The best way to speed up the Internet and browser firefox

first the way to make speed up internet

1 - From START to enter the run and then type

2 - Lake will open a list of the left chose ADMINISTRATIVE TEMPLates

Then open the NETWORK

Then open the Qos packet scheduler

3 - from the left menu you will find the value Limit Reservable Bandwidth

Open it and choose Enable

When the Bandwidth Limit

Change the value to 0%



second the way to make fire fox very fast

1 - Open the FIREFOX your type in the address bar

This statement (about: config)

Without brackets, of course

Scroll down the page and look for the following inputs:




Hatlaekayam close to some of the

Other than these values by Dubl Click on each value as follows
network.http.pipelining ==>> true

==>> True

==>> 30

Finally Press The Right Click
Anywhere in the page
New -> Integer

And name it by name follows
And make valued
0 >>

after that u maked the best way to speed up your internet and fire fox

how to speed up windows startup or boot

three ways to make it choose only one

1 - Enter the start
2 - run, type regedit command
3 - You open the window
Choose from the left menu STARTUPDELAY
Pick up from the drop-down list
Change the value DECIMAL VALUE
To 40000
Enter and enjoy the rapid


The second way
Little is known, but it must be noted
1 - From START Select RUN
2 - type MSCONFIG
3 - from the STARTUP TAB
4 - Select programs are important to you when you open the computer
And delete the true mark of the programs that do not need when you started the computer


The third way
This way when you do not care about your appearance computerized
But you care about the tool and the speed
1 - of the icon MY COMPUTER
On your desktop

How to speed up the browser

Income for Blood Registry through the Start and then Run and type Regedit
And go to the following:
**** Space
You'll find the bottom of the following value:
Make sure of the value it is!!
If it is Vahzvha by clicking on the right mouse button and choose Delete.
You will notice the speed of browsing.
Why is it that the browser faster?
Because this Registry directs the browser to search for files shared
shared (remote) folders / files
In the network, which helps to slow your browser.
Note These methods can be tested on both Windows and all browsers, must also be noted that when you upgrade your browser may return again to the Registry so delete it again.
try it every 2 days
we hope we will see u in anothor post

Orders to make your computer work efficiently

Orders to make your computer work efficiently


start >> run >> write that
sfc /scannow

put your windows cd

and let it to finish


start >> run >> write that (%tmp%) >> it will open window >> del all files in this window


start >> run >> write that (Recent) >> it will open window >> del all files in this window

now your computer is very good

try it when u think your computer is slow

the best way to protect yourself from hackerZz

Hack ...
Problem faced by many of us ...
We do not know Is Our penetrates or not ...
Who infiltrated and how and goal of ..
And how to protect the devices from the hack ..

These and other questions we will address the response in this topic

Thieves computer or (Hackers) are persons unauthorized to enter the hardware and operating systems penetrate the illegal purpose of espionage or sabotage or theft, so when they can penetrate our systems, spin, or theft of our pictures of our personal or account numbers ... Etc. They are divided into expert (professional) and they often hold advanced degrees in the computer field and have a deep knowledge of systems and drivers, and therefore they know who else and weaknesses, including the routes used in the intrusion and class the other they are novices (amateurs) are dangerous as they often do not have sufficient knowledge of the systems driver can not control the results of their operations * that it should be noted the existence of a class of Hackers exploit the ability and intelligence in the work of a noble and honest.

Can hacker to penetrate our devices through open ports by the (open ports) and to enable them access to our systems and control, or by number to the (IP) our own and by certain programs and tools manufactures plugin for breach (virus * patch * Trojan .... ) or via the (DOS) "black screen" and lots of different ways that most of them are professional hackers through the gaps in regulations.

How to hit our devices?
First: the hacker and through chat programs (chat) to send an image or file injected (stitches) or Trojan patch future can not be detected only through some of the programs and control of which are open ports.
II: Access patch or trojan through attachment in the e-mail (Email) from an unknown person and the victim opened it to see the content of the message.
III: Download the software from suspicious sites (sites nationality or proxies sites or sites .
Fourth: visit suspicious sites that the owners to download patches through cookies.

How do you know that he had been to penetrate your computer?
May be a better description of the device is penetrating the term "two non-natural" ..
There are signs appear on the device View the hacker, including automatically opening and closing the screen and a new files or delete files existed Sites Open Internet Explorer browser or stops working the machine slow last haddam and many signs of alien.

Some roads and the necessary software and actors in the protection it is not necessary commitment to programs that I will mention.
First: Update system and leave the update option and these are the most important steps that tolerate a lot where you
Microsoft periodically updates the regulations of view (tinkering) gaps and errors of the security system to have.
Second: The lock device ports open and I will put some way with the utilities in it and explain its work.
Third: the need to install anti-viruses effectively and continuously updated or left on the machine * The option you put anti virus
Internet 2009 with explain how to install and update and examination, and even easier to deal with it and put you
* On its composition, it is not the only option you can sufficiency program that works for you taking care to
Updated and determine the best security settings.
IV: Installation of a strong anti-Spyware (Anti-Spyware) sent on for protection from adware