Boost Up Your PC:
Just follow these simple steps and your PC Will Be Boosted Up;
- PC Slowing Down
- Useless Errors
- Registry Errors
Steps:
- There are two steps through which you can make your Windows XP Super Fast
- Use any Registry Boosting Software or By Manual Method.
- I recommend to use a registry Boosting Software because they can perform great no. of tasks in just one click where as the manual method is too difficult that only professionals can understand it.
- First of all I will tell you about the Registry Booster Software's.
A Few Registry Boosting Software's are:
- TuneUp Utilities 2010
- Unibllue Software's
- PC Booster
- Registry Cleaner
- Registry Booster
- System Machine
Install any of these software's, these software's are with help and corrects your pc errors in Just one Click.
Steps:
Now I will guide you through the steps of manual method.
Prevent the Startup of Unnecessary Programmes
- To prevent the start up of unnecessary programmes click on START-> Run -> type "msconfig.exe" , now the window of System Configuration Utilities Will be on your screen.
- Click on the tab of Start Up and uncheck all programmes , this programme will promote you to restart your machine , just restart your machine and your system is now started fastly because unnecessary programmes are stopped to run on Your system startup.
Hide Shadows Under menus:
- Right click on desktop…..then properties…….move to advanced tab……click on Effects…..uncheck : use the following transition effects for menus and tooltips……also uncheck " show shadows under menus…click on OK and then Apply.
Disable Error Reporting:
- Right click on My Computer…properties…..Advanced tab…..click On Error Reporting Tab……finally click on Disable Error Reporting..and you are done just click on.
Clear Temporary Internet Files:
- Enter My Computer ….Right Click On Drive C:….enter Properties…..Click Disk Clean Up… check all the items and then click OK … all temporary internet Files Are Cleaned also it cleans system history and compresses your data to save disk space.
- Follow the same Method for all drive to boost all of them and they can communicate with each other easily.
Disk Defragmentation:
Disk Defragmenter overview
Disk Defragmenter analyzes local volumes and consolidates fragmented files and folders so that each occupies a single, contiguous space on the volume. As a result, your system can access files and folders and save new ones more efficiently. By consolidating your files and folders, Disk Defragmenter also consolidates a volume's free space, making it less likely that new files will be fragmented. The process of consolidating fragmented files and folders is called defragmentation.
The amount of time that defragmentation takes depends on several factors, including the size of the volume, the number and size of files on the volume, the amount of fragmentation, and the available local system resources. You can find all of the fragmented files and folders before defragmenting them by analyzing the volume first. You can then see how fragmented the volume is and decide whether you would benefit from defragmenting the volume. For step-by-step instructions describing how to analyze or defragment a volume, see To analyze a volume and To defragment a volume.
Disk Defragmenter can defragment volumes that are formatted with the file allocation table (FAT) file system, the FAT32 file system, and the NTFS file system.
You might need to be logged on as an administrator or a member of the Administrators group in order to perform some tasks.
Disk Defragmenter consolidates fragmented files and folders on your computer's hard disk, so that each occupies a single, contiguous space on the volume. As a result, your system can gain access to your files and folders and save new ones more efficiently. By consolidating your files and folders, Disk Defragmenter also consolidates the volume's free space, making it less likely that new files will be fragmented.
You can also defragment disks from a command line using the defrag command. For more information, click Related Topics.
Open Disk Defragmenter.
Notes
- To open Disk Defragmenter, click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter.
- For information about using Disk Defragmenter, on the Action menu in Disk Defragmenter, click Help.
Defrag
Locates and consolidates fragmented boot files, data files, and folders on local volumes.
Syntax
defrag
volume
defrag
volume [/a]
defrag
volume [/a] [/v]
defrag
volume [/v]
defrag
volume [/f]
Parameters
volume
The drive letter or a mount point of the volume to be defragmented.
/a
Analyzes the volume and displays a summary of the analysis report.
/v
Displays the complete analysis and defragmentation reports.
When used in combination with /a, displays only the analysis report. When used alone, displays both the analysis and defragmentation reports.
/f
Forces defragmentation of the volume regardless of whether it needs to be defragmented.
/?
Displays help at the command prompt.
Remarks
- A volume must have at least 15% free space for defrag to completely and adequately defragment it. Defrag uses this space as a sorting area for file fragments. If a volume has less than 15% free space, defrag will only partially defragment it. To increase the free space on a volume, delete unneeded files or move them to another disk.
- You cannot defragment volumes that the file system has marked as dirty, which indicates possible corruption. You must run chkdsk on a dirty volume before you can defragment it. You can determine if a volume is dirty by using the fsutil dirty query command. For more information about chkdsk and fsutil dirty, see Related Topics.
- While defrag is analyzing and defragmenting a volume, it displays a blinking cursor. When defrag is finished analyzing and defragmenting the volume, it displays the analysis report, the defragmentation report, or both reports, and then exits to the command prompt.
- By default, defrag displays a summary of both the analysis and defragmentation reports if you do not specify the /a or /v parameters.
- You can send the reports to a text file by typing >filename.txt, where filename.txt is a file name you specify. For example:
defrag
volume
/v >filename.txt
- To interrupt the defragmentation process, at the command line, press CTRL+C.
- Running the defrag command and Disk Defragmenter are mutually exclusive. If you are using Disk Defragmenter to defragment a volume and you run the defrag command at a command-line, the defrag command fails. Conversely, if you run the defrag command and open Disk Defragmenter, the defragmentation options in Disk Defragmenter are unavailable.
Formatting legend
Format | Meaning |
Italic | Information that the user must supply |
Bold | Elements that the user must type exactly as shown |
Ellipsis (...) | Parameter that can be repeated several times in a command line |
Between brackets ([]) | Optional items |
Between braces ({}); choices separated by pipe (|). Example: {even|odd} | Set of choices from which the user must choose only one |
Courier font | Code or program output. Best practices
Check Your File System For Errors: Detecting and repairing disk errorsYou can use the Error-checking tool to check for file system errors and bad sectors on your hard disk.
Notes
Use Dr.Watson: Dr. Watson overviewDr. Watson for Windows is a program error debugger. The information obtained and logged by Dr. Watson is the information needed by technical support groups to diagnose a program error for a computer running Windows. A text file (Drwtsn32.log) is created whenever an error is detected, and can be delivered to support personnel by the method they prefer. You also have the option of creating a crash dump file, which is a binary file that a programmer can load into a debugger. If a program error occurs, Dr. Watson will start automatically. To start Dr. Watson, click Start, click Run, and then type drwtsn32. To start Dr. Watson from a command prompt, change to the root directory, and then type drwtsn32
Using Dr. WatsonDr. Watson detects information about system and program failures and records the information in a log file. In the event of a program error, Dr. Watson starts automatically. Open Dr. Watson. Notes
Setting up Dr. WatsonWhen a program error occurs in Windows, the system searches for a program error handler. A program error handler deals with errors as they arise during the running of a program. If the system does not find a program error handler, the system verifies that the program is not currently being debugged and considers the error to be unhandled. The system then processes unhandled errors by looking in Registry Editor for a program error debugger. The system looks in Registry Editor under the key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\AeDebug for the entries named Debugger and Auto. The value for the Debugger entry specifies the command for the debugger that will be used to analyze program errors. If the value for the Debugger entry is found, the system checks to see if the value for the Auto entry is set to zero or one.
When Windows is set up on your system, the value for the Auto entry is set by default to one and the value for the Debugger entry specifies the command to start Dr. Watson. This means that when a program error occurs, Dr. Watson for Windows will automatically diagnose the error and log the appropriate diagnostic information. If you have been using a program other than Dr. Watson as your default debugger, and you want to use Dr. Watson instead, go to the command prompt and type the command drwtsn32 -i to start Dr. Watson. Typing -i causes the necessary changes to be made to the registry. Dr. Watson can be made to generate more exacting information for debugging purposes if the appropriate symbols are installed and the symbol search path is set. To do this, you first need to copy the symbols from the Windows CD-ROM into a new folder on your computer. Then you need to create a new system environment variable. First, go to the systemroot folder on your computer and create a new folder named Symbols. Next, go to the CD under \\Support\Debug\i386 and copy the symbols to the Symbols folder that you created on your computer. After the symbols have been copied, create a new system environment variable. While creating the new system environment variable, type _NT_SYMBOL_PATH for the variable name and %systemroot%\Symbol for the variable value. You can install various symbols to different locations separated by semicolons and point to each of those locations using the same environment variable. Be sure to include variables for added service packs. For example: _NT_SYMBOL_PATH=%systemroot%\symbol;%systemroot%\hotfixes;%systemroot%\symbolsNt4Sp3. Edit Windows Registry: Windows RegistryWindows stores its configuration information in a database called the registry. (The registry editor that ships with Windows is regedit.exe.) The registry contains profiles for each user of the computer and information about system hardware, installed programs, and property settings. Windows continually references this information during its operation. Registry editors are available that enable you to inspect and modify the registry. However, you should not need to do so. Instead, allow Windows programs to modify the system registry as needed. It is strongly recommended that you do not edit registry settings yourself. Warning
If you do damage your system, you may be able to repair the registry or restore it to the same version you were using when you last successfully started your computer. Otherwise, you must reinstall Windows. When you reinstall your system, you may lose any changes that have been made, such as Service Pack upgrades, which you must reinstall separately. Protecting against viruses and Trojan horses In today's computing world, you must prevent intentional intrusions into your computer and network that take the form of viruses and Trojan horses. Follow these tips to help prevent virus outbreaks and Trojan horse attacks. For users:
For administrators:
Note
Why you should not run your computer as an administrator Running Windows 2000 or Windows XP as an administrator makes the system vulnerable to Trojan horses and other security risks. The simple act of visiting an Internet site can be extremely damaging to the system. An unfamiliar Internet site may have Trojan horse code that can be downloaded to the system and executed. If you are logged on with administrator privileges, a Trojan horse could do things like reformat your hard drive, delete all your files, create a new user account with administrative access, and so on. You should add yourself to the Users or Power Users group. When you log on as a member of the Users group, you can perform routine tasks, including running programs and visiting Internet sites, without exposing your computer to unnecessary risk. As a member of the Power Users group, you can perform routine tasks and you can also install programs, add printers, and use most Control Panel items. If you need to perform administrative tasks, such as upgrading the operating system or configuring system parameters, then log off and log back on as an administrator. If you frequently need to log on as an administrator, you can use the runas command to start programs as an administrator. For more information, see To start programs as an administrator.
Please give us your feedback for betterment of this site.. You can also enter your Queries and submit your requests; we will try our best to solve your problems
|