Simple Technique For Unlocking The Locked/Hidden Regional Themes

Windows 7 – Simple Technique For Unlocking The Locked/Hidden Regional Themes

Windows 7 Operating System comes with four to five default themes which are included at the time of installation. However, Windows 7 builds starting from Build 6956, including Build 7000 contain some hidden themes which can be easily unlocked and used along with the default Windows 7 themes.

These hidden or locked themes are essentially designed for some of the regional countries including Canada, Australia, Great Britain, South Africa and United States. However, if you think that the default themes are not enough or if you would like to personalize your system further, you may unlock the locked/hidden regional themes in your Windows 7 Operating System.

You need to just follow the below mentioned procedure.

  • Firstly, go to “Windows Explorer”.
  • Click on “Organize” and choose “Folder & Search Options”.
  • Then, go to the tab “View”.
  • Select the option for showing hidden files, drivers and folders. Uncheck the checkbox corresponding to the option that hides protected OS files. If you are prompted for a confirmation, simply click on “Yes”.
  • Click on the “OK” button.
  • Navigate to the below mentioned folder: \Windows\Globalization\MCT\
  • You will find five folders having the names in the format “MCT-XX” in which, XX would be CA, AU, US, GB or ZA which correspond to the globalization settings for different regions. Choose and open the respective folder depending on which theme you wish to activate. You need to note that CA, ZA and AU regions include the same theme.
  • From within the region folder that you have selected, you need to open the folder “Theme”.
  • Double-click on the file “XX.theme” in order to apply and activate the theme. Once you have activated and applied the theme, it will be saved into the “Personalization options”. So, if you want to apply this theme again in future, you can directly go to the Personalization settings screen.
  • Finally, go back to “Organize” -> “Folder & Search Options”, and in the tab “View”, check or tick the checkbox corresponding to the option that hides protected OS files and folder.

 

Alternatively, you may go to the folder “\Windows\winsxs” and then search for “*.theme”. Just double-click on the first five searched themes having names in the format “XX” as mentioned above to apply/activate and save them to the “Personalization options”. The remaining themes that show in the search results are the ones which are already incorporated in the system.

Simple Technique For Enabling Auto Logon In Windows XP

Simple Technique For Enabling Auto Logon In Windows XP

Windows Vista allows you to make configurations to enable automatic logon with the help of a user interface so that you don’t have to enter any password to logon to the desktop every time you start your PC. Windows XP also possesses a similar feature using which you can configure automatic logon in non-domain computers.

If a Windows XP system has just one user account created on it, it will automatically logon to the desktop once it boots up. However, if there is more than one account defined on the system for different applications usage like web server, .NET Framework, VMWare Server 2.0 web console, FTP account etc., Windows XP does not automatically logon to the desktop.  

Instead, XP will display a Ctrl-Alt-Del dialog box or Welcome Screen so that you can select one of the user accounts to logon. Nevertheless, you may set the auto logon feature so that your PC starts and uses the predefined or preset user account to login automatically.

However you need to note that, though setting automatic logon is convenient, it is not completely secure. Once configured for auto logon, anyone who is able to gain access to your system physically can access everything on your system, including any network to which it is connected.

Apart from this, the login password remains saved and stored in the system registry which can be easily read by anyone who is able to access the PC. The system can also be accessed remotely by members of Authenticated Users group.

You need to use the below mentioned steps to set auto logon feature in your Windows XP system.

  • Click on the “Start” button to view the Start Menu. Select “Run” to open the run command box.
  • Type in “control userpasswords2” and click on “OK” button.
  • A window appears with the title “User Accounts”. You need to uncheck or deselect the option that forces the user to enter username and password to logon to the PC. Then click on “Apply” button.

  • You will see a dialog box with the title “Automatically Log On”. Within the text box for “Password”, type in the Administrator password. Retype the password within the “Confirm Password” text box.
  • By default, the text box corresponding to “User name” will be auto filled as “Administrator”. Administrator account in XP is the super user account which does not have any password by default. You may change the username to a different user account as per your preference. 

  • Click on the “OK” button to close the dialog box “Automatically Log On”. Now, click on “OK” to exit “User Accounts” window.

 

The same trick can be used in Windows Vista to open the “Advanced User Accounts” dialog box.

Simple Technique to Skip the Configuration Wizard on First Launch Of Windows Media Player

Simple Technique to Skip the Configuration Wizard on First Launch Of Windows Media Player

Whenever you install a new edition of WMP (Windows Media Player) or if you install a new OS, WMP shows a configuration wizard on its first time launch which allows you to configure the preliminary settings for your Windows Media Player. The same thing happens with WMP12 and WMP11 when you launch it for the first time.

You get a Welcome Screen which prompts you to make the preliminary settings depending on Custom Settings or Recommended Settings. Actually, you can make only a few settings through this wizard including playback file associations, default player, privacy and a few online store settings apart from accepting the End-user License Agreement for using Windows Media Player.

The wizard appears on each user account when the user launches WMP for the first time. However, if you happen to manage a number of computers and would like to apply the same settings everywhere by altering the group policy (GPO) or ISO image, you may pre-configure WMP.

 

The moment you configure WMP, it will not display any configuration wizard and will open the WMP user interface straightaway. In order to pre-configure WMP, you need to simply set the below mentioned registry keys in the system registry using the Registry Editor.

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsMediaPlayer]

“GroupPrivacyAcceptance”=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MediaPlayer\Preferences]

“FirstTime”=dword:00000001

“AcceptedEULA”=dword:00000001

You may copy the above mentioned registry keys to any text editor, save the text file with the extension “.reg” and run this .reg file for merging the respective registry values.

As another option, you may simply download the file “WMPConfig.reg from the internet and run it to apply the registry value to the system registry.

Techniques To Install Windows 7, Server 2008 Or Vista On A System Having RAM Less Than 512MB

Techniques To Install Windows 7, Server 2008 Or Vista On A System Having RAM Less Than 512MB

You might be aware that most of the recently released Microsoft Windows operating systems require your system to have some precise specifications before you try to install them. Sufficient RAM (512 MB or more) is once such key specification necessary for installing recent Windows OS such as Windows 7, Server 2008 and Vista on your PC.

In order to ensure quicker system operation, the official requirement of RAM is 1 GB. However, if the RAM in your PC is less than 512MB, the setup wizard will not allow going through the setup process and if the RAM is less than 1GB you won’t be able to continue the setup process.

While the installation process is on, setup file verifies the system requirements. If your PC does not meet the necessary requirements, the setup wizard will stop, thereby stopping the installation process. It will show the below mentioned error message.

Windows detected that this computer has <YOUR RAM SIZE> MB of RAM, but 512 MB is required for installation. Installation cannot proceed

This happens as these recent Windows OS consume a lot of system resources. If your system doesn’t possess enough memory to perform certain system tasks, it may lead to system slow down, halt or freeze. Although having sufficient RAM is a technical requirement, it is possible that you install Windows 7, Vista and Server 2008 on a PC with RAM less than 512MB.

You may use any of the below mentioned techniques.

Technique 1: Add Physical RAM to make it at least 384 MB

Although it is said that Windows 7, Vista and Server 2008 require at least 512MB of RAM for proceeding with the installation process, technically they consume only 384MB of RAM for running the setup procedure.

For instance, if the RAM of your system is 256MB, you approximately need another 130 MB memory to meet the minimum requirement. In such a case, you can add a physical RAM into the RAM slot. If you happen to use a virtual machine, simply increase the limit of allocated RAM to make it 384MB.

Technique 2: Increase Memory during Installation by adding Memory Stick

You need to make the necessary changes in your system specifications in order to meet the basic requirements while trying to install Windows 7, Vista and Server 2008. If you use a virtual machine, use this brilliant trick so as to run the installation procedure without showing the low memory error message.

You need to simply increase the virtual or physical memory of your PC to 512MB by making use of a memory stick. The moment RAM becomes 512MB, run the setup and complete the installation procedure. Once you have installed Windows 7, Server 2008 or Vista on your system, you may take out the memory stick to get the RAM back to original level.

Technique 3: Use a winsetup.dll Patch

winsetup.dll is the file that verifies your system memory. It is present in ISO images or DVD disc. This file basically gets activated at the beginning of the installation procedure and checks for the necessary system requirements. You may patch this file so as to bypass or avoid this memory check during installation process of Windows 7, Server 2008 or Vista.

You need to follow the below mentioned steps in order to path the file “winsetup.dll”.

  • Firstly, you need to copy the contents of the DVD or extract the DVD ISO image contents to your hard disk drive.
  • Then, download AptEdit Pro, a HEX editor and install it along with the HEX Editor plugin.
  • Locate the file “winsetup.dll” within the installation files that you had copied and open it using HEX editor.
  • Within the file, look for the below mentioned HEX string:

77073D7801

  • Once you find it, replace it with the below mentioned HEX string:

E90400000

  • Save the changes made to the file.
  • Now, run the file “setup.exe” and you will notice that the installation process proceeds without showing any error message.
  • Incase you wish to use bootable DVD to start the installation process, you may simply replace the file “winsetup.dll” within the ISO with the patched “winsetup.dll” file and copy the ISO to the DVD.

Unique And Simpler Technique To Render Your PC Speed!

Unique And Simpler Technique To Render Your PC Speed!

PC Booster is a freeware, used to fulfill Computer needs, and it makes them faster and stable for better performance. It avoids .dll errors that are frequent either while downloading or executing the program applications.

Installation and configuration of PC Booster is quite simpler. It secures the PC by acting as a system-guard and helps the computer in increasing the speed and it stabilizes the performance quite significantly. You’ll feel that your system has been reborn again.

Tasks Performed by PC Booster on Computer are:

  • This PC Booster’s minimises the consumption of booting time and avoiding computers from hanging.
  • It keeps a routine check on computer for any registry-conflicts, or unnecessary files and deletes them.
  • Along with this it also keeps a check on many other issues on computers and optimizes it.
  • It demonstrates a graphical view of a PC’s Performance before and after usage of PC Booster
  •  It also provides maximum efficiency to your R.A.M (Random-Access-Memory), ensuing quicker admission to any Installed program.

Check Out These Useful Techniques To Prevent Your Personal Wikileaks

Check Out These Useful Techniques To Prevent Your Personal Wikileaks

Wikileaks is a widely popular subject in news as well as an interesting topic for general discussion all around the world. Due to Wikileaks, a huge amount of information related to world governments which is generally hidden is revealed to the public.

The general public is normally either unaware or prefers to remain unaware of what is happening behind the scenes. The main reason behind this is that, some find it too difficult to keep a watch on what’s going on while others are too frightened to follow. However, in a society that believes in democracy, people deserve to know about what is happening in their government.

Let me make it very clear that this blog has nothing to do with politics. The above mentioned example is only to show how confidential information can be released to public due to a break in security chain, even though it is meant only for some intended recipients.

If you look at this issue on a personal level, you can imagine how such security failures can ruin careers, destroy relationships and lead to issues such as stolen identity.

In a recent write up on Personal Wikileaks, Jason Perlow explained how he received a Smartphone for evaluation only to learn that the earlier user was sophisticated technology journalist who had direct attention of popular technology industry leaders.

 

 

Many such incidents occur in tech journalism and there are a lot of instances where personal devices are used, evaluated and sent back without purging personal information. Moreover, these devices are not even wiped or purged by the vendor. This is nothing but complete carelessness.

Jason believes that this is an epidemic issue. However, it looks to be more of a systemic issue which is inbuilt in our personalities. People normally do not think about the safety of their personal information until and unless they deliberately focus on the issue. Humans still believe that all they need is food, shelter and protection from predators.

However, in today’s world, predators are no more interested in eating your carcass. All they want is your personal data.  Internet is full of articles related to accidental data leaks that include celebrities losing their mobile phone containing some personal pictures, government employees misplacing their laptops etc.

Email accounts of various political candidates get hacked as they make use of simple, easy-to-guess passwords.  Some malicious users hack databases of commercial websites in turn revealing critical financial data of their clients that is finally sold to some black market group overseas.

This issue related to information leaks is not going to end until and unless people start protecting their personal information in the same manner as they protect their money, families and homes. Jason Perlow has suggested a lot of ways of protecting personal data present on your Smartphone. You need to simply wipe the information on the device as well as the storage card before you give it to others.

Enhance your phone with remote admin capabilities so that you can wipe out your personal data from the device even in case you lose it. Always make use of a screen lock password or PIN as well as SIM lock password if possible. Most phones allow you to dial the local emergency number even if your phone is locked so that you do not have to waste time in unlocking it while trying to dial the emergency number.

However, the issue related to information leaks is not just confined to your Smartphone. You must be having critical data at various other places like your home, at work and on websites.

The major mistake that most people make is using the same password everywhere. Your passwords are the main thing that can strengthen the security of your critical data. Rather than using one password, you need to have around six of them. Create your passwords in such a way that they are difficult to crack.

An ideal password should contain not less than 8 characters. It should have at least 1 number, 1 capital letter and 1 special character like %,!, $, @, #,etc. Your password should not contain an actual word or should not have anything related to your life. Remember to change or rotate your password regularly. Keeping the password unchanged for over 90 days is not wise.

Allowing others to access or use your personal devices or computer is another thing that can lead to information leaks. Many people like carrying their phones with them. A number of times they leave their phones at their desk at the workplaces and disappear for sometimes only to realize that in their absence, their battery contacts have been taped over.

If you need to walk away from your seat leaving your cell phone behind, you need to make sure that you lock the screen of your phone with a screen lock password. In case you have a laptop or other portable computer hardware and there are visitors who walk in directly without any interception by the security, it is wise to keep it locked in your desk when you are not around.

You need to also secure or protect your cloud data when you check your emails. You must be having email accounts with Gmail, Hotmail, Yahoo! or any other email clients which generally use cloud storage. You do not have to worry if you access your email using your home PC.

However, if you access your emails from Internet cafes or Libraries, you need to be very careful. Computers at such places may have keylogger or even if they don’t, you might not be very sure that you can purge all the saved passwords from these systems. You need to avoid accessing any personal/ financial data on the computers that you do not completely trust. 

Some people do not understand the seriousness of information leaks until they unexpectedly realize that somebody has bought something expensive using their credit card details.

Nevertheless, taking care of small things like choosing proper passwords and preventing others from physically accessing your PC or devices can certainly make a difference. Data thieves are often seen following easy targets. In case you do not offer an easy target, they are bound to change their route.

Also, it is very important that you keep your anti-malware and anti-virus software up-to-date on your system.

Simple Technique To Display A Favicon For Your Blog

Simple Technique To Display A Favicon For Your Blog

Favicon or Favorites icon is a tiny, 16X16 or 32X32 pixel icon that is associated with a website, webpage or a blog. This icon is basically displayed next to the URL of the website or blog. Favicons generally exhibit the theme of a website/ blog and are used by webmasters and bloggers to give a unique value to their website/ blog.

Favicon serves as a logo of a website/ blog as visitors start recognizing a website/ blog from the Favicon that it displays. For instance, the moment we see “Y!” and “g”, we instantly understand that the webpage belongs to Yahoo! and Google respectively. Displaying a Favicon for your blog or website is indeed a good step in order to help visitors recognize your website/ blog easily.

Favicons may have different file formats such as GIF, JPG, PNG etc. and before you can add them to your blog or website you need to change its format to .ICO. It is interesting to note that Favicons do not need to necessarily be static, but you may also make them animated.

Follow the below mentioned procedure in order to add or display a Favicon for your blog. 

  1. First and Foremost, you have to create a Favicon. You may do it with the help of online favicon generators such as Favicon.cc, Dynamic Drive, HTML Kit, Degraeve and Anti Favicon.
  2. You need to now add this Favicon to any image sharing website like Imageshack, Photobucket etc. and obtain the link to that uploaded favicon.
  3. Login to your blog, go to “Layout” and click on “Edit HTML”. You need to search for “<head>”. Once found, paste the below mentioned code underneath “<head>” 
  4. <link href=’IMAGE URL’ rel=’shortcut icon’ type=’image/vnd.microsoft.icon’/>

    You need to replace the text “IMAGE URL” in the above code with the correct link to the uploaded favicon.

  5. Finally, save the template.

 After you have finished the procedure, you will notice that the new favicon appears on your blog. If you wish to display an animated Favicon, you have to create one by going to HTML Kit.