three ways to make it choose only one
1 - Enter the start
2 - run, type regedit command
3 - You open the window
Choose HKEY_LOCAL_MACHINE
Then SYSTEM
Then CURRENTCONTROL SET
Then CONTROL
Then CONTENTINDEX
Choose from the left menu STARTUPDELAY
Click PAL RIGHT CLICK it
Pick up from the drop-down list
MODIFY
Change the value DECIMAL VALUE
To 40000
Exit
Work RESTART
Enter and enjoy the rapid
------------------------------------------------
The second way
Little is known, but it must be noted
1 - From START Select RUN
2 - type MSCONFIG
3 - from the STARTUP TAB
4 - Select programs are important to you when you open the computer
And delete the true mark of the programs that do not need when you started the computer
------------------------------------------------
The third way
This way when you do not care about your appearance computerized
But you care about the tool and the speed
1 - of the icon MY COMPUTER
On your desktop
Dos RIGHT CLICK
And choose PROPERTIES
Select ADVANCED TAB
ENVIRONMENT
Select BEST PERFORMANCE
how to speed up windows startup or boot
labels:
boot process,
start up,
startup,
startup delayer,
startup repair,
xp boot.ini
posted by
beka
How to speed up the browser
Income for Blood Registry through the Start and then Run and type Regedit
And go to the following:
HKEY_LOCAL_MACHINE
Software
Microsoft
Windows
CurrentVersion
Explorer
RemoteComputer
**** Space
You'll find the bottom of the following value:
(D6277990-4C6A-11CF-8D87-00AA0060F5BF)
Make sure of the value it is!!
If it is Vahzvha by clicking on the right mouse button and choose Delete.
You will notice the speed of browsing.
Why is it that the browser faster?
Because this Registry directs the browser to search for files shared
shared (remote) folders / files
In the network, which helps to slow your browser.
Note These methods can be tested on both Windows and all browsers, must also be noted that when you upgrade your browser may return again to the Registry so delete it again.
try it every 2 days
we hope we will see u in anothor post
And go to the following:
HKEY_LOCAL_MACHINE
Software
Microsoft
Windows
CurrentVersion
Explorer
RemoteComputer
**** Space
You'll find the bottom of the following value:
(D6277990-4C6A-11CF-8D87-00AA0060F5BF)
Make sure of the value it is!!
If it is Vahzvha by clicking on the right mouse button and choose Delete.
You will notice the speed of browsing.
Why is it that the browser faster?
Because this Registry directs the browser to search for files shared
shared (remote) folders / files
In the network, which helps to slow your browser.
Note These methods can be tested on both Windows and all browsers, must also be noted that when you upgrade your browser may return again to the Registry so delete it again.
try it every 2 days
we hope we will see u in anothor post
labels:
browse,
browser,
how to speed up browser,
speed up,
speed up browser
posted by
beka
Orders to make your computer work efficiently
Orders to make your computer work efficiently
first
start >> run >> write that sfc /scannow
put your windows cd
and let it to finish
second
start >> run >> write that (%tmp%) >> it will open window >> del all files in this window
third
start >> run >> write that (Recent) >> it will open window >> del all files in this window
now your computer is very good
try it when u think your computer is slow
first
start >> run >> write that sfc /scannow
put your windows cd
and let it to finish
second
start >> run >> write that (%tmp%) >> it will open window >> del all files in this window
third
start >> run >> write that (Recent) >> it will open window >> del all files in this window
now your computer is very good
try it when u think your computer is slow
the best way to protect yourself from hackerZz
Hack ...
Problem faced by many of us ...
We do not know Is Our penetrates or not ...
Who infiltrated and how and goal of ..
And how to protect the devices from the hack ..
These and other questions we will address the response in this topic
Thieves computer or (Hackers) are persons unauthorized to enter the hardware and operating systems penetrate the illegal purpose of espionage or sabotage or theft, so when they can penetrate our systems, spin, or theft of our pictures of our personal or account numbers ... Etc. They are divided into expert (professional) and they often hold advanced degrees in the computer field and have a deep knowledge of systems and drivers, and therefore they know who else and weaknesses, including the routes used in the intrusion and class the other they are novices (amateurs) are dangerous as they often do not have sufficient knowledge of the systems driver can not control the results of their operations * that it should be noted the existence of a class of Hackers exploit the ability and intelligence in the work of a noble and honest.
Can hacker to penetrate our devices through open ports by the (open ports) and to enable them access to our systems and control, or by number to the (IP) our own and by certain programs and tools manufactures plugin for breach (virus * patch * Trojan .... ) or via the (DOS) "black screen" and lots of different ways that most of them are professional hackers through the gaps in regulations.
How to hit our devices?
First: the hacker and through chat programs (chat) to send an image or file injected (stitches) or Trojan patch future can not be detected only through some of the programs and control of which are open ports.
II: Access patch or trojan through attachment in the e-mail (Email) from an unknown person and the victim opened it to see the content of the message.
III: Download the software from suspicious sites (sites nationality or proxies sites or sites .
Fourth: visit suspicious sites that the owners to download patches through cookies.
How do you know that he had been to penetrate your computer?
May be a better description of the device is penetrating the term "two non-natural" ..
There are signs appear on the device View the hacker, including automatically opening and closing the screen and a new files or delete files existed Sites Open Internet Explorer browser or stops working the machine slow last haddam and many signs of alien.
Some roads and the necessary software and actors in the protection it is not necessary commitment to programs that I will mention.
:
First: Update system and leave the update option and these are the most important steps that tolerate a lot where you
Microsoft periodically updates the regulations of view (tinkering) gaps and errors of the security system to have.
:
Second: The lock device ports open and I will put some way with the utilities in it and explain its work.
:
Third: the need to install anti-viruses effectively and continuously updated or left on the machine * The option you put anti virus
Internet 2009 with explain how to install and update and examination, and even easier to deal with it and put you
* On its composition, it is not the only option you can sufficiency program that works for you taking care to
Updated and determine the best security settings.
:
IV: Installation of a strong anti-Spyware (Anti-Spyware) sent on for protection from adware
Problem faced by many of us ...
We do not know Is Our penetrates or not ...
Who infiltrated and how and goal of ..
And how to protect the devices from the hack ..
These and other questions we will address the response in this topic
Thieves computer or (Hackers) are persons unauthorized to enter the hardware and operating systems penetrate the illegal purpose of espionage or sabotage or theft, so when they can penetrate our systems, spin, or theft of our pictures of our personal or account numbers ... Etc. They are divided into expert (professional) and they often hold advanced degrees in the computer field and have a deep knowledge of systems and drivers, and therefore they know who else and weaknesses, including the routes used in the intrusion and class the other they are novices (amateurs) are dangerous as they often do not have sufficient knowledge of the systems driver can not control the results of their operations * that it should be noted the existence of a class of Hackers exploit the ability and intelligence in the work of a noble and honest.
Can hacker to penetrate our devices through open ports by the (open ports) and to enable them access to our systems and control, or by number to the (IP) our own and by certain programs and tools manufactures plugin for breach (virus * patch * Trojan .... ) or via the (DOS) "black screen" and lots of different ways that most of them are professional hackers through the gaps in regulations.
How to hit our devices?
First: the hacker and through chat programs (chat) to send an image or file injected (stitches) or Trojan patch future can not be detected only through some of the programs and control of which are open ports.
II: Access patch or trojan through attachment in the e-mail (Email) from an unknown person and the victim opened it to see the content of the message.
III: Download the software from suspicious sites (sites nationality or proxies sites or sites .
Fourth: visit suspicious sites that the owners to download patches through cookies.
How do you know that he had been to penetrate your computer?
May be a better description of the device is penetrating the term "two non-natural" ..
There are signs appear on the device View the hacker, including automatically opening and closing the screen and a new files or delete files existed Sites Open Internet Explorer browser or stops working the machine slow last haddam and many signs of alien.
Some roads and the necessary software and actors in the protection it is not necessary commitment to programs that I will mention.
:
First: Update system and leave the update option and these are the most important steps that tolerate a lot where you
Microsoft periodically updates the regulations of view (tinkering) gaps and errors of the security system to have.
:
Second: The lock device ports open and I will put some way with the utilities in it and explain its work.
:
Third: the need to install anti-viruses effectively and continuously updated or left on the machine * The option you put anti virus
Internet 2009 with explain how to install and update and examination, and even easier to deal with it and put you
* On its composition, it is not the only option you can sufficiency program that works for you taking care to
Updated and determine the best security settings.
:
IV: Installation of a strong anti-Spyware (Anti-Spyware) sent on for protection from adware
labels:
anti hack,
command prompt hacks,
hack,
hackear pet society,
hacker,
hacking,
protect,
protection
posted by
beka
set of fonts (2500 font ) size 329 MB -more than one server
A new set of fonts for all users of graphics programs and other
2500 line

download
http://www.multiupload.com/HELRX8VLAX
2500 line
July 2010

download
http://www.multiupload.com/HELRX8VLAX
labels:
adobe fonts,
buy fonts,
calligraphy fonts,
download,
downloadable,
font,
fonts,
Helvetica,
mac,
macintosh,
true type
posted by
Eng:Ash
Nero BurnLite 10 in the latest version of the most advanced and the size of only 30 MB on more than one server
This version of Nero BurnLite contains only 10 posts in the registry and copy the data to CDs and DVDs. Additional features and capabilities not available when you upgrade to the full version of Nero suite of multimedia or 10. Programme «Nero BurnLite 10» Lite is available in Russian. Supports English, German, French, Spanish, Italian and Portuguese.
Minimum system requirements to use Nero BurnLite 10:
Windows ® XP SP3 (32-bit), Windows Vista ® SP1 (32 - and 64-bit versions), Windows ® July Home Premium, Professional, or Ultimate (32 - and 64-bit versions),
The AMD or Intel ® 2 GHz
512 MB RAM (1 GB of RAM for Windows Vista ® and Windows ® 7)
300 MB free hard disk space for standard installation of all components (including temporary space on disk)
Writing or rewriting drive to burn a CD or DVD-ROM
Third-party components, such as Microsoft Windows ® Installer 4.5 and Microsoft Silverlight ™, supplied with the product or, if not included in the package is automatically downloaded from the Internet
Requires Internet connection (recommended DSL-1000 and above). Costs for connection to the Internet is user
Note
In 64-bit operating systems, applications run in emulation mode 32-bit environment
For software to work correctly, the device must be correctly installed and recognized by the operating system
It is strongly recommended that you install the latest WHQL-certified device drivers
Printing Media for burning data
CD-R
CD-RW
DVD ± R
DVD ± RW
DVD-RAM
DVD ± R DL
Supported disc formats
Data CD
(ISO, UDF, ISO / UDF)
DVD with data
(ISO, UDF, ISO / UDF)
Operating system: Windows ® 2000/XP/Vista/7
Language: English, German, French, Spanish, Italian and Portuguese
Released: 2010
Size: 31.2 MB
Medicine: Not required
Version10.0.10500
Release Date July 12, 2010
File Size 31 MB
(32.737.424 bytes)
MD5 checksum358e7c43798ebd3f73652483bab2ce99
it is free software
download
Minimum system requirements to use Nero BurnLite 10:
Windows ® XP SP3 (32-bit), Windows Vista ® SP1 (32 - and 64-bit versions), Windows ® July Home Premium, Professional, or Ultimate (32 - and 64-bit versions),
The AMD or Intel ® 2 GHz
512 MB RAM (1 GB of RAM for Windows Vista ® and Windows ® 7)
300 MB free hard disk space for standard installation of all components (including temporary space on disk)
Writing or rewriting drive to burn a CD or DVD-ROM
Third-party components, such as Microsoft Windows ® Installer 4.5 and Microsoft Silverlight ™, supplied with the product or, if not included in the package is automatically downloaded from the Internet
Requires Internet connection (recommended DSL-1000 and above). Costs for connection to the Internet is user
Note
In 64-bit operating systems, applications run in emulation mode 32-bit environment
For software to work correctly, the device must be correctly installed and recognized by the operating system
It is strongly recommended that you install the latest WHQL-certified device drivers
Printing Media for burning data
CD-R
CD-RW
DVD ± R
DVD ± RW
DVD-RAM
DVD ± R DL
Supported disc formats
Data CD
(ISO, UDF, ISO / UDF)
DVD with data
(ISO, UDF, ISO / UDF)
Operating system: Windows ® 2000/XP/Vista/7
Language: English, German, French, Spanish, Italian and Portuguese
Released: 2010
Size: 31.2 MB
Medicine: Not required
Version10.0.10500
Release Date July 12, 2010
File Size 31 MB
(32.737.424 bytes)
MD5 checksum358e7c43798ebd3f73652483bab2ce99
it is free software
download
labels:
2010,
compu,
download Nero BurnLite,
Nero 10,
nero burning rom,
Nero BurnLite,
Nero BurnLite download,
Nero BurnLite free download,
nero multimedia suite 10,
nero vision xtra,
nero10,
new nero
posted by
Eng:Ash
AVS Media Player 4.1.2.65 untold potential and the size of only 73 MB on more than one server
Program AVS Media Player, Windows Media Player to run video, audio, free software has the capabilities of a great program to make it better than Microsoft Media Player and RealPlayer from the best programs and other audio and video.
The program supports many audio and video formats, without exception,
It is supported formats:
AVI, IFV, DIV, DIVX, WMV, ASF, ASX, MPG, MPEG, MPE, M4V, MP4, MVV, M2V, M1V, MOD, QT, MOV, DV, DAT, 3GP, 3G2, 3GPP, 3GP2, MS-DVR, DVR-MS, GVI, OGM, OGG, OGV, MKV, FLV, F4V, F4P, TS, TP, TRP, M2TS, M2T, MTS, AMV, MTV, CDG, NSV, FLI, FLC, RM, RAM, RMVB, RV, IVR, WAV, MP3, MPEG3, CDA, MP2, M4A, WMA, OGG, AAC, MPC, MPP, MP+, AIF, AIFF, AIFC, AU, SND, AMR, AWB, FLAC, AC3, BMP, GIF, JPG, JPEG, JPE, JFIF, PNG, TIF, TIFF, PCX, RAS, PSD, TGA, WMF, EMF.
Watch video, play audio, view pictures
AVS Media Player is an easy-to-use application with a simple user-friendly interface allowing you to start watching movies with no additional software.
The program combines rich functionality and a user-friendly interface in order to provide you with the best multimedia experience.
• Processor: Intel / AMD compatible at 1500 MHz or higher
• Sound: Sound card compatible with Windows
• DirectX: Microsoft DirectX 9.0c or later
• Administrator rights to install the program and registration
Size : 74.4 MB
download
The program supports many audio and video formats, without exception,
It is supported formats:
AVI, IFV, DIV, DIVX, WMV, ASF, ASX, MPG, MPEG, MPE, M4V, MP4, MVV, M2V, M1V, MOD, QT, MOV, DV, DAT, 3GP, 3G2, 3GPP, 3GP2, MS-DVR, DVR-MS, GVI, OGM, OGG, OGV, MKV, FLV, F4V, F4P, TS, TP, TRP, M2TS, M2T, MTS, AMV, MTV, CDG, NSV, FLI, FLC, RM, RAM, RMVB, RV, IVR, WAV, MP3, MPEG3, CDA, MP2, M4A, WMA, OGG, AAC, MPC, MPP, MP+, AIF, AIFF, AIFC, AU, SND, AMR, AWB, FLAC, AC3, BMP, GIF, JPG, JPEG, JPE, JFIF, PNG, TIF, TIFF, PCX, RAS, PSD, TGA, WMF, EMF.
Watch video, play audio, view pictures
AVS Media Player is an easy-to-use application with a simple user-friendly interface allowing you to start watching movies with no additional software.
The program combines rich functionality and a user-friendly interface in order to provide you with the best multimedia experience.
• Processor: Intel / AMD compatible at 1500 MHz or higher
• Sound: Sound card compatible with Windows
• DirectX: Microsoft DirectX 9.0c or later
• Administrator rights to install the program and registration
Size : 74.4 MB
download
labels:
avs,
avs dvd,
avs dvd player,
avs media player,
avs player,
best media player for windows,
compu,
computer,
download avs,
free dvd player,
media player software,
software,
your media player
posted by
Eng:Ash
Subscribe to:
Posts (Atom)