Search This Blog

Tuesday, October 2, 2007

Creating a shortcut for switching users or locking your computer in Windows XP !!

The Windows logo key+L is a terrific shortcut for switching users or locking your computer. But if your keyboard doesn’t have a Windows logo key or you prefer using a mouse, you can create a program shortcut that provides single-click access to the same feature. Follow these steps to create a switch/lock shortcut on your desktop:

  1. Right-click the desktop and choose New, Shortcut.
  2. On the first page of the Create Shortcut Wizard, type rundll32.exe user32.dll,LockWorkStation and click Next.
  3. Type a name for the shortcut (Lock Workstation would be appropriate), and click Finish.
  4. Right-click the new shortcut and choose Properties.
  5. On the Shortcut tab, click Change Icon.
  6. In the text box, type shell32.dll and press Enter.
  7. Select an icon that tickles your fancy; you’ll find several with lock, key, and user images. Then click OK.
  8. In the Shortcut Key box, type the shortcut key you want to use (for example, Ctrl+Alt+L). To immediately display the logon screen (if Fast User Switching is enabled) or lock your computer (if Fast User Switching is disabled), simply double-click your new shortcut or type the shortcut key you assigned. To make it accessible with a single click, even when your desktop is covered with other windows, move the shortcut to the Quick Launch bar.

Configuring Fast User Switching in Windows XP !!

Fast User Switching, a feature that made its first appearance in Windows XP, allows multiple users to be logged on to a computer at the same time. As the feature name suggests, you can quickly switch among users. This might be convenient, for example, if one user logs on, opens several documents, and begins downloading a huge file from the Internet. Meanwhile, another user comes along and wants to quickly check e-mail. With Fast User Switching enabled, it’s no problem. The second user can log on, log off, and return control to the first user. While the second user is logged on, the first user’s applications (such as the download process) continue to run. To switch to another user account, press the Windows logo key+L. This displays the Welcome screen, from which the second user can click his or her name and enter a password, if required.

Fast User Switching won’t work in every situation. To enable the feature you must observe the following requirements:
● The Welcome screen must be enabled.
● The computer must not be joined to a domain.
● Offline files must be disabled.
● Although it’s not an absolute requirement, the computer should have more than 64 MB of memory. By default, Fast User Switching is disabled on computers that have only 64 MB. (In any case, to run Windows XP effectively, you should have at least 128 MB.)

NOTE : If your keyboard doesn’t have a Windows logo key (or you prefer using the mouse), you can get to the Welcome screen by clicking Start, Log Off. In the Log Off Windows dialog box, click Switch User.

Create an Invisible Account in Windows XP !!

Create an Invisible Account in WIndows XP

You can prevent an account from appearing on the Welcome screen, thereby creating a “hidden” account. (It’s not completely hidden, because the account is visible to administrators in Local Users And Groups, and the account’s profile in the Documents And Settings folder is visible to all users.) Use Registry Editor to open HKLM\Software\Microsoft\Windows NT\ CurrentVersion\Winlogon\SpecialAccounts\UserList. Create a new DWORD value, setting its name to the user name of the account you want to hide and leaving its value set to 0. Be careful with this trick: You won’t be able to get to the account with Fast User Switching because the account doesn’t appear on the Welcome screen, and pressing Ctrl+Alt+Delete two times at the Welcome screen to display the Log On To Windows dialog box works only when no other users are logged on. Therefore, if you want to use this type of hidden account, you should either disable Fast User Switching or resign yourself to using the account only when no one else is logged on.

Blocking Intruders with Windows Firewall !!

Your first line of defense in securing your computer is to protect it from attacks by outsiders. Once your computer is connected to the Internet, it becomes just another node on a huge global network. A firewall provides a barrier between your computer and the network to which it’s connected by preventing the entry of unwanted traffic while allowing transparent passage to authorized connections.

Using a firewall is simple, essential, and often overlooked. You’ll want to be sure that all network connections are protected by a firewall. You might be comforted by the knowledge that your portable computer is protected by a corporate firewall when you’re at work and that you use a firewalled broadband connection at home. But what about the dial-up connection you use when you travel? Viruses like Sasser and its ilk find unprotected dial-up connections to be an easy mark. In fact, although dial-up users are less vulnerable to certain types of attacks just because of their relatively short connection time, they are particularly vulnerable to Internet worms like Sasser because many Internet service providers (ISPs) don’t offer effective firewall protection for this type of connection.

And it makes sense to run a firewall on your computer (sometimes called a personal firewall) even when you’re behind a corporate firewall. Other people on your network might not be as vigilant as you are about defending against viruses, so if someone brings in a Sasser-infected portable computer and connects it to the network, you’re toast—unless your network connection has its own firewall protection.

Windows XP includes a firewall now called, cleverly enough, Windows Firewall. Part of Service Pack 2 for Windows XP, Windows Firewall replaces the Internet Connection Firewall (ICF) that was included in earlier versions of Windows XP. Like ICF, Windows Firewall is a stateful filtering firewall that drops all inbound traffic except traffic sent in response to a request sent by your computer and unsolicited traffic that has been explicitly allowed by creating an exception. You notice nothing if an inbound packet is dropped, but you can (at your option) create a plain-text log of all such events.

But Windows Firewall differs from ICF in much more than name. Among the important improvements that are added with SP2 for Windows XP:

● Windows Firewall protects internal and external connections. As suggested by the name, Internet Connection Firewall was intended to protect your computer’s Internet connection, but it wasn’t easy to properly configure it for connections to your local area network. Recognizing the fact that many security threats can come from your own network, the more appropriately named Windows Firewall now plays nicely with LAN connections.

● Windows Firewall is enabled by default for all connections. By default, Windows Firewall is enabled for all network connections on a computer with SP2 installed. This includes wired LAN connections, wireless connections, dial-up connections, and VPN connections. Any new connections you create have Windows Firewall enabled by default.

● Global configuration options apply to all connections. With ICF, you had to make firewall settings (such as exceptions to allow incoming traffic) separately for each connection. With Windows Firewall, you can make settings globally. Windows Firewall also lets you make settings for individual connections; any per-connection settings override the global settings.

● You’re protected during startup. If Windows Firewall is enabled, Windows provides stateful filtering while it is connecting to your network. During startup, Windows Firewall provides basic protection for network startup tasks such as obtaining an IP address from a DHCP server and Group Policy updates from a domain controller. Full protection according to your Windows Firewall configuration then becomes effective when the Windows Firewall service starts. With ICF, you had no firewall protection until the service started, which left a brief interval in which the computer could be attacked.

● You can specify a scope for each exception. When you set up an exception in ICF (that is, you specify a port through which unsolicited inbound traffic is allowed), the incoming traffic could originate from any IP address. Windows Firewall lets you restrict the scope for exceptions by limiting it to traffic from an IP address that is part of your local subnet or from a list of IP addresses that you specify.

● You can create exceptions for programs. With Windows Firewall, you can create an exception by specifying the name of the program or service for which you want to allow unsolicited incoming traffic. This way, you don’t need to know which port(s) and protocol(s) are used by a program in order to create an exception; Windows Firewall figures it out for you.

● Windows Firewall supports two profiles on domain-based computers. The domain profile is used when the computer is connected to the domain and the standard profile is used when the computer is not connected or connected to a different network. Each profile has a separate list of exceptions and settings. Windows Firewall switches profiles automatically when you connect or disconnect the computer from the domain network.

● Internet Protocol version 6 (IPv6) is supported. IPv6, sometimes called “the next generation Internet,” is a protocol that will someday supplant the current Internet Protocol, which is more accurately called IPv4. When that day arrives, Windows Firewall is ready. For more information about IPv6, visit http://www.ipv6.org.

● Configuration can be done with command lines or using Group Policy. The user interface for configuring Windows Firewall is convenient for ad hoc management of the firewall on a single computer. But if you perform certain tasks repeatedly, or if you have to configure multiple computers, it’s much easier to set up a batch program or script that contains the commands needed to perform the task. Likewise, Group Policy (particularly in a domain environment) eases the burden of repetitive tasks. In addition, you can configure the operational mode and exceptions list for Windows Firewall during unattended setup.

Saturday, September 22, 2007

Ten useful tips of Windows XP !!

  1. To prevent Security Center alerts from popping up (without disabling Security Center’s monitoring of your firewall, automatic updates, and antivirus status), in Security Center click Change The Way Security Center Alerts Me.
  2. While the Welcome screen is displayed, you can open the Log On To Windows dialog box by pressing Ctrl+Alt+Delete two times. This allows you to log on using an account that isn’t shown on the Welcome screen (Administrator, for example).
  3. Pressing the Windows logo key+L is a terrific shortcut for switching users or locking your computer. If your keyboard doesn’t have a Windows logo key or you prefer using a mouse, you can create a program shortcut that provides single-click access to the same feature.
  4. Anything stored in %UserProfile%\Favorites appears on your Favorites menu or Favorites bar. Most people use this folder exclusively for Internet shortcuts, but you can put shortcuts to files and folders there as well.
  5. As a quicker way to display or hide a toolbar, right-click any toolbar. This action displays the View, Toolbars submenu.
  6. It’s difficult to work with the tiny thumbnail images in the Scanner And Camera Wizard. You’ll generally find it most efficient to copy all images to your hard disk, where you can cull the shots you don’t want to keep and then work with the rest.
  7. Run the Windows XP Network Setup Wizard on every system that’s connected to your network. Doing so is the only reliable way to ensure that your network has the proper baseline configuration. Afterwards, you can manually adjust settings and enable or disable features as required.
  8. The My Network Places folder can hold shortcuts to folders and files you use often. To create such a place, type the complete path (in the form \\computername\sharename\folder) on the wizard’s third page. Or drag the folder or file from a Windows Explorer window to the My Network Places window.
  9. You can back up settings (including your password) for each e-mail account in Outlook Express. Choose Tools, Accounts, select the account name, and then click Export. To re-establish the account, import the saved .iaf file.
  10. The Windows XP Backup Utility does not support backing up directly to CD-R or CD-RW devices. However, if you plan your backups carefully you can accomplish the same goal in a two-step process. Back up to a file first, and then copy that backup file to a CD-R or CD-RW.

Yahoo Messanger Hidden Emoticons !!

:-?? - I don't know

%-( - not listening

:@) - pig

3:-O - cow

|) - monkey

~:> - chicken

@};- - rose

%%- - good luck

**== - flag

(~~) - pumpkin

~O) - coffee

*- - idea

8-X - skull

>-) - alien

:-L - frustrated

[-O< - praying

$-) - money eyes

:-" - whistling

b-( - feeling beat up

>- - peace sign

[-X - shame on you

\/ - dancing

>:/ - bring it on

:-@ - chatterbox

^^ - not worthy

:-j - oh go on

(*) - star

o-> - hiro

o=> - billy

o-+ - april
Related Posts Plugin for WordPress, Blogger...
Blogger Tips And Tricks|Latest Tips For Bloggers Free Backlinks