Windows Hacking
Windows Hacking
____________
____________
Windows
Windows Hacking
“Be the boss
the boss of your computer”
crack all
all cool stuff of windows
windows
Wor
orks
ks on Windows 7 and 8
____
__________________________
___________________________
_
D i s c l a i m e r
This book has been published for education purpose only. It does not in deem to legitimize certain steps that may be
illegal
illegal under applicable law and organization policies in different parts of the world. This book does not contain any
legal permission on what may be deemeddeeme d as legal. Readers are advised to examine the privacy policy, organization
policies
policies and the laws of of respective countries before taking their own decisions. They cannot rely on the present
publication as a defence in any proceeding. The publisher and author are not liable for any steps that a reader may take
based
based on this publication and are not responsible for any steps that may have been taken after reading the publication.
Microsoft
Microsoft Windows and any other marks used (Pictures,
(Pictures, Screen Shots, etc.) have been used descriptively as the marks
are owned by third parties.
__________________________
______________________________________
______________
__
Content
Click the below headings for fast travel
__________________________
______________________________________
______________
__
CHAPTER 1 : INTRODUCTION TO HACKING
1.1 Hacking
1.2 Hacker
1.3 Classifications of Hacker
1.4 Types of hacking attacks and techniques
1.5 Password
CHAPTER 2 : WINDOWS HACKING
2.1 Introduction to Windows Hacking
2.2 Registry Editor Related Hacking
What is Windows Registry? (Registry Editor)
Back up the registry
Ultra-speed Shutdown of Windows 7
Change the log-on screen of Window
Windowss 7
Disable or Enable USB Ports / USB drive / Pen-Drive in
i n Windows 7
How to Display Legal Notice on Start up of your Windows
Faster Thumbnail Previews
Disable Right-Click
How to Disable or Enable Folder Options in Windows 7
______
____________
____________
Windows
Windows Hacking
“Be the boss
the boss of your computer”
crack all
all cool stuff of windows
windows
Wor
orks
ks on Windows 7 and 8
____
__________________________
___________________________
_
D i s c l a i m e r
This book has been published for education purpose only. It does not in deem to legitimize certain steps that may be
illegal
illegal under applicable law and organization policies in different parts of the world. This book does not contain any
legal permission on what may be deemeddeeme d as legal. Readers are advised to examine the privacy policy, organization
policies
policies and the laws of of respective countries before taking their own decisions. They cannot rely on the present
publication as a defence in any proceeding. The publisher and author are not liable for any steps that a reader may take
based
based on this publication and are not responsible for any steps that may have been taken after reading the publication.
Microsoft
Microsoft Windows and any other marks used (Pictures,
(Pictures, Screen Shots, etc.) have been used descriptively as the marks
are owned by third parties.
__________________________
______________________________________
______________
__
Content
Click the below headings for fast travel
__________________________
______________________________________
______________
__
CHAPTER 1 : INTRODUCTION TO HACKING
1.1 Hacking
1.2 Hacker
1.3 Classifications of Hacker
1.4 Types of hacking attacks and techniques
1.5 Password
CHAPTER 2 : WINDOWS HACKING
2.1 Introduction to Windows Hacking
2.2 Registry Editor Related Hacking
What is Windows Registry? (Registry Editor)
Back up the registry
Ultra-speed Shutdown of Windows 7
Change the log-on screen of Window
Windowss 7
Disable or Enable USB Ports / USB drive / Pen-Drive in
i n Windows 7
How to Display Legal Notice on Start up of your Windows
Faster Thumbnail Previews
Disable Right-Click
How to Disable or Enable Folder Options in Windows 7
Clean up the “Open With” Menu in Explorer
Add Recycle Bin to My Computer in Windows 7
Add Control Panel to My Computer in Windows 7
2.3 Local Group policies related hacking
Want to know: What happened in your absences on your PC?
How to Disable Shutdown, Restart, Sleep and Hibernate
How to Disable Access to the Registry in Windows 7
Prevent access to the command prompt
How to show or hide Control Panel items in Windo
Windows
ws 7
How to Disable Control Panel in Windo
Windowsws 7
Disable Windows Hotkeys
_______________________________________
INTRODUCTION TO HACKING
_______________________________________
1.1 Hacking
The word “hacking” has two definitions. The first definition refers to the
hobby/profession of working with computers. The second definition refers to modifies
computer hardware or software in a way that changes the creator’s original intent.
Hacking is the art of exploiting computers to get access to otherwise unauthorized
information. Now that the world is using IT systems to gather, store and manipulate
important information there is also a need to make sure that data is secure. However, no
system is without is problems. Holes are often present within security systems which, if
exploited, allow hackers to gain access to this otherwise restricted information.
Computer Hackers have been around for so many years. Since the Computer and Internet
became widely used in the World, We have started to hear more and more about hacking.
1.2 Hacker
As the word ‘Hacking’ has two meaning, so the word ‘Hacker’ is a word that has two
meanings:
Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems.
Hackers enjoy Exploring and Learning how Computer systems operate. They love
discovering new ways to work electronically.
Recently, Hacker has taken on a new meaning that someone who finds weaknesses in a
computer or computer network, though the term can also refer to someone with an
advanced understanding of computers and computer networks.
Normally, Hackers are people who try to gain unauthorized access to your computer.
With controversy, the term hacker is reclaimed by computer programmers who argue that
someone breaking into computers is better called a cracker, not making a difference
between computer criminals (black hats) and computer security experts (white hats). Some
white hat hackers claim that they also deserve the title hacker, and that only black hats
should be called crackers.
1.3 Classifications of Hacker
There are many more types of hackers in the world according to their motive and type of
work. The following list forwards one mote steps to better knowing hackers.
White Hat hacker (Left) : Grey Hat hacker (Middle) : Black Hat hacker (Right)
White hat hacker
The term “White hat hacker” refers to an ethical hacker, or a computer security expert,
who specializes in penetration testing and in other testing methodologies to ensure the
security of an organization’s information systems. Ethical hacking is a term coined by
IBM meant to imply a broader category than just penetration testing. White-hat hackers
are also called penetration tester, sneakers, red teams, or tiger teams. Generally, White hat
hackers or ethical hackers are the good guy in the world of hackers.
Black hat hacker
A black hat hacker is an individual with extensive computer knowledge whose purpose is
to breach or bypass internet security. Black hat hackers are also known as crackers or
dark-side hackers. The general view is that, while hackers build things, crackers break
things. They are computer security hackers that break into computers and networks or also
create computer viruses. The term “black hat” comes from old westerns where the bad
guys usually wore black hats.
Black hat hackers break into secure networks to destroy data or make the network
unusable for those who are authorized to use the network.
They choose their targets using a two-pronged process known as the “pre-hacking stage”.
Step 1: Targeting
Step 2: Research and Information Gathering
Step 3: Finishing the Attack
Grey hat hacker
A grey hat hacker is a combination of a black hat and a white hat hacker. It may relate to
whether they sometimes arguably act illegally, though in good will, or to show how they
disclose vulnerabilities. They usually do not hack for personal gain or have malicious
intentions, but may be prepared to technically commit crimes during the course of their
technological exploits in order to achieve better security.
Elite hacker
A social status among hackers, elite is used to describe the most skilled. Newly discovered
activities will circulate among these hackers.
Script kiddie
A script kiddie (or skiddie) is a non-expert who breaks into computer systems by using
pre-packaged automated tools written by others, usually with little understanding of the
underlying concept hence the term script (i.e. a prearranged plan or set of activities) kiddie
(i.e. kid, child an individual lacking knowledge and experience, immature).
Neophyte
A neophyte, “n00b”, or “newbie” is someone who is new to hacking or phreaking and has
almost no knowledge or experience of the workings of technology, and hacking.
Blue hat
A blue hat hacker is someone outside computer security consulting firms who is used to
bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft
also uses the term BlueHat to represent a series of security briefing events.
Hacktivist
A hacktivist is a hacker who utilizes technology to announce a social, ideological,
religious, or political message. In general, most hacktivism involves website defacement
or denial-of-service attacks.
Nation state
It refers to Intelligence agencies and cyber warfare operatives of nation states.
Organized criminal gangs
Criminal activity carried on for profit.
Bots
Automated software tools, some freeware, available for the use of any type of hacker.
1.4 Types of hacking attacks and techniques
A typical approach in a hacking attack on Internet-connected system is:
Network enumeration:D iscovering information about the intended target.
Vulnerability analysis: Identifying potential ways of attack.
Exploitation: Attempting to compromise the system by employing the vulnerabilities
found through the vulnerability analysis.
In order to do so, there are several recurring tools of the trade and techniques used by
computer criminals and security experts.
Security exploits
Password cracking is the process of recovering passwords from data that has been stored
in or transmitted by a computer system. A common approach is to repeatedly try guesses
for the password.
Packet sniffer
A packet sniffer is an application that captures data packets, which can be used to capture
passwords and other data in transit over the network.
Spoofing attack (Phishing)
A Trojan horse is a program which seems to be doing one thing, but is actually doing
another. A trojan horse can be used to set up a back door in a computer system such that
the intruder can gain access later. (The name refers to the horse from the Trojan War, with
conceptually similar function of deceiving defenders into bringing an intruder inside.)
Viruses
A virus is a self-replicating program that spreads by inserting copies of itself into other
executable code or documents. Therefore, a computer virus behaves in a way similar to a
biological virus, which spreads by inserting itself into living cells. While some are
harmless or mere hoaxes most computer viruses are considered malicious.
Worms
Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that
it propagates through computer networks without user intervention. Unlike a virus, it does
not need to attach itself to an existing program. Many people conflate the terms “virus”
and “worm”, using them both to describe any self-propagating program.
Key loggers
A key logger is a tool designed to record (‘log’) every keystroke on an affected machine
for later retrieval. Its purpose is usually to allow the user of this tool to gain access to
confidential information typed on the affected machine, such as a user’s password or other
private data. Some key loggers uses virus, trojan, and rootkit-like methods to remain
active and hidden. However, some key loggers are used in legitimate ways and sometimes
to even enhance computer security. As an example, a business might have a key logger on
a computer used at a point of sale and data collected by the key logger could be used for
catching employee fraud.
1.5 Password
A password is a secret series of characters that enables a user to access a file, computer, or
program. On multi-user systems, each user must enter his or her password before the
computer will respond to commands. The password helps ensure that unauthorized users
do not access the computer. In addition, data files and programs may require a password.
Ideally, the password should be something that nobody could guess. In practice, most
people choose a password that is easy to remember, such as their name or their initials.
This is one reason it is relatively easy to break into most computer systems.
Strong Password
Strong Password refers to a password that is difficult to detect by both humans and
computer programs, effectively protecting data from unauthorized access. It consists of at
least six characters (and the more characters, the stronger the password) that are a
combination of letters, numbers and symbols (@, #, $, %, etc.) if allowed. Passwords are
typically case-sensitive, so a strong password contains letters in both uppercase and
lowercase. Strong passwords also do not contain words that can be found in a dictionary
or parts of the users own name.
Weak password
A weak password refers to a password that is easy to detect both by humans and by
computer. Examples of a weak password are names, birth dates, phone numbers, easy
guessable word, etc.
____________________________________
WINDOWS HACKING
____________________________________
2.1 Introduction to Windows Hacking
Windows hacking is the practice of modifying Windows Operating System to accomplish
a goal outside of the creator’s original purpose. People who engage in hacking activities
are often called hackers. Since the word “hack” has long been used to describe someone
who is incompetent at his/her profession, some hackers claim this term is offensive and
fails to give appropriate recognition to their skills. Windows hacking is most common
among teenagers and young adults, although there are many older hackers as well.
2.2 Registry Editor Related Hacking
What is Windows Registry? (Registry Editor)
Tips:
You must be logged on as an administrator to perform these steps. If you aren’t
logged in as an administrator, you can only change settings that apply to your user
account.
Although you can back up more than just the registry key or subkey that you are
modifying, doing so adds to the size of the backup file.
NOTE: If you have problems with programs from your computer shutting down too
quickly, then repeat the above steps and increase the time (Step 5) a bit.
Change the log-on screen of Windows 7
1. Press Windows Logo key + R to open Run, type regedita nd press Enter.
2. Go to:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Aut
LogonUI\Background
3. Double-click the OEMBackground DWORD key and Set value of the key to 1.
4. Select a background image for logon screen with size less than 256 KB and Rename
that image as BackgroundDefault.
5. Copy that image, Open My Computer and go to
C:\Windows\system32\oobe\info\backgrounds folder
6. Paste it and select Copy and Replace.
Tips: Cut and paste the original log-on Screen image in a folder for further use.
7. Reboot, and now your logon image would have changed.
Tips: If NoViewContextMenudoesn’t exist then you can create it. Right click in the right-
hand pane; select New, then DWORD (32-bit) Valuef or 32 bit on Windows 7.
How to Disable or Enable Folder Options in Windows 7
Disable Folder Options in Windows 7
1. Click the Start button, and type regedit in the search box.
2. Browse the list as
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current
Version\Policies\Explorer
Tips: Backup your registry first just in case, so you can roll-back any changes you make if
you accidently delete the wrong value.
2. Now, browse to the following key:
HKEY_CURRENT_USER \Software \Microsoft \Windows \CurrentVersion \
Explorer \FileExts\
3. Now, you will see a list of all the file extensions that are registered on your computer.
4. Browse to the file extension you wish to edit, click the white triangle beside it to see
the subfolders, and select OpenWithList. In our test, we want to change the
programs associated with PDF files, so we select the OpenWithList folder under
.pdf .
5. Notice the names of the programs under the Data column on the right. Right-click
the value for the program you don’t want to see in the Open With menu and select
Delete.
6. Click Yes at the prompt to confirm that you want to delete this value.
7. Repeat these steps with all the programs you want to remove from this file type’s
Open with menu. You can go ahead and remove entries from other file types as well
if you wish.
8. Restart the computer and check out the Open with menu in Explorer again. Now it
will be much more streamlined and will only show the programs you want to see.
4. Name the key with the following text as shown in the below figure
{26EE0668-A00A-44D7-9371-BEB064C98683}
Or
{21EC2020-3AEA-1069-A2DD-08002B30309D}
Tips:
Category View
{26EE0668-A00A-44D7-9371-BEB064C98683}
Icon View
{21EC2020-3AEA-1069-A2DD-08002B30309D}
3. Click on Windows Log and then double-click on System in the left-hand column for
a list of events.
4. Look for a date and time when you weren’t home and your computer should have
been off. Double click on the eg: Information and it will show u the detail.
Tips: You can also use this log to see how long someone was on the computer. Just look at
the time the computer was turned on and off for that day.
How to Disable Shutdown, Restart, Sleep and Hibernate
Someday, you might want to make a computer could not be turned off easily. For example
because you are running a program that needs a long time to wait (download a big file,
rendering a video, etc.) and you have to leave the room. To prevent anyone else to turn off
the computer, then one way is to disable the function of Shutdown, Restart, Sleep or
Hibernate menu.
Follow these easy steps to disable Shutdown, Restart, Sleep and Hibernate:
1. Click Start button, type gpedit.msc in the Start menu’s search box and then press
Enter. Local Group Policy editor window will open.
2. Go to User Configuration > Administrative Templates > Start Menu And
Taskbar
3. In the right pane, find the Remove and Prevent Access to the shutdown, Restart,
Sleep, and Hibernate. Then double click on it.
Tips:
To make it back in to the normal function, just follow all the steps above, except for
the last one; you need to change back the option from Enable to Disable.
When being in a state of disable, in fact we can still shutdown the computer. The way
is by typing the below instructions in the search (Windows 7) and press Enter.
3. Select the radio button next to Enabled, click OK, then close out of Group Policy
Editor.
4. Now if a user tries to access the Registry, Then he will get the following message
advising they cannot access it.
AutoPlay Microsoft.AutoPlay
Display Microsoft.Display
Fonts Microsoft.Fonts
HomeGroup Microsoft.HomeGroup
Infrared Microsoft.Infrared
Keyboard Microsoft.Keyboard
Mouse Microsoft.Mouse
Performance Microsoft.PerformanceInformationAndTools
Information and Tools
Personalization Microsoft.Personalization
Recovery Microsoft.Recovery
Sound Microsoft.Sound
System Microsoft.System
Note: In this example we are only going to hide the control panel items we want to see
(white list) however if you use the Show specified Control Panel items policy setting you
can black list only the items you don’t want listed.
3. Select the radio button next to Enabled, click OK, and then close out of Group
Policy Editor.
4. After the Control Panel is disabled, you’ll notice it’s no longer listed in the Start
Menu.
5. If the user tries to type Control Panel into the Search box in the Start menu, they will
get the following message indicating it’s restricted.
3. Double-click Turn off Windows+X Hotkeys in the Settings section of the Group
Policy editor.
4. Select Enablea nd then click OKt o save the changes.
4. Double-click the shortcut to instantly shut down the system. (For Single Click
Follow the below tips)
Tips:
To Customize the Shortcut icon – Right-click on the shortcut > Click Properties >
Click Change Icon> Choose an icon > Click OK> Click OK
You can pin this shortcut from the desktop to the taskbar by right-click on the
shortcut and click Pin to Taskbar.
Shutdown shutdown.exe -s -t 00
Restart shutdown.exe -r -t 00
Logoff shutdown.exe -l
Hibernate rundll32.exe
PowrProf.dll,SetSuspendState
Sleep rundll32.exe
powrprof.dll,SetSuspendState 0,1,0
%SystemRoot%\explorer.exe /E,::{20D04FE0-3AEA-1069-A2D8-08002B30309D}
3. Click Next and give a name to shortcut. For example, My Computer. Click Finish.
4. A new shortcut of My Computer placed on desktop. It has the same icon like that of
Windows explorer. You can change its icon if you wish.
fter change the icon My Computer
5. To pin the shortcut to Windows 7 Taskbar, just right click on it and select Pin to
Taskbar.
5. Drag this shortcut and pin it to the taskbar, after which you can delete the desktop
shortcut.
5. Now you have created a shortcut for Safety Remove Hardware on your desktop!!!
Now whenever you want to eject your hardware device like pen drive, and then just
double click on it and you can remove your Hardware device safely.
This is very good and interesting javascript trick which let your computer speaks whatever
you type. There is no requirement of any software. Just follow below simple steps.
1. Open Notepad and type below codes into it.
3. CloseN otepad.
4. Right click on the saved .exe file on your desktop (ex: Drive C.exe), and click on
Pin to Taskbar.
5. Right click on the pinned .exe icon on the taskbar, right click on the .exe file (ex:
Drive C.exe) in the jump list, and click on P roperties.
6. In the Start in field, make sure it’s blank. In the Target field, change it to be the
drive letter path (ex: C:\ ) that you want the pinned icon on the taskbar to open. Click
on OK. (Just Looks Like the below image)
7. Log off and log on, or restart the computer to have the icon on the taskbar to change
to the correct drive icon afterwards.
8. You can now drag the drive icon anywhere you like within the other pinned icons on
the taskbar if you like.
9. You can now delete the .exe file on your desktop (ex: Drive C.exe) if you like.
Tips: To Unpin Drive from Taskbar: Right click on the pinned drive icon on the taskbar,
and click on Unpin this program from taskbar .
Shut-down the computer after conveying a message
What this trick does is, after conveying a (any) message it shuts down the computer
without any confirmation. In order to create the Shutdown file, follow the below
mentioned steps:
1. Open Notepad.
2. Type the following code in it:
@echo off
msg * Shutting Down.
shutdown -c “Hello the computer is shutting down! Bye” -s
3. Click File (from Menu bar) and Select Save as.
4. Choose Desktop to save the file on desktop.
5. In the File name field type shutdownmsg.bat and click Save.
6. Double Click the batch file on desktop to execute the batch file.
Tips:
Make sure the file name has .bate xtension.
Use this carefully. The Computer shuts down the computer forcefully.
Inspired by the movie Matrix, this falling code trick is extremely popular on social
networking websites. Type the code given below in Notepad and save the file as
“Matrix.bat” or anything.bat (File Extension must be .bat). Upon running the bat file, you
will see the “Matrix falling code” effect.
@echo off
color 02
:matrix tricks
echo
%random%%random%%random%%random%%random%%random%%rando
goto matrix tricks
Make Your Keyboard Type (Any) Message Continuously
This VBS trick can make keyboard type any message continuously. Open Notepad, type
the code given below and save the file as keyboard.vbs or anything.vbs (File Extension
must be .vbs).
Set wshShell = wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “This is a Virus. You have been infected.”
loop
Tips: If you will open the VBS file then you might need to restart your computer to stop
this.
Continuously eject CD/DVD drives
This VBS trick will create a code which will continuously eject all your connected Optical
drives. If you put them back in, it will pop them out again. Type the code given below in
Notepad as eject.vbs or anything.vbs (File Extension must be .vbs)
Set oWMP = CreateObject(“WMPlayer.OCX.7”)
Set colCDROMs = oWMP.cdromCollection
do
ifcolCDROMs.Count>= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop
Double click to open this file and you will be impressed by this awesome trick.
Notepad trick to use it as a Diary
1. Open Notepad.
2. Type .LOG
3. Save the file as LOG.txt
4. Write anything in it and it will be saved with the time when you edit it.
1. Open Notepad.
2. Type the flight number Q33N
3. Go to Format > Font and then Change the Font to Wingdings
4. Increase the Font Size to 72, Click OK.
Tips: If you have any other drives like D:, E:e tc., then scan those disks also.
Speed up the Windows 7
Windows 7 is starved for resources. It features many visual effects that draw heavy on
your graphics card and system memory. If your system was slow out of the box, chances
are you can easily fix that by turning off excessive effects.
1. Click on the Startb
utton and then click Control Panel.
2. Click on System and Security
3. Click on System and then click on Advanced system settings from the left hand
pane.
4. On Advance tab, under Performance Click Settings
5. The Performance Options window will open.
6. Under Visual Effects select Adjust for best performance.
Tips: If you would like to retain a nice interface, select Custom and check Use visual
styles on windows and buttons .
God Mode of Windows 7
Windows 7 has changed Control Panel a little, but it’s still too difficult to locate all the
applets and options that you might need. God Mode, however, while not being particularly
godlike, does offer an easier way to access everything you could want from a single folder.
To create God Mode,
1. Create a New folder and rename it to GodMode.{ED7BA470-8E54-465E-825C-
99712043E01C}
GodMode GodMode.{ED7BA470-8E54-465E-825C-
99712043E01C}
My My Computer.{20D04FE0-3AEA-1069-A2D8-
Computer 08002B30309D}
Libraries Libraries.{031E4825-7B94-4dc3-B131-
E946B44C8DD5}
3. Click OK.
Invisible a folder
1. Create a New folder on the desktop.
2. Select to rename it, delete the default New folder title. (do not Press Enter)
3. Press and hold Alt then 0160 (press the numbers from Number pad which is
locatedon the right hand side of the keyboard), release the Alt key and then press
Enter. This names the folder as a Space. (Make sure Num Lock is ON)
Tips:D esktops must use the number keys on the right of the keyboard and not above
the letters. For it to work on your laptop you need to keep Holding down the Alt key
you will also need to hold the Fn key and type the numbers “ 0160.” These are over
the letters m, j, o, m. Let go of all of the keys and hit enter. Holding the Alt and
typing those numbers will name the folder as a space, pretty much giving it no name.
Make sure the Num Locko n the laptop is selected from on screen keyboard.
4. Select and right click on the folder. Select Properties, then Customize tab, and then
Change icon.
5. If you scroll through the provided icons, you will see a certain area that seems a few
icons are simply missing. Select one of those empty spaces, or in other words,
invisible folders.
6. Click OK, then Apply, then OK.
7. You now have an invisible folder on your desktop to place any files you want to make
transparent. Please remember that this is not a secured file, just invisible to the eyes.
Tips:A
lternate code is Alt + 225
Open any folder in Command Prompt instantly
Press Shift when right-clicking on a folder to get that option in the context menu. This
also works on the desktop.
View Expanded ‘Send To’ Menu
Press Shiftw
hen right-clicking on a folder to get an expanded Send Tom
enu.
Open Command Prompt with right click
If you don’t already have a quick launch icon or a hotkey set to open a command prompt,
there’s really quick trick that you can do on any Windows 7 computer to open up a
command prompt without having to navigate the menu.
Open Command prompt from Desktop
1. Hold down the Shift key and right-clicko
n the desktop.
2. Choose Open Command Window Here from the menu.
Open a folder with Command prompt
1. Hold down the Shift key and right-click on any folder.
2. Choose Open Command Window Here form the menu.
Example of Reset password on Command Prompt : In the above picture SRB is the
ccount Name and 123456 is the new password
5. At last a message will show “The command completed successfully”.
6. Lock your computer and type the new password to unlock it.
Tips:R
emember the new password, don’t forget it.
Watch Star War Episode IV in Command Prompt
You can watch an ASCII version of the full Star Wars Episode IV movie right in the
Command Prompt window. Just follow the steps –
1. Open Control Panel.
2. In Category View: Click Programs > Programs and features > Click Turn
Windows features on or off o
n the left side of the window.
OR In Large/Small icons View: Click Programs and features > Click Turn
Windows features on or off o
n the left side of the window.
3. Then Windows Features window will open.
4. Put tick mark in Telnet Client and Telnet Server like the above image. Then click
OK.
5. Open Command Prompt . Type telnet towel.blinkenlights.nl and press Enter. The
Star Wars movie will start immediately.
Shutdownb
utton changes to Restart button
Use Check Boxes in Windows Explorer
You can select non-adjacent files in Explorer using Ctrl-click, but there is an easier way
using check boxes.
3. Click OK.
Now you can easily select multiple items using only the mouse.
Use Pen drive to fast your computer (Boost performance with ReadyBoost)
Windows 7 has a feature called ReadyBoost which enables its users to use their pen
drives as temporary RAM for their systems. This feature is helpful when because of any
reason you need to speed up your system for short time. Instructions to do this are given
below:
1. Insert a Pen Drive/USB drive in the USB port.
2. Open My Computer.
3. Right-click on the icon of the newly inserted USB drivea nd select Properties.
4. In the Removable Disk Properties dialog-box go to ReadyBoost tab.
5. If you want to dedicate the entire space of your pen drive for ReadyBoost you can
select the radio button that says Dedicate this device to ReadyBoost. Alternatively
you can dedicate any specified amount of space from the pen drive for ReadyBoost.
To do this you can select Use this device radio button and in the text box you can
specify the amount of space from the pen drive that you want Windows 7 to use as
RAM.
6. Click OK buttons on all Windows to accept and confirm your selections and
configurations.
Click Start, type recdisc.exe in the search boxand press Enter. Insert a blank CD/DVD in
your CD/DVD drive, and click Create Disc.
Rotate Upside-Down Desktop Screen
You can rotate Desktop Screen by 90 or 180 or 360 angles. You can invert your window
screen and can impress your friends; this is one of the scariest tricks which turn Windows
upside down. Here are steps:
Press To
Tips:I f the keyboard shortcut doesn’t work, then follow the below steps
1. Go to Control Panel\Appearance and Personalization\Display\Screen Resolution
OR Right-click on the Desktop and click Screen Resolution.
2. Click on the drop-down menu labeled Orientation and choose your desired screen
rotation.
3. Click Apply to preview the changes. If the changes are acceptable, click Keep
changesf rom the confirmation pop-up window.
4. Click OKt o close the Display Settings window.
4. This will show the time when you last rebooted the computer. Subtract that from the
current date-time to know for how long you have been running the computer.
Tips: To know the date of installation of Windows on your PC –Type systeminfo | find /I
“install date”
Process – 2
1. Open Task Manager by pressing Alt + Ctrl + Delete orright click on the taskbar
and click Start Task Manager.
2. Switch to the Performance tab and you should see a field that says Up Time as
shown in the below figure.
Make a Private Folder – no-one can enter, copy, cut, delete Private Folder
To make Private folder which nobody can open, delete, see properties, rename. To make
such a folder you need to make a folder with any name.
Follow the steps to make a Private Folder:
1. Create a New Folder and rename as you wish. In this example I rename the folder to
Secret.
5. Then type cacls secret /E /P everyone:na nd Press Enter to Lock the Secret folder.
6. To unlock the Secret folder type cacls secret /E /P everyone:f a nd Press Enter.
How to Make Your PDF Files Speak To You
Would you like to know if someone reads it for you & that too free of cost. I know you
guys are eager to know that, so here it is.
1. First of all install Adobe Reader, if you haven’t already.
2. Go to View > Read out Loud > Activate Read Out Loud .
3. After you have done, the go to View > Read out Loud > Read To End of Document
4. Now it will read it to you out loud in the Default Microsoft Sam voice.
4. Check the Switch primary and secondary buttons option as shown in the above
image.
5. Left click on Apply and OK.
Note: Microsoft recommends that you must keep your windows up-to-date in order to
remain secure. And I recommend the same, my computer is always up-to-date, this is one
reason I never get attacked by any kind of virus.
Change Your Computer Name in Windows 7
If you’ve ever bought a new computer with the operating system already installed, you
might be annoyed by the default name of the computer when you start trying to connect
different computers together. I like to use more descriptive names than SR782711OI… for
example; I called my new desktop ULTRACOMPUTER.
1. Right-click on MY Computer and click on Properties. Then a window opens as
shown in the below image.
2. Click on Advanced System Settings on the left menu.
3. Now System Propertiesd ialog-box opens as shown in the below image.
4. Click on Computer Name tab and click on Change button on the right-low side.
5. Enter a name in Computer name field. You could also change the name of the
workgroup to something more descriptive as well. Click OK. You’ll have to reboot
after you make this change.
Steganography – Hide a text behind an image
You have been successful to disable delete confirmation dialog box in Windows 7. The
method to turn it on again is very simple too. Just follow the above steps and check the
Display delete confirmation dialog box.
Minimize quickly with shake
Using Shake, you can quickly minimize all open windows on the desktop except the one
you want to focus on. Just click the title bar of the window you want to keep open and
drag (or shake) the window back and forth quickly, and the other open windows are
minimized.
To restore the minimized windows, shake the open window again.
Shake a window to minimize all other windows
Snap
You can use Snap to arrange and resize windows on the desktop with a simple mouse
movement.
Using Snap, you can quickly align windows at the side of the desktop, expand them
vertically to the entire height of the screen, or maximize them to completely fill the
desktop.
Snap to sides of the desktop
Note: By snapping the other side, the window maximizing in that manner.
Snap to top of the desktop
To use Snap, drag the title bar of an open window to either side of the desktop to align it
there, or drag it to the top of the desktop to maximize the window. To expand a window
vertically using Snap, drag the top edge of the window to the top of the desktop.
Aero Peek
You can use Aero Peek features to quickly preview the desktop without minimizing all
your windows, or preview an open window by pointing at its icon on the taskbar.
Peek at the desktop
The Show desktop button has been moved the opposite end of the taskbar from the Start
button, making it easier to click or point at the button without accidentally opening the
Start menu.
In addition to clicking the Show desktop button to get to the desktop, you can temporarily
view or peek at the desktop by just pointing your mouse at the Show desktop button.
When you point at the Show desktop button at the end of the taskbar, any open windows
fade from view, revealing the desktop. To make the windows reappear, move the mouse
away from the Show desktop button.
You can pin your favorite applications or files so that you could open them quickly from
any window at any time. In Windows 7, you can pin shortcuts for favorite or frequently
used files, folders, and websites to the Jump Lists for each of those programs to the
taskbar.
To pin a program shortcut to the taskbar, do one of the following:
If the program is already running, right-click the program’s button on the taskbar (or
drag the button toward the desktop) to open the program’s Jump List, and then click
Pin this program to taskbar.
If the program isn’t running, click Start, find the program’s icon, right-click the icon,
and then click Pin to Taskbar .
You can also pin a program by dragging the program’s shortcut from the Desktop or
Start menu to the taskbar.
Example of dragging and pin: Pin a program from desktop (Left) : Pin a program from
Start menu (Right)
Pin Control Panel to the Taskbar
You cannot pin the Control Panel to the taskbar via the Start Menu or by drag and drop.
Open the Control Panel and right-click its taskbar icon to pin it to the taskbar. An
advantage of this is that Control Panel’s Jump List allows quick access to recently used
functions.
Windows 7 Taskbar icons appears in the center of the taskbar
Everything that comes out of the box by default lacks the ability to re-adjust. Windows 7
Taskbar is the single biggest feature of Windows 7 and yet, you can’t do much about it
other than re-arrange the icon in order. Also, by default the icons will always be aligned to
the left, what if you want to make them align to the center or even right?
Before adding the folder to favourite list (Left) : After adding the folder to favourite list
(Right)
You can add any library or folder to the Favorites section in Windows Explorer. To add a
folder, navigate to it in Explorer, right-click Favorites in the left navigation pane, and
select Add current location to Favorites. You can remove the folder form the Favorites
list by right-click the folder from the Favorite list and click Remove.
Get Exact Colors on Your Screen
If you are an artist or you work with colors, use the Calibrate Color option in the Control
Panel Display applet or run dccw.exe from the Start Menu search box. Then Display
Color Calibration window appears. Follow the Steps and Choose right options as you
wish and click Finish.
Tips: You can adjust gamma, brightness, contrast, and color balance, ensuring that colors
are displayed correctly on your screen.
Adjust Screen Text with Clear Type
Use Clear Type Tuner for the best look on your LCD monitor or laptop screen. Run
cttune.exe from the StartM
enu search box. Choose your options and Finish.
Calculator calc
Character Charmap
Logout logoff
Notepad notepad
Wordpad write
__________________________________________________
Please mention your valuable ratings and review on Amazon