Pulangan Lumayan menanti Anda Hanya Klik di sini

WELCOME TO MY LATEST POST TODAY

Get the knowledge and open your mind how to up your level in global network Today all management highly dependent on the sophistication of Internet.

WELCOME TO MY LATEST POST TODAY

Get the knowledge and open your mind how to up your level in global network Today all management highly dependent on the sophistication of Internet.

WELCOME TO MY LATEST POST TODAY

Get the knowledge and open your mind how to up your level in global network Today all management highly dependent on the sophistication of Internet.

WELCOME TO MY LATEST POST TODAY

Get the knowledge and open your mind how to up your level in global network Today all management highly dependent on the sophistication of Internet.

WELCOME TO MY LATEST POST TODAY

Get the knowledge and open your mind how to up your level in global network Today all management highly dependent on the sophistication of Internet.

Wednesday 1 May 2013

Free download Assassins Creed Full Rip Version Game For Pc




Assassins Creed Revelations Game Free Download !
System Reuirements!
Intel Core 2 Duo E4300
 Ram 2 GB
Video card 256 MB
HDD : 12 GB of free Hard Drive

This Is Torrent File You Need Must be install utorrent.
Download in 783.70 MB
Or
Download 3.19 GB












Assassin's Creed 2 Game Free Download Full Version For Pc





Assassin's Creed 2 Game Free Download Full Version!
File Size: 4.18Gb
System Requirements!

Operating System: Windows XP or Vista
Processor: Dual Core 2.6 GHz Intel Pentium D or AMD Athlon 64 X2 3800+ (Intel Core® 2 Duo 2.2 GHz or AMD Athlon 64 X2 4400+ or better recommended)
Memory: RAM: 2 GB Windows XP / 3 GB Windows Vista
Video Card (graphics): Video Card: 256 MB DirectX 10.0-compliant video card or DirectX 9.0-compliant card with Shader Model 3.0 or higher
DirectX: DirectX 9.0 or 10.0 libraries (included on disc)
Hard Drive Space: 12GB Free Space
Sound Card: DirectX 9.0 or 10.0-compliant sound card (5.1 sound card recommended)
This Is A Torrent File.Install uTorrent For Download This Game


















Gta San Andreas B-13 NFS Game Free Download Full Version For Pc






 Gta San Andreas B-13 NFS Game Free Download Full Version For Pc!

System Requirements!
Windows Xp,7,Vista
Cpu: Intel Pentium 4
Hard: 8 GB
Ram: 1Gb
Video Memory:256 Mb 3d

Fifa 13 Free Download Pc Full Version




Fifa 13 Free Download Pc Full Version For Pc!
System Requirements!
Cpu: 1.8GHz
Ram: 2Gb
Vga:3d 256 Mb
Windows:7,Xp
Hard: 8 Gb


Download Full Version 
Download Game
And
Download Patch
Get Password=http://adf.ly/ODw8N




























Cisco Router Password in depth

Cisco Router Password in depth

Security is very important in order to save your network being hacked, though you would need physical security to your devices as well but passwords are absolutely the best defense against would-be hackers. Before starting this lab I would suggest you to read “Different modes and prompts of acisco router ios” where you can find a complete drill down of cisco routers ios prompts and modes being used in this lab, which could also help you understand upcoming labs easily.  Cisco router’s has some defense against would-be hackers built into its internetworking operating system (IOS). for example it is impossible to telnet into a cisco router unless an administrator configures  a telnet password  or uses the No Login Command which allows users to telnet router without any password. and also you won’t be able to get into privileged mode from telnet unless the enable password is set.

Five passwords are being used in order to secure a cisco router: Consol, auxiliary, telnet (VTY), enable password and enable secret. The enable secret and enable password are used to secure the privileged mode. The other three are used when a user wants to get into user mode through the Consol port, through the auxiliary port or via telnet.Now let’s take a look at each of them


Enable password:

To set the enable password you should get into global configuration mode using the following command.


Router>enable
Router#config t
Router(config)#

Once you get into global configuration mode you can set enable password using enable password [your password] command.

Router(config)#enable password welcometomyblogger

In above example we set mynetworkinglabs to be as an enable password. Now if you write enable from user configuration mode you will see the following prompt

Router>enable
Password:

Enable Secret:

This is the new encrypted password overrides enable password. To set enable secret use the following command

Router>enable
Router#config t
Router(config)#enable password welcometomyblogger
Router(Config)#enable secret ron123

In above lab we set enable password to be the same “welcometomyblogger” as it was before, and enable secret to be “waleed”. If you try to set the enable secret and enable password the same then router will give you a nice and polite prompt asking you to change the second password. If you don’t have the older legacy routers so don’t even bother to use the enable password. When entering the privileged mode router will first ask you to write the enable password and then the enable secret.

Console Password:

To configure a console user-mode password use the Line command from global configuration mode. There is only one console port on all router’s so command is line console 0
Here is an example:

Router#config t
Router(config)#line console 0
Router(config-line)#


Notice the prompt changes from Router(config)# to Router(config-line)# which tells you that you are configuring the Console, Aux or VTY line.
You can use two more commands to finish configuring the console user-mode password.

     Login: This tells router to look under console line configuration for password. If you do not use this command router will not prompt you for password while connecting to router’s console port.

     Password: This sets the password for console user-mode. It is case sensitive.
The complete command will look like this:

Router#config t
Router(config)#line console 0
Router(config-line)#login
Router(config-line)#password ron123

Aux or Auxiliary Password

On some routers, aux is called the auxiliary port, and on some it is called the aux port. To find the complete command-line name on your router, use a question mark with the Line command as shown:

Router(config)#line ?
< 0-4> First Line Number 
aux           Auxiliary line
console     Primary terminal line
vty           Virtual terminal

At this point, you can choose the correct command you need. Here is an example of setting the aux port on a Cisco router to prompt for a user-mode password with a console cable connected (this port can be used with or without a modem):

Router#config t
Router(config)#line aux 0
Router(config-line)#login
Router(config-line)#password cisco

VTY (Telnet)

The Virtual Teletype (VTY) lines are used to configure Telnet access to a Cisco router. As I mentioned earlier, the VTY lines must be configured for Telnet to be successful.
Here is an example of an administrator’s attempt to Telnet to a router that does not have the VTY lines configured:

Password not set, connection refused

This is the default on every Cisco router.
To configure the VTY lines, you must use the question mark with the command line 0
to determine the number of lines available on your router. The number varies with the type of router and the IOS version. However, five is the most common number of lines.

Router#config t
Router(config)#line vty 0 ?
<0-4>  Last Line Number
<cr>< br/>Router(config)#line vty 0 4
Router(config-line)#login
Router(config-line)#password cisco

Notice that you choose all the lines available for the most efficient configuration. You can set each line individually, but because you cannot choose the line you enter the router with when you Telnet, this can cause problems.
You can tell the router to allow Telnet connections without a password by using the No Login command:

Router(config)#line vty 0 4
Router(config-line)#no login

Encrypting your passwords

The Line command passwords (console, aux, and VTY) are not encrypted by default and can be seen by going into privileged EXEC mode and typing the command show running-config.
This “show running-config” displays the complete configuration that the router is running, including all the passwords. Remember that the Enable Secret password is encrypted by default, but the other four are not. To encrypt your passwords, use the global configuration command service password-encryption.

Here is an example of how to perform manual password encryption (as well as an example of how to set all five passwords):

Router#config t
Router(config)#service password-encryption
Router(config)#enable password waleed
Router(config)#line vty 0 4
Router(config-line)#login
Router(config-line)#password waleed
Router(config-line)#line con 0
Router(config-line)#login
Router(config-line)#password cisco
Router(config-line)#line aux 0
Router(config-line)#login
Router(config-line)#password khaliqi
Router(config-line)#exit
Router(config)#no service password-encryption
Router(config)#enable secret khaliqi
Router(config)#^Z

All of the passwords can be the same except the Enable Password and the Enable Secret passwords. You should make them different for security reasons, however.

Conclusion

It is extremely important to set your passwords on every Cisco router your company has. If you are studying for your Cisco certification exams, be sure you understand the passwords and how to set them. Remember the difference between the Enable Secret and the Enable password and that the Enable Secret password supercedes the Enable password if it’s set.

I have taken care in preparation of the content contained herein but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for any damages. Always have a verified backup before making any changes.
May peace be with you.





























Download Packet Tracer Version 5.3.3

My Networking Labs



Packet Tracer version 5.3.3 is a maintenance release that fixes functional and technical issues in the previous versions. It replaces Packet Tracer version 5.3.2. Packet Tracer 5.3.3 supports activities authored in Packet Tracer 4.x, 5.0.x, 5.1.x, 5.2.x, and 5.3.x. Please note that the last two courses of the CCNA Discovery and CCNA Exploration curricula require Packer Tracer version 4.11 at a minimum, CCNA Security requires version 5.2 at a minimum, and the Packet Tracer Skilled Based Assessments require version 5.3.2 at a minimum. the curricula are fully compatible with Packet Tracer 5.3.3.


supported Protocols:

This version of Packet Tracer Supports the following Protocols :

1)LAN: Ethernet (including CSMA/CD*), 802.11 a/b/g/n wireless*, PPPOE

2)Switching: VLANs, 802.1q, trunking, VTP, DTP, STP*, RSTP*, multilayer switching*, Etherchannel, LACP, PAgP

3)TCP/IP: HTTP, HTTPS, DHCP, DHCPv6, Telnet, SSH, TFTP, DNS, TCP*, UDP, IPv4*, IPv6*, ICMP, ICMPv6, ARP, IPv6 ND, FTP, SMTP, POP3, VOIP(H.323)

4)Routing: static, default, RIPv1, RIPv2, EIGRP, single-area OSPF, multi-area OSPF, BGP, inter-VLAN routing, redistribution

5)Other: ACLs (standard, extended, and named), CDP, NAT (static, dynamic, inside/outside, and overload), NATv6

6)WAN: HDLC, SLARP, PPP*, and Frame Relay*

7)Security: IPsec, GRE, ISAKMP, NTP, AAA, RADIUS, TACACS, SNMP, SSH, SYSLOG, CBAC, Zone-based policy firewall, IPS

8)Qos: Layer 2 Qos, Layer 3 Diffserv Qos, FIFO Hardware queues, Priority Queuing, Custom Queuing, Weighted Fair Queuing, MQC, NBAR

You can download both the Packet Tracer application and tutorial filed in one download package. However, due to the large file size it is faster to download the application by itself, if that is all you need. After Downloading and installing one of the following Type of Packet Tracer 5.3.3 which matches your OS, you will be able to start CCNA Tutorials. according to me you should start Practicing CCNA from Different Modes and Prompts of a Cisco Router IOS.
Choose the download option appropriate for your needs.






















Sunday 28 April 2013

HOW TO HACK WEP/WPA/WPA2 WI-FI PASSWORD






If you are living nearby someones WiFi hotspot and every time your laptop search for connection its showing up but you don't have passwords. Or you just want to steal someones WPA/WPA2 Wi-Fi hotspot key or passwords.

In this tutorial I’ll show How to hack a WPA/WPA2 Wi-Ficonnection through a bootable USB.
Things you should need:

1. A USB pen drive.
2. beini.iso file. [Download it from HERE or OTHER LINK].
3. UNetbootin software to make your USB drive bootable. [Download for Windows, Linux or Mac]

Some few steps you should to do ( WEP):

1. Write beini.iso on your USB by UNetbootin. Set everything according to this image bellow.


2. After finishing restart your PC and boot it from your USB.
3. If you were successful to boot up then you should see something like this. Click Minidwep-gtk.


4. Click OK.


5. Now Minipwep-gtk  program will open. Click Scan.


6. Select a wireless network ( should have Clint ) from the list. And click Lunch to start creaking process.


7. Sometimes its take a while according to your victim connections IVS value and password strength. So keep passions.


8. If it found a password, it should appear like this.


To crack WPA/WPA2 follow this image instruction.



Let me know if you have done it successfully or you have any complicity.


Download












































Thursday 25 April 2013

Download Snipper Ghost Warrior 2




Download Sniper Ghost Warrior 2 Full PC | XBOX 360 | PS3 Download
Sniper Ghost Warrior 2  Free PC | XBOX 360 | PS3 Game Download
Sniper Ghost Warrior 2 Full Download | Sniper Ghost Warrior 2 Download

Title: Sniper: Ghost Warrior 2 | PC | PS3 | Xbox 360
Developer: City Interactive
Publisher: City Interactive
Genre: Action
Platform: PC | PS3 | Xbox 360
Release Date: 13 March 2013
Language: English



Screens




400 MB Download Links: 

FileFactory Download Links: 

1 GB Download Links: Download From Any 1 Server 

FileZy Download Links: Rip 

Bitshare Download Links: 

FileParadox Download Links: 

UltraMegaBit Download Links: 

Uploaded Download Links: 

Rapidgator Download Links: 

HugeFiles Download Links: 

2 GB Download Links: Download From Any 1 Server 

Uploaded Download Links: 

uFox Download Links: 

Crack Only Download: 

Get Password rar download
Password: www.gloverzz.blogspot.com

Installation Notes: 
1) Download game 
2) Extract game 
3) Download crack 
4) Extract crack 

5) Copy all crack files to /Bin32/ in main game folder (Overwrite when prompted!) 

6) Play & Enjoy!

Don't Forget To Say Thanks If You Liked Us!! :)
Direct Download Sniper: Ghost Warrior 2 Setup File






Download PRO EVOLUTION SOCCER 2013 FULL VERSION PC




Description 

In Pro Evolution Soccer 2013, players are given greater freedom over ball control and the way players receive and trap the ball has been improved. Also in PES 2013, characters are more recognizable and the game is more balanced than ever before.

Features

PES Full Control: players will be giving greater freedom over ball control and the way players receive and trap the ball has been improved. For the first time players will be given the option to take manual control over their shots. Dribbling speed has been slowed to keep it more realistic, but using R2 will allow players to add “various styles to their close control”.

Player ID: Players are more recognisable in PES 2013, having signature attributes, skills and tricks. The intention is to make individual players feel unique and easily identifiable on the pitch. This also extends to the behaviour of goal keepers.

ProActive AI: PES 2013 promises to balance games even more. Teams will have greater organization in defence and attack, and will respond more quickly when they gain or lose possession.


System Requirements

OS: Windows 7 / Vista / XP
Processor: 3 GHz Intel Pentium 4, 2.0 GHz Intel Dual Core, AMD Athlon64 X2 OR better
Mamory: 1 GB XP / 2 GB Vista, Windows 7
Video/Graphics: 128 MB+ ATI Radeon X800, nVidia GeForce 7600, Intel HD Graphics 2000 OR better
Video Card Requirement: DirectX 9.0c compatible AND Shader model 2.0b OR better
Sound: DirectX 9.0c compatible sound card

Pro Evolution Soccer 2013-Black Box

DOWNLOAD :


http://adlock.in/GNV1c.part 1


http://adlock.in/jNOIQ.part 2
http://adlock.in/TlA2F.part 3

Monday 22 April 2013

NetResident analysis application designed to monitor, store, and reconstruct a wide range of network events and activities


NetResident is a network content analysis application designed to monitor, store, and reconstruct a wide range of network events and activities, such as e-mail messages, Web pages, downloaded files, instant messages, and VoIP conversations. NetResident uses advanced monitoring technology to capture the data on the network, saves the data to a database, reconstructs it, and displays the content in an easy-to-understand format.

NetResident helps organizations protect sensitive information and enforce security policies as well as adhere to government and industry information protection regulations by providing event-based network visibility and data leak detection and reducing the risks associated with uncontrolled information flow.

Download


Features


  • In-depth, real-time view of network traffic and storage of data in a database
  • Deep packet inspection: state-of-the-art technology for searching, identifying, and reconstructing many protocols and data types: HTTP, POP3, SMTP, FTP, News, VoIP (SIP, H.323), IM (MSN, Yahoo, ICQ, etc.), Web Mail (Gmail, Hotmail, etc.), Telnet
  • Customizable alerts: pop-ups, e-mail notifications, SNMP traps, to name a few
  • Fast search of the captured content
  • Log file import in many popular formats for post-capture forensic analysis: PCAP, CommView, etc.
  • Easy to use and deploy


How It Works

Click for more screen shots

NetResident is a software product that can be easily deployed by the organization's IT staff. Typically, it runs on a dedicated computer connected to the LAN's segment monitoring port (or stand-alone PC, if used for processing log files for post-capture security analysis). Once the product is installed, a setup wizard helps you configure NetResident in accordance with your intended usage and existing security policies and define the network hosts to be monitored.

While NetResident is similar to network analyzers in many respects, it focuses on high-level protocols that are used to transfer content over the Internet or LAN. With NetResident, you don't need a profound understanding of networking technologies and you don't have to use complex packet capturing and analysis software or hardware. A convenient application console presents a clear picture of all captured network events that can be grouped or sorted by different criteria.

Key Benefits

NetResident offers many benefits to your organization. Unlike many data loss detection solutions, NetResident can be quickly and easily deployed by the organization's network administrator and does not require substantial changes in the existing network infrastructure or software. A standard PC running NetResident can be configured, connected to the monitoring port, and monitoring within minutes.

By taking advantage of a 30-day free trial period, you can make sure that the solution fully meets your requirements before purchase. Small- and mid-sized businesses will appreciate the low cost of the software that by far beats competing solutions. The product price is far below the high costs of embarrassing data loss events that may happen in any organization.

Who Uses NetResident

NetResident is used by businesses for detecting sensitive information leaks, by government law enforcement and security agencies and private surveillance providers for lawful interception needs, by forensic experts for inspecting evidence and gaining crucial information needed for criminal investigations, and even by parents for monitoring their children’s communication on the Internet.


Download CommView for WiFi



CommView for WiFi is a powerful wireless network monitor and analyzer for 802.11 a/b/g/n networks. Loaded with many user-friendly features, CommView for WiFi combines performance and flexibility with an ease of use unmatched in the industry.


PRODUCT DOWNLOAD

Download





CommView for WiFi captures every packet on the air to display important information such as the list of access points and stations, per-node and per-channel statistics, signal strength, a list of packets and network connections, protocol distribution charts, etc. By providing this information, CommView for WiFi can help you view and examine packets, pinpoint network problems, and troubleshoot software and hardware.

Click for more screen shots

CommView for WiFi includes a VoIP module for in-depth analysis, recording, and playback of SIP and H.323 voice communications.

Packets can be decrypted utilizing user-defined WEP or WPA-PSK keys and are decoded down to the lowest layer. With over 70 supported protocols, this network analyzer allows you to see every detail of a captured packet using a convenient tree-like structure to display protocol layers and packet headers. Additionally, the product provides an open interface for plugging in custom decoding modules.

A number of case studies describe real-world applications of CommView for WiFi in business, government, and education sectors.

CommView for WiFi is a comprehensive and affordable tool for wireless LAN administrators, security professionals, network programmers, or anyone who wants to have a full picture of the WLAN traffic. This application runs on Windows XP / Vista/ 7 / 8 or Windows Server 2003 / 2008 / 2012 (both 32- and 64-bit versions) and requires a compatible wireless network adapter. To view the list of the adapters that have been tested and are compatible with CommView for WiFi, click on the link below:

SUPPORTED ADAPTERS
If your wireless card is not on the list, please click here for the technical information, or take advantage of our special offer and get a compatible adapter free of charge!

What you can do with CommView for WiFi




  • Scan the air for WiFi stations and access points.
  • Capture 802.11a, 802.11b, 802.11g, and 802.11n WLAN traffic.
  • Specify WEP or WPA keys to decrypt encrypted packets.
  • View detailed per-node and per-channel statistics.
  • View detailed IP connections statistics: IP addresses, ports, sessions, etc.
  • Reconstruct TCP sessions.
  • Configure alarms that can notify you about important events, such as suspicious packets, high bandwidth utilization, unknown addresses, rogue access points, etc.
  • View protocol "pie" charts.
  • Monitor bandwidth utilization.
  • Browse captured and decoded packets in real time.
  • Search for strings or hex data in captured packet contents.
  • Log individual or all packets to files.
  • Load and view capture files offline.
  • Import and export packets in Sniffer®, EtherPeek™, AiroPeek™, Observer®, NetMon, Tcpdump, hex, and text formats.
  • Export any IP address to SmartWhois for quick, easy IP lookup.
  • Capture data from multiple channels simultaneously using several USB adapters.
  • Capture A-MPDU and A-MSDU packets.
  • Simulate access points.
  • And much more!

Who needs CommView for WiFi


  • WLAN administrators.
  • Security professionals.
  • Home users who are interested in monitoring their WLAN traffic.
  • Programmers developing software for wireless networks.


An evaluation version is available in the Download Area.

To purchase this product, add it to the shopping cart (see the link at the top right corner of this page) or visit the Product Catalog. If you purchased this product in the past and would like to purchase an upgrade to the latest version, please visit the Upgrades page.

Sniffer® is a registered trademark of Network General Corporation. EtherPeek™ and AiroPeek™ and trademarks of WildPackets, Inc. Observer® is a registered trademark of Network Instruments, LLC. Microsoft®, Windows®, and Windows NT® are registered trademarks of Microsoft Corporation. Other product names and brand names are trademarks of their respective holders.

Sunday 21 April 2013

What Is Network Security



What is network security? How does it protect you? How does network security work? What are the business benefits of network security?

You may think you know the answers to basic questions like, What is network security? Still, it's a good idea to ask them of your trusted IT partner. Why? Because small and medium-sized businesses (SMBs) often lack the IT resources of large companies. That means your network security may not be sufficient to protect your business from today's sophisticated Internet threats.

What Is Network Security?

In answering the question What is network security?, your IT partner should explain that network security refers to any activities designed to protect your network. Specifically, these activities protect the usability, reliability, integrity, and safety of your network and data. Effective network security targets a variety of threats and stops them from entering or spreading on your network.



What Is Network Security and How Does It Protect You?

After asking What is network security?, you should ask, What are the threats to my network?

Many network security threats today are spread over the Internet. The most common include:

1.Viruses, worms, and Trojan horses
2.Spyware and adware
3.Zero-day attacks, also called zero-hour attacks
4.Hacker attacks
5.Denial of service attacks
6.Data interception and theft
7.Identity theft


How Does Network Security Work?

To understand What is network security?, it helps to understand that no single solution protects you from a variety of threats. You need multiple layers of security. If one fails, others still stand.

Network security is accomplished through hardware and software. The software must be constantly updated and managed to protect you from emerging threats.

A network security system usually consists of many components. Ideally, all components work together, which minimizes maintenance and improves security.

Network security components often include:

1.Anti-virus and anti-spyware

2.Firewall, to block unauthorized access to your network

3.Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks

4.Virtual Private Networks (VPNs), to provide secure remote access

5.What are the Business Benefits of Network Security?

With network security in place, your company will experience many business benefits. Your company is protected against business disruption, which helps keep employees productive. Network security helps your company meet mandatory regulatory compliance. Because network security helps protect your customers' data, it reduces the risk of legal action from data theft.

Ultimately, network security helps protect a business's reputation, which is one of its most important assets.

Learn how you can secure your business.

Friday 19 April 2013

Hack Windows Admin Password (With Different Ways)



Net User: Command Prompt

Windows command prompt utility Net User, can also be used to manipulate the user accounts in Windows. The commands are as follows:

1.To check the User Accounts: Net User
2.To Change the Password of User Account: Net User Username *
3.To Add a New User Account: Net User Username Password /add
4.To Delete a User Account: Net User Username /delete

Sticky Keys Backdoor

1.Sticky Keys application can be used as the Backdoor in Windows Operating System.

2.Command Prompt file ‘CMD.EXE’ can be renamed to ‘SETHC.EXE’ in C:\Windows\System32 Folder.

3.After this one can hit the Shift Key 5 times on the User Login Screen and will get the Command Prompt right there. Net User can be used to modify User Accounts thereafter.

Live Boot Disk Attack

1.Software: Active Password Recovery can be used to create Live Boot Disks for Windows Operating System.

2.Live Boot Disk can be used to start the Windows and access the SAM File.

3.Attacker can Remove the Passwords from the User Accounts or can set new Passwords on the Accounts.

Brute Force Attack

1.Brute Force Password Guessing is just what it sounds like: Trying a Random approach by Attempting Different Passwords and hoping that One works. Some logic can be applied by trying passwords related to the person’s name, job title, hobbies, or other similar items.
2.Brute force randomly generates passwords and their associated hashes.
3.There are Tools available to perform the Brute force attack on the Windows SAM File. One of the most famous of them is Cain and Able.

Privilege Escalation

1.Once the Administrator account is Cracked, one can easily Login with the Administrator User Account and Promote any User Account to give him the Administrator privileges.

2.One more thing which an attacker can do is to boot the computer from the Live CD and change the SAM file to promote any Limited User account to Administrator.

Some Useful Windows 7 Hacks and Tips




You recently upgraded your system to Windows 7, fell in love with the all new taskbar, and enjoyed the power of being able to use the very cool Libraries feature; but now you want to have some more. Is that right? If your answer is yes, you would be happy to learn that you are at right place. Here are some hacks, tips and tricks that would make your Windows 7 even more fun.

Remove Unwanted Programs From “Open with”

It is possible to remove all unwanted programs that appear every time you click on ‘Open with” option. To do that click on Start button, type regedit and press enter. This would open the system registry explorer. In the displayed window browse to HKEY_CLASSES_ ROOT > Applications; now you would be able to see a list of programs that are installed on your computer as subkeys.

In order to remove a program you do not want, right click on it and Choose New > String Value, and name it as "NoOpenWith".

Send To Expansion

Usually, you see only a limited number of choices on right clicking a folder and file and selecting “Send To”. However, when you hold down the Shift key as you right click, and then select “Send To”, you would be displayed an expanded menu containing Downloads, My Documents, and other useful locations.

Folder Toolbar

With this tweak, you would be able to turn any folder into a toolbar, which would give you an easy and quick access to the contents of that folder.

To do that, you would need to minimize all the open windows as the first thing. Next, you will have to move your mouse pointer to the Taskbar and then right-click it. Now, you should choose Toolbars from the displayed window and then select New Toolbar. This would launch the New Toolbar dialog.

Now you can browse to the folder you want to be used as a toolbar. Click OK to have your newly created toolbar appear as a button on Taskbar.

Active Windows

You can press Alt and Esc keys together to cycle through all the active items in the order you opened them and then you can press Alt plus Tab to select the window you want to work on.

Best Performance

To improve your PC performance, you can click on Start button and then right click on Computer; next go to Properties > Advanced system settings. Under Performance, click on Settings > Visual Effects. Select "Adjust for best performance".

Quick Access To Task Manager

Most of the users only know one way of accessing Task Manager and that is through pressing Ctrl + Alt + Del. However, there is a faster way to access it: right click on Taskbar and then choose Task Manager.

Change User Picture

To change the picture that appears next to your user name, click on Start button and click on top of your user picture. A dialog box will appear and select the option “Change your picture” from here; then you would be able to browse for pictures and select the picture you want to be used as your user picture and click OK to confirm.

Create Keyboard Shortcuts For Frequently Used Programs

Did you know Windows 7 allow you to create a keyboard shortcut for practically any program? To do so, you would need to right click on the program icon and select properties from the context menu that appears. Now you need to select the Shortcut tab and click on Shortcut key, to set your own keyboard shortcut for that particular program.

Search Internet From Start Menu

To enable Internet search from the Start Menu, type and run “GPEDIT.MSC” in the search box. This would start the Group Policy Editor. In the left pane of the window, you would see User Configuration; click here and then select Administrative Templates > Start Menu and Taskbar. In the right side of the pane, right-click to Edit & Enable Add Search Internet link to Start Menu.

How To Speed Up Menus In Windows XP?





This registry tweak will speed up your system menus, follow these steps:

1.Go to start> run> Type regedit

2. Go to the path HKEY_CURRENT_USER\ Control Panel\ Desktop

3.Locate the key called "MenuShowDelay".

4.It is probably set to 400.

5.Change that value to 150.

How To Add Administrator Account To Welcome Screen?




As normally we can't see administrator account in welcome screen, however we can open it on startup screen by pressing Ctrl+Alt+Del two times. But we can permanently add administrator account to welcome screen too, follow these steps:

1.Go to start> run> Type regedit

2.Go to the path HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon\ SpecialAccounts\ UserList

3.Right-click an empty space in the right pane.

4.Select New> DWORD Value Name the new value Administrator. Double-click this new value, and enter 1 as it's Value data.

5.Close the registry editor and restart your system.

How To Defragment Drives Using CMD?







Defragment is the utility designed to reduce the amount of fragmentation. It's must important for improving your computer efficiency. For defragment any drive using CMD, follow these steps:

1.Open command prompt.

2.Type defrag volume: (where volume is your drive name like c, d, e)

3.For more functionality of defragmenter using cmd, type defrag /?