Boost Up Your PC:

Just follow these simple steps and your PC Will Be Boosted Up;

  • PC Slowing Down
  • Useless Errors
  • Registry Errors


     

Steps:

  1. There are two steps through which you can make your Windows XP Super Fast
  2. Use any Registry Boosting Software or By Manual Method.
  3. I recommend to use a registry Boosting Software because they can perform great no. of tasks in just one click where as the manual method is too difficult that only professionals can understand it.
  4. First of all I will tell you about the Registry Booster Software's.


     

    A Few Registry Boosting Software's are:

  5. TuneUp Utilities 2010
  6. Unibllue Software's
  7. PC Booster
  8. Registry Cleaner
  9. Registry Booster
  10. System Machine


     

Install any of these software's, these software's are with help and corrects your pc errors in Just one Click.

Steps:

Now I will guide you through the steps of manual method.


 

Prevent the Startup of Unnecessary Programmes

  1. To prevent the start up of unnecessary programmes click on START-> Run -> type "msconfig.exe" , now the window of System Configuration Utilities Will be on your screen.
  2. Click on the tab of Start Up and uncheck all programmes , this programme will promote you to restart your machine , just restart your machine and your system is now started fastly because unnecessary programmes are stopped to run on Your system startup.


     

Hide Shadows Under menus:

  1. Right click on desktop…..then properties…….move to advanced tab……click on Effects…..uncheck : use the following transition effects for menus and tooltips……also uncheck " show shadows under menus…click on OK and then Apply.


     

Disable Error Reporting:

  1. Right click on My Computer…properties…..Advanced tab…..click On Error Reporting Tab……finally click on Disable Error Reporting..and you are done just click on.

Clear Temporary Internet Files:

  1. Enter My Computer ….Right Click On Drive C:….enter Properties…..Click Disk Clean Up… check all the items and then click OK … all temporary internet Files Are Cleaned also it cleans system history and compresses your data to save disk space.
  2. Follow the same Method for all drive to boost all of them and they can communicate with each other easily.

Disk Defragmentation:

Disk Defragmenter overview

Disk Defragmenter analyzes local volumes and consolidates fragmented files and folders so that each occupies a single, contiguous space on the volume. As a result, your system can access files and folders and save new ones more efficiently. By consolidating your files and folders, Disk Defragmenter also consolidates a volume's free space, making it less likely that new files will be fragmented. The process of consolidating fragmented files and folders is called defragmentation.

The amount of time that defragmentation takes depends on several factors, including the size of the volume, the number and size of files on the volume, the amount of fragmentation, and the available local system resources. You can find all of the fragmented files and folders before defragmenting them by analyzing the volume first. You can then see how fragmented the volume is and decide whether you would benefit from defragmenting the volume. For step-by-step instructions describing how to analyze or defragment a volume, see To analyze a volume and To defragment a volume.

Disk Defragmenter can defragment volumes that are formatted with the file allocation table (FAT) file system, the FAT32 file system, and the NTFS file system.


 

You might need to be logged on as an administrator or a member of the Administrators group in order to perform some tasks.

Disk Defragmenter consolidates fragmented files and folders on your computer's hard disk, so that each occupies a single, contiguous space on the volume. As a result, your system can gain access to your files and folders and save new ones more efficiently. By consolidating your files and folders, Disk Defragmenter also consolidates the volume's free space, making it less likely that new files will be fragmented.

You can also defragment disks from a command line using the defrag command. For more information, click Related Topics.

Open Disk Defragmenter.

Notes

  • To open Disk Defragmenter, click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter.
  • For information about using Disk Defragmenter, on the Action menu in Disk Defragmenter, click Help.

Defrag

Locates and consolidates fragmented boot files, data files, and folders on local volumes.

Syntax

defrag
volume

defrag
volume [/a]

defrag
volume [/a] [/v]

defrag
volume [/v]

defrag
volume [/f]

Parameters

volume

The drive letter or a mount point of the volume to be defragmented.

/a

Analyzes the volume and displays a summary of the analysis report.

/v

Displays the complete analysis and defragmentation reports.

When used in combination with /a, displays only the analysis report. When used alone, displays both the analysis and defragmentation reports.

/f

Forces defragmentation of the volume regardless of whether it needs to be defragmented.

/?

Displays help at the command prompt.

Remarks

  • A volume must have at least 15% free space for defrag to completely and adequately defragment it. Defrag uses this space as a sorting area for file fragments. If a volume has less than 15% free space, defrag will only partially defragment it. To increase the free space on a volume, delete unneeded files or move them to another disk.
  • You cannot defragment volumes that the file system has marked as dirty, which indicates possible corruption. You must run chkdsk on a dirty volume before you can defragment it. You can determine if a volume is dirty by using the fsutil dirty query command. For more information about chkdsk and fsutil dirty, see Related Topics.
  • While defrag is analyzing and defragmenting a volume, it displays a blinking cursor. When defrag is finished analyzing and defragmenting the volume, it displays the analysis report, the defragmentation report, or both reports, and then exits to the command prompt.
  • By default, defrag displays a summary of both the analysis and defragmentation reports if you do not specify the /a or /v parameters.
  • You can send the reports to a text file by typing >filename.txt, where filename.txt is a file name you specify. For example:

    defrag
    volume
    /v >filename.txt

  • To interrupt the defragmentation process, at the command line, press CTRL+C.
  • Running the defrag command and Disk Defragmenter are mutually exclusive. If you are using Disk Defragmenter to defragment a volume and you run the defrag command at a command-line, the defrag command fails. Conversely, if you run the defrag command and open Disk Defragmenter, the defragmentation options in Disk Defragmenter are unavailable.

Formatting legend

Format

Meaning

Italic

Information that the user must supply

Bold

Elements that the user must type exactly as shown

Ellipsis (...)

Parameter that can be repeated several times in a command line

Between brackets ([])

Optional items

Between braces ({}); choices separated by pipe (|). Example: {even|odd}

Set of choices from which the user must choose only one

Courier font

Code or program output.

Best practices

Check Your File System For Errors:

Detecting and repairing disk errors

You can use the Error-checking tool to check for file system errors and bad sectors on your hard disk.

  1. Open My Computer, and then select the local disk you want to check.
  2. On the File menu, click Properties.
  3. On the Tools tab, under Error-checking, click Check Now.
  4. Under Check disk options, select the Scan for and attempt recovery of bad sectors check box.

Notes

  • To open My Computer, click Start, and then click My Computer.
  • All files must be closed for this process to run. If the volume is currently in use, a message box will appear prompting you to indicate whether or not you want to reschedule the disk checking for the next time you restart your system. Then, the next time you restart your system, disk checking will run. Your volume will not be available to perform other tasks while this process is running.
  • If your volume is formatted as NTFS, Windows automatically logs all file transactions, replaces bad clusters, and stores copies of key information for all files on the NTFS volume.
  • For more information, click Related Topics.

Use Dr.Watson:

Dr. Watson overview

Dr. Watson for Windows is a program error debugger.

The information obtained and logged by Dr. Watson is the information needed by technical support groups to diagnose a program error for a computer running Windows. A text file (Drwtsn32.log) is created whenever an error is detected, and can be delivered to support personnel by the method they prefer. You also have the option of creating a crash dump file, which is a binary file that a programmer can load into a debugger.

If a program error occurs, Dr. Watson will start automatically. To start Dr. Watson, click Start, click Run, and then type drwtsn32. To start Dr. Watson from a command prompt, change to the root directory, and then type drwtsn32


 

Using Dr. Watson

Dr. Watson detects information about system and program failures and records the information in a log file. In the event of a program error, Dr. Watson starts automatically.

Open Dr. Watson.

Notes

  • To open Dr. Watson, click Start, and then click Run. In the Open box, type drwtsn32.
  • Dr. Watson cannot prevent errors from occurring, but the information recorded in the log file can be used by technical support personnel to diagnose the problem.
  • For information about using Dr. Watson, click Help in Dr. Watson.

Setting up Dr. Watson

Dr. Watson (Drwtsn32.exe) is installed in your system folder when you set up Windows. The default options are set the first time Dr. Watson runs, which can be either when a program error occurs or when you start Dr. Watson yourself.

When a program error occurs in Windows, the system searches for a program error handler. A program error handler deals with errors as they arise during the running of a program. If the system does not find a program error handler, the system verifies that the program is not currently being debugged and considers the error to be unhandled. The system then processes unhandled errors by looking in Registry Editor for a program error debugger.

The system looks in Registry Editor under the key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\AeDebug for the entries named Debugger and Auto. The value for the Debugger entry specifies the command for the debugger that will be used to analyze program errors. If the value for the Debugger entry is found, the system checks to see if the value for the Auto entry is set to zero or one.

  • If the value for the Auto entry is set to zero, the system generates a message box that notifies you that a program error has occurred. If the value for the Debugger entry specifies the command for a valid debugger, the message box will display two buttons: OK and Cancel. If you click OK, the program is terminated. If you click Cancel, the specified debugger is started. If the value for the Debugger entry is empty, the message box will display only OK, and no debugger will start.
  • If the value for the Auto entry is set to one and the value for the Debugger entry specifies the command for a valid debugger, the system automatically starts the debugger and does not generate a message box.

When Windows is set up on your system, the value for the Auto entry is set by default to one and the value for the Debugger entry specifies the command to start Dr. Watson. This means that when a program error occurs, Dr. Watson for Windows will automatically diagnose the error and log the appropriate diagnostic information.

If you have been using a program other than Dr. Watson as your default debugger, and you want to use Dr. Watson instead, go to the command prompt and type the command drwtsn32 -i to start Dr. Watson. Typing -i causes the necessary changes to be made to the registry.

Dr. Watson can be made to generate more exacting information for debugging purposes if the appropriate symbols are installed and the symbol search path is set. To do this, you first need to copy the symbols from the Windows CD-ROM into a new folder on your computer. Then you need to create a new system environment variable. First, go to the systemroot folder on your computer and create a new folder named Symbols. Next, go to the CD under \\Support\Debug\i386 and copy the symbols to the Symbols folder that you created on your computer. After the symbols have been copied, create a new system environment variable. While creating the new system environment variable, type _NT_SYMBOL_PATH for the variable name and %systemroot%\Symbol for the variable value. You can install various symbols to different locations separated by semicolons and point to each of those locations using the same environment variable. Be sure to include variables for added service packs. For example: _NT_SYMBOL_PATH=%systemroot%\symbol;%systemroot%\hotfixes;%systemroot%\symbolsNt4Sp3.

Edit Windows Registry:

Windows Registry

Windows stores its configuration information in a database called the registry. (The registry editor that ships with Windows is regedit.exe.) The registry contains profiles for each user of the computer and information about system hardware, installed programs, and property settings. Windows continually references this information during its operation.

Registry editors are available that enable you to inspect and modify the registry. However, you should not need to do so. Instead, allow Windows programs to modify the system registry as needed. It is strongly recommended that you do not edit registry settings yourself.

Warning

  • Incorrectly editing the registry may severely damage your system. At the very least, you should back up any valued data on the computer before making changes to the registry.

If you do damage your system, you may be able to repair the registry or restore it to the same version you were using when you last successfully started your computer. Otherwise, you must reinstall Windows. When you reinstall your system, you may lose any changes that have been made, such as Service Pack upgrades, which you must reinstall separately.

Protecting against viruses and Trojan horses

In today's computing world, you must prevent intentional intrusions into your computer and network that take the form of viruses and Trojan horses. Follow these tips to help prevent virus outbreaks and Trojan horse attacks.

For users:

  • Educate yourself about viruses and how they are commonly spread. You can unwittingly bring viruses into the network by loading a program from a source such as the Internet, online bulletin board, or e-mail attachments.
  • Learn the common signs of viruses: unusual messages that appear on your screen, decreased system performance, missing data, and inability to access your hard drive. If you notice any of these problems on your computer, run your virus-detection software immediately to minimize the chances of losing data.
  • Programs on floppy disks may also contain viruses. Scan all floppy disks before copying or opening files from them, or starting your computer from them.
  • Have at least one commercial virus-detection program and use it regularly to check your computers for viruses. Be sure to obtain the latest virus signature files for your program when they are available, because new viruses are created every day.

For administrators:

  • Before putting a new program on the network, install it on a computer not attached to the network, and then check it with your virus-detection software. (Although it's advisable to log on to your computer as a member of the Users group, you should install the program while logged on as a member of the local Administrators group because not all programs install successfully when installed by a member of the Users group.)
  • Do not allow users to log on as members of the Administrators group on their own computers because viruses can do more damage if activated from an account with Administrator permissions. Users should log on as members of the Users group so that they will have only the permissions necessary to perform their tasks.
  • Require users to create strong passwords so that viruses cannot easily guess passwords and obtain Administrator permissions. (You can set password requirements using the Group Policy snap-in.) For information about creating strong passwords, click Related Topics.
  • Regularly back up files so that damage is minimized if a virus attack does occur.

Note

  • For more information on viruses, consult the documentation for your virus-detection software.

Why you should not run your computer as an administrator

Running Windows 2000 or Windows XP as an administrator makes the system vulnerable to Trojan horses and other security risks. The simple act of visiting an Internet site can be extremely damaging to the system. An unfamiliar Internet site may have Trojan horse code that can be downloaded to the system and executed. If you are logged on with administrator privileges, a Trojan horse could do things like reformat your hard drive, delete all your files, create a new user account with administrative access, and so on.

You should add yourself to the Users or Power Users group. When you log on as a member of the Users group, you can perform routine tasks, including running programs and visiting Internet sites, without exposing your computer to unnecessary risk. As a member of the Power Users group, you can perform routine tasks and you can also install programs, add printers, and use most Control Panel items. If you need to perform administrative tasks, such as upgrading the operating system or configuring system parameters, then log off and log back on as an administrator.

If you frequently need to log on as an administrator, you can use the runas command to start programs as an administrator. For more information, see To start programs as an administrator.


 

Secure your computer

If you want to protect data on your computer, you should secure individual files and folders and take steps to secure the physical computer itself. If the computer contains sensitive information, keep it in a safe location.

Other ways to secure your computer include locking it whenever you are away from your desk and setting up a password-protected screen saver. By pressing CTRL+ALT+DEL and clicking Lock Computer, you can help prevent unauthorized users from gaining access to your computer. Only you and members of the Administrators group on your computer can unlock it. (You unlock it by pressing CTRL+ALT+DEL, typing your password, and then clicking OK.) You can also set up a screen saver so that whenever the computer is idle for more than a specified length of time, the screen saver starts and the computer automatically locks.

For further Assistance:

www.xpiseasy.blogspot.com

Please give us your feedback for betterment of this site..

You can also enter your Queries and submit your requests; we will try our best to solve your problems