S U N D A R R A J A N

Google Search Engine

Thursday, September 27, 2007

Ajax Implementation in spring framework

Ajax Implementation in spring framework

Spring framework doesn’t support Ajax directly we need to use XT or DWR framework to have Ajax in spring application. Recently I have used XT framework to make Ajax work in my spring web application. Let share my ideas and experience to you all. Of course, your ideas and feedbacks are welcome to improve my technical skills. Find below the detailed step by step procedure for this.

Before getting into Ajax with spring framework, let me first explain what Ajax is and how it became more popular.

What is Ajax?

1. AJAX stands for Asynchronous JavaScript And XML.

2. It’s a type of programming made popular in 2005 by Google (with Google Suggest).

3. It’s not a new programming language, but a new way to use existing standards.

4. With AJAX you can create better, faster, and more user-friendly web applications.

5. AJAX is based on JavaScript and HTTP requests.

Introduction:

AJAX is not a new programming language, but a technique for creating better, faster, and more interactive web applications. With AJAX, your JavaScript can communicate directly with the server, using the JavaScript XMLHttpRequest object. With this object, your JavaScript can trade data with a web server, without reloading the page. AJAX uses asynchronous data transfer (HTTP requests) between the browser and the web server, allowing web pages to request small bits of information from the server instead of whole pages. The AJAX technique makes Internet applications smaller, faster and more user-friendly. AJAX is a browser technology independent of web server software.

AJAX is Based on Web Standards

AJAX is based on the following web standards:

  • JavaScript
  • XML
  • HTML
  • CSS

The web standards used in AJAX are well defined, and supported by all major browsers. AJAX applications are browser and platform independent.

AJAX is about Better Internet Applications

Web applications have many benefits over desktop applications; they can reach a larger audience, they are easier to install and support, and easier to develop.

However, Internet applications are not always as "rich" and user-friendly as traditional desktop applications. With AJAX, Internet applications can be made richer and more user-friendly.

AJAX Uses HTTP Requests

In traditional JavaScript coding, if you want to get any information from a database or a file on the server, or send user information to a server, you will have to make an HTML form and GET or POST data to the server. The user will have to click the "Submit" button to send/get the information, wait for the server to respond, and then a new page will load with the results.

Because the server returns a new page each time the user submits input, traditional web applications can run slowly and tend to be less user-friendly.

With AJAX, your JavaScript communicates directly with the server, through the JavaScript XMLHttpRequest object

With an HTTP request, a web page can make a request to, and get a response from a web server - without reloading the page. The user will stay on the same page, and he or she will not notice that scripts request pages, or send data to a server in the background.

The XMLHttpRequest Object

By using the XMLHttpRequest object, a web developer can update a page with data from the server after the page has loaded!

AJAX was made popular in 2005 by Google (with Google Suggest).

Google Suggest is using the XMLHttpRequest object to create a very dynamic web interface: When you start typing in Google's search box, a JavaScript sends the letters off to a server and the server returns a list of suggestions.

The XMLHttpRequest object is supported in Internet Explorer 5.0+, Safari 1.2, Mozilla 1.0 / Firefox, Opera 8+, and Netscape 7.

Now let’s see about Ajax XT Frame work.

The XT Framework is a Spring module for developing applications with ''richer domain models and richer user interfaces'', following the Domain Driven Design practices.

Domain Driven Design puts the domain model in the heart of the development process. The domain model becomes the core of your application and the main focus of your development. It concentrates all business logic, rules and constraints, being totally independent from other application parts. In particular, considering a well-known layered architecture, domain models are designed to be independent from the so called presentation layer and infrastructure/data access layer. Unfortunately, practically speaking, this causes a sort of impedance mismatch among layers, causing code duplication, domain model corruption, or the shy anemic domain model.

The XT Framework aims at solving this mismatch providing the so called XT Modeling Framework for developing rich domain models, which gracefully adapt to other layers.

And if you have a rich domain model, why not having a rich user interface? The XT Framework provides also the XT Ajax Framework, which integrates Spring and its MVC framework with AJAX technologies.

Points to be noted:

1. The XT Framework needs Java 1.5 or later: it will not work in older environments.

2. Version 0.6 comes with several packages and interfaces whose name and position have been refactored for better usability. These changes are not backward compatible and require changing your code.

3. In version 0.6, the XT Framework Utils packages have been moved to the SpringMVC-extra web module.

Sample application:

Ajax is mainly meant for fetching data or adding dynamic changes in our application without submitting the page. In order to do this, we need to generate XMLHTTPRequest instead or HTTPRequest. Our page should not go to controller, before going in to controller we need to catch it and pass it to a handler using Interceptor concept in spring framework. For example if we want to catch the HTTPRequest before going to logincontroller we have to do something like this.

<bean id="publicUrlMapping" class="org.springframework.web.servlet.handler.SimpleUrlHandlerMapping" >

<property name="interceptors">

<list>

<ref bean="ajaxInterceptor"/>

list>

property>

<property name="mappings">

<props>

<prop key="**/login.htm">loginControllerprop>

<bean id="ajaxInterceptor" class="org.springmodules.xt.ajax.AjaxInterceptor">

<property name="handlerMappings">

<props>

ajaxLoginActionHandler

props>

property>

bean>

Point your class to ajaxLoginActionHandler.

And in the AjaxLoginActionHandler we need to build dynamic content.

For example:

Public class AjaxLoginActionHandler extends AbstractAjaxHandler {

Public AjaxResponse validateLogin(AjaxActionEvent event) {

// building ajax response to send it back

AjaxResponse response = new AjaxResponseImpl();

// Inside this we can show or hide div tags in our JSP page

// Show elements inside div tag, here “exportToExcel” should be a

// div tag id

ShowElementAction showAction = new ShowElementAction("exportToExcel");

response.addAction(showAction);

// Hide elements inside div tag, here “exportToExcel” should be a div tag id

HideElementAction hideElementAction = new HideElementAction("exportToExcel");

response.addAction(hideElementAction);

// To build a dynamic table

// Create a table

Table table = new Table();

String[] headers = { "heading1", "heading2" };

// Create header for table

TableHeader header = new TableHeader(headers);

// add header to table

table.setTableHeader(header);

// in table we have addAttribute() method which is used to attribute for the // table for example, here we are adding header attribute and table // attributes.

table.addTableHeaderAttribute("class", "fixedHeader");

table.addAttribute("id", "normalTableNostripe");

// Table header has been added, now we need to create a row and column for // the table

TableRow row1 = new TableRow();

// Same as table object, TableRow object also have addAttribute() method // which is again used to set attribute for that particular row.

row.addAttribute("class", "normalRow");

// creating column for those tables

TableData column1 = new TableData(new SimpleText(“Test data”));

// adding column to row

row.addTableData(column1);

// finally add tableData (column) to table

table.addTableRow(row1);

// Then we need to decide whether the table which we created needs to append // with any content or replace existing content

// To append content, here “report” should be a div tag in our JSP

AppendContentAction appendContentAction = new AppendContentAction("report", table);

response.addAction(appendContentAction);

// to replace content, here “report” should be a div id in our JSP

ReplaceContentAction action = new ReplaceContentAction("report", table);

response.addAction(action);

// returning response to jsp page

return response;

}

}

Now comes our JSP part.

In Jsp we need to have some javascripts, this will create a XMLHTTPRequest and send it to handler.

We need to have this div tag in our jsp page so that dynamically created table will be appended or replaced here.

<div id="report" style="overflow: auto; height: 350px;"> div>

Content inside this div tag is hidden and showed using show and hide elements method

<div align="right" id="exportToExcel" style="display: none;">

<b> <a href="#" name="excel" onclick="javascript:exportToExcel();" target="_self"> Export to Excel a> b>

This how we are going to invoke ajax once a button is clicked

<input type="button" value="Filter" onclick="XT.doAjaxAction('validateLogin', this)">

Here this validateLogin is a method name which we used in the handler. Just by invoking this java script it will call that method inside the handler.

Find below the sites which I referred and downloaded javascript & jar files, Hope it will be useful for you also.

http://springxt.sourceforge.net/index.php/Main_Page

https://springmodules.dev.java.net/

https://springmodules.dev.java.net/servlets/ProjectDocumentList?folderID=7051&expandFolder=7051&folderID=7051

Still lot to go and lot to learn in this…. Will keep you posted J J

Keep watching…………… J J J

Tuesday, July 10, 2007

Folder Lock without any S/W

Folder Lock without any S/W

1.Open Notepad and copy the below code and save as locker.bat. Don't forget to change your password in the code its shown the place where to type your password.

2.Now double click on locker .bat
3.At first time start it will create folder with Locker automatically for u.
4.after creation of Locker folder again click on the locker.bat.it will ask.press Y then Locker folder will disappear.

5.again to get it click on locker.bat. and give ur password u will get the folder again.

**********************************************************

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==
type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

Monday, July 2, 2007

Develop an n-tier applications using J2EE

The J2EE platform consists of a set of services, application programming interfaces (APIs), and protocols that provide the functionality for developing multitiered Web-based applications.

In this article, we will examine the 13 core technologies that make up J2EE: JDBC, JNDI, EJBs, RMI, JSP, Java servlets, XML, JMS, Java IDL, JTS, JTA, JavaMail, and JAF. We will describe where and when it is appropriate to use each technology; we will also describe how the different technologies interact with each other.

Moreover, to give J2EE a real-world feel, we'll look at its main technologies in the context of WebLogic Server, a widely used J2EE implementation from BEA Systems. With that in mind, this introductory article will be of interest to developers new to WebLogic Server and J2EE, as well as project managers and business analysts with an interest in understanding what J2EE has to offer.


The big picture: Distributed architectures and J2EE

In the past, two-tier applications -- also known as client/server applications -- were commonplace. Figure 1 illustrates the typical two-tier architecture. In some cases, the only service provided by the server was that of a database server. In those situations, the client was then responsible for data access, applying business logic, converting the results into a format suitable for display, displaying the intended interface to the user, and accepting user input. The client/server architecture is generally easy to deploy at first, but is difficult to upgrade or enhance, and is usually based on proprietary protocols -- typically proprietary database protocols. It also makes reuse of business and presentation logic difficult, if not impossible. Finally, and perhaps most important in the era of the Web, two-tier applications typically do not prove
very scalable and are therefore not well suited to the Internet.

Figure 1. Two-tier application architecture
Sun designed J2EE in part to address the deficiencies of two-tier architectures. As such, J2EE defines a set of standards to ease the development of n-tier enterprise applications. It defines a set of standardized, modular components; provides a complete set of services to those components; and handles many details of application behavior -- such as security and multithreading -- automatically.

Using J2EE to develop n-tier applications involves breaking apart the different layers in the two-tier architecture into multiple tiers. An n-tier application could provide separate layers for each of the following services:

  • Presentation: In a typical Web application, a browser running on the client machine handles presentation.
  • Dynamically generated presentation: Although a browser could handle some dynamically generated presentation, for the widest support of different browsers much of the action should be done on the Web server using JSPs, servlets, or XML (Extensible Markup Language) and XSL (Extensible Stylesheet Language).
  • Business logic: Business logic is best implemented in Session EJBs (described later).
  • Data access: Data access is best implemented in Entity EJBs (described later) and using JDBC.
  • Backend system integration: Integration with backend systems may use a variety of technologies. The best choice will depend upon the exact nature of the backend system.
You may begin to wonder: why have so many layers? Well, the layered approach makes for a more scalable enterprise application. It allows each layer to focus on a specific role -- for example, allowing a Web server to serve Webpages, an application server to serve applications, and a database server to serve databases.

Because it's built on top of the Java 2 Platform, Standard Edition (J2SE), J2EE provides all the same advantages and features of J2SE. These include "Write Once, Run Anywhere" portability, JDBC for database access, CORBA technology for interaction with existing enterprise resources, and a proven security model. Building on this base, J2EE then adds support for Enterprise JavaBean (EJB) components, Java servlets, JavaServer Pages (JSPs), and XML technology.

Distributed architectures with WebLogic Server

J2EE provides a framework -- a standard API -- for developing distributed architectures. The implementation of an engine to implement this framework is left up to third-party vendors. Some vendors will focus on particular components of the overall J2EE architecture. For example, Apache's Tomcat provides support for JSPs and servlets. BEA Systems provides a fuller implementation of the J2EE specification with its WebLogic Server product.

By providing a complete implementation of the J2EE specifications, WebLogic Server makes it easy to build and deploy scalable, distributed applications. WebLogic Server and J2EE handle certain common programming tasks for you. These include the provision of transaction services, security realms, guaranteed messaging, naming and directory services, database access and connection pooling, thread pooling, load balancing, and fault tolerance.

By providing these common services in an easy-to-use and standard way, products like WebLogic Server provide more scalable and maintainable applications. The result is increased availability of those applications to a larger number of users.

The J2EE technologies

In the following sections, we'll describe each of the technologies making up J2EE, and see how WebLogic Server supports them in a distributed application. Perhaps the most commonly used J2EE technologies include JDBC, JNDI, EJB, JSPs, and servlets, upon which we therefore focus our attention.

Figure 2 illustrates where each of the J2EE technologies are most commonly used within a distributed application.


Java Database Connectivity (JDBC)

The JDBC API accesses a variety of databases in a uniform way. Like ODBC, JDBC hides proprietary database issues from the developer. Because it's built on Java, JDBC also is able to provide platform-independent access to databases.

JDBC defines four fundamentally different types of drivers, as we'll see next.

Type 1: JDBC-ODBC Bridge

The JDBC-ODBC Bridge proved most useful when JDBC was still in its infancy. With it, developers can use JDBC to access an ODBC data source. As a downside, it requires that an ODBC driver be installed on the client machine which, generally speaking, should be running a version of Microsoft Windows. By using this type of driver, you therefore sacrifice the platform independence of JDBC. Additionally, the ODBC driver requires client-side administration.

Type 2: JDBC-native driver bridge

The JDBC-native driver bridge provides a JDBC interface built on top of a native database driver -- without using ODBC. The JDBC driver converts standard JDBC calls into native calls to the API of the database. Using a type 2 driver also sacrifices the platform independence of JDBC and requires installation of client-side native code.

Type 3: JDBC-network bridge

JDBC-network bridge drivers remove the need for client-side database drivers. They make use of network-server middleware to access a database. This makes such techniques as load balancing, connection pooling, and data caching possible. Because type 3 drivers often involve a relatively small download time, are platform independent, and require no client-side installation or administration, they are good for Internet applications.

Type 4: Pure Java driver

Type 4 provides direct database access using a pure Java database driver. Due to the way type 4 drivers run on the client and directly access a database, running in this mode would imply a two-tier architecture. A better use of type 4 drivers in an n-tier architecture would be to have an EJB contain the data access code, and have that EJB provide a database-independent service to its clients.

WebLogic Server provides JDBC drivers for some of the more common databases, including Oracle, Sybase, Microsoft SQL Server, and Informix. It also comes with a JDBC driver for Cloudscape, a pure Java DBMS, an evaluation copy of which comes with WebLogic Server.

Next, let's look at an example.

JDBC Example

Our example assumes that you have a PhoneBook database set up in Cloudscape, and that this database contains a table CONTACT_TABLE with fields NAME and PHONE. We begin by loading the Cloudscape JDBC driver, and requesting that the driver manager obtain a connection to the PhoneBook Cloudscape database. Using this connection, we construct a Statement object and use it to execute a simple SQL query. Finally, the loop iterates through all entries in the result set, writing the contents of the NAME and PHONE fields to the standard output.

import java.sql.*;
public class JDBCExample
{
public static void main( String args[] )
{
try
{
Class.forName("COM.cloudscape.core.JDBCDriver");
Connection conn = DriverManager.getConnection("jdbc:cloudscape:PhoneBook");
Statement stmt = conn.createStatement();
String sql = "SELECT name, phone FROM CONTACT_TABLE ORDER BY name";
ResultSet resultSet = stmt.executeQuery( sql );
String name;
String phone;
while ( resultSet.next() )
{
name = resultSet.getString(1).trim();
phone = resultSet.getString(2).trim();
System.out.println( name + ", " + phone );
}
}
catch ( Exception e )
{
// Handle exception here
e.printStackTrace();
}
}
}
That's all there is to it. Next, let's look at the use of JDBC in enterprise applications.

JDBC in enterprise applications

The previous example is, by necessity, somewhat trivial. It also assumes a two-tier architecture. In an n-tier enterprise application, it is much more likely that the client will communicate with an EJB, which, in turn, will make the database connection. To enable improved scalability and performance, WebLogic Server provides support for connection pools.

Connection pools reduce the overhead of establishing and destroying database connections by creating a pool of database connections when the server starts up. When a connection to the database is subsequently required, WebLogic Server simply selects one from the pool rather than creating one from scratch. Connection pools in WebLogic Server are defined in the weblogic.properties file. (Refer to the examples in your weblogic.properties file and the WebLogic Server documentation for more information.)

Another database feature frequently required in enterprise applications is support for transactions. A transaction is a group of statements that should be treated as a single statement to ensure data integrity. JDBC uses the auto-commit transaction mode by default. This can be overridden using the setAutoCommit() method of the Connection class.

Now that we have a sense of JDBC, let's turn our attention to JNDI.

Java Naming and Directory Interface (JNDI)

The JNDI API is used to access naming and directory services. As such, it provides a consistent model for accessing and manipulating such enterprise-wide resources as DNS, LDAP, local filesystems, or objects in an application server.

In JNDI, every node in a directory structure is called a context. Every JNDI name is relative to a context; there is no notion of an absolute name. An application can obtain its first context using the InitialContext class:

Context ctx = new InitialContext();
From this initial context, the application can traverse the directory tree to locate the desired resources or objects. For example, assume that you have deployed an EJB within WebLogic Server and bound the home interface to the name myApp.myEJB. A client of this EJB, after obtaining an initial context, could then locate the home interface using:
MyEJBHome home = ctx.lookup( "myApp.myEJB" );
Once you have a reference to the acquired object -- in this case, the home interface of the EJB -- it is then possible to invoke methods on it. We will discuss this further in the section below entitled "Enterprise Java Beans."

Tuesday, June 26, 2007

Tips for small investors on shares

We small investors must understand a few golden rules for investing in stocks (delivery based investments):

1. Do a small research about the company background. Mainly check the following : Share holding pattern, Profits / losses of the company, Dividend paying history, share price movements and latest news / announcements.

2. Focus more on the investment value. Rather than the share price of the stock. For example, if you want to invest in a penny stock say X which has a CMP of Rs 2. For example, you want to buy 5000 shares of the same, then your total value of investment would be 2 X 5000 = 10000. However, instead of taking risk with unknown penny stock, you might as well buy 100 shares of a good scrip which has a CMP of Rs 100 (100 X 100 = 10000). Hence, with same level of investment, your downward movement of investment is reduced. Your risk levels are reduced. Also, your tension would also reduce. You can focus more on your other work / family and also get handsome returns.

3. Contentiously short term buying / selling involves a high amount of risk, not only in terms of loss in expected profits. At the same time, what is the guarantee that you have sold at the correct time, and will buy when the stock goes down. What if it doesn't go down when you want to buy ? Then you will end up buying at a higher rate.

4. There is one more hidden devil called brokerages. It will also eat into the small profits that you want to make in short term. Hence, it is always more profitable to have a continuous and un-interrupted holding for a reasonable amount of time.

4. One very important point is : if you hold for more than a period of one year, you are not required to pay any taxes out of your profit, because it comes under long term capital gains, which is non-taxable.


Wednesday, June 20, 2007

Windows XP Tips

Windows XP Tips


Deleting System Softwares:


XP hides some system software you might want to remove, such as
Windows Messenger, but you can tickle it and make it disgorge
everything. Using Notepad or Edit, edit the text file /windows/inf/
sysoc.inf, search for the word 'hide' and remove it. You can then go
to the Add or Remove Programs in the Control Panel, select Add/Remove
Windows Components and there will be your prey, exposed and vulnerable.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Creating Shutdown Icon or One Click Shutdown:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Navigate to your desktop. On the desktop, right-click and go to New,
then to Shortcut (in other words, create a new shortcut). You should
now see a pop-up window instructing you to enter a command line path.
Use this path in "Type Location of the Item"
SHUTDOWN -s -t 01
If the C: drive is not your local hard drive, then replace "C" with
the correct letter of the hard drive. Click the "Next" button. Name
the shortcut and click the "Finish" button. Now whenever you want to
shut down, just click on this shortcut and you're done.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Increasing Band-Width By 20%:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Microsoft reserves 20% of your available bandwidth for their own
purposes like Windows Updates and interrogating your PC etc

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
To get it back:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Click Start then Run and type "gpedit.msc" without quotes.This opens
the group policy editor. Then go to:
Local Computer Policy then Computer Configuration then Administrative
Templates then Network then QOS Packet Scheduler and then to Limit
Reservable Bandwidth.
Double click on Limit Reservable bandwidth. It will say it is not
configured, but the truth is under the 'Explain' tab i.e."By default,
the Packet Scheduler limits the system to 20 percent of the bandwidth
of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO.
This will allow the system to reserve nothing, rather than the default
20%.It works on Win 2000 as well.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Renaming The Recycle Bin icon:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

To change the name of the Recycle Bin desktop icon, click Start then
goto Run, write Regedit and press Enter. It opens Registry Editor. Now
in Registry Editor go to:

HKEY_CLASSES_ ROOT/CLSID/ {645FF040- 5081-101B- 9F08-00AA002F954 E}
and change the name "Recycle Bin" to whatever you want (don't type any
quotes).

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Managing Tasks:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

You can at last get rid of tasks on the computer from the command line
by using 'taskkill /pid' and the task number, or just 'tskill' and the
process number. Find that out by typing 'tasklist', which will also
tell you a lot about what's going on in your system.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Removing Shared Documents folder From My Computer window:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Open registry editor by going to Start then Run and entering regedit.
Once in registry, navigate to key

HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \
Explorer \ My Computer \ NameSpace \ DelegateFolders

You must see a sub-key named {59031a47-3f72- 44a7-89c5- 5595fe6b30ee}
. If you delete this key, you have effectively removed the my shared
documents folder.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Improving the Slow Boot up time:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

There are a variety of reasons why your windows XP system would boot
slowly. Most of the times it this has to do with the startup
applications. If you would like to speed up the bootup sequence,
consider removing some of the startup applications that you do not
need. Easiest way to remove startup apps is through System
Configuration Utility. Go to Start then Run and enter MSCONFIG and go
to the Startup tab. Deselect/UnCheck application( s) that you do not
want to startup at boot time.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Customize Logon prompt with your Own Words:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Open Registry by going to Start then Run, entering regedit and
Navigate to [HKEY_LOCAL_ MACHINE\SOFTWARE \Microsoft\ Windows
NT\CurrentVersion\ Winlogon] . In right pane, look for key by the name
"LogonPrompt". Set its value to whatever text you want to see
displayed at login screen.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
IP address of your connection:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Go to Start then Run. Enter 'cmd' and then enter 'ipconfig' .Add the
'/all' switch for more info.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Making Folders Private:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Open My Computer Double-click the drive where Windows is installed
(usually drive (C:), unless you have more than one drive on your
computer). If the contents of the drive are hidden, under System
Tasks, click Show the contents of this drive.
Double-click the Documents and Settings folder. Double-click your user
folder. Right-click any folder in your user profile, and then click
Properties. On the Sharing tab, select the Make this folder private so
that only I have access to it check box.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
To change Drive Letters:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Go to Start > Control Panel > Administrative Tools > Computer
Management, Disk Management, then right-click the partition whose name
you want to change (click in the white area just below the word
"Volume") and select "change drive letter and paths."
From here you can add, remove or change drive letters and paths to the
partition.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Removing the Shortcut arrow from Desktop Icons:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Goto Start then Run and Enter regedit. Navigate to HKEY_CLASSES_
ROOTlnkfile. Delete the IsShortcut registry value. You may need to
restart Windows XP.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Get Drivers for your Devices:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Visit Windows Update (XP Only)
Look at the left hand pane and under Other Options click Personalize
Windows Update.
Now in the right hand pane check the box - Display the link to the
Windows Update Catalog under See Also
Below Choose which categories and updates to display on Windows Update
- make sure you check all the boxes you want shown.
Click Save Settings
Now look in the left hand pane under See Also click Windows Update
Catalog and choose what you're looking for. Choose either MS updates
or drivers for hardware devices.
Start the Wizard and off you go.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Customize Internet Explorer's Title Bar:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Open Registry by going to Start then Run and Enter regedit. Navigate
to HKEY_CURRENT_ USER\Software\ Microsoft\ Internet. Explorer\Main. In
right hand panel look for string "Window Title" and change its value
to whatever custom text you want to see.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Disabling the use of Win Key:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

If your are a gaming freak then you must be sick of the Win key in
your keyboard. To disable use of Win key, open registry by going to
Start then Run and entering regedit. Navigate to [HKEY_LOCAL_
MACHINE\SYSTEM\ CurrentControlSe t\Control\ Keyboard Layout] . In this
look for value of "Scancode Map". Its binary data so be extra careful:
Set its value to "00 00 00 00 00 00 00 00 03 00 00 00 00 00 5B E0 00
00 5C E0 00 00 00 00" to disable the win key.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Restarting Windows without Restarting the Computer:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

This one is again is. When you click on the SHUTDOWN button, make sure
to simultaneous press SHIFT Button. If you hold the Shift key down
while clicking on SHUTDOWN button, you computer would restart without
restarting the Computer. This is equivalent to term "HOT REBOOT".

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Stopping XP from displaying unread messages count on Welcome Screen:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

To stop XP from displaying count of unread messages, Open registry and
navigate to [HKEY_CURRENT_ USER\Software\ Microsoft\ Windows\CurrentV
ersion\UnreadMai l] and look for the data key "MessageExpiryDays". If
you do not see this key, create one DWORD key by the name
"MessageExpiryDays". Setting its value to 0 would stop Windows XP from
displaying the count of unread messages.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Modify Color Selection of Default Theme:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Open registry by going to Start then Run. Entering regedit, navigate
to [HKEY_USERS\ .DEFAULT\ Software\ Microsoft\ Windows\CurrentV
ersion\ThemeMana ger] and locate the key "ColorName".
Right Click on it and select modify its value from "NormalColor" to
"Metallic"
Click Ok, and exit regedit and restart your computer.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Removing the Recycle Bin from the Desktop:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

If you don't use the Recycle Bin to store deleted files , you can get
rid of its desktop icon all together. Run Regedit and go to:

HKEY_LOCAL_MACHINE/ SOFTWARE/ Microsoft/ Windows/CurrentV
ersion/explorer/ Desktop/NameSpac e

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Customize Windows XP
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

1) Remove windows messenger from WinXP one forever
Go to Run box and type next:
runDll32 advpack.dll, LaunchINFSection %windir%\INF\ msmsgs.inf, BLC.Remove

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
2) Disable XP Error Reporting
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Right click on MyComputer choose Properties
In System Properties click on Advenced
In Advenced click on Error Reporting
Check "Disable error reporting"
Leave unchecked field "But notify me when critical errors occur"

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
3) Hide 'User Accounts' from users
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Go to Start/Run, and type: GPEDIT.MSC
Open the path
User Config > Admin Templates > Control Panel
doubleclick "Hide specified Control Panel applets"
put a dot in 'enabled', then click 'Show"
click Add button,
type "nusrmgt.cpl" into the add box

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
4) Create Your Own Logon Message
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Click Start, click Run, type regedit, and then click OK.
In the Registry Editor, drill down to the following key:
HKEY_LOCAL_MACHINE\ SOFTWARE\Microsoft\Windows NT\CurrentVersion\ Winlogon
Right-click LegalNoticeCaption, click Modify, type My Windows XP Machine, and then click OK.
Right-click LegalNoticeText, click Modify, and then type your message.
Close the editor and your new message will appear at every log on.
This tip applies to computers that are part of a domain.
For stand-alone or peer-to-peer networks,
the custom screen appears just before the Welcome screen.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
5) Disable balloon tips
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Run regedit and Navigate to Key:
HKEY_CURRENT_ USER\Software\Microsoft\Windows\ CurrentVersion \Explorer\Advanced
then set the value of 'EnableBalloonTips' to 0.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
6) Create your own popup menu in the taskbar
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

You can create your own popup window other than START MENU in the taskbar.
Put all the shortcuts to the applications that you want to popup in a folder.
Then you right click on taskbar ->toolbars ->new toolbar -> and select the folder

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
7) Reset Your Password On XP
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
1. Restart you computer

2. When booting, press F8 and select "Safe Mode"

3. After getting to the user menu. Click on a user and this time it will not ask you for a password

4. Go to Start>Run and type "CMD" (without the quotes).

5. At command prompt type in "cd C:WindowsSystem32" (without the quotes),
I am assuming C is your System/Windows Drive

6.For safety purposes first make a backup of your Logon.Scr file..
You can do this by typing in "Copy to Logon.scr to Logon.bak" (without the quotes)

7.Then type "copy CMD.EXE Logon.scr"(without the quotes)

8.Then type this command, I will assume that you want to set Administrator's
password to "MyNewPass" (without the quotes)

9.Now, type this in (I am assuming that you are still in the directory C:WindowsSystem32),
"net user administrator MyNewPass" without the quotes

10. You will get a message saying that it was successful, this means Administrator's
new password is "MyNewPass" (without the quotes)

11. Restart the PC and you will login as Administrator (or whatever you chose to reset) with your chosen password

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
8.)Cool Create your own Internet Explorer Toolbar

First, create your HTML file and place it in whatever folder is
easiest for you to remember. ( I have a folder on my D drive called Desktop Toolbars. )

Go to: HKEY_LOCAL_MACHINE\ SOFTWARE\Microsoft\Internet Explorer\AboutURLs

Create a new String Value with an easy to remember name.
Ex: TopToolbar ,BottomToolbar ,GoogleSearchPage

In the data for the new string value you've created, put the COMPLETE
address for the HTML page you want to display in a toolbar.

Like this: D:\Desktop_Toolbars \TopBar.html

To show your new toolbar, right-click on your taskbar and choose "Toolbars" > New Toolbar.

In the box labeled Folder:, type about: with the name of the string
value you created that represents the HTML file you want to see in your toolbar.
Like this:
about:TopBar
will display your D:\Desktop_Toolbars \TopBar.html in your taskbar.
about:BottomBar
about:GoogleSearchP age

See this screenshot for a visual example of something simple you can do:

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
10.)Speed Up Windows XP and Improve performance
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
1) Shutting down WinXP faster

When a user shuts down Windows XP, first the system has to kill all
services currently running. Every once in a while the service does not shut
down instantly and windows give it a change to shut down on its own before it kills it.
This amount of time that windows wait is stored in the system registry.
If you modify this setting, then windows will kill the service earlier.
To modify the setting, follow the directions below:

Click on Start, and then goto run, type REGEDIT

Navigate to HKEY_LOCAL_MACHINE/ SYSTEM/CurrentControlSet/ Control.
Click on the "Control" Folder.
Select "WaitToKillServiceTi meout"
Right click on it and select Modify. Set it a value lower than 4000

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
2) You can start up without needing to enter a user name or password.
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Select Run... from the start menu and type 'control userpasswords2' ,
which will open the user accounts application. On the Users tab,
clear the box for Users Must Enter A User Name And Password To
Use This Computer, and click on OK. An Automatically Log On
dialog box will appear; enter the user name and password for
the account you want to use.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
3) Windows XP SP2 Tweaks
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Disable the SP antivirus and firewall functions
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

[HKEY_LOCAL_ MACHINE\SOFTWARE\Microsoft\Security Center]
"AntiVirusDisableNot ify"=dword :00000001
"FirewallDisableNoti fy"=dword:00000001
; don't monitor firewall and antivirus
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Turn off Auto Updates
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

[HKEY_LOCAL_ MACHINE\SOFTWARE \Microsoft\Windows\ CurrentVersion\WindowsUpdate\ Auto Update]
"AUOptions"=dword:00000001
;disable Auto Update
[HKEY_LOCAL_ MACHINE\SOFTWARE \Microsoft\Security Center]
"UpdatesDisableNotif y"=dword:00000001

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Turn off the SP2 firewall
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

[HKEY_LOCAL_ MACHINE\SOFTWARE\Policies\Microsoft \WindowsFire wall\DomainProfile]
"EnableFirewall"=dword:00000000

turn off firewall policy for domain profile
[HKEY_LOCAL_ MACHINE\SOFTWARE\Policies\Microsoft \WindowsFire wall\StandardProfil e]
"EnableFirewall"=dword:00000000

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Disable unnecessary Services
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Caution:
Exercise caution when stopping services. If you do not know what a service does or are unsure of the ramifications of stopping the service, leave it alone. Some services are critical to Windows XP's operations, so make sure you understand what the service is before you disable it.
Open Control Panel/Administrativ e ToolsServices or else select Start/Run, type services.msc, and click OK. Either way, you see the Services console.
Notice that on the General tab, you see a Startup Type drop-down menu. If you want to change an automatic service to manual, select Manual here and click OK. As a general rule, don't disable a service unless you are sure you will never use it. However, manual configuration allows the service to be started when you find it necessary, thus speeding up your boot time. However, before you change a service to manual, look at the Dependencies tab. This tab shows you which other services depend upon the service you are considering changing.

Tip:

The Indexing service and the System Restore service take up a lot of disk space and system resources across the board. You can live without the Indexing service but I suggest that you keep using System Restore. It works great when you are in a bind and this is one case where the loss of speed may not be worth the ramifications of not using System Restore.

While disabling services, check and make sure that IIS (internet information server) is not installed and running if you do not want to run a web server, ftp, or mail server. If you find it, you can uninstall from the control panel. If you only want to run one of the 3 services it provides, disable the other 2 (the 3 should be HTTP server, FTP server, & SMTP server).


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Deleting System Softwares:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

XP hides some system software you might want to remove,
such as Windows Messenger, but you can tickle it and make
it disgorge everything. Using Notepad or Edit,
edit the text file /windows/inf/ sysoc.inf, search for
the word 'hide' and remove it. You can then go to the
Add or Remove Programs in the Control Panel, select
Add/Remove Windows Components and there will be your prey,
exposed and vulnerable.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Creating Shutdown Icon or One Click Shutdown:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Navigate to your desktop. On the desktop, right-click
and go to New, then to Shortcut (in other words, create
a new shortcut). You should now see a pop-up window
instructing you to enter a command line path.
Use this path in "Type Location of the Item"
SHUTDOWN -s -t 01
If the C: drive is not your local hard drive,
then replace "C" with the correct letter of the hard
drive. Click the "Next" button. Name the shortcut and
click the "Finish" button. Now whenever you want to
shut down, just click on this shortcut and you're done.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Making Google the Default Search Engine in Internet Explorer:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Open registry editor by going to Start then Run and entering regedit and navigate to following three keys separately and change it as shown below:

[HKEY_CURRENT_ USER\Software\ Microsoft\ Internet Explorer\Main]
"Search Page"="http://www.google. com"
"Search Bar"=" http://www.google. com/ie"
[HKEY_CURRENT_ USER\Software\ Microsoft\ Internet Explorer\SearchURL]
""=" http://www.google. com/keyword/ %s"
[HKEY_LOCAL_ MACHINE\SOFTWARE \Microsoft\ Internet Explorer\Search]
"SearchAssistant"=" http://www.google. com/ie" .

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Disabling the use of Win Key:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

If your are a gaming freak then you must be sick of the Win key
in your keyboard. To disable use of Win key, open registry by going
to Start then Run and entering regedit. Navigate to
[HKEY_LOCAL_ MACHINE\SYSTEM\ CurrentControlSe t\Control\ Keyboard Layout].
In this look for value of "Scancode Map".
Its binary data so be extra careful:

Is this bolg useful?

Rate

S U N D A R R A J A N

Followers