- Open registry editor
- Navigate to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
- In the right side create new DWORD value and named it as Noclose
- Now double click the key and put 1 in the value data field
- Now close the registry editor and restart your computer after any changes to go into effect
Welcome to NSTECH blog, this site provides free IT Support for everyone, providing you informations about virus guards, system repair, system recover, tips and tricks, registry tweaks and more.
Sunday, September 27, 2009
disable "turn off computer" from start menu
You can prevent users from shutting down public computer, with some edit of registry you can disable "turn off computer" option. here is how to do it.
create shortcut to lock workstation
Here is how to create shortcut
Note - another method is, press window key and L key simultaneously to lock workstation instantly, i know this one is quick rather than creating shortcut, but shortcut is useful to lock a computer remotely
- Right click on desktop point to new and click shortcut
- In the location filed type %windir%\System32\rundll32.exe user32.dll,LockWorkStation
- Click next
- Give it a name and click finish
Note - another method is, press window key and L key simultaneously to lock workstation instantly, i know this one is quick rather than creating shortcut, but shortcut is useful to lock a computer remotely
DDR 1/2/3 memory speed chart
The below details described as Memory type (pc2100), speed (266Mhz) , and bus speed (133Mhz)
DDR1
DDR1 - PC2100 - 266Mhz - 133MHz
DDR1 - PC2700 - 333MHz - 166MHz
DDR1 - PC3200 - 400MHz - 200MHz
DDR1 - PC3500 - 433MHz - 216MHz
DDR1 - PC3700 - 466MHz - 233MHz
DDR1 - PC4000 - 500MHz - 250MHz
DDR1 - PC4200 - 533MHz - 266MHz
DDR1 - PC4400 - 550MHz - 275MHz
DDR1 - PC4500 - 566MHz - 283MHz
DDR1 - PC4800 - 600MHz - 300MHz
DDR1 - PC5000 - 625MHz - 313MHz
DDR2
DDR2 - PC2-4200 - 533MHz - 266MHz
DDR2 - PC2-5400 - 667MHz - 333MHz
DDR2 - PC2-6000 - 750MHz - 375MHz
DDR2 - PC2-6400 - 800MHz - 400MHz
DDR2 - PC2-8000 - 1000MHz - 500MHz
DDR2 - PC2-8800 - 1100MHz - 550MHz
DDR2 - PC2-9000 - 1120MHz - 560MHz
DDR3
DDR3 - PC3-6400 - 800MHz - 400MHz
DDR3 - PC3-8500 - 1066MHz - 533MHz
DDR3 - PC3-10666 - 1333MHz - 667MHz
DDR3 - PC3-12800 - 1600MHz - 800MHz
DDR3 - PC3-14400 - 1800MHz - 900MHz
DDR3 - PC3-16000 - 2000MHz - 1000MHz
DDR1
DDR1 - PC2100 - 266Mhz - 133MHz
DDR1 - PC2700 - 333MHz - 166MHz
DDR1 - PC3200 - 400MHz - 200MHz
DDR1 - PC3500 - 433MHz - 216MHz
DDR1 - PC3700 - 466MHz - 233MHz
DDR1 - PC4000 - 500MHz - 250MHz
DDR1 - PC4200 - 533MHz - 266MHz
DDR1 - PC4400 - 550MHz - 275MHz
DDR1 - PC4500 - 566MHz - 283MHz
DDR1 - PC4800 - 600MHz - 300MHz
DDR1 - PC5000 - 625MHz - 313MHz
DDR2
DDR2 - PC2-4200 - 533MHz - 266MHz
DDR2 - PC2-5400 - 667MHz - 333MHz
DDR2 - PC2-6000 - 750MHz - 375MHz
DDR2 - PC2-6400 - 800MHz - 400MHz
DDR2 - PC2-8000 - 1000MHz - 500MHz
DDR2 - PC2-8800 - 1100MHz - 550MHz
DDR2 - PC2-9000 - 1120MHz - 560MHz
DDR3
DDR3 - PC3-6400 - 800MHz - 400MHz
DDR3 - PC3-8500 - 1066MHz - 533MHz
DDR3 - PC3-10666 - 1333MHz - 667MHz
DDR3 - PC3-12800 - 1600MHz - 800MHz
DDR3 - PC3-14400 - 1800MHz - 900MHz
DDR3 - PC3-16000 - 2000MHz - 1000MHz
common virus attack places in registry
If you pc get infected by a virus your registry will be modified by the virus, this ensures virus to keep coming back, number of registry locations modified and they are described as follows.
Location 1
Location 1
- Open registry editor
- First navigate to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- In the right side see if there is suspected key (specially look for a key that running locations such as C:\WINDOWS\ or C:\WINDOWS\system32)
- Delete the suspected key
- Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
- Also in here look for a suspected keys as described above, and delete them
- Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
- In the right side find "Shell" key and verify its value data set as Explorer.exe if it is changed, erase the existing value and change it back to Explorer.exe
- Also find "Uihost" key and verify its value data set as logonui.exe
- Last find "Userinit" key and verify its value data set as C:\WINDOWS\system32\userinit.exe, there shouldn't be anything after comma, if it does erase the value data and change it back to C:\WINDOWS\system32\userinit.exe,
remove shutdown button from the logon screen
If you want you can remove shutdown button from logon screen, you can do this in 2 way, use a more easy way to you, follow these steps.
From registry
From registry
- Open registry editor
- Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system
- In the right side open "shutdownwithoutlogon" key
- Edit "value data" to 0
- That it, you are done
- Start > run
- Type secpol.msc and press enter to open Local security policy
- Expand Local Policies, and then click Security Options
- In the right side double click "Shutdown: Allow system to be shut down without having to log on" policy
- In local security settings tab select disable and click apply and ok.
Subscribe to:
Posts (Atom)