Home Page

Sunday, March 9, 2014

Missing Tray Icons Registry Fix For Windows 7 & 8

Follow The below Steps Carefully :

Ø Click Start, type regedit in the Start Search box, and then press ENTER.
If you are prompted for an administrator password or for confirmation, type the password, or click Allow .

Ø Locate and then click the following registry subkey:
HKEY_CURRENT_USER\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify

Ø In the Details pane, click the IconStreams registry entry.
Ø On the Edit menu, click Delete , and then click Yes .
Ø In the Details pane, click the PastIconsStream registry entry.
Ø On the Edit menu, click Delete , and then click Yes .
Ø Exit Registry Editor.
Ø Restart the Explorer.exe process.

To do these, follow these steps:

Ø Press CTRL+SHIFT+ESC.
Ø On the Processes tab in Task Manager, click the explorer.exe process, and then click End Process two times.
Ø On the File menu, click New Tasks (Run) , type explorer , and then click OK .
Ø Exit Task Manager.

Warning : Make sure not to modify any of the system registries with out proper knowledge. This may lead to serious issues including crashing of windows which may leave you with no other options other formatting the Operating System and hence resulting in data loss.


Thank You..

Pin Your Own Extra Icons On Windows 7 & 8 Task Bar

Follow the steps listed below:

·        Right-click on the desktop and click “New” and “Shortcut”.



·        Enter the following location in the “Type the location of the item” box and click “Next”

%SystemRoot%\explorer.exe shell:MyComputerFolder



·        Type any name under “Type a name for this shortcut” and click “Finish”.




·        Right-click new “Computer” shortcut on the desktop and click “Properties”.


·        Under the “Shortcut” tab, click the “Change Icon” button.



·        In the "Look for icons" line, type the following:

%SystemRoot%\system32\imageres.dll



 ·        Select the “Computer” icon (Any icons of your choice) from the available images and click “OK”.
·        Click “OK”, “Apply” and “OK”.



 Now, you may drag the new “Computer” shortcut onto the taskbar until you see the “Pin to Taskbar” pop-up and drop it..



 The above method works perfectly without any spurious instances of “explorer.exe”.

Note: Above mentioned steps are for creating My Computer Shortcut, like wise you can create shortcuts for all the icons below. You can always delete any shortcuts from Desktop.

Available Shortcuts For Windows 7 & 8 :
explorer shell:MyComputerFolder (for My Computer shortcut)
explorer shell:RecycleBinFolder (for Recycle Bin shortcut)
explorer shell:ControlPanelFolder (for Control Panel shortcut)
explorer shell:Administrative Tools (for Administrative Tools shortcut)
explorer shell:ChangeRemoveProgramsFolder (for Programs and Features shortcut)
explorer shell:NetworkPlacesFolder (for Network shortcut)
explorer shell:Favorites (for Favorites shortcut)
explorer shell:HomegroupFolder (for Homegroup shortcut)
explorer shell:Games (for Games shortcut)
explorer shell:Fonts (for Fonts shortcut)
explorer shell:UserProfiles (for Users folder shortcut)
explorer shell:Profile (for your username folder shortcut)
explorer shell:Public (for Public folder shortcut)
explorer shell:My Documents (for Documents shortcut)
explorer shell:Common Documents (for Public Documents shortcut)
explorer shell:My Music (for Music folder shortcut)
explorer shell:CommonMusic (for Public Music folder shortcut)
explorer shell:My Pictures (for Pictures folder shortcut)
explorer shell:CommonPictures (for Public Pictures folder shortcut)
explorer shell:My Video (for Videos folder shortcut)
explorer shell:CommonVideo (for Public Videos folder shortcut)
explorer shell:Downloads (for Downloads folder shortcut)
explorer shell:CommonDownloads (for Public Downloads folder shortcut)
explorer shell:::{3080F90E-D7AD-11D9-BD98-0000947B0257} (for Flip 3D or Window Switcher shortcut)

Thank You..

Sunday, August 21, 2011

Create System Folders/Icons Any Where In System.

Windows system folders are identified by global unique strings referred as CLSIDs (Class Identifiers) and technically Namespace Extensions. Using this you can create Icons like My Computer, Recycle Bin, and many other icons in any drive of the system.
                       
Here is the list of few CLSIDs.

My Computer
{20D04FE0-3AEA-1069-A2D8-08002B30309D}
Control Panel
{21EC2020-3AEA-1069-A2DD-08002b30309d}

Recycle Bin
{645FF040-5081-101B-9F08-00AA002F954E}
Network Places
{208d2c60-3aea-1069-a2d7-08002b30309d}
Fonts
{D20EA4E1-3957-11d2-A40B-0C5020524152}

You can find such CLSIDs in Registry. Type regedit in run and go to HKEY_CLASSES_ROOT\CLSID and find few more. In same manner, there is CLSID for system folder “All Tasks” which lists all tasks, available in Control Panel as per your edition of Windows and its CLISD is {ED7BA470-8E54-465E-825C-99712043E01C}

Steps for creating the System folders :

Ø Create a folder where you need the particular system folder ie; My Computer, Recycle Bin, Control Panel Network Places, Fonts Etc.

Ø Rename the folder with specific CLSIDs.

Ø When Renaming make sure you give a name before the CLSID. Ie; For My Computer it should be My Computer.{20D04FE0-3AEA-1069-A2D8-08002B30309D}

Note : Can use any name of your choice, Make sure you insert a dot “.” after the name with out which the folder/icon cannot be created.  When renaming, make sure there is no space before the name ie; My Computer or any other names and after the” }” bracket.

Warning : Make sure not to modify any of the system registries with out proper knowledge. This may lead to serious issues including crashing of windows which may leave you with no other options other formatting the Operating System and hence resulting in data loss. Prevention is always better than cure.

If you know the CLSID of any particular system folder, you can access and launch it easily. Basically there are three methods to access them.


Thank You..





Windows 7 God Mode!!!


Have you ever heard of this name in windows 7 ??? 
The aptly named God Mode (Master Control Panel) is a built-in, yet unadvertised feature in Windows 7 that gathers all Windows utilities in one spot.

Just follow the simple step :

Ø Create a newfolder

Ø Name it : God Mode.{ED7BA470-8E54-465E-825C-99712043E01C}

Ø Can use any name of your choice instead of  God Mode

Ø When renaming, make sure there is no space before the name ie; God Mode or any other names and after the } bracket.

Ø You are done !!!

Open it up and you'll find access to display options, backup/recovery, power management and more. This is a useful trick for those of you that easily forget where to access the defragmenter or the device manager. You may even find a useful utility you didn't know existed.

Note : This tip also works on the 32-bit version of Windows Vista too. If you are running the 64-bit version of Windows Vista, do not use this trick. It can cause Windows Explorer to crash.

Thank You..












Saturday, July 30, 2011

Single Click Screen Lock


You can always lock your computer using the Win+L keyboard shortcut. Here’s another way to do it with a single mouse click.

Follow These Simple Steps :

Ø Right-click on your desktop.

Ø Select New, Shortcut


Ø Type the location of the item.



Ø Enter rundll32.exe user32.dll,LockWorkStation.

Ø Click Next, name the shortcut ‘Quick Lock’, and Finish.


If you wish, you can make it look pretty by giving it a lock or keys icon:

Ø Right-click, select Properties.

Ø Click Change Icon, enter shell32.dll.

Ø Select any icon you wish.

Ø Drag this shortcut and pin it to the taskbar, after which you can delete the desktop shortcut.

Thank You..

Thursday, July 28, 2011

Fixing Windows Installer Errors









Many of you might came across the windows installer errors. This happens when installing or uninstalling softwares or this can come as pop-up once the windows starts after Welcome screen. Below are the possible error pop-up’s shown and solutions to fix it.

"The Windows Installer service could not be accessed”. This can occur if you are running Windows in safe mode, or if the Windows Installer is not correctly installed. It may also say to “Contact your support personnel for assistance"

The Microsoft website knowledge article 324516 gives 2 methods as a way of fixing this problem, but you might be very lucky if any of the 2 fixes the problem, lot of guys end up in formatting their systems and doing fresh windows installations or try wired ways of fixing it.

Well, the solution is very easy :

1. right click your root windows installation drive i.e drive where you installed windows

2. click properties at the bottom

3. select security tab

4. click Add and scroll down to SYSTEM account click add and click OK.

5. allow Full control permission and click Apply and then Ok.

This should solve your problem with windows installer.

Thank You..

User's Guide To Avoid Virus Infections


Keeping an eye out for viruses

Computer viruses are everywhere! This guide will show you how to stay alert and how to avoid getting infections on your computer. Having an updated virus scanner is only a small part of this, there are many ways that you can prevent having viruses other than a virus scanner, as it will not always save you.

Types of viruses :

There are many type of viruses. Typical viruses are simply programs or scripts that will do various damage to your computer, such as corrupting files, copying itself into files, slowly deleting all your hard drive etc. This depends on the virus. Most viruses also mail themselves to other people in the address book. This way they spread really fast and appear at others' inboxes as too many people still fall for these. Most viruses will try to convince you to open the attachment, but I have never got one that tricked me. In fact, I found myself emailing people just to make sure they really did send me something. It does not hurt to be safe.

Worms

Worms are different type of viruses, but the same idea, but they are usually designed to copy themselves a lot over a network and usually try to eat up as much bandwidth as possible by sending commands to servers to try to get in. The code red worm is a good example of this. This worm breaks in a security hole in Microsoft IIS (Internet Information Server) in which is a badly coded http server that, despite the security risks, a lot of people use it. When the worm successfully gets in, it will try to go into other servers from there. When IceTeks was run on a dedicated server at my house, there was about 10 or so attempts per day, but because we ran Apache, the attempts did not do anything but waste bandwidth and not much as I had it fixed a special way. Some worms such as the SQL slammer will simply send themselves over and over so many times that they will clog up networks, and sometimes all of the internet. Worms usually affect servers more than home users, but again, this depends on what worm it is. It is suspected that most worms are efforts from the RIAA to try to stop piracy, so they try to clog up networks that could contain files. Unfortunately, the RIAA have the authority to do these damages and even if caught, nothing can be done.

Trojans
Trojans are another type of virus. They are simply like a server in which enables hackers to get into and control the computer. A trojan such as Subseven can enable a hacker to do various things such as control the mouse, eject the CD/DVD-Rom drive, delete/download/upload files and much more.

MBR virus
Boot sector viruses are another type, they are similar to file viruses, but instead they go in the boot sector and can cause serious damage when the computer is booted, some can easily format your drive simply by booting your computer. These are hard to remove.
Most viruses have various characteristics. For example, a worm can also be a trojan and also infect the boot sector. It all depends on how the virus is written and what it is designed to do. That's why there are not really strong structured categories, as they can easily mix one in the other.

Precautions : Know the potentially dangerous files
Like any other files, viruses must be opened in order to do something. Most viruses come through e-mail as an attachment. Some will make it look like it's someone you know, and it will try to convince you to open an attachment. Never open attachments at any cost! Some viruses will infect files in programs, so opening a program will actually open the virus, maybe the same one, or another part of it.

All files have what is called an extension; This is the 3 last letters after the last period. For example, setup.exe has a file extension of .exe.

Extensions to watch out for are .exe .com .bat .scr .pif .vbs and others, but these are the most seen. .exe .com .bat .pif and .scr are valid extensions for executables. A virus writer will simply rename it to one of these and it will work the same way. .pif is a shortcut to an ms-dos program and will have the ms dos icon, but will still execute whatever code is in it, so an .exe can be renamed to .pif and be run the same way. .bat is a batch file, which can contain instructions to do various file activities, but again, a .exe can be renamed to .bat and it will execute it! .vbs is a visual basic script. For some reason, Microsoft provides this scripting language along with the scripting host to make it more convenient to design and write viruses quickly and easily, I've never seen another use for this scripting language other than for writing viruses. There are programs that are written with that language, but it is compiled into an exe. Exe is the usual extension for programs, you would not have a software CD/DVD install a bunch of vbs files all over!

Bottom line is, if you don't know what a file is just don't open it. Some viruses will sometimes be named a way as to mask the real file extension to make it look like a harmless file such as a image file. This is easily noticed, but can still be missed. Simply don't open unexpected files.
If you get something that appears like something legit, just ask the person it came from if they sent it. Most viruses use a friend's address to make it look like it comes from them. The virus does this by using the person's address when sending itself to the address book contacts.

Downloads
Email is not the only way to get viruses; P2P (file sharing programs such as kazaa, winmx, direct connect etc) is also another way to get viruses.

When downloading programs, the main thing to watch out for is the file size. If you are downloading a program that you expect to be rather large such as a game, don't grab a file that is 10KB, since it's most likely a virus. However, I've been caught with a virus even with large files, so file size is not the only thing to watch, as an exe is still valid even if junk is added at the end, so a 64KB virus will still function even if it is turned into 650MB.

Icons are something to look for too, fortunately, virus writers don't take time to put icons. If your download should be a setup file, you should see the icon of a setup file. If it's just the blank icon that typical plain or corrupted exes have, don't open it.

Another thing to do, which should be obvious, is to scan the file for viruses using updated virus definitions. But don't rely on only your virus scanner, as they are not perfect, and if the virus has not been reported to them yet, they won't know to create a definition for it!

Changing settings to stay safe
If you do open a virus, you want to avoid it going to all your friends. The simplest thing to do is to NOT use the windows address book. It is easy for viruses to get through and Microsoft is not doing anything about it. Just don't use it. Put them in spreadsheet or even better write them down somewhere. Don't use the address book.

Another "feature" to avoid is the auto preview. Some viruses can attempt to open themselves just by opening the email. There are security holes in Microsoft mail programs that allow this. In Microsoft Outlook, click on the view menu and remove auto preview. You need to do this for every folder, but the inbox is most important. In Outlook Express, click on the view menu and go to layout. In the dialog box, you will see a check box for show preview pane. Uncheck it and click ok.

Another thing you should change, especially if you download a lot, is the option that allows you to view the file extension. In Win XP, go  to Tools>Folder Options, click on view then folder options and choose the view tab and where it says hide file extension for known types, uncheck it. (For Win Vista & 7; Organize>Folder and Search Options>View)

Avoiding server worms
Some viruses, mostly worms, can exploit through servers and affect other servers from servers that have been infected. A good example is the SQL slammer. This was a worm that affected SQL servers run by Microsoft IIS and Microsoft SQL Server. Once the worm gets in, that particular server starts trying to find more exploitable driving internet connections to a halt in the process. Servers running Apache were unaffected by that, except for the many hits to try to get in. IceTeks received about 100 hits per day when it was run on a dedicated home server. Most hits came from major ISPs and other big websites that had no clue they were still affected.

The simple solution to avoid these types of viruses is to NOT use Microsoft based server software for your server, especially if it is a public server. The operating system is also crucial, but the actual server software is much more. Apache, which is free, is much more secure than Microsoft based server programs such as IIS. IIS may be easier to understand and administer, but it saves a lot of hassle to learn how to use Apache. IIS has a large number of vulnerabilities, such as the ability to gain access to cmd.exe and basically delete the whole drive by doing a ../ request in the address bar. These don't require viruses, but simply commands, but there are worms written to automatically make these commands. The code red does this.

Removing a virus
The best way to do this is to do a clean install. However, depending on how bad the virus is, a simple clean install won't remove it. So to be extra sure, you'll want to do a low level format. This is especially true of you got a boot sector virus, as even repartitioning and formatting won't quite remove it, but sometimes you can get away with an fdisk /mbr, but not all the time. here are various removal tools for viruses, it is good to use them and see if they work, but proceeding with the clean install is recommended. You never know if the virus is completely removed by deleting files you suspect are infected. Some viruses such as the Bugbear will close Anti-virus programs and other programs to make it hard and annoying to figure out what to do. A clean install is the best way to ensure that it's gone for good.

Viruses are out there, don't be one of the many infected ones! Stay alert and stay safe! Don't open unexpected files, regularly update your virus definitions and scan downloaded files!

Thank You..

.