الجمعة، 13 أبريل 2012

Fix a corrupted user profile Windows XP, Vista, 7.





Microsoft Windows
Windows

Windows XP, Vista, 7.


  • Click START Windows Start > Control Panel  > User Accounts

  • To Create a New User Account
    Click Create a new account in the Pick a task list box. 

  • Type the name that you want to use for the account, and then click Next. 

  • Select the desired account type, and then click Create Account


To Make Changes to an Account


  • Click Change an account in the Pick a task list box. 

  • Click the account that you want to change.

  • Select the item that you would like to change: 



  1. Click Change the name to change the name that appears on the Welcome screen for the account. 

  2. Click Change the picture to change the picture that is used to represent the user account. 

  3. You can use any image file on the computer for the user's picture. 

  4. Click Change the account type to change the account type to increase or decrease the user's rights on the computer. 

  5. Click Create/change the password to create or change the password for the user and create or change the password hint. 

  6. Click Delete the account to delete the user account from the computer. When you delete the account, you are given the option to save the user's files on the computer.



 Note: You can not delete the account for a user that is currently logged on to the computer.

Note: You can also create a new user account in Safe Mode.






Fix a corrupted user profile

After you create the profile, you can copy the files from the existing profile.


  • Log on as a user other than the new user you just created or the user that you want to copy files from.

  • Open the My Documents folder by clicking the
    Click START Windows Start > Click COMPUTER > Double-click the hard disk drive that Windows is installed on (it's usually your C: drive), double-click Users, double-click the folder with the name of your account, and then double-click My Documents.

  • Click the Tools menu, and then click Folder Options.

  • If you don't see the Tools menu, press Alt.

  • Click the View tab, and then click Show hidden files, folders, and drives.

  • Clear the Hide protected operating system files check box, click Yes to confirm, and then click OK.

  • Locate the C:\Users\Old_Username folder, where C is the drive that Windows is installed on, and Old_Username is the name of the profile you want to copy files from.

  • Select all of the files and folders in this folder, except the following files:
    Ntuser.dat  &  Ntuser.dat.log  & Ntuser.ini

  • Click the Edit menu, and then click Copy.

  • If you don't see the Edit menu, press Alt.

  • Locate the C:\Users\New_Username folder, where C is the drive that Windows is installed on, and New_Username is the name of the new user profile you created.

  • Click the Edit menu, and then click Paste.

  • If you don't see the Edit menu, press Alt.

  • Log off, and then log back on as the new user.

  • If you have e‑mail messages in an e‑mail program, you must import your e‑mail messages and addresses to the new user profile before you delete the old profile. If everything is working properly, you can delete the old profile.



If the steps above do not fix the problem, you should contact your customer support provider for assistance. To find additional information about customer support options that apply to this computer, click the Start Windows Start button , click Help and Support, and then click the More support options link at the bottom of the Help window.






الثلاثاء، 3 أبريل 2012

Peer Block




Peer Block
Peer Block

Peer Block helps you control who your personal computer "talks to" on-line. By selecting appropriate lists of "known bad" desktops, you can prevent communication with marketing or spyware oriented servers, computers supervising your p2p routines, computers which happen to be "hacked", even overall countries! They can't be in to your computer system, and your computer won't seek to send them whatever either.
And on top of that, it's free!



The short version is: Peer Block blocks "known bad" personal computers from accessing yours, in addition to vice versa. With regards to the lists you could have it established to utilize, you can certainly block governing bodies, corporations, machines flagged for anti-p2p activites, actually entire nations! Whether you're sharing data files with Bittorrent or perhaps surfing the web, PeerBlock will help protect you from your bad guys.






Peer Block
Peer Block



A great IP Address is compared to a telephone range, or a avenue address, for your computer - at any time you connect to the world wide web, your IP address is used to make which connection. If you visit "www. google. com", your pc first translates this to an IP address (e. gary the gadget guy. 66. 102. 1. 104), then sends a request compared to that address for some sort of web-page; when the actual www. google. com personal computer receives this meaning, part of its full of your computer's IP address so that it knows how to send the web-page back to you.

PeerBlock is a variety of program known as an "IP Filter". It lives method down deep in the networking code on your computer - the material in Windows that makes/receives network connections available for you - and inspects what flows past the idea. It looks on the IP address this specific network "packet" is received from, and compares it against a list of "bad" ip-addresses; in case it finds some sort of match, it doesn't let that network packet allow it to become through to the remaining of your personal computer. It also looks at the IP deal with your network packets are going to, and does the same thing.

الأحد، 1 أبريل 2012

Spybot Search and Destroy


Spybot Search and DestroySpybot Search and DestroySpybot -- Search & Destroy detects and gets rid of spyware, a relatively new sort of threat not yet covered by common anti-virus applications. Spyware silently monitors your surfing behavior to make a marketing profile in your case that is carried without your knowledge to the compilers and available to advertising companies. If you see new tool-bars in your Internet Explorer that you just haven't intentionally mounted, if your visitor crashes inexplicably, or in case your home page may be "hijacked" (or modified without your knowledge), your laptop is most most likely infected with spyware and ad-ware. Even if you never see the signs or symptoms, your computer could be infected, because a growing number of spyware is promising. Spybot-S&D is free, so there's zero harm giving it a go to see in the event that something has invaded your laptop.




Spybot Search and Destroy

Along with spyware and adware detection and disinfection functions, Spybot-S&D can repair the registry, winsock LSPs, ActiveX items, browser hijackers and also BHOs, PUPS, pc cookies, trackerware, durable, homepage hijackers, keyloggers, LSP, paths, trojans, spybots, revision, and other forms of malware. It also can, to some degree, protect a wearer's privacy by deleting usage tracks including tracking cookies. Spybot-S&D also involves an "Immunize" feature to block the installation of spyware before that occurs e. gary the gadget guy. by modifying this hosts file. Another tool a part of Spybot-S&D is a file shredder, for your secure deletion involving files. Spybot-S&D is not intended to swap anti-virus programs, but it really does detect many common trojans.

In 2008 Spybot-S&D announced which they could recognize rootkits superior, and also supplied a free-standing rootkit locater, RootAlyzer.