Advantages of Using 64-Bit Editions of Windows 7

Although earlier versions of Windows operating systems, such as the Windows® XP® Professional operating system, were available in 64-bit editions, these versions provided limited application compatibility when compared with the 32-bit editions. Additionally, the relative scarcity of 64-bit drivers for existing hardware made selecting the 64-bit edition a significant compromise.

The 64-bit editions of Windows 7 overcome the application incompatibility issues that affected the 64-bit edition of earlier versions of Windows. The 64-bit drivers are now readily available for most commonly used devices in the 64-bit edition of Windows 7.



View the Original article

Deferences between Master Boot Record (MBR) and Globally Unique Identifier(GUID) Partition Table (GPT) Disk?

When you install a disk in a computer that is running Windows 7, you can choose to select one of two partitioning schemes 1. Master Boot Record (MBR)-based partitioning scheme 2. Globally unique identifier (GUID) partition table (GPT)-based partitioning scheme.

The following are common reasons to partition a disk:

1. Separate operating system files from data and user files
2. Place applications and data files in the same location
3. Put cache, log, and paging files in a location separate from other files
4. Create multiboot setup environments

You can use Disk Management to perform disk-related tasks such as creating and formatting partitions and volumes, and assigning drive letters. In addition, you can use the diskpart command, along with other command-line utilities, to perform disk management tasks such as partitioning disks or converting disks from one partition scheme to the other.

What is an MBR Disk ?

The Master Boot Record (MBR) contains the partition table for the disk and a small amount of executable code called the master boot code. A bootable hard disk that contains an MBR is an MBR disk. The MBR is created when the disk is partitioned, is on the first sector of the hard disk, and contains a four-partition entry table describing the size and location of a partition on a disk using 32-bit Logical Block Address (LBA) fields. The size of the partition cannot exceed 2 TB. Most Windows 7 platforms, such as 32-bit and 64-bit SKUs running on motherboards with Basic Input/Output System (BIOS) firmware, require an MBR partitioned system disk and are not bootable with a larger capacity disk.

How MBR-based disks work ?
The MBR is stored at a consistent location on a physical disk, enabling the computer BIOS to reference it. During the startup process, the computer examines the MBR to determine which partition on the installed disks is marked as active. The active partition contains the operating system startup files.

Note: You can install the rest of the operating system on another partition or disk. In Windows 7, the active partition must contain the boot sector, boot manager, and related files.

Features of MBR-based disks

The MBR partition scheme has been around for a long time and supports both current and early desktop operating systems, such as the MS-DOS and the Microsoft® Windows NT® Server 4.0 operating system. Consequently, the MBR partition scheme is widely supported. However, the MBR partition scheme imposes certain restrictions. These include:

1. Four partitions on each disk: MBR-based disks are limited to four partitions. All of these can be primary partitions, or one can be an extended partition with logical volumes inside. You can configure the extended partition to contain multiple volumes.

2. A 2 Terabyte (TB) maximum partition size: A partition cannot be larger than 2 TB.

3. No redundancy provided: The MBR is a single point of failure, and if corrupted or damaged, it can render the operating system non-bootable.

Question: What are three restrictions of an MBR partitioned disk? Have you encountered these limitations in your organization, and if so, what did you do to work around them?

Answer : The restrictions are that MBR partitioned disks are limited to four partitions, a 2 TB maximum partition size, and there is no data redundancy provided.



View the Original article

What is an Internet Protocol Version 4 (IPv4) address ?

To troubleshoot network connectivity problems for your users, you must me familiar with Internet Protocol /IP address and how they work. Assign a unique Internet protocol version 4 /IPv4 address to each network computer, the IPv4 address the computer to other computers on the network.



View the Original article

What is a SUBNET MASK ?

A subnet mask defines the part of an IP address that is the network ID and the part of an IP address that is the host ID. A subnet mask is composed of four octets, similar to an IP address.

In simple IP networks, the subnet mask defines full octets as part of the network ID and host ID. A 255 represents an octet that is the part of the network ID, and 0 represents an octet that is part of the host ID. In complex IP networks, octets can be subdivided.

Why a subnet mask is required ?

When a computer delivers an IP packet, it uses the subnet mask to validate whether the destination is on the same network or on a remote network. If the destination is on the same network, the packet can be delivered by the computer. If the destination is on the different network, the computer must send the packet to a router for delivery.

To make you understand about subnet mask, I give you a simple example


View the Original article

How to share a Printer over a network using Windows XP?

To share a printer over a network using windows XP is helpful for a large business organization. To share a printer over a network using windows xp follow this

To share a Printer

1. First login to your windows XP with administrative right.
2. Click Start and  Go to Control Panel
3. Click Printers and other hardware, and then click Printers and Faxes. (From category view)
4. In the Printers and Faxes folder, right click on the installed printer and choose Sharing. See below picture



View the Original article

What Are Public and Private IPv4 Addresses?

Devices and hosts that connect directly to the Internet require a public IPv4 address. Hosts and devices that do not connect directly to the Internet do not require a public IPv4 address.

Public IPv4 addresses
Public IPv4 addresses must be unique. IANA assigns public IPv4 addresses. Usually, your ISP allocates you one or more public addresses from its address pool. The number of addresses that your ISP allocates to you depends upon how many devices and hosts that you have to connect to the Internet.

Private IPv4 addresses
The pool of IPv4 addresses is becoming smaller, so IANA is reluctant to allocate superfluous IPv4 addresses. Technologies such as Network Address Translation (NAT) enable administrators to use a relatively small number of public IPv4 addresses, and at the same time, enable local hosts to connect to remote hosts and services on the Internet.



View the Original article

What is the differences between Internet Protocol Version IPv4 and IPv6 ?

Internet Protocol Version IPv6 is a newer version of Internet Protocol Version IPv4. In IPv6 significant changes has been created to overcome the Internet  Protocol Version IPv4 limitations. In IPv4 limitations include the following :

Limited address space: IPv4 uses only 32-bits to represent addresses. IANA has allocated the majority of these addresses.

Difficult routing management: IANA has not provisioned allocated IPv4 addresses for efficient route management. As a result, Internet backbone routers have over 85,000 routes in their routing tables.

Complex host configuration: Automatic configuration of IPv4 hosts requires that you implement DHCP.

No built-in security: IPv4 does not include any method for securing network data. You must implement Internet Protocol Security (IPSec) and other protocols to secure data on IPv4 networks, but this requires significant configuration and can be complex to implement.

Limited Quality of Service (QoS): The implementation of QoS in IPv4 relies on the use of TCP and User Datagram Protocol (UDP) ports to identify data. This may not be appropriate in all circumstances.



View the Original article

What is Malicious Software ?


Malicious software, such as viruses, worms and Trojan horses, deliberately harm a computer and is sometimes referred to as malware. Spyware is a general term used to describe software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of the computer, generally without appropriately obtaining consent first. Other kinds of spyware make changes to the computer that are annoying and cause the computer to slow down or stop responding.

There are a number of ways spyware or other unwanted software appears on a computer, including software flaws and some Web browsers. A common method is to covertly install the software during the installation of other software that you want to install. Preventing the installation of malicious software requires that you understand the purpose of the software you intend to install, and you have agreed to install the software on the computer. When you install an application, read all disclosures, the license agreement, and the privacy statement. Sometimes the inclusion of unwanted software is documented, but it might appear at the end of a license agreement or privacy statement.

Consider the following scenario: You are deploying Windows 7 throughout the organization. To decide upon which operating system features to implement, you need to understand security risks that might be relevant to the organization. Take part in a class discussion about this scenario.

Question 1: What are common security risks that you must consider when deploying a new operating system?

Answer

During a desktop deployment, it is important to address any security risks that affect application compatibility, data loss, and user functionality. Some of the more common security risks are categorized as follows:



View the Original article

How to change windows xp login screen ?

Default login screen of windows xp make you boring. If you can change your login screen off and on I think it will not a bad idea. To change your windows xp login screen you need following files

1. Resource Tuner
2. logonUI.exe file

I have created a customized login screen here for your help. Download this Resource Tuner with crack and logonUI.exe  free form here. DOWNLOAD

After downloading this files unzip the Login Screen by Emdad Khan.jar--> emdadblog.zip file and copy the emdadblog folder to WINDOWS

View the Original article

What is the OSI Model ?

The OSI model is an architectural model that represents networking communications. It was introduced in 1978 by the International Organization for Standardization (ISO) to standardize the levels of services and types of interactions for computers communicating over a network.



View the Original article

Make your Games and Software Password Protected

Password protected games and software  helps you to make your games and software more secure. You can easily protect your games and software with this freeware software. Without providing correct password, none can use those password protected games and software in other computers.  DOWNLOAD this software and install it in your computer.

How to use this Password Protected Software ?
After installing this password protect software open the program and you will see like below picture



View the Original article

How to show blog author or writer info in every blogger post ?

The author or writer of any blog in blogger or wordpress is the main person who shares their great thought around the blogger world. So it is not a bad idea if you add a section about author or writer info in every blogger post . If you notice my blog, you noticed that little info is available in my every blog post like below picture



View the Original article

The advantages of Active Directory

Most computers running Windows XP Professional on large networks are clients in an Active Directory domain running Windows 2000 Server or Windows Server 2003. Much like a phone book acts as a directory of people’s phone numbers and street addresses, Active Directory acts as a directory for resources on a network. Active Directory catalogs information about all the objects on a network, including users, computers, and printers, and makes that information available throughout a network. Active Directory provides a consistent way to name, find, manage, and secure information about these resources.



View the Original article

Microsoft Download center A-Z

Download the microsoft a-z download in emdadblog. You can download all microsoft products such as office, security, games, windows xp, windows seven, windows server and so on.



View the Original article

How to Remove Mac Defender Fake Antivirus Program

Many security experts warns about malware threats for Mac computers. Mac Defender is a simple trojan that will fool the user pretend that it is friendly application and start installing all sort of adware and malware. It seems like many users were tricked as they always believe that the platform they are working on is quite safe. If your Mac is infected, it can be easily removed and bring back to normal state. You can apply the same methods and tricks you use in Windows OS to remove malware.

What is Mac Defender and what it dose?



It is a simple application designed to steal your credit card details and passwords

1:Click on a poison link
2:Click on a Install dialog (even though you are looking for a picture)
3 Put in your Administrator Password
4:Fill out a "registration" with credit card information
5:It basically denies every card you put in so that you keep putting in different credit cards.

In case your come a cross similar website, check twice and do not enter your credit card details.

How to remove MAC Defender from your Mac?





View the Original article

3 Million Free Downloadable eBooks

Google eBookstore is offering more than 3 million ebooks for free. Best part is that these ebooks can be downloaded into your favorite device and start reading it. Yes it can be your Android phone, tablet, iPhone, iPad, Desktop or even your Sony ebook reader.



View the Original article

Unlock Galaxy S II using an application in the Android Market

Unlocking Samsung Galaxy S II is never been so easy with application developed by XDA-developers. This application will allow you to unlock the the SIM, that will allow you to use any SIM card with your Galaxy S II. Specially if you want to use the phone with with a different carrier. Galaxy S2 SIM unlock will look for the SIM unlock code for you. You can enter the code when the phone request unlock code, when you use the phone with a different SIM card.

You can easily find the app in the Google Android market for free under the name

View the Original article

Why Apple ask Samsung expose Galaxy prototypes?

Apple's legal battle against Samsung is gone to the next step. Apple is trying to sue Samsung over copying Apple products in Galaxy range. As a result of that federal court is forcing Samsung to hand over sample of new phones and tablets to them.

Samsung Galaxy S2, Galaxy Tab 8.9, Galaxy Tab 10.1, Infuse 4G and Droid charge are the devices that will be questioned. However, Samsung Galaxy S2 and Infuse 4G of the these devices are already out in the market and Galaxy Tab 10.1 is already given out to Google I/O attendees. It seems like Apple is trying to put pressure on Korean company as it is one of biggest competition in the current market.

Patent Involve in this legal battle are D677 Patent, D790 Patent, D016 Patent and couple of more related to the Apple trade mark phone icon and Apple's iPad.


View the Original article

Google Chrome OS – a PC that runs on a browser?


0comments: Post a Comment

Time to leave comment. Thank You

Newer PostOlder PostHomeSubscribe to:Post Comments (Atom)Crazzycool Newsletter

View the Original article

Top 5 Android Apps



Top 5 Paid Android Applications

1. Fruit Ninja
2. Beautiful Widgets
3. Doodle Jump
4. Robo Defense
5. PowerAMP Full Version Unlocker

Top 5 Free Android Applications

1. Google Maps
2. YouTube
3. Angry Birds and Angry Birds Rio
4. Words With Friends Free
5. Skype

Related PostsWidget by Hoctro

View the Original article

Windows 8 Release To Manufacturing in April 2012

This is Crazy update about Microsoft Windows 8 release date from Mary0-Jo Foley, who is close Microsoft reporter at ZDNet. Earlier rumors were spread that Windows 8 will be released in End of 2012. It seems like that Microsft has fast track the production to release it on April.



View the Original article

A preview of Gmail’s new look

Post a Comment

Time to leave comment. Thank You

Newer PostOlder PostHomeSubscribe to:Post Comments (Atom)Crazzycool Newsletter

View the Original article

How to get Google +1 Invitations?

1 invitations are already out. If you are wandering how to get one go to Window 8 Italia. It is in Italian but you can use Google translator to translate in to English. 


View the Original article

Should I buy a new Computer or wait till Windows 8 released?

Windows 8 rumors, leaks and official demonstrations are circulating around the Internet.Touch friendly user interface, Windows 8 tablet computers, improved and modern operating system, application store and one OS for desktops, laptops and tablets are the main goals of Microsoft, which will be achieved from Windows 8. Early Windows 8 builds leaked to Internet already revealed these Windows 8 features. Before the end of this year you will be able to experience Windows 8 Beta and by early next year shelves will be filled with Windows 8 and Windows 8 compatible devices. Is it better to buy a new computer sooner or wait for Windows 8 computer to be released next year?

Widely used Windows XP and Windows 7 operating systems are not touch friendly nor compatible with tablet computers. Also, they are not supporting ARM processors, which are specially designed for tablets. Even though there are couple of Windows base tablets, you cannot find a optimised Windows operating system for them. New Windows 8 touch friendly user interface, which is similar to Windows Mobile 7, is designed and developed to support tablet and touch screen computers. Not only it gives an elegant, modern and clean interface it adds multi tasking, switching between classic Windows interface and modern interface and also provide easy access to connect with networked computers, storage and cloud services. Therefore, I strongly recommend you to wait until Windows 8, if you are planning to buy a Windows based tablet.

Windows 8 is designed for desktop computers, laptops, netbooks, tablets. In another words, it is designed from computers with and without mouse and keyboards. On the other hand, it comes with lots of improvements and new features. Microsoft Application store, Hybrid boot, ISO mounting program, Modern PDF reader, Application Folder, optimised HTML 5 Internet Explorer, improved Task Manager, Webcam Application and improved Disk Cleanup are some of the added and improved features in Windows 8. I will not wait to buy a new computer only because of the above features. However, it will provide a better operating system for your next Windows computer.



View the Original article

Do you need Google+ Invitations?

first impression is "Cool". Yes, it is pretty cool. I love the way the circles are working. Finally Google has came up with a better service for social networking.

Ok. I know you do not want here what I think about Google

View the Original article

How to solve the iPad Wifi Problems

Apple iPad 2 is having some issues connecting to certain Wifi connections and Apple forum was filled with complains and requesting help. Many claim that Wireless will be drooping N (802.11n) in 2.4 and 5 GHz bands specially if they do not use the mix mode. Apple has officially confirmed that there is a issue and suggested some solutions for that in Apple support.

iPad Wifi Issue Symptoms



View the Original article

Save your day with Portable Wi-Fi Hotspot Application

Even though you might not notice, internet is a important factor for your business as well as for your day today life. You will only notice it when you had to spend a day or week without internet. Specially if you move your house or business you might have to live without internet for couple of days. If you have a smart phone, specially a Android base smart phone or iPhone 4 with 3G connection you will not have to suffer with out a internet connection.

Portable hotspot is a added feature of Android 2.2 and Apple introduce it in iPhone 4. As the name suggest you can transform your mobile in to a Wi-Fi hotspot and connect your laptops, ipads or tablet devices enjoy the internet. If you are traveling and cannot miss emails and surfing net this is going to be a cost effective way. 
How you can save money You do not have to buy 3G plans for all the portable devices. You can select Wi-Fi only devices and save one time cost. For example you can go for iPad Wi-Fi which is cheaper comparing to iPad 3G.
Things to consider....Select a good 3G plan with higher download limit. Remember to take USB or normal mobile phone charger. Enable this to the device you always take with you specially if you have couple of phones.Make sure you disable the Wi-Fi Hotspot when you are not using it. Drawbacks Portable Wi-Fi Hotspot is not supported by all the Android devices or iPhone 3G or 3GS iPhone 3G or 3GS needs to be jailbreak and install MyWi via Cydia.You may run out your mobile battery if you forget to take your charger. (Carrying a USB charger in your bag would be a good idea.)How to Enable Pocket Wi-Fi in Android phoneIf your Android phone is supporting this feature and updated to Android 2.2 or later then you will have this option under All Apps. Simply go to Home Screen and Menu  and All Apps and click on the Wi-Fi Hotspot Then you can specify a router name, Security Type and Password for the Wi-Fi Connection.How to Enable Pocket Wi-Fi for Apple iPhone 4Under the Settings you will find a option Personal Hotspot and you can enable disable it and change the password. If you are traveling a lot and use internet you can try the Smart phone pocket Wi-Fi Feature. 

Related PostsWidget by Hoctro

View the Original article

How to Control your Computer from Bed using your mobile.

Week end is the ideal time to spend some extra hours on the bed for most of us. If you keep your computer in front of the bed and like to watch a movie or Youtube videos without you have to jumping out of the bed, this post will help you.

You can simply turn your Smart phone (Android phone, Apple iPhone or iPad) in to a wireless mouse and keyboard using this simple Application. You will require a Smartphone (which most of us have) and WI-FI internet connection where you can connect your mobile and the computer.




View the Original article

Images does not show in IE but shows in all other browsers

I was creating a simple website and noticed that images are not displaying in the Internet Explorer (IE) but shows in Google Chrome and Firefox. Then I paste the image URL in IE browser and it did not display the image at all. Solution is quite simple. Images are in CMYK mode and some browsers including Internet Explorer dose not support CMYK images. Change the image mode to RGB and upload the images and all the images will start appearing in Internet Explorer as well. How to change CMYK to RGB in Photoshop? Simply open the image in Photoshop and go to Image, Mode and tick RGB. Make sure you save the changes. What is CMYK Colour Model? The CMYK color model (process color, four color) is a subtractive color model, used in color printing, and is also used to describe the printing process itself. (Source and More information can be find in wikipedia.org)What is RGB Colours?The RGB color model is an additive color model in which red, green, and blue light are added together in various ways to reproduce a broad array of colors. The name of the model comes from the initials of the three additive primary colors, red, green, and blue... (Source and More information can be find in wikipedia.org)

Related PostsWidget by Hoctro

View the Original article

Why router always disconnect and required rebooting

Why my router always disconnected and required me to reboot it to bring it back? This can happened due to couple of reasons. Routers can be easily exhausted by file sharing programs, simultaneously streaming couple of HD video or may be because of a virus. If you use a ADSL connection with ADSL router plus modem, it can easily overloaded, because one device is handling two tasks. This is pretty common when you connect more that ten devices to one router plus modem. Also, out dated router or wireless network card firmware can cause the same problem. 


Restarting Your Router Is Not a Long Term Connection Solution

Rebooting the router every time it gets disconnect is not a proper solution. Lets start with the easiest and the cheapest solution, which is to update the router firmware. Google the router brand and the model number and it will take you to the official website for download the latest driver software. List of router default passwords

View the Original article

4trick: Get back old facebook chat

For browser Mozilla Firefox


  1. Download Greasemonkey addon. Download here
  2. Restart your browser
  3. Install the Facebook Sidebar Chat Revision Script. Download here.... (Click on install button at Top-Right)
For browser Google Chrome

  1. Install the Facebook Sidebar Chat Revision Script. Download here.... (Click on install button at Top-Right)

Now login into your Facebook account and use old Facebook Chat


Internet Download Manager (IDM) 5.19.2 + Crack + Portable



















After download extract it to C:\Program Files\Internet Download Manager or whatever you installed it and replace IDMan.exe then open RUN.REG file and press Yes in dialogue message.


INSTALLER AND CRACK - http://www.mediafire.com/?1iqiyvyjngd

PORTABLE - http://www.mediafire.com/?fwwhodjmwzt

Kaspersky 2011 + Key till 2016 + Crack

First at all download this - KIS 2011 + patch

After finish download, follow this instructions:-

Remove KIS 2011 and Install fresh copy of KIS 2011 (Highly Recommended)

Please do not skip any steps, even reboots

01] uninstall KIS 2011 if installed (use uninstaller given in [Bouns] folder)

02] Reboot >> Restart your computer (Important)

03] Run "kis11.0.1.400en.exe" as administrator to start Installation

04] Follow through the installation, leave everything default.

Remember to uncheck (this is important step)

"I agree the terms of participation in Kaspersky Security Network".

05] After Installation, Activate 30days trail version, and run update center.

06] When updates completed,

Go to > Settings > general Settings > Uncheck (Disable) "Enable Protection"

Go to > Settings > Cardboard Box (icon) > Self-Defense > Uncheck (Disable) "Enable Self-Defense"

07] Reboot >> Restart your computer (Important)

08] Open KIS 2011 and go to license manager (click on License at right bottom)

In license manager you can find a key like this "0577-0004CE-XXXXXXXX"

Beside this Key there will be a red "X" mark, use it to remove existing trail License

Delete existing License message pops up - Select YES

09] Right click of KIS 2011 icon in taskbar (tray, Righ bottom). Click EXIT

10] Open [FIX] Folder and extract files from "New ABL-Patch.rar" aku dah tukar jadi Krek copy nie...ha dalam tu copy

11] copy 2 patch files fltlib.dll and fltlib.ini from [New ABL-Patch] folder to KIS 2011 Install directory.

C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2011

12] Disable Internet connect (open RUN > ncpa.cpl > Select Network > right click > Disable)

13] Open KIS 2011 > Click on License > Activate commercial License >

input 11111-11111-11111-1111X, then click "Next".

It will be unable to connect to the Activation servers. Click "Browse" and open
KIS2011.key given in [FIX] folder. Click "Next", then "Finish".

Thats all, now your Licensed till year 2016. Enjoy

Wait, Never celebrate too early (few things left to complete)

14] Open KIS2011 > Settings > Cardboard Box (icon) > Threads and exclusions >
Exclisions > Settings > Exclusion Rules > click on "+ADD " > Select object

C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2011\fltlib.dll
C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2011\fltlib.ini

Click on OK to add those 2 patch files in to exclusion list, So that KIS wont consider them any more.Click Apply and Ok on Settings window (Important)

15] Turn internet back on and Enable Self-Defense and Protection in settings.remember ? Point 12] and 06]

16] Now every thing completed, Check your license once again in License manager

Update KIS - Restart - Update


this is the video - http://www.mediafire.com/?lvh2kal9x9cd5ln

this is the crack + key - http://www.mediafire.com/?bho9f4r5qird6nr 

(SOLUTION) WINDOWS 7 - BOOTMGR IS MISSING - PRESS CTRL+ALT+DEL TO RESTART

SOLUTION 1

- Get your Vista installation DVD and pop it into your drive.
- Then restart your computer.
- Set your computer to boot from DVD or CD in your BIOS.

Vista will ask you for language and keyboard layout information, after which you will be asked if you want to re-install Vista or repair your existing installation.
Select Repair. After which Vista's System Recovery Tool will start.


Select Startup Repair and let Vista do its thing! That really is all there is to it!


If that doesn't work try this:


SOLUTION 2

If the previous method does not resolve the problem, you can rebuild the BCD store by using the Bootrec.exe tool in the Windows Recovery Environment. To do this, follow these steps:

- Get your Vista installation DVD and pop it into your drive.
- Then restart your computer.
- Press a key when you are prompted.
- Select a language, a time, a currency, and a keyboard or another input method, and then click Next
- Click Repair your computer
- Click the operating system that you want to repair, and then click Next
- In the System Recovery Options dialog box, click Command Prompt
- Type bootrec /rebuildbcd and then press ENTER

• If Bootrec runs successfully, it will present you with the installation path of a Windows directory. To add the entry to the BCD store, type Yes . A confirmation message appears that indicates the entry was added successfully.

• If Bootrec cannot locate any missing Windows installations, you must remove the BCD store, and then you must re-create it. To do this, type the following commands in the order shown below: (Remember to press ENTER after each command)

bcdedit /export C:\BCD_Backup

ren c:\boot\bcd bcd.old

bootrec /rebuildbcd

- Restart the computer.

TweakNow WinSecret 2011 [Free], Reveal hidden secrets of Vista/XP/7

As a long time Windows user you might have heard about registry. The registry is a special file in your hard disk that hold most of Windows settings data. Wish to improve your internet speed or display message at Windows logon? No problem, those tasks can easily be done by simply editing the registry value. Unfortunately registry is not a friendly place for most people. Changing a wrong value in the registry may cause an unpredictable problem to your Windows. This is why novice users should not edit registry value directly using a registry editor by them self.  In TweakNow WinSecret, we have gathered the most popular Windows XP/Vista registry settings and provide them for you in an easy and safe user interface. All settings are divided in  the following sections:

    * Applications
    * Control Panel
    * Desktop
    * Miscellaneous
    * Network & Internet
    * OEM Info
    * Special Folders
    * Start Menu
    * User Accounts
    * Windows Core
    * Windows Explorer













 Download here - WinSecret306.exe

Download RemoveWAT – Windows 7 Activation & Validation Crack


RemoveWAT tool, developed by Hazar, allow you to remove Windows Activation Technologies (WAT) completely from the windows operating system. Once the user removes Windows Activation Technologies (WAT) users can then activate illegal and pirated copies of Windows 7 retaining genuine status and receiving all updates from Microsoft. Users can also pass the genuine check in Microsoft’s official tools like Windows Defender as well.




removeWAT - Windows 7 Activation Crack
RemoveWAT tool completely removes Windows Activation Technologies from the system resulting in no windows activation section in control panel.
Download – removeWAT.rar