Do you know that you can run antivirus without having to install it? With Clamwin Portable, you can. On system with lower RAM (256 MB and below), this is the best choice because you get protection and at the same time, does'nt make your system slow. If you're always transfer files from flash drive or otherwise, you can also make use of it. You can download this antivirus HERE
Step by step on How To Install ClamWin Portable
1. Run the installer
2. Click Next
3. Select desired directory for installation. If you want to install on your computer, go to C:\Program Files\ClamWin Portable. If the directory is not there, create a new folder and rename it as Clamwin Portable. If you would like to install on flash drive, select your flash drive and make new folder and rename it as Clamwin Portable. Click Install to continue.
4. ClickFinish the end the installation. Now you can run ClamWin Portable
Steps Required Before You Can Use ClamWin Portable
In order for you to use ClamWin Portable, you have to download virus definition files.First, run ClamWin Portable.
Dialog box as below will appear.
Click Yes. After ClamWin Portable finished download the required files, you can use the ClamWin Portable as normal.
Tired with advertisements in Yahoo Messenger? Download YM Patch and remove unwanted advertisements. For your information, this patch only works with Yahoo Messenger versions 9.0.0.2018 and 9.0.0.2034. The only disadvantage with this patch is it does not remove ads in chat rooms and webcam. Maybe the author will look into it in the upcoming release.
Do you exactly the device inside your computer? The CPU used or maybe chipset used on your motherboard? Using CPU-Z, you can get this information without having to open the entire casing.
Mainly, CPU-Z can give you information about your current CPU, mainboard, types of RAM that are currently installed, windows version and, DirectX version. CPU-Z is also been used by overclockers to fine tune their box.
To run this program, just extract it to desired folder and run the executable. You don't have to install this software. This file is in ZIP format.
You can click the link below to download the latest version (CPU-Z v1.49)
This tutorial only applies to system running Win98,Win2k & Winxp
1. First, you have to download winamp, click HERE to download Winamp 2. After that, download SHOUTcast Radio DSP plug-in. The plug-in is available HERE
SHOUTcast Radio DSP plug-in REQUIREMENTS: * A reasonably fast (300Mhz or faster) PC running Windows 95, 98, NT, 2000, or ME. Windows 3.x is not supported. * Winamp 2.65 or greater (this plugin does not work with winamp 3.x) -- If you plan on broadcasting using enc_aacplus, your clients must have Winamp 5.04 or greater * A big pile of tracks(No DRM Tracks though), or a soundcard input for live streaming. * A good, reliable internet connection between you and the DNAS (SHOUTcast Server)
3. Download SHOUTcast WIN32 Console/GUI server v1.9.8. You can download the file HERE 4. Install Winamp ,SHOUTcast Radio DSP plug-in and SHOUTcast WIN32 Console/GUI server v1.9.8 5. Execute Winamp and go to preferences (right click in Winamp). Click Plug-ins > DSP Effect > Nullsoft SHOUTcast Source DSP v1.9.0. See below for example:
6. Click on 'Encoder' tab. Go to Encoder settings. Select '56kbps, 22,050kHz, Stereo'. P/S : For this example I will be using 56kbps, 22,050kHz, Stereo
7. Click on 'Output' tab. Go to 'Output Configuration'. Enter your IP Address in the 'Address' text box. Again for this example I will be using 192.168.1.1 as IP Address.
8. Click Start > All Programs > SHOUTcast DNAS > Edit SHOUTcast DNAS configuration. Go to 'AdminPassword' section. Change the default password.
; AdminPassword. This password (if specified) changes the ; behavior of Password to be a broadcast-only password, and ; limits HTTP administration tasks to the password specified ; here. The broadcaster, with the password above, can still ; log in and view connected users, but only the AdminPassword ; will grant the right to kick, ban, and specify reserve hosts. ; The default is undefined (Password allows control for both ; source and admin) ; AdminPassword=adminpass --> change "adminpass" to another, for security reason...
9. Save the configuration file and click Start > All Programs > SHOUTcast DNAS > SHOUTcast DNAS (GUI)or Start > All Programs > SHOUTcast DNAS > SHOUTcast DNAS (Console).
10. Finally, go to Winamp. Open Winamp Preferences, go to Plug-ins > DSP Effect > Nullsoft SHOUTcast Source DSP v1.9.0.Click on 'Output' tab and click'Connect'. Usually the plug-in will work without problem UNLESS YOUR ROUTER/FIREWALL PROHIBIT YOUR CONNECTION. IF YOU'RE HAVING PROBLEM, CONSULT YOUR ROUTER MANUAL/FIREWALL DOCUMENTATION FOR MORE INFO. IF YOU WANT ME TO GUIDE YOU, PLEASE DON'T HESITATE TO ASK. I WILL TRY MY BEST TO HELP YOU BUT PLEASE BE SPECIFIC. INDICATE YOUR ROUTER MAKE & MODEL AND, TYPES OF FIREWALL THAT YOU ARE CURRENTLY USING.
How To Play Streaming Audio On Client PC? 1. Open your audio player. If you're using Windows Media Player, Click File > Open URL and then put 'http://192.168.1.1:8000' in the text box. Click OK.Finally, Enjoy your music....
Do you know that there is a free program that can clean windows temporary files, firefox, IE and Opera? ATF-Cleaner does the job flawlessly. There is no need to install the software. Just run the executable. The software can also be used on flash drive, maybe pair it with Opera Portable for added functionality....
This software has been given rating 4.71 of 5 from 283 votes (based from majorgeeks.com
For your information, this software run on windows XP and Windows 2k only.
Sometimes we may encounter situations where we cannot even think a single password. Don't worry, by using Random Password Generator, you can generate as many as you want and best of all it's FREE...
Finally, Canonical Ltd released Ubuntu 8.10 aka Intrepid Ibex today. Ubuntu 8.10 comes in two versions, Ubuntu 8.10 Desktop Edition and Ubuntu 8.10 Server Edition.
Here is the snapshot...Click To Enlarge...
To get Ubuntu 8.10 log on to this website and select your location
If you like to see a complete list of ubuntu mirrors, click here
I just came across this great software, Buddy Spy which can detect invisible users in Yahoo Messenger. Sometimes your friends trying to avoid you, but worry no more cause you can know their status even they're invisible.....
0x800CCC00 LOAD SICILY FAILED - Authentication did not load.
Try closing and restarting Outlook express
If still getting same error, wait 20-30 minutes for a server reset of your account then try again
It could be a corruption of the user account in Outlook Express. Try setting up a second identity and see if it works
0x800CCC01 INVALID CERTIFICATE CONTENT
Get your certificate re-issued by your authority server
0x800CCC02 INVALID CERTIFICATE DATE
Get your certificate re-issued by your authority server
0x800CCC03 USER ALREADY CONNECTED
You may be logged in on another machine. Close all connections on all machines, wait 20-30 minutes and try again
Some mail servers will not recognise an improper disconnection. This will result in the account being 'Poplocked'. Either wait 20-30 minutes for it to time out or get somebody to shell into the mail server and stop the mail task that is running on the account. This can normally only be done with accounts that have UNIX shells
If you are not logged in on another machine or poplocked then someone may be using/downloading from your account or something is wrong with your account
0x800CCC04 CONN
0x800CCC05 NOT CONNECTED TO SERVER
Can you get web pages? If so, you may have the wrong mail server typed in your account settings or the server may be down
If you cannot get web pages then hang up and try connecting again
Reboot the computer and try again
If it's still not working and you are not getting any web pages, then data may not be moving across the network properly. Check DNS numbers, remove and then reinstall TCP/IP in Control Panel > Network.
0x800CCC06 CONN SEND
0x800CCC07 WOULD BLOCK
0x800CCC08 INVALID STATE
0x800CCC09 CONN RECV
0x800CCC0A MESSAGE DOWNLOAD INCOMPLETE
This is a possible corruption of the pop3uidl file. Close the Internet connection and all programs. Search for the file 'pop3uidl and delete it. Reconnect and it should work.
Repeat step 1 with a reboot before you check your mail again.
You may have a corrupt or a very large file attachment on the mail server. Large file attachments, mail that are missing headers or mail that do not conform to the mail RFC's can cause this.
0x800CCC0B SERVER OR MAILDROP IS BUSY
Try to retrieve e-mail about once every 5 minutes. Alternatively, call your ISP help desk to make sure that the server hasn't crashed.
You may be logged in on another machine. Close all connections on all machines, wait 20-30 minutes and then try again.
Some mail servers will not recognise an improper disconnection. This will result in the account being 'Poplocked'. Either wait 20-30 minutes for it to time out or get somebody to shell into the mail server and stop the mail task that is running on the account. This can normally only be done with accounts that have UNIX shells
If you are not logged in on another machine or poplocked then someone may be using/downloading from your account or something is wrong with your account.
0x800CCC0C NOT INIT
0x800CCC0D CANT FIND HOST - Cannot locate server
This error can appear if you have 'notify me if there are any new newsgroups' selected but don't have a news account set up. Go to TOOLS > OPTIONS > GENERAL TAB and untick this option.
Can you get web pages? If so then you may just have the wrong mail server typed into your account details or the server may be down.
If you cannot get web pages then hang up and try connecting again.
Reboot the computer and try again
If it's still not working and you are not getting any web pages, then data may not be moving across the network properly. Check DNS numbers, remove and then reinstall TCP/IP in Control Panel > Network.
0x800CCC0E FAILED TO CONNECT - Cannot connect to server
This error can appear if you have 'notify me if there are any new newsgroups' selected but don't have a news account set up. Go to TOOLS > OPTIONS > GENERAL TAB and untick this option.
Can you get web pages? If so then you may just have he wrong mail server typed into your account details or the server may be down
If you cannot get web pages then hang up and try connecting again
Reboot the computer and try again
If it's still not working and you are not getting any web pages, then data may not be moving across the network properly. Check DNS numbers, remove and then reinstall TCP/IP in Control Panel > Network.
0x800CCC0F CONNECTION DROPPED
The modem or network cable was disconnected. If this happens frequently then try updating the modem drivers or adding an Init string. Possible cause may be line noise.
0x800CCC10 INVALID ADDRESS - Address not known on server
Check the spelling in the TO: field of the e-mail. Delete the old message from the Outbox and then try it again.
0x800CCC11 INVALID ADDRESS LIST - Mailing list not known on the server
Check the spellings of the address list and try it again.
Check with the administrator (if any) to see if you have the correct access to the list from the terminal you are using.
0x800CCC12 SOCKET READ ERROR - Unable to send Winsock request
Remove the TCP/IP protocol and reinstall it. In windows, go into Network from the Control Panel. NOTE: You may need your Windows CD for this task!
0x800CCC13 SOCKET WRITE ERROR - Unable to read Winsock
This error sometimes appears when trying to download e-mails with an attachment. Having software such as Netnanny installed can cause this to happen. Disabling the software can resolve this error.
Remove the TCP/IP protocol and reinstall it. In windows, go into Network from the Control Panel. NOTE: You may need your Windows CD for this task!
0x800CCC14 SOCKET INIT ERROR - Unable to initialise Winsock.
Remove the TCP/IP protocol and reinstall it. In windows, go into Network from the Control Panel. NOTE: You may need your Windows CD for this task! In Windows XPsp2 and later open a command prompt and type "netsh winsock reset".
0x800CCC15 SOCKET CONNECT ERROR - Unable to open Windows socket
Remove the TCP/IP protocol and reinstall it. In windows, go into Network from the Control Panel. NOTE: You may need your Windows CD for this task!
0x800CCC16 INVALID ACCOUNT - User account not recognised
Check the spelling of the account name and re-enter the password taking care to spell it correctly.
0x800CCC17 USER CANCEL
You have pressed the cancel button
You may have mail that are missing headers, mail that does not conform to the mail RFC's or a corrupt or very large file attachment on the mail server.
If you pressed cancel because it is taking a long while or is timing out then the pop3uidl file may be corrupted. Close your Internet connection and all other programs. Find and delete the file, pop3uidl, reconnect and try it again.
If still the same error then repeat step 3, and reboot before trying to check the mail again.
Check account information, making sure account is not case sensitive, close Outlook Express, restart the computer and try reconnecting.
Create a different identity and see if it will logon on from this identity with the same information.
Make sure the account is still active with the ISP and that the ISP is not having an e-mail outllook.
0x800CCC19 TIMEOUT
This is a possible corruption of the pop3uidl file. Close the Internet connection and all programs. Search for the file 'pop3uidl and delete it. Reconnect and it should work
Repeat step 1 with a reboot before you check your mail again
You may have a corrupt or a very large file attachment on the mail server. Large file attachments, mail that are missing headers or mail that do not conform to the mail RFC's can cause this
0x800CCC1A SECURE CONNECT FAILED - Unable to connect using SSL
Your ISP may not require an SSL connection. Turn off SSL in the e-mail account properties and try again
For those who would like to learn Linux, this is the best option. All you have to do is download the installer below ... CLICK HERE TO DOWNLOAD
During the installation, just accept the default configuration unless you know what you're doing. After installation, double click on cygwin icon on your desktop.
My cygwin snapshot
What I like most about cygwin is that you can run command that is normally used in Linux. Below is the example of the command.
ls
cp
mv
dir
cat
ping
P/S : Some of the commands will not work because of the files required is not installed. Check the documentation for more information.
If you like to learn more about linux commands, click HERE.
Do you know that everytime you visting a website, your internet address will be logged? By using this website, your internet address will be hidden. For more info, logon to www.hidemyass.com
Below is the proxy server list that is reliable (I have check the proxy through http://www.checker.freeproxy.ru/checker/. Feel free to use the proxy server... For any suggestion/comments, please contact me at dark1@linuxwaves dot com.
Do you find it hard to search for the best online file sharing? Don't worry. By register for free account at fileden.com, you get free 1GB of storage and you can also link the files directly to webpage/blog. The only downside is you cannot upload single file that is 50MB in size. Click on the link below.....
IE7Pro is an add-on for Internet Explorer that provides a lot of options for tweaking. It has build-in MiniDM which function as download manager. Do you fancy the crash recovery feature in Firefox? Worry not cause with IE7Pro, you can also restore your previous web pages after crash happened.
Have your encounter this? Everytime you surfing the net, you've been greet with so many ads? The build-in AD Blocker will take care of these. Another features that might interest you :
Inline Search
Spell Check
IE7Pro Script
Quick Proxy Swithcer
Save Page To Image
Super Drag and Drop
All these comes with absolutely FREE
System Requirement : Internet Explorer 7 (Only for Win XP and Vista)
Audacity is a free software for editing audio and available for Linux, Mac OS X and Windows.
Snapshots
Features This is the list of features in audacity...
Recording Audacity can record live audio through a microphone or mixer, or digitize recordings from cassette tapes, vinyl records, or minidiscs. With some sound cards, it can also capture streaming audio.
Record from microphone, line input, or other sources.
Dub over existing tracks to create multi-track recordings.
Record up to 16 channels at once (requires multi-channel hardware).
Level meters can monitor volume levels before, during, and after recording.
Import and Export Import sound files, edit them, and combine them with other files or new recordings. Export your recordings in several common file formats.
Import and export WAV, AIFF, AU, and Ogg Vorbis files.
Import MPEG audio (including MP2 and MP3 files) with libmad.
Export MP3s with the optional LAME encoder library.
Create WAV or AIFF files suitable for burning to CD.
Import and export all file formats supported by libsndfile.
Open raw (headerless) audio files using the “Import Raw” command.
Note: Audacity does not currently support WMA, AAC, or most other proprietary or restricted file formats.
Editing
Easy editing with Cut, Copy, Paste, and Delete.
Use unlimited Undo (and Redo) to go back any number of steps.
Very fast editing of large files.
Edit and mix an unlimited number of tracks.
Use the Drawing tool to alter individual sample points.
Fade the volume up or down smoothly with the Envelope tool.
Effects
Change the pitch without altering the tempo, or vice-versa.
Remove static, hiss, hum, or other constant background noises.
Alter frequencies with Equalization, FFT Filter, and Bass Boost effects.
Adjust volumes with Compressor, Amplify, and Normalize effects.
Other built-in effects include:
o Echo o Phaser o Wahwah o Reverse
Sound Quality
Record and edit 16-bit, 24-bit, and 32-bit (floating point) samples.
Record at up to 96 KHz.
Sample rates and formats are converted using high-quality resampling and dithering.
Mix tracks with different sample rates or formats, and Audacity will convert them automatically in realtime.
Plug-Ins
Add new effects with LADSPA plugins.
Audacity includes some sample plugins by Steve Harris.
Load VST plugins for Windows and Mac, with the optional VST Enabler.
Write new effects with the built-in Nyquist programming language.
Analysis
Spectrogram mode for visualizing frequencies.
“Plot Spectrum” command for detailed frequency analysis.
Do you know that you can tweak Windows Vista the easieast way without have to open the registry? Introducing TweakVI.... The right tweaking tool made specially for people like you. With the option of System Restore, just restore your system to previous state if your computer having a problem after tweaking.
This is some of the features, taken from Totalidea Software :
Activate hundreds of hidden Windows Vista settings to get the most out of your Vista
Clean your registry with the integrated Registry Cleaner and Optimizer
Activate system and software restrictions - you decide what should be accessible or not
Display detailed system information on installed hardware
Create a 256 MB RAM drive for fastest access
Pprotect your privacy and remove browsing and other usage left overs
Clean your hard drive and remove unneccessary files to get wasted hard drive space back
Manage TrueType fonts - disable unused to free up system resources
Improve your internet connection by a few mouse clicks
Repair .pst files, register your .pst files with Outlook with the included .pst file registration utility
Optimize your RAM with the included memory optimizer
Manage system updates, remove update backups
You can even transfer your tweaks and settings to other machines running Vista
System Requirement : Windows Vista
Price :
US$ 39.99 for TweakVI Premium
US$ 49.99 for TweakVI Ultimate
Click on the banner below for more information.....
Gparted is a free program which is can be used to partitioning hard drive. The main thing I like about this software is it's free. Patrition Magic costs you from $24.99 to $49.99. Before you can use this software, you can download the ISO and burn it to blank CD-R.
First, download the file and then burn the image using CD/DVD burning software that support ISO image burn. You can use CDBurnerXP (you can refer to my previous entry for more information).
After you have done, boot the computer using the CD. The screen will appear as below...
Final word : Please remember to backup your data before repartition.
Authors :Stuart McClure, Joel Scambray, George Kurtz
Published by McGraw-Hill Professional, 2005
“The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.” --Bill Machrone, PC Magazine
"The definitive compendium of intruder practices and tools." --Steve Steinke, Network Magazine
"For almost any computer book, you can find a clone. But not this one... A one-of-a-kind study of the art of breaking in." --UNIX Review
Here is the latest edition of international best-seller, Hacking Exposed. Using real-world case studies, renowned security experts Stuart McClure, Joel Scambray, and George Kurtz show IT professionals how to protect computers and networks against the most recent security vulnerabilities. You'll find detailed examples of the latest devious break-ins and will learn how to think like a hacker in order to thwart attacks. Coverage includes:
Code hacking methods and countermeasures
New exploits for Windows 2003 Server, UNIX/Linux, Cisco, Apache, and Web and wireless applications
Latest DDoS techniques--zombies, Blaster, MyDoom
All new class of vulnerabilities--HTTP Response Splitting
After so many times hacking into other peoples wireless router, I managed to come out with solutions to make wireless router more secure to hackers. Here is the tips :
1. Change default password for router 2. Use WPA encryption for added security 3. Do not Broadcast SSID 4. Enable MAC Filtering 5. Change password on regular basis 6. Always update your router firmware with the latest version 7. Disable remote admin on wireless router
"In 2007, a denial-of-service attack was launched every 53 minutes. Earlier this year, the loss of an undersea cable resulted to the loss of Internet service for entire regions. Businesses that rely to any measure on the Web must secure their businesses against the possibility of large-scale cyber-attacks and disasters, writes strategic management consultant Kevin Coleman."
Are you doing the right thing to protect your computer against such attacks? If the answer is "No" then follow the recommendation below on how to protect your computer. We will be using Windows XP as an example.
Download Firewall
You will have to download software based firewall to protect your computer. I recommend using Comodo Firewall PRO since the software itself not only protect your computer against intrusion but also protect against dangerous malware. It is also comes with antivirus scanner. Best of all, its free. You can download Comodo Firewall PRO here.
Comodo Firewall PRO screenshot
Create Password For Administrator Account
Many users use blank password for Administrator account. Hackers can easily gain full access to the system. For security purpose, create a password with minimum 8 character and use numbers and symbol when creating the password.
example:
i) GOOD Password
cut7%ter
$4!asd/5
ii) BAD Password
password
admin
123456
Disable File & Print Sharing in Network Connection
1. Click Start>Control Panel>Network Connections
2. Right click on the network device & select properties
Network Connection Screenshot
3. Uncheck Client for Microsoft Network& File and Printer Sharing for Microsoft Networks.
4. Click OK.
Its done. Now you can browse the internet without fear. For added protection use Mozilla Firefox for safe browsing.
I would like to share with you important tips on using microsoft windows. This tips applicable to all version of windows either Windows Vista, Windows XP, Windows NT, Windows ME, Windows 98 and, Windows 95.
Here is the tips
Install only software that you use
Always defrag your hard drive for better performance
Don't forget to backup your data
Scan your drive for errors
Update your antivirus on daily basis
Always scan your data for virus
Install anti spyware program
Do not install P2P software. Running any P2P sofware on computer will make your system more vulnerable to trojan, virus and hackers attack.
This article describes how to recover a Windows XP system that does not start because of corruption in the registry. This procedure does not guarantee full recovery of the system to a previous state; however, you should be able to recover data when you use this procedure. Warning Do not use the procedure that is described in this article if your computer has an OEM-installed operating system. The system hive on OEM installations creates passwords and user accounts that did not exist previously. If you use the procedure that is described in this article, you may not be able to log back into the recovery console to restore the original registry hives. You can repair a corrupted registry in Windows XP. Corrupted registry files can cause a variety of different error messages. See the Microsoft Knowledge Base for articles about error messages that are related to registry issues. This article assumes that typical recovery methods have failed and access to the system is not available except by using Recovery Console. If an Automatic System Recovery (ASR) backup exists, it is the preferred method for recovery. Microsoft recommends that you use the ASR backup before you try the procedure described in this article.Note Make sure to replace all five of the registry hives. If you only replace a single hive or two, this can cause potential issues because software and hardware may have settings in multiple locations in the registry.
MORE INFORMATION When you try to start or restart your Windows XP-based computer, you may receive one of the following error messages: Windows XP could not start because the following file is missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SYSTEM Windows XP could not start because the following file is missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SOFTWARE Stop: c0000218 {Registry File Failure} The registry cannot load the hive (file): \SystemRoot\System32\Config\SOFTWARE or its log or alternate System error: Lsass.exeWhen trying to update a password the return status indicates that the value provided as the current password is not correct.
Manual steps to recover a corrupted registry that prevents Windows XP from starting The procedure that this article describes uses Recovery Console and System Restore. This article also lists all the required steps in specific order to make sure that the process is fully completed. When you finish this procedure, the system returns to a state very close to the state before the problem occurred. If you have ever run NTBackup and completed a system state backup, you do not have to follow the procedures in parts two and three. You can go to part four.
Part one In part one, you start the Recovery Console, create a temporary folder, back up the existing registry files to a new location, delete the registry files at their existing location, and then copy the registry files from the repair folder to the System32\Config folder. When you have finished this procedure, a registry is created that you can use to start Windows XP. This registry was created and saved during the initial setup of Windows XP. Therefore any changes and settings that occurred after the Setup program was finished are lost.To complete part one, follow these steps: 1. Insert the Windows XP startup disk into the floppy disk drive, or insert the Windows XP CD-ROM into the CD-ROM drive, and then restart the computer. Click to select any options that are required to start the computer from the CD-ROM drive if you are prompted to do so. 2. When the "Welcome to Setup" screen appears, press R to start the Recovery Console. 3. If you have a dual-boot or multiple-boot computer, select the installation that you want to access from the Recovery Console. 4. When you are prompted to do so, type the Administrator password. If the administrator password is blank, just press ENTER. 5. At the Recovery Console command prompt, type the following lines, pressing ENTER after you type each line:
6. Type exit to quit Recovery Console. Your computer will restart.Note This procedure assumes that Windows XP is installed to the C:\Windows folder. Make sure to change C:\Windows to the appropriate windows_folder if it is a different location.If you have access to another computer, to save time, you can copy the text in step five, and then create a text file called "Regcopy1.txt" (for example). To use this file, run the following command when you start in Recovery Console: batch regcopy1.txtWith the batch command in Recovery Console, you can process all the commands in a text file sequentially. When you use the batch command, you do not have to manually type as many commands.
Part two To complete the procedure described in this section, you must be logged on as an administrator, or an administrative user (a user who has an account in the Administrators group). If you are using Windows XP Home Edition, you can log on as an administrative user. If you log on as an administrator, you must first start Windows XP Home Edition in Safe mode. To start the Windows XP Home Edition computer in Safe mode, follow these steps.Note Print these instructions before you continue. You cannot view these instructions after you restart the computer in Safe Mode. If you use the NTFS file system, also print the instructions from Knowledge Base article KB309531. Step 7 contains a reference to the article.
1. Click Start, click Shut Down (or click Turn Off Computer), click Restart, and then click OK (or click Restart). 2. Press the F8 key. On a computer that is configured to start to multiple operating systems, you can press F8 when you see the Startup menu. 3. Use the arrow keys to select the appropriate Safe mode option, and then press ENTER. 4. If you have a dual-boot or multiple-boot system, use the arrow keys to select the installation that you want to access, and then press ENTER. In part two, you copy the registry files from their backed up location by using System Restore. This folder is not available in Recovery Console and is generally not visible during typical usage. Before you start this procedure, you must change several settings to make the folder visible:
1. Start Windows Explorer. 2. On the Tools menu, click Folder options. 3. Click the View tab. 4. Under Hidden files and folders, click to select Show hidden files and folders, and then click to clear the Hide protected operating system files (Recommended) check box. 5. Click Yes when the dialog box that confirms that you want to display these files appears. 6. Double-click the drive where you installed Windows XP to display a list of the folders. If is important to click the correct drive. 7. Open the System Volume Information folder. This folder is unavailable and appears dimmed because it is set as a super-hidden folder.Note This folder contains one or more _restore {GUID} folders such as "_restore{87BD3667-3246-476B-923F-F86E30B3E7F8}".
P/S: This notes comes in handy when you cannot boot to windows. If you unsure about the procedure just let me know.