Вы находитесь на странице: 1из 12

Windows NT: Vista

Softwares and Utilities


Handbook v. 1
Windows NT: Vista - Softwares and Utilities

Introduction
This is a manual written to help people increase their experience on a Vista based machine. I decided
to write this manual because people thought it would be a good idea to share my knowledge to help
others, so now I hereby start writing this manual.

This paper consists of my own experiences and no one else's. The examples are brought from the
equipment and softwares that I have been using for the past couple of years and terminologies will be
defined by me. No secondary research was done for this manual. Some of you might say "oh well how
is this manual reliable, then?" Simple answer: it is how I secured and configured my systems over the
years and it has been working thus far. Terminologies are defined through how I interpret them and
how they are used.

There will also be numerous "interesting facts" on what you can do in order to make your
communications and experiences better. I will go over softwares and useful utilities that will help you
understand your computer in and out.

Who am I?

I am a competent user of technology and have been using computers for the past few years. I am an
individual who has been learning about how to use computers for more than just Word processing. I
have been running multiple instances of operating systems in one computer to see what would
happen, and to expand my knowledge. Being an Information Technology University student does
indeed help the expansion of my knowledge in hopes to teach you new things about how to use a
computer.

What is a computer?

In the most basic terms, we define a computer as an equipment that has a processor in it. The
computer, in turn, helps an individual with everyday tasks and enable global communications through
telecommunications and other means of networking. Computers enable research through web portals
and scholarly databases. Many people use computers today (2009) because of their lowerings in prices
and physical size. They have become more affordable over the years and thus make it flexible for many
people to use.

Users may do legal and illegal things on their computers such as cracking algorithms and hacking
computer systems. This manual will not abide to any illegal activities but only the legal ones that will
benefit the user of the computer.

FLJR90 2
Windows NT: Vista - Softwares and Utilities

Vista Tips & Tricks


Important: Choosing a good account password

Good account passwords enable higher security when faced against programs designed to crack them.
By cracked we mean that programs will keep on guessing the algorithms until it finds your password.
For a good password, it should consist of alphanumeric variables (i.e. 123abc). Microsoft has
designated a website for strong password creations.

If you are wondering whether or not your password is safe you may decide to check them with
Microsoft's Password Checker where it will tell you how strong, or weak, your password is.

For more information on how to make a strong password you may want to check Microsoft's "How to
create" a strong password.

Ways to performance in Vista

There are many ways you can make your computer faster. Three of them are:

• Stopping services
• Decreasing visual appearance
• Defragging hard disk

Stopping Services

Stopping services is quite simple. To access the services window you go Start > Control Panel >
Administrative Tools > Services. In basic terms, services enable the computer to run. Without
specific services (i.e. nvidia services), you will not have any display because you need that service to
have display. Same goes with IP services, and so on. You may stop services such as Tablet PC, Smart
Card and Bluetooth services if you never use them.

Once in the services window, you may stop a service by doubleclicking it, then changing the startup
type to "Manual." This means that when you turn on your computer, it will not boot unless you want
it to boot (i.e. through the execution of a program). Having a startup type as "Automatic" means that
when you turn on your computer, it will start. "Automatic (Delayed)" means that it will start once it is
starting, but it may take longer for it to start. If there are too many automatic services, some of them
will time out if they take too long to load. Having a service as Automatic Delayed means that it may
take as long as it wants. To stop the service, you click stop. To start it, you click start. Simple, right?

Now lets make a script called a batchfile. This batchfile will be programmed to start and stop services.

FLJR90 3
Windows NT: Vista - Softwares and Utilities

Here's out it goes.

You will need two commands: net stop and net start

To write this program, click on Start > search for notepad > press enter. Once the notepad opens,
type the following:

@echo off
title Backup
net stop "Bluetooth Feature Support"
pause

Click on File > Save as > netstop.bat > press Enter.

To run this program you must be an administrator. Rightclick the newly created netstop.bat and click
on Run as Administrator. When this program runs it will stop the service called Bluetooth Feature
Support. All you do is type in between the quotes ("") the service name found in the Services windows
that we were in.

The command @echo off means that it will hide the "title Backup" from being displayed in the black
screen of Command Prompt. Your title is indeed "Backup" but when running the script you will see a
"title Backup" (which will not look appealing). @echo off hides the "title Backup" from appearing. The
command pause will display "press any key to continue..." when the script is done.

The same thing goes with net start batchfiles. net start will start the services that are not running.

Decreasing visual appearances

As you know Vista is full of processes that enable the Vista Aero theme. One way to increase system
speed and response time is to turn off Vista Aero and the other visual features Vista gives you.

To turn off visual you may click on Start > right click My Computer > Properties > Advanced
System Settings > "Settings" under the "Performance" section of the "Advanced" tab. Once you
reach the window you have a choice of Let Windows choose what's best for my computer , Adjust
for best appearance , Adjust for best performance and Custom. Of those you want to click on
Custom and only enable the features you want. The features that are the most useful are the
following:

• Show thumbnails instead of icons


• Show window contents while dragging
• Smooth edges of screen fonts

The rest can be left unchecked. It is your choice. Remember that the more you have the slower your
computer will be depending on your hardware. Also, having less of these also lower the memory usage
of the computer. Know that after you do this, your computer will not look like Vista but more like
Windows Server 2008.

FLJR90 4
Windows NT: Vista - Softwares and Utilities

Defragging your hard disk

Defragging your hard disk basically means that the computer will rearrange system files and other files
so that loading times are faster. Such an example is when you are playing a game the processor
continuously reads files. If the files are not properly located, the processor has to look for them. This
does not change performance a whole lot but it is still nice to have a non-fragmented hard disk. It will
lower chances of problems which could lead to hard disk malfunction.

To run a disk defragmenter in Vista, you go to Start > type Disk Defragmenter > press Enter. You
may decide to change the schedule and run the disk defrag. It's that easy. It is recommended that
leave your defragger to run on a schedule.

Windows Safe Mode

Safe Mode is a useful way of getting rid of infected computers. Examples of computers being infected
are when they keep crashing i.e. getting the BlueScreen "of death." When you boot into Safe Mode,
your computer only boots the system critical files (such as the display drivers, etc). Everything else
such as your antivirus will not run. This is useful because since it does not autorun executables except
the important once, the virus will not run. Since Safe Mode can be ran without Networking, the virus
cannot connect back to its home servers (if the server has some).

To boot into safe mode, click on Start > type msconfig.exe. Once the screen pops up, click on the
boot tab and under the boot options, click on safe boot and select the minimal bullet. Then reboot
your computer.

Once you are done running your antivirus in safe mode, go back to msconfig.exe and uncheck the
safe boot box or else when you reboot it will still go in safe mode.

The safest safe mode you can choose is minimal where you will have no connection to the Internet.
This is useful because if the virus, again, needs an Internet connection to send your private data, then
it will not be able to. Having no Internet connection will limit ghost-downloaders that download
viruses on your computer without you ever knowing.

Unlocking Super Administrator

In Windows Search type cmd then right click it Run as Administrator.

When the black window opens type the following:

net user administrator (password)


net user administrator /active:yes

Now log out, and you will see an Administrator account. The password is whatever you put after the
net user administrator.

FLJR90 5
Windows NT: Vista - Softwares and Utilities

When in administrator, you don't have the User Account Control asking you if you're sure you want
to start a program. I advice not to use the super administrator account because if you get a virus on it,
it can effect your other users (aka whole laptop/desktop). Whereas if you're using an account that isn't
Administrator, the security is higher.

Use the superadmin's account at your own risk.

Unlocking Software

When you want to delete a file and it doesn't want to delete because of File is in use there is a way to
delete it. There is a system utility called Unlocker. Rightclick the file, then click the Unlocker. After
clicking, it will tell you which programs are using the folder. Click on "unlock all" and the programs will
unlock themselves from the folder. You will then be able to delete the file.

DirectX Diagnostics

DirectX Diagnostics basically tells you what your computer's specifications are, all the hardware
including the screen resolution, its refresh rate, your RAM (memory), your processor, graphics card,
and more.

To access this, you must click on Start > type dxdiag.exe > press Enter.
There might be a popup message asking you for digital signatures with an option of yes or no. Click on
yes.

This is useful when you want to know whether or not you can run a specific software/program that
requires good hardware. You may now access DirectX Diagnostics console and find out whether or
not your hardware can run that specific program.

Task Manager

Task manager is where you go to stop a process. If a process presses you can access the task manager
by holding Ctrl Alt Del and click on Task Manager. Other ways to access the task manager would be
by rightclicking the startbar and clicking on Task Manager. The hotkey to open the task manager
would be Ctrl Shift Esc.

If you want to see your processes more in detail you can access the Performance Daemon by clicking
on the Performance section. You will be prompt the User Account Control -- press accept. In this
window you will see your memory, processor, network and disk usage.

FLJR90 6
Windows NT: Vista - Softwares and Utilities

Backup Batchfile (using xcopy)

Okay so say you just bought an external hard drive for backup purposes and you do not want to
manually drag new songs you just got, or new documents you just wrote. An easy way to do this is by
creating a batchfile (such as the net stop and net start batchfile that we created earlier). Instead now it
will be used for backing up using other commands.

Open a notepad and save as xcopyusb.bat.

Type the following:

@echo off
xcopy "C:\Users\*.*" "G:\BackupComputer\Users\*.*" /D /V /I /S /Y
pause

Some of you might be wondering what *.* means. An asterisk basically means 'all/everything'. So if we
use *.* at the end, it means that All files of All extensions will be added. If you only want music to be
transfered you simply do *.mp3 (or whatever file format you have) at the end, this will put All files
with the .mp3 as a file extension.

Now for the slightly more complicated part. The /D /V /I /S /Y commands all have a purpose. If you
want to know what these letters mean, go in your cmd screen and type xcopy /?

This will show you all of the commands and what they do. You can add as many as you want but some
are more important than others. You decide upon your personal preferences. If you want a normal
backup batchfile, then just type /D /V /I /S /Y at the end of it. This will create a time stamp and delete
old timestampds (replacing old timestamps to new timestamps). So if you add a word to a document
and click run the batchfile, it will add that word in the backup version since its timestamp is newer
than the previously backed up one.

Having this program will save you time and effort to backup one file at a time. Don't forget, in the
example I used G: because it's my default for my external hard drive. You need to put your hard drive
root in the command so it can access your external hard drive. If your external drive is in root F: then
you have to change the G: in my example to F:

Repairing your Internet

There are three ways that I fix my Internet when I have a problem. The three ways are:

1. Open your cmd.exe and type ipconfig /renew to renew your default gateway and to review
your IPv4.
2. Unplug your router and modem your ten seconds then plug in your modem, wait five seconds
then plug your router. Wait until you receive a signal. If all the computers on your network
lose the Internet and this does not fix the problem, then chances are your ISP (Internet Service
Provider) is experiencing maintenance or problems.

FLJR90 7
Windows NT: Vista - Softwares and Utilities

Private IP Changes between Wired and WiFi

Unless your computer is hardcoded through Dynamic Host Configuration Protocol in your Router,
your private Internet Protocol will change when you go from direct connection to wireless.

For example, your private address might be 192.168.64.100 while you're directly plugged in to the
Internet, but when you change to wireless it might go to 192.168.64.101. This might not seem bad but
if you are hosting servers, they require you to open ports. Those ports are opened to specific private IP
addresses (i.e. 192.168.64.100). If the IP changes to, say, 192.168.64.101, the ports are still opened but
for the wrong IP. The servers will go out of service.

Securing Mozilla Firefox

Most of you, as I do, love to save passwords when using Mozilla Firefox. Did you know that if you lend
someone your laptop/desktop they can see your saved passwords unless you have a master password
put in place? This means that all your saved passwords can be leaked by one person if they have the
chance of check at the right place.

To create a master password, click on Tools > Options > Security > Master Password.

When you have a Master Password, this will block everyone from seeing your saved passwords except
you. This will increase security and privacy to all your saved password. When you want to access a
website where you have a saved password, you will need to input the master password. This is
exceptionally useful because if someone uses the saved passwords, they cannot access the secure page.

Of all the browsers out there, there are different ways on making them secure. This is just for Mozilla
Firefox. Other browsers out there include Google Chrome, Internet Explorer and Opera.

Securing Windows Live Messenger

Like many other Instant Messaging clients you can decide to save chatlogs. I will focus on Windows
Live Messenger because most people use it. When saving chat logs you may choose to save them as
.html or .txt. Both of them are good to save passwords but both of them are not safe. Someone may
enter your My Chat Log directory and read your chat logs. There is one way that I have learned that
saves your chat logs with encryption technology. When someone will want to open the chat logs, they
will be prompted a password. Without that password the user will need to crack its algorithm which is
no easy ask to the "average joe."

A simple and easy way to encrypt your chat logs would be through Patchou's Windows Live
Messenger Plus!. This acts as an MSN add-on and runs normally along with Windows Live Messenger.

To encrypt your chat logs, log in your Windows Live Messenger (of course, after installing Plus!) and
click on the Plus! list on the top (where the File, Contacts, etc, line is).

Once you click on Plus! click on Preferences & Options where a window will open. Click on the tab

FLJR90 8
Windows NT: Vista - Softwares and Utilities

entitled Conversations and the side tab called Logs Encryption. After you are in the Logs Encryption
part, check the box saying Protect my chat logs with a password where under you have Size of the
key to generate for encryption, in bits: . Remember that higher the number, the more secure the
chat logs are. Also remember that higher the number, the longer it will take the decrypt the file once
you enter your password to review it. Insert your password in the New Encryption Password and
New Password Hint. This will keep your chat logs safe from unauthorized view (again, unless they
become cracked by a bad individual).

Securing computer from Hackers

One way to make it hard for hackers to successfully penetrate your computer is by enabling your
Firewall. You may choose to install a third party firewall or use the default Windows Firewall.

To access the Windows Firewall click on Start > type Firewall > Windows Firewall.

From what window you may decide to Allow a program through Windows Firewall or Turn
Windows Firewall on or off which is not a recommended. Firewalls prevent unauthorized access to
your system (unless the hacker is very good and passes it).

When you allow programs through a firewall that means the firewall does not block the
communication requirements of the program. Since the program will be communication through the
Internet it requires specific ports (such as TCP and UDP) which will enable ongoing and outgoing
traffic to and from your network.
If your firewall is blocking the program that requires those ports, it will not be able to communicate
successfully.

An example of a third party Firewall would be the McAfee's Firewall and Comodo Firewall.

Securing your computer from malware

Microsoft offers a free solution to securing your Windows machine. The software Windows Defender.
Windows Defender malware definitions will be updated through Windows Update (where all of your
Windows updates will be taking place). Windows Defender acts like any other scanner -- it checks for
"bad" files in your computer.

There are many other malware scanners such as AVG, avast!, MalwareBytes and ComboFix
Securing your computer: Updating computer

To update your computer you have to run a Windows Update. A Windows Update checks for updates
to all Windows products softwares in your computer. To may run a Windows Update by going to
Start > type Windows Update > press Enter. Once the window opens click on Check for updates.

You have the option to change the schedule of Windows Defender. You can make it so it checks for
updates everyday at a specific time, once a week, once a month, etc. You can disable it (which is not
recommended) and you can tell it to download, but not install without your permission.

FLJR90 9
Windows NT: Vista - Softwares and Utilities

Remember that when you have more than one scanner on your computer you should not run more
than one instance at a time. If you run more than one instance at a time your computer will get really
slow and you will lose performance which will then lower your experience on the computer.

Interesting Things to do With your Computer


Live Booting an Operating System

As mentioned in the Introduction, booting from a USB Storage Device is one of the best ways to do
secure transactions. Depending on the activity that you are doing, you do not want keyloggers and
viruses to log what you are doing. Private activities such as online banking are made to be private
where only you have the authority and knowledge of what is going on.

First thing is first, what are we going to boot? Will it cost anything? It depends. If you have a spare 1GB
USB Storage Device such as a flash drive around the house, it will suffice. The operating system that we
will be booting off of it will be Linux. It is not like any other Linux, though, it is called a Live
Distribution of Linux, where the hardware requirements are lower. Live distribution do not consist of
user accounts 'nor storage. All storage will be on a separate flash drive (unless you decide to dual
partition your Flash Drive. This is not recommend as your USB Storage Device for this example will be
1GB.

Where can you download such an operating system? The one we're going to use will be Debian Live
which is based on Debian Linux but acts as a Live Distribution. Once you install the appropriate .ISO
(disc image) file, transfer it to your Desktop for easy use. Since the disc image will be lower than 1GB, it
will fit on your USB Storage Device.

Once Debian Live has installed, download a program called unetbootin where you will use that
program to push the disc image as a proper, bootable operating system. Before running unetbootin it
is important to make sure you are pushing the disc image to the proper drive. If you push it to your C:
drive, it will corrupt your Windows Operating System. Make sure that unetbootin will get pushed to
your USB Storage Device. Once you have browsed to your disc image, click on "accept" or the
equivalent. It will prepare the filesystem, then install the appropriate files to your USB Storage Device.

Once it is completed, it will ask you to restart your computer (you do not have to and you may do it
later). Now, if everything worked as it should have, when you reboot your computer access your
Boot-Order (which is, on my HP laptop, F12), and choose USB Storage Device, and voila, you are
ready.

The computer will use the USB Storage Device rather than your Internet Storage (where your Vista is).
If you install something malicious such as malware or viruses in your live Linux and reboot your
computer, nothing will happen. When you reboot, the Linux returns to the way it was prior to it being
booted. Changes made to the Linux will not stay.

This will work for any distribution of Linux, so explore!

FLJR90 10
Windows NT: Vista - Softwares and Utilities

Running Multiple Operating Systems at the Same Time

Have you ever wondered how to run multiple operating systems at the same time for free? There are
many products out there that enable such activities. Examples of these softwares are Microsoft's
Virtual PC and Sun Microsystem's Virtual Box.

Microsoft's Virtual PC

Virtual PC is a free alternative to running multiple instances in a computer. This software works best
for running multiple Windows instances (i.e. running XP, Vista and Windows 7). If you want to run
Linux along with a Windows operating system, Virtual Box is relatively better (which we will go more
into detail shortly). Download Virtual PC from the link provided above, and install it. The registration
key is already given to you since it is free, thus you do not need to do anything else.

When you run Virtual PC for the first time you will be prompt with the New Virtual Machine
Wizard. From here on end you just follow the wizard, but hey, lets go through it together.

First of all, create a virtual machine, then press Next.


Second of all, Name your machine and browse to the location you want it to be, press Next.
Third of all, select with operating system you will install, press Next.
Fourth of all, select Adjusting the RAM. Click Next.
Basically, you are telling Virtual PC how much the operating system's maximum
memory usage will be. If you give it 1GB of RAM, it will only use 1GB and will not go
over that limit. If you give it 512MB of RAM, it will not go above 512MB. We're basically
creating a computer here... within your computer. That computer will have x amount
of RAM.
Fifth of all, click on A new virtual hard disk. Click Next.
Sixth of all, decide how big you want the hard drive to be and its new location. Click Next.
Seventh of all, click Finish.

Once you finish these seven steps, you will have your Operating System listed in the list. To install the
Operating System, input your CD in your CD tray, and start the Virtual Machine. If this does not work
check your Operating System's Virtual PC settings and make sure it is trying to read the right CD.

Sun Microsystem's Virtual Box

This free alternative will enable you to install instances other than Windows. I've had a better
experience with Virtual Box than Virtual PC.

First, download and install Virtual Box on your system with the link provided.
Second, click on new.
Third, click on Next
Fourth, select your operating system you'll be installing, and the name of it. Click Next
Fifth, click on New... to create a new virtual hard drive. Click on Next on the popup window.
Sixth, click Next and make the hard drive Dynamically expanding storage then click next
Seventh, choose how big you want the hard drive to be, click Next

FLJR90 11
Windows NT: Vista - Softwares and Utilities

Eight, click Finish


Ninth, click Next
Tenth, click Finish

Once your operating system is seen in the list, click on CD/DVD-ROM. From there you click on
Mount CD/DVD Drive and you choose whether you will install from a .ISO or a CD. They both work.
The fascinating thing about Virtual Box is that you can decide to install from ISO or the physical disc.
Say you still have that Debian Live ISO you downloaded earlier ... You could tell Virtual Box to read
that ISO to install the operating system. It will run on top of Vista.

A small sample of Linux distributions I use/used on Virtual Box are Debian, Ubuntu and Fedora.

What's good about using virtual machining is that if you get a virus in it, it will not get on your vista
(unless you have shared folders but then again, the chances are low unless the virus specifically targets
shared folders).

FLJR90 12

Вам также может понравиться