Wednesday, November 21, 2012

Stop / disable email notifications from Facebook account

An Email notification is sent by Facebook account to your email account for different activities. For an active Facebook user, such email notifications are least important. These only fill email inbox and one has to spend more time deleting such notification emails. You can easily stop & disable such email notifications from Facebook settings page.

Stop Email notifications from Facebook

1. Goto Facebook website & login into your account.
2. Click Settings link at top right part of the webpage.
3. On My Account page click on “Notifications” tab.
facebook-email-notifications
4. Uncheck (no tick) features for which you do not want email notifications. Make sure there is no tick under email column next to respective Facebook feature.
You can uncheck all to stop all email notifications. It can take sometime to uncheck email notification option for all listed Facebook features. But the end result is sweet with no email from Facebook account activity.

Friday, October 26, 2012

[Windows 8 SKU Editions] Comparison Between Windows 8, Windows 8 Pro, Windows 8 Enterprise and Windows RT

First Windows 8 headlines:
  • Microsoft confirms that Windows 8 will be the official name of its upcoming OS
  • Windows 8 will come in 3 editions for x86 processors: Windows 8, Windows 8 Pro and Windows 8 Enterprise
  • Microsoft talks about new "Windows RT" edition for ARM processors
  • Windows Media Center will be available as add-on to Windows 8 Pro edition
  • For China, there will be a local language-only edition of Windows 8
  • Windows 8's Server edition will be officially called "Windows Server 2012"
Windows_8_New_Logo.png
Now the details:
Windows 8 is Official Product Name of Microsoft's Next OS
Today in an official post at Blogging Windows blog, Microsoft confirmed that "Windows 8" is the official product name of company's upcoming OS. If you can remember, same thing happened with Windows 7. Microsoft has started a tradition to keep product's codename and official name same.
Windows 8 SKU Details
Second news, Microsoft has announced Windows 8 SKU (Stock Keeping Unit) details. Microsoft had a tradition to release several editions for every new Windows version such as Windows 7 Starter, Windows 7 Home Basic, Windows 7 Home Premium, Windows 7 Ultimate and Windows 7 Enterprise.
It always confused people in choosing correct edition for them. So many editions were never liked by Windows users and now it seems Microsoft has accepted this fact.
Now Microsoft has simplified Windows 8 editions list and there will be only 3 editions of Windows 8 for x86 processors (both 32-bit and 64-bit):
  • Windows 8
  • Windows 8 Pro
  • Windows 8 Enterprise
All 3 editions will be available for PCs and tablets powered by x86 processors (both 32-bit and 64-bit).
Windows 8:
According to Microsoft, this basic edition of Windows 8 will be the right choice for many Windows users. It will include all basic features currently available in Windows 8 Consumer Preview build such as updated Windows Explorer, Task Manager, better multi-monitor support and the ability to switch languages on the fly,which was previously only available in Enterprise/Ultimate editions of Windows.
Existing Windows 7 Starter, Home Basic and Home Premium users will be able to upgrade to this basic edition of Windows 8.
Windows 8 Pro:
Windows 8 Pro is designed for tech enthusiasts and business/technical professionals. It includes all the features in Windows 8 plus features for encryption, virtualization, PC management and domain connectivity.
Following features are exclusive to Pro edition and will not available in basic edition of Windows 8:
  • BitLocker and BitLocker To Go
  • Boot from VHD
  • Client Hyper-V
  • Domain Join
  • Encrypting File System
  • Group Policy
  • Remote Desktop (host)
Windows Media Center will be available as an economical "media pack" add-on to Windows 8 Pro. If you are an enthusiast or you want to use your PC in a business environment, you will want Windows 8 Pro.
Existing Windows 7 Starter, Home Basic, Home Premium, Professional and Ultimate users will be able to upgrade to both basic as well as Pro editions of Windows 8.
Windows 8 Enterprise:
As with previous versions of Windows, there will also be an edition of Windows 8 specifically for those enterprise customers with Software Assurance agreements. Windows 8 Enterprise edition includes all the features of Windows 8 Pro plus features for IT organization that enable PC management and deployment, advanced security, virtualization, new mobility scenarios and much more.
Following features are exclusive to Enterprise edition and will not available in other editions of Windows 8:
  • Windows To Go
  • DirectAccess
  • BranchCache
  • AppLocker
  • VDI Enhancements
  • App Deployment
Windows To Go feature allows users to put is a fully manageable corporate Windows 8 desktop on a bootable external USB stick. DirectAccess allows remote users to seamlessly access resources inside a corporate network without having to launch a separate VPN. BranchCache allows users' PCs to cache files, websites, and other content from central servers, so content is not repeatedly downloaded across the wide area network (WAN). AppLocker can help mitigate issues by restricting the files and apps that users or groups are allowed to run.
Windows RT or Windows RunTime
Microsoft also talked about a new edition of Windows which is "Windows RT" or "Windows RunTime". Windows RT is the newest member of the Windows family. It will be also known as Windows on ARM or WOA. This single edition will only be available pre-installed on PCs and tablets powered by ARM processors and will help enable new thin and lightweight form factors with impressive battery life.
Windows RT will include touch-optimized desktop versions of the new Microsoft Word, Excel, PowerPoint, and OneNote. For new apps, the focus for Windows RT is development on the new Windows runtime, or WinRT and forms the foundation of a new generation of cloud-enabled, touch-enabled, web-connected apps of all kinds.
If you want to get a feature-wise comparison between Windows 8, Windows 8 Pro and Windows RT, following chart will help you:
Feature NameWindows 8Windows 8 ProWindows RT
Upgrades from Windows 7 Starter, Home Basic, Home Premium
x
x
Upgrades from Windows 7 Professional, Ultimatex
Start screen, Semantic Zoom, Live Tilesxxx
Windows Storexxx
Apps (Mail, Calendar, People, Messaging, Photos, SkyDrive, Reader, Music, Video)xxx
Microsoft Office (Word, Excel, PowerPoint, OneNote)x
Internet Explorer 10xxx
Device encryptionx
Connected standbyxxx
Microsoft accountxxx
Desktopxxx
Installation of x86/64 and desktop softwarexx
Updated Windows Explorerxxx
Windows Defenderxxx
SmartScreenxxx
Windows Updatexxx
Enhanced Task Managerxxx
Switch languages on the fly (Language Packs)xxx
Better multiple monitor supportxxx
Storage Spacesxx
Windows Media Playerxx
Exchange ActiveSyncxxx
File historyxxx
ISO / VHD mountxxx
Mobile broadband featuresxxx
Picture passwordxxx
Play Toxxx
Remote Desktop (client)xxx
Reset and refresh your PCxxx
Snapxxx
Touch and Thumb keyboardxxx
Trusted bootxxx
VPN clientxxx
BitLocker and BitLocker To Gox
Boot from VHDx
Client Hyper-Vx
Domain Joinx
Encrypting File Systemx
Group Policyx
Remote Desktop (host)x


Windows Server 2012
Microsoft has also announced the official name of "Windows Server 8". Windows 8's Server edition will officially be called "Windows Server 2012" and is due out later this year. Windows Server 2012 will be a cloud-optimized operating system.
More information about Windows 8 pricing, limited-time programs and promotions will be shared by Microsoft in coming months, so stay tuned with us...

How Hackers Can Disguise Malicious Programs With Fake File Extensions

image
File extensions can be faked – that file with an .mp3 extension may actually be an executable program. Hackers can fake file extensions by abusing a special Unicode character, forcing text to be displayed in reverse order.
Windows also hides file extensions by default, which is another way novice users can be deceived – a file with a name like picture.jpg.exe will appear as a harmless JPEG image file.

Disguising File Extensions With The “Unitrix” Exploit

If you always tell Windows to show file extensions (see below) and pay attention to them, you may think that you’re safe from file-extension-related shenanigans. However, there are other ways people can disguise the file extension.
Dubbed the “Unitrix” exploit by Avast after it was used by the Unitrix malware, this method takes advantage of a special character in Unicode to reverse the order of characters in a file name, hiding the dangerous file extension in the middle of the file name and placing a harmless-looking fake file extension near the end of the file name.
The Unicode character is U+202E: Right-to-Left Override, and it forces programs to display text in reverse order. While it’s obviously useful for some purposes, it probably shouldn’t be supported in file names.

Essentially, the file’s actual name can be something like “Awesome Song uploaded by [U+202e]3pm.SCR”. The special character forces Windows to display the end of the file’s name in reverse, so the file’s name will appear as “Awesome Song uploaded by RCS.mp3”. However, it’s not an MP3 file – it’s an SCR file and it will be executed if you double-click it. (See below for more types of dangerous file extensions.)

This example is taken from a cracking site, as I thought it was particularly deceptive – keep an eye on the files you download!

Windows Hides File Extensions By Default

Most users have been trained not to launch untrusted .exe files download from the Internet as they may be malicious. Most users also know that some types of files are safe – for example, if you have a JPEG image named image.jpg, you can double-click it and it will open in your image-viewing program without any risk of getting infected.
There’s just one problem – Windows hides file extensions by default. The image.jpg file may actually be image.jpg.exe, and when you double-click it you’ll launch the malicious .exe file. This is one of the situations where User Account Control can help – malware can still do damage without administrator permissions, but won’t be able to compromise your entire system.
Worse yet, malicious individuals can set any icon they want for the .exe file. A file named image.jpg.exe using the standard image icon will look like a harmless image with Windows’ default settings. While Windows will tell you that this file is an application if you look closely, many users won’t notice this.

Viewing File Extensions

To help protect against this, you can enable file extensions in Windows Explorer’s Folder Settings window. Click the Organize button in Windows Explorer and select Folder and search options to open it.

Uncheck the Hide extensions for known file types checkbox on the View tab and click OK.

All files extensions will now be visible, so you’ll see the hidden .exe file extension.

.exe Isn’t the Only Dangerous File Extension

The .exe file extension isn’t the only dangerous file extension to look out for. Files ending with these file extensions can also run code on your system, making them dangerous, too:
.bat, .cmd, .com, .lnk, .pif, .scr, .vb, .vbe, .vbs, .wsh
This list isn’t exhaustive. For example, if you have Oracle’s Java installed, the .jar file extension can also be dangerous, as it will launch Java programs.

Friday, September 28, 2012

Chapter about Content Advisor




This chapter describes the Microsoft® Internet Explorer Content Advisor, which allows you to rate the appropriateness of Web content and to control which Web sites your users can visit. This feature can help you create a more secure environment that protects your users from unsuitable content on the Internet.

Related Information in the Resource Kit

  • For more information about configuring security zones, see "Security Zones." 
  • For more information about using the Internet Explorer Customization Wizard to preconfigure security settings, see "Running the Microsoft Internet Explorer Customization Wizard." 
  • For more information about using the Internet Explorer Administration Kit (IEAK) Profile Manager to preconfigure security settings, see "Keeping Programs Updated." 

Using Content Advisor

Using Content Advisor, you can control the types of content that users access on the Internet. You can adjust the content ratings settings to reflect the appropriate level of content in four areas: language, nudity, sex, and violence. For example, businesses might want to block access to Web sites that offer no business value to their employees, and parents might want to block access to sites that display content inappropriate for their children.
Historically, the motive for filtering sites on the basis of a site's content has been driven by a site's subject matter and the fact that some ideas and images are blatantly offensive to many people. In 1995, the World Wide Web Consortium (W3C) Platform for Internet Content Selection (PICS) began to define an infrastructure that would encourage Web content providers to voluntarily rate their sites. This is done by using a specific set of HTML meta tags that rate the content of Web sites. Software programs can then block access to Web sites based upon the values of those meta tags. Today, the most common content ratings are based on the PICS standard for defining and rating Web content. For more information about PICS, visit the W3C Web site at http://www.w3.org/.

RSACi Rating System

Internet Explorer is installed with a PICS-based content rating system known as the Recreational Software Advisory Council on the Internet (RSACi) system. This built-in PICS support can help you control the types of content that users can access on the Internet. When you enable Content Advisor, Internet Explorer reads the meta tags to determine whether Web sites meet your criteria for suitable content. You can also subscribe to independent ratings bureaus or use third-party ratings to control access to Web content.
RSACi is an open, objective content ratings system for the Internet developed by the Recreational Software Advisory Council (RSAC), which has since been folded into the Internet Content Rating Association (ICRA), an independent, nonprofit organization. The RSACi system provides information about the level of sex, nudity, violence, and offensive (vulgar or hate-motivated) language in software games and Web sites. For more information about ICRA and the RSACi rating system, see the ICRA Web site at http://www.icra.org/. You can also download the ICRA's new content ratings system from this Web site.
The following table shows the five levels of the RSACi rating system and describes the content allowed for each level. Level 0 is the most restrictive, preventing users from accessing Web sites that include offensive language, nudity, sex, and violence. Level 4 is the least restrictive, allowing users to access Web sites that present explicit content.
LevelLanguage ratingNudity ratingSex ratingViolence rating
4
Explicit or crude language
Provocative frontal nudity
Explicit sexual activity
Wanton and gratuitous violence
3
Obscene gestures
Frontal nudity
Non-explicit sexual touching
Killing with blood and gore
2
Moderate expletives
Partial nudity
Clothed sexual touching
Killing
1
Mild expletives
Revealing attire
Passionate kissing
Fighting
0
Inoffensive slang
No nudity
No sexual acts
No violence
You can set content ratings to any level for each of the four content areas. All content ratings are set to Level 0 by default. When Content Advisor is turned on and the PICS rating for a Web site exceeds the rating level you specify, Internet Explorer prevents users from accessing the site. Also, you can configure Internet Explorer to prevent or allow users to access unrated Web content. For more information, see "Configuring Content Advisor Settings" later in this chapter.

Other Rating Systems

Web site publishers can obtain PICS content ratings not only from ICRA but also from a number of other nonprofit and fee-based ratings services. Publishers can voluntarily add PICS ratings to their Web sites. You can also obtain independent PICS ratings from ratings bureaus. Ratings bureaus are typically fee-based and specialize in rating Internet sites. You can specify a ratings bureau other than ICRA that Internet Explorer can use to obtain PICS ratings. Because Internet Explorer must contact the ratings bureau to obtain the ratings, using other ratings bureaus might considerably slow your access to Web pages.
Note Internet Explorer supports only PICS-based ratings systems. You cannot import ratings systems that are based on standards other than PICS.

Supervisor Password

The first time you turn on Content Advisor, you must specify a supervisor password. This password allows administrators or supervisors to turn Content Advisor on or off and to change Content Advisor settings for users. With Internet Explorer 6, you can also add a hint to help you remember your password. Whenever the browser prompts you for your password, it also displays the hint.
In addition, you can configure Internet Explorer so that users can display restricted Web pages by typing the supervisor password. When users attempt to access restricted content, the Content Advisor dialog box prompts them to enter the supervisor password. For more information, see the following section, "Configuring Content Advisor Settings."

Configuring Content Advisor Settings

You can configure Content Advisor settings in several ways:
  • In Internet Explorer, you can use the Content tab in the Internet Options dialog box. 
  • You can use the Internet Explorer Customization Wizard to create custom browser packages that include preconfigured Content Advisor settings for your user groups. You can also lock down these settings to prevent users from changing them. 
  • After Internet Explorer has been deployed, you can use the IEAK Profile Manager to update Content Advisor settings through the automatic configuration feature of Internet Explorer. You can automatically push the updated information to each user's desktop computer, enabling you to manage security policy dynamically across all computers on the network. 

You can accept the default Content Advisor settings, or you can configure the settings based on the needs of your organization and its users. The options for configuring Content Advisor are the same whether you access them from Internet Explorer 6, the Internet Explorer Customization Wizard, or the IEAK Profile Manager. For more information about using the Internet Explorer Customization Wizard and IEAK Profile Manager, see "Running the Microsoft Internet Explorer Customization Wizard," and "Keeping Programs Updated" in this Resource Kit.
After you have enabled Content Advisor, you can use it to do the following:
  • Select content rating levels. 
  • Configure the list of approved and disapproved Web sites. 
  • Configure user options for content ratings. 
  • Change the supervisor password. 
  • Import new rating systems. 
  • Specify a different ratings bureau. 

To enable Content Advisor
  1. On the Tools menu, click Internet Options, and then click the Content tab. 
  2. In the Content Advisor area, click Enable. 
  3. In the Content Advisor dialog box, click OK
  4. In the Create Supervisor Password dialog box, type the password you want to use.

    Dd361897.ierk501(en-us,TechNet.10).gif 
  5. In the Confirm password box, type the same password again. 
  6. In the Hint text box, type a hint to help you remember your password. 

To select content rating levels
  1. On the Tools menu, click Internet Options, and then click the Content tab. 
  2. In the Content Advisor area, click Settings. 
  3. In the Password box, type your supervisor password, and then click OK
  4. On the Ratings tab, select the LanguageNuditySex, or Violence ratings category.

    Dd361897.ierk502(en-us,TechNet.10).gif 
  5. Drag the slider to the appropriate content level for the selected category.
    The default setting for each category is Level 0, which is the most restrictive setting. For more information about the ratings service, click More Info. For more information about ratings levels, see "Using Content Advisor" earlier in this chapter. 

To configure the list of approved and disapproved Web sites
  1. On the Tools menu, click Internet Options, and then click the Content tab. 
  2. In the Content Advisor area, click Settings. 
  3. In the Password box, type your supervisor password, and then click OK
  4. Click the Approved Sites tab.

    Dd361897.ierk503(en-us,TechNet.10).gif 
  5. Type the URL for each Web site that your users can view regardless of its rating level, and then click Always
  6. Type the URL for each Web site that your users can never view regardless of its rating level, and then click Never

Note If you want to delete an approved or disapproved Web site, click the URL in the list, and then click Remove.
To configure user options for content ratings
  1. On the Tools menu, click Internet Options, and then click the Content tab. 
  2. In the Content Advisor area, click Settings
  3. In the Password box, type your supervisor password, and then click OK
  4. Click the General tab. 
  5. In the User options area, select the settings you want.
    OptionDescription
    Users can see sites that have no rating 
    Select this option if you want users to be able to access Web pages that are not rated. 
    Supervisor can type a password to allow users to view restricted content 
    Select this option if you want users to be able to view restricted content after you type the supervisor password. 

    Dd361897.ierk504(en-us,TechNet.10).gif 

To change the supervisor password
  1. On the Tools menu, click Internet Options, and then click the Content tab. 
  2. In the Content Advisor area, click Settings
  3. In the Password box, type your supervisor password, and then click OK
  4. Click the General tab. 
  5. Click Change Password.

    Dd361897.ierk505(en-us,TechNet.10).gif 
  6. In the Old password box, type the current password to verify that you are authorized to change Content Advisor settings. 
  7. In the New password box, type the new password. 
  8. In the Confirm new password box, type the new password again. 
  9. Type a hint to help you remember your new password. 

To import new rating systems
Important If necessary, install ratings systems files, following the directions provided by the ratings service. Then proceed with the following steps.
  1. On the Tools menu, click Internet Options, and then click the Content tab. 
  2. In the Content Advisor area, click Settings. 
  3. In the Password box, type your supervisor password, and then click OK
  4. Click the General tab.

    Dd361897.ierk506(en-us,TechNet.10).gif 
  5. Click Rating Systems
  6. If the rating system you want to add is displayed on the list, click it, and then click Add.
    -Or- 
    If the rating system you want to add is not on the list, click OK, and then click Find Rating Systems

To specify a different ratings bureau
  1. On the Tools menu, click Internet Options, and then click the Content tab. 
  2. In the Content Advisor area, click Settings
  3. In the Password box, type your supervisor password, and then click OK
  4. Click the Advanced tab.

    Dd361897.ierk507(en-us,TechNet.10).gif 
  5. In the Ratings bureau box, type the name of the ratings bureau (other than RSAC) that Internet Explorer can use to obtain PICS ratings. 
  6. In the PICSRules area, click Import, and then type the name of the PICSRules (.prf) file used by the new ratings bureau. 
  7. Click Open.

How to Create a Folder from Selected Files in Windows



00_lead_image_files2folder_dialog
We’ve previously written about a tool that allows you to create a bunch of folders at one time from a list of words or phrases. However, what if you want to create one or more folders from a bunch of selected text files?
There’s a simple, free tool, called Files 2 Folder, that allows you to do that. Installing Files 2 Folder adds an option to the context menu for Windows Explorer. Simply extract the .zip file you downloaded (see the link at the end of this article). Right-click on the Files2Folder.exe file and select Run as administrator.
If the User Account Control dialog box displays, click Yes to continue.
NOTE: You may not see this dialog box, depending on your User Account Control settings.
A dialog box displays asking if you want to register the shell extension. Click Yes to continue.
A confirmation dialog box tells you that the Files 2 Folder menu option has been added to the context menu for Windows Explorer. Click OK to close the dialog box.
Once you’ve added the Files 2 Folder option to the context menu, a shortcut is added to the same folder containing the Files2Folder.exe file that allows you to unregister the shell extension, should you want to. Double-click the shortcut to do so.
A message displays that the shell extension was unregistered.
If you want to move one file to a new folder, right-click on that file and select the Files 2 Folder option from the popup menu.
A new folder is created with the same name as the file (without the extension) and the file is moved (not copied) into the folder.
If you select multiple files, right-click on them, and select Files 2 Folder, a dialog box displays, asking what you want to do. To move all the files to one new folder, select the Move all selected items into a subfolder named option and enter a name for the new folder in the edit box.
To move files to separate folders based on their names (not counting the extensions), select the second option, Move each file to individual subfolders based on their names.
To move a list of files with different file extensions to separate folders based on the extensions, select the third option, Move each file to subfolders based on their file extensions.
In all three cases, the files are automatically moved (not copied) into their respective folders.
The following image shows an example of choosing the first option and moving all selected files into a new folder with a name you specify.
You can also move folders into other folders. To move a folder into a new folder, right-click on the folder, and select Files 2 Folder from the popup menu. The folder is moved to a new folder that is named the same as the selected folder with a tilde (~) added to the end of the name.
Officially, Files 2 Folder supports only 32-bit versions of Windows XP, Vista, and Windows 7. However, we tested it on a Windows 7 Ultimate, 64-bit machine and it worked fine. Be sure to run the program as administrator in Windows 7, Vista, and Windows 8, otherwise the option is not added to the context menu.

Sunday, September 23, 2012

How To View & Cancel Pending Friend Requests In Facebook


We all know very well that Facebook is very cautious about spam, and they wont allow you to send friend requests continuously. First they will give you a simple alert, later a 7 days block for sending requests  further, again if you violate it ,Facebook will block you for 14 days.

I faced a situation where I had sent too many friend requests on Facebook and many were not accepted. I started getting warning message from Facebook as shown below.
blocked
Friend request blocked
Many of you might have had similar situation and worried about account getting blocked.
So you may want to remove your pending friend requests. A few days back it was possible to view pending friend requests on Facebook. But later  Facebook changed its interface it becomes impossible to view pending friends request directly. On ‘Edit Friends’, it was possible to view whom you have added but not yet confirmed or pending. But this list doesn’t show pending friends any more.
So what you do now to remove your unaccepted friend requests?
The solution is simple if you want to remove single or recent requests which you might remember whom you had sent.
You may try to remember each person’s name whom you sent a request then go to their profile and remove them from there. But what you do if you don’t remember each persons name separately?
There are two easy solutions for this problem – also for bulk cancelling of friend requests.
First Solution:
The most easiest one is a Facebook application name Pending Friend Requests. Just go to this link while you are logged in your Facebook account. Add this application to your account by clicking ‘Go To App‘.
Allow‘ the application to access your info. Then go to the application.
pending friend req appApp screen will show up like below. Here you can find all your pending requests using ‘bulk load’.
bulk loadOnce you click on bulk load, below screen appears.
pending friend req app1Just follow the steps 1,2,3 in above diagram.
You will reach to a new screen as show below.
cancel requestRemember one thing you may not be able to remove all requests together, but you can get a list of all users where request is pending. Clicking on ‘Cancel Request’ will take you to the respective friends home page, where you can manually unfriend him like this way.
Second Solution:
There is another method to do the same but you have to install Firefox ‘GreaseMonky’ addon and download a user script for this. Download the script from this link.
So you think are Done? Not yet.
One problem still remains. When you tried to send a request to someone it may still show that message as alert when that ‘someone’ logs in next time!!!
Solution is ‘Edit’ your Basic Information. Just change your gender or some info. If you are male change it to female, if female change it to male, according to the person whom you are sending request to. And don’t forget to hide your gender. Problem fixed and now you will be able to send request again.!!!


UPDATED:
The latest Facebook changes helps us to cancel the pending requests in an easy way(If request is not in bulk. Just go to the person whom you send request then cancel it directly as shown below.
cancel friend request

Tuesday, September 18, 2012

How to Reset Your Forgotten Windows Password the Easy Way


image[2]
Forgetting your password is never any fun, but luckily there’s a really easy way to reset the password. All you need is a copy of the Windows installation disk and one simple command line trick.

Resetting Your Forgotten Windows Password

Boot off the Windows disk and select the “Repair your computer” option from the lower left-hand corner.

Follow through until you get to the option to open the Command Prompt, which you’ll want to select.

First you’ll want to type in the following command to backup the original sticky keys file:
copy c:\windows\system32\sethc.exe c:\
Then you’ll copy the command prompt executable (cmd.exe) over top of the sticky keys executable:
copy c:\windows\system32\cmd.exe c:\windows\system32\sethc.exe

Now you can reboot the PC.

Resetting the Password

Once you get to the login screen, hit the Shift key 5 times, and you’ll see an administrator mode command prompt.

Now to reset the password—just type the following command, replacing the username and password with the combination you want:
net user geek MyNewPassword

That’s all there is to it. Now you can login.
Of course, you’ll probably want to put the original sethc.exe file back, which you can do by rebooting into the installation CD, opening the command prompt, and copying the c:\sethc.exe file back to c:\windows\system32\sethc.exe.

Recovery of window xp administrator password

See here for step by step instructions: http://support.microsoft.com/default.aspx?scid=KB;en-us;306214&


Can't Log On to Windows XP?
If that’s your only problem, then you probably have nothing to worry about. As long as you have your Windows XP CD, you can get back into your system using a simple but effective method made possible by a little known access hole in Windows XP.
This method is easy enough for newbies to follow – it doesn’t require using the Recovery Console or any complicated commands. And it’s free - I mention that because you can pay two hundred dollars for an emergency download of Winternals ERD with Locksmith which is a utility for unlocking lost Windows passwords. See here http://www.winternals.com/products/repairandrecovery/locksmith.asp
ERD is an excellent multi purpose product, but you should know it is not a necessary one if you have a healthy system and your sole problem is the inability to logon to Windows due to a forgotten password. Not necessary because you can easily change or wipe out your Administrator password for free during a Windows XP Repair. Here’s how with a step-by-step description of the initial Repair process included for newbie’s.
1. Place your Windows XP CD in your cd-rom and start your computer (it’s assumed here that your XP CD is bootable – as it should be - and that you have your bios set to boot from CD)
2. Keep your eye on the screen messages for booting to your cd Typically, it will be “Press any key to boot from cd”
3. Once you get in, the first screen will indicate that Setup is inspecting your system and loading files.

4. When you get to the Welcome to Setup screen, press ENTER to Setup Windows now
5. The Licensing Agreement comes next - Press F8 to accept it.
6. The next screen is the Setup screen which gives you the option to do a Repair.

It should read something like “If one of the following Windows XP installations is damaged, Setup can try to repair it”
Use the up and down arrow keys to select your XP installation (if you only have one, it should already be selected) and press R to begin the Repair process.
7. Let the Repair run. Setup will now check your disks and then start copying files which can take several minutes.
8. Shortly after the Copying Files stage, you will be required to reboot. (this will happen automatically – you will see a progress bar stating “Your computer will reboot in 15 seconds”
9. During the reboot, do not make the mistake of “pressing any key” to boot from the CD again! Setup will resume automatically with the standard billboard screens and you will notice Installing Windows is highlighted.
10. Keep your eye on the lower left hand side of the screen and when you see the Installing Devices progress bar, press SHIFT + F10. This is the security hole! A command console will now open up giving you the potential for wide access to your system.
11. At the prompt, type NUSRMGR.CPL and press Enter. Voila! You have just gained graphical access to your User Accounts in the Control Panel.
12. Now simply pick the account you need to change and remove or change your password as you prefer. If you want to log on without having to enter your new password, you can type control userpasswords2 at the prompt and choose to log on without being asked for password. After you’ve made your changes close the windows, exit the command box and continue on with the Repair (have your Product key handy).
13. Once the Repair is done, you will be able to log on with your new password (or without a password if you chose not to use one or if you chose not to be asked for a password). Your programs and personalized settings should remain intact.
I tested the above on Windows XP Pro with and without SP1 and also used this method in a real situation where someone could not remember their password and it worked like a charm to fix the problem. This security hole allows access to more than just user accounts. You can also access the Registry and Policy Editor, for example. And its gui access with mouse control. Of course, a Product Key will be needed to continue with the Repair after making the changes, but for anyone intent on gaining access to your system, this would be no problem.
And in case you are wondering, NO, you cannot cancel install after making the changes and expect to logon with your new password.
Cancelling will just result in Setup resuming at bootup and your changes will be lost.
Ok, now that your logon problem is fixed, you should make a point to prevent it from ever happening again by creating a Password Reset Disk. This is a floppy disk you can use in the event you ever forget your log on password. It allows you to set a new password.
Here's how to create one if your computer is NOT on a domain:
  • Go to the Control Panel and open up User Accounts.
  • Choose your account (under Pick An Account to Change) and under Related Tasks, click "Prevent a forgotten password".
  • This will initiate a wizard.
  • Click Next and then insert a blank formatted floppy disk into your A: drive.
  • Click Next and enter your logon password in the password box.
  • Click Next to begin the creation of your Password disk.
  • Once completed, label and save the disk to a safe place
How to Log on to your PC Using Your Password Reset Disk
Start your computer and at the logon screen, click your user name and leave the password box blank or just type in anything. This will bring up a Logon Failure box and you will then see the option to use your Password Reset disk to create a new password. Click it which will initiate the Password Reset wizard. Insert your password reset disk into your floppy drive and follow the wizard which will let you choose a new password to use for your account.
Note: If your computer is part of a domain, the procedure for creating a password disk is different.

Friday, August 10, 2012

How to Use the BCDEDIT Command Line Tool





INFORMATION
This will show you how to use BCDEDIT in the command prompt and avoid the need of third party applications like EasyBCD.


NOTE
Bcdedit is a really powerful tool that Windows Vista and Windows 7 uses to manage the boot loader entries.

BCDEDIT needs a boot loader file to boot your system.


A boot loader is a file that contains necessary information that instruct the system how to boot/start an operating system.
Windows 7 and Vista bootloader file is \bootmgr
Windows XP bootloader file is \ntldr
BCDEDIT can support other bootloaders too, like grub for linux. You just have to place the bootloader file on the root of the boot manager partition. e.g. \grldr and you have a grub boot loader enabled.

Bcdedit edits a file called bcd , which is located in Windows 7's hidden partition under \boot\bcd.
In Vista, its located under C:\boot\bcd.

WARNING
You must be logged on in an administrator account to be able to do this tutorial.

To Use bcdedit:

2. Type bcdedit and press enter.
NOTE: By typing just bcdedit you just list your boot entries.



EXAMPLE:

A boot entry consists of 4 main elements:
1. Identifier
The identifier is how the system has named the boot entry.

2. Device
The device is the drive or virtual image that the system will use to boot the boot entry.

3. Path
The path is the location on the device where the bootloader file is found.

4. Description
The description is the friendly name we give to our boot entry, e.g. "Windows 7"
You see next to the identifiers their UUIDs in {}. The UUID is the unique codename that the system gives to each boot entry and cannot be changed.

The standard identifier UUIDs are explained below:
{bootmgr} = the boot manager
{current} = the OS you selected to boot at startup.
{default} = the default OS selected to boot the PC.
{ntldr} = Windows Legacy OS Loader (for windows xp)
there are others like {memdiag} or {ramdisk} but they can't be of much use right now.

WARNING
IMPORTANT: make a backup of your bcd file first. To do that, type:

bcdedit /export C:\SAVEDBCD

This will create a file c:\savebcd which is your boot entry backup.
If you mess up, you can always undo changes by:

bcdedit /import c:\savedbcd

Now to see how we can control the above entries, here are some examples:
bcdedit /set {current} description "My edited Windows Boot Entry"
NOTE: This changes the title of the boot menu entry "{current}".

bcdedit /set {ntldr} device partition=E:
NOTE: This tells bcd that Windows XP partition is drive E:

bcdedit /set {ntldr} path \ntldr
NOTE: This tells bcd that the ntldr file which is the winxp bootloader is on root folder "\" (of drive e: as stated above)

bcdedit /displayorder {ntldr} /addfirst
NOTE: This places Windows XP as the first OS on the menu list.

bcdedit /default {ntldr}
NOTE: This places Windows XP as the default OS to boot first with.

bcdedit /displayorder {33342343-3424-2342342342-2344} /addlast

NOTE: This tells bcd that the boot entry with UUID 3334... should be the last entry on the menu.

You can copy your existing VISTA or Windows 7 boot entry to another identical. Then you can change settings on the new entry to experiment. You will always have the first entry available, so it's safe to play with.
bcdedit /copy {current} /d "New Windows 7 boot entry I just copied!"
this will give you a line:

NOTE: The entry was successfully copied to {4c21825f-e04b-11dd-b760-00195b61617a}. The {4c21825f-e04b-11dd-b760-00195b61617a} is the UUID of the new entry that the system just created. Yours will be different than mine! This is its identifier and you should use this to address that entry. Example:

bcdedit /set {4c21825f-e04b-11dd-b760-00195b61617a} numpoc 2

NOTE: This adds the 2 CPU Core support during boot, like you do in msconfig.

bcdedit /deletevalue {4c21825f-e04b-11dd-b760-00195b61617a} numproc
NOTE: This deletes the numproc parameter from entry {4c21825f....}

bcdedit /delete {4c21825f-e04b-11dd-b760-00195b61617a}

NOTE: This deletes the boot entry {4c21825f....} completely. In order to delete an {ntldr} entry, you must use the /f switch to force deletion: bcdedit /delete {ntldr} /f

You can always type just bcdedit to see your current settings.

What else can I do with BCDEDIT?

You can use BCDEDIT to alter any boot parameter , like you would in msconfig, only more. BCDEDIT works from booting with installation dvd too, so it can be handy for recovery purposes.
bcdedit /timeout 5

NOTE: This sets the wait-to-select-OS menu timeout at startup to 5 seconds . You will notice that I didn't give a UUID above. If you omit the UUID, it applies automatically to the relavant UUID. So: bcdedit /timeout 5 is identical to bcdedit /set {bootmgr} timeout 5
Some more advanced examples:
bcdedit /set {current} detecthal yes
bcdedit /set {current} detecthal no

NOTE: The above commands sets the detecthal to yes or no for entry {current}
To create a new boot entry to load Windows XP from a partition on your disk:

NOTE: The example below uses F: as the Windows XP partition. Replace with your xp drive letter.
bcdedit /create {ntldr} /d "Windows XP"

bcdedit /set {ntldr} device partition=F:

bcdedit /set {ntldr} path \ntldr

bcdedit /displayorder {ntldr} /addlast

NOTE:
Final note: BCDEDIT works from installation boot dvd too. If you mess up with a setting and you cannot boot, just boot from DVD and enter Repair Computer, then go to command prompt and there you go. You can play again with bcdedit to restore your system back.