedit Disabled By Admin:

Open Notepad pad, copy paste the following text to the note pad::

REGEDIT4
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersio
n\Policies\System]
"DisableRegistryTools"=dword:00000000

Save the text file as any name u with extension .reg

example:- "enable.reg"

After that double click to run the file.

Computer Security

Advances in computer technology is a double-edged sword. On one hand, it affords us quick and easy access to numerous conveniences such as bank statements, favorite shopping centers, school and health records, and more. On the other hand, it can also grant the same access to those who aren't supposed to get it. Although it's a rare occurrence, hacking has become the biggest criminal nuisance in computer history.

Make no bones about it. There's nothing innocent or cute about the hacker. Today's hackers aren't the pimply-faced teen rebels that you might be thinking of. Instead, this generation of hackers are grown individuals who are more than likely earning a living by stealing the identities of innocent, law abiding individuals and then selling those identities to others who want to slip by the system. And the only protection against these seedy people is prevention.

Computer security couldn't be more important than it is today and that's why we've taken the time to introduce it to you.  You can reduce the probability of experiencing identity theft by making your computer as hacker-proof as possible. All that's needed is a little software and a lot of common sense.

1. Install an anti-virus/anti-spyware program. Anti-virus/anti-spyware software will stop malicious code from downloading and installing onto your computer while you peruse the Internet. Known as viruses, worms, or spyware, this malicious code can destroy important files and render your computer good for only one thing: sending sensitive data back to the server of an identity thief.

2. Don't store sensitive data on your computer in the first place. Should your computer get infected with a virus, worm, or piece of spyware, you can thwart the individuals responsible by not storing your personal information on your PC so that when and if your computer does send back data - it won't be anything valuable. Hackers look for things like full names, social security numbers, phone numbers, home addresses, work-related information, and credit card numbers. If these things aren't saved onto a computer, there's nothing critical to worry about other than restoring your computer to a non-virus condition.

3. Don't open files without scanning them with an anti-virus/anti-spyware program. In the past, the warning was to avoid opening files from people that you don't know. Today it's really not safe to open files from anyone (without scanning the files) because that's how viruses get spread - through files - even by mistake. So even though your co-worker may have emailed a funny video, it's no more safe to open than a video downloaded from a complete stranger. Be safe and scan each and every file you download from the Internet or receive through email regardless of where it came from.

4. Create a barrier between your computer and prying eyes. Anti-virus/anti-spyware programs are only effective after the effect. But you can prevent identity theft from occurring by installing a firewall. A firewall is software that checks all data entering and exiting a computer and it then blocks that which doesn't meet specified security criteria (user-defined rules).1

5. Don't click on website links in spam messages. In an effort to obtain personal information, some spammers will send email that asks you to click on a link. The email messages are often disguised as important messages from well-known online establishments, and they often try to scare their readers into clicking links with threats of closing an account of some sort. Sometimes the links are harmless and attempt to con the reader into volunteering personal information (credit card number), but other times the links attempt to download harmful software onto a computer.

Your best protection against computer crimes is your own knowledge. Hopefully the suggestions above will prompt you into taking appropriate action and into protecting your computer with the suggested tools. In doing so, you'll not only protect yourself, you'll prevent the spread of these malicious activities and protect others at the same time.

Computer Help

Well there's no denying it - No matter how new or how well maintained our computers are, we all encounter computer problems sooner or later. The good news is that we don't have to face them alone. There are a ton of resources available to walk us through computer issues but it may take a little knowledge in knowing how to access them. This article will show you how.

1. Remember help files. It's funny, but people seem to forget that every computer and every program installed on a computer comes with its own help file. Even the operating system of a computer has a help file and it really should be the first place to look for answers. Help files are designed not only to guide the usage of a computer, they're  also designed to solve problems. Inside a help file, look for a section called, "Troubleshooting" (or something similar) when you need to resolve an issue. This section is reserved for solving problems specific to the software or hardware that you're using.

2. Product websites. If you're having a problem with a piece of software or with a hardware part, try the website of that software's or hardware's manufacturer. Most (if not all) manufacturer's reserve a portion of cyberspace and dedicate it to support the products that they build. Microsoft's help desk is good example.

3. Fan sites. Fan sites probably isn't a good name for this resource, but you can find websites that are dedicated toward supporting the users of a particular software program or piece of hardware. We've called them "fan sites" because the maintainers of these sites have no affiliation with the manufacturers that they support! Call them what you will, but their free help is immeasurable and without it, we wouldn't have some of the wonderful workarounds and unique problem solving techniques that we have today.

4. Usenet newsgroups. Another underused resource on the Internet, Usenet newsgroups have hundreds of discussion groups dedicated to some of the most popular computer systems, operating systems, hardware manufacturers, and individual software programs. Sometimes, the representatives of these companies participate, but most of the time, the support in this group is user to user, which is just as valid because you're
working with a team of experienced people.

5. Support Lines. Another source for help that we shouldn't forget are the support systems of various manufacturers. You can reach these systems by calling the phone number associated with the product that you're having trouble with. Calls may be free (1-800 or 1-877 number), or they may cost a small fee (1-900).

6. PC support groups or user groups are another option for help. These are groups that meet in libraries, computer stores, or other local areas and they discuss all sorts of issues related with a particular product. Even if you aren't experiencing a computer or software problem, user groups are fun to participate in and they can help you network into other interests such as job or teaching opportunities.

7. Surprisingly, you may even get a helping hand from the salespersons at your local computer store. We don't recommend that you make this your first pit stop when you experience a problem, but we don't recommend that you rule this option out altogether either. Computer salespersons are hired for a reason - and that's their knowledge. Often, these kind folks can help you resolve an issue over the phone and prevent you form having to buy a costly solution.

As you can see, help is easy to find - You've just got to know where to look for it. Most of the contacts within these resources are extremely friendly and willing to take the time to walk you through a problem at little to no cost. From online discussion groups to the files on your own computer, help is often just a click away.

COMPUTER HARDWARE

http://graeme.baileynet.com.au/images/Computer%20Hardware.jpg

The big boys in the computer industry want you to continue thinking the way you are. The major desktop computer manufacturers thrive on consumers lack of knowledge and old ideas about desktop computers and computer hardware to drive sales of new desktop computers.

It works in their favor to keep these myths alive, because their business depends on it. So what are they?

Myth 1: You need top of the line computer hardware

Maybe some years ago this might have been true with older computer hardware, but times have changed. When computers were much slower than they are now, the latest version of any computer hardware increased speeds noticeably and allowed new possibilities from your desktop computer.

Those increases from computer hardware no longer yield such a huge increase in performance. With the basic uses of the desktop computer set and been in place for a while now, speed increases no longer result in real world benefits for most desktop computer users.

What was great computer hardware last year is still good enough now.

Myth 2: Computer hardware is the domain of Geeks

When personal computing was coming into its own, you really did need to be a Geek to know what was happening. For those old enough to remember, imagine life without Windows and hacking away at the command line, as used to be the case. Some still do, but I wouldn't want to do that again.

Desktop computers are such commonplace that the basics of computer hardware can be understood and researched with the minimum of hassle. The ball is on the consumers side of the court. You no longer need to be a geek, just a little knowledge that is now readily available.

Myth 3: A faster desktop computer will speed up the Internet

Possibly. If you are running 5-year-old computer hardware this might be the case. But the real reason for the increase in speed is usually not the computer.

Internet speed is related to your connection speed. If you have a dial up connection, it's going to be quite slow. When you upgrade your desktop computer and they throw in a cable internet, or DSL package the improved speed is from the faster connection, not the computer. Both cable and DSL can offer more than 10 times the speed of a dial-up connection. The computer has little to do with it.

Myth 4: To speed your computer up, upgrade!

New computer hardware is a very obvious way to speed things up. Even I have gone for new parts purely for this reason.

But it's definitely not the only way.

Various factors play into overall speed. On a purely physical level, upgrading memory is still a fantastic way to get things to move along a little faster. But apart from this the main things that slows things down on the programs and other stuff you have on the computer.

Over time, as more programs are put on and taken off and changed, things get left behind, and things get forgotten. When your computer starts, many things get loaded into memory and each one of those takes that little bit more of the computers resources. When you switch to a new program and don't remove the old one, the older one will still use resources.

Myth 5: Big brands are the best

Big brands essentially piece together a computer. They pick and choose the pieces to make a computer package. They also choose some software, give a warranty and then sell it to you.

Dell computer company has become well known for its customer service. This is the best part about Dell computers. The downside is there are limited choices. They pick what goes into the computer, which are often quite expensive parts. They are motivated by the suppliers to put more recent parts into their computers, keeping the prices at the same level and maintaining the "to get more, pay more," mentality.

You don't have the power of these big guys, but you have something more. Choice.

Your pick of parts for your desktop computer will allow you to put together something completely tailored to your needs. Put the money where you need it most, into the computer hardware that makes the biggest difference to you, and in the end getting a desktop computer you will fall in love with, rather than despise.

What Is Registry?

http://www.onlytechtalks.com/techtalks/wp-content/uploads/2009/09/Registry-Mechanic.jpeg

What is the Registry?

The Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000/XP. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.

The physical files that make up the registry are stored differently depending on your version of Windows; under Windows 95 & 98 it is contained in two hidden files in your Windows directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the %SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a tool commonly known as a "Registry Editor" to make any changes (using registry editors will be discussed later in the article).

The Structure of The Registry

The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer.

Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actualinformation stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context.

There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:


* HKEY_CLASSES_ROOT - This branch contains all of your file association mappings to support the drag-and-drop feature, OLE information, Windows shortcuts, and core aspects of the Windows user interface.
* HKEY_CURRENT_USER - This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the PC and containsinformation such as logon names, desktop settings, and Start menu settings.
* HKEY_LOCAL_MACHINE - This branch contains computer specific information about the type of hardware, software, and other preferences on a given PC, this information is used for all users who log onto this computer.
* HKEY_USERS - This branch contains individual preferences for each user of the computer, each user is represented by a SID sub-key located under the main branch.
* HKEY_CURRENT_CONFIG - This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration.
* HKEY_DYN_DATA - This branch points to the part of HKEY_LOCAL_MACHINE, for use with the Plug-&-Play features of Windows, this section is dymanic and will change as devices are added and removed from the system.



Each registry value is stored as one of five main data types:


* REG_BINARY - This type stores the value as raw binary data. Most hardware component information is stored as binary data, and can be displayed in an editor in hexadecimal format.
* REG_DWORD - This type represents the data by a four byte number and is commonly used for boolean values, such as "0" is disabled and "1" is enabled. Additionally many parameters for device driver and services are this type, and can be displayed in REGEDT32 in binary, hexadecimal and decimal format, or in REGEDIT in hexadecimal and decimal format.
* REG_EXPAND_SZ - This type is an expandable data string that is string containing a variable to be replaced when called by an application. For example, for the following value, the string "%SystemRoot%" will replaced by the actual location of the directory containing the Windows NT system files. (This type is only available using an advancedregistry editor such as REGEDT32)
* REG_MULTI_SZ - This type is a multiple string used to represent values that contain lists or multiple values, each entry is separated by a NULL character. (This type is only available using an advancedregistry editor such as REGEDT32)
* REG_SZ - This type is a standard string, used to represent human readable text values.



Other data types not available through the standard registry editors include:


* REG_DWORD_LITTLE_ENDIAN - A 32-bit number in little-endian format.
* REG_DWORD_BIG_ENDIAN - A 32-bit number in big-endian format.
* REG_LINK - A Unicode symbolic link. Used internally; applications should not use this type.
* REG_NONE - No defined value type.
* REG_QWORD - A 64-bit number.
* REG_QWORD_LITTLE_ENDIAN - A 64-bit number in little-endian format.
* REG_RESOURCE_LIST - A device-driver resource list.



Editing The Registry

The Registry Editor (REGEDIT.EXE) is included with most version of Windows (although you won't find it on the Start Menu) it enables you to view, search and edit the data withinthe Registry. There are several methods for starting the Registry Editor, the simplest is to click on the Start button, then select Run, and in the Open box type "regedit", and if the Registry Editor is installed it should now open and look like the image below.

An alternative Registry Editor (REGEDT32.EXE) is available for use with Windows NT/2000, it includes some additional features not found in the standard version, including; the ability to view and modify security permissions, and being able to create and modify the extended string values REG_EXPAND_SZ & REG_MULTI_SZ.

Create a Shortcut to Regedit
This can be done by simply right-clicking on a blank area of your desktop, selecting New, then Shortcut, then in the Command line box enter "regedit.exe" and click Next, enter a friendly name (e.g. 'Registry Editor') then click Finish and now you can double click on the new icon to launch the Registry Editor.

Using Regedit to modify your Registry
Once you have started the Regedit you will notice that on the left side there is a tree with folders, and on the right the contents (values) of the currently selected folder.

Like Windows explorer, to expand a certain branch (see the structure of the registry section), click on the plus sign
  • to the left of any folder, or just double-click on the folder. To display the contents of a key (folder), just click the desired key, and look at the values listed on the right side. You can add a new key or value by selecting New from the Edit menu, or by right-clicking your mouse. And you can rename any value and almost any key with the same method used to rename files; right-click on an object and click rename, or click on it twice (slowly), or just press F2 on the keyboard. Lastly, you can delete a key or value by clicking on it, and pressing Delete on the keyboard, or by right-clicking on it, and choosing Delete.

Note: it is always a good idea to backup your registry before making any changes to it. It can be intimidating to a new user, and there is always the possibility of changing or deleting a critical setting causing you to have to reinstall the whole operating system. It's much better to be safe than sorry!

Importing and Exporting Registry Settings

A great feature of the Registry Editor is it's ability to import and export registry settings to a text file, this text file, identified by the .REG extension, can then be saved or shared with other people to easily modify local registrysettings. You can see the layout of these text files by simply exporting a key to a file and opening it in Notepad, to do this using the Registry Editor select a key, then from the "Registry" menu choose "Export Registry File...", choose a filename and save. If you open this file in notepad you will see a file similar to the example below:

Quote:

REGEDIT4

[HKEY_LOCAL_MACHINE\SYSTEM\Setup]
"SetupType"=dword:00000000
"CmdLine"="setup -newsetup"
"SystemPrefix"=hex:c5,0b,00,00,00,40,36,02


The layout is quite simple, REGEDIT4 indicated the file type and version, [HKEY_LOCAL_MACHINE\SYSTEM\Setup] indicated the key the values are from, "SetupType"=dword:00000000 are the values themselves the portion after the "=" will vary depending on the type of value they are; DWORD, String or Binary.

So by simply editing this file to make the changes you want, it can then be easily distributed and all that need to be done is to double-click, or choose "Import" from the Registry menu, for the settings to be added to the system Registry.

Deleting keys or values using a REG file
It is also possible to delete keys and values using REG files. To delete a key start by using the same format as the the REG file above, but place a "-" symbol in front of the key name you want to delete. For example to delete the [HKEY_LOCAL_MACHINE\SYSTEM\Setup] key the reg file would look like this:

Quote:

REGEDIT4

[-HKEY_LOCAL_MACHINE\SYSTEM\Setup]


The format used to delete individual values is similar, but instead of a minus sign in front of the whole key, place it after the equal sign of the value. For example, to delete the value "SetupType" the file would look like:

Quote:

REGEDIT4

[HKEY_LOCAL_MACHINE\SYSTEM\Setup]
"SetupType"=-


Use this feature with care, as deleting the wrong key or value could cause major problems within the registry, so remember to always make a backup first.

Regedit Command Line Options
Regedit has a number of command line options to help automate it's use in either batch files or from the command prompt. Listed below are some of the options, please note the some of the functions are operating system specific.


* regedit.exe [options] [filename] [regpath]
* [filename] Import .reg file into the registry
* /s [filename] Silent import, i.e. hide confirmation box when importing files
* /e [filename] [regpath] Export the registry to [filename] starting at [regpath]
e.g. regedit /e file.reg HKEY_USERS\.DEFAULT
* /L:system Specify the location of the system.dat to use
* /R:user Specify the location of the user.dat to use
* /C [filename] Compress (Windows 98)
* /D [regpath] Delete the specified key (Windows 98)

Maintaining the Registry

How can you backup and restore the Registry?

Windows 95
Microsoft included a utility on the Windows 95 CD-ROM that lets you create backups of the Registry on your computer. The Microsoft Configuration Backup program, CFGBACK.EXE, can be found in the \Other\Misc\Cfgback directory on the Windows 95 CD-ROM. This utility lets you create up to nine different backup copies of the Registry, which it stores, with the extension RBK, in your \Windows directory. If your system is set up for multiple users, CFGBACK.EXE won't back up the USER.DAT file.

After you have backed up your Registry, you can copy the RBK file onto a floppy disk for safekeeping. However, to restore from a backup, the RBK file must reside in the \Windows directory. Windows 95 stores the backups in compressed form, which you can then restore only by using the CFGBACK.EXE utility.

Windows 98
Microsoft Windows 98 automatically creates a backup copy of the registry every time Windows starts, in addition to this you can manually create a backup using the Registry Checker utility by running SCANREGW.EXE from Start | Run menu.

What to do if you get a Corrupted Registry
Windows 95, 98 and NT all have a simple registry backup mechanism that is quite reliable, although you should never simply rely on it, remember to always make a backup first!

Windows 95
In the Windows directory there are several hidden files, four of these will be SYSTEM.DAT & USER.DAT, your current registry, and SYSTEM.DA0 & USER.DA0, a backup of your registry. Windows 9x has a nice reature in that every time it appears to start successfully it will copy the registry over these backup files, so just in case something goes wrong can can restore it to a known good state. To restore the registry follow these instruction:
[list=1]
* Click the Start button, and then click Shut Down.

* Click Restart The Computer In MS-DOS Mode, then click Yes.

* Change to your Windows directory. For example, if your Windows directory is c:\windows, you would type the following:

cd c:\windows

* Type the following commands, pressing ENTER after each one. (Note that SYSTEM.DA0 and USER.DA0 contain the number zero.)

attrib -h -r -s system.dat
attrib -h -r -s system.da0
copy system.da0 system.dat
attrib -h -r -s user.dat
attrib -h -r -s user.da0
copy user.da0 user.dat

* Restart your computer.



Following this procedure will restore your registry to its state when you last successfully started your computer.

If all else fails, there is a file on your hard disk named SYSTEM.1ST that was created when Windows 95 was first successfully installed. If necessary you could also change the file attributes of this file from read-only and hidden to archive to copy the file to C:\WINDOWS\SYSTEM.DAT.

Windows NT
On Windows NT you can use either the "Last Known Good" option or RDISK to restore to registry to a stable working configuration.

How can I clean out old data from the Registry?
Although it's possible to manually go through the Registry and delete unwanted entries, Microsoft provides a tool to automate the process, the program is called RegClean. RegClean analyzes Windows Registry keys stored in a common location in the Windows Registry. It finds keys that contain erroneous values, it removes them from the Windows Registry after having recording those entries in the Undo.Reg file.
http://blog.tmcnet.com/beyond-voip/Registry%20Mechanic.jpg

Psychic 'mind-reading' computer will show your thoughts on screen

A mind-reading machine that can produce pictures of what a person is seeing or remembering has been developed by scientists.

The device studies patterns of brainwave activity and turns them into a moving image on a computer screen.

While the idea of a telepathy machine might sound like something from science fiction, the scientists say it could one day be used to solve crimes.

Leap forward: Halle Berry in X-Men. The telepathic abilities from the films are closer to reality after inventors created a mind-reading machine

In a pioneering experiment, an American team scanned the brain activity of two volunteers watching a video and used the results to recreate the images they were seeing.

Although the results were crude, the technique was able to reproduce the rough shape of a man in a white shirt and a city skyline.

Professor Jack Gallant, who carried out the experiment at the University of California, Berkeley, said: 'At the moment when you see something and want to describe it you have to use words or draw it and it doesn't work very well.

'This technology might allow you to recover an eyewitness's memory of a crime.'

The experiment is the latest in a series of studies designed to show how brain scans can reveal our innermost thoughts.


Using a functional magnetic resonance imaging (fMRI) scanner, normally found in hospitals, the American team scanned the brains of two volunteers while they watched videos.

The results were fed into a computer which looked for links between colours, shapes and movements on the screen, and patterns of activity in the brain.

The computer software was then given the brain scans of the volunteers as they watched a different video and was asked to recreate what they were seeing.

According to Dr Gallant, who has yet to publish the results of the experiment, the software was close to the mark.

In one scene featuring comic actor Steve Martin in a white shirt, the computer reproduced his white torso and rough shape, but was unable to handle details of his face.

In another, the volunteers watched an image of a city skyline with a plane flying past.

The software was able to recreate the skyline - but not the aircraft.

Transfer Music From Your Computer To Your PSP



PSP is one of the greatest gadgets today that features a music enhancement experience, as it integrates it with gaming. It gives the PSP owner a chance to optimize his or her gadget with easy music listening, complete with quality earphones that come from Sony. One can change it however, by their own choice of earphones or headphones as desired. PSP Music Downloads may be acquired from top sites that may have large databases of songs that may be transferred to your PSP. But before checking them out, you may want to know how to transfer files from your computer to your PSP.

Here are some steps:

1- Download music files and make sure that they are in these formats: .mp3, ATRAC3plus, .mp4, .wav or .wma. Music may also come from UMD’s (Universal Media Discs). If you are using Memory Stick Pro Duo, not all of these formats may work or be playable with your PSP.

2- If you already have your music files at hand, you may now transfer them to you PSP through: USB or Memory Stick. If you are going to use a USB cable, all you have to do is plug it into your computer and PSP. If you are going to use a Memory Stick transfer, just make sure you have a Memory Card Reader at hand.

3- If they have been successfully connected and you can see your PSP in the directories available, open the PSP File System. Make a folder, PSP, or any of your desire, and make subfolders inside of it, such as Music, Photos, Videos, etc.

4- Look for the files that you wish to transfer and copy them into the applicable folders. As so with this example, transfer your music files into the Music folder.

5- You may now disconnect your PSP from the computer and play your music files as you wish.

Steampunk Frankenstein PC Case Mod


We see plenty of Steampunk mods around, but this one surely takes things to a new level of insanity. Constructed by Dana Mattocks, the SteamPunk Frankenstein PC case mod 8 feet tall, and weighs over 400 pounds. The project apparently took a year to complete, and it shows.

Not opportunity for modification is pass up, with everything from the power button (a discreet brass valve) to the air intake (an old church floor vent) gets a neo-Victorian overhaul. While it looks like a wooden mainframe, its guts are pure high-end gaming. The dual Nvidia 8800 GTX system is watercooled throughout, keeping noise to a minimum.
















































Edelweiss PC Casemod

The Edelweiss PC is one of the first computers we've come across that seamlessly combines art and function. All its wires and cables are hidden, but its components are suspended out there for all to see.

Peer inside its smoked glass cover, and you'll see its innards, intertwined with tubing for its liquid cooling system. Check out that graduated cylinder on the outside holding some of the coolant. Stunning.