PCs when newly bought can be very very perfect and enjoyable to use. But the headaches start when some rubbish starts finding its way into the computer. These rubbish, which we call digital waste products or better still terror bearer usually find their way into ones PC and starts to work against the uniform functionality of that PC, slowing it speed down, causing it to lose memory, crash hard disk HDD,boot and reboot withou stopping, prolonged booting and other messy and annoying malfunctions which the PC will start showing.

In this case, we neither blame the own of the PC or the PC itself. The problem has come as a result of evil and bad effects of some starngers that have found their way into your PC and trying to squeeze life out of the PC. These starngers popularly go by the names, worms, viruses, spywares,hacker prone tags, error registry,adwares,malwares,etc.

If your pc have suffered this or youare not certain about your pc's condition, then we recommend and strongly advice you use one of these tool kits to help save the life of the pc, save your own hard earned money and make your pc work as if its new one, and restore the joy of your mind which came when the PC was newly bought, it is still possible, and by just starting here:

1. see what is hiding in your pc:worms:viruses, HERE..

2. simple fix guide for all PC problems, HERE...

3. Reverse phone detective,device,#1security Device HERE...

4. using free antivrus effectively to remove viruses HERE...

5. Increasing you pc speed and functionality HERE...

6. pc upgrade kit HERE...




Welcome to the Sacred Hall of Computer and Internet Terms and Acronyms


Having all these for your use, we strongly advice, recommend and urge you to be kind enough to your pc by protecting it,and increasing its life span by :





A name that is substituted for a more complicated name. For example, a simple alias may be used instead of a more complicated mailing address or for a mailing list.

Analog:Describes any information that has been translated into a corresponding physical change, such as electric current - any information may be converted to analog. Technologically inferior to digital because of signal degradation (the signal or data strength is weaker at a distance with analog data).

ANSI :An acronym for American National Standards Institute. The American body responsible for setting telecommunications standards in the US. Unfortunately these often differ from those set by the ISO, the world standards authority.


A computer program written in Java for transfer over the web.

Archie:A search utility used on the Internet to locate files in FTP sites, these files are generally public domain files that anyone can download.

ARPA :An acronym for Advanced Research Projects Agency.

ARP:AnetWhere the Internet began; the Advanced Research Projects Agency (of the U.S. Department of Defense) computer network that was the forerunner of the Internet. Has been replaced by NFSNet.

ASCII:The American Standard Code for Information Interchange, a standard way for computers to use bits and bytes to represent characters. An ASCII file contains simple text without any special formatting codes.

ATM: An acronym for Asynchronous Transfer Mode. A method of transmitting bytes across communications links.
AUP An acronym for Acceptable Use Policy of the NSF which prevents the use of the NSFnet backbone for purely commercial use.
AvatarA graphical representation of a person in a chat room. The word comes from Hindu mythology in which spirits come down and inhabit bodies.

Backbone:A network through which other, smaller networks are connected.

BandwidthDescribes the capacity at which a given communications channel, such as ordinary copper telephone line, can transfer information; increasing bandwidth increases the speed at which data transfer takes place. The greater the bandwidth, the greater amount of data can be transferred.

Baud RateA measurement of how quickly a modem transfers data. Although, strictly speaking, this is not the same as bits per second, the two terms are often used interchangeably.
BBS (Bulletin Board System)A service accessible via modem or other connection through which users may exchange messages privately or post messages to a publicly accessible forum; may or may not have Internet access.

BIOSBasic Input Output System. This is the basic set of instructions that tell the computer how to act. Most computers have these instructions built into a chip that plugs into the motherboard.
BitShort for binary digit; either a 1 or a 0; the smallest unit into which digital information may be broken.

BPS (Bits per Second)A measure of the speed of data transmission; the number of bits of data that can be transmitted each second. Modems are generally measured by their BPS rate (14.4K - 14400 BPS, 28.8K - 28800 BPS)

Boot upThe process of turning on the computer, which includes a number of functions that are performed automatically every time the power switch is turned on.

BrowserA client software program used to search networks, retrieve copies of files and display them in an easy-to-read, often graphical, format. Browsers such as SPRY Mosaic, Netscape Navigator, and Microsoft Internet Explorer are used to access information on the World Wide Web.

BTW or IMHOAbbreviation for "By the way" or "in my humble opinion", respectively. Abbreviations such as these are commonly used in email, newsgroups, or listservs.

Bulletin Board System (BBS)A computer system to which other computers can connect so their users can read and leave messages, or retrieve and leave files.
ByteA collection of eight BITS.

ChatA program that connects computers on a network for instantaneous, multi-way communication. People who use chat can type messages for delivery to a server, which displays the messages instantly so that users who are logged on to the chat service can respond immediately. On the Internet, chat is sometimes referred to as Internet Relay Chat (IRC).

CIX An acronym for Commercial Information Exchange.

Client A software program that provides access to network resources by working with information stored on a server.

CMOSComplimentary Metal Oxide Semiconductor. A CMOS computer circuit consumes very little power and is used in computers to keep track of the system setup information, data, time, type of disk and hard drives, etc. that a computer has installed. The CMOS information is powered by the computer's on-board battery. So if the on-board battery fails, the information in CMOS is lost.

Compressed FileComputer files that have been reduced in size by a compression program. Such programs are available for all computer systems.

CPUCentral Processing Unit. This is the brains of the computer. You'll hear computers described in terms of which CPU is installed in them. A 486 computer, and Pentium, a 386DX, etc.

CrashAn unexpected shutdown either of a program or the whole system.; sometimes traumatic, always frustrating ; often fixable by turning off the computer and turning it back on; results in losing any unsaved work. Can also be used in instances of a hard disk physically being damaged.

CruiseNavigating the Internet by following hyperlinks from one Web site or page to another.
CSCW This is an acronym for Computer Supported Co-operative Work, more commonly called groupware. See also Lotus Notes.

CyberspaceA term coined by author William Gibson. It describes the imaginary space in which computer users travel when "surfing" the Internet.

DaemonIn UNIX, a program running all the time in the "background" (that is, unseen by users), providing special services when required. An example of a daemon is biff, which lets you know when mail arrives.

DARPAUS Defense Advanced Research Projects Agency (now ARPA). One of the bodies which `created' the concept of the Internet and funded the development of Internet facilities for many years.

Dedicated LineA telephone line that is leased from the telephone company and used for one purpose only. In the early days of the Internet, it was a line dedicated to a server.

Dial-in Direct ConnectionAn Internet connection that is accessed by dialing in to a computer through a telephone line. Once connected, your computer acts as if it were an Internet host. This type of service is often called SLIP, CSLIP or PPP.

Dial-up ServiceA common Internet term for a dial-on terminal connection.
DigitalTerms used to describe any information that has been translated into a corresponding series of 1s and 0s; any information - text, sound, image, color, may be digitized.
Discussion BoardA forum on a Web site for the discussion of a specific topic or set of related topics.

Domain NamesA name given to a host computer on the Internet. E-mail names are good examples of domain names (i.e.,

DotShort for the "period" usually heard in a reference to a url -- ""
DownloadThe process of transferring information from one computer to another, usually from a server to a client. You download a file from another computer to yours.

EDI An acronym for Electronic Data Interchange. Also referred to as electronic commerce.

Electronic Commerce The transacting of business electronically rather than via paper.

E-mail (Electronic Mail) A means of sending typed messages from one computer to another, over a network or the Internet.

EmoticonEmoticons, or smileys :-) , are used to convey emotion. The expressions and inflections of voice we use to convey emotion, irony, sarcasm, etc. when talking are lost when communicating over the Internet. To make up for that, a system of symbols has developed which uses common keyboard marks.

FAQFrequently Asked Question. This is often a file which new users can refer to when using a new service or piece of Internet software. It contains answers to frequently asked questions, hence the name.

File Transport Protocol (FTP)A service for moving an electronic file of any type from one computer to another over the Internet.

Flame MailAn excessively angry or rancorous message, generally containing personal insults, sent through e-mail.

FlamerSomeone who writes flame mail. Flamee should be obvious.
Floppy DiskA removable storage medium that is used in conjunction with a floppy drive, usually 5.25-inch or 3.5-inch in size.

ForumThe dedicated area where people come together to discuss issues, hobbies, or news. Also called newsgroups.

FreewareSoftware provided free by its originator. See shareware.

Frequently Asked Questions (FAQ)An area or document dedicated to answering common questions.

GB (Gigabyte)1,000 Megabytes. A measure storage space. Hard Drives now are measured in GB capacity.

GIF (Graphic Interchange Format)One of two popular systems used to compress the size of image files so they require less bandwidth to transfer on the Web.

GopherAn Internet service for locating and delivering electronic files. The Gopher interface includes a directory tree and a set of menus which can be used for exploring the Internet and downloading files.

GUIThis is an acronym for Graphical User Interface. Examples are Windows and Apple's Macintosh operating system. The concept originated in the early 1970s at Xerox's PARC laboratory.

Hard DiskThe rigid storage medium located within a hard drive; the relatively large storage area where a computer's operating system, applications, and data usually reside.

Helper AppA "helper application" or add-on program particularly for a web browser that increases the functionality and the type of files that the browser can display. Also see Plug-in.

Home PageThe opening page of a World Wide Web document, sometimes called the welcome page.

HostA computer connected directly to the Internet. A service provider's computer is a host.

HTML (HyperText Markup Language)This is an acronym for HyperText Mark-up Language which is used to format information so that it can be structured and made accessible to the World Wide Web (WWW). The language itself is a simplified derivative of SGML, a widely used standard developed in the mid 1980's. The technique employed is to encase the information in special markers (called tags) which tell the WWW applications how the text is to be interpreted.

HTML+ A proposed new standard which will supersede html. It is a superset of html which is designed to extend the capabilities of the language to incorporate better support for multimedia objects in documents.

HTTP (Hypertext Transfer Protocol)The protocol that forms the basis of World Wide Web technology. HTTP is the set of rules governing the software that transports hyperlinked files along the Internet.

HypergraphicIn a World Wide Web document, a graphic image coded to form a link to another file. As with hypertext, if you click on a hypergraphic, you will jump to the linked file.

HyperlinkA code which contains an "address," which when clicked, will take you to that address.
Hypermedia Like hypertext except that the concept is extended to multimedia objects such as graphics, video and audio.

HypertextElectronic text coded to provide instant access, via links, to other hypertext (or hypergraphics) elsewhere within a document or in a separate document.

IAB An acronym for Internet Architecture Board
IANA An acronym for Internet Assigned Numbers Authority
IDEIntegrated Drive Electronics. An interface used mainly by hard drives and CD-ROM drives to connect to the computer.

IETF An acronym for Internet Engineering Task Force
InternetA collection of networks linked together using a common protocol. The global computer network achieved through the interconnection of smaller computer networks around the world.
IP (Internet Protocol)The standard protocol used by systems communicating across the Internet.

IP AddressA digital code that precisely locates a computer connected to the Internet.
IRC (Internet Relay Chat)A software tool that makes it possible to hold real-time keyboard conversations online.

ISDN (Integrated Services Digital Network)Large bandwidth telephone line. Allows you to transfer information quickly.

ISOAn acronym for International Organization for Standardization

ISOC An acronym for The Internet Society

ISP (Internet Service Provider)A company that provides a connection to the Internet. Service providers sell access to the network. Services offered differ between ISPs.

ITU An acronym for International Telecommunication Union

JAVAA relatively new programming language developed by Sun Microsystems mainly to enhance the "online experience" of the World Wide Web.

Joint Photographic Experts Group (JPEG) Graphic FormatA commonly used compression technique for graphics images on the Internet.

K (Kilobyte)1024 bytes
KillAn action that can be taken in Usenet to exclude certain words, phrases, subjects, or even specific individual posters, from the list of messages displayed on your screen.

LAN (Local Area Network)The regional server or servers your computer is connected to. These in turn are connected to other servers creating a network in your office, home, etc.

ListservMailing list that acts as a newsgroup. Messages sent to a listserv address are sent to everyone who has subscribed to the list. Responses are sent back to the listserv address.

Local FileA file stored on the hard disk of your computer, as opposed to a file stored on an Internet server or some other remote computer
Lotus Lotus Development Corporation the software company responsible for the Notes line of products.

LurkingReading chat, forum, newsgroup or listserv messages without responding to them.

MACShort for "Macintosh"; the other type of personal computer, manufactured by Apple Computer, not a PC
MAN An acronym for Metropolitan Area Network.

Megabyte (MB)1 million bytes. A measure of the quantity of data. A megabyte is a lot when you are talking about files containing simple text messages, but it's not much when you are talking about files containing color photographs.

MBONE An acronym for Multicast BackbONE, an Internet service which gives public access desktop video communications. The quality is poor with only 3-5 frames per second instead of the 30 frames per second of commercial television. Its advantage is that it avoids all telecommunications costs normally associated with teleconferencing. An interesting innovation is the use of MBONE for audio communications and an electronic "whiteboard" where the computer screen becomes a shared workspace where two physically remote parties can draw on and edit shared documents in real-time.

MicrosoftThe computer industry giant responsible for DOS, Windows, Windows 95 and assorted business and personal software. Now challenging Netscape is the web browser market with Internet Explorer.

MIMEAn acronym for Multipurpose Internet Mail Extensions
Modem (Modulator-Demodulator)A device that converts digital signals from your computer into analog signals for transmission through a phone line, and vice versa (called demodulation).
MouseA small, handheld device attached to a computer; when moved across any flat surface (such as a desk), it results in the movement of something on the computer screen called a cursor; includes one or more buttons that allow the user to select graphics or text onscreen.

MOSAIC A software application which runs on UNIX, PC and Macintosh computers. It is an interface to the WWW.

MPEG (Motion Picture Experts Group)A video file compression system used on the web.
MUD (Multi User Domain)A game or simulation in which multiple participants can engage simultaneously through their connections to the same Internet server.

NCSA An acronym for the U.S. National Center for Supercomputing Applications, creator of the first Mosaic (browser) application for the WWW.NCSA - home of Mosaic.
NetworkTwo or more computers connected to one another for the transfer and sharing of information.

NetiquetteInternet etiquette, the correct form of behavior to be used while working on the Internet and Usenet. It can be summed up as, "Don't waste computer resources and don't be rude."

NetscapeA computer company in California famous for their Netscape Navigator Internet web browsing software.

NewbieAn individual new to the Internet. Used with both affection and malice--depending on whether you're being welcomed or being flamed.

NewsgroupOpen forums or electronic bulletin boards on the Internet, where readers can share information, ideas, tips, and opinions with each other.

Notes A group of applications from the Lotus Development Corporation which allows organizations to share documents and exchange email messages.

NSFAn acronym for National Science Foundation

OnlineConnected. You are online if you are working on your computer while it is connected to another computer. Your printer is online if it is connected to your computer and ready to accept data.

OS (Operating System)The primary program running on a computer; started automatically when the computer is turned on; all other programs run within the operating system. Examples: DOS, Windows 95, UNIX, OS/2 Warp, and System 7 (Mac). Windows itself is not an operating system.

PC (Personal Computer)Usually refers to what 's commonly known as an IBM-compatible computer, made by any one of dozens of manufacturers or backyard entrepreneurs.
PDFPortable Document Format. A document format read by Adobe System's Acrobat viewer. This format is excellent for displaying instruction manuals and other large documents in a "web-ready" state.

PEM An acronym for Privacy Enhanced Mail
Plug-inA helper application that works within a browser. It adds more functionality to a browser commonly associated with the Netscape Navigator browser software.

PortGenerally, port refers to the hardware through which computer data is transmitted; the plugs on the back of your computer are ports. On the Internet, port often refers to a particular application. For instance, you might telnet to a particular port on a particular host. The port is actually an application.

PostingA message sent to a newsgroup or the act of sending such a message.

PostmasterThe person at a host who is responsible for managing the mail system. If you need information about a user at a particular host, you can usually send e-mail to the postmaster at postmaster@hostname.

PPP (Point-to-Point Protocol)A protocol that allows a computer to use the TCP/IP (Internet) protocols (and become a full-fledged Internet member) with a standard telephone line and a high-speed modem. PPP is a new standard for this which replaces SLIP.

ProtocolA set of rules computer programmers apply when writing code for a specific software. Computers and networks interact according to standard protocols, which determine the behavior that each side of a network connection expects from the other side.

PTT An acronym for Postal, Telegraph and Telephone

QueryA search question that has been asked in a manner the computer's database system can understand and use.

RAM (Random Access Memory)The working space within a computer that may be used at one time; increasing the amount of RAM increases the speed at which a computer works because more of a program may be loaded into the working space at one time, so less time is spent accessing parts of the program from the hard drive. Information stored in RAM is lost when the computer's power is turned off.

Replication A capability of Lotus Notes to automatically distributes document databases across physical telecommunications networks. Notes supports a wide range of network protocols including X25 and Internet TCP/IP.

Remote ComputerA computer located somewhere else along a network as, for example, the computer containing the online catalog of your local public library. Remote is a relative term, relative, that is, to the computer immediately at hand (the local computer). A remote computer can actually be located within the same room, or it can be halfway around the world.

ROM (Read Only Memory)This memory is the core instructions for the computer, it generally cannot be altered (read only) and is burned into the chips making up the specific motherboard.
RouterA system used to transmit data between two computer systems or networks using the same protocol.

SCSISmall Computer Systems Interface. An set of standards used by an input device to interface with the computer. SCSI systems can "daisy-chain" up to 7 seven devices to a single connection. In other words, one device can connect to other device, and to another until it connects to the computer. Because several devices can connect to one single input connection, each device must be properly terminated for the entire chain of devices to work.

Search EngineA tool used which matches key words you enter with titles and descriptions on the Internet. It then displays the matches allowing you to easily locate a subject. Similar to a card catalog, but not as efficient. Common search engines are Webcrawler, Yahoo, Alta Vista, Infoseek, and Lycos.

ServerA computer or its software that "serves" other computers by administering network files and network operations. Three types of Internet servers are Web servers, e-mail servers, and Gopher servers.

SharewareSoftware that is freely distributed, but the author expects payment from people who decide to keep and use it.

SIG An acronym for Special Interest Group
SignatureA short piece of text transmitted with an e-mail or newsgroup message. Some systems can attach text from a file to the end of a message automatically. Signature files contain detailed information on how to contact someone.

SLIP (Serial Line Internet Protocol)A protocol that allows a computer to use the Internet protocols (and become a full-fledged Internet member) with a standard telephone line and a high-speed modem. SLIP is being superseded by PPP, but is still in common use.

SmileyA symbol in e-mail and newsgroup messages used to convey emotion, or simply amusement. Create smileys by typing various keyboard characters. For example, :-) means happiness. See also, Emoticon.

SMTP (Simple Mail Transfer Protocol)One method a computer uses to send e-mail from one computer to another. Other methods include Multi-purpose Internet Mail Extensions (MIME) and Privacy Enhanced Mail (PEM).

SQL, Structured Query Languagean official ANSI language for retrieving information from a database. Most database software providers add extensions. The "official" pronunciation is "sequel,"

StreamAudio or video transfer of signals in digital form. It is then downloaded on your computer and played back using various tools.

STT (Secure Transaction Technology)Technology developed by software companies and credit companies to protect financial dealings over the Internet and prevent fraud.

SurfingSame as "cruise." The random, aimless exploration of web pages achieved through following links that look interesting within a document.

T1 LineA line connecting a computer to a high-speed, high-bandwidth, digital electronic communication carrier.

TCP/IP (Transmission Control Protocol/Internet Protocol)A set of protocols (communications rules) that control how data is transferred between computers on the Internet.

TelnetAn Internet protocol used for logging on to a remote computer, as well as the software that implements it. Telnet makes all Internet hosts appear to the user as if they use the same techniques for presenting information on screen and the same commands for performing tasks (such as typing and editing commands).

ThreadedOrganized according to thread, or line of discussion, in a newsgroup or on a discussion board. A thread is a more or less continuous chain of postings on a single topic.

TWAIN(submitted by a reader) "Technology without an interesting name"Actually its the interface used by a input device such as a scanner to import images (generally graphics) into the computer.

UNIXA computer operating system, popular with high-end computer users, academics and the research community. Most hosts connected to the Internet run UNIX.

UploadThe process of transferring information from one computer to another, generally from a client to a server. For example, you upload a file from your computer to another.

URL (Universal Resource Locator)The specific path to a World Wide Web file, including filename and extension.

UsenetThe "user's network." A large network connected to the Internet. It contains Newsgroups or discussion areas on almost any topic available. Messages are posted publicly for all to see.

VeronicaThe Very Easy Rodent-Oriented Net-wide Index to Computerized Archives is a service that's built into Gopher. Veronica allows you to search all Gopher sites for files, directories and other resources.

VirusA program that uses various techniques for duplicating itself and traveling between computers. Viruses vary from harmless nuisances to serious problems that can cause millions of dollars' worth of damage.

VR (Virtual Reality) A simulated three-dimensional environment, displayed in real time with interactive capabilities. VR applications have been developed for the World Wide Web, although the technology is still at an early stage.

VRML (Virtual Reality Mark-up Language)Protocol language which allows 3-D representation of graphics. Chat rooms are increasingly using VRML to represent chatters graphically with avatars.

W3 An acronym for the World Wide Web.

WAIS (Wide Area Information Search)Software that is used to index large text files in servers. On the client side, it finds and retrieves documents in databases, based on user defined words.

WAN An acronym for Wide Area Network. A larger computer network that is geographically dispersed, such as one that stretches across a university campus.

Websee World Wide Web (WWW).

Web PageA single screen (document) on a Web site.

Web SiteThe location of published hypertext content. Physically, a Web site can occupy an entire Web server or a part of a server; or it can be spread out among different servers as long as its sections are all linked, directly or indirectly, to the same home page.

WWW (World Wide Web)An acronym for the World Wide Web. The WWW is a hypermedia retrieval system for information. The newest medium of the Internet. Based on hypertext, the Web provides a quick and easy method of delivering and receiving information files which are read by a browser. The Webs ability to transfer files containing not just text but also graphics, sound, and video makes it the most versatile of all the Internet services.

WYSIWYG (What You See Is What You Get)Pronounced "wizziwig," it is a generic term meaning what you see on your screen is what is going to print out on your printer.

X Windows ProtocolA network terminal standard developed at MIT that enables a user to run and display multiple network applications at the same time.

YahooA popular search engine used to index the web.

'ZineElectronic magazines, published on the Internet.

Having all these for your use, we strongly advice, recommend and urge you to be kind enough to your pc by protecting it,and increasing its life span by :

How to Manually Run the Microsoft Malicious Software Removal Tool

What is the Malicious Software Removal Tool?

In early 2005, Microsoft started releasing a software product called the Microsoft Malicious Software Removal Tool. Its a monthly update released on the second Tuesday of each month (Patch Tuesday) to help scan user's computers and remove viruses and malware. MRT uses a signature database they update on a monthly basis. Because this database does not have virus signatures and patterns for EVERY virus in the wild, its meant to just help prevent the infection and spread of the most prevalent issues. For this reason, you should still run antivirus software on your computer even though the Malicious Software Removal Tool is being run on your computer.

Normally, this removal tool is downloaded via Windows Update and runs silently in the background to check for infections on the computer. It runs a quickscan for the worst infections, but what if you would like to use the removal tool to run a more thorough scan of your computer. We'll show you how to manually start the MSRT and how to run a thorough scan for problems.

How to Run the Malicious Software Removal Tool Manually

Follow the steps below to open MSRT and change the default settings.

1) Click on Start, Run
2) Type MRT and Press Enter
3) You'll be presented with the grey background screen, click on the Next button
4) Normally, the removal tool runs the Quick Scan, but for more thorough results, choose FULL SCAN and click Next
5) Now the Malicious Software Removal Tool will scan your entire hard drive for infections and problems.

6) Once the scan is completed, you should see the following screen if your computer is free of infection.
7) If you click on the View Detailed Results of the Scan option on the Results page you should see which viruses, worms, and trojans the removal tool scanned for and if an infection was found.

8) Click Finish on the Scan Results page to exit the Microsoft Malicious Software Removal Tool

Log File Results

Whether you manually run the removal tool or it runs automatically when downloaded from Windows Updates, you may want to view the scan results log to see what it scanned for and what it found. The log file (mrt.log) will be found in the Windows\Debug folder. If you are running Windows XP or Windows Vista, this file is probably located at


Follow the instructions below to open it.

1) Click on Start, Run
2) Type the following and Press Enter

notepad c:\windows\debug\mrt.log

3) The log file will open in Windows Notepad. Each scan will log its results in the file. If you had an infected file, you will see something like the following in the log file.

Microsoft Windows Malicious Software Removal Tool v1.33, September 2007
Started On Sat Sep 15 21:41:52 2007

Extended Scan Results
->Scan ERROR: resource file://C:\pagefile.sys (code 0x00000020 (32))
Found virus: Backdoor:Win32/Nuwar.B!ini in file://C:\Documents and Settings\Mark\spooldr.ini
Found virus: Backdoor:Win32/Nuwar.B!ini in file://C:\Documents and Settings\Mark\Desktop\Virus Info\spooldr.ini
Found virus: Trojan:Win32/Tibs.DC in file://C:\System Volume Information\_restore{3C8729AD-DC07-4E82-8FC5-363FFE9EB86D}\RP14\A0020913.exe

4) Click on the X in the upper right corner to close Notepad

More InformationFor more information on the Microsoft Malicious Software Removal Tool visit


How to Fix Common Windows Problems

As PC sales continue to climb year by year, it is in your best interest to be equipped with basic knowledge in how to fix your computer. Here are some of the most common problems found when using a PC:

Virus, Spyware, Malware

Virus attacks are one of the most common problems to plague a PC. According to sources, there are in fact millions of computer viruses created with newer versions coming out every minute. To disinfect a PC from a virus attack, all you need to do is to install and run a virus scanner. It is highly recommended that you have a virus scanner installed at all time. Always set it on auto update to get the latest virus definitions. Examples of virus scanners that you can get off the market are AVG and McAfee.

Spyware and malware on the other hand requires another type solution - a spyware and malware scanner and cleaner. Always scan your PC for spyware and set your browser to a higher security level. Try using other types of browser such as Firefox and Opera. Internet Explorer on the other hand is more susceptible to a spyware attack. If possible, try installing a firewall on your PC as well. These software can be easily downloaded from

Windows Crashed and hard disk failure

Windows crashing is also another most common problem found on a PC. Windows is not the most reliable operating system available in the market. Because of widespread usage, many people rely on Windows to perform daily tasks. If your Windows crashed, try rebooting the PC. And if it hangs during reboot, try using Windows Safe Mode by pressing F8 during restart. When you are in the Safe Mode, disable or uninstall any software that you might think is the cause of the problem. If the problem still persists, restart the PC and insert the Windows installer CD. Get to the command prompt and run a scandisk. Running scandisk will help you recover any bad sectors on your hard disk. This might be another cause for your Windows crashing. Scandisk can also be used to recover corrupted data. If this doesn't work, try reformatting your hard disk and reinstall Windows.

Components not functioning

The computer is made up of multiple components. Examples of external components are the mouse, keyboard, speakers, microphone and the monitor. If one of these components is not functioning try checking the connections such as the cables connecting to it. If you are using wireless, simply check whether there's any wireless connection between the components. Sometimes a good bang does help in solving your problem. If you notice that your components are not receiving power, it is possible that the parts are faulty. Head to your computer store and get a replacement unit.

No network

As more and more computers are getting connected into a network, there is also a problem where a computer can't get online. Check whether your network cable is securely inserted into the network port. Also, check the cable to see whether it is faulty or not. Try using another network cable to test this. If you find no fault with the cable, check whether the network card is blinking or not. If it is not blinking you might have a faulty network card problem. If it is blinking then it might be a software problem. Check whether the driver for the network card is properly installed. If it is, then go to the command prompt and type ipconfig /release and then ipconfig / renew. This should probably work. If it doesn't, try calling your helpdesk for extra help - it might be something wrong with the server.

Weird whirling noise

A whirling noise might be caused by the fan in your PC. Fans and heat sinks are necessary to keep your computer from overheating. If you do hear a whirling noise, try checking the fans in your PC. Replace any fan that is faulty. It is important that you replace it at once, because an overheating PC will most likely stop functioning.

PC failed to boot up or boots up without display with the fan running

Most likely the computer's internal components are no longer functioning. If the PC boots up with the fan running with no display, this means your processor is no longer working. At times this might be due to the hard disk, or any drives connecting to the PC. Try unplugging all the disk drives and reboot your PC. If your PC still behaves the same, I recommend that you get a replacement.

The famous blue screen and PC reboot unexpectedly

This is another common problem affecting Windows user. A blue screen might be caused by poorly installed drivers or software. Try uninstalling some of the latest software that you have installed. Updating your Windows with the latest Service Pack might help and run scandisk as well. If this doesn't help, try reinstalling Windows.

Last piece of advice, always use original software especially for Windows. An original software user will get proper support as well as the latest updates from your software vendor. It is less likely for an original copy of Windows to fail compared to a pirated version. Try it today!

"Say goodbye to frequent Windows freezes and restarts. Faster boot ups and more productivity with a faster accelerated system. Get PC Booster Now!



How to stop or kill a process in Windows XP or Vista

Kill, Terminate or Stop a Windows Unresponsive, Hanged or Frozen Application or Process

There are a lot of buggy and error prone programs and applications for Windows operating system that may cause your system, desktop or application itself to behave strangely. Beside, the program may be not responding too. Sometimes in worse case, an application may have memory leak where used memory are not released to other purpose, and uses up all available CPU or system resource, causing system to unresponsive or freeze, and simply hang up on you. In this situation, it's possible to stop or end the not responding application or process by using Windows Task Manager.

Use Windows Task Manager To kill, terminate, stop or end an unresponsive or hanged application:

Press Ctrl-Alt-Delete keys simultaneously in Windows XP or Ctrl-Alt-Esc in Windows Vista, and then click on Task Manager.

Alternatively, right click on taskbar and select Task Manager. You can also start Task Manager by manually starting "taskmgr" from Run command in Start Menu.

In the Windows Task Manager window, locate and select (highlight) the application or program that's not responding.

If your system is crawling and extremely slow in responding, you may also check out for services or processes that using too much CPU resources or memory resources.

Click on End Task.

A Task Manager Warning dialog saying "Terminating a process can cause undesired results including loss of data and system instability. The process will not be given the chance to save its state or data before it is terminated. Are you sure you want to terminate the process?" will appear. Confirm the process by clicking on OK or End Now.

It's advised not to stop a system process. Stopping a system process can cause the computer to hang or freeze up.

How to use Task Manager Help

Everything that you might want to know about Task Manager is included in the Task Manager Help file. Some of the help topics are intended for a general audience. Other topics are intended for a more advanced audience. To view the Task Manager Help file, follow these steps:

Press CTRL+ALT+DELETE, and then click Task Manager.
In Task Manager, click Help, and then click Task Manager Help Topics.
In the "Task Manager overview" topic, you can read about the features and uses of Task Manager by clicking the following topics and reading the topic and all related topics:
Programs that are running
Processes that are running
Performance measures

How to monitor your computer's performance

Click the Performance tab to view a dynamic overview of the performance of your computer. This includes the following measures:

Graphs for CPU and memory usage
The total number of handles, threads, and processes that are running
Handles are unique identifiers that allow a program to access system resources such as files, registry keys, fonts, and bitmaps. Threads are objects within processes that run program instructions.
The total number of kilobytes (KB) that are used for physical, kernel, and commit memory
Note Your system administrator may have implemented a local policy on your computer to disable Task Manager. In this scenario, you should contact the system administrator or your help desk if you need local process control or the ability to monitor the computer's performance.

"Say goodbye to frequent Windows freezes and restarts. Faster boot ups and more productivity with a faster accelerated system. Get PC Booster Now!


Safe Cleaning the Windows XP registry

"Say goodbye to frequent Windows freezes and restarts. Faster boot ups and more productivity with a faster accelerated system. Get PC Booster Now!

The Windows XP registry is one of the most important components of your PC. Your Windows XP settings are stored in the operating system's registry. So if you want to safeguard your settings, you must learn how to protect the registry's contents. For that matter, if you want to tweak the operating system using the registry, make doubly sure that you've left a way to get out of any trouble you might cause through overly-enthusiastic hacking. This is for all you Windows XP enthusiasts who edit the registry using the Registry Editor (Regedit).

Click the "Start" menu button to open the Start menu.
Click "Run."
Type "regedit" into the text field and press "Enter."
Access the many different entries in your Windows XP registry. It is separated into primary sections: HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, HKEY_USERS and HKEY_CURRENT CONFIG. Each section contains a different set of entries related to different aspects of Windows XP operation.
Click on one of the plus-signs (+) next to one of the root directories, opening a more detailed list. This second level will have more directories to choose from, and will make it easier for you to find entries you need to clean the registry.
Delete entries in the registry that you know are either causing conflicts or are no longer necessary. Do this by pressing the "Delete" key, or by right-clicking on your mouse and choosing "Delete entry."
Invest in a third-party registry application to help you clean your Windows XP registry. Several programs are available that do the dirty work for you. Some even include backup capabilities to retrace their steps in the event of a critical error.
Clean your boot records by changing which programs load themselves at startup. Click through both the LOCAL_MACHINE and CURRENT_USER directories until you reach Software/Microsoft/Windows/Run and RunOnce. From here, you can clean out registry entries that are causing certain programs to run on startup.

Three Practices to Safe Hacking Windows Registry

Here, you'll learn 3 methods for protecting the registry before you edit it. If you use any one of these methods, you'll almost never make a change that you can't restore. Keep in mind that I use these methods to back up specific branches of the registry while working in those branches. I don't use them to back up the entire registry. System Restore takes care of that for you, so you don't have to manually back up the whole thing.

Leave original data a manual backup before removing them immediately.

Rename the original value to something like Initials_ Name, where Initials is your initials, and Name is the value's original name.
Add a date if you think you're going to change the value often.
Add a new value using the original name and type but with new data. You're all set to change the value and if you don't like the result, you can restore the original value with little effort.
Export the part of the registry in which you're working to a REG file.
Import the REG file to restore the original settings. I'm not as keen on this method as the next method I describe, since importing a REG file in to the registry doesn't always restore keys to their original states (importing a REG file doesn't remove settings from the registry that you've added since creating the REG file). This is an acceptable option for real quick backup copies of individual values, however, since you can edit REG files to remove values that you don't want to restore.

Export branches to hive files.
Hive files are better than REG files for backing up the registry. When you restore a hive file containing a key, the Registry Editor completely replaces the current key and all of its subkeys with the contents of the hive file. Exporting branches to hive files is similar to exporting them to REG files; you just pick a different file type:

Click Start, click Run, type regedit, and click OK.
On the File menu, click Export.
In the Save as type list, click Registry Hive Files.
Type the name of the new hive file, and then click Save.
Reverse the process to restore your settings:
In the Registry Editor, click File, click Import, click Registry Hive Files in the Save as type list, type the name of the hive file to which you backed up your settings, and then click Open. You can use any file extension you like, but I prefer to give hive files the .dat extension. The .hiv extension is also common for hive files.




Bookmark and Share

Windows Registry Repair - Detailed tutorial to fix registry

Detailed tutorial to fix windows registry, backup windows registry and recover from corruption of windows registry

"Say goodbye to frequent Windows freezes and restarts. Faster boot ups and more productivity with a faster accelerated system. Get PC Booster Now!

This detailed tutorial describes when to repair Windows Registry, how to edit and repair the Windows Registry and how to recover from a corruption Windows Registry. Microsoft recommends that before you ever edit the Registry, you always attempt to back up the Registry and understand how to restore it if a problem occurs.

When to repair Windows Registry?<p>

A few symptoms you should recognize as signs of a cluttered registry and probably in need of repair and optimization:
An extremely slowed down system every time you start your computer
Repeated system crashes which happen at high performance times
Frequent error messages even when you do not run many programs or doing something to the system
Frequent and unexplained system freezes
The Ultimate blue screen of death that says Beginning of Physical Memory Dump
Inability to add or remove a software in your computer
Extremely slow response to instructions
Slow startups and shutdowns
Frequent rebooting required

How to edit & repair Windows Registry?

Windows Registry is the nervous system so If it's damaged, it's a good bet that Windows is going to start to experience critical errors and ruin your day for sure. With a solid backup in place, you don't need to worry so much about making a mistake making changes. Its good to be careful, but at least you're covered if you make a mistake. It's so simple to backup the Registry; there is no way you can blow it!

First, you should know that your Windows XP system is covered under System Restore. Make sure you are logged on as the Administrator or at least have Administrative privileges to the XP system.

Start => all Programs => Accessories => System Tools => System Restore

Walk through System Restore and make a backup.

Next, remember that changes only take place once you reboot the system. When you do (after you make your Registry Hacks), that's when you will see the fireworks¡­ or should I say ¨C the infamous BSOD?

Exporting the Registry. You can export the registry in hives or you can export the whole thing. Either way, it all depends on the type of change you are making or if you think you will be able to recover from it or not enough to get it repaired. This is a quick way to backup the Registry but not perfect, System Restore is your best bet.

Open the Registry Editor (Start => Run => Regedit).
Go to File => Import or Export.
If you Export, you can save this to a Registry file (*.reg)

If you were going to make a change to one key, make the duplicate key and rename it this way if you need to come back to the original setting, you have it there, if you just delete the key, you may have to reference another machine and if it's an application specific setting, you may not be able to recover from it if you don't have the install disks for it anymore. It happens.

If these all fail or if you're planning on major surgery in your Registry, you should seriously consider using System Restore. This is the best option for XP only if XP will no longer boot. If that's the case, then you will need to rely on the Automated System Recovery and Recovery Console.

How to recover from a corruption Windows Registry?

Windows XP system might fail to start because of corruption in the registry. The following procedure lists a few manual steps using Recovery Console and System Restore to recover a corrupted registry that prevents Windows XP from starting. It does not guarantee full recovery of the system to a previous state; however, you should be able to recover data when you use this procedure.

Part one:

In part one, you start the Recovery Console, create a temporary folder, back up the existing registry files to a new location, delete the registry files at their existing location, and then copy the registry files from the repair folder to the System32\Config folder. When you have finished this procedure, a registry is created that you can use to start Windows XP. This registry was created and saved during the initial setup of Windows XP. Therefore any changes and settings that occurred after the Setup program was finished are lost.

To complete part one, follow these steps:

Insert the Windows XP startup disk into the floppy disk drive, or insert the Windows XP CD-ROM into the CD-ROM drive, and then restart the computer.
Click to select any options that are required to start the computer from the CD-ROM drive if you are prompted to do so.
When the "Welcome to Setup" screen appears, press R to start the Recovery Console.
If you have a dual-boot or multiple-boot computer, select the installation that you want to access from the Recovery Console.
When you are prompted to do so, type the Administrator password. If the administrator password is blank, just press ENTER.
At the Recovery Console command prompt, type the following lines, pressing ENTER after you type each line:

md tmp
copy c:\windows\system32\config\system c:\windows\tmp\system.bak
copy c:\windows\system32\config\software c:\windows\tmp\software.bak
copy c:\windows\system32\config\sam c:\windows\tmp\sam.bak
copy c:\windows\system32\config\security c:\windows\tmp\security.bak
copy c:\windows\system32\config\default c:\windows\tmp\default.bak

delete c:\windows\system32\config\system
delete c:\windows\system32\config\software
delete c:\windows\system32\config\sam
delete c:\windows\system32\config\security
delete c:\windows\system32\config\default
copy c:\windows\repair\system c:\windows\system32\config\system
copy c:\windows\repair\software c:\windows\system32\config\software
copy c:\windows\repair\sam c:\windows\system32\config\sam
copy c:\windows\repair\security c:\windows\system32\config\security
copy c:\windows\repair\default c:\windows\system32\config\default

Type exit to quit Recovery Console. Your computer will restart.

Note: This procedure assumes that Windows XP is installed to the C:\Windows folder. Make sure to change C:\Windows to the appropriate windows_folder if it is a different location. If you have access to another computer, to save time, you can copy the text in step five, and then create a text file called "regcopy1.txt" (for example). To use this file, run the following command when you start in Recovery Console:
batch regcopy1.txt
With the batch command in Recovery Console, you can process all the commands in a text file sequentially. When you use the batch command, you do not have to manually type as many commands.

Part two:

To complete the procedure described in this section, you must be logged on as an administrator, or an administrative user (a user who has an account in the Administrators group).

If you are using Windows XP Home Edition, you must log on as an administrative user. If you log on as an administrator, you must first start Windows XP Home Edition in Safe mode. (Click here to learn how to start the Windows XP Home Edition computer in Safe mode.)

In part two, you copy the registry files from their backed up location by using System Restore. This folder is not available in Recovery Console and is generally not visible during typical usage. Before you start this procedure, you must change several settings to make the folder visible:

Start Windows Explorer.
On the Tools menu, click Folder options.
Click the View tab.
Under Hidden files and folders, click to select Show hidden files and folders, and then click to clear the Hide protected operating system files (Recommended) check box.
Click Yes when the dialog box that confirms that you want to display these files appears.
Double-click the drive where you installed Windows XP to display a list of the folders. If is important to click the correct drive.
Open the System Volume Information folder. This folder is unavailable and appears dimmed because it is set as a super-hidden folder.

Note This folder contains one or more _restore {GUID} folders such as "_restore{87BD3667-3246-476B-923F-F86E30B3E7F8}".

Open a folder that was not created at the current time. You may have to click Details on the View menu to see when these folders were created. There may be one or more folders starting with "RPx under this folder. These are restore points.

Open one of these folders to locate a Snapshot subfolder. The following path is an example of a folder path to the Snapshot folder: C:\System Volume Information\_restore{D86480E3-73EF-47BC-A0EB-A81BE6EE3ED8}\RP1\Snapshot

From the Snapshot folder, copy the following files to the C:\Windows\Tmp folder:

Rename the files in the C:\Windows\Tmp folder as follows:

These files are the backed up registry files from System Restore. Because you used the registry file that the Setup program created, this registry does not know that these restore points exist and are available. A new folder is created with a new GUIDE under System Volume Information and a restore point is created that includes a copy of the registry files that were copied during part one. Therefore, it is important not to use the most current folder, especially if the time stamp on the folder is the same as the current time.

The current system configuration is not aware of the previous restore points. You must have a previous copy of the registry from a previous restore point to make the previous restore points available again.

The registry files that were copied to the Tmp folder in the C:\Windows folder are moved to make sure that the files are available under Recovery Console. You must use these files to replace the registry files currently in the C:\Windows\System32\Config folder. By default, Recovery Console has limited folder access and cannot copy files from the System Volume folder.

Part Three:

In part three, you delete the existing registry files, and then copy the System Restore Registry files to the C:\Windows\System32\Config folder:
Start Recovery Console.
At the command prompt, type the following lines, pressing ENTER after you type each line:

del c:\windows\system32\config\sam
del c:\windows\system32\config\security
del c:\windows\system32\config\software
del c:\windows\system32\config\default
del c:\windows\system32\config\system

copy c:\windows\tmp\software c:\windows\system32\config\software
copy c:\windows\tmp\system c:\windows\system32\config\system
copy c:\windows\tmp\sam c:\windows\system32\config\sam
copy c:\windows\tmp\security c:\windows\system32\config\security
copy c:\windows\tmp\default c:\windows\system32\config\default

Type exit to quit Recovery Console. Your computer restarts.
Note This procedure assumes that Windows XP is installed to the C:\Windows folder. Make sure to change C:\Windows to the appropriate windows_folder if it is a different location. If you have access to another computer, to save time, you can copy the text in step two, and then create a text file called "Regcopy2.txt" (for example). To use this file, run the following command when you start in Recovery Console:
batch regcopy2.txt

Part Four:

Click Start, and then click All Programs.
Click Accessories, and then click System Tools.
Click System Restore, and then click Restore to a previous RestorePoint.





Bookmark and Share

The software and Hardware Reasons Why Windows Crashes

Why does Windows crash? Check out these following software issues & hardware issues.

"Say goodbye to frequent Windows freezes and restarts. Faster boot ups and more productivity with a faster accelerated system."Get The Pc Fix Guide

Windows XP and Windows 2000 are both supposed to be (and typically are) much more stable than Windows 9x/Me, but there are still things that can bring down the entire system in a heartbeat, displaying the BSD (Blue Screen of Death) or simply restarting. If you're lucky, it only ruins your day. More than likely, you're in for several bad days followed by a few stressful weeks or months. After all, systems rarely fail only once. Rather, they keep crashing until you find the cause and fix the problem. Go over this checklist and see if any of these apply to you.

Why does Windows crash? Software issues.
To date, Windows has been used most commonly on the x86 processor. The x86 implements a protection mechanism that lets multiple programs run simultaneously without stepping on each other's toes. This protection comes in four levels of privilege or access to system memory and hardware. Two of these levels are commonly referred to as kernel mode and user mode.

Kernel mode is the most privileged state of the x86. Both the Windows OS and drivers are considered trusted, and, therefore, run in kernel mode. This ensures unfettered access to system resources and the ability to maximize performance. Other software is assigned to user mode, the least-privileged state of the x86, restricting direct access to much of the system. Applications, such as Microsoft Word, run in user mode to guard against applications corrupting system-level software and each other.

Although kernel-mode software is protected from applications running in user mode, it is not protected from other kernel-mode software. For example, if a driver erroneously accesses a portion of memory that is being used by other software (or not specifically marked as accessible to drivers), Windows stops the entire system. This is called a bug check or a crash, and Windows displays the popularly known Blue Screen of Death (BSOD). About 95% of Windows system crashes are caused by buggy software (or buggy device drivers), almost all of which come from third-party vendors. The remaining 5% is due to malfunctioning hardware devices, which often prompt crashes by corrupting memory contents.

Another little-known fact is that most crashes are repeat crashes. Few administrators can resolve system crashes immediately. As a result, they typically happen again and again. It's common to see weeks and months pass before the answer is found. By solving a crash immediately after the first occurrence, you can prevent time-consuming and costly repeat crashes.

Why does Windows crash? Hardware issues.
Power Supply
A bad (or insufficient) power supply is the most common cause for random crashes, especially if you have a lot of cards, drives, or fans, or have a dual-processor motherboard. A 350W or 400W power supply is recommended if you're experiencing this problem.

A mix of FAT32 and NTFS drives
If you have more than one hard disk, and there are different file systems on each one, try converting them all to NTFS.

Audio Card Drivers
Try removing your sound card, or at least uninstalling and then reinstalling the drivers.

If you have a USB hub, try eliminating it and see if that solves the problem (especially if you have a USB-based Palm cradle and your system crashes every time you hotsync).

A computer will crash if the processor overheats. Make sure the CPU fan/fans are working, and that the processor temperature (read in the BIOS screen) is within normal limits. Make sure your computer case has adequate ventilation.

Bad memory
A bad memory module can cause this problem. Try removing one of the modules (if applicable) to see if that solves the problem; rotate through all modules until you've found the culprit. Note that some computers require memory to be installed in pairs, so, for example, if you have four modules, you'll have to remove two (no more, no fewer) for this test.

Note: these things aren't necessarily problems in and of themselves, so if you're not experiencing random crashes, don't waste your time solving problems that aren't there.





Speed up slow PC - Squeeze every last drop of performance out of your XP ...Duncan Kredion

With faster machines cropping up almost daily, the life span of a midrange PC is a little more than two years of service. Physically, the computer you bought a few years ago is just as sound as any new piece of hardware. Ideally, it could probably last you a decade or two--as long as you didn't add any new software or surf the Net. Realistically, that's not likely to be the case.

Instead of buying a new computer, optimize your present one. The following are 11 things that Chip Manufacturers and PC Retailers don't want you to know or how to perform. Following these advices will drastically increase your PC performance and help you regain your sanity while saving loads of money. And, if your PC is years old and can't afford to upgrade yet, you will be able to squeeze out some more juice out of the old thing!

1. Disable file indexing. This is a tiny service that uses a great deal of RAM and induces much disk thrashing. Your system instantly becomes more responsive. Here's how: First, doubleclick the My Computer icon. Then, right-click on the C: Drive, then hit Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK.

2. Zap the Windows Prefetch folder every week. Windows XP can "prefetch" portions of data and applications that are frequently loaded. This allows processes appear to start faster when requested the user. Over time, the prefetch folder overwhelms with references to files and applications no longer in use. Guess what happens? Windows XP wastes time and grinds to a halt by pre-loading obsolete data. It helps you gain some performance on your XP Professional to periodically empty the prefetch folder.

The prefetch folder resides on your local hard disk, under the Windows folder.

Where X is the drive letter where you have Windows installed. Either path will get you to your local system. The second path is for those who have the default installation on the most commonly used drive letter, C:\

3. Optimise Display Settings. Windows XP can look sexy but displaying all the visual items can waste system resources. Kill unnecessary animations, and nix active desktop. Here's how to do it:
1) Go to Start
2) Click Settings
3) Click Control Panel
4) Click System
5) Click Advanced tab
6) In the Performance tab click Settings
7) Leave only the following ticked:
(1) Show shadows under menus
(2) Show shadows under mouse pointer
(3) Show translucent selection rectangle
(4) Use drop shadows for icons labels on the desktop
(5) Use visual styles on windows and buttons
Feel free to play around with the options offered here, as nothing you can change will alter the stability of the computer - only its responsiveness.

4. Remove the Desktop Picture Your desktop background consumes a fair amount of memory and can slow the loading time of your system. Removing it will improve performance.
1) Right click on Desktop and select Properties
2) Select the Desktop tab
3) In the Background window select None
4) Click Ok

5. Remove Fonts for Speed Zap extra fonts fonts installed on their computer. Fonts, especially TrueType fonts, use quite a bit of system resources. The more fonts they have, the more lethargic the system will become. Anything over 300 fonts tax the system and slow down load times- especially graphic apps. For optimal performance, trim your fonts down to just those that you need to use on a daily basis and fonts that applications may require.
1) Open Control Panel
2) Open Fonts folder
3) Move fonts you don't need to a temporary directory (e.g. C:\FONTBKUP?) just in case you need or want to bring a few of them back. The more fonts you uninstall, the more system resources you will gain.

6. Speedup Folder Browsing You may have noticed that everytime you open my computer to browse folders that there is a slight delay. This is because Windows XP automatically searches for network files and printers everytime you open Windows Explorer. To fix this and to increase browsing significantly:
1) Open My Computer
2) Click on Tools menu
3) Click on Folder Options
4) Click on the View tab.
5) Uncheck the Automatically search for network folders and printers check box
6) Click Apply
7) Click Ok
8) Reboot your computer
To prevent a single Windows Explorer window tanking up takes the rest of your OS down, you can launch separate folder windows in multi processes. Open My Computer, hit on Tools, then Folder Options. Click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option.

7. Disable Performance Counters Windows XP has a performance monitor utility which monitors several areas of your PC's performance. These utilities take up system resources so disabling is a good idea. To disable:
1) download and install the Extensible Performance Counter List
2) Then select each counter in turn in the 'Extensible performance counters' window and clear the 'performance counters enabled' checkbox at the bottom button below

8. Optimise Your Pagefile Windows XP sizes the page file to about 1.5X the amount of actual physical memory by default. While this is good for systems with smaller amounts of memory (under 512MB) it is unlikely that a typical XP desktop system will ever need 1.5 X 512MB or more of virtual memory. If you have less than 512MB of memory, leave the page file at its default size. If you have 512MB or more, change the ratio to 1:1 page file size to physical memory size.
1) Right click on My Computer and select Properties
2) Select the Advanced tab
3) Under Performance choose the Settings button
4) Select the Advanced tab again and under Virtual Memory select Change
5) Highlight the drive containing your page file and make the initial Size of the file the same as the Maximum Size of the file.

9. Improve Memory Usage PC Washer improves the performance of your computer by optimizing the disk cache, memory and a number of other settings.

Once Installed:
1) Click the 'Tools' from the left menu
2) Select 'Memory Booster' in the tools list. A new window named 'PC Turbo Memory' will popup.
3) Click Defragment button in the new window.
4) Exit the program. That's all.

10. Disable unnecessary services Windows XP loads services you will never need. To determine which services you can disable for your client, visit the Black Viper site for ideal Windows XP configurations. Here are a few services I booted off to streamline my PC:
* Alerter
* Background Intelligent Transfer Service
* ClipBook
* Computer Browser
* Error Reporting Service
* Help and Support
* Indexing Service
* IPSEC Services
* Messenger
* NetMeeting Remote Desktop Sharing
* Network DDE
* Network DDE DSDM
* Performance Logs and Alerts
* Portable Media Serial Number
* Help Session Manager
* Remote Registry
* Secondary Logon
* Server
* Smart Card
* Smart Card Helper
* SSDP Discovery Service
* System restore Service
* TCP/IP NetBIOS Helper
* Uninterruptible Power Supply
* Universal Plug and Play Device Host
* WebClient
* Windows time
* Wireless Zero Configuration
* WMI Performance Adapter

11. Disconnect USB devices you aren't using. When Windows starts, it must load all the drivers for the devices connected to your computer. If you have many devices connected to the USB ports, such as printers, scanners, cameras and hard drives that you don't use on a regular basis, disconnect them. You can reconnect them when you use them. Disconnecting them when they are not in use will allow Windows to load the drivers only when needed.

The above steps should help increase the performance of Windows XP as well as keep it running with more stability.





How to Speed Up Slow Windows XP - Tips on Speeding Up Windows XP That is Slow...George Tho

If you want to know how to speed up slow Windows XP, there are good news and bad news. The good news is that there are a thousand and one things that you can do with regards to how to speed up slow Windows XP. The bad news is that, the causes of Windows running slow can vary to a huge extent and it is sometimes very hard if not impossible for lay men to find the root of the issue. This article will look at some common causes as well as their solutions.

Too many unnecessary programs installed.

This is a very common issue and people trying to find out how to speed up slow Windows XP should first look at this aspect. Go to the control panel and scroll through the list of programs, chances are you will find some programs that you no longer need. Uninstall these.


With more and more browser tools like toolbars and free software downloads online now, this has become one of the most common causes of Windows slowing down. What happens is that when users install free software or toolbars for their browser, hidden programs may be installed and are kept running every time Windows starts. These take up memory resources. One spyware may not do much but when you have more of them, the effect is quite substantial. Download spyware removal tools like Spybots or Adware to address this issue.

Unwanted files.

Cleaning up unwanted temp files, cookies, downloaded programs from browsing the web will help to address some of the issues on pertaining to how to speed up slow Windows XP. You can use the Windows Disk Cleanup tool to do this. Open My Computer, right-click Local Disk, and then click Properties. On the General tab, click the Disk Cleanup button.

Corrupted or Unwanted Registry Entries

This will also happen over time. With the installing and uninstalling of software and device drivers, the Windows registry accumulates a lot of junk data overtime and this can affect the performance of Windows as it constantly refers to the registry for various tasks. Use a registry cleaner to remove junk entries.

A. Registry Error Fix Doctor here
B. Spyware Remover using this
C. Revealed Computer Secrets Here

yahoo search


Fix Your Corrupt Registry For a Faster PC...James Daystone

Computer are delicate machines. Something as simple as a registry error can cause your PC to experience a drastic decrease in speed and performance. If you have been recently experiencing symptoms of a sick computer, it may be time to consider maintenance on your registry. Read on to learn how to fix a corrupt registry for a faster and more stable computer.

You may have heard that it is not wise to edit your Windows registry. This is partially true to the extent that you should never edit your registry by hand. You see, if you were to take a peek at the contents of the registry on your computer you would notice that to humans it looks like a bunch of garbled computer code. Hand edits to the registry are better left to the pro's because one bad move and you risk a computer that won't boot or run.

Fortunately, there is a way to repair your registry and fix corruptions without hand editing those delicate files. The answer is registry repair software. There are a number of good registry repair programs that you can download and run that will clean and repair your registry automatically and safely.

Registry repair programs are designed with the average user in mind. There's nothing terribly complex about using these programs. In fact, all you really need to do is download, install and click a few buttons to scan and repair any errors that might be present.

The benefits to using a registry repair tool are many. First, you will notice an immediate improvement in the performance of your computer. If you have any annoying error messages that are related to registry problems, those will disappear as well. Software will load faster, your computer will boot faster and proper maintenance of your registry over a long period of time can increase the lifespan of your computer.

How do you know if your registry is corrupt? Almost all registry repair software programs have a built in scanner that will scour your computer's registry for errors and corruptions. Whatever it finds will be reported to you and can be repaired automatically by the software.

With all of these reasons to repair your registry, it's silly not to give it a try. With the help of these tools, the entire process takes just minutes. Just remember that for the best results, you should preform this maintenance on a regular basis. Most users clean the registry weekly or monthly. Some registry cleaners like RegCure have a built in scheduler that you can set up to ensure that you don't forget to do this important maintenance.

Now it's your turn to fix your corrupt registry and enjoy a faster, error free computer! Get started right away by using any of:

A. Registry Error Fix Doctor here
B. Spyware Remover using this
C. Revealed Computer Secrets Here

yahoo search

How Do I Make My Computer Run Faster? - 3 Stunning Ways to Boost the Speed of Your Computer...Jide Chen

This is a problem a lot of people have with their computer and this usually happens because their computer is not running as fast as it used too or as they would want it to. The truth is that there are many reasons why your computer might become slow and there are also many ways to fix that problem. This article would look some of the ways anyone can use to make their computer run faster.

One of the ways to make your computer run faster is to delete files and folders which you do not need especially things like software and applications. This is because they take up space on your computer and make it run slowly. Also try not to run too many programs at a time as it puts a lot of pressure on your computer and can make it run slowly.

Another good way is to perform regular maintenance of your computer and this includes things like emptying your recycle bin, deleting cookies and temporary files which do nothing but take space on your computer. You can do this weekly, every two weeks or monthly depending on the age of your computer.

You can also use a registry cleaner to clean your computer. A registry cleaner helps to remove corrupt registry files and invalid entries which make your computer run slow. There are many of them available on the internet which you can download to your computer to see whether your computer has registry problems. Most of them offer a free scan but you usually need to pay for it to fix any problem it identifies.


A. Registry Error Fix Doctor here

B. Spyware Remover using this

C. Revealed Computer Secrets Here
yahoo search

AdAware2008 From Lavasoft...Colin Richards

Lavasoft state: 'We believe every computer user has the right to protect their private information. We give you that right for free - no strings attached! Safeguard your personal information against cyber threats with the original Anti-Spyware solution.'

The new version has improved detection against spyware, adware, trojans, hijackers, fraud tools, rogue applications, password stealers and keyloggers. It also incorporates an enhanced rootkit removal system with faster updates & faster scans. It uses less resources giving you optimal performance and a Threatwork Submission Tool to submit suspicious files for analysis.

It has the ability to scan your RAM, Registry, hard drives, and external storage devices for known data-mining, advertising, and tracking components. Regular updates are essential to maintain a higher level of privacy while surfing.

Updates are simple and straightforward but in the free version have to be carried out manually, and the Ad-Watch Shield is deactivated as is the Process Watch, which allows you to view and terminate running processes and Hosts File Editor which allows you to block ad sites, reverse browser hijacks, assist with parental control and make other exceptions to web navigation.

All in all, it is still an excellent tool to use in conjunction with a good anti-virus program and firewall.

With close to a million downloads each week, it is a very popular anti-spyware program. It supports Internet Explorer, Firefox, or Opera browsers.

Once scanning has completed you decide what to keep and what to delete.

System requirements:

Windows Vista (32- and 64-bit), Windows XP (Home & Pro, 32- and 64-bit), Windows Server 2003, Windows 2000 (Pro & Server)

Ad-Aware 2008 Free is for personal home use only. Commercial use is prohibited and requires a license. Support is available for Free version users at the Lavasoft Support Forums.


Finding the Ultimate Spyware Removal Tool...J Gray

Due to an increase in the frequency of AdWare, Spyware, and other malicious software invading our cyberspace, an increase in the number of companies that offer ways to combat these invaders will also be apparent. With all the AdWare removal tools on the market, it can sometimes be hard to determine which one is truly best suited for your needs.

The best way to remove AdWare.

Utilizing several different types of AdWare removal tools and testing each one on your PC may be the best strategy for finding a Spyware removal tool you can trust. Most manufacturers of AdWare removal software make a free trial version available, so people can try before they buy. This allows the testing of several different versions of protection software in a short period of time.

A Spyware removal tool should be easy to operate along with being effective. If more than one product meets your protection and removal needs, it would be wise to go with the version which is easiest to operate. If the product is effective and user friendly, you will be more likely to use it often, and consistent scans are the best way to prevent your computer from being hacked or compromised.

Another critical component of AdWare removal software is that it is easy to update, and the updates are frequent and free of charge. Similar to anti virus software a few of the manufacturers charge for updates, however there are many of the Spyware removal software manufacturers that allow free updates for a year and others that will allow free updates for life.

Keeping your computer clean.

Getting rid of the AdWare from the PC is only the beginning, it will be the responsibility of the user to keep his or her computer clean and protected. The quickest and easiest way to accomplish that important goal is to run frequent and consistent scans using the AdWare removal tool of your choice. Running the scan frequently and consistently will best protect against the new AdWare and Spyware that is constantly being unleashed on the Internet.

Most computer users like to automate their anti virus updates and scans, by scheduling your scans and using the automatic update option provided by your software it can be set it and forget it. By scheduling the update first and then the virus scan is sensible, that way you are using the most recent updates during the current scan of the computer. You will need to run each scan separately at first to see the length of time each takes. Check the log the following day to verify that the update and scan were completed properly.

What do I do next?

Once the scans are complete, review the scan results to determine which of the identified programs actually are AdWare. Some AdWare programs will target some legitimate programs as AdWare, so before you give the program the authority to delete these selected files be sure and review them first. Once a particular program is labeled a legitimate program, the AdWare removal tool should ignore it during future scans and will not target it again.

Buying a quality AdWare removal tool is critical in protecting your computer from AdWare, Spyware, and other malicious software that is invading cyberspace daily. Installing good AdWare protection and learning how to properly protect your computer, will enhance your ability to keep your computer and the valuable information it contains safe.