Search This Blog

Sunday, February 7, 2010

Virtual Memory too low Warning Trouble in win xp and vista

When there is less physical memory than needed, then some virtual memory (virtual RAM) is created on the disk. When there is a limit set to the size of virtual memory usage and there is not enough of it present there is a warning that frequently comes “Virtual Memory too low”.

Solution 1 :
This problem occurs when physical RAM + Virtual RAM (usually created on hard disk) together are not sufficient to take care of the currently needed RAM size, or this situation is about to arise. This usually happens when some fixed upper limit for Virtual Memory has been set. To solve this problem, you can either upgrade you physical RAM on your computer (recommended), or you can set the Virtual Memory to system managed size or you can do both. Setting Virtual Memory to system managed size means windows will set it to higher size whenever needed automatically,for this,


Right click on My computer --> goto properties, goto advanced tab, click on performance settings, now click on advanced, now click on advanced, now click on change button for Virtual memory.

On this screen select the System managed size, press OK. After this re-start your computer. This will solve the virtual memory too low problem.

Solution 2: Recommended solution is to upgrade your physical memory (RAM) according to requirements of the kind of applications that you run on your computer. If you upgrade RAM or not, the following procedure will help prevent this warning by increasing the virtual memory limit.
  • Right click on My computer icon and click properties.
  • This will show system properties window. Click on a advanced tab and click on the settings button under heading performance.
  • This will open performance options window. Click on advanced tab and click on change button under heading virtual memory.
  • Check if the space available is set to some custom value or double the RAM size ?
  • If it is not double the RAM memory size , then select the size option set the virtual memory size double the RAM Size and press set button and press OK button.
  • Restart the computer.

Breaking The XP Password

In case of user password boot the pc in safemode by pressing the F8 key and then selecting the Safe Mode option. You can now logon as an administrator and XP wont prompt for the password. Incase of an administrator account try rebooting the pc in DOS. access C:\Windows\system32\config\sam . Rename SAM as SAM.mj
Now XP wont ask for password next time You Login. Also

Go to the cmd prompt .
Type net user *.
It will list all the users.
Again type net user "administrator" or the name of the administrator "name" *.
e.g.: net user aaaaaa *(where aaaaaa is the name).
It will ask for the password.
Type the password and there you are done.
Logging In As Administrator:

Hold the Ctrl-Alt key and press Del twice. This will bring up the normal login and you can log on as Administrator.

To unhide the Administrator account so it does show up:

Start Regedit

Go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList

Unhide the Administrator key by giving it a value of 1

Increase Hard Disk speed in Windows

If you like to increase/optimize your Hard Disk I/O - read/write speed without buying expensive software utilities to do that job or changing the HD, just follow next steps. With doing these steps you will increase Hard disk speed (depends of manufacture and specification, but its worth to try). The most speed improvement is visible with IDE drives; however there are reports that this tweak also does good for SCSI disks.

In any case, it won't harm your system, so try it yourself and let me know what you find!

Steps:

1. Run SYSEDIT.EXE from the start & then Run command.
2. Expand the system.ini file window.
3. Scroll down almost to the end of the file untill you find a line called [386enh].
4. Press Enter to make one blank line, and in that line type
5. Irq14=4096 (note: This line IS CASE SENSITIVE)
6. Click on the File menu, then choose Save.
7. Close SYSEDIT and reboot your computer.
8. Restart windows!

The speed improvement will be noticed just after the system reboots, any system info. software can be used to check the improvement.

NOKIA Universal Codes

These Nokia codes will work on most Nokia Mobile Phones
(1) *3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talk time is reduced by approx. 5%
(2) #3370# Deactivate Enhanced Full Rate Codec (EFR) OR *3370# ( Favourite )
(3) *#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time.
(4) *#4720# Deactivate Half Rate Codec.
5) *#0000# Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type. ( Favourite )
(6) *#9999# Phones software version if *#0000# does not work.
(7) *#06# For checking the International Mobile Equipment Identity (IMEI Number). ( Favourite )
(8) #pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols).
(9) #pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols).
(10) #pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols).
(11) #pw+1234567890+4# SIM Card Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols).
(12) *#147# (vodafone) this lets you know who called you last.
(13) *#1471# Last call (Only vodofone).
(14) *#21# Allows you to check the number that "All Calls" are diverted to
(15) *#2640# Displays security code in use.
(16) *#30# Lets you see the private number.
(17) *#43# Allows you to check the "Call Waiting" status of your phone.
(18) *#61# Allows you to check the number that "On No Reply" calls are diverted to.
(19) *#62# Allows you to check the number that "Divert If Unreachable (no service)" calls are diverted to.
(20) *#67# Allows you to check the number that "On Busy Calls" are diverted to.
(21) *#67705646# Removes operator logo on 3310 & 3330.
(22) *#73# Reset phone timers and game scores.
(23) *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature "SIM Clock Stop Allowed", it means you will get the best standby time possible.
24) *#7760# Manufactures code.
(25) *#7780# Restore factory settings.
26) *#8110# Software version for the nokia 8110.
(27) *#92702689# Displays - 1.Serial Number, 2.Date Made, 3.Purchase Date, 4.Date of last repair
(0000 for no repairs), 5.Transfer User Data. To exit this mode you need to switch your phone off then on again. (Favourite )
(28) *#94870345123456789# Deactivate the PWM-Mem.
(29) **21*number# Turn on "All Calls" diverting to the phone number entered.
(30) **61*number# Turn on "No Reply" diverting to the phone number entered.
(31) **67*number# Turn on "On Busy" diverting to the phone number entered.
(32) 12345 This is the default security code.

How to Hack Into a Windows(without changing Password)

How to Hack Into a Windows XP Computer Without Changing Password:

There is a far better way to get into Windows XP. It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this. Of course, do not do this on anyone elses computer without proper authorisation.

1. Get physical access to the machine. Remember that it must have a CD or DVD drive.
2. Download DreamPackPL HERE:-
hxxp://rapidshare.com/files/32846408/dre
ampackpl.zip
Replace tt by xx.
3. Unzip the downloaded dreampackpl.zip and you'll get dreampackpl.ISO.
4. Use any burning program that can burn ISO images.
5. After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.
6. Press "R" to install DreamPackPL.
7. Press "C" to install DreamPackPL by using the recovery console.
8. Select the Windows installation that is currently on the computer (Normally is "1" if you only have one Windows installed)
9. Backup your original sfcfiles.dll by typing:
"ren C:\Windows\System32\sfcfiles.dll sfcfiles.lld" (without quotes)
10. Copy the hacked file from CD to system32 folder. Type:
"copy D:\i386\pinball.ex_ C:\Windows\System32\sfcfiles.dll" (without quotes and assuming your CD drive is D:)
11. Type "exit", take out disk and reboot.
12. In the password field, type "dreamon" (without quotes) and DreamPack menu will appear.
13. Click the top graphic on the DreamPack menu and you will get a menu popup.
14. Go to commands and enable the options and enable the god command.
15. Type "god" in the password field to get in Windows.

You can also go to Passwords and select "Logon with wrong password and hash". This option allows you to login with ANY password.

Laptop Tips

Battery charge - Laptop autonomy
Discharge completely your battery at least once per month. 
Security - Laptop tracking
Use the CyberAngel security solution to track your laptop in case it is stolen. 
Viruses
It is not enough to have an antivirus program installed. It needs to be kept up-to-date, and we recommend to update it at least once per week. 
Windows Updates
Make sure that your computer downloads Window Updates periodically and frequently. This will enhance stability and security of your operating system. 
Carrying
Always use an appropriate carrying bag when traveling, to enhance shock absorption. Whenever you need to ship your laptop through a carrier (SUPS, FedEx, UPS, etc...), always use packaging specifically designed for laptops transit. 
Shocks
Because of they are designed to maximize mobility, laptops are prone to shocks. Always turn your laptop OFF before you move your notebook from a place to another, unless it is well stabilized on a stand that is designed to absorb shocks. 
Humidity
Laptops are very sensitive to humidity. Avoid liquid exposure as much as you can (water, wine, etc...). 
Dust
Laptops are very sensitive to dust. Make sure the laptop is never left on a floor, but that it is always high on a table, desk, stand, etc... Check vents frequently to see if they are not obstructed.  
Preventing Laptop Computer Theft
Laptop computers are easy targets for thieves.  Laptop computers are small, valuable, can be removed quickly, and are easily hidden.  Laptop computers can be worth up to $5000 or more.  The laptop computer can be pawned at a pawnshop for half its value. 
Here are a few tips to reduce the risk of having your laptop stolen. 
  • Don’t leave your laptop out in the open even for a second.
  • Remember extreme temperatures can cause damage to your laptop.
  • Transport your laptop in a nondescript case.
  • Write down the serial number and keep it in a safe place.
  • Always back up your information on disks and store them in a safe place.

What features should you look for?

Most of the features to look for in selecting a mobile antivirus solution are the same ones you're familiar with in choosing one for your PC: 
·                                 Support for your device. You have to check that any software supports the operating system and device you want to protect. For instance, most antivirus vendors are updating their products to cover Windows Mobile 5.0—but, be sure to verify before you buy.
·                                 Easy-to-use. If it isn't easy, let's be honest, you're not going to do it. Not only must the installation be easy and foolproof; but the interface I use day-to-day needs to be clear and useful.
·                                 Automatic, over-the-air (OTA) updates. Antivirus vendors constantly update their products to recognize new threats, and over-the-air is the best way to deliver those updates. If you have to wait until you synchronize to receive updates, you could be going outside wearing yesterday's virus protection.
·                                 Real-time virus scanning. This may slow your device a little, but this is the best form of protection. Antivirus software should examine all attachments for viruses.
·                                 Intrusion detection. When you set up a Windows Mobile 5.0 device, you'll find that Bluetooth and Wi-Fi are "OFF" by default. If you have an earlier version of Windows Mobile operating system, check the Help files on your device or contact your device provider for instructions on how to turn off these services. In either case, read about how to activate them safely. Then, it isn't as crucial to have intrusion detection.
·           
                      Support for you. When I have a security-related question, I want a fast answer. My company is intentionally small, and we don't have an in-house support staff. So, the type of support that a vendor offers is often a deciding factor on whether I'll buy or not. Besides an easy-to-use Web knowledge base, I want rapid-response e-mail, live chat, and phone support.

Who should build the defenses?

We don’t need to panic, but we do need to be prepared. Theoretically, defenses built into the network layer are the most effective system of protection. Ideally, sophisticated network tools could detect anomalies in traffic and take action even before antivirus vendors can react to a new threat. We’ve learned that lesson in the evolution of improving desktop security. However, according to a Forrester survey, only 9% of the North American organizations surveyed actively track or manage PDAs in their organization. In addition, wireless providers disagree as to whether or not they should invest in antivirus protection at their cell network level.
It’s interesting to note that in Japan, which has approximately five times the devices in play per capita as in the U.S., McAfee's security software comes preloaded on some cell phones. Until network defenses are up to the task, it’s up to us to use antivirus software and take other steps to protect our devices and our data. Whether you are ready for antivirus software depends on your organizations' policies and protection-in-place, your usage patterns, and your willingness to take a few extra steps to improve security. (You should always check with your IT department before you install software on your own, however.)

Mobile Security Tips & Tricks

Just as it’s too late to lock the barn if your horse has already run off, it’s too late to think about security if you’re already under attack. Fortunately, it is not too late to secure your mobile data, and protecting your Windows Mobile powered devices is not difficult.
So far, cell phone viruses haven’t been much of a threat. The vast majority of viruses don’t do any damage at all; they simply aim to prove that such threats can exist and spread. The first Windows Mobile virus, Duts, simply asked the device owner for permission to spread. Another, a backdoor named Brador, could give attackers access to the files on the device, though it wasn’t much of a threat in practice. In February, the first crossover virus, aptly named Cxover, appeared. Cxover was designed to leap from infecting a PC to infecting, and then destroying documents, on a Windows Mobile device. While it could do serious damage, it hasn’t really spread.
Gartner, McAfee, F-Secure, Kaspersky Lab, and other security experts predict there will be more—and more serious—attacks over the next year or two. In addition, the newer blended threats—a virus or worm riding on spyware—and browser-based attacks make it more difficult to mount a defense. There are several ways mobile viruses can spread. They could be transmitted via Bluetooth, IR beaming, SMS text messaging, malicious Web sites, and e-mail attachments. According to Gartner research, 30% of cell phone users in the U.S. receive e-mail attachments. As this percentage increases, it will become a more attractive target for writers of malware.

Backup Tips

“Backup” means keeping one or more extra copies of your document, preferably in separate places.  Imagine the worst:  what would you do if your computer crashed and you lost everything on it right now?  What if the building burns to the ground?  How much work would be lost?  What would you have to do to replace it?
  • Compose your document with frequent saves to your computer’s hard disk, and always consider that version to be your "original" (modern hard disks are considerably more reliable than floppy disks, CD’s, or other removable media).
  • When you stop for the day, or when you reach a milestone representing a level of work that needs extra protection, “back up” by saving the file(s) to removable media:  floppy disk, CD-RW, flash drive, etc.  Usually, you can do so by selecting File, Save As while your document is open, or you can close the document and copy it with Windows Explorer or by some other means.
    • If you work on lots of different files, consider using Beyond Compare or a similar program to synchronize your hard drive data folders with your backup media. 
  • At the earliest opportunity, store the backup in a separate physical location.  The backup should be far enough from the original that the likelihood of both locations being destroyed is extremely small.
  • If you can’t immediately store the backup media in another physical location and the document isn't too big, consider e-mailing it to a friend or colleague.  You can also e-mail it to yourself.  That way, the document is safely stored on your e-mail server until the next time you check your e-mail.
  • The second time you create a backup of a document, make it on separate media from the first backup.  That way, you always have TWO backup copies of your document.  This will protect you from computer failure or user error that destroys both the original and the copy while doing your backup.
  • If you must do significant editing to the document, save it under a different name, for example, mypaper2.doc.  Continue to use new names with each successive edition, being careful not to delete the old ones until you are 100% sure that you will never need them.  This is especially important when combining documents to make a new document:  always give the new document a different name, and always save the original pieces in case they are needed later.
  • For extra protection, periodically print your document.  That way, the document can be re-typed if the disk version is destroyed or damaged.
  • If you have lots of software installed on your computer that would be time-consuming to re-install, consider doing a backup of the entire hard drive.  Many programs are sold for this purpose, but they are more practical if you have high-capacity removable media, such as a DVD-RW drive or a USB hard drive.  If you are using a computer with Windows XP Professional, a backup program is available under Accessories, System Tools.
    • If you do have media suitable for full system backup, periodically use the Windows XP backup program and choose the option to back up "all information on this computer."  This creates what is called an "ASR" (automated system recovery) backup.  When used with the recovery CD that came with your computer, the backup can quickly restore your entire system to the state it was in at the time of the backup, programs and data alike.  This is very helpful if you have to replace your hard drive or if there is massive data loss from a virus.
Finally, make your backup efforts proportional to the value of the document.  If you are doing something simple and short that could easily be reproduced, you may not wish to back up at all.

Internet Tips

  • Know who you’re dealing with. If the seller or charity is unfamiliar, check with your state or local consumer protection agency and the Better Business Bureau. Some Web sites have feedback forums, which can provide useful information about other people’s experiences with particular sellers. Get the physical address and phone number in case there is a problem later.
    • Look for information about how complaints are handled. It can be difficult to resolve complaints, especially if the seller or charity is located in another country. Look on the Web site for information about programs the company or organization participates in that require it to meet standards for reliability and help to handle disputes.
    • Be aware that no complaints is no guarantee. Fraudulent operators open and close quickly, so the fact that no one has made a complaint yet doesn’t meant that the seller or charity is legitimate. You still need to look for other danger signs of fraud.
    • Don’t believe promises of easy money. If someone claims that you can earn money with little or no work, get a loan or credit card even if you have bad credit, or make money on an investment with little or no risk, it’s probably a scam.
    • Understand the offer. A legitimate seller will give you all the details about the products or services, the total price, the delivery time, the refund and cancellation policies, and the terms of any warranty.
    • Resist pressure. Legitimate companies and charities will be happy to give you time to make a decision. It’s probably a scam if they demand that you act immediately or won’t take “No” for an answer.
    • Think twice before entering contests operated by unfamiliar companies. Fraudulent marketers sometimes use contest entry forms to identify potential victims.
    • Be cautious about unsolicited emails.  They are often fraudulent. If you are familiar with the company or charity that sent you the email and you don’t want to receive further messages, send a reply asking to be removed from the email list. However, responding to unknown senders may simply verify that yours is a working email address and result in even more unwanted messages from strangers. The best approach may simply be to delete the email.  
    • Beware of imposters. Someone might send you an email pretending to be connected with a business or charity, or create a Web site that looks just like that of a well-known company or charitable organization. If you’re not sure that you’re dealing with the real thing, find another way to contact the legitimate business or charity and ask.
    • Guard your personal information. Don’t provide your credit card or bank account number unless you are actually paying for something. Your social security number should not be necessary unless you are applying for credit. Be especially suspicious if someone claiming to be from a company with whom you have an account asks for information that the business already has.
    • Beware of “dangerous downloads.” In downloading programs to see pictures, hear music, play games, etc., you could download a virus that wipes out your computer files or connects your modem to a foreign telephone number, resulting in expensive phone charges. Only download programs from Web sites you know and trust. Read all user agreements carefully.
    • Pay the safest way. Credit cards are the safest way to pay for online purchases because you can dispute the charges if you never get the goods or services or the offer was misrepresented. Federal law limits your liability to $50 if someone makes unauthorized charges to your account, and most credit card issuers will remove them completely if you report the problem promptly. There are new technologies, such as “substitute” credit card numbers and password programs, that can offer extra measures of protection from someone else using your credit card.