Thursday, December 01, 2005

Getting the Most Out of Your RAM

The best way to improve system performance is to make better use of your RAM. Here are several hacks to show you how to try this before you buy more. No matter how much memory you have, you could always use more. Installing more RAM is generally the quickest way to better XP performance. But you can also speed up XP by making better use of the RAM you already have. In this hack, we'll look at how you can speed up your system performance by using your RAM more effectively.

Make Better Use of Your Memory with the Task Manager

it moves data and programs to a paging file on your hard disk, and your hard disk is slower than RAM. A certain amount of this is normal, but if you use a paging file too much, or if even your paging file can't handle the memory load, you'll run into system slowdowns and problems.

The Task Manager's Performance tab, provides the best way to monitor memory use. To run the Task Manager, press Ctrl-Alt-Delete, then click on the Performance tab. With it, you can interpret the information and make better use of your memory.

The charts relating to the Page File are self-explanatory; they show current usage, as well as usage over time. If you see that Page File use is frequently high, it means either that your system isn't making the most efficient use of RAM, or you need more RAM.

General Advice for Making Better Use of RAM

So, you've learned how to use the Task Manager. Here are some additional tips for making better use of your existing RAM:

  • Remove DLLs from cache memory. If you notice your system running slowly after XP has been running for some time, or if your RAM seems to be getting low for some reason, the culprit may be left-behind DLLs from programs that are no longer running, but that XP still keeps in memory. Sometimes XP keeps DLLs in cache memory even when the program that required them is no longer running, and this cuts down on the memory available to other applications.

    You can use a simple Registry hack to have XP automatically remove from cache memory DLLs that are no longer needed by programs. Run the Registry Editor and go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer. Create a new DWORD value named AlwaysUnloadDll, and give it a data value of 1. Exit the Registry and reboot for the new setting to take effect. Note that this setting may cause problems with some programs. Some Windows programs—especially older and 16-bit programs—may issue error messages with this setting in effect; so if that starts happening, delete the new key or give it a value of 0.

  • Reduce the number of colors. Using 32-bit color takes up a great deal more memory than 16-bit color, and it also puts a greater strain on your processor. If you primarily use business applications such as word processors and spreadsheets, you most likely won't notice a different between 16-bit and 32-bit color, so going with 16-bit color is a good bet. To change your color depth, right-click on the desktop, choose Properties > Settings, and in the Color Quality box choose 16 bit.

  • Avoid DOS applications. DOS applications don't allow XP to manage memory properly, and they hold onto the memory they use, not allowing it to be swapped out for use for other programs or processes. If you use any DOS applications, replace them with Windows versions.

  • Reduce the icons on your desktop. Every icon on your desktop uses up memory. Delete icons you don't use regularly. Run the Clean Desktop Wizard, which will automatically delete icons that you don't regularly use. Right-click on the Desktop and choose Properties > Desktop > Customize Desktop > Clean Desktop Now. A wizard will step you through the process of deleting unused icons. If you want the wizard to run every 60 days, check "Run Desktop Wizard every 60 days."

  • Reduce the applications and services running in the background. You may have many programs and services running in the background, without realizing it. Look at your Notification area, and see if there are any programs running that you don't require. Shut them down, and make sure that they don't load at startup. For example, if you don't use a wireless network card, you don't need the Wireless Zero Configuration service.

Wednesday, November 30, 2005

Track System Performance with the Performance Console

Before you can hack away at things to speed up your computer, you should know how to monitor system performance in the first place. As a power user, you'll like knowing what's causing those slow-downs and blips in performance. The Performance Console is a great hacker's tool for monitoring and tracking resources of all kinds. Computers get faster every year, but somehow we still end up sometimes waiting around for them to finish a task.

Reducing Visual Effects

Windows XP's visual effects—such as fading and sliding menus, background images for folders, and drop shadows for icon labels—make it the snazziest-looking operating system that Microsoft has yet produced. But all those effects can take their toll on system performance, especially if you have an older computer.

XP gives you the option of balancing these visual effects against system performance. You can go full-bore and use all the visual effects, you can turn them all off, you can have your system decide which to use, or you can pick and choose which effects to turn on and off. Right-click on My Computer and choose Properties > Advanced > Settings (under the Performance section). To turn off all effects, choose "Adjust for best performance." To use all visual effects, choose "Adjust for best appearance." To turn on and off individual effects, choose Custom, then check the effects you want to use and uncheck the ones you don't. Experiment to see how they affect system performance.

To figure out what's slowing your computer down and get to the root of the problem, use the Performance Console (perfmon) to track and graph the activities of Windows XP and its components. First, I'll show you how to set up a log, and then I'll give you some ways to put the console logs to good use.

Setting Up Your Logs

Choose Start > Run and type perfmon. You'll see the Microsoft Management Console (MMC), with the Performance titlebar. In the left pane, click System Monitor to see a graph of your current system performance, including your processor, memory, and disk. You can use the toolbar buttons to configure the graph data and format. This graph is useful for seeing what's going on now, but it's useless for looking at the long-term picture.

To create log files of your system's performance, click Performance Logs and Alerts in the left pane of the MMC. You can create counter logs (with the values of performance indicators, measured on a regular basis), trace logs (with the values of performance indicators when something happens, such as a program crash), and alerts (an action for Windows to take when a counter hits a specified value). Log files stored in text format contain one line per observation, with values separated by either commas or tabs, and are usually stored in the C:\Perflogs folder. You can import these log files into a spreadsheet or database for analysis, reporting, and graphing. SQL and binary (nontext) log file formats are also available. (See article Q296222 in the Microsoft KnowledgeBase for how to log data directly to an SQL database.)

Create a counter log by right-clicking Counter Logs in the left pane and choosing New Log Settings from the shortcut menu. Specify the statistics you want to log by clicking Add Counters on the General tab of the Properties sheet for the log. A nice feature of this utility is that you can choose whether to monitor the local computer or another computer on your LAN. Don't add more than a few counters, or your log file will grow quickly and be confusing to analyze. To select a counter, first select the performance object (i.e., the part of the computer system you want to monitor, such as memory or disks), and then choose counters from the list.

What to watch

These counters are often worth logging:

\Memory\Pages\sec

Number of pages read from disk or written to disk when Windows runs out of memory. Swapping information to and from the disk can slow down your system significantly. Consider adding more memory.

PhysicalDisk\Avg. Disk Queue Length

Number of read and write requests are waiting for the disk to respond. High numbers indicate that a faster disk drive would speed up performance.

PhysicalDisk\% Disk Time

Percentage of the time the disk was busy. This is another indicator of a slow or overloaded disk.

Processor\% Processor Time

Percentage of the time the processor was busy with all types of processes. This counter can tell you whether delays are caused by an overloaded CPU.

Wednesday, November 16, 2005

Graphics Hacks

Image Conversion

When you need to convert images from one format to another, or need to shrink the size of existing images, try these two graphics tools.


IrfanView

For most image-conversion chores, I turn to the free program IrfanView (http://www.irfanview.com), which is named after its creator, Irfan Skiljan. It lets you convert individual images or batches of images at a time, handles a wide variety of formats, and gives you a great deal of control over the conversion. For example, when converting to a JPEG, you can set the image quality, whether to save as color or grayscale, and whether to save it as a progressive graphic—one that gradually paints on the screen as it downloads over the Web.

To do a batch conversion, after you run the program, choose File > Batch Conversion, browse to the directory that has the files you want to convert, and select them. Choose the output format and any options you want to apply to the files. For example, for a certain project I needed to convert a group of large graphics in TIFF format to JPEG format, and the resulting files had to be very small, grayscale, and in progressive format.

IrfanView does much more than image conversion. I use it as my all-purpose file viewer, for example. It also works with scanners to bring images into your PC, and it includes basic image-editing tools.


ImageConverter .EXE

One thing that IrfanView can't do is display before-and-after pictures of the graphic you're converting. For example, you can't preview what the converted picture will look like after it is converted. This can make image conversion a hit-or-miss affair: you'll first have to choose your conversion options, then convert the image, and then finally look at the output. If you're not happy with the results, you have to start back at the beginning, choose different options, and hope this one works.

ImageConverter .EXE (http://www.stintercorp.com/genx/imageconverter.php) shows you a side-by-side comparison of the before-and-after images, before you do the actual conversion. It also shows you the size of each image. That way, before you do the conversion, you can keep tweaking it until you have the size and quality you want.




Problem-Free CD Burning

XP lets you easily record digital music to your PC and burn music CDs. Here's how to make sure your digital music doesn't skip, pop, crackle, and hiss, as well as other advice on CD burning.

Windows Media Player lets you burn CDs, as well as "rip" digital music from CDs and put them on your hard disk; but, as anyone who has ever burned and ripped music knows, the process is never problem-free. When you rip music, you may find that your digital music files skip and pop. And when you burn CDs, you may find that those CDs skip and have similar problems as well.

I've had many problems like that myself, particularly when copying opera CDs, which, as you'll see later in this hack, suffer from a nagging problem that causes most copied CDs to skip at least several times per CD.

What to Do if Your Digital Music Files Skip and Pop

When you rip music from CDs or old LPs, you may find that the digital music you rip to your PC skips and pops. There can be many causes for skipping and popping, so this section provides a number of ways to fix a variety of problems.

Cleaning up .wav files

If you're recording from old LPs, the problem most likely isn't your computer. You're probably recording the music faithfully, but the vinyl on the LP has been damaged, so the resulting digital music suffers from skips and pops. You can solve the problem by cleaning up the skips and pops using downloadable software.

WAVClean (http://www.excla.com/WAVclean/English) and WaveCorrector (http://www.wavecor.co.uk) will both eliminate pops, skips, crackles, hisses, and similar noises from music you record from old LPs. Both programs require a several-step process. First, record the digital music using Windows Media Player or similar ripping software. You'll have to record in .wav format, because that's the only format these programs handle. Next, clean up the .wav files with one of the programs. Which one you use depends on whether you want to automate the cleanup or take a hands-on approach, and on how bad the problems are that you want to correct. WAVClean is the more automated of the two; load the .wav file, select Scrub, and choose from basic settings, and it eliminates hisses and crackles. It won't, however, clean up deeper scratches, so it's best for recordings that suffer from just hissing and crackling. With WaveCorrector, on the other hand, you see an actual oscilloscope view of the music files, with pops and similar problems highlighted in blue. You can either have the program make the edits to the file itself, or you can preview the edits and do the correcting yourself. WaveCorrector also includes a recording feature, so that you don't have to use Media Player or other ripping software, such as MusicMatch Jukebox (http://musicmatch.com). Once you've cleaned up the music, you can either convert it to .mp3 or .wma digital music to save on your hard disk using MusicMatch Jukebox, or you can burn directly from a .wav file to a CD using Windows Media Player, MusicMatch Jukebox, or similar software.

Other advice for reducing skips and pops

If you've recorded the digital music from a CD rather than an LP, the problem may be dirt and grime on the original CD, and physically cleaning it may solve the problem. Wipe the bottom of the CD clean. The bottom of the CD may be scratched, and that can cause problems as well. In that case, you can try some of the CD-cleaning devices sold at music stores and computer stores.

If you have a very old CD drive, the drive itself may be a problem. With some older, slower drives, when you rip music, you'll frequently get skips. If that's your problem, the only solution will be to buy a newer drive.


What to Do If Your Burned Music CDs Skip


On occasion, your source and the digital music files will be free of skips, but when you burn a CD, the resulting CD skips. Sometimes, if you slow down the speed that you burn to a CD, you'll solve the problem. Most burning software will let you adjust your burning speed. In Windows Media Player, choose Tools > Options > Devices and highlight your CD drive. Then, click on Properties and choose the Recording tab. From the "Select a write speed" drop-down box, choose a slower speed than Fastest. Also, close all other programs when you're burning a CD, so that CPU, RAM, and system resources are all devoted to CD burning.

If that doesn't solve the problem, try using analog rather than digital CD writing. Choose Tools > Options > Devices, highlight the CD drive that you want to use analog playback, click on Properties, and go to the Audio tab. From the Copy section, choose Analog. If that still doesn't work, go back to the same tab and choose "Use error correction." This will slow down the CD burning process even further, but it may solve the problem.

More Registry Hacks

Menu Speed

When XP first appeared, there was a lot of conversation about the new interface, both good andad. In spite of the initial complaints, most users stick with the default settings rather than reverting to the Classic interface found in previous Windows versions. But you may want to change the delay you notice when you click on the Start Menu. I see no reason for there to be any delay when I click on the Start Menu. Effects are pretty, but I wouldn't click on it if I didn't have business inside, so let's get it open and get moving. The default speed can be adjusted with a quick Registry hack.

Go to the Registry key HKEY_CURRENT_USER\Control Panel\Desktop\MenuShowDelay. The default value is 400. Set it to 0 to remove the delay completely, but if you do that it will be nearly impossible to move the mouse fast enough not to activate All Programs if you mouse over it en route to your final selection. Pick a number that suits your style, make the change, then test it until you find a good compromise between speed and usability.

Place Windows Kernel into RAM

It's a given that anything that runs in RAM will be faster than an item that has to access the hard drive and virtual memory. Rather than have the kernel that is the foundation of XP using the slower Paging Executive functions, use this hack to create and set the DisablePagingExecutive DWORD to a value of 1.

Edit the Registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ Session Manager\Memory Management\DisablePagingExecutive to 1 to disable paging and have the kernel run in RAM (set the value to 0 to undo this hack). Exit the Registry and reboot. Perform this hack only if the system has 256 MB or more of installed RAM!

Disable 8.3 Name Creation in NTFS

Files that use the 8.3 naming convention can degrade NTFS drive performance. Unless you have a good reason for keeping the 8.3 naming convention intact (such as if you're using 16-bit programs), a performance gain can be achieved by disabling it:

Set the Registry DWORD key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ FileSystem\NtfsDisable8dot3NameCreation to 1. Exit the Registry and reboot.


Tuesday, November 15, 2005

Backup Registry

The Registry is unforgiving; once you make a change to it, that change is permanent. There is no undo function. To get the Registry back to the way you want it, you'll have to reedit it and remember the often arcane and complicated changes that you made—if you can. And, unlike most other Windows applications, the Registry Editor doesn't ask you whether you want to save your changes. Make the change, and it's done.

Because of this, you should take precautions to keep your Registry safe and ensure that you can restore it to its previous safe settings whenever you want to. The best way to do that is to back up your Registry before you edit it. You should make copies of your Registry not only to protect against accidentally doing damage while you're editing it, but also to ensure that you can restore your system in the event of a system crash.

Here are the best ways to back up your Registry:

System Restore

One of the simplest ways to back up and restore the Registry is by using System Restore. System Restore creates a snapshot of your entire system, including the Registry, and lets you revert your system to that snapshot. To use System Restore, before editing the Registry choose Start > Control Panel > Performance and Maintenance > System Restore and then follow the wizard to create a restore point. If after you edit the Registry you want to restore it to its preedited state, use the same wizard to do so.


Backup utility

You can also use Windows Backup utility to back up and restore the Registry. Run the Backup utility by choosing Start > All Programs > Accessories > System Tools > Backup. If you use the Backup Wizard, when you get to the "What to Back Up" screen, choose "Only back up the System State data." Then, follow the Wizard's directions. It will back up the Registry as well as other system files, including boot files used to boot XP.

If you don't use the Backup Wizard, click on the Backup tab in the Backup utility, check the box next to System State, and then click on Start Backup. When you want to restore your system, run the Backup utility. Click Restore and Manage Media > Start Restore.

Registry Editor

You can also use the Registry Editor to back up the Registry. This is probably the easiest way to back up the Registry, but it won't back up two Registry keys: the SAM and Security keys that control password policies, user rights, and related information. Unless you have a complex system with many users, though, these keys are not absolutely vital.

Run the Registry Editor by typing Regedit in the Run box or a command prompt and pressing Enter. Highlight My Computer. If you highlight an individual Registry hive instead, only that hive will be backed up. Next, choose File > Export.


To restore the Registry, run the Registry Editor, choose File > Import, and then import the file.

Hacking through Registry

Automatically Close Programs at Shutdown

When you shut down Windows, if you have any programs running you'll get a message box warning you that a program is still running. You then have to close the program and tell XP again to shut down. It's a fairly pointless warning—better yet would be if XP automatically killed the programs without issuing the warning. That way, you wouldn't get error messages and wouldn't have to close each individual application before shutting down your computer.

To have XP automatically close programs at shutdown, run the Registry Editor and go to HKEY_CURRENT_USER\Control Panel\Desktop. Edit the AutoEndTasks key so that is has a value of 1. If the key doesn't exist, create it as a DWORD value and give it the value of 1. To disable it, either delete the key, or set the value to 0.

Disable XP Shutdown

There may be times when you want to make sure that XP can't be inadvertently shut down. You can use a Registry hack to disable the normal Shut Down. Run the Registry Editor and go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer. Create a new DWORD value named NoClose with a data value of 1. Exit the Registry and reboot in order for the change to take effect. You won't be able to shut down Windows in the normal manner from now on; you'll have to run Task Manager by pressing Ctrl-Alt-Delete or right-clicking on the Toolbar, choosing Task Manager, and then using the Task Manager's Shut Down menu to close Windows. If you want to reenable normal shutdowns, delete the NoClose value.

Change the Names of the Registered User and Company

When you install XP or when it comes factory-fresh on a PC, a username and company name are entered as the owner of the system. And that's the way it stays, like it or not. But a Registry hack will let you change both. Run the Registry Editor, go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion, and look for the values RegisteredOwner and RegisteredOrganization. Edit their value data to whatever username and company name you want.

Change the Amount of Time Before Programs Time Out

When an application hangs and no longer responds, XP displays a dialog box that prompts you to kill the application or wait a while longer. By default, the dialog box appears after the application hasn't responded for five seconds.

This can cause problems. For example, if a program is doing heavy-duty calculations in the background, it won't respond until the calculation is done, so the operating system will report that the application is hung, even though it isn't. You can use a Registry hack to increase or decrease the amount of time it takes before XP reports that the program has hung.

Run the Registry Editor and go to HKEY_CURRENT_USER\Control Panel\Desktop. Select the HungAppTimeout entry and edit it to input a new value, in milliseconds. The default is 5000. Exit the Registry. You may need to reboot for the new setting to take effect. Try increasing the number in increments of 1,000 until you find a number that works.

Disable the Disk Cleanup Warning

If your hard disk has what XP decides is too little space left on it, the operating system will pop up a warning and recommend that you run Disk Cleanup. But you may be like me and not want a virtual nanny nagging you to clean up your mess. You can turn off the warning with a Registry hack. Run the Registry Editor and go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer. Create a DWORD value called NoLowDiskSpaceChecks and give it a value of 1. Exit the Registry and reboot. You can also do this by using TweakUI

Change the Default Location for Installing Programs

XP uses the C:\Program Files directory as the default base directory into which new programs are installed. However, you can change the default installation drive and/or directory by using a Registry hack. Run the Registry Editor and go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion. Look for the value named ProgramFilesDir. By default, the value will be C:\Program Files. Edit the value to any valid drive or folder; XP will use that new location as the default installation directory for new programs.


Sunday, November 13, 2005

Explaining Registry

When it comes to hacking XP, no other tool comes close to the Registry. It contains the underlying organization of the entire operating system, and its often-incomprehensible settings hold the key to countless hacks. In simpler days, one could hack Windows without bothering with the Registry; a solid knowledge of things like .ini files would suffice. But no longer. If you want to get hacking, the Registry holds the key—literally, since it's organized by way of keys.

If you haven't spent much time in the Registry, you can easily be cowed by it. At first glance, it's a maze of apparently incomprehensible settings. In fact, though, there's a method to the madness. The Registry is a hierarchical database of information that defines exactly how your system works, including virtually every part of XP and its applications. Editing the Registry database is often the best way to hack XP. In fact, there are many changes to the operating system that you can make in no other way.

Even if you've never used the Registry directly before, you've changed it without realizing it. Whenever you change a setting using the Control Panel, for example, behind the scenes a Registry change is made that puts that new setting into effect. The menus and dialog boxes you see in XP are often little more than a visual front-end to the Registry.

If you want to optimize XP and master every part of it, you'll have to use the Registry. XP contains so many different settings and customizations that it simply wasn't possible for Microsoft to build a graphical interface for every conceivable possibility. And there are many times when it's easier and you get more options when you edit the Registry rather than using the graphical XP interface. You can use Windows XP without ever editing the Registry—many users do—but advanced users understand its power tool status.

The way to edit the Registry is by using the Registry Editor , also called RegEdit. To run it, type regedit at the Run box or command line and press Enter.

Five Logical Registry Hives not wives

Following are the five hives and what each does:

HKEY_CLASSES_ROOT

This hive contains information about file types, filename extensions, and similar information. It instructs XP how to handle every different file type and controls basic user interface options, such as double-clicking and context menus. This hive also includes class definitions (hence the word "CLASSES" in its name) of unique objects, such as file types or OLE objects. Frequently, classes associated with file types contain the Shell subkey, which defines actions, such as opening and printing, that can be taken with that file type.

HKEY_CURRENT_USER

This hive contains configuration information about the system setup of the user that is currently logged into XP. It controls the current user's Desktop, as well as XP's specific appearance and behavior for the current user. This hive also manages network connections and connections to devices such as printers, personal preferences such as screen colors, as well as security rights. Also included in this hive are Security Identifiers (SIDs), which uniquely identify users of the PC and which have information about each user's rights, settings, and preferences.

HKEY_LOCAL_MACHINE

This hive contains information about the computer itself, as well as about the operating system. It includes specific details about all hardware, including keyboard, printer ports, storage—the entire hardware setup. In addition, it has information about security, installed software, system startup, drivers, services, and the machine's specific XP configuration.

HKEY_USERS

This hive contains information about every user profile on the system.

HKEY_CURRENT_CONFIG

This hive contains information about the current hardware configuration of the system, in the same way that HKEY_CURRENT_USER contains information about the current user of the system.

Saturday, November 12, 2005

Surf Anonymously Without a Trace

Whenever you surf the Web, you leave yourself open to being snooped upon by web sites. They can track your online travels, know what operating system and browser you're running, find out your machine name, peer into your clipboard, uncover the last sites you've visited, examine your history list, delve into your cache, examine your IP address and use that to learn basic information about you such as your geographic location, and more. To a great extent, your Internet life is an open book when you visit.

Don't believe me? Head to http://www.anonymizer.com/snoop/test_ip.shtml. This page, run by the Anonymizer.com web service, tells you what your IP address and machine name are. And that's just a start. Click on the links on the left side, such as "Exposed Clipboard" and "Geographical Location." You'll see just a small sampling of what web sites can learn about you.

Much of the reason why web sites can find out this information about you is due to the trusting nature of the Internet's infrastructure and is inherent in the open client/server relationship between your web browser and the servers on the sites you visit. But a lot of it also has to do with the ability to match up information from your PC to information in publicly available databases—for example, databases that have information about IP addresses.

The best way to make sure web sites can't gather personal information about you and your computer is to surf anonymously; use an anonymous proxy server to sit between you and the web sites you visit. When you use an anonymous proxy server, your browser doesn't contact a web site directly. Instead, it tells a proxy server which web site you want to visit. The proxy server then contacts the web site, and when you get the web site's page you don't get it directly from the site. Instead, it's delivered to you by the proxy server. In that way, your browser never directly contacts the web server whose site you want to view. The web site sees the IP address of the proxy server, not your PC's IP address. It can't read your cookies, see your history list, or examine your clipboard and cache, because your PC is never in direct contact with it. You're able to surf anonymously, without a trace.

There are two primary ways to use anonymous proxy servers. You can run client software on your PC, which does the work of contacting the server for you, or you can instead visit a web site, which then does the work of contacting the server.

Web Based Anonymizer

If you don't want to go to the hassle of installing a client—and if you don't want to pay for software—to surf anonymously, go to Anonymizer.com (http://www.anonymizer.com). In the box near the top of the page, type the name of the site to which you want to surf, and you'll head there anonymously. The proxy server will grab the page for you, and you'll get the page from the proxy server. You can also download a free version that runs as a toolbar in Internet Explorer. Surf as you would normally, and you'll visit those web sites directly. When you want to visit a site anonymously, click on a button and the anonymous proxy server will do the work for you.

A fuller version of the program is available on a subscription basis for $29.95 per year or $9.95 for three months. It blocks banner ads, stops pop ups, encrypts the URLs you type so that they can't be read by your ISP or network administrator, and adds a few other features as well. I don't find the extra features worth the money, but if these kinds of things are important to you, go ahead and spend the money.

Software Based

If you prefer to install software, get Steganos Internet Anonym (http://www.steganos.com/en/sia). In addition to anonymous proxy serving, it kills pop ups and manages cookies. You can try it for free, but if you want to keep it you'll have to pay $29.95.

Speed Downloads

No matter how fast your Internet connection is, it's not fast enough. Whether it's a pokey dial-up or a broadband connection, you always have complaints and you always have a greater need for speed.

This is particularly true when you're downloading files, especially large ones. While there may be no way to physically change your connection speed, you can get the free download accelerator Flashget program (http://www.flashget.com) to speed up your downloads significantly, whether via FTP or HTTP.

It also sets up a multiconnection download, downloading portions of the file from multiple fast servers simultaneously and then reassembling the file when all the pieces are on your PC. This makes the most efficient use of your available bandwidth, because normally there are pauses and hesitations when you download, and if you're downloading with multiple connections there will be fewer of those pauses.

The program also resumes broken downloads; if for some reason your connection is broken, it'll pick up where you left off when you next connect to the Internet. It'll schedule downloads for you as well. For example, you can schedule downloads to take place overnight, when you're away from your computer and also have a Site Explorer which is very good utility for surfing ftp connections because u have noticed in Windows IE hangs sometime on dialup connections but this not.

Flashget is free, but the free version delivers ads inside the program, so its on you if you like it then buy it.

IE with Group Policy Editor

XP Professional owners have a reason to feel good about spending the extra $100 or so they forked over for their version of the operating system: the Group Policy Editor, available only in Professional, can make all kinds of secret tweaks to Internet Explorer. This tool, primarily used for setting network and multiuser policies and rights, can also be used to customize the way XP and Internet Explorer look and work. It makes it easy to customize many different aspects of Internet Explorer's behavior and appearance from one central place, without having to edit the Registry or delve deep into menus, dialog boxes, and options. You can customize how Internet Explorer looks and works for each individual account on the machine, or just for a single account if there is only one.

That means that you'll be able to create customized versions of IE for a variety of different purposes. For example, you can create customized browsers for your children, or for a business if you run or administer a small business.

Run the Group Policy Editor by typing gpedit.msc at a command line or the Run box and pressing Enter. When it opens, go to User Configuration\Windows Settings\Internet Explorer Maintenance. There are five categories of Internet Explorer settings you can modify:

  • Browser User Interface

  • Connection

  • URLs

  • Security

  • Programs

To change individual settings, browse to any of the categories, then from the right pane choose the setting you want to configure—for example, to change the browser title. Double-click on the setting, then fill out the dialog box. There are quite a few settings you can change with the Group Policy Editor. Next, we'll take a look at what the best of each of these categories can do.

Browser User Interface

As the name implies, this section lets you customize Internet Explorer's interface. This section, as a whole, lets you create your own customized version of Internet Explorer. For example, you can create a version of IE specifically for one of your children—take a digital photo of her and use it as the background for the toolbar, crop a headshot photo of your child and use it as the animated custom logo, and change the browser title to put her name on it. There are three types of tweaks you can make in this section:

Browser Title

This option lets you customize Internet Explorer's titlebar text, though only to a limited degree; you can add your name or company's name to a text string of "Microsoft Internet Explorer provided by." For example, you can have the titlebar read "Microsoft Explorer provided by Preston Gralla." When you do this, Outlook Express will have the same title as well. Because you need to have that initial text string, this isn't a great hack unless you're a computer manufacturer and want to brand the browser.

Custom Logo

This setting lets you replace Internet Explorer's static and animated logo with logos of your own. Note that to do this, you'll first have to create the logos yourself. It's easier to use the Group Policy Editor to change your logo than to use the Registry.

Browser Toolbar Customizations

You can use your own bitmap as the background to the Internet Explorer toolbar. Additionally, you can delete the existing toolbar buttons and add buttons of your own. You don't have to worry if the bitmap you want to use is not the same size as the toolbar. XP will accommodate it—for example, by tiling a graphic that is smaller than the toolbar so that it appears multiple times.

Connection

This section lets you customize Internet Explorer's connection settings, which you would otherwise have to go to several places to set.

Connection Settings

This lets you customize your existing Internet connection settings and import them for another use on the PC. It doesn't have any use if you're the only user of the machine; it's intended to help you set up other accounts' connection settings. If you have a network at home, for example, you could copy the settings from one machine to every other machine on the network.

Automatic Browser Configuration

This is purely an administrator's tool. It lets you automatically change browser configurations on users' machines.

Proxy Settings

This lets you tell Internet Explorer to use proxy servers. You can also set up proxy servers from within Internet Explorer. For more details on setting up proxy servers.

User Agent String

This lets you customize the user agent string that is sent to web sites whenever you visit them. The user agent string gives out basic information about your operating system and browser to the web site so that the site can better track usage statistics. Using this setting lets you append a specific text string to your PC's user agent string.


URL's

This section is mainly for administrators, so if you don't need administrative tools you can pretty much forgo it. If you are an administrator, it will let you specify IE settings for multiple machines, such as setting a home page for all, specifying a URL they will go to when Help is chosen, and populating their Favorites with those of your choice. If you run a small business, you can use these settings to build a business-specific browser for all of your employees. For example, set the home page to be your company's home page or populate Favorites with Intranet pages or other pages your employees need to access regularly, such as benefits information.

Favorites and Links

This lets you create a Favorites folder and links, or import them. It's primarily an administrator's tool, since it doesn't add much extra functionality to the normal way that you can manage Favorites.

Important URLs

You can specify the starting page, create your own customized Search bar, and create a Help page that will display when someone clicks on Help > Online Support. Again, this is primarily an administrator's tool.

Security

Here's where to set Internet Explorer security settings. You can change these settings from directly within Internet Explorer just as easily as changing them here, unless you need to change the settings for several accounts, in which case here's the place to go.

Security Zones and Content Rating

You can customize both security zones and content ratings, which limit sites with objectionable content from being visited. This is primarily an administrator's tool, since these settings can be edited easily from inside Internet Explorer by choosing Tools > Internet Options > Security and Tools > Internet Options > Content. But it's ideal for parents who have networks at home and want to customize different security settings for their children's computers. You can set a higher level of security for children's computers and a lower level for parents' PCs.

Authenticode Settings

This lets you designate specific credential agencies and software publishers as trustworthy. This is primarily an administrator's tool, since these settings can be edited easily from inside Internet Explorer by choosing Tools > Internet Options > Security and Tools > Internet Options > Content > Certificates.

Programs

Once again, this section is mainly for administrators. It lets you change default programs for multiple machines. So, for users who require only a simple email program, you can set the default to be Outlook Express. For other users, you can set it as Outlook or a third-party email program.

Programs

This lets you change the default programs to be used for purposes such as email, HTML editing, and others. This is primarily an administrator's tool, since these settings can be edited easily by choosing Tools > Internet Options > Security and Tools > Internet Options > Programs.


Delete Cookies and Temporary Files

Cookies are small text files that web sites put on your hard disk to personalize the site for you or to track and then record your activities on the site. Cookies have gotten a lot of press—most of it bad—but the truth is, not all cookie use is bad. As a means of site customization, they're a great way of helping you get the most out of the Web. They can also carry information about log-in names and passwords, which is a time-saver, since you won't have to log into each site every time you visit. If you delete all your cookies, you won't automatically get your Amazon wish list the next time you visit their site.

But cookies can also be used to track your online activities and identify you. Information about you, based on what cookies gather, can be put in a database, and profiles of you and your surfing habits can be created.

Because cookies can be privacy-invaders, XP gives you a number of ways to restrict how web sites place and use cookies on your PC. To understand how to restrict the ways cookies are used on your PC, you first need to understand three cookie-related terms:

First-party cookie

A cookie created by the site you're currently visiting. These cookies are often used by sites to let you log on automatically—without having to type in your username and password—and customize how you use the site. Typically, these kinds of cookies are not invasive.

Third-party cookie

A cookie created by a site other than the one you're currently visiting. Frequently, third-party cookies are used by advertisers or advertising networks. Some people (including me) consider these kinds of cookies invasive.

Compact privacy statement

A publicly posted policy that describes the details of how cookies are used on a site—for example, detailing the purpose of cookies, how they're used, their source, and how long they will stay on your PC. (Some cookies are automatically deleted when you leave a web site, while others stay valid until a specified date.)

To protect your privacy, you also need to know the difference between implicit consent and explicit consent. Explicit consent means that you have specifically told a site that it can use personally identifiable information about you. It's the same as opting in. Implicit consent means that you haven't specifically told a site not to use personally identifiable information. It's the same as not having opted out, or specifically requesting to be taken off a list.

Internet Explorer lets you customize how it handles cookies. You can choose from six levels of privacy settings, from Accept All Cookies to Block All Cookies. When choosing, keep in mind that some sites won't function well or at all at the higher privacy settings, particularly if you choose to reject all cookies. I generally find that Medium High is a good compromise between protecting privacy and still being able to personalize web sites.

To customize your cookie settings in Internet Explorer, choose Tools > Internet Options > Privacy. Move the slider to your desired level.

Oh..I forget to talk about Temporary files, these are those files which store in your system when you surf the web. And fastly load those website files from the cache, those are not change from the last time you visit the page. But if you clear the cache through any Third Party Software or through IE Windows > Options then you will not load the site as fast as possible. Then you will ask why we use any software, when cleaning possible through IE and why need to delete the files?

The answer is simple, when the files not deleted from long time then the webpages start loading slowly and may be IE also crashed, loading of webpages is mostly noticeable to dial-up users. So, delete the files atleast weekly. And you require a software because there are many different types of temporary files and collect in different locations, and if you done something wrong through your system like hacking any site or surfing adult content and you want that nobody knows about that so best way to delete those, use any good software. I like to mention that if you have done any illegal stuff then no one can save you but cleaning through these software little reduce your chances of caughting. And the best software i think for deleting cookies, temporary files and remove traces of illegal stuff is http://www.webroot.com because this also supports overwrite cleaning called Bleach.

Stop Pop-ups, Spyware

Surfing the Web used to be such as simple, enjoyable experience. Go to the web site of your choice, enjoy the page, and head somewhere else.

No longer. At times, it now seems like a sleazy carnival midway, complete with flashing lights and loud music, barkers pleading at you to venture into the sideshows, scamsters promising you big payoffs if you try three-card monte, and no-goodniks lurking in the shadows.

For that, we have pop ups, spyware, and web bugs to thank. Pop ups are ads that, as the name implies, pop up over your browser, usually in a smaller window, and frequently contain flashing messages and other kinds of obnoxious come-ons. The infamous X.10 surveillance camera pioneered this insufferable form of advertising, and now it's everywhere.

Spyware is software that piggybacks onto your hard disk on the backs of other pieces of software, reports on your activities to ad servers, and then delivers ads to you based on what sites you visit. There's typically no way to know offhand that spyware has been installed on your system, because it lurks invisibly—hence the name. Even after you uninstall the program upon which it piggybacked, it could remain on your PC, reporting on your activities.

You don't have to be victimized, though. As you'll see in the rest of this hack, there are things you can do to keep your PC from resembling a virtual midway.

Spyware

Spyware has become increasingly controversial and increasingly popular, as developers of free software struggle to find a way to support themselves. Of late, spyware has been getting increasingly intrusive; some people call these more aggressive programs scumware. Scumware may change your default home page without telling you, or may even intervene when you're making a purchase online and redirect you to a different site.

There are several ways to protect yourself against spyware:

  • Be vigilant about what you download. Ad-supported programs may include spyware, though not all do. Check out the " Index of Known Spyware" page run by Gibson Research at http://grc.com/oo/spyware.htm for a list of spyware programs. The only problem with that site is that it lists only the spyware components, and it's difficult to find out their names. A better bet is http://www.spychecker.com, which lets you type in the name of a program you downloaded and then tells you whether spyware piggybacks onto it.

  • Use a personal firewall like ZoneAlarm. A personal firewall will let you block any program on your system from contacting the Internet without your approval, so you can use it to block spyware. XP's Internet Connection Firewall doesn't have this capability, so you can't use it to block spyware.

  • Get a spyware detector and eradicator. My favorite and the most popular is Ad-Aware, available for free from http://www.lavasoft.com. It does a thorough check of your system for spyware, finding not only program files, but also Registry entries and cookies. After it does a check, you can choose which of the spyware problems you want the program to fix, and it'll go about its work, deleting files, folders, and cookies, and fixing Registry entries. If you use file-sharing software, I highly recommend running Ad-Aware; many of these applications include spyware.

Pop ups

There are many for-pay pop-up killers, but if you don't want to spend the cash, you can get an excellent one for free: EMS Free Surfer mk II or install the Google toolbar which have inbuilt popup blocker and if Windows XP SP2 is installed then automatically installed with Windows. These blockers lets you set several levels of pop-up protection—you can block all pop ups or only those that appear to be unwanted—and you can turn it on and off with a click, and have various extra features like fill the form, search etc. You can download the Google Toolbar from here http://toolbar.google.com

Introduction

Windows XP marks the biggest change to the Windows OS since the advent of Windows 95. It combines the stability of the NT/2000 operating system with the user-friendliness and hardware support of the consumer Windows line—and it does so literally, because those two operating systems have been combined for the first time in XP. Although there are two versions of XP—Home Edition and Professional Edition—the differences between them are relatively minor and have to do primarily with security and administrator tools. Under the hood, they're the same OS.

XP marks several other change as well. DOS is no longer a part of the underlying OS, although it's still available as a command prompt. Multimedia and graphics have been built into the operating system more directly than before and are no longer treated as an afterthought. And, cosmetically, XP has been given a makeover, in both the way it looks (rounded windows and almost cartoonish at times) and the way it works.

Whether you want to speed up your PC, customize XP's interface, hack your wired and wireless network, get more out of the Web, make better use of email, use the Registry to bend the operating system to your will, or use XP for countless other useful tasks, you'll find what you're looking for here, but you have to reply here...what you like and not, so that I know what I am posting is really beneficial for someone.