Friday, October 2, 2009

disable "drivers not digitally singed" message

In windows xp, when you plug new device (bluetooth device, card reader) and try to install its drivers, sometimes you may see "driver not digitally singed" warning message. however you can continue installing drivers ignoring the warning message. hardware manufacturers provide more stable drivers for your device, there for you dont want to see warning messages evertime you plug a device. in this post we are going to show you how to disable "driver not digitally singed" warning message. you can learn more information's in here about digitally singed drivers.
  • Right click on my computer
  • Click properties
  • Click hardware tab
  • In there click the button driver signing under "drivers" section
  • In the opened driver singing option window, click "Ignore - install the software anyway and don't ask for my approval"
  • Click ok
  • Then apply and ok

Sunday, September 27, 2009

disable "turn off computer" from start menu

You can prevent users from shutting down public computer, with some edit of registry you can disable "turn off computer" option. here is how to do it.
  • Open registry editor
  • Navigate to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
  • In the right side create new DWORD value and named it as Noclose
  • Now double click the key and put 1 in the value data field
  • Now close the registry editor and restart your computer after any changes to go into effect
Note - if you want to enable "turn off computer" option again, simply put 0 in the value data field of Noclose key, or delete the key.

create shortcut to lock workstation

Here is how to create shortcut
  • Right click on desktop point to new and click shortcut
  • In the location filed type %windir%\System32\rundll32.exe user32.dll,LockWorkStation
  • Click next
  • Give it a name and click finish
Now when you double click shortcut, your workstation will be locked

Note - another method is, press window key and L key simultaneously to lock workstation instantly, i know this one is quick rather than creating shortcut, but shortcut is useful to lock a computer remotely

DDR 1/2/3 memory speed chart

The below details described as Memory type (pc2100), speed (266Mhz) , and bus speed (133Mhz)


DDR1


DDR1 - PC2100 - 266Mhz - 133MHz
DDR1 - PC2700 - 333MHz - 166MHz
DDR1 - PC3200 - 400MHz - 200MHz
DDR1 - PC3500 - 433MHz - 216MHz
DDR1 - PC3700 - 466MHz - 233MHz
DDR1 - PC4000 - 500MHz - 250MHz
DDR1 - PC4200 - 533MHz - 266MHz
DDR1 - PC4400 - 550MHz - 275MHz
DDR1 - PC4500 - 566MHz - 283MHz
DDR1 - PC4800 - 600MHz - 300MHz
DDR1 - PC5000 - 625MHz - 313MHz

DDR2

DDR2 - PC2-4200 - 533MHz - 266MHz
DDR2 - PC2-5400 - 667MHz - 333MHz
DDR2 - PC2-6000 - 750MHz - 375MHz
DDR2 - PC2-6400 - 800MHz - 400MHz
DDR2 - PC2-8000 - 1000MHz - 500MHz
DDR2 - PC2-8800 - 1100MHz - 550MHz
DDR2 - PC2-9000 - 1120MHz - 560MHz

DDR3

DDR3 - PC3-6400 - 800MHz - 400MHz
DDR3 - PC3-8500 - 1066MHz - 533MHz
DDR3 - PC3-10666 - 1333MHz - 667MHz
DDR3 - PC3-12800 - 1600MHz - 800MHz
DDR3 - PC3-14400 - 1800MHz - 900MHz
DDR3 - PC3-16000 - 2000MHz - 1000MHz

common virus attack places in registry

If you pc get infected by a virus your registry will be modified by the virus, this ensures virus to keep coming back, number of registry locations modified and they are described as follows.

Location 1
  • Open registry editor
  • First navigate to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
  • In the right side see if there is suspected key (specially look for a key that running locations such as C:\WINDOWS\ or C:\WINDOWS\system32)
  • Delete the suspected key
Location 2
  • Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
  • Also in here look for a suspected keys as described above, and delete them
Location 3
  • Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
  • In the right side find "Shell" key and verify its value data set as Explorer.exe if it is changed, erase the existing value and change it back to Explorer.exe
  • Also find "Uihost" key and verify its value data set as logonui.exe
  • Last find "Userinit" key and verify its value data set as C:\WINDOWS\system32\userinit.exe, there shouldn't be anything after comma, if it does erase the value data and change it back to C:\WINDOWS\system32\userinit.exe,
Note - if you successfully removed virus from your system, but you haven't correct registry you might see error messages within login process, for a example Userinit key is defferent than described above, you will get error message before desktop came, also can take more time to login process.