Dec 12, 2008
Registry Trick v.1
Windows 95/98/ME :In these operating systems Registry is stored in these 5 files, with the Hidden, Read-only attributes for write-protection purposes, usually located in the %WinDir% folder (default is C:\Windows) .
* SYSTEM.DAT = stores persistent hardware and software settings related to the system it resides on, contained in the (HKEY_CLASSES_ROOT = Windows 95 and 98 only) and HKEY_LOCAL_MACHINE Hive keys.
* USER.DAT = stores user specific and software settings contained in the HKEY_CURRENT_USER Hive key. If more than one user, then multiple user profiles enable each user to have their own separate USER.DAT file, located in %WinDir%\Profiles\%UserName%. When a user logs on, Windows OS (down)loads both USER.DAT files: the one from the local machine %WinDir% (global user settings), and the most recent one from the local machine %WinDir%\Profiles\%UserName%, or from the central (host) server if user profiles reside on a network (local user settings).
* CLASSES.DAT = stores persistent data contained in the HKEY_CLASSES_ROOT Hive key, found only on Windows ME.
* SYSTEM.DA0 and USER.DA0 = automatically created backups of SYSTEM.DAT and USER.DAT from the last successful Windows GUI startup, and found only on Windows 95
Windows NT/2000/XP :Registration Database is contained in these 5 files located in the %SystemRoot%\System32\Config folder (default is C:\Winnt\System32\Config for Windows NT/2000 or C:\Windows\System32\Config for Windows XP):
* DEFAULT = stores the HKEY_USERS\.Default key.
* SAM = stores the HKEY_LOCAL_MACHINE\Sam key.
* SECURITY = stores the HKEY_LOCAL_MACHINE\Security key.
* SOFTWARE = stores the HKEY_LOCAL_MACHINE\Software key.
* SYSTEM = stores the HKEY_LOCAL_MACHINE\System key and the HKEY_CURRENT_CONFIG Hive key,
these files located in the %SystemRoot%\Profiles\%UserName% folder:
* NTUSER.DAT and USRCLASS.DAT (Windows XP only) = store the HKEY_CURRENT_USER Hive key,
Editing Registry
Always make sure that you know what you are doing when changing the registry or else just one little mistake can crash the whole system. That's why it's always good to back it up!
To view the registry (or to back it up), you need to use the Registry Editor tool. There are two versions of Registry Editor:
:To modify the Registry, you need to use a Registry Editor:
* Regedit.exe (Windows 95/98/ME/NT/2000/XP) = located in %WinBootDir% (%SystemRoot%) has the most menu items and more choices for the menu items. You can search for keys and subkeys in the registry.
* Regedt32.exe (Windows NT/2000/XP) = located in %SystemRoot%\System32,enables you to search for strings, values, keys, and subkeys. This feature is useful if you want to find specific data.
Registry Structure
For ease of use, the Registry is divided into five separate structures that represent the Registry database in its entirety. These five groups are known as Keys, and are discussed below:
HKEY_CURRENT_USER
This registry key contains the configuration information for the user that is currently logged in. The users folders, screen colors, and control panel settings are stored here. This information is known as a User Profile.
HKEY_USERS
In windowsNT 3.5x, user profiles were stored locally (by default) in the systemroot\system32\config directory. In NT4.0, they are stored in the systemroot\profiles directory. User-Specific information is kept there, as well as common, system wide user information.
HKEY_LOCAL_MACHINE
This key contains configuration information particular to the computer. This information is stored in the systemroot\system32\config directory as persistent operating system files, with the exception of the volatile hardware key.
HKEY_CLASSES_ROOT
The information stored here is used to open the correct application when a file is opened by using Explorer and for Object Linking and Embedding. It is actually a window that reflects information from the HKEY_LOCAL_MACHINE\Software subkey.
HKEY_CURRENT_CONFIG
The information contained in this key is to configure settings such as the software and device drivers to load or the display resolution to use. This key has a software and system subkeys, which keep track of configuration information.
REG Files
.REG file, which can be in:
* plain text/ASCII format in Windows 95/98/ME and NT/2000/XP or
* binary format in Windows 2000/XP.
Text .REG files can be easily viewed/created/edited by hand using any text/ASCII editor, like Notepad
Their purpose is to add, modify or delete Registry (Sub)Keys and/or Values.
Writing .Reg Files
1.) Header line: this FIRST line is mandatory. MUST contain only these exact words (case sensitive = character capitalization required!):
* REGEDIT4 = for Windows 95/98/ME and NT 4.0 or
* Windows Registry Editor Version 5.00 = for Windows 2000/XP.
This is the only way Windows OS can recognize, validate and run a .REG file.
2.) Empty (blank) line: this second line is optional. Similar to inserting a carriage return (CR).
3.) Remarked (comment) line(s): optional. MUST begin with a semicolon (;) which may be followed by a space (optional). May be inserted anywhere in the .REG file, but NOT before the header, which MUST be present as FIRST line.
4.)(Sub)Key line: MUST be preceded and terminated by square parenthesis ([]). (Sub)Key name MUST start with the Hive Key name (left end) and MUST contain entire Subkey pathway leading to the current Subkey name (right end). Consecutive (Sub)Key names MUST be separated by SINGLE backslash marks (\).
(Sub)Key names not present in the Registry will be automatically created when the REG file is merged into the Registry. Exception: new Hive (Root) Keys can be created ONLY in Windows NT4/2000/XP, but NOT in Windows 95/98/ME.
5.) Value line: MUST contain these elements in this exact order:
* Value name: MUST be preceded and terminated by quotation marks ("").
* Equal mark (=): separates Value name from Value type.
* Value type: MUST be specified (Dword [REG_DWORD], Binary [REG_BINARY], etc) if Value type other than String [REG_SZ].
* Colon mark (:): MUST exist if Value type other than String.
* Value data: MUST be in the same format as defined by Value type: text/ASCII, Unicode/ANSI, (alpha)numeric (decimal, hexadecimal or binary) etc. MUST be preceded and terminated by quotation marks ("") ONLY IF Value type is String.
Value Data syntax
o String Value [REG_SZ] (API Code 1):
"ValueName"="ValueData"
Value Data is expressed here in Unicode or ANSI formats: simple text/ASCII, expanded or extended.
o Dword Value [REG_DWORD] (API Code 4):
"ValueName"=ValueType:ValueData
Value Data is expressed here in Double WORD (4 bytes = 32 bits) formats: decimal, hexadecimal or binary.
o Large Binary (hex) Value (any Binary Value API Code):
"ValueName"=ValueType(API Code):ValueData,ValueData,\
ValueData,ValueData
Large Values can span onto more than one line. Each line (except the last one) is terminated by a comma (,) followed by a SINGLE backslash mark (\). Consecutive lines are separated by carriage returns (CR).
Separators and delimiters used in REG files on path name lines to separate drive letters, directory (folder) names and file names, or used on command line parameters lines etc... MUST be typed as DOUBLE backslash marks (\\).
6.) Empty (blank) line: this LAST line is mandatory for proper operation. Similar to inserting a carriage return (CR) at the end of file.
This is how a generic text/ASCII .REG file looks like:
REGEDIT4
; Comment line:
[HKEY_KEY_NAME\SubkeyName1\SubKeyName2]
; String Value format:
"ValueName"="ValueData"
; Dword or Binary Value format:
"ValueName"=ValueType:ValueData
Example of actual .REG file:
REGEDIT4
; First Value below displays MS Windows version:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion]
; String Value format:
"Version"="Windows ME"
; Dword Value format:
"CacheWriteDelay"=dword:00000320
; Binary Value format:
"OldWinVer"=hex:00
Open and Run 32-bit Command Prompt in 64-bit Windows
To reduce compatibility issue and prevent a 32-bit program from accidentally accessing data from 64-bit application, WOW64 subsystem isolates 32-bit binaries from 64-bit binaries by redirecting registry calls and some file system calls. Other than separate registry hive for WOW64 redirected 32-bit values, %systemroot%\System32 and Program Files folder is designated as 64-bit DLLs only too, and all access or I/O of 32-bit binaries been redirected from %windir%\System32 folder to the %windir%\SysWOW64 folder, and from Program Files to Program Files (x86) directory.
The command prompt (cmd.exe) is also affected by File System Redirection feature, where command line commands or .bat and .cmd batch script may not be able to access, install, change, modify, delete or write to “Program Files” or “%windir%\System32″ folder. The WOW64 subsystem redirects and installs 32-bit programs in the “Program Files (x86)” and “%systemroot%\SysWOW64″ folder.
To access the correct folder, programmer or developer must change the command-line script, or using Sysnative virtual directory alias to access %windir%\System32 instead of %windir%\SysWOW64. When this is not possible, or when have to access original native Program Files folder, user can type the command-line script at a 32-bit command prompt. The 32-bit command prompt automatically redirects file system calls to the correct 32-bit directory.
To start and open a 32-bit command prompt, follow these steps:
- Click Start.
- Type %windir%\SysWoW64\cmd.exe in Start Search box.
Alternatively, press Win + R keys (or type Run in Start Search) to open Run dialog, and type %windir%\SysWoW64\cmd.exe.
- Press Enter.
Dec 10, 2008
Blog in Google and Yahoo
publish with us are on the point as possible in order to disseminate the many blogs that we know miliki.Maka not surprising that initial question often asked blogger beginner conscious of the importance terindeks by the blog search engine is "how to register to the Google / Yahoo!." Both search engine called the new site is the leading search referrals. Of course, many who already take advantage of search engines Google and Yahoo, right? of course also be aware of ampuhnya their ability to support the publication's more luas.Nah, agree to conduct when the registration was to search engines, the following ways we can:
1. Sign up to Google.Open address the following link: http://www.google.com/addurl/Input your URL address, keyword (in the Comments column) and input rangkain letter for verification.
2. Sign up to Yahoo.Buka the following address: https: / / siteexplorer.search.yahoo.com / submitNamun required to register for Yahoo is we must have a Yahoo account. So when we will open the address above will be prompted to log (logged) dahulu.Masukan first blog URL address in the column tertayang as follows:
Dec 8, 2008
Computer Tips and Tricks
It is no great mystery that major shifts in cultural and societal processes are marked with new advances in technology. This is also true of information technology. The printing press, the camera, the telephone, the computer, the Internet and the cell phone, are all inextricably linked to major changes in human culture. The printing press is linked to the rise of social movements. The photograph and telephone are linked to the birth of the Industrial Revolution. The advent of early computers and television coincides with the first steps towards global consortiums like the League of Nations. Information media changes how we perceive the world around us. The following profiles are two examples of current media that are expected to make a difference in how information is generated and perceived.
ComputerBigLab.com has been designed as a free introductory level, online computer related website, providing tutorials on computer hardware, software, operating systems, and basic troubleshooting, IT glossary, IT certifications and IT interview questions and answers.
If you just want to learn more about your computer's hardware, networking, Certifications and other IT related information, here's a good place to start! Read the tutorials, then try the exercises and computer Tests provided. If you have trouble with the review questions, tutorials or any other please let us know.
The computer computer tips, Interview questions, networking and Free tests may also be helpful for those preparing for Certifications exams, preparing for the interview of computer related jobs, and for students, teachers and the IT professionals.
ComputerBigLab.com intended to help all the students, teachers, & other computer / IT professionals of the Computer Science & Computer Technology Field. We have sorted out much information to help them all.
We are continuously updating our website. If you have any questions, suggestions and feedback please let us know.
We can improve our website in a very progressive way with your help. Your feedback is always welcomed.
Computer Science and Computer Technology has become the vital part of the education throughout the world.
Computer training is possible through formal education attending one of the many colleges or university offering both IT and computer science programs.
The study skills lesson plans should be so structured that it is dynamic and capable of being altered to suit the student’s growing and changing needs. This helps to make the students more focused in their approach, as they are continually involved in the process of change. After all the students are the ultimate beneficiaries. This however does not mean that the content can be ignored. There should be adequate coverage of any topic so that a certain degree of mastery is indicated.
Build Computer
The first step in building a computer is to find a nice sized clean workspace. The next thing you must do it to lay everything out on the table so that when it is needed it is close.
Before going any further open the box for the motherboard and remove the manual from the box. The manual will tell you everything you need to know about building the computer. Not reading the manual for the motherboard before starting to build your PC is like gambling in a casino at the craps table, without knowing the rules for craps, and you would not play a casino table game without knowing the gambling Expresion or the rules for that game would you?
Take the computer case and open the side panel. This will open the space you will be building the computer in. before touching any of the actual computer components make sure you have attacked your anti static line to your workspace and your wrist, a shock from your hand to one of the computer components can damage them permanently.
With the computer case you will have a bag of screws. In this bag are some posts, place the mother board in the case just to see where the holes line up, and in each of the holes place a post screw. These posts are used as spacers so that the motherboard does not sit directly on the computer case.
After putting in the posts, the mother board can be placed on top of them and screwed into place. When screwing in the motherboard make sure to use the paper washers on each of the screws attaching the motherboard to the case.
Now you can carefully open the processor box and remove it, carefully line up the cutout in the processor with the one in the motherboard, and gently put the processor in place. Once the computers processor is on the motherboard, make sure to lock it, to stop it from moving.
Before you can put on the heat sink and fan you must put on a layer of thermal glue to the back of the processor, this glue makes sure the heat flows from the processor to the heat sink and fan. Without this glue the processor will over heat and burn out fast.
Most modern motherboards have a Nic card, video card and sound card as part of the mother board. This make is much easier to build the computer because that is 3 less things that have to be purchased or installed.
Now you can install the Ram. This is done by locating the cut out of the ram chip and lining it up with the slot for the ram on the mother board. If you are not sure where to install the ram make sure to check the motherboards manual it will show you exactly where to install the ram.
Now all that is left is the hard drive CD Rom drive and some wires connecting the computers on and off button to the motherboard.
The mother board will come with the cables you need to install your heard drive and your CD Rom drive. It is simple to do just plug one end of the cable into its place on the motherboard and the other end to the device you are attaching; it is as easy as playing Keno.
There will still be 4 or 5 wires that will need to be hooked up from the case to the motherboard. These wires are for the on and off button the reset button and the power lights on the computers case.
By reading the manual and following the directions you can build a computer in about an hour.
Trevor Green has a degree in computer science, but likes to write reviews forOnline Cassionbecause of his passion for Craps and other online casino games.
Remote Blog or Self Hosted Blog?
Who offers free blog hosting?
Many sites offer free blog hosting. Among them are Forumer, Blogger, BlogEasy, Aeonity, BlogThing and Blogates. A quick search for “free blog” on Google reveals many possibilities.
What software can I use to host my own blog?
Like free blog hosting, there are many possibilities for software that makes hosting your own blog easy. Most of them are free to use. These include:
WordPress(the most popular software)
- Apache Roller
- Blosxom
- Geeklog
- Textpattern
- LifeType
There is also blog software which you can purchase for use on your site. These include:
- Community Server
- Movable Type
- Radio UserLand
One negative about using software and hosting your own blog is that the process can often times be complicated. You have to download the software and install it to your server, which doesn’t always go easily. It’s particularly hard for those who don’t have a lot of experience installing things on servers.
Why should I remotely host my blog at a place like Blogger?
Places like Blogger allow you to host your blog there. It’s a good option for many people.
The Pros
• It’s easy to set up and maintain a blog. You don’t have to go through the trouble of installing software and configuring it to work on your server. All you have to do is sign up for an account and start posting.
• It’s friendly for beginning bloggers. Sites that host blogs offer good tutorials on how to make your blog postings, so that even someone who is completely new to the concept of blogging can do it easily.
• Most blog hosting sites are completely free to use. There is no need to pay for things like a domain name and hosting.
• Monetizing your blog is easy. Rather than having to manually put HTML/Javascript codes on your blog to manually set up things like AdSense and Pay Per Click advertising, you can select an option on most blog hosting sites that does much of the work for you.
The Cons
• You don’t have as many options to customize your blog. Remotely hosted blogs are admittedly somewhat limited in terms of what you can actually do on them. You have to stick with what is provided to you in terms of look and features.
• The URL you get is always yourname.BLOGSITE.com. You don’t get to have a custom domain name like YOURNAME.com. This can possibly hurt traffic to your blog.
• Blogs hosted on free blog sites don’t look as professional as self hosted blogs.
Why should I self-host my blog?
The Pros
• You have more options and more flexibility. You are able to tweak the blog to your liking.
• Your URL is your address for your blog. Rather than having go to where your blog is hosted to read it, they can read it right from your site.
• The ability to make your blog look professional. Blogs that are hosted on sites of their own tend to look a lot better than those hosted on free sites.
• More space for your blog. Free blog sites usually place a restriction on how much space you have for things like photos and music. By hosting your own blog, you are able to use as much space as you need.
The Cons
• There are sometimes problems with setting up blog software to run on your site and server. If you aren’t experienced when it comes to working with mySQL, the process will be hard.
• Updates aren’t as easy to post.
• You have to manually set up programs to monetize your blog. However, if you are good with HTML/Javascript, this shouldn’t be too hard.
• You have to pay for your own hosting and domain
As you can see, there are pros and cons to both. Which should you choose? Well, it depends on who you are and what you intend to use your blog for. If you intend to use it for business, then a self-hosted blog is the best idea. If it’s a personal blog, then a free hosted blog will probably be fine for you.
Closely examine all of the pros and cons mentioned above. That way, you’ll be able to make the best decision for you!