You are on page 1of 47

2010

bench3 Inc,

Haja Peer Mohamed H

[JANUARY 2010]
© 2010, bench3 Inc
bench3

CONTENT:
1. LIST OF ALL SAP TRANSACTION CODES RELATED TO ADMINISTRATION [2]

2. WHAT IS NEW IN WINDOWS 7 | DIFFERENCE BETWEEN WINDOWS VISTA AND WINDOWS 7 [8]

3. NETWORKING IN NEW WAYS IN WINDOWS 7 [11]

4. 32 AND 64 BIT VERSIONS OF WINDOWS | BENEFITS OF 64 BIT WINDOWS SERVER [12]

5. CUSTOMIZING THE TASKBAR IN WINDOWS VISTA [14]

6. INSPIRATION FOR THE WEEK | A REAL STORY THAT HAPPENED IN JAPAN. [16]

7. LEADERSHIP IS ESSENTIALLY AN OTHER-CENTRED ACTIVITY [17]

8. CD OR DVD DRIVE MISSING OR NOT RECOGNIZED ISSUE IN WINDOWS [20]

9. PROTECT AND SHARE YOUR OFFICE DOCUMENTS ONLINE [24]

10. KNOW THE DIFFERENCE BETWEEN SHUTDOWN AND RESTART [26]

11. CLEAN UP THE TASKBAR TRAY ICONS | TURN OFF THE TRAY ICONS COMPLETELY [28]

12. CHANGE THE ICON FOR ALL FILES OF A TYPE IN WINDOWS 7 AND VISTA [30]

13. ALL NEW KEYBOARD SHORTCUTS IN WINDOWS | FOR XP VISTA AND WINDOWS SEVEN [31]

14. LEADERSHIP DEPENDS ON THE SITUATION [36]

15. LOCK YOUR FILE TYPES IN WINDOWS 7 AND WINDOWS VISTA [38]

16. SUCCESS OF ANY RELATIONSHIP STARTS WITH UNDERSTANDING | STORY ON MARRIAGE [39]

17. HOW TO CREATE REGISTRY PATCHES | EXPORT AND IMPORT REGISTRY PATCHES [41]

18. PROTECT PEN DRIVE FROM VIRUSES | FREE ANTIVIRUS FOR USB FLASH DRIVE [45]

www.bench3.com Jan 2010 - Page 1


bench3

LIST OF ALL SAP TRANSACTION CODES RELATED TO ADMINISTRATION |


SAP T-CODES FOR ADMINS
Here Is The List Of All T-Codes Posted In Alphabetical Order. These Transaction Codes May Be Useful For
SAP System Administration.

Also Refer (Online):


What Is SAP And ERP And How To Pronounce SAP
Understanding Basis In SAP | Basis Is Like Operating System For R/3
AL01 SAP Alert Monitor CREF Cross-reference
AL02 Database alert monitor BD64 Create a Distribution Model between SAP
AL03 Operating system alert monitor R/3 and SAP XI
AL04 Monitor call distribution BSVW Linkage Status Update-Workflow Event
AL05 Monitor current workload CMOD Enhancements
AL06 Performance: Upload/Download DB01 Analyze exclusive lock waits
AL07 EarlyWatch Report DB02 Analyze tables and indexes
AL08 Users Logged On DB03 Parameter changes in database
AL09 Data for database expertise DB11 Early Watch Profile Maintenance
AL10 Download to Early Watch DB12 Overview of Backup Logs
AL11 Display SAP Directories DB13 Database administration calendar
AL12 Display table buffer (Exp. session) DB14 Show SAPDBA Action Logs
AL13 Display Shared Memory (Expert mode) DB15 Data Archiving: Database Tables
AL15 Customize SAPOSCOL destination DB16 DB System Check: Monitor
AL16 Local Alert Monitor for Operat.Syst. DB17 DB System Check: Configuration
AL17 Remote Alert Monitor for Operat. Syst. DMIG Start Transaction for Data Migration
AL18 Local File System Monitor DB2 Select Database Activities
AL19 Remote File System Monitor DB20 DB Cost-Based Optimizer: Tab. Stats
AL20 EarlyWatch Data Collector List DB21 DB Cost-Based Optimizer: Config.
AL21 ABAP Program analysis DB24 Database Operations Monitor
AL22 Dependent objects display DB26 DB Profile:Monitor and Configuration

www.bench3.com Jan 2010 - Page 2


bench3

DB2J Manage JCL jobs for OS/390 RZ06 Alerts Thresholds Maintenance
DBCO Database Connection Maintenance RZ08 SAP Alert Monitor
FILE Cross-Client File Names/Paths RZ10 Maintenance of profile parameters
NACE WFMC: Initial Customizing Screen RZ11 Profile parameter maintenance
OAA1 SAP ArchiveLink: Maint.user st.syst RZ12 Maintain RFC Server Group Assignment
OAA3 SAP ArchiveLink protocols RZ20 CCMS Monitoring
OAA4 SAP ArchiveLink applic.maintenance RZ21 Customize CCMS Alert Monitor
OAAD ArchiveLink Administration Documents SA38 ABAP/4 Reporting
OAC2 SAP ArchiveLink: Globaldoc. types SAD0 Address Management call
OAC5 SAP ArchiveLink: Bar code entry SADC Address: Maint. communication types
OACA SAP ArchiveLink workflow parameters SALE Display ALE Customizing
OAD0 SAP ArchiveLink: Objectlinks SAINT Plug-in Installation
OAD2 SAP ArchiveLink document classes SARI Archive Information System
OAD3 SAP ArchiveLink: Link tables SAR3 Customizing Archiving
OAD4 SAP ArchiveLink: Bar code types SAR4 Define Archiving Class
OAD5 SAP ArchiveLink: Customizing Wizard SAR5 Assign Archiving Class
OADR SAP ArchiveLink: Print list search SAR6 Archiving Time Generator
OAM1 SAP ArchiveLink: Monitoring SARA Archive management
OAOR SAP ArchiveLink: Storeddocuments SARL Call of ArchiveLink Monitor
OARE SAP ArchiveLink:St.syst.return codes SARP Reporting (Tree Structure): Execute
OS01 LAN check with ping SART Display Reporting Tree
OS03 O/S Parameter changes SB01 Business Navigator - Component View
OS04 Local System Configuration SB02 Business Navigator - Process flow vw
OS05 Remote System Cconfiguration SBAS Assignments to Process Model Elemts
OS06 Local Operating System Activity SC38 Start Report Immediately
OS07 Remote Operating SystemActivity SCAT Computer Aided Test Tool
OSS1 Logon to Online ServiceSystem SCC0 Client Copy
OY18 Table history SCC1 Client Copy - Special Selections
OY08 Development Class Overview SCC2 Client transport
PFCG Activity Group SCC3 Client Copy Log
PFUD Authorization Profile comparison SCC4 Client administration
RLOG Data migration logging SCC5 Client Delete
RZ01 Job Scheduling Monitor SCC6 Client Import
RZ02 Network Graphics for SAP Instances SCC7 Client Import – Post Processing
RZ03 Presentation, Control SAP Instances SCC8 Client Export
RZ04 Maintain SAP Instances SCC9 Remote Client Copy

www.bench3.com Jan 2010 - Page 3


bench3

SCCL Local Client Copy SE17 Generate Table Display


SCDO Display Change DocumentObjects SE30 ABAP Objects Runtime Analysis
SCMP View / Table Comparison SE32 ABAP Text Element Maintenance
SCOM SAPcomm: Configuration SE33 Context Builder
SCON SAPconnect - Administration SE35 ABAP/4 Dialog Modules
SCPF Generate enterprise IMG SE36 Logical databases
SCPR1 Customizing Profiles : Maintenance Tool SE37 ABAP Function Modules
SCPR2 Comparing Customizing profiles SE38 ABAP Editor
SCUA Central User Administration : Distribution SE39 Splitscreen Editor: Program Compare
Model Assigment SE40 MP: Standards Maint. and Translation
SCUG Central User Administration Structure SE41 Menu Painter
Display SE43 Maintain Area Menu
SCUL SE51 Screen Painter
SCUM Central User Administration Field SE52 Parameterized screenpainter call
Selection SE54 Generate table view
SCU0 Table Analyses And Comparison SE55 Internal table view maintenance call
SCU1 Table Comparison - Export to Tape SE56 internal call: display table view
SCU2 Table Comparison Against Tape SE57 internal delete table view call
SCU3 Table History SE61 R/3 Documentation
SD11 Data Modeler SE62 Industry Utilities
SDBE Explain an SQL Statement SE63 Translation: Initial Screen
SECR Audit Information System SE71 SAPscript form
SE01 Transport and Correction System SE72 SAPscript Styles
SE02 Environment Analyzer SE73 SAPscript font maintenance (revised)
SE03 Transport Utilities SE74 SAPscript format conversion
SE06 Set up Workbench Organizer SE75 SAPscript Settings
SE07 Transport System Status Display SE76 SAPscript: Form Translation
SE09 Workbench Organizer (Initial Screen) SE77 SAPscript Translation Styles
SE10 Customizing Organizer SE78 SAPscript: Graphics administration
SE11 Data Dictionary Maintenance SE80 Object Navigator
SE12 Data Dictionary Display SE81 Application Hierarchy
SE13 Maintain Technical Settings (Tables) SE82 Application Hierarchy
SE14 Convert Data Dictionary tables on SE84 R/3 Repository Information System
Database Level SE85 ABAP/4 Repository Information System
SE15 Repository Info System SE86 ABAP Repository Information System
SE16 Display Table Content SE88 Development Coordination Info System

www.bench3.com Jan 2010 - Page 4


bench3

SE89 Maintain Trees in Information System SM37 Background job overview


SE91 Maintain Messages SM38 Queue Maintenance Transaction
SE92 New SysLog Msg Maintenance as of 46A SM39 Job analysis
SE93 Maintain Transaction Codes SM49 Execute Logical Commands
SE94 Customer enhancement simulation SM50 Work Process Overview
SE95 Modification Browser SM51 List of SAP Servers
SEPS SAP Electronic Parcel Service SM54 TXCOM maintenance
SERP Reporting: Change Tree Structure SM55 THOST maintenance
SEU Repository Browser SM56 Number Range Buffer
SF01 Client-Specific File Names SM58 Asynchronous RFC Error Log
SFAW Field Selection Maintenance SM59 RFC Destinations (Display/Maintain)
SIAC1 Web Object Administration SM60 Borrow/Return Objects
SHDB Record Batch Input SM61
SICK Installation Check SM62
SIN1 SAPBPT: Inbox SM63 Display/Maintain Operating Mode Sets
SINA SAPBPT: Maintain Standard Config. SM64 Release of an event
SLG0 Application Log: ObjectMaintenance SM65 Background Processing Analysis Tool
SLIN ABAP: Extended Program Check SM66 System-wide Work Process Overview
SM01 Lock Transactions SM67 Job scheduling
SM02 System Messages SM68 Job administration
SM04 User Overview SM69 Display/Maintain Logical Commands
SM12 Display and Delete Locks SMEN Dynamic menu
SM13 Display Update Records SMGW Gateway Monitor
SM14 Update Program Administration SMLG Maintain Logon Group
SM21 System log SMLI Language import utility
SM23 System Log Analysis SMLT Language transport utility
SM28 Installation Check SMOD SAP Enhancement Management
SM29 Model Transfer for Tables SMT1 Trusted Systems (Display <-> Maint.)
SM30 Call Up View Maintenance SMT2 Trusting systems (Display <->Maint.)
SM31 Table maintenance SMW0 SAP Web Repository
SM31_OLD Old Table Maintenance SMX Display Own Jobs
SM32 Maintain Table Parameter ID TAB SNRO Number Range Objects
SM33 Display Table ParameterID TAB SO02 SAPoffice: Outbox
SM34 Viewcluster maintenancecall SO03 SAPoffice: Private Folders
SM35 Batch Input Monitoring SO04 SAPoffice: Shared Folders
SM36 Batch request SO05 SAPoffice: Private Trash

www.bench3.com Jan 2010 - Page 5


bench3

SO06 SAPoffice: Substitutionon/off SOLI Load OLE type info


SO07 SAPoffice: Resubmission SOPE Exclude Document Classes
SO10 SAPscript: Standard Texts SOTD SAPoffice: Maintain Object Types
SO12 SAPoffice: User Master SOY1 SAPoffice: Mass Maint. Users
SO13 SAPoffice: Substitute SOY2 SAPoffice: Statistics data collect.
SO15 SAPoffice: DistributionLists SOY3 SAPoffice: Statistics Evaluation
SO16 SAPoffice: Profile SOY4 SAPoffice: Access overview
SO17 SAPoffice: Delete Shared Trash SOY5 SAPoffice: Inbox overview
SO18 SAPoffice: Shared Trash SOY6 SAPoffice: Document overview
SO19 SAPoffice: Default Documents SOY7 SAPoffice: Folder overview
SO21 Maintain PC Work Directory SOY8 SAPoffice: Mass Archiving
SO22 SAPoffice: Delete PC Temp. Files SOY9 SAPoffice: Inbox Reorg.
SO23 SAPoffice: DistributionLists SOYA SAPoffice: Change folder owner
SO24 SAPoffice: Maintenance of default PC SP00 Spool and Relate Area
SO28 Maintain SOGR SP01 Spool Control
SO30 SAPoffice: Reorg. SP02 Display output Requests
SO31 Reorganization (daily) SP03 Spool: Load Formats
SO36 Create Automatic Forwarding SP11 TemSe Contents
SO38 SAPoffice: Synchr. of Folder Auths. SP12 TemSe Administration
SO40 SAPoffice: Cust. LayoutSet MAIL SPAD Spool Management
SO41 SAPoffice: Cust. LayoutSet TELEFAX SPAM SAP Patch Manager (SPAM)
SO42 SAPoffice: Cust.Layout Set TELEFAX_K SPAU Display Modified DE Objects
SO43 SAPoffice: Cust.Layout Set TELEFAX_M SPCC Spool Consistency check
SO44 SAPoffice: Cust. LayoutSet TELEX SPDD Display Modified DDIC objects
SO70 Hypertext: Display/Maint. Structure SPHA Telephony administration
SO71 Test plan management SPIC Spool : Installation Check
SO72 Maintain Hypertext Module SPRM Current Customizing
SO73 Import graphic into SAPfind SPRO Customizing
SO80 SAPfind: Free Text Retrieval Dialog SQ01 SAP Query: Maintain queries
SO81 SAPfind: Free Text Indexing (Test) SQ02 SAP Query: Maintain funct. areas
SO82 SAPfind: Free Text Retrieval Batch SQ03 SAP Query: Maintain user groups
SO95 Pregenerated Search Queries - Selec. SQ07 SAP Query: Language comparison
SO99 Put Information System SQVI QuickViewer
SOA0 ArchiveLink Workflow document types SSAA System Administration Assistant
SOBJ Attribute Maintenance Objects SSCA Appointment Diary: Administration
SOLE OLE Applications SRZL CCMS

www.bench3.com Jan 2010 - Page 6


bench3

SSM1 Session Manager generation call SU01 Maintain User


SSM5 Create Activity Group SU01D Display users
ST01 System Trace SU02 Maintain Authorization Profiles
ST02 Setups/Tune Buffers SU03 Maintain Authorizations
ST03 Performance, SAP Statistics, Workload SU05 Maintain Internet Users
ST04 Select activity of the databases SU10 Mass changes to User Master
ST05 SQL Trace SU11 Maintain Authorizations
ST06 Operating System Monitor SU12 Mass Changes to User Master Records
ST07 Application monitor SU2 Maintain User Parameter
ST08 Network Monitor SU20 Maintain Authorization Fields
ST09 Network Alert Monitor SU21 Maintain Authorization Objects
ST10 Table Call Statistics SU22 Auth. object usage in transactions
ST11 Display Developer Traces SU24 Disables Authorization Checks
ST12 Application Monitor SU25 Imports SAP Check Indicators defaults
ST14 Application Analysis SU26 Adjust Authorization checks
ST22 ABAP Runtime Error Analysis SU30 Total checks in the area of auth.
ST22 ABAP/4 Runtime Error Analysis SU52 Maintain own user parameters
ST62 Create industry short texts SU53 Display check values
STAT Local transaction statistics SU54 List for Session Manager
STMS Transport Management System SU56 Analyze User Buffer
STUN Performance Monitoring SUPC Profiles for activity groups
STW1 Test Workbench: Test catalog SUPF Integrated User Maintenance
STW2 Test workbench: Test plan SUPO Maintain Organization Levels
STW3 Test workbench: Test package SUIM Repository Info System
STW4 Test Workbench: Edit test package SWDC Workflow Definition
STW5 C maintenance table TTPLA SXDA Data Transfer Workbench
STZAC Maintain time zone act.in client TU02 Display Active Parameters
STZAD Disp.time zone activat.in client USMM Customer measurement
SUMM Global User Manager

Labels: Programming, SAP

www.bench3.com Jan 2010 - Page 7


bench3

WHAT IS NEW IN WINDOWS 7 | DIFFERENCE BETWEEN WINDOWS VISTA


AND WINDOWS 7
If you’ve struggled with getting Windows Vista to work on your computer, you can breathe a sigh of
relief. Windows 7 isn’t worse. If you are an Vista Victim, here is something that you should know what
you will get if you upgrade your system to Windows 7.

Yeah, that’s definitely damning with faint praise. I don’t deny it. Alexander Pope would’ve been proud.

Microsoft learned many lessons during the Vista Wars. It changed a lot of features in Windows 7. But it
didn’t change the driver model — the way hardware interacts with Windows. In fact, interaction with
hardware in Windows 7 is almost indistinguishable from that in Vista Service Pack 1. So if you have
hardware that works with Windows Vista, it will almost certainly work with Windows 7. No changes
required. No new drivers, as long as you don’t do something funny, like switch from 32-bit Vista to 64-bit
Windows 7.

Better Performance
Incredibly, Microsoft tightened up Vista. Windows 7 runs faster than Vista in most circumstances. It takes
less memory. It occupies less space on your hard drive — even after you install Windows Live Essentials.
Some savings and improvements are a tad illusory: Hard drive requirements fell because of a reduction in
space reserved for shadow copies for example. But most people who try Windows 7 find it faster, less of
a hog, and more reliable than Vista. There I go with that faint praise stuff again.

www.bench3.com Jan 2010 - Page 8


bench3

Improved interface
New versions of Windows invariably bring claims of improvements to the interface — and journalists join
in on the “ooohs” and “aaaaahs” whenever Microsoft execs show off their flashy glittergrades — changes
designed to show new sizzle, without really changing the steak. TechnoBling.

In Windows 7, some changes rate as genuinely useful. The new Taskbar (many of us still call it by its
code name, Superbar) makes many daily tasks faster and easier to complete. The Aero Snap feature lets
you drag a window to an edge of the screen and have it automatically resize to half-screen size — a boon
to anyone with a wide screen.

Microsoft ditched the Windows Sidebar in Windows 7. Now gadgets — the little clock and stock ticker and
the like — can float anywhere on the desktop as shown in the above figure). These gadgets could float in
Vista, too, but few Vista users ever figured that out.

Windows 7 has many other glittery improvements:


• Slide show: You can use this feature for your desktop background.
• Taskbar Icons: View pop-up thumbnails of running programs and right-click jump-list menu
options.
• Notification area: Down by the clock, this feature can now be controlled, more or less.
• Gadgets: See them on your desktop by moving your mouse to the Aero Peek area, in the lower-
right corner.
• Font list: It now looks better. Be still, my beating heart.
Search that (finally!) works
Search in Windows 7 works and works well. Its one of the Big difference between vista and Windows 7.
Windows 7 lets you search data outside your computer using Federated Search and the OpenSearch
standard. The new ability to build libraries — similar to the Vista Media Player audio libraries but
extended to all kinds of files — makes organizing and searching simpler.

Security Improvements
I’m told that Pliny the Elder once described the alarm system of ancient Rome by saying, “Even when the
dogs sleep, the goose watches.” User Account Control — the goose of Windows Vista, if you’ll forgive a
transmillennia metaphor — has undergone significant changes in Windows 7. If you don’t change the
original setting, User Account Control security prompts you with the darken-your-screen-and-pray
messages that bugged millions of Vista users. However, the prompts occur infrequently, and only when
there seems to be genuine cause for concern.

www.bench3.com Jan 2010 - Page 9


bench3

Finally, Windows 7 has a few improved security features, but the ones you can see — such as
HomeGroups and the revamped BitLocker drive encryption — bundle old Vista security concepts
differently and make them usable.

More Media And More

Figure: Sticky notes are easier to access and create (and still easy to lose) Paint has a few new features

Windows Media Center gets a facelift in Windows 7, along with a whole bunch of support for different
kinds of video and audio files and in-the-box capabilities to connect to CableCARD and clear QAM tuners.
Several of the tired, old (very old) Windows standbys — Calculator, Paint, WordPad — sport new
interfaces and capabilities (see Figure Above). Windows 7 has better troubleshooting support, enhanced
networking features especially for wireless networks, and hundreds of little improvements.

What you lose


On the flip side, several features in Vista went away in Windows 7. The old Sidebar bit the dust — don’t
need it. The Windows Defender Software Explorer program, which gave you some control over which
programs automatically start on your computer, disappeared, no doubt the victim of enormous volumes
of tech-support phone calls.

Several Vista programs (Windows Mail, Messenger, Movie Maker, Photo Gallery) have been moved out of
Windows, repurposed as free downloads on the Internet.
Labels: Windows 7, Windows Vista

www.bench3.com Jan 2010 - Page 10


bench3

NETWORKING IN NEW WAYS IN WINDOWS 7


In Windows Vista, Microsoft introduced the Network And Sharing Center as the one place to go for most
network-related tasks. The concept annoyed some longtime Windows veteran users, who discovered that
common network tasks they had learned to accomplish with simple shortcuts in Windows XP now
required extra clicks or keystrokes.

Figure: The HomeGroup feature offers a simplified interface for sharing files, printers, and digital media
between computers running Windows 7.

The Windows 7 Network And Sharing Center (shown in Figure) gets a usability overhaul designed to
reduce clutter and make common tasks easier to find.

If your network includes computers running earlier versions of Windows, you’ll need to set up shared
access using more traditional techniques. The differences from Windows XP–based networks are
profound. You can specify different levels of security for sharing and, on individual files and folders stored
on NTFS volumes, you can specify which accounts and groups, if any, are allowed to access those files.

If you’re accustomed to networking in Windows XP, you have a lot of catching up to do. Internet
Protocol version 6 (IPv6) and Internet Protocol version 4 (IPv4) work together, the Link Layer Topology
Discovery subsystem helps you build a visual map of your network. Networking changes that are new in
Windows 7 include a much-improved interface for connecting to wireless access points.
Labels: Networking, Windows 7

www.bench3.com Jan 2010 - Page 11


bench3

32 AND 64 BIT VERSIONS OF WINDOWS SERVER 2008 | BENEFITS OF 64


BIT WINDOWS SERVER

Several editions of Windows Server 2008 support both 32- and 64-bit processors. In fact, these editions
will support both x64 and IA64 processors.

IA64 is based on the Itanium microchip from Intel—Itanium is a 64-bit reduced instruction set computer
(RISC) processor—and while it is in use in very large organizations, has a very small following.
Also Read:
Benefits Of Windows 7 64-bit Operating System
Differences Between 32-bit and 64-bit Versions Of Windows

x64, on the other hand, offers the most important evolution in computing since the release of 32-bit
processors. Because of the exponential nature of microchip technology, 64 bits actually offer significantly
more processing power than simply doubling the capability of 32 bits.
According to Bill Gates, the coming of 64-bit computing will break all the barriers we face today.
That may be true. One thing is certain: x64 machines provide a lot more horsepower than x86 machines.
x64 systems run a series of different processors from the two microprocessor manufacturers: from AMD,
the Opteron or the Athlon 64; and from Intel, the 64-Bit Xeon or the Pentium with EM64T. What’s
exciting about these processors is that they are a lot more affordable than the I64 systems. In addition,
you have a much larger variety of operating systems to choose from: Windows Vista 64-bit edition, as
well as Windows Server 2008 Standard, Enterprise, and Datacenter editions.

Working With Windows Server X64 Bit Editions:


There are two ways to work with an x64 system: run native 64-bit software, or run software that is
compatible but runs in 32-bit mode. You might think that because the x64 versions of Windows Server
and Windows Vista have only been out for a little while that there might not be a lot of applications
available for this version of the OS. But that’s not the case.

According to the Microsoft Web site (see the Windows Server Catalog of Tested Products at
www.windowsservercatalog.com), there are hundreds of applications that run in native x64 mode and
more are coming. In addition, several more can run in 32-bit compatible mode.

www.bench3.com Jan 2010 - Page 12


bench3

So how does x64 measure up? The first thing you’ll notice is that everything—yes, everything—runs
faster. That is as you would expect, but it is surprising to see that even applications that aren’t designed
for the x64 system run faster. Just like the 32-bit version of the operating system, x64 runs a special
Windows on Windows (WOW) session that lets 32-bit applications run inside the 64-bit operating system.
WOW32 sessions provide better performance than even native 32-bit systems. Why is that? Because of
the limitations that x64 finally breaks.

Previously, with a 32-bit system, you needed to use at least Windows Server 2003 Enterprise edition to
gain access to more than 4 gigabytes (GB) of random access memory (RAM), then add the /PAE (physical
address expansion switch) to the Boot.INI file that controls how the operating system is launched.
Although this gave you access to more than 4 GB of RAM, it only fools the system, because a 32-bit
machine is limited to a 4-GB address space in the first place. With x64, this limitation changes to 32 GB
for Windows Vista and the Standard edition of Window Server, but jumps to 1 terabyte (TB) when
running the more advanced editions of the Windows Server operating system. In addition, there is less
reliance on the page file for virtual memory expansion in a 64-bit system. This means less disk activity for
memory-intensive applications.

These are not the only benefits of x64. It also provides faster input and output (I/O) because it can take
advantage of larger data blocks. It provides higher data transfer rates because it can run more
concurrent processes. More client connections can be set for a given server, breaking the limits of
Transmission Control Protocol/Internet Protocol (TCP/IP) on 32-bit.
In fact, Microsoft states that it has been able to vastly reduce the number of servers running Microsoft
Update, the Web site providing patch downloads, because each 64-bit server can manage vastly more
connections per server.
But these file system changes have an impact. For example, your 32-bit third-party backup and restore
tool will not work with a 64-bit machine because the file I/O driver is completely different from the 32-bit
version.

Not everything works on x64 machines today, while some applications only run on x64 platforms. One
good example is Microsoft Exchange Server 2007; it only runs in 64-bit mode.

This is exactly the way it was when 32-bit machines were introduced. One thing is certain:
What does work on 64-bits will always work faster. Our advice: If you need speed and you know that
your core applications are ready to run on x64, take the plunge. Costs are not that far off from 32-bit
systems, and the advantages are far-reaching. If you’re buying hardware today and you want to make it
last, buy x64 machines.

www.bench3.com Jan 2010 - Page 13


bench3

Also Read:
Benefits Of Windows 7 64-bit Operating System
Differences Between 32-bit and 64-bit Versions Of Windows

Labels: 64Bit, Windows Server, Windows Server 2008

CUSTOMIZING THE TASKBAR IN WINDOWS VISTA


Customizing the Taskbar: The Windows Taskbar can be customized to meet your needs. You can
resize the taskbar, hide it, and even add toolbars to it.

Moving the Taskbar


By default, the taskbar resides at the bottom of your screen. You can move the taskbar to any side of the
screen or even to another screen if you use more than one monitor. To move the taskbar, do the
following:
1. Right click the taskbar and ensure 'Lock the Taskbar' is unchecked
2. Point to a blank spot on the taskbar and drag the taskbar to the side of the Desktop where you want it

Resizing the Taskbar


By default, the taskbar is one 'row' wide. You can resize the taskbar to any size you want. To resize the
taskbar, do the following:
1. Right click the taskbar and ensure 'Lock the Taskbar' is unchecked
2. Place the mouse pointer on the outer edge of the taskbar until the pointer turns into a two-headed
arrow
3. Drag the border to change the size of the taskbar

www.bench3.com Jan 2010 - Page 14


bench3

Controlling Taskbar Grouping


Grouping common items on the taskbar can reduce clutter. If you have five instances of internet explorer
running, the grouping option will display them as one button the taskbar. Clicking the internet explorer
button will bring up a list of all active Internet Explorer windows.

Disabling Grouping
Grouping isn't for everyone (including me). To disable grouping, do the following:
1. Right-click the Start button
2. Select „Properties‟
3. Select the „Taskbar‟ pane in the „ Taskbar And Start Menu‟
4. Uncheck the „Group Similar Taskbar Buttons‟ checkbox

Setting Grouping Limitations


To change the number of similar windows that need to be open to 'kick in' grouping, do the following:
1. Press the Start button
2. Type in regedit and hit enter
3. Navigate to HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
4. Create a new DWORD value named TaskbarGroupSize

In the value field, specify the minimum number of similar windows that need to be open to enable
grouping. A setting of 2 groups related items as soon as you open a second window, even if there‟s
plenty of room on the taskbar; 3 enables grouping as soon as you have three or more similar windows;
and so on. Now log off and log back in to put your new settings
into effect.

Auto-hiding the Taskbar


You may find the taskbar gets in the way when you are using a program, or even when you are on your
desktop. You can auto-hide the taskbar in two different ways. The first way is to have the taskbar auto-
hide when it is not in focus. The other way is to have the taskbar in the background when you maximize
a window or move a window over it.

Auto-hiding the Taskbar All the Time


To autohide the taskbar, do the following:
1. Press the Start button
2. Type taskb in the Search box
3. click „Taskbar And Start Menu? The Taskbar and Start Menu Properties dialog box will now display.

www.bench3.com Jan 2010 - Page 15


bench3

4. Check 'Auto-Hide The Taskbar' To access the taskbar, simply move your mouse to the side of the
screen the taskbar is located on and it will appear.

Hiding the Taskbar Behind Active Windows


To hide the taskbar behind active windows, do the following:
1. Press the Start button
2. Type taskb in the Search box
3. click „Taskbar And Start Menu? The Taskbar and Start Menu Properties dialog box will now display.
4. Uncheck 'Keep The Taskbar On Top Of Other Windows'

Labels: Taskbar, Vista, Windows Tips

INSPIRATION FOR THE WEEK | A REAL STORY THAT HAPPENED IN JAPAN.


WHEN A LIZARD CAN, WHY CAN'T WE? - "This is something real that happened in Japan".

In order to renovate the house, someone in Japan breaks open the wall. Japanese houses normally have
a hollow space between the wooden walls. When tearing down the walls, he found that there was a lizard
stuck there because a nail from outside hammered into one of its feet.

He sees this, feels pity, and at the same time curious, as when he checked the nail, it was nailed 5 years
ago when the house was first built!!!

What happened? The lizard has survived in such position for 5 years .In a dark wall partition for 5 years
without moving, it is impossible and mind-boggling.Then he wondered how this lizard survived for 5
years! without moving a single step--since its foot was nailed!So he stopped his work and observed the
lizard, what it has been doing, and what and how it has been eating. Later, not knowing from where it
came, appears another lizard,with food in its mouth.Ah! He was stunned and touched deeply.

www.bench3.com Jan 2010 - Page 16


bench3

For the lizard that was stuck by nail, another lizard has been feeding it for the past 5 years...

Imagine? It has been doing that untiringly for 5 long years, without giving up hope on its partner.

Imagine what a small creature can do that a creature blessed with a brilliant mind can't.
Please never abandon your loved ones\

Never Say you are Busy When They Really Need You ...You May Have The Entire World At Your Feet. But
You Might Be The Only World To Them.. A Moment of negligence might break the very heart which loves
you through all odds.. Before you say something just remember.. It takes a moment to break but an
entire lifetime to make...
Labels: Moral Story

LEADERSHIP FOCUSES ON GROUP APPROACH | LEADERSHIP IS


ESSENTIALLY AN OTHER-CENTRED ACTIVITY
Leadership focuses on the group. This group approach, as it may be called, leads us to see leadership in
terms of functions that meet group needs:

In fact, if you look closely at matters involving leadership, there are always three elements or variables:
• the leader – qualities of personality and character;
• the situation – partly constant, partly varying;
• the group – the followers: their needs and values.

In fact, work groups are always different, just as individuals are. After coming together they soon
develop a group personality, so that who works in one group may not work in another. All groups and
organizations are unique.

www.bench3.com Jan 2010 - Page 17


bench3

But that is only half of the truth. The other half is that work groups – like individuals – have certain needs
in common. There are three areas of overlapping needs that are centrally important, as illustrated in
Figure below.

Task need
Work groups and organizations come into being because there is a task to be done that is too big for one
person. You can climb a hill or small mountain by yourself, but you cannot climb Mount Everest on your
own – you need a team for that.

Why call it a need? Because pressure builds up a head of steam to accomplish the common task. People
can feel very frustrated if they are prevented from doing so.

Team maintenance need


This is not so easy to perceive as the task need; as with an iceberg, much of the life of any group lies
below the surface. The distinction that the task need concerns things and the team maintenance need
involves people does not help much.

Again, it is best to think of groups that are threatened from without by forces aimed at their
disintegration or from within by disruptive people or ideas. We can then see how they give priority to
maintaining themselves against these external or internal pressures, sometimes showing great ingenuity
in the process.

www.bench3.com Jan 2010 - Page 18


bench3

Many of the written or unwritten rules of the group are designed to promote this unity and to maintain
cohesiveness at all costs. Those who rock the boat or infringe group standards and corporate balance
may expect reactions varying from friendly indulgence to downright anger.

Instinctively a common feeling exists that ‘United we stand, divided we fall’, that good relationships,
desirable in themselves, are also an essential means towards the shared end. This need to create and
promote group cohesiveness I have called the team maintenance need. After all, everyone knows what a
team is.

Individual needs
Thirdly, individuals bring into the group their own needs – not just the physical ones for food and shelter
(which are largely catered for by the payment of wages these days) but also the psychological ones:
recognition; a sense of doing something worthwhile; status; and the deeper needs to give to and receive
from other people in a working situation. These individual needs are perhaps more profound than we
sometimes realise.

They spring from the depths of our common life as human beings. They may attract us to, or repel us
from, any given group. Underlying them all is the fact that people need one another not just to survive
but to achieve and develop personality.

This growth occurs in a whole range of social activities – friendship, marriage and neighbourhood – but
inevitably work groups are extremely important because so many people spend so much of their waking
time in them.

The three circles interact


Now these three areas of need overlap and influence one another. If the common task is achieved, for
example, then that tends to build the team and to satisfy personal human needs in individuals. If there is
a lack of cohesiveness in the team circle – a failure of team maintenance – then clearly performance in
the task area will be impaired and the satisfaction of individual members reduced. Thus we can visualise
the needs present in work groups as three overlapping circles, as shown in Figure above.

Leadership is essentially an other-centred activity – not a self-centred one.


Labels: Leadership, Management

www.bench3.com Jan 2010 - Page 19


bench3

CD OR DVD DRIVE MISSING OR NOT RECOGNIZED ISSUE IN WINDOWS |


STEPS ON HOW TO FIX THIS PROBLEM

Your CD drive or DVD drive is missing or not recognized by Windows or other programs, so you cannot
play or access a CD or DVD. This issue might have occurred after you installed, uninstalled, or updated a
program or Windows Vista. Even if you have not installed, an automatic update might have caused this
problem.

This issue may have occurred after one of the following situations:
• You upgrade a computer to Windows Vista or install Windows Vista Service Pack 1.
• You install or uninstall CD or DVD recording programs.
• You uninstall Microsoft Digital Image.
• You may see one of the following error messages:
One of the following error messages appears when you view the CD drive or the DVD drive in Device
Manager.
Error message 1 : The device is not working properly because Windows cannot load the drivers
required for this device (Code 31).
Error message 2 : A driver for this device was not required, and has been disabled (Code 32 or Code
31).
Error message 3 : Your registry might be corrupted. (Code 19)
An "error code 39" error message.
A message that resembles the following appears in the notification area:
Windows successfully loaded the device driver for this hardware but cannot find the hardware device.
(Code 41).
Important: This article helps you fix the problem. Before you read further, try to backup your registry.
Read more on how to backup the registry.

This section, method, or task contains steps that tell you how to modify the registry. However, serious

www.bench3.com Jan 2010 - Page 20


bench3

problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these
steps carefully. For added protection, back up the registry before you modify it. Then, you can restore
the registry if a problem occurs. For more information about how to back up and restore the registry,
read my eariler article "How to back up and restore the registry in Windows".

This problem might have caused by two Windows registry entries that have become corrupted. To fix the
problem, you have to use Registry Editor to delete the corrupted Registry entries. To use this method,
you must be logged on to Windows as an administrator.

For Microsoft Windows Vista


1. Click Start (Windows logo), and then click All Programs.
2. Click Accessories, and then click Run.
3. Type regedit, and then click OK. If you are prompted for an administrator password or for a
confirmation, type the password, or click Allow.
4. In the navigation pane, locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E965-E325-11CE-BFC1-
08002BE10318}
5. In the right pane, click UpperFilters. Note: You may also see an UpperFilters.bak registry entry.
You do not have to remove that entry. Click UpperFilters only. If you do not see the UpperFilters
registry entry, you still might have to remove the LowerFilters registry entry. To do this, go to
step 8.
6. On the Edit menu, click Delete.
7. When you are prompted to confirm the deletion, click Yes.
8. In the right pane, click LowerFilters. Note: If you do not see the LowerFilters registry entry,
unfortunately this content cannot help you any further. Find more solutions or more help on the
Microsoft Web site.
9. On the Edit menu, click Delete.
10. When you are prompted to confirm the deletion, click Yes.
11. Exit Registry Editor.
12. Restart the computer.
For Microsoft Windows XP
1. Click Start, and then click Run.
2. In the Open box, type regedit, and then click OK.
3. In the navigation pane, locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E965-E325-11CE-BFC1-
08002BE10318}

www.bench3.com Jan 2010 - Page 21


bench3

4. In the right pane, click UpperFilters. Note: You may also see an UpperFilters.bak registry entry.
You do not have to remove that entry. Click UpperFilters only. If you do not see the UpperFilters
registry entry, you still might have to remove the LowerFilters registry entry. To do this, go to
step 7.
5. On the Edit menu, click Delete.
6. When you are prompted to confirm the deletion, click Yes.
7. In the right pane, click LowerFilters. Note: If you do not see the LowerFilters registry entry,
unfortunately this content cannot help you any further. Find more solutions or more help on the
Microsoft Web site.
8. On the Edit menu, click Delete.
9. When you are prompted to confirm the deletion, click Yes.
10. Exit Registry Editor.
11. Restart the computer.

Did this fix the problem?


Microsoft Windows Vista
Click Start , click Computer, and then see whether the drive is listed.
Microsoft Windows XP
Click Start, click My Computer, and then see whether the drive is listed.

Is the drive listed?


If the drive is listed, try to play or access a CD or DVD.
If you can play or access a CD or DVD, you are finished with this article.

If you cannot play or access a CD or DVD, you may have to reinstall some programs. Some programs
might not be able to use your CD or DVD drive until you reinstall those programs. If the problem occurs
again when you install or uninstall those programs, contact the manufacturer of the program to see if an
update is available that solves the problem. Some examples of programs that might be affected are:
• iTunes software by Apple
• Nero software by Nero Inc
• Roxio Creator software by Sonic Solutions
• Zune software by Microsoft
After reinstalling your programs, if you can play or access a CD or DVD, you are finished with this article.
If you still cannot play or access a CD or DVD, please see the "Next steps" section.

If the drive is not listed, remove and reinstall the existing drivers.

www.bench3.com Jan 2010 - Page 22


bench3

Back to the top


Remove and reinstall drivers

If the drive is not listed, remove and reinstall the existing drivers. To do this, follow these steps:
Microsoft Windows Vista
1. Click Start, and then click Control Panel.
2. Click System and Maintenance, click System, and then click Device Manager. Note: If Control
Panel is in Classic View, double-click System, and then click Device Manager. If you are prompted
for an administrator password or for a confirmation, type the password, or click Allow.
3. In Device Manager, expland DVD/CD-ROM drives, right-click the CD and DVD devices, and then
click Uninstall.
4. When you are prompted to confirm that you want to remove the device, click OK.
5. Restart the computer.
After the computer restarts, the drivers will be automatically installed.
Microsoft Windows XP

1. Click Start, and then click Control Panel.


2. Click System and Maintenance, and then click System,
3. On the Hardware tab, click Device Manager. If you are prompted for an administrator password
or for a confirmation, type the password, or click Allow.
4. In Device Manager, expland DVD/CD-ROM drives, right-click the CD and DVD devices, and then
click Uninstall.
5. When you are prompted to confirm that you want to remove the device, click OK.
6. Restart the computer.
After the computer restarts, the drivers will be automatically installed. See if reinstalling the drivers fixed
the problem.
Now try to play or access a CD or DVD.

If you can play or access a CD or DVD, you are finished with this article.

If you cannot play or access a CD or DVD, you may have to reinstall some programs. Some programs
might not be able to use your CD or DVD drive until you reinstall those programs. If the problem occurs
again when you install or uninstall those programs, contact the manufacturer of the program to see if an
update is available that solves the problem. Some examples of programs that might be affected are:

* iTunes software by Apple

www.bench3.com Jan 2010 - Page 23


bench3

* Nero software by Nero Inc


* Roxio Creator software by Sonic Solutions
* Zune software by Microsoft

After reinstalling your programs, if you can play or access a CD or DVD, you are finished with this article.

If you continue to have questions or if you cannot find a solution here, Click the following link to contact
Microsoft Support: http://support.microsoft.com/contactus (http://support.microsoft.com/contactus)
Labels: Hardware, Troubleshoot, Windows Tips

PROTECT AND SHARE YOUR OFFICE DOCUMENTS ONLINE

Microsoft Office Live Workspace is now offering free online documents sharing and storage facility to it’s
users. You should never upload your important documents on to some free file sharing websites where
your file can get deleted anytime and there is no certainty of file protection also. Microsoft allows users to
use it’s free online file storage and sharing service to keep their documents safe, even with password
protection.
• It’s easy with Microsoft Office Live Workspace
• Store up to 5GB online
• Works with Microsoft Office Word, Excel and PowerPoint
• View, edit, share documents with password-protection
“Office Live Workspace lets you upload a large file and lets you easily share it with your group members,
so that they can make changes and send it back to you. You don’t have to worry about emailing
anymore, it eliminates the mess.
My advice to other students not using Office Live Workspace, would be: Get one.” says, Marty
Henningsgard, a college student.
Benefits of Microsoft Office Live Workspace

1. Absolutely free online storage up to 5 GB per account


2. Access your files from anywhere using your login details
3. Supports Microsoft Office Word, Excel and PowerPoint documents
4. View, edit and share documents online with password protection
5. Use your Hotmail/Live or MSN account details to login – No extra sign up required
6. Manage all documents at one place

www.bench3.com Jan 2010 - Page 24


bench3

Robert W, a teacher quoted, “I have created workspace to let debate team members post documents,
take notes and meet online rather than during school hours. I can monitor their progress and coach them
more efficiently during my free time, rather than taking class time to do this. I’ve been waiting for this for
a long time.”

Microsoft Office Live Workspace eliminates the need of using a flash drive since all your documents can
be accessed and managed online. This is free, convenient and secure.

Access Anywhere
• View documents from almost any computer
• Eliminate flash drives

Online Storage and Sharing


• View and share password-protected files (up to 5 GB) without losing control
• Work together with others on the same files

Works with Programs You Know


• Open and save files from familiar programs like Word, Excel, and PowerPoint
• Manage documents in one convenient place
Labels: Microsoft, Office

KNOW THE DIFFERENCE BETWEEN SHUTDOWN AND RESTART | WHICH ONE


IS SAFE AND EFFECTIVE

A shutdown simply powers down the machine almost entirely and does not attempt to start the operating
system again until you press the power button. A restart simply ends your session, shuts the operating
system down, and then re-loads the operating system again.

www.bench3.com Jan 2010 - Page 25


bench3

Common Use Of Shutdown And Restart:


• Shutdown is used with the intention of leaving the computer in an off stage once the shutdown
procedure has completed.
• Restart is used with the intention of recycling the current session of the OS, to reset applications
running/hanging etc..
Personally speaking, I was always curious to know the technology behind a computer restart. Anyone can
understand the process behind computer shutdown since we are habituated with the same kind of
processes with our television sets, home theaters etc. But how do computers restart since it first closes
down all running applications and gets shutdown, which means the power to the motherboard gets
disconnected. Then how come it manages to restart the whole computing process from the beginning?

How Restart Works

Well, the answer is not that much confusing at all. When we shutdown our system (by pressing the
power button or from the OS menu), our computer starts saving all data and then it starts dumping all
RAM (Random Access Memory). Once the RAM gets dumped completely, SMPS cuts off power to the
motherboard and that’s how a computer shuts down.

Now when we click the “Restart” button on our computer, the operating system starts shutting down all
active and running programs to make the RAM free. Once the OS regains all RAM resources, it will issue a
command to the CPU to warm boot where BIOS system takes over and controls the whole booting
process. In this process, BIOS loads first 512 bytes of detected boot device, jumps to boot loader code
and restarts the computer.

www.bench3.com Jan 2010 - Page 26


bench3

Few might have the misconception that shutdown process is safer while system restart might harm the
computer. Well, if you have read the above explanation, you can conclude with the fact the computer
restart makes our job more easier... But, is it safer?

Shutting down will prevent theft and data loss issues among other things. Re-starting will leave your
computers available or open to many other risks.

There are a number of reason why we or programs go for shutdown or restart:


Work stations should be shut down unless you are still running programs that process data that require
hours to complete. It goes without saying if you shut down the machine the programs running will not
complete their task and later you will have to start over.

I guess it will depend on the kind of lab and the purpose of each machine. Each machine may have a
different purpose and that will dictate weather it needs to be shut down completely or not.

And to be even Short, there is no effective difference between shutdown and restart. And technically
speaking, A restart (at least in a Unix environment, which the Mac is), dumps EVERYTHING, and boots
fully from a zeroed state. ALL processes are released and reinitiated from scratch. Even if there were
anything residual in any cache, it would be overwritten anyway when the system was being restored.

I think the theory being put forward is that since some of the caps haven't fully bled off, there may be
residual data in some of the registers. Unless they can state absolutely the decay rate of those, then "ten
seconds", or any other SWAG'd delay, is basically bollocks.

This is more ancient technology concept, and since most Windows users have NEVER seen what actually
goes on, process-wise, in detail, it's become more computer urban legend/dogma than anything else.

You could posit that a restart is easier on the microelectronics as they don't have time to suffer from
thermal expansion because of short-cycle cooling and reheating. That, as well, is debatable, but certainly
a stronger theoretical argument than any nebulous "data left in cache" claim.
Labels: Restart, Shutdown, Windows Tips

www.bench3.com Jan 2010 - Page 27


bench3

CLEAN UP THE TASKBAR TRAY ICONS IN WINDOWS | TURN OFF THE TRAY
ICONS COMPLETELY

The notification area as Microsoft calls it—or more commonly, the tray—is the box full of tiny icons on the
far right side of your taskbar, next to the clock. It made its first appearance in Windows 95, but it didn’t
take long for most trays to get cluttered with junk from every program installed on your PC.

Also Read:
Add An Address Bar In Your Windows Taskbar
All New Keyboard Shortcuts In Windows
Fix Missing Task Bar Icons In Windows XP
Easy Ways To Get To Your Desktop In Windows
Disable Extra Startup Programs In Windows

And since Microsoft wasn’t too careful about establishing standards for the icons put there, applications
weren’t too careful about giving their customers control over those icons. As a result, many applications
won’t let you remove their icons, and of those that do, the process is different for each one.

Microsoft snapped into action to solve the problem, and five years later came up with the Hide inactive
icons feature. To clean up your tray, rightclick an empty area of the taskbar, select Properties, and
choose the Notification Area tab. Turn on the Hide inactive icons option, and then click Customize to open
the Customize Notification Icons window shown in Figure.

www.bench3.com Jan 2010 - Page 28


bench3

Figure: If you don’t want to hide the tray completely, use this window to bury
unwanted clutter under a collapsible panel.

The active icons in your tray appear under Current Items, while those that have come and gone show up
further down, under Past Items. To hide an icon, highlight it in the list, and then select Hide in the
Behavior column.

Click OK when you’re done; the change takes effect right away. If you’ve hidden at least one icon, a little
white arrow appears to the left of the tray (meaning that you won’t save any space if you hide only one
icon).

Just click the arrow to temporarily show hidden tray icons; move the mouse away, and the arrow hides
them again.

Tired of dealing with tray icons on a one-by-one basis? If you’re using the Vista Business or Ultimate
edition, you can turn off the tray completely.

Open the Group Policy Object Editor (gpedit.msc, which is not present on the Vista Home editions), and
expand the branches to User Configuration\Administrative Templates\Start Menu and Taskbar. Double-
click Hide the notification area, select Enabled, and click OK. You’ll have to log out and then log back in
for this change to take effect.
Labels: Icon, Taskbar, Windows Tips

www.bench3.com Jan 2010 - Page 29


bench3

CHANGE THE ICON FOR ALL FILES OF A TYPE IN WINDOWS 7 AND VISTA
Every file type has a default icon, the icon shown for all files with filename extensions linked to that type.
Yet Windows Vista And Windows 7 offers no way to choose your own icons—apart from editing the
Registry directly—despite the fact that you could do this right in Windows Explorer in previous versions of
Windows.

The (Default) value in the DefaultIcon key contains the full path and filename of the file containing the
default icon. Often it points right to the application executable that uses the file (e.g., excel.exe for .xls
files), but sometimes it references a .dll or .ico file containing a bunch of icons. The filename is then
followed by a comma and then a number (called the index) that indicates which icon to use.
For example:
C:\Program Files\Photoshop\Photoshop.exe, 15
points to the file Photoshop.exe, located in the C:\Program Files\Photoshop folder, and references the
16th icon in that file (0 or no number indicating the first icon, 1 indicating the second, and so on).
Occasionally, you may see something like this in the DefaultIcon key:
%SystemRoot%\system32\wmploc.dll,-731
Here, %SystemRoot% is a variable that represents the Windows folder (usually C:\Windows). When the
(Default) value in which this information is stored is an expandable string value, Windows converts the
filename to C:\Windows\System32\wmploc.dll before retrieving the icon. You may also sometimes notice
a negative value following the filename (-731, in this case) which represents the resource ID of the icon
to use—as opposed to a positive value indicating the index (position) of the icon as described above.

In most cases, you can specify your own icon for a given file type by placing the full path to an .exe, .dll,
.ico, or .bmp file in the DefaultIcon key’s (Default) value. (Hint: there are some nice icons in
\Windows\System32\shell32.dll.)

Include a number to indicate which icon to use, or leave out the number to use the first icon in the file.
In some cases, Windows Explorer will recognize the change right away, although due to the way

www.bench3.com Jan 2010 - Page 30


bench3

Windows Vista or Windows Seven caches icons, you may need to restart Windows for your change to
fully take effect.

The easiest way to change an icon for a file type is with a third-party tool like File Type Doctor. (available
at http://www.creativelement.com/powertools/)
Labels: FileTypes, Icon, Windows Tips

ALL NEW KEYBOARD SHORTCUTS IN WINDOWS | FOR XP VISTA AND


WINDOWS SEVEN
Despite the fact that Microsoft has excised those little underlined letters— the ones that show you which
letter you have to press while holding the Alt key to jump to that control—the keyboard is alive and well
in Vista and Windows 7. In fact, there are tons of useful keyboard shortcuts that can be real time-savers
in Windows, some even used in conjunction with the mouse. Following are some of the best ones.

Navigating files and folders Properties, Hold the Alt key while double-clicking on a file or folder to view
the Properties sheet for that object. Or, press Alt-Enter to open the Properties window for the selected
item without using the mouse at all.

www.bench3.com Jan 2010 - Page 31


bench3

History
Press Backspace in an open folder window to go back one step in the window’s history to the last folder
you looked at, which is not necessarily the parent folder.

You can also press the left or right arrow keys while holding Alt to go back and forth through the folder
history; these work just like the two round arrow buttons in the upper left of any Explorer window.

Refresh/Reload
Press F5 in almost any window (including web browsers and even Device Manager) to refresh the current
view.

Folder tree
With the focus on Explorer’s folder tree, press Enter to view the contents of the highlighted folder in the
right pane. Also, use the left and right arrow keys (or + and –) to collapse and expand folders,
respectively, or press the asterisk key (*) to expand all the folders and their subfolders in the current
branch.

Jump to an item
With the focus on the right pane, press a letter key to quickly jump to the first file or folder starting with
that letter. Continue typing to jump further. For example, pressing the T key in your \Windows folder will
jump to the Tasks folder. Press T again to jump to the next object that starts with T. Or, press T and
then quickly press A to skip all the Ts and jump to taskman.exe. If there’s enough of a delay between the
T and the A keys, Explorer will forget about the T, and you’ll jump to the first entry that starts with A.

If you’d rather, you can have Windows Explorer begin a formal search as soon as you start typing. Open
the Organize drop-down, select Folder and Search Options, and then choose the View tab. Scroll to the
bottom of the Advanced settings list, and under the When typing into list view branch, click Automatically
type into the Search Box.

New Explorer window


Press Ctrl-N to open another Explorer window at the same folder. Or, if you prefer, you can use Ctrl-N to
create a new folder on the spot— something you can’t otherwise do easily with the keyboard—by
installing Creative Element Power Tools (http://www.creativelement.com/powertools/) and turning on the
Quickly create new folders tool. You can also press Winkey+E to open a new Windows Explorer window,
even when you’re not currently in Explorer.
Search

www.bench3.com Jan 2010 - Page 32


bench3

In Windows Explorer or on the desktop, press Ctrl-F or F3 to open a separate search window so you can
search without losing the current view. Or, press Winkey+F to open a search window no matter where
you are.

Show hidden context menu items


Hold the Shift key while right-clicking a file to show three new items in the file’s context menu: Pin to
Start Menu (normally shown only for programs), Add to Quick Launch, and Copy as Path (used to copy
the full path of the item to the clipboard).

Address bar
Press F4 to jump to the address bar so you can type or flip through recently visited folders. While you’re
there, press Esc twice to revert to the new-style path box so you can navigate parent folders without
typing.

Cycle through all the controls Press the Tab or F6 keys to jump among the file pane, the file pane column
headers, the address bar, the Search box, the Favorites pane (if it’s visible), the folder tree divider, and
then finally the folder tree itself.

Selecting And Managing Files:

Select all
Press Ctrl-A to quickly select all of the contents of a folder, both files and folders.

Select range
Select one icon, then hold the Shift key while clicking on another icon in the same folder to select it and
all the items in between.

Select Multiple Items


Hold the Ctrl key to select or deselect multiple files or folders, one by one. Note that you can’t select
more than one folder in the folder tree pane of Explorer, but you can in the right pane. You can select
multiple files without using the keyboard by dragging a rubber band around them. Start by holding down
the left mouse button in a blank portion of a folder window, then drag the mouse to the opposite corner
to select everything that appears in the rectangle you just drew.

www.bench3.com Jan 2010 - Page 33


bench3

You can also use the Ctrl key to modify your selection. For example, if you’ve used the Shift key or a
rubber band to select the first five objects in a folder, you can hold Ctrl while dragging a second rubber
band to highlight additional files without losing your original selection.

You can also use the Ctrl + A to select all the files in the rectangle box.
Delete files
Select a file or folder and press Del to delete it. Or, press Shift-Del to delete it permanently without
sending it to the Recycle Bin.
Rename
Press F2 to rename the currently selected item. Starting and switching programs

Start menu
Press the Windows logo key (Winkey) to open the Start menu, and then navigate with your arrow keys.
You can also open the Start menu by pressing Ctrl-Esc. See the upcoming “Hack the Windows Logo Key”
sidebar if you don’t have a Windows logo key.

Switch to a different window


If you are using windows vista or windows seven with Aero, Press Winkey+Tab to show the fancy Flip 3D
Rolodex-style task switcher, or Alt-Tab to show the classic means of switching from one open window to
another. Hold Shift (Shift-Alt-Tab or Shift-Winkey+Tab) to go backward. For Windows XP or Windows
without Aero effects, just use Alt + Tab key to switch to a different window.

If you’re using an application with more than one document, press Ctrl- Tab to switch among the open
documents. Or, press Ctrl-Tab to cycle through tabs in a tabbed window.

Drop the current window to the bottom of the pile


Press Alt-Esc to move the active window to the bottom of the stack and activate the one underneath it.
Hold Shift to go backward.
Run
Press Winkey+R to open the Start menu Run box.
Minimize all windows
Press Winkey+D to show or hide the desktop, Winkey+M to minimize all open windows, or Shift-
Winkey+M to restore minimized windows.

Windows Explorer
Press Winkey+E to open a new Windows Explorer window.

www.bench3.com Jan 2010 - Page 34


bench3

Task Manager
Press Ctrl-Shift-Esc to open Task Manager for Windows Vista and Windows Seven. For Windows XP Press
Ctrl+Alt+Del.

Task bar
Press Winkey+T to send the keyboard focus to the taskbar, or press Winkey+B to send the focus to the
notification area (tray).

Quick Launch toolbar


Press the Windows logo key and a number key to open the Quick Launch icon at that position. For
instance, press Winkey+1 to open the first icon, Winkey+2 to open the second, and so on.

Close the window


Press Alt-F4 to close the current application, or Ctrl-F4 to close the current document (if it’s the type of
program that can hold multiple documents). Press Alt-F4 while the keyboard focus is on the desktop or
taskbar to shut down windows.

View System Information


Press Winkey+Pause/Break to open the System page in Control Panel.
Get Windows Help
Press Winkey+F1 to open Windows Help and Support.
Other Shortcuts
Clipboard
Press Ctrl-C to copy the selected item to the clipboard, Ctrl-X to cut (copy and then delete), and Ctrl-V to
paste the item anywhere else.

Undo
Press Ctrl-Z to undo the last text edit, file operation, deletion, etc.

Menus
Press Alt or F10 to jump to the menu bar (or show the menu if it’s hidden).

Drop-down listboxes
Use the up and down arrow keys to flip through items in a drop-down box, or press Alt-down arrow to
open the listbox.

www.bench3.com Jan 2010 - Page 35


bench3

Accessibility tools
Press Winkey+U to open the Ease of Access Center page in Control Panel. Press Shift five times to toggle
StickyKeys on and off. Hold Shift for eight seconds to toggle FilterKeys on and off. Hold Num Lock for five
seconds to toggle ToggleKeys on and off. Press Alt-LeftShift-Num Lock to toggle MouseKeys on and off.
Press Alt+LeftShift+Print Screen to toggle high contrast mode on and off.

Log off
Press Winkey+L to log off Windows.

Labels: Shortcuts, Windows Tips

LEADERSHIP DEPENDS ON THE SITUATION


In some situations one person may emerge as the leader; in others he or she may not. Winston Churchill,
for example, was a great leader in wartime, but not so good in peace. As we have seen, the truth is a
little more complex than that.

Some qualities are situation-related, but others – such as enthusiasm, moral courage and stamina – are
found in leaders in widely different situations.

To my mind, the main contribution of this situational approach is that it emphasises the importance of
knowledge in working life; and knowledge is linked to authority. There are four forms of authority among
people:
• The authority of position and rank – ‘Do this because I am the boss!’
• The authority of knowledge – ‘Authority flows to the one who knows.’
• The authority of personality – in its extreme form, charisma.
• Moral authority – personal authority to ask others to make sacrifices.

www.bench3.com Jan 2010 - Page 36


bench3

Nelson Mandela, for example, has dignity, integrity and charm. Because he endured years of
imprisonment he has acquired the moral authority to ask his fellow countrymen and -women to accept
difficulties and hardships on the long road to national unity and prosperity.
Why do sailors do what the captain orders when the ship is tossed to and fro in a storm? Because they
sense that the captain has the knowledge of the sea and navigation, deepened by experience of many
other storms, to know what to do.

Knowledge creates confidence in others.


For this reason your acquisition of technical and professional knowledge is actually part of your
development as a leader. You are equipping yourself with one essential ingredient. To go back to
Churchill for a moment, in 1940 he was the only cabinet minister with experience as a war minister in the
First World War, quite apart from his own background as a professionally trained officer who, as a
regimental commander, briefly served on the Western Front. Apart from his gifts of oratory and
character, Churchill had a considerable amount of knowledge relevant to running a war – more so than
his colleagues. And ‘In the country of the blind, the one-eyed man is king.’

The same principle holds good for you. But don’t imagine that having the appropriate technical or
professional knowledge in itself qualifies you for leadership. Again, it is necessary but not sufficient.

All the main strands of authority – position, knowledge and personality – are important. In order to get
free and equal people to cooperate and produce great results, you need to rely upon the second and
third forms of authority as well as the first. It is like a three-stranded rope. Don’t entrust all your weight
to one strand only.

In the first phase of your career as a leader you will probably be working in a fairly well-defined field of
work, and you will have acquired the necessary professional and technical knowledge.

But, within your field, situations are changing all the time. How flexible are you? Can you cope, for
example, with both growth and retraction? The following checklist will help you to confirm both that you
are in the right field and also that you are developing the flexibility to stay in charge in a variety of
different situations – including some that cannot be foreseen.
Labels: Education, Leadership, Management

www.bench3.com Jan 2010 - Page 37


bench3

LOCK YOUR FILE TYPES IN WINDOWS 7 AND WINDOWS VISTA | DO NOT


ALLOW APPLICATIONS TO CHANGE DEFAULTS

Tech companies used to spend millions trying to get you to buy their products (OK, they still do), but
now the race is on to be “the default.” Microsoft wants its Live Search web site to be the default search
engine in IE, and Google sued Microsoft to try to prevent this before Windows Vista shipped.

Companies pay PC manufacturers to preinstall trial versions of their software on all their machines so
their products can be the default. And when you install an application on your PC, the installer invariably
makes the new program the default for all the file types it supports.

Why is being the default so important? Because people don’t change the defaults. As a result, software
companies—Microsoft included—make a habit out of steamrolling over your preferences to promote their
own products. Luckily, you have a defense, and it takes place in the Registry.

There are basically two approaches to protecting your file types: you can back them up so they can be
restored in case they’re ever overwritten, and you can “lock” them, preventing such changes in the first
place.

There’s actually a third way to protect your file types, by way of Vista’s UserChoice feature . It’s not a
great solution, but it may be effective in some circumstances.

The easiest way to back up your file types is to create Registry patches as explained in “Create Export
and Import Data With Registry Patches”. To make the backup effective, you have to include all the keys.

www.bench3.com Jan 2010 - Page 38


bench3

For instance, if you’re backing up the file type for plain-text (.txt) files, your Registry patch should include
all of these keys:
HKEY_CLASSES_ROOT\.txt
HKEY_CLASSES_ROOT\txtfile
HKEY_CLASSES_ROOT\SystemFileAssociations\text

And if you want to include other related filename extensions, such as .log, .ini, and .csv (to name a few),
you’ll want to include those keys as well.

So, if your file type associations for text files ever get wiped out, just doubleclick your Registry patch
backup to restore them. But you can lock your file types by setting restrictive permissions on the
aforementioned keys. That way, no application, no installer, and not even Windows itself can change
them unless you unlock them first.

Warning: Most programs and installers won’t have a problem with locked file types; they’ll likely just
ignore the error and move on. But it’s not beyond the realm of possibility that an application may crash
or refuse to continue until it has all the Registry access it needs. In this case, you may need to unlock the
affected file types first, so you’ll want to Back Up The Registry In Windows as described in my earlier
post.

To remove the lock, just select a locked file type (you can click the leftmost column header to group all
locked file types together) and click the Unlock button.
Labels: FileTypes, Windows Registry, Windows Tips

SUCCESS OF ANY RELATIONSHIP STARTS WITH UNDERSTANDING | MORAL


STORY ON MARRIAGE
Priya married Hitesh this day. At the end of the wedding party, Priya's mother gave her a newly opened
bank saving passbook. With Rs.1000 deposit amount.

Mother: 'Priya, take this passbook. Keep it as a record of your marriage life. When there's something
happy and memorable happened in your new life, put some money in. Write down what it's about next to
the line. The more memorable the event is, the more money you can put in. I've done the first one for
you today. Do the others with Hitesh.When you look back after years, you can know how much
happiness you've had.' Priya shared this with Hitesh when getting home. They both thought it was a
great idea and were anxious to know when the second deposit can be made.

www.bench3.com Jan 2010 - Page 39


bench3

This was what they did after certain time:- 7 Feb: Rs.100, first birthday celebration for Hitesh after
marriage- 20 Mar: Rs.200, vacation trip to Bali- 15 Apr: Rs.2000, Priya got pregnant- 1 Jun: Rs.1000,
Hitesh got promoted..... and so on...

However, after years, they started fighting and arguing for trivial things. They didn't talk much. They
regretted that they had married the most nasty people in the world.... no more love...

One day Priya talked to her Mother: 'Mom, we can't stand it anymore. We agree to divorce. I can't
imagine how I decided to marry this guy!!!' Mother: 'Sure, girl, that's no big deal. Just do whatever you
want if you really can't stand it. But before that, do one thing first. Remember the saving passbook I
gave you on your wedding day? Take out all money and spend it first. You shouldn't keep any record of
such a poor marriage.'

Priya thought it was true. So she went to the bank, waiting at the queue and planning to cancel the
account. While she was waiting, she took a look at the passbook record. She looked, and looked, and
looked. Then the memory of all the previous joy and happiness just came up her mind. Her eyes were
then filled with tears. She left and went home.

When she was home, she handed the passbook to Hitesh, asked him to spend the money before getting
divorce. The next day, Hitesh gave the passbook back to Priya. She found a new deposit of Rs.5000. And
a line next to the record: 'This is the day I notice how much I've loved you thru out all these years. How
much happiness you've brought me.' They hugged and cried, putting the passbook back to the safe.

"When you fall, in any way, Don't see the place where you fell, Instead see the place from where you
slipped. Life is about correcting mistakes."

www.bench3.com Jan 2010 - Page 40


bench3

Well “A pessimist says, Erasers are for people who make mistakes. But an optimist says, Erasers are for
people who are willing to correct their mistakes.This story is worth reading. Sometimes we spend time in
asking who is responsible or whom to blame, whether in a relationship, in a job or with the people we
know. By this way we miss out some warmth in relationships.

It is better to understand a little, than to misunderstand a lot. Learn to understand first, and to be
understood second. The roof of peace rests upon the walls of understanding. Have a sense of humour as
you meet life’s challenges.
Two people cannot walk by holding the same right hand in the same direction. Love your spouse the way
he or she is, and not the way you want him or her to be. Just as the five fingers of a hand are different,
so are people around us. Everyone is different in habits, in behavior, and in so many other different
ways.
"Success in marriage does not come merely through finding the right mate, but through being the right
mate. "A journey of a thousand miles begins with a single step." Take off all your envies, jealousies,
unforgiveness, selfishness, and fears. And you will find things are actually not as difficult as you think.

Labels: Moral Story

HOW TO CREATE REGISTRY PATCHES | EXPORT AND IMPORT DATA WITH


REGISTRY PATCHES
Typing in Registry data gets awfully tedious, particularly when the N keybreaks on your keyboard.
Thankfully, it’s not the only way to add keys and values to the Registry

A Registry patch is a plain-text file with the .reg filename extension that contains one or more Registry
keys or values. Double-click on a .reg file, and Windows runs the Registry Editor, which “applies” the
patch to the Registry, meaning that its contents are merged with the contents of the Registry.

www.bench3.com Jan 2010 - Page 41


bench3

Patch files are especially handy for backing up small portions of the Registry, distributing Registry
settings to other PCs, and duplicating keys. For example, say you spend an hour or so customizing the
toolbars in a particular application used by many employees in your office. Since most programs store
their toolbar settings in the Registry, you can use a Registry patch to not only back up the completed
toolbar setup—and thus save an hour of reconfiguring should your PC subsequently burst into flames—
but to quickly copy the toolbar to all the other PCs in your office.

Or, perhaps you’ve spent the last six months gradually customizing your file types, only to find that a
newly installed application or a Windows upgrade erased all your hard work and reset all your context
menus. All you need to do is to make a Registry patch containing all your saved file types, and then
reapply it should the need arise.

Create a Registry patch


1. Open the Registry Editor, and select a branch you wish to export. The branch can be anywhere from
one of the top-level branches to a branch a dozen layers deep. Registry patches include not only the
branch you select, but all of the values and subkeys in the branch. Don’t select anything more than what
you absolutely need.

2. From the File menu, select Export, type a filename and choose a destination folder, and click OK. All of
the values and subkeys in the selected branch will then be stored in the patch file. Make sure the
filename of the new Registry patch has the .reg extension. Clearly, there’s not much to making Registry
patches with the Registry Editor. But it gets a little more interesting when you modify them, or even
create them from scratch to automate Registry changes.

Edit a Registry patch


Since a Registry patch is just a plain-text file, you can edit it with any decent plain-text editor, or lacking
that, Notepad (notepad.exe). The contents of the Registry patch will look something like the text shown
in the below Example.

Example: Contents of a Registry patch created from HKEY_CLASSES_ROOT\.txt


Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\.txt]
@="txtfile"
"PerceivedType"="text"
"Content Type"="text/plain"
[HKEY_CLASSES_ROOT\.txt\ShellNew]

www.bench3.com Jan 2010 - Page 42


bench3

"ItemName"="@%SystemRoot%\\system32\\notepad.exe,-470"
"NullFile"=""
The first line, Windows Registry Editor Version 5.00, tells Windows that this file is a valid Registry patch;
don’t remove this line. The rest of the Registry patch is a series of key names and values.

The key names appear in brackets ([...]) and specify the full path of the key, thus indicating where the
values that follow are to be stored. On each subsequent line until the next key section begins, the name
of a value is given first (in quotation marks), followed by an equals sign, and then the data stored in the
value (also in quotation marks). A value name of @ tells the Registry Editor to place the value data in
the (Default) value (as shown in the fourth line of the example).

You can go ahead and make changes to anything in the Registry patch file as long as you keep the
format intact. Of course, those changes won’t take effect in the Registry until the Registry patch is
merged back into the Registry.

So, why would you want to edit a Registry patch file? Modifying a large number of Registry values often
turns out to be much easier with a text editor than with the Registry Editor, since you don’t have to
open—and then close—each individual value.

It may be tempting to perform a quick search and replace in the text editor, and then apply your changes
back to the Registry. But be careful, as the effect may not be what you expected. If you replace any text
in the name of a value (to the left of the equals sign) or even the name of a key (the lines in brackets),
Registry Editor will create new values and keys with those names when you apply the patch, leaving the
old values and keys intact. A better choice is to use a tool like Registry Agent (see “Search and Replace
Registry Data,” earlier in this chapter).

There’s no requirement that the keys in a Registry patch file need to have lived next to one another in
the Registry, or that they be in any particular order. This means you can combine several separate patch
files into one, and use it to restore any number of keys in one step. All it takes is a little copy and paste
between side-by-side Notepad windows. The only thing you need to do, besides making sure all the keys
and values remain intact, is to remove any extraneous Windows Registry Editor Version 5.00 header
lines.

If you’re creating a Registry patch to be used on other PCs, make sure you fix any references to absolute
pathnames before you distribute the file. If, for example, your patch file references
D:\Windows\notepad.exe, it’ll cause a problem on any PC where notepad.exe is located in C:\Windows\.

www.bench3.com Jan 2010 - Page 43


bench3

The best solution is to use expandable string values, as described earlier in this chapter, along with the
appropriate system variables, like this: %SystemRoot%\notepad.exe. Now, since expandable string
values are stored like Binary values in Registry patch files, such an entry would look like this:
"Open"=hex (2):26,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,\
00,74,00,25,00,5c,00,6e,00,6f,00,74,00,65,00,70,00,61,00,64,00,2e,00,65,00,\
78,00,65,00,00,00
Now, as you may’ve guessed, it’s considerably easier to edit expandable string (and binary) values in the
Registry Editor than in any text editor, so you’ll probably want to make such corrections before you
export the key to a patch file. If you need to add a binary or expandable string value to a Registry patch
file you’ve already started editing, though, all you have to do is return to the Registry Editor, create a
temporary key somewhere, and then create your new value. When you’re done, just export the key to a
new file, delete the key from the Registry, and then copy and paste the value to your other Registry
patch file.

Delete keys and values from a Registry patch Although the Registry Editor won’t ever create a patch that
deletes Registry keys or values, it’s easy enough to make one by hand. To delete a key with a Registry
Patch, place a minus sign before the key name, like this:
-[HKEY_CURRENT_USER\ Control P anel\ don't load]
This patch, when applied, deletes the specified key and all of its values, as well as any subkeys. To delete
a single value from a key, place a minus sign after the equals sign, like this:
[HK EY_CURRENT_USER\ Control P anel\ don't load]
"desk .cpl"=-
Of course, these tricks only work if you have sufficient permission to delete those keys. See “Prevent
Changes to a Registry Key,” later in this chapter, for more information.

Apply a Registry patch


To copy the stuff from a Registry patch file back into your Registry, you need to apply it. The easiest way
is to double-click the file (it doesn’t matter if the Registry Editor is running or not). If you see a UAC
prompt at this point, click Continue. Then answer Yes when asked (if you are using windows vista)
whether you’re sure you want to add the information in the .reg file to the Registry, and finally, click OK
when you see the “Information in MyPatch.reg has been successfully entered into the Registry” message.
(You can also apply a patch from within the Registry Editor: from the File menu, select Import, select the
patch file to apply, and click OK.)

www.bench3.com Jan 2010 - Page 44


bench3

To apply a Registry patch without any other warning messages (except for the UAC prompt), you need to
use the command line. Either from an open Command Prompt window or from Start ➝ Run, type the
following:
regedit /s c:\folder\mypatch.reg
where c:\folder\mypatch.reg is the full path and filename of the patch file to import. Or, if you want to
get rid of the confirmation messages when you double-click a .reg file, add the /s switch (as shown here)
to the .reg file type.

If the Registry Editor is already open and one of the keys modified by a patch that was just applied is
currently open, RegEdit should refresh the display automatically to reflect the changes. If it doesn’t, press
the F5 key or go to View ➝ Refresh.

When you apply a Registry patch, you merge the keys and values stored in a patch file with those in the
Registry. Any keys and values in the applied patch that don’t already exist will be created. If a key or
value already exists, only its contents will be changed. It’s important to understand that if a key you’re
updating already contains one or more values, those values will be left intact if they’re not explicitly
modified or deleted by the patch. See Chapter 9 for another way to automate changes to the Registry
from files.
Labels: Shortcuts, Windows Registry, Windows Tips

PROTECT PEN DRIVE FROM VIRUSES | FREE ANTIVIRUS FOR USB FLASH
DRIVE
USB flash drives are very helpful as far as carrying data from one place to another is concerned. It really
made data transfer job so easy and affordable. But the only problem arising with USB flash drives is that
it can easily get infected with malicious virus, malwares, spywares and can affect any computer, it’s
connected with.

The flash drive is a smart invention and provides good assistance for users. You can just bring along your
compact flash drive around for any data/file transferring – fast, easy and convenient. Having said that,
users must also be aware that the flash drive is a potential breeding ground for viruses. - My Digital Life
Since it gets connected with the computer hard drive directly, virus and other malicious codes can attack
the related computer’s efficiency and performance.

www.bench3.com Jan 2010 - Page 45


bench3

Mx One Antivirus for USB Flash Drive


To keep your USB drive clean from viruses, you need to have a strong antivirus, which is meant for USB
flash drives only. USB flash drives mostly carry trojans, keyloggers, malwares and hence you need a free
USB flash drive antivirus – Mx One. Mx One Antivirus is compatible with USB drives, iPod, mp4 & mp3
players, memoirs M2, SD, micro SD and other USB-based storage devices. It immediately quarantines
suspicious and infected files and keeps your data secure. It’s real-time scanning feature detects and
removes all suspicious activities, harmful files for safety purposes.

Mx One Antivirus
You can install Mx One antivirus directly on your removable media or you can also install on both PC and
USB flash drive for enhanced security and protection. It’s compatible with any other PC antivirus and it
does not create any problem when you install this with Nod 32, Kaspersky, BitDefender, AVG, Norton,
Panda, Avast, Avira etc.
Download Mx One Antivirus 4.0

Similar Software's:
You can also try usb protect, the better to protect your pendrive.
http://www.laesoft.com.ar/descargas/usbprotect.php

Autorun Protector @ http://raylin.wordpress.com/downloads/autorun-protector/ . Its a lightweight


standalone utility to prevent your PC and Device from infecting autorun worms.
Labels: Security, Software Review, Windows Tips

www.bench3.com Jan 2010 - Page 46

You might also like