How To Make Notepad Write On Its Own

1. Open the Notepad and Type the Code Given Below.


set wshshell = wscript.CreateObject("wscript.shell")
wshshell.run "Notepad"
wscript.sleep 2000
wshshell.AppActivate "Notepad"
WshShell.SendKeys "H"
WScript.Sleep 500
WshShell.SendKeys "ell"
WScript.Sleep 500
WshShell.SendKeys "o "
WScript.Sleep 500
WshShell.SendKeys " "
WScript.Sleep 500
WshShell.SendKeys " Friends"

2. Save it as anyname.vbs (Note the vbs extension)

3. Now Open the anyname.vbs file by doublecliking on it and see the Magic..

INSTALLING XP IN 10 MINUTES!


STEP1 : After the Copy Part is Over ... System is Rebooted as we all know In general Foramatting Procedure...
Now After Reboot The Below Image Will Appear....






STEP 2: Now As This Image APPEARS You Have to Press  "Shift + F10 "  . This Will Open The command Prompt...  Now type  taskmgr  in it. This will open the Task manager .

STEP 3 : After The task Manager Opens Goto Processes ... And Find "Setup.exe"  process and Right CLICK on It.... and set the Priority to Highest....





















STEP 4: Now Just Watch the Set It will take around 9 minutes and 2 minutes for Tolerance(depends System to system)....

Thats the Overall Tutorial...Hope You all Have LIKED IT...

So When you Format your PC Next Time It will Really Save Your TIME i.e around 20 to 25 minutes...

How to Control move Mouse Pointer from Keyboard

How to Control move Mouse Pointer from Keyboard






You can try this method if you are bore of using your mouse in normal way.You can control your mouse pointer with keyboard keys in all windows . When your mouse stops working, you can enable this keyboard feature to complete your important work. This keyboard mouse can perform all tasks which are same as of normal mouse.

Follow the given steps to activate the keyboard mouse:


1.  log into your computer with administrative rights.

2. To activate this feature, press left Alt+left Shift+NumLock keys at once and you will receive a small MouseKey box.

3. To keep MouseKeys on, click on Ok button or click on cancel button to cancel MouseKeys box.

4. Click on Settings button, if you want to adjust the mouse cursor detail settings.

5. A new dialog box will appear with "Settings for MouseKeys", now you can do all mouse settings ,for example mouse cursor speed, acceleration and some other features.

6. Now using Numeric keypad, you can move your mouse pointer where you want to move on desktop

Keyboard shortcuts Windows 7


Windows 7 supports several useful new keyboard shortcuts.

Alt+P
Display/ hide the Explorer preview pane


Windows Logo+G
Display gadgets in front of other windows


Windows Logo++ (plus key)
Zoom in, where appropriate


Windows Logo+- (minus key)
Zoom out, where appropriate


Windows Logo+Up 
Maximise the current window


Windows Logo+Down
Minimise the current window


Windows Logo+Left
Snap to the left hand side of the screen


Windows Logo+Right
Snap to the right hand side of the screen


Windows Logo+Home
Minimise/ restore everything except the current window

removing Dummy entries in Add/Remove Programs list

removing Dummy entries in Add/Remove Programs list
Sometimes, even after program are uninstalled, or due to the files being deleted instead of a uninstalled, the entry

in the Add/Remove Programs list does not get deleted. To remove it form the list: 1. Start the Registry Editor. 2.

Open HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows \current version\Uninstall. 3. Delete the program entry here. You

can also use TweakUI to do this

Some YouTube Tricks

1. View high quality videos
Youtube gives you the option to switch to high quality videos for some of the videos, however you can check if a video is available in high quality format by appending ‘&fmt=18′(stereo, 480 x 270 resolution) or ‘&fmt=22′(stereo, 1280 x 720 resolution) for even higher quality.

2. Embed Higher Quality Videos
While the above trick works for playback, if however you want to embed hig quality videos you need to append “&ap=%2526fmt%3D18″ and “&ap=%2526fmt%3D22″ to the embed url.

3. Cut the chase and link to the interesting part
Linking to a video where the real action starts at 3 minutes 22 seconds, wondered if you could make it start at 03:22? You are in luck. All you have to do is add #t=03m22s (#t=XXmYYs for XX mins and YY seconds) to the end of the URL.

4. Hide the search box
The search box appears when you hover over an embedded video. To hide the search box add ‘&showsearch=0′ to the embed url.

5. Embed only a part of Video
Just append ‘&start=30′ to skip first 30s of the video. In general you can modify the value after start= to the number of seconds you want to skip the video for.

6. Autoplay an embedded video
Normally when you embed a Youtube video and load the page, the player is loaded and it sits there waiting for you to hit the play button. You can make the video play automatically by adding ‘&autoplay=1′ to the url part of the embed code.

7. Loop an embedded video
Append ‘&loop=1′ to make the video start again without user intervention after it reaches the end.

8. Disable Related Videos
Publishing your content in the form of Youtube video? Don’t want people to see other people’s content that may be related but may as well be in competition to you? Just add ‘&rel=0′ to the end of the url part of the embed code and you just turned off the related video suggestions!

9. Bypass Youtube Regional Filtering
Some videos are only available in certain parts of the world. Your IP Address is used to determine your location and then allow or deny access to the video. Change the url from http://www.youtube.com/watch?v= to http://www.youtube.com/v/

10. Download Video
Although not inherently a youtube trick but useful all the same for downloading videos. Just change youtube to kickyoutube in the url of the video and it will take you to kickyoutube.com with all the options for downloading the video you were watching.

How to change the Admin password using the user account

For this just open ur command prompt

type " net user "
it will give the all the users
then type " net user administrator * "
(Administrator is default admin for all the computer systems having the very strong password)

then it will give you
"type a new password for this user"
type in the password and press enter
(Note :- the password which youll be typing will be invisible plz type correctly as it not visible and then reenter and press enter)


then log off and loging using the admin username as
Administrator
and the given password
and youll be loging in with admin rights.

To Make ur more prtected ur PC

Many wud know about BIOS password and logon password

There is also another startup password for more protection

1)Open Run and type syskey
2)A "Securing the windows....." window will open.
3)Click on update button and in the opening window select password start password
4)Give a password.

This will create another password for statrup

To show Hidden files

There is a simple registry entry which can solve your problem.
1)Go to Start|Run
2)type regedit

3)Go to the path given below

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL

4)There you will find

CheckedValue REG_DWORD 0x00000001(2)
DefaultValue REG_DWORD 0x00000002(2)

5)Change CheckedValue value from 2 to 1

i.e.CheckedValue REG_DWORD 0x00000001(1)

It will work

Join file with command prompt

First: lets say you have 3 videos in your hardrive root: dbilla****1.mpg, dbilla****2.mpg and dbilla****3.mpg just rename them to 1, 2, and 3 (just the number and take off the extension)

Second: go on start menu, click on run and type cmd and press enter

Third: now type your hardrive letter (ie: C)

Fourth: Type: Copy /b 1 + 2 + 3 dbilla****.mpg
and click enter

Fifth now wait till you see: 1 files copied.
C:>

And type exit and press enter and you are done!

Start ur system automatic on time

Many of u have night unlimited connection and want to schedule the machine by night so that u dont have to wake up by night.

U can make ur system to turn up automatically.

Steps:
1. Go to bios
2. Go to power tab
3. There u will found options as follows
wake up from s5----------------intel mb
wake up from irc alram------asus
4. Enable the option
5. Give ethe specified time
6. Press f10

u r done.. Now just schedule ur dialer by putting them on startup by night and also if u desire to have torrent download put it also at start up.
Make the main power on and keep monitor off
have ur download by morning

Finding IP Address Of the Sender In Hotmail, Yahoo, Gmail

When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender.

Finding IP Address Of the Sender In Hotmail
# Log into your Hotmail account with your username and password.
# Click on the Mail tab on the top.
# Open the mail.
# If you do not see the headers above the mail message, your headers are not displayed . To display the headers,

* Click on Options on the top-right corner
* In the Mail Options page, click on Mail Display Settings
* In Message Headers, make sure Advanced option is checked.
* Click on Ok button
* Go back to the mails and open that mail.

# If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address

* Hotmail headers : dbilla ,In this case the IP address of the sender is [68.34.60.59]. This is be the IP address of the sender.

# If you find a header with Received: from followed by a Gmail proxy like this

* Hotmail headers : dbilla
* Look for Received: from followed by IP address within square brackets[]. In this case, the IP address of the sender is [69.140.7.58].

# Or else if you have headers like this

* Hotmail headers : dbilla
* Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [61.83.145.129] .

# If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.


Finding IP Address of the sender in Yahoo Mail
# Log into your Yahoo! mail with your username and password.
# Click on Inbox or whichever folder you have stored your mail.
# Open the mail.
# If you do not see the headers above the mail message, your headers are not displayed . To display the headers,

* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail.

# You should see similar headers like this:

* Yahoo! headers : dbilla

# Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.
# That is be the IP address of the sender!

Finding IP Address of the sender in Gmail
* Log into your Gmail account with your username and password.
* Open the mail.
* To display the headers,
o Click on More options corresponding to that thread. You should get a bunch of links. Click on Show original
* You should get headers like this:
o Gmail headers : dbilla
* Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is 65.119.112.245.
* That is be the IP address of the sender!!

Share internet between pc and main PC get internet from Mobile

To use Internet Connection Sharing to share your Internet connection, the host computer must have one network adapter that is configured to connect to the internal network, and one network adapter or modem that is configured to connect to the Internet.
On the host computer
On the host computer, follow these steps to share the Internet connection:
1. Log on to the host computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click the connection that you use to connect to the Internet. For example, if you connect to the Internet by using a modem, right-click the connection that you want under Dial-up.
6. Click Properties.
7. Click the Advanced tab.
8. Under Internet Connection Sharing, select the Allow other network users to connect through this computer's Internet connection check box.
9. If you are sharing a dial-up Internet connection, select the Establish a dial-up connection whenever a computer on my network attempts to access the Internet check box if you want to permit your computer to automatically connect to the Internet.
10. Click OK. You receive the following message:
When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP
address 192.168.0.1. Your computer may lose connectivity with other computers on your network. If these other computers have static IP addresses, it is a good idea to set them to obtain their IP addresses automatically. Are you sure you want to enable Internet Connection Sharing?
11. Click Yes.
The connection to the Internet is shared to other computers on the local area network (LAN). The network adapter that is connected to the LAN is configured with a static IP address of 192.168.0.1 and a subnet mask of 255.255.255.0

On the client computer
To connect to the Internet by using the shared connection, you must confirm the LAN adapter IP configuration, and then configure the client computer. To confirm the LAN adapter IP configuration, follow these steps:
1. Log on to the client computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click Local Area Connection, and then click Properties.
6. Click the General tab, click Internet Protocol (TCP/IP) in the This connection uses the following items list, and then click Properties.
7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address automatically (if it is not already selected), and then click OK.

Note You can also assign a unique static IP address in the range of 192.168.0.2 to 192.168.0.254. For example, you can assign the following static IP address, subnet mask, and default gateway:
IP Address 192.168.0.2
Subnet mask 255.255.255.0
Default gateway 192.168.0.1
8. In the Local Area Connection Properties dialog box, click OK.
9. Quit Control Panel.
If client machine having windows 98 and then stop here..
If client machine having windows xp then
10. Enter DNS server address (u can find it in main gateway PC using run>cmd>ipconfig /all )
11. DNS server name you have to enter in TCP/IP setting..

How to Remove the Popup Ads in Avira Antivirus Free Edition

Windows 2000 / Windows XP Pro


1.Go to Start > Run.
2.Type gpedit.msc and click OK.
3.Navigate through User Configuration > Administrative Templates > System.
4.Double click "Don't run specified Windows applications".
5.Enable it and click show.
6.Add "avnotify.exe".
7.Click OK on all open windows.
8.Restart.

Windows 7 or Windows Vista Business/Ultimate


1.Open the control panel through Start > Control Panel.
2.Go to Administrative Tools > Local security policy.
3.Click on Software Restriction Policy > Action > Create new restriction policy.
4.Right-click, and go to additional rules > new path rule.
5.Click Browse and navigate to C:\Program Files\Avira\AntiVir Desktop\ and double-click avnotify.exe.
6.Set the security level to Disallowed.
7.Click apply and OK.

Windows Vista Home 64-Bit


1.Go to C:\Program Files (x86)\Avira\AntiVir Desktop\avnotify.exe for the current version, 9. For earlier versions, go to C:\Program Files\Avira\AntiVir PersonalEdition Classic\avnotify.exe.
2.Right-click avnotify.exe and go to Properties > Security.
3.Under the group or username SYSTEM, click edit.
4.Put a checkmark under the DENY column for "read and execute".

Windows Vista Home 32-Bit


1.Go to C:\Program Files\Avira\AntiVir Desktop\avnotify.exe for the current version, 9. For earlier versions, go to C:\Program Files\Avira\AntiVir PersonalEdition Classic\avnotify.exe.
2.Right-click avnotify.exe and go to Properties > Security.
3.Under the group or username SYSTEM, click edit.
4.Put a checkmark under the DENY comlumn for "read and execute".

Lock Your Computer on Mouse Click

Instead of pressing CTRL+ALT+DEL or windows + L to lock your machine you can create an icon to lock your machine. There are very simple steps by using it you can simply lock your computer
using single mouse click.


Just Follow the simple step >>

1. Right click

an empty spot on the desktop, point to New and click Shortcut.

2. In the Create Shortcut dialog box, type the following in the 'Type the location' of the item text box:

rundll32 user32.dll,LockWorkStation



3. Click Next

4. In "Type a name for this shortcut", type "" (any name as u wish) and Click Finish

5. This will Create a shortcut in your Desktop.

6.Now each time when you want to lock the computer , Just click on this shortcut

Commands with Short description

1. assign

The command redirects requests for disk operations on one drive to a different drive.

assign [x[:]=y[:][...]]
assign /STATUS

Options:

* x The drive letter to reassign.
* y The drive letter that x: will be assigned to.
* /STATUS Displays the current drive assignments.

If typed without parameters then all drive letters are reset to original assignments.

The command is available in MS-DOS 5.00.

2. append

(External)

Display or sets the search path for data files. DOS will search the specified path(s) if the file is not found in the current path. This had some creative uses, such as allowing non-CD based games to be run from the CD, with configuration/save files stored on the HD.

append;
append [d:]path[;][d:]path[...]
append [/X:]n|off][/E]

3.attrib

Change or view the attributes of one or more files. It defaults to displaying the attributes of all files in the current directory.

Options:

* To add an attribute attach a '+' in front of it.
* To remove an attribute attach a '-' in front of it
* Attributes include
o R - Read-only
o A - Archive
o S - System
o H - Hidden

attrib [+|-ahrs] [filespec]

Directory Attrib Functions: It is also possible to use ATTRIB across directories.

[drive:][path][filename]
Specifies a file or files for attrib to process.

*
o /D - Process folders as well.
o /S - Process matching files in the current folder and all subfolders.

Roughly equivalent to the Unix commands chattr and lsattr.

4. call

Calls one batch program from another. A new batch file context is created with the specified arguments and control is passed to the statement after the label specified.

Syntax:

call [filespec][batch file parameters]

* filespec: name and if necessary path of the new batch file
* parameters: switches

5. cd or chdir

Change current directory. Displays the current working directory when used without a path parameter.

cd

displays the current working directory on the current drive.

cd f:

displays the current working directory on F:.

cd directory

changes the working directory on the current drive to directory.

chdir e:directory

changes the working directory on E: to directory.

cd ..

changes the working directory to the parent directory (up one directory level).

cd \

changes the working directory to the root (top level) directory of the current drive.

Equivalent to the Unix command cd (with a path parameter), or pwd (without a parameter). cd .. changes to the parent directory.

6. chcp

Changes the code page used to display character glyphs in a console window.

chcp [codepage]

With a numeric parameter, this command changes the codepage setting to codepage. Without a parameter, the command displays the currently active codepage.

7. chkdsk

Verifies a hard disk or a floppy disk for file system integrity.

Options:

* /F :
* /P : Forces a full disk verification
* /R : Searches for defective sectors and recovers legible information (applies /F)

chkdsk drive [[path]filename] [/F] [/V]

Equivalent to the Unix command fsck

8. choice

Allows for batch files to prompt the user to select one item from a set of single-character choices.

Introduced in MS-DOS 6;[1] DR-DOS 7.03.[2]

9. cls

Clears the screen.

cls

Equivalent to the Unix clear.

10. copy

Copies files from one location to another. The destination defaults to the current directory. If multiple source files are indicated, the destination must be a directory, or an error will result.

copy filespec [destination]

Files may be copied to devices. For example, copy file lpt1 sends the file to the printer on LPT1. copy file con outputs file to the screen ("console"), which can also be done using type file. Devices themselves may be copied: copy con file takes the text typed into the console and puts it into file, stopping when EOF (Ctrl+Z) is typed.

Files may be concatenated using +. For example, copy file1+file2 file_cat will concatenate the files and output them as file_cat. There are two switches to modify the command's behaviour, /a (text mode, the default) and /b (binary mode). In text mode, copy will stop when it reaches the EOF character; in binary mode, the files will be concatenated in their entirety, ignoring EOF characters. Examples:

copy /a alpha.txt + beta.txt gamma.txt
copy /b alpha.mpg + beta.mpg gamma.mpg

Equivalent Unix commands are cp (for copying) and cat (for concatenation). Device files may be copied in Unix as well, e.g. cp file /dev/tty will display a file on the screen (but cat file is more commonly used here).
Equivalent RT-11/RSX-11/OpenVMS command is copy.

11. defrag

(in MS/PC-DOS; diskopt in DR-DOS)

Defragments a disk drive.
Options:

* -A – Analyses the fragmentation of a disk drive
* -F – Force defragmentation even if disk space is low
* -V – Verbose output mode

Example of usage:

defrag driveletter: -a -v

No Unix equivalent.

12. del or erase

Deletes one or more files.

del filename
erase filename

Equivalent to the Unix command rm.
Equivalent in RT-11/RSX-11/OpenVMS operating systems line is delete command which can be contracted to del.

13. deltree

Deletes a directory along with all of the files and subdirectories that it contains. Normally, it will ask for confirmation of such a drastic action.

deltree [/y] directory

The /y parameter, if present, tells the deltree command to carry out without first prompting for confirmation.

The deltree command is not included in recent Microsoft Windows operating systems. Deleting a non-empty directory in those versions of Windows where the command is not included, can be achieved by using the rmdir command as in the following example:

rmdir /s [/q] directory

In Unix, the functionality of deltree is provided by the rm command with the parameter -r (or -rf for the /y switch).

14. dir

Lists the contents of a directory.

The dir command typed by itself, displays the disk's volume label and serial number; one directory or filename per line, including the filename extension, the file size in bytes, and the date and time the file was last modified; and the total number of files listed, their cumulative size, and the free space (in bytes) remaining on the disk. The command is one of the few commands that exist from the first versions of DOS.

dir [drive:][path][filename] [parameters]

Most commonly used parameters of dir include:

* /W : Displays the listing in wide format, with as many as five filenames or directory names on each line.
* /P : Pause at every page
* /S : Also look in subdirectories
* /Axx: Display files with the specified attributes only
* /Oxx: Modifies sort order
* /B : Uses bare format (no heading information or summary)
* > [drive:][path][filename] : To Store Result in a text file;(c:\dir > c:\fileList.txt)

Possible attributes for the A parameter are D (directories), R (read-only files), H (hidden files), A (files/directories with the archive bit on), and S (system files). The prefix - negates an attribute; attributes can be combined (e.g. /A:/A means directories with the archive bit on).

Possible sort orders are N (name), S (size), E (extension), D (date and time), A (last access date), and G (group directories first). The prefix - reverses the order.

Other less commonly used parameters of dir include:

* /D : Display wide format but sorted by column
* /L : Display forced into lowercase
* /N : Display forced into long file name format instead of 8.3
* /Q : Displays the owner of each file
* /X : Display shows 8.3 names next to long file names

The default parameters of dir can be set using the DIRCMD environment variable.

Equivalent to the Unix command ls (the option -l is "long" list format, it works the opposite way from /w.)

Equivalent in RT-11/RSX-11/OpenVMS operating systems line is directory command which can be contracted to dir.

15. echo

Prints its own arguments back out to the DOS equivalent of the standard output stream. Usually, this means directly to the screen, but the output of echo can be redirected like any other command. Often used in batch files to print text out to the user.

echo this is text Outputs 'this is text'
echo. Outputs a blank line

Another important use of the echo command is to toggle echoing of commands on and off in batch files.

echo on turns on echoing of commands
echo off turns off echoing of commands

Traditionally batch files begin with the @echo off statement. This says to the interpreter that echoing of commands should be off during the whole execution of the batch file thus resulting in a "tidier" output. The @ symbol declares that this particular command (echo off) should also be executed without echo. For example the following 2 batch files are equivalent:
Batch1.bat:

@echo off
echo The files in your root directory:
dir /b /a-d c:\

Batch2.bat:

@echo The files in your root directory:
@dir /b /a-d c:\

Echo can be used to write to files directly from the console, by redirecting the output stream:

echo text > filename

Echo can also be used to append to files directly from the console, again by redirecting the output stream:

echo text >> filename

To type more than one line from the console into a file, use copy con (above).
Equivalent to the Unix command echo.

16. exe2bin

Converts an executable (.exe) file into a binary file with the extension .com, which is a memory image of the program.
The size of the resident code and data sections combined in the input .exe file must be less than 64KB. The file must also have no stack segment.

17. exit

Exits the current command processor. If the exit is used at the primary command, it has no effect unless in a DOS window under Microsoft Windows, in which case the window is closed and the user returns to the desktop.

EXIT

Exit also exists in Unix-shells. If an exit command is used in the primary command shell under Unix, however, it will logoff the user, similar to the control-D keystroke.

18. fastopen

Main article: FASTOPEN

19. fc or comp

Compares two files or sets of files and displays the differences between them.

FC [/A] [/C] [/L] [/LBn] [/N] [/T] [/W] [/nnnn] [drive1:][path1]filename1 [drive2:][path2]filename2
FC /B [drive1:][path1]filename1 [drive2:][path2]filename2
/A Displays only first and last lines for each set of differences.
/B Performs a binary comparison.
/C Disregards the case of letters.
/L Compares files as ASCII text.
/LBn Sets the maximum consecutive mismatches to the specified number of lines.
/N Displays the line numbers on an ASCII comparison.
/T Does not expand tabs to spaces.
/W Compresses white space (tabs and spaces) for comparison.
/nnnn Specifies the number of consecutive lines that must match after a mismatch.
[drive1:][path1]filename1 Specifies the first file or set of files to compare.
[drive2:][path2]filename2 Specifies the second file or set of files to compare.[citation needed]

Equivalent to the Unix commands comm, cmp and diff.

20. fdisk

Manipulates hard disk partition tables. The name derives from IBM's habit of calling hard drives fixed disks. When run from the command line, it displays a menu of various partitioning operations:

1. Create DOS partition or Logical DOS Drive
2. Set active partition
3. Delete partition or Logical DOS Drive
4. Display partition information
5. Change current fixed disk drive (only available if the computer has more than one hard drive)

FDISK /MBR installs a standard master boot record on the hard drive.

FDISK /MBR #: where # is other partition on system. Completes above command on indicated partition.

eg: "C:\FDISK /MBR D:" would install boot record on D:\ partition.

Fdisk exists under Unix with the same name, but it is an entirely different program. However they share purposes.

Speeding up Your Computer

1. Startup Processes

* Go to: Start>Run>Type "msconfig"(without the quotes)
* Go to the Startup Tab
* Uncheck any processes you don't use at startup(e.x. Quicktime, AIM, MSN)
* Click Apply then Restart


2. CCleaner
CCleaner is a great little application that deletes cookies, clears cache, empties your recycle bin, etc.

* Download CCleaner(from google)
* Iinstall CCleaner then Run Cleaner it(note: This will clear your cookies which means your saved passwords and usernames will be gone)
* Go to the Registry tab and Scan for Issues
{*]After its finished scanning click>Fix selected issues...>Fix All Selected Issues>Ok. Continue this process until scanning brings about no issues.


3. Bootvis.exe

* Download bootvis.exe(from google)
* Install bootvis.exe
* In the toolbar go to Trace>Optimize System. The system will reboot after 10 seconds.

How Computer Viruses Work

Strange as it may sound, the computer virus is something of an Information Age marvel. On one hand, viruses show us how vulnerable we are -- a properly engineered virus can have a devastating effect, disrupting productivity and doing billions of dollars in damages. On the other hand, they show us how sophisticated and interconnected human beings have become.

For example, experts estimate that the Mydoom worm infected approximately a quarter-million computers in a single day in January 2004. Back in March 1999, the Melissa virus was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained. The ILOVEYOU virus in 2000 had a similarly devastating effect. In January 2007, a worm called Storm appeared -- by October, experts believed up to 50 million computers were infected. That's pretty impressive when you consider that many viruses are incredibly simple.

**When you listen to the news, you hear about many different forms of electronic infection. The most common are:
Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.

E-mail viruses - An e-mail virus travels as an attachment to e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software
Trojanhorses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.

Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.
*In this article, we will discuss viruses -- both "traditional" viruses and e-mail viruses -- so that you can learn how they work and understand how to protect yourself.

Virus Origins
Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person.
Unlike a cell, a virus has no way to reproduce by itself. Instead, a biological virus must inject its DNA into a cell. The viral DNA then uses the cell's existing machinery to reproduce itself. In some cases, the cell fills with new viral particles until it bursts, releasing the virus. In other cases, the new virus particles bud off the cell one at a time, and the cell remains alive.

A computer virus shares some of these traits. A computer virus must piggyback on top of some other program or document in order to launch. Once it is running, it can infect other programs or documents. Obviously, the analogy between computer and biological viruses stretches things a bit, but there are enough similarities that the name sticks.
People write computer viruses. A person has to write the code, test it to make sure it spreads properly and then release it. A person also designs the virus's attack phase, whether it's a silly message or the destruction of a hard disk. Why do they do it?

There are at least three reasons. The first is the same psychology that drives vandals and arsonists. Why would someone want to break a window on someone's car, paint signs on buildings or burn down a beautiful forest? For some people, that seems to be a thrill. If that sort of person knows computer programming, then he or she may funnel energy into the creation of destructive viruses.

The second reason has to do with the thrill of watching things blow up. Some people have a fascination with things like explosions and car wrecks. When you were growing up, there might have been a kid in your neighborhood who learned how to make gunpowder. And that kid probably built bigger and bigger bombs until he either got bored or did some serious damage to himself. Creating a virus is a little like that -- it creates a bomb inside a computer, and the more computers that get infected the more "fun" the explosion.

The third reason involves bragging rights, or the thrill of doing it. Sort of like Mount Everest -- the mountain is there, so someone is compelled to climb it. If you are a certain type of programmer who sees a security hole that could be exploited, you might simply be compelled to exploit the hole yourself before someone else beats you to it.

Of course, most virus creators seem to miss the point that they cause real damage to real people with their creations. Destroying everything on a person's hard disk is real damage. Forcing a large company to waste thousands of hours cleaning up after a virus is real damage. Even a silly message is real damage because someone has to waste time getting rid of it. For this reason, the legal system is getting much harsher in punishing the people who create viruses.

Virus History

Traditional computer viruses were first widely seen in the late 1980s, and they came about because of several factors. The first factor was the spread of personal computers (PCs). Prior to the 1980s, home computers were nearly non-existent or they were toys. Real computers were rare, and they were locked away for use by "experts." During the 1980s, real computers started to spread to businesses and homes because of the popularity of the IBM PC (released in 1982) and the Apple Macintosh (released in 1984). By the late 1980s, PCs were widespread in businesses, homes and college campuses.

The second factor was the use of computer bulletin boards. People could dial up a bulletin board with a modem and download programs of all types. Games were extremely popular, and so were simple word processors, spreadsheets and other productivity software. Bulletin boards led to the precursor of the virus known as the Trojan horse. A Trojan horse is a program with a cool-sounding name and description. So you download it. When you run the program, however, it does something uncool like erasing your disk. You think you are getting a neat game, but it wipes out your system. Trojan horses only hit a small number of people because they are quickly discovered, the infected programs are removed and word of the danger spreads among users.

The third factor that led to the creation of viruses was the floppy disk. In the 1980s, programs were small, and you could fit the entire operating system, a few programs and some documents onto a floppy disk or two. Many computers did not have hard disks, so when you turned on your machine it would load the operating system and everything else from the floppy disk. Virus authors took advantage of this to create the first self-replicating programs.

Early viruses were pieces of code attached to a common program like a popular game or a popular word processor. A person might download an infected game from a bulletin board and run it. A virus like this is a small piece of code embedded in a larger, legitimate program. When the user runs the legitimate program, the virus loads itself into memory* and looks around to see if it can find any other programs on the disk. If it can find one, it modifies the program to add the virus's code into the program. Then the virus launches the "real program." The user really has no way to know that the virus ever ran. Unfortunately, the virus has now reproduced itself, so two programs are infected. The next time the user launches either of those programs, they infect other programs, and the cycle continues.

If one of the infected programs is given to another person on a floppy disk, or if it is uploaded to a bulletin board, then other programs get infected. This is how the virus spreads.

The spreading part is the infection phase of the virus. Viruses wouldn't be so violently despised if all they did was replicate themselves. Most viruses also have a destructive attack phase where they do damage. Some sort of trigger will activate the attack phase, and the virus will then do something -- anything from printing a silly message on the screen to erasing all of your data. The trigger might be a specific date, the number of times the virus has been replicated or something similar.
In the next section, we will look at how viruses have evolved over the years.

Other Threats

Viruses and worms get a lot of publicity, but they aren't the only threats to your computer's health. Malware is just another name for software that has an evil intent. Here are some common types of malware and what they might do to your infected computer:

Adware puts ads up on your screen.
Spyware collects personal information about you, like your passwords or other information you type into your computer.
Hijackers turn your machine into a zombie computer.
Dialers force your computer to make phone calls. For example, one might call toll 900-numbers and run up your phone bill, while boosting revenue for the owners of the 900-numbers.As virus creators became more sophisticated, they learned new tricks. One important trick was the ability to load viruses into memory so they could keep running in the background as long as the computer remained on. This gave viruses a much more effective way to replicate themselves. Another trick was the ability to infect the boot sector on floppy disks and hard disks. The boot sector is a small program that is the first part of the operating system that the computer loads. It contains a tiny program that tells the computer how to load the rest of the operating system. By putting its code in the boot sector, a virus can guarantee it is executed. It can load itself into memory immediately and run whenever the computer is on. Boot sector viruses can infect the boot sector of any floppy disk inserted in the machine, and on college campuses, where lots of people share machines, they could spread like wildfire. In general, neither executable nor boot sector viruses are very threatening any longer. The first reason for the decline has been the huge size of today's programs. Nearly every program you buy today comes on a compact disc. Compact discs (CDs) cannot be modified, and that makes viral infection of a CD unlikely, unless the manufacturer permits a virus to be burned onto the CD during production. The programs are so big that the only easy way to move them around is to buy the CD. People certainly can't carry applications around on floppy disks like they did in the 1980s, when floppies full of programs were traded like baseball cards. Boot sector viruses have also declined because operating systems now protect the boot sector.

Infection from boot sector viruses and executable viruses is still possible. Even so, it is a lot harder, and these viruses don't spread nearly as quickly as they once did. Call it "shrinking habitat," if you want to use a biological analogy. The environment of floppy disks, small programs and weak operating systems made these viruses possible in the 1980s, but that environmental niche has been largely eliminated by huge executables, unchangeable CDs and better operating system safeguards.
E-mail viruses are probably the most familiar to you. We'll look at some in the next section.

E-mail Viruses

Virus authors adapted to the changing computing environment by creating the e-mail virus. For example, the Melissa virus in March 1999 was spectacular. Melissa spread in Microsoft Word documents sent via e-mail, and it worked like this:

Phishing and Social Engineering
While you may be taking steps to protect your computer from becoming infected by a virus, you may very well run into another, more insidious type of attack. Phishing and other social engineering attacks have been on the rise. Social engineering is a fancy term for someone trying to get you to give up your personal information -- online or in person -- so they can use it to steal from you. Anti-spam traps may catch e-mail messages coming from phishers, but the U.S. Computer Emergency Readiness Team says the best way for you to beat them at their own game is to be wary. And never give out your personal or financial information online.
Someone created the virus as a Word document and uploaded it to an Internet newsgroup. Anyone who downloaded the document and opened it would trigger the virus. The virus would then send the document (and therefore itself) in an e-mail message to the first 50 people in the person's address book. The e-mail message contained a friendly note that included the person's name, so the recipient would open the document, thinking it was harmless. The virus would then create 50 new messages from the recipient's machine. At that rate, the Melissa virus quickly became the fastest-spreading virus anyone had seen at the time. As mentioned earlier, it forced a number of large companies to shut down their e-mail systems.
The ILOVEYOU virus, which appeared on May 4, 2000, was even simpler. It contained a piece of code as an attachment. People who double-clicked on the attachment launched the code. It then sent copies of itself to everyone in the victim's address book and started corrupting files on the victim's machine. This is as simple as a virus can get. It is really more of a Trojan horse distributed by e-mail than it is a virus.
The Melissa virus took advantage of the programming language built into Microsoft Word called VBA, or Visual Basic for Applications. It is a complete programming language and it can be programmed to do things like modify files and send e-mail messages. It also has a useful but dangerous auto-execute feature. A programmer can insert a program into a document that runs instantly whenever the document is opened. This is how the Melissa virus was programmed. Anyone who opened a document infected with Melissa would immediately activate the virus. It would send the 50 e-mails, and then infect a central file called NORMAL.DOT so that any file saved later would also contain the virus. It created a huge mess.
Microsoft applications have a feature called Macro Virus Protection built into them to prevent this sort of virus. With Macro Virus Protection turned on (the default option is ON), the auto-execute feature is disabled. So when a document tries to auto-execute viral code, a dialog pops up warning the user. Unfortunately, many people don't know what macros or macro viruses are, and when they see the dialog they ignore it, so the virus runs anyway. Many other people turn off the protection mechanism. So the Melissa virus spread despite the safeguards in place to prevent it.

In the case of the ILOVEYOU virus, the whole thing was human-powered. If a person double-clicked on the program that came as an attachment, then the program ran and did its thing. What fueled this virus was the human willingness to double-click on the executable.
Now that we've covered e-mail viruses, let's take a look at worms.

Worms

A worm is a computer program that has the ability to copy itself from machine to machine. Worms use up computer time and network bandwidth when they replicate, and often carry payloads that do considerable damage. A worm called Code Red made huge headlines in 2001. Experts predicted that this worm could clog the Internet so effectively that things would completely grind to a halt.
A worm usually exploits some sort of security hole in a piece of software or the operating system. For example, the Slammer worm (which caused mayhem in January 2003) exploited a hole in Microsoft's SQL server. "Wired" magazine took a fascinating look inside Slammer's tiny (376 byte) program.
Worms normally move around and infect other machines through computer networks. Using a network, a worm can expand from a single copy incredibly quickly. The Code Red worm replicated itself more than 250,000 times in approximately nine hours on July 19, 2001
The Code Red worm slowed down Internet traffic when it began to replicate itself, but not nearly as badly as predicted. Each copy of the worm scanned the Internet for Windows NT or Windows 2000 servers that did not have the Microsoft security patch installed. Each time it found an unsecured server, the worm copied itself to that server. The new copy then scanned for other servers to infect. Depending on the number of unsecured servers, a worm could conceivably create hundreds of thousands of copies.
The Code Red worm had instructions to do three things:
Replicate itself for the first 20 days of each month
Replace Web pages on infected servers with a page featuring the message "Hacked by Chinese"
Launch a concerted attack on the White House Web site in an attempt to overwhelm
This attack would consist of the infected systems simultaneously sending 100 connections to port 80 of www.whitehouse.gov (198.137.240.91).
The U.S. government changed the IP address of www.whitehouse.gov to circumvent that particular threat from the worm and issued a general warning about the worm, advising users of Windows NT or Windows 2000 Web servers to make sure they installed the security patch. .
A worm called Storm, which showed up in 2007, immediately started making a name for itself. Storm uses social engineering techniques to trick users into loading the worm on their computers. So far, it's working -- experts believe between one million and 50 million computers have been
When the worm is launched, it opens a back door into the computer, adds the infected machine to a botnet and installs code that hides itself. The botnets are small peer-to-peer groups rather than a larger, more easily identified network. Experts think the people controlling Storm rent out their micro-botnets to deliver spam or adware, or for denial-of-service attacks on Web sites.

In the next section, we'll look at patching your system and other things you can do to protect your computer
How to Protect Your Computer from Viruses
You can protect yourself against viruses with a few simple steps:
If you are truly worried about traditional (as opposed to e-mail) viruses, you should be running a more secure operating system like UNIX. You never hear about viruses on these operating systems because the security features keep viruses (and unwanted human visitors) away from your hard disk.

If you are using an unsecured operating system, then buying virus protection software is a nice safeguard.
If you simply avoid programs from unknown sources (like the Internet), and instead stick with commercial software purchased on CDs, you eliminate almost all of the risk from traditional viruses.You should make sure that Macro Virus Protection is enabled in all Microsoft applications, and you should NEVER run macros in a document unless you know what they do. There is seldom a good reason to add macros to a document, so avoiding all macros is a great policy.

You should never double-click on an e-mail attachment that contains an executable. Attachments that come in as Word files (.DOC), spreadsheets (.XLS), images (.GIF), etc., are data files and they can do no damage (noting the macro virus problem in Word and Excel documents mentioned above). However, some viruses can now come in through .JPG graphic file attachments. A file with an extension like EXE, COM or VBS is an executable, and an executable can do any sort of damage it wants. Once you run it, you have given it permission to do anything on your machine. The only defense is never to run executables that arrive via e-mail.

All windows shortcuts

Command Prompt

ANSI.SYS Defines functions that change display graphics, control cursor movement, and reassign keys.
APPEND Causes MS-DOS to look in other directories when editing a file or running a command.
ARP Displays, adds, and removes arp information from network devices.
ASSIGN Assign a drive letter to an alternate letter.
ASSOC View the file associations.
AT Schedule a time to execute commands or programs.
ATMADM Lists connections and addresses seen by Windows ATM call manager.
ATTRIB Display and change file attributes.
BATCH Recovery console command that executes a series of commands in a file.
BOOTCFG Recovery console command that allows a user to view, modify, and rebuild the boot.ini
BREAK Enable / disable CTRL + C feature.
CACLS View and modify file ACL's.
CALL Calls a batch file from another batch file.
CD Changes directories.
CHCP Supplement the International keyboard and character set information.
CHDIR Changes directories.
CHKDSK Check the hard disk drive running FAT for errors.
CHKNTFS Check the hard disk drive running NTFS for errors.
CHOICE Specify a listing of multiple options within a batch file.
CLS Clears the screen.
CMD Opens the command interpreter.
COLOR Easily change the foreground and background color of the MS-DOS window.
COMP Compares files.
COMPACT Compresses and uncompress files.
CONTROL Open control panel icons from the MS-DOS prompt.
CONVERT Convert FAT to NTFS.
COPY Copy one or more files to an alternate location.
CTTY Change the computers input/output devices.
DATE View or change the systems date.
DEBUG Debug utility to create assembly programs to modify hardware settings.
DEFRAG Re-arrange the hard disk drive to help with loading programs.
DEL Deletes one or more files.
DELETE Recovery console command that deletes a file.
DELTREE Deletes one or more files and/or directories.
DIR List the contents of one or more directory.
DISABLE Recovery console command that disables Windows system services or drivers.
DISKCOMP Compare a disk with another disk.
DISKCOPY Copy the contents of one disk and place them on another disk.
DOSKEY Command to view and execute commands that have been run in the past.
DOSSHELL A GUI to help with early MS-DOS users.
DRIVPARM Enables overwrite of original device drivers.
ECHO Displays messages and enables and disables echo.
EDIT View and edit files.
EDLIN View and edit files.
EMM386 Load extended Memory Manager.
ENABLE Recovery console command to enable a disable service or driver.
ENDLOCAL Stops the localization of the environment changes enabled by the setlocal command.
ERASE Erase files from computer.
EXIT Exit from the command interpreter.
EXPAND Expand a M*cros*ft Windows file back to it's original format.
EXTRACT Extract files from the M*cros*ft Windows cabinets.
FASTHELP Displays a listing of MS-DOS commands and information about them.
FC Compare files.
FDISK Utility used to create partitions on the hard disk drive.
FIND Search for text within a file.
FINDSTR Searches for a string of text within a file.
FIXBOOT Writes a new boot sector.
FIXMBR Writes a new boot record to a disk drive.
FOR Boolean used in batch files.
FORMAT Command to erase and prepare a disk drive.
FTP Command to connect and operate on a FTP server.
FTYPE Displays or modifies file types used in file extension associations.
GOTO Moves a batch file to a specific label or location.
GRAFTABL Show extended characters in graphics mode.
HELP Display a listing of commands and brief explanation.
IF Allows for batch files to perform conditional processing.
IFSHLP.SYS 32-bit file manager.
IPCONFIG Network command to view network adapter settings and assigned values.
KEYB Change layout of keyboard.
LABEL Change the label of a disk drive.
LH Load a device driver in to high memory.
LISTSVC Recovery console command that displays the services and drivers.
LOADFIX Load a program above the first 64k.
LOADHIGH Load a device driver in to high memory.
LOCK Lock the hard disk drive.
LOGON Recovery console command to list installations and enable administrator login.
MAP Displays the device name of a drive.
MD Command to create a new directory.
MEM Display memory on system.
MKDIR Command to create a new directory.
MODE Modify the port or display settings.
MORE Display one page at a time.
MOVE Move one or more files from one directory to another directory.
MSAV Early M*cros*ft Virus scanner.
MSD Diagnostics utility.
MSCDEX Utility used to load and provide access to the CD-ROM.
NBTSTAT Displays protocol statistics and current TCP/IP connections using NBT
NET Update, fix, or view the network or network settings
NETSH Configure dynamic and static network information from MS-DOS.
NETSTAT Display the TCP/IP network protocol statistics and information.
NLSFUNC Load country specific information.
NSLOOKUP Look up an IP address of a domain or host on a network.
PATH View and modify the computers path location.
PATHPING View and locate locations of network latency.
PAUSE Command used in batch files to stop the processing of a command.
PING Test / send information to another network computer or network device.
POPD Changes to the directory or network path stored by the pushd command.
POWER Conserve power with computer portables.
PRINT Prints data to a printer port.
PROMPT View and change the MS-DOS prompt.
PUSHD Stores a directory or network path in memory so it can be returned to at any time.
QBASIC Open the QBasic.
RD Removes an empty directory.
REN Renames a file or directory.
RENAME Renames a file or directory.
RMDIR Removes an empty directory.
ROUTE View and configure windows network route tables.
RUNAS Enables a user to execute a program on another computer.
SCANDISK Run the scandisk utility.
SCANREG Scan registry and recover registry from errors.
SET Change one variable or string to another.
SETLOCAL Enables local environments to be changed without affecting anything else.
SETVER Change MS-DOS version to trick older MS-DOS programs.
SHARE Installs support for file sharing and locking capabilities.
SHIFT Changes the position of replaceable parameters in a batch program.
SHUTDOWN Shutdown the computer from the MS-DOS prompt.
SMARTDRV Create a disk cache in conventional memory or extended memory.
SORT Sorts the input and displays the output to the screen.
START Start a separate window in Windows from the MS-DOS prompt.
SUBST Substitute a folder on your computer for another drive letter.
SWITCHES Remove add functions from MS-DOS.
SYS Transfer system files to disk drive.
TELNET Telnet to another computer / device from the prompt.
TIME View or modify the system time.
TITLE Change the title of their MS-DOS window.
TRACERT Visually view a network packets route across a network.
TREE View a visual tree of the hard disk drive.
TYPE Display the contents of a file.
UNDELETE Undelete a file that has been deleted.
UNFORMAT Unformat a hard disk drive.
UNLOCK Unlock a disk drive.
VER Display the version information.
VERIFY Enables or disables the feature to determine if files have been written properly.
VOL Displays the volume information about the designated drive.
XCOPY Copy multiple files, directories, and/or drives from one location to another.
TRUENAME When placed before a file, will display the whole directory in which it exists
TASKKILL It allows you to kill those unneeded or locked up applications


Run Commands To Access The Control Panel

Add/Remove Programs control appwiz.cpl
Date/Time Properties control timedate.cpl
Display Properties control desk.cpl
FindFast control findfast.cpl
Fonts Folder control fonts
Internet Properties control inetcpl.cpl
Keyboard Properties control main.cpl keyboard
Mouse Properties control main.cpl
Multimedia Properties control mmsys.cpl
Network Properties control netcpl.cpl
Password Properties control password.cpl
Printers Folder control printers
Sound Properties control mmsys.cpl sounds
System Properties control sysdm.cp



Run Commands:


compmgmt.msc - Computer management
devmgmt.msc - Device manager
diskmgmt.msc - Disk management
dfrg.msc - Disk defrag
eventvwr.msc - Event viewer
fsmgmt.msc - Shared folders
gpedit.msc - Group policies
lusrmgr.msc - Local users and groups
perfmon.msc - Performance monitor
rsop.msc - Resultant set of policies
secpol.msc - Local security settings
services.msc - Various Services
msconfig - System Configuration Utility
regedit - Registry Editor
msinfo32 _ System Information
sysedit _ System Edit
win.ini _ windows loading information(also system.ini)
winver _ Shows current version of windows
mailto: _ Opens default email client
command _ Opens command prompt


Windows XP Shortcuts:


ALT+- (ALT+hyphen) Displays the Multiple Document Interface (MDI) child window's System menu
ALT+ENTER View properties for the selected item
ALT+ESC Cycle through items in the order they were opened
ALT+F4 Close the active item, or quit the active program
ALT+SPACEBAR Display the System menu for the active window
ALT+TAB Switch between open items
ALT+Underlined letter Display the corresponding menu
BACKSPACE View the folder one level up in My Computer or Windows Explorer
CTRL+A Select all
CTRL+B Bold
CTRL+C Copy
CTRL+I Italics
CTRL+O Open an item
CTRL+U Underline
CTRL+V Paste
CTRL+X Cut
CTRL+Z Undo
CTRL+F4 Close the active document
CTRL while dragging Copy selected item
CTRL+SHIFT while dragging Create shortcut to selected iteM
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word
CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word
CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph
CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph
SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin
ESC Cancel the current task
F1 Displays Help
F2 Rename selected item
F3 Search for a file or folder
F4 Display the Address bar list in My Computer or Windows Explorer
F5 Refresh the active window
F6 Cycle through screen elements in a window or on the desktop
F10 Activate the menu bar in the active program
SHIFT+F10 Display the shortcut menu for the selected item
CTRL+ESC Display the Start menu
SHIFT+CTRL+ESC Launches Task Manager
SHIFT when you insert a CD Prevent the CD from automatically playing
WIN Display or hide the Start menu
WIN+BREAK Display the System Properties dialog box
WIN+D Minimizes all Windows and shows the Desktop
WIN+E Open Windows Explorer
WIN+F Search for a file or folder
WIN+F+CTRL Search for computers
WIN+L Locks the desktop
WIN+M Minimize or restore all windows
WIN+R Open the Run dialog box
WIN+TAB Switch between open items


Windows Explorer Shortcuts:


ALT+SPACEBAR - Display the current window’s system menu
SHIFT+F10 - Display the item's context menu
CTRL+ESC - Display the Start menu
ALT+TAB - Switch to the window you last used
ALT+F4 - Close the current window or quit
CTRL+A - Select all items
CTRL+X - Cut selected item(s)
CTRL+C - Copy selected item(s)
CTRL+V - Paste item(s)
CTRL+Z - Undo last action
CTRL+(+) - Automatically resize the columns in the right hand pane
TAB - Move forward through options
ALT+RIGHT ARROW - Move forward to a previous view
ALT+LEFT ARROW - Move backward to a previous view
SHIFT+DELETE - Delete an item immediately
BACKSPACE - View the folder one level up
ALT+ENTER - View an item’s properties
F10 - Activate the menu bar in programs
F6 - Switch between left and right panes
F5 - Refresh window contents
F3 - Display Find application
F2 - Rename selected item


Internet Explorer Shortcuts:


CTRL+A - Select all items on the current page
CTRL+D - Add the current page to your Favorites
CTRL+E - Open the Search bar
CTRL+F - Find on this page
CTRL+H - Open the History bar
CTRL+I - Open the Favorites bar
CTRL+N - Open a new window
CTRL+O - Go to a new location
CTRL+P - Print the current page or active frame
CTRL+S - Save the current page
CTRL+W - Close current browser window
CTRL+ENTER - Adds the http://www. (url) .com
SHIFT+CLICK - Open link in new window
BACKSPACE - Go to the previous page
ALT+HOME - Go to your Home page
HOME - Move to the beginning of a document
TAB - Move forward through items on a page
END - Move to the end of a document
ESC - Stop downloading a page
F11 - Toggle full-screen view
F5 - Refresh the current page
F4 - Display list of typed addresses
F6 - Change Address bar and page focus
ALT+RIGHT ARROW - Go to the next page
SHIFT+CTRL+TAB - Move back between frames
SHIFT+F10 - Display a shortcut menu for a link
SHIFT+TAB - Move back through the items on a page
CTRL+TAB - Move forward between frames
CTRL+C - Copy selected items to the clipboard
CTRL+V - Insert contents of the clipboard
ENTER - Activate a selected link
HOME - Move to the beginning of a document
END - Move to the end of a document
F1 - Display Internet Explorer Help


Accessibility Shortcuts


Tap SHIFT 5 times - Toggles StickyKeys on and off.
Press down and hold the right SHIFT key for 8 seconds - Toggles FilterKeys on and off.
Press down and hold the NUM LOCK key for 5 seconds - Toggles ToggleKeys on and off.
Left ALT+left SHIFT+NUM LOCK - Toggles MouseKeys on and off.
Left ALT+left SHIFT+PRINT SCREEN - Toggles High Contrast on and off.


Easy move through Powerpoint


Apply subscript formatting - CTRL+EQUAL SIGN (=)
Apply superscript formatting - CTRL+PLUS SIGN (+)
Bold - CTRL+B
Capitalize - SHIFT+F3
Copy - CTRL+C
Delete a word - CTRL+BACKSPACE
Demote a paragraph - ALT+SHIFT+RIGHT ARROW
Find - CTRL+F
Insert a hyperlink - CTRL+K
Insert a new slide - CTRL+M
Italicize - CTRL+I
Make a duplicate of the current slide - CTRL+D
Open - CTRL+O
Open the Font dialog box - CTRL+T
Paste - CTRL+V
Print - CTRL+P
Promote a paragraph - ALT+SHIFT+LEFT ARROW
Repeat your last action - F4 or CTRL+Y
Save - CTRL+S
Select all - CTRL+A
Start a slide show - F5
Switch to the next pane (clockwise) - F6
Switch to the previous pane - SHIFT+F6
Undo - CTRL+Z
View guides - CTRL+G


Excel Time saving Shortcuts


Move to next cell in row - Tab
Move to previous cell in row - Shift + Tab
Up one screen - Page Up
Down one screen - Page Down
Move to next worksheet - Ctrl + Page Down
Move to previous worksheet - Ctrl + Page Up
Go to first cell in data region - Ctrl + Home
Go to last cell in data region - Ctrl + End
Bold toggle for selection - Ctrl + B
Italic toggle for selection - Ctrl + I
Underline toggle for selection - Ctrl + U
Strikethrough for selection - Ctrl + 5
Change the font - Ctrl + Shift + F
Change the font size - Ctrl + Shift + P
Apply outline borders - Ctrl + Shift + 7
Remove all borders - Ctrl + Shift + Underline
Wrap text in same cell - Alt + Enter
Format cells - Ctrl + 1
Select font - Ctrl + Shift + F
Select point size - Ctrl + Shift + P
Format as currency - Ctrl + Shift + 4
Format as general - Ctrl + Shift + # (hash sign)
Format as percentage - Ctrl + Shift + 5
Format as number - Ctrl + Shift + 1
Autosum a range of cells - Alt + Equals Sign
Insert the date - Ctrl + ; (semi-colon)
Insert the time - Ctrl + Shift + ; (semi-colon)
Insert columns/rows - Ctrl + Shift + + (plus sign)
Insert a new worksheet - Shift + F11
Read Monitor Cell One - Alt + Shift + 1
Read Monitor Cell Two - Alt + Shift + 2
Read Monitor Cell Three - Alt + Shift + 3
Read Monitor Cell Four - Alt + Shift + 4
List Visible Cells With Data - Ctrl + Shift + D
Lists Data In Current Column - Ctrl + Shift + C
List Data In Current Row - Ctrl + Shift + R
Select Hyperlink - Ctrl + Shift + H
Move To Worksheet Listbox - Ctrl + Shift + S
Move To Monitor Cell - Ctrl + Shift + M
Select Worksheet Objects - Ctrl + Shift + O
List Cells At Page Breaks - Ctrl + Shift + B
Options Listbox - Insert + V

Microsoft Office Keyboard Shortcut Keys



All Caps - CTRL+SHIFT+A
Annotation - ALT+CTRL+M
Auto Format - ALT+CTRL+K
Auto Text - F3 or ALT+CTRL+V
Bold - CTRL+B or CTRL+SHIFT+B
Bookmark - CTRL+SHIFT+F5
Copy - CTRL+C or CTRL+INSERT
Copy Format - CTRL+SHIFT+C
Copy Text - SHIFT+F2
Create Auto Text - ALT+F3
Date Field - ALT+SHIFT+D
Delete Back Word - CTRL+BACKSPACE
Delete Word - CTRL+DELETE
Dictionary - ALT+SHIFT+F7
Do Field Click - ALT+SHIFT+F9
Doc Maximize - CTRL+F10
Doc Move - CTRL+F7
Doc Restore - CTRL+F5
Doc Size - CTRL+F8
Grow Font - CTRL+SHIFT+.
Grow Font One Point - CTRL+]Hanging Indent - CTRL+T
Header Footer Link - ALT+SHIFT+R
Help - F1
Hidden - CTRL+SHIFT+H
Hyperlink - CTRL+K
Indent - CTRL+M
Italic - CTRL+I or CTRL+SHIFT+I
Justify Para - CTRL+J
Left Para - CTRL+L
Line Up Extend - SHIFT+UP
List Num Field - ALT+CTRL+L
Outline - ALT+CTRL+O
Outline Collapse - ALT+SHIFT+- or ALT+SHIFT+NUM -
Outline Demote - ALT+SHIFT+RIGHT
Outline Expand - ALT+SHIFT+=
Outline Expand - ALT+SHIFT+NUM +
Outline Move Down - ALT+SHIFT+DOWN
Outline Move Up - ALT+SHIFT+UP
Outline Promote - ALT+SHIFT+LEFT
Outline Show First Line - ALT+SHIFT+L
Lock Fields - CTRL+3 or CTRL+F11
Web Go Back - ALT+LEFT
Web Go Forward - ALT+RIGHT
Word Left - CTRL+LEFT
Word Left Extend - CTRL+SHIFT+LEFT
Word Right - CTRL+RIGHT