Access and Visit US-Only Restricted Websites (Hulu, Pandora, Veoh, ABC, CW) from Outside of United States  

Posted by Maddi in

There are some Internet services and websites that is been restricted or viewable by visitors from continent of United States of America (USA), and most likely Canada only. Most of the restrictions are placed on video streaming contents which may subject to copyright, or sites that target specific audiences only.

Some of the free contents services that restrict block viewers and visitors from outside of United States (some does permit Canada) including the following, together with the error messages that accompanied on the inaccessible pages, embedded video clips or contents.

Sorry, currently our video library can only be streamed from within the United States. (Hulu, a popular video hosting service offering high-quality streaming video of TV shows and movies, primarily from NBC and FOX and their cable networks.)

We are deeply, deeply sorry to say that due to licensing constraints, we can no longer allow access to Pandora for listeners located outside of the U.S. (Pandora)

Veoh is no longer available in COUNTRY_NAME. or This video is not available in your region. (Veoh Internet Television which also opens to some other wealthy countries)

Only viewers within the United States can watch these full-length episodes. (ABC Full Episode Player)

Thank you for your interest in The CW. This service is currently available to viewers living in the United States. (The CWTV Video)

Some other websites and Internet services that are blocked and restricted to non-US or many international countries include online game Mabinogi and OpenPandora which exposes Pandora music discovery service.

If you’re American, then you must be thinking that you supposed to be able to watch and browse these “US-only” websites and video streaming contents, especially to catch the latest and newest series of TV series and dramas, music videos or listening to shared music. Luckily it’s possible to bypass and unlock the country-based ban or blockage.

All US-only websites or country-based restriction relies on the IP address. Blocks of IP addresses are issued and assigned to specific country in bulk. When an IP address is translated to be located in an unsupported countries, access will be blocked. So in order to bypass the IP address based blocking ban, just mask the real location with an IP address to one within the supported country, primarily United States.

There are plenty of ways to virtually change the IP address or mask the real IP address to an IP address in US, so that the website or service such as Hulu, Veoh, Pandora, Full Episode Player, the CW and etc is fooled and tricked into verifying that the visitor is actually from America even though he or she is thousands of miles away in another continent. Three main methods are using a proxy, a VPN or Tor network.

Web Based Proxy

Proxy server or web proxy has long been used to bypass government or company filtering or to ensure privacy and anonymity online. It’s also been used to access blocked websites by firewall, router or filtering service. For examples, hundreds of proxies for accessing blocked MySpace or Facebook, which the US hosted web based proxies can also be used to try to access the US-only website from outside of United States. There are compilation of web proxies available at sites such as, glype proxies and

HTTP Proxy Server

If you’re not keen on web proxy, but a real proxy server, Charon is a program that can search through search engines for posted proxies and check if the proxies is good or bad. And of course there many sites that compile HTTP proxies available. Again, only US hosted proxy server is meaningful. To use a HTTP or HTTPS proxy server, user have to configure the information of proxy server settings in the web browser. For Firefox, go to Tools -> Options -> Advanced -> Connection Settings -> Manual Proxy Configuration and add the proxy IP address and port. For IE, go to Tools -> Internet Options -> Connections -> LAN settings -> Use a proxy server for your LAN to enter the IP address and port number of the selected proxy.


VPN is costly, and there is hardly any free option. But one good choice is Hotspot Shield, which originally is intended to provide secure VPN tunnel for users accessing Internet in unencrypted wireless network using public WiFi access point. The VPN server of Hotspot Shield (AnchorFree) is located in United States, and once connected to the Hotspot Shield VPN, user will be browsing the Internet with the VPN IP address, and will trick all websites into thinking that the PC or Mac system is in United States of America.

Another viable alternative to Hotspot Shield is the newly launched AlwaysVPN, which is still in beta.

Unfortunately Hotspot Shield is currently limited to 3 GB of bandwidth usage over 30 days rolling period. Although it’s possible to spoof MAC address to increase the Hotspot Shield bandwidth limit, the connection speed may be slow too. If you willing to pay, there is much better choice such as WiTopia and HotSpotVPN.

Tor Anonymity Network

Tor (The Onion Router) is a free software implementation of second-generation onion routing – a system enabling its users to communicate anonymously on the Internet by bouncing network communication around a distributed network of servers called onion routers. It means that if the onion server is located in US, then it can be used as a trick to access US-only web contents.

To use Tor, user need to force the last server to be in US and use Tor only for network transmission by the web browser or application such as OpenPandora. Follow these steps to use Tor to bypass out-of-US ban.

  1. Download and install Tor.
  2. Open torrc file from Start -> All Programs -> Tor, and then append the following two lines to the the bottom of the file:

    StrictExitNodes 1
    exitnodes desync,whistlersmother,lefkada,bettyboop,croeso,TorLuwakOrg,nixnix,inap1,redpineapple,cronic,sasquatch,slowturtle2,moria1,moria2,torxmission,augrime,err,sasquatch,foundry,peertechdata

    Note that the exitnodes may change, dead, offline or no longer relay traffic. If the above exit nodes doesn’t work, try to change the exit nodes (after the exitnodes declaration) to any mix of the following: BostonUCompsci, lefkada, croeso, bettyboop, moobzilla, sasquatch, jalopy,nixnix, ThreadAbort, CH1rrskur7, A1D7DB57EFA57ACA20, agrippator, AoF, ArikaYumemiya, AscendedDaniel, asclepias, augrime, bettyboop, blueice, BostonUCompSci, Butterfly, cjb, codemonkeysorg, croeso, cronic, desync, err, foundry, httpdnet, ieditconfiggg333, illuminata, inap1, Insytez, invisitor, iris, jalopy, lefkada, MasterMindZ, mmarketinfo, moilen, moria1, moria2, moria5, MrRelay, mushin, nbx, nixnix, peertechdata, pickaproxy, random, redpineapple, rodos, sasquatch, schadenfreude, serifos, sipbtor, slowturtle2, soltor, stugsDOTcom, styx, theprocess, torftw, TorLuwakOrg, torxmission, vwglobaltoadcom, whistlersmother, ygrenys, yo2, BostonUCompsci, lefkada, croeso, bettyboop, moobzilla, sasquatch, jalopy,nixnix, ThreadAbort, CH1rrskur7, desync, whistlersmother, lefkada, bettyboop, croeso, torxmission, nixnix, jalopy, soltor, MrRelay.

    The updated torrc file will force the last server to be located in US.

    Note that you can also manually edit the torrc file in Windows. It’s located under either \Application Data\tor\torrc or \username\Application Data\tor\torrc in Windows. On Mac OS X, open a text editor and load /Library/Tor/torrc. On Unix, if you installed a pre-built package, look for /etc/torrc or /etc/tor/torrc or consult your package’s documentation. If you installed from source, you may not have a torrc installed yet: look in /usr/local/etc/ and note that you may need to manually copy torrc.sample to torrc.

  3. This step uses as an example. For other site or service, define accordingly. Open Notepad and paste the the following text:

    function FindProxyForURL(url, host)
    if (shExpMatch(host, "")) return "SOCKS";
    return "DIRECT";

    Save the file with file name as tor.pac. Remember the full path (folder location) to the saved tor.pac. This configuration allows HTTP traffic to route through Tor SOCKS interface to its virtual circuit.

  4. Set tor.pac to be used for automatic configuration in Internet Explorer. To do so, in Internet Explorer, Go to Tools -> Internet Options -> Connections -> LAN settings. Check or select Use automatic configuration script, and the in the text box, write in the full path to tor.pac preceded with file://. For example, file://C:\tor\tor.pac.

    Note: In Firefox, go to Tools -> Options -> Advanced -> Network -> Settings (Connection) and check the radio button of Automatic proxy config URL. Type file:// follow by the full path to tor.pac.

  5. Start Tor.
  6. Load browser or other application that needed to be spoofed as visited from US location. It may take some time to load the contents though.

How to Download and Save All Images, Icons, Embed Flash and Media Files on a Web Page in Firefox 3  

Posted by Maddi in ,

When browsing a web page which has lots of beautiful pictures, graphics, photos and images, or has embedded Flash video, or has attractive icons and other media components or elements, Firefox 3 can download and save all of these graphics and media on the web page altogether at once simultaneously, without any plugin, extension, add-on or third party programs.

To download and save all web page’s graphics, images, icons, media and other files, click on the site identification icon to the left of the Location Bar.

Firefox Site Identification Button

The Site Identity Information button is the new feature of Firefox 3, and normally represented by the favorite icon (favicon.ico) of the website. When clicked, a dialog will display information about the site with a “More Information” button. Click on the More Information… button to open “Page Info” dialog panel.

Click on the Media tab. All elements such as background, image, icon and embed on the web pages are listed in the elements listing, together with their respective address link location. Some graphics even come with a preview. Select and highlight any element that wants to be saved, then click on Save As button.

Save All Media in Firefox 3

To download and save all file elements on the web pages, press Ctrl-A to select all (everything), then click on Save As.

Comprehensive List of How (Key to Press) to Access BIOS for Various OEM and Computer Systems  

Posted by Maddi in

BIOS (Basic Input/Output System) is a firmware code that run by an PC when first powered on to identify and initiate component hardware (such as hard disk, floppy and optical disk drives), and then run bootstrapping or booting up process to load or execute and let operating system taking control of the computer machine.

Most OEM PC or custom-built clone PC using third-party motherboard (MOBO) allows user to configure various settings in BIOS (CMOS setup) to enter BIOS Setup or Configuration Utility in order to enable or disable devices or ports available, and more commonly, boot device priority or sequence. Some advanced settings also allow user to tweak computer performance, such as CPU clock speed multiplier and CPU front side bus (FSB) rate for overclocking, chipset features, DRAM parity, speed and timing, etc.

To access BIOS configuration screen, user need to press and invoke a specific hotkey or keys combination during the initial BIOS load screen (usually right after the computer is powered on). Here’s a list of the ways and access keys to press to access BIOS Setup Utility on variety of popular OEM computer systems, motherboard makers and major BIOS brands. Note that some BIOS or computer systems may have more than one method of accessing BIOS depending on when the BIOS is released.

Acer (Aspire, Power, Veriton, Extensa, Ferrari, TravelMate, Altos): Press [F2] or [Del] Immediately After Power Up
Acer (Altos 600 Server): Press [Ctrl]+[Alt]+[Esc] or [F1] During Boot (for Advanced Options)
Acer (Older PC): Press [F1] or [Ctrl]+[Alt]+[Esc] to Access BIOS
AMI (American Megatrends AMIBIOS, AMI BIOS): Press [Delete] During Boot
AMI (American Megatrends AMIBIOS, AMI BIOS) – Old Version: Press [F1] or [F2] During Boot
Award BIOS (AwardBIOS): Press [Del] After Powering Up Computer
Award BIOS (AwardBIOS) – Old Version : Press [Ctrl]+[Alt]+[Esc] During Boot
ALR: Press [Ctrl]+[Alt]+[Esc] or [Ctrl]+[Alt]+[Del] During Boot
ARI: Press [Ctrl]+[Alt]+[Esc] or [Ctrl]+[Alt]+[Del] During Boot
AST Advantage: Press [Ctrl]+[Alt]+[Esc] During Boot
Compaq (Presario, Prolinea, Deskpro, Systempro, Portable): Press [F10] When Blinking Cursor Jumps To Top Right Corner of Screen
Compaq (Presario, Prolinea, Deskpro, Systempro, Portable): Press [F10] When Logo Screen Is Displayed
Compaq (Older Computers): Press [F1], [F2], [F10], or [Del] Key
Cybermax: Press [Esc] Key
Dell (XPS, Dimension, Inspiron, Latitude. OptiPlex, Precision, Vostro): Press F2 When Dell Logo Is Displayed Until “Entering Setup” Appears
Dell (Older 486 Models): Press [Ctrl]+[Alt]+[Enter] During Boot
Dell (Some Models): Press Reset Button Twice (i.e. Power Reset Button)
Dell Dimension L566cx System: Press [Del]
Dell (Older Laptop Models) : Press [Fn]+[Esc] or [Fn]+[F1]
DTK (Datatech Enterprises): Press [Esc] Key Right After Powering On the PC.
EISA Computer: Press the Reset button on the Front of the Computer, then Press [Ctrl]+[Alt]+[Esc] immediately when the memory count begins or Press [Crtl]+[Alt]+[S].
eMachines (eMonster, eTower, eOne, S-Series, T-Series): Press [Tab] or [Del] During Boot
eMachine (Some Older Computers): Press [F2]
Fujitsu (LifeBook, Esprimo, Amilo, Tablet, DeskPower): Press [F2] When Fujitsu Logo Is Appearing.
Gateway Using Phoenix BIOS (DX, FX, One, GM, GT, GX, Profile, Astro): Press [F1]
Gateway (Some Older PCs): Press [F2]
Hewlett-Parkard (HP Pavilion, TouchSmart, Vectra, OmniBook, Tablet): Press [F1] Upon Startup or Bootup
Hewlett-Parkard (HP Alternative): Press [F2] or [Esc]
Hewlett-Parkard (HP) Tablet PC: Press [F10] or [F12]
IBM ThinkPad using IBM BIOS (Early Models): Press [Ctrl]+[Alt]+[Ins] When Cursor Is At Upper-Right Corner of Screen
IBM ThinkPad using IBM BIOS (Later Models): Press and Hold [F1] When Powering Up Laptop
IBM ThinkPad using Phoenix BIOS: Press [Ctrl]+[Alt]+[F11] from DOS Prompt
IBM PS/1 (Late Models), PS/ValuePoint and 330s: Press [Ctrl]+[Alt]+[?]
IBM PS/2 with Reference Partition: Press [Insert] During Boot
IBM PS/2: Press [Ctrl]+[Ins] When Pointer Is At Top Right of Screen
IBM PS/2: Need Reference Disk and ADF Disk for Setup
IBM PS/2 75 and 90: Press [Ctrl]+[Alt]+[?]
IBM (PC, XT, AT): Press [F1] Immediately On Powering On the Computer
IBM (Older Computers or Notebooks): Press [F2]
Lenovo (ThinkPad, IdeaPad, 3000 Series, ThinkCentre, ThinkStation): Press [F1] or [F2] on Boot Up
Lenovo (Older Products): Press [Ctrl]+[Alt]+[F3], [Ctrl]+[Alt]+[Ins] or [Fn]+[F1].
Microid Research MR BIOS: Press [F1]
Micron (MPC Computers ClientPro, TransPort): Press [F1], [F2] or [Del] On Startup
NEC (PowerMate, Versa, W-Series): Press [F2] During Boot
NEC Versa Notebook: Press and Hold Down [F1] Upon Startup or Bootup
Olivetti PC Pro: Press [Ctrl]+[Alt]+[Shift]+[Del](in Num Pad) During Boot
Packard Bell (8900 Series, 9000 Series, Pulsar, Platinum, EasyNote, imedia, iextreme): Press [F1], [F2], or [Del].
Packard Bell (Early 386 and 486 Dodels): Press [Ctrl]+[Alt]+[S] Sequence
Phoenix BIOS (Phoenix-Award BIOS): Press [Del] During Power On Self-Test
Phoenix BIOS (Phoenix-Award BIOS) – Old Version: Press [Ctrl]+[Alt]+[S], [Ctrl]+[Alt]+[Esc], [Ctrl]+[Alt]+[Ins] or [Ctrl]+[S] During Power On Boot Self-Test Right After Startup
Sharp (Notebook Laptops, Actius UltraLite): Press [F2] On Computer Starts
Sharp (Old PCs): Require Setup Diagnostics Disk to Access BIOS
Shuttle (Glamor G-Series, D’vo, Prima P2-Series, Workstation, X Mini XPC, Surveillance): Press [F2] or [Del] on System Startup
Sony (VAIO, PCG-Series, VGN-Series): Press [F1], [F2] or [F3] After Turning On the Computer
Sony Vaio 320 Series: Press [F2] During Boot
Tandon 386: press [Ctrl]+[Shift]+[Esc]
Tandon: press [Ctrl]+[Shift]+[Esc]
Toshiba (Portégé, Satellite, Tecra): Press [Esc] During Boot
Toshiba (Portégé, Satellite, Tecra with Phoenix BIOS): Press [F1] during Boot
Zenith, Phoenix: Press [Ctrl]+[Alt]+[Ins] During Boot

Miscellaneous and Other Common BIOS Key Sequences

[Fn]+[Function Key]

Note that for some older system with Phoenix BIOS, the following steps are required to get to BIOS setup screen:

  1. Exit or boot up to DOS.
  2. Press [Ctrl]+[Alt]+[Esc] to enter setup screen.
  3. If hot key sequence above doesn’t work due to changes or problems been made on the system, then try to use the key to lock the keyboard while leaving computer switched on.
  4. Press the Reset button on the front of the computer. A message will appear asking user to unlock the keyboard.
  5. Unlock the keyboard and press [F2] to run the CMOS setup.
  6. Press [Del] to bring up the CMOS setup program.

Use Google Calendar To Track Mysterious Gmail Users  

Posted by Maddi in ,

Occasionally you receive some important email from clients, business partners, etc. You might wonder why the email is sent as a carbon copy (cc) to some unknown parties and you’re probably keen to find out who these people are. Well, if these unfamiliar people names use Gmail service, a small trick here probably can help you find out who they are.

Since Google has allowed users to consolidate their Google services with one single log in, there are strong tie-ins between users’ Gmail and other services provided by Google. Hence, users can use the Google calendar to find out the name behind those unknown Gmail addresses:

a. Log in to your Google Calendar

b. Go to “My Calendar”. Click on your name and a sub menu will appear.

c. Click the “Share this Calendar”

d. Enter the unknown Gmail address into the “Person” box. For instance, we try Click “Add Person” or press enter.

e. The name will be added and displayed on the screen. Click “Save” to save the changes.

f. Now type in the same email address again,, and a sub menu will appear showing the name and the email address as follows:

It seems Smart Ass is the name behind

Tips of How to Hide Data in Notepad  

Posted by Maddi in , , , , , , , ,

When you create a new file and type some data, one unnamed default stream is created to store all data written to the file. Since NTFS file system in Windows 2000 or above has supported Alternate Data Streams, so you are allowed to create additional streams for text file. All data stored in the addition streams will be hidden and none of us will be able to read the data when opening the file. This may be useful when you would like to hide some sensitive info from being read by others when sharing the file to public.

To create hidden data in the text file, follow below steps:

1) Open command prompt, you may change to any directory as you like to create the text file.
2) Type notepad MyFile.txt:StoreHiddenData then press enter. MyFile.txt is the text file you are going to create whereas StoreHiddenData is the alternate stream name.
3) A message will be pop up “Cannot find the C:\MyFile.txt:StoreHiddenData.txt file”. Do you want to create a new file?”, click OK button to proceed create the new file.
4) A notepad will be pop up. Type any data that you want to be hidden from others. Save the file and you are now successfully creating hidden data for this file.

The hidden data you have created will not contribute to the total file size. Just open Explorer and look for this file, you will observe that the file size is still zero. Now you can go ahead to type some data and saved it as usual. Good thing is, it will not affect the hidden data that you have saved earlier. On top of that, you can display or delete all the hidden data you have saved previously. However, you must download and install Streams application before you can do so. To delete hidden data, go to command prompt and type more <>

How to Watch 720p Video Clip in YouTube  

Posted by Maddi in ,

Prior to the feature “watch in high quality” offered by YouTube, users could hardly associate “high quality” or “high-resolution” to YouTube’s video clips. To enjoy a higher quality High Definition resolution and stereo audio mode video clips, users have used some tricks in assessing YouTube’s URL. They used a hack switch of &fmt=18 or &fmt=6 to view high quality video resolution. However, this trick has become obsolete once the “watch in high quality” feature was introduced. Having said that, now you probably can use the trick again if you want to watch 720p (720 pixels x 1280 pixels) widescreen video clips.

The “watch in high quality” videos offered by YouTube are available in two versions, both of which have a maximum picture size of 480 x 360 pixels. Clicking on to this feature wouldn’t get you 720p. To get a truly “high quality” version video in 720p, try the hack switch trick again. Instead of the old &fmt=18 or &fmt=6, now you need to add &fmt=22 to the end of the URL. It takes a while for YouTube to stream the high quality video. Of course this trick only works if there are 720p videos uploaded.

To give it a try, you can test this video clip: To get the 720p version, add in &fmt=22. It reads as If you download this video via MP4, you can read the audio and video formats as follow:

Audio: AAC 44100Hz stereo 232Kbps
Video: MPEG4 Video (H264) 1280×720

How to Fix Desktop and Toolbar Fail to Load After Windows System Startup  

Posted by Maddi in , , , , , , ,

Occasionally you may encounter a situation whereby your desktop icons and toolbar are missing after rebooting your PC system? It could be due to various reasons but don’t be panic as there are few solutions that you can get them fixed as listed below.

1) Delete “explorer.exe” in registry

i) Click Start -> Run, then type regedit and click OK
ii) Locate to [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options]
iii) If there is “exporer.exe” subkey under Image File Execution Options, then right click and choose Delete to delete this subkey.
iv) Restart your PC.

2) Restore missing “USERINIT” registry value

i) Copy below string and paste into notepad

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]

ii) If your Windows is not installed under C drive, then change C: to your windows drive letter.
iii) Save the file as userinit.reg.
iv) Double click to run the registry file as save at step iii) to restore “USERINIT” value in registry.
v) Restart your PC

3) Restore missing “explorer.exe” in registry

i) Copy below string and save into notepad:

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]

ii) Save it as RestoreExplorer.reg
iii) Double click to run the registry file to restore “explorer.exe” in registry.
iv) Restart your PC

4) Missing Explorer.exe in C:\Windows

i) Check if explorer.exe is missing from C:\Windows (If windows is installed in other drive, change C: to your windows drive letter)
ii) If confirm is missing, then click Start -> Run, then type sfc /scannow to run System File Checker utility.
iii) Once running is completed, check if explorer.exe is restored under C:\Windows
iv) If it is not restored, then insert Windows installer into CD-ROM and restart your PC.
v) At setup screen, choose “Repair or Recover” by pressing “R”.
vi) At the command prompt, enter below string:

expand D:\i386 /F:EXPLORER.EX_ C:\WINDOWS\explorer.exe /y

D: is CD drive letter and C: is Windows drive letter. Change it if your CD and Windows drive is not at this letter.

vii) Type exit to exit Recovery Console.

How to Change Default File Saving Format from Docx to Doc in Word 2007  

Posted by Maddi in

Docx is a new default file saving format being introduced in Word 2007 that is based on Open XML and uses ZIP compression to reduce the overall file size. However, you probably don’t want the file to be saved under docx format due to many people are still using Office 2000/2003/XP without Microsoft Office Compatibility Pack being installed, that make the new file format not fully compatible with existing word versions. Instead of changing the file format from docx to doc each and every time when you want to save a file, now you can change the default saving format directly by following the below steps.

Below are the steps showing how to change the default file saving format from docx to doc:

1) Click Office button, as located on the left top in word 2007

2) On the drop down menu, click Word Options button as located at bottom

3) For the pop up Word Options window, click Save as shown on left panel

4) Under Save documents section, click on the drop down of “Save files in this format”, then choose “Word97-2003 Document (*.doc)”.

5) Click OK button the save the setting.

Hopefully these simple steps will save you some time if you intend to change the default file format as I have spent some effort trying to locate it in its totally fresh interface for much productive daily work.

How to Select and Copy Text from Restricted Website  

Posted by Maddi in

Have you ever experienced some of web pages that don’t allow you to select and copy text? One of the intention is to prevent anybody from stealing the content and distribute it for commercial purpose. In fact this is a little trick that is done by using javascript which prevent you from selecting the text and eventually fail to copy it. Here we would like to show some simple steps that you can turn the situation around by able to copy the text without any restriction.

To overcome this restriction, follow below steps:

1) Go to the website which restricts you from selecting and copying.
2) Copy below javascript and paste it at the address bar and hit enter key.


3) Now you can select and copy the text from this website using conventional way – highlight the text followed by CTRL C to copy, then paste it into notepad or word document.

Hope this simple trick will able to help you overcome some situation whereby you need to copy the content for personal reference and please use this trick wisely!

Tips of How to Prevent Your Gmail from Being Hacked by Phishers  

Posted by Maddi in

Nowadays it is very common to hear about online security vulnerability with email and domains being stolen by unauthorized third parties. As a frequent internet surfer, how are you going to ensure your Gmail is safe from being attacked by phishers and prevent your private information from being stolen by third parties?

You never know or suspect the email is actually sent by phisher as the web page looks like a legitimate site you have visited before. Phishers can imitate as banks, email, online merchants, payment services providers and even governments that you may be confused with what they have claimed and follow the instructions to enter your username, password and other private information on the site. All these information can be used by phishers to steal your bank money, open new credit card applications under your name and etc. In order to prevent or minimize such incident from happening, there are few tips you can apply to prevent phishers’ attacks:

Examine if there are any suspicious filters which are not created by you
Access to your Gmail account, go to Setting -> Filters, then verify if there are any filters which are not created by you. Delete them right away if there is any.

Disable Forwarding and POP/IMAP
Access to your Gmail account, go to Setting -> Forwarding and POP/IMAP, disable forwarding, POP and IMAP if you have not used them.

Be alert when being asked for sensitive information.
Any email or link in the email asking about your user name, password, bank account number or other personal information need to be cautious before submitting those information. Bear in mind that most of the legitimate websites never ask for sensitive information through this channel.

Do not click on suspicious links in email
If you receive an email asking for private information from a organization which you know of, instead of clicking on the link directly from the email, go to the organization website directly by typing the address in URL. If there is something you need to do, usually there will be an announcement on the homepage. If you can’t find any information from the homepage, don’t hesitate to call the respective party to find out more.

Use a browser that has a phishing filter
Use the the latest versions of browsers such as Firefox 3.x, Internet Explorer 7, and Opera 9.x which have included phishing filters for safer web browsing experience without being interrupted by these kind of phishing activities.

Do not be deceived by “great offers” or fantastic advertisement
Whenever you have received any online offers and requires you to enter private information, don’t be too excited and make sure that it is really safe or try to find more information.

How to Disable Registry Editor Editing Tool (regedit)  

Posted by Maddi in , , , , , , ,

All Windows operating system, from as early as Windows 3.x has equipped with a registry editing tool, known as “Registration Info Editor” or “Registration Editor” at that time, which evolves to regedit.exe or regedt32.exe since Windows 9x and Windows NT. Messing and editing the registry is always dangerous, as any erroneous or careless registry editing may cause irrecoverable or irreversible system damage, worst may come to the extent the computer cannot be boot up properly anymore.

For user who doesn’t want to run or use Registry Editor at all, or for people who is using a shared computer and want to disable and stop all or some users from using Registry Editor, Windows operating system such as Windows XP, Windows Vista, Windows 7, Windows Server 2003 and 2008 allows administrator to use group policy to disable the Registry Editor.

To disable the Registry Editor for currently logged on user:

  1. Click Start -> Run, and then type regedit (type in Start Search for Windows Vista and 7), and press Enter.
  2. Navigate to the following registry key:


  3. Create a New -> Key named System.
  4. At the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System registry branch, create a new DWORD (32-bit) Value (REG_DWORD) named as DisableRegistryTools.
  5. Set the value data for DisableRegistryTools to 1 to disable the Registry Editor.

    Warning: Before enable to blocking of Registry Editor, think careful as once the setting is enabled, user will lock himself or herself out of the registry, and will not be able to use Regedit to undo the change. However, there are workarounds to re-enable the Registry Editor after disabling.

Note: It’s also possible to disable the Registry Editor for all user accounts on the PC by creating and changing the value of DisableRegistryTools to 1 in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System registry key.

Registry editing has been disabled by your administrator

Alternatively, users using operating system with Local Group Policy Editor (GPedit.msc) can navigate to User Configuration -> Administrative Templates -> System and locate Prevent access to registry editing tools option to disable the Registry Editor access.

How to Enable the Registry Editor When Disabled by Administrator  

Posted by Maddi in , , , ,

Registry Editor, a main registry editing tool equipped in all versions and editions of Windows operating system, can be disabled, blocked and locked to prevent the RegEdit from been ran or executed by users in order to protect important system registry. Other possibility of Registry Editor been disabled is caused by virus or worm such as W32/Brontok-C.

When Registry Editor is disabled, user unable and cannot open or run Registry Editor anymore. Any attempt to run RegEdit.exe will return the error “Registry editing has been disabled by your administrator”. Hence it’s impossible to remove the restriction on Registry Editor usage by using the Registry Editor itself. However, it’s possible to use various workaround to directly edit the registry to remove the policy that blocks Registry Editor usage.

Registry editing has been disabled by your administrator

Enable Registry Editor using Local Group Policy Editor

For user using Windows XP Professional, Windows Vista Ultimate, Windows Server 2003 or 2008 with Local Group Policy Editor and has access to an administrative user account, user can change the registry editor options in the Local Group Policy Editor.

  1. Click on Start -> Run (or Start Search in Windows Vista).
  2. Enter GPEdit.msc and then press Enter.
  3. Navigate to the following location:

    User Configuration -> Administrative Templates -> System

  4. In the Settings pane, locate the Prevent access to registry editing tools option, and then double-click on it to open the settings dialog.
  5. Select Disabled or Not Configured.
  6. Click on OK button.
  7. Try to run RegEdit.exe, and if required (still blocking yet), restart the computer.

VBS Script to Enable or Disable Registry Editor

Doug Knox has created a .vbs VB script that able to toggle between enable or disable the Registry Editor. Right click to download and save the regtools.vbs into a folder. Then double click on the VBS file to run it.

The regtools.vbs VB script file will check for the appropriate value related to disabling/enabling of Registry Editor. If the registry key is not found, the key will be created to disable Registry Editor. If the value was found, it will be toggled to its opposite state and you will be informed that you need to log off and log back on or restart your computer. All change by the script is made in HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System.

UnHookExec.inf by Symantec to Reset Registry Values to Default Settings

In many cases, disabling of Registry Editor is caused by virus, worm or Trojan, which attempts to stop user from fixing any changes to the registry, which normally affects changes to one or more of the shell\open\command keys. For example, exefile\shell\open\command key is changed, the virus, worm or Trojan threat will run each time that system run any .exe file. As such, Symantec create a .inf script tool to reset these registry values to their default settings.

WARNING: The UnHookExec.inf will reset registry keys and values related to BAT, COM, EXE, PIF, REG and SCR extensions, beside re-enabling the Registry Editor. Hence, users who just want to re-enable the Registry Editor has to manually modify the .inf file to remove the unnecessary commands.

Download the file UnHookExec.inf and save it to your Windows desktop.

Right-click the UnHookExec.inf file and click install. Action will be taken immediately. No display, nor any notice or boxes will appear before or after running. Try to run RegEdit.exe again, restart and reboot PC if it’s still blocked.

New Keyboard Shortcut Keys (HotKeys) in Windows 7  

Posted by Maddi in

In Windows 7, mouse is still essential, with lots of new feature which takes advantage of mouse gesture, such as Aero Snap, Aero Peek, Aero Shake and etc. However, some users still prefer to use keyboard to use the Windows operating system.

For keyboard lover, Microsoft has added several keyboard shortcuts, hot keys or keyboard accelerators to make navigation and usage of Windows 7, especially the new Windows Aero snapping feature easier by using keyboard. Here’s a few keyboard shortcut keys or keyboard accelerators that new in Windows 7.

Windows + ↑ (Up Arrow) – Maximize window

Windows + ← (Left Arrow) – Snap window to left side covering half of desktop space. Continue pressing the keyboard shortcut will rotate the window between snap to left, snap to right and restore to normal position.

Windows + → (Right Arrow) – Snap window to right side covering half of desktop space. Continue pressing the keyboard shortcut will rotate the window between snap to left, snap to right and restore to normal position.

Windows + ↓ (Down Arrow) – Minimize the window. Restore to normal size and position if the window is currently maximized.

Windows + Home – Clear all but the active window.

Windows + Space – All windows become transparent so you can see through to the desktop.

Windows + Shift + ← (Left Arrow) – Move the active window to the adjacent monitor on the left for dual or multiple monitors setup.

Windows + Shift + → (Right Arrow) – Move the active window to the adjacent monitor on the right for dual or multiple monitors setup.

Windows + T – Show preview thumbnail of running applications in Windows Taskbar one by one without mouse over.

Windows + P – Adjust presentation options of the display on computer or projector.

Windows + + (Add) – Zoom in.

Windows + – (Minus or Dash) – Zoom out.

Shift + Click a Taskbar item: Open a new instance of that particular application.

Other popular or common keyboard hotkeys which are already been used in Windows Vista:

Windows + D – Show desktop and restore desktop (minimize or restore all windows).

Windows + M – Minimize all windows.

Windows + U – Open Ease of Access Center.

Windows + F – Search window.

Windows + G – Bring all gadgets on top and foreground.

Windows + X – Run Windows Mobility Center.

Windows + R – Open ‘Run’ command.

Windows + E – Run Windows Explorer.

Windows + L – Lock the computer.

Windows + Pause [Break] – Open System Properties.

Windows + [number] – Activate and run the program pinned on Windows 7 Taskbar, running program won’t be affected.

Windows + Tab – Windows Aero Task Switcher

F1 – Help

F3 – Search

Task Manager Tabs and Menu Bar Missing or Disappear  

Posted by Maddi in

When opening or running Task Manager, the Task Manager top-level menu bar and tabs may be missing and disappeared from its window. Typically, Task Manager has the menu bar which has File, Options, View and Help pull-down options, and various tabs to display and show details on Applications, Processes, Services, Performance, Networking and Users. The problem is now all these menus and tabs are gone missing.

Actually, the clean Task Manager with ‘missing tabs and menus’ user interface is not an error nor a bug. In fact, it’s a feature of Windows Task Manager to run in tiny foot-print compact mode. In compact mode, not only the menu bar and tabs are hidden, the top and bottom window border frames which contains Minimize, Maximize and Quit/Exit buttons and status bar also go into hidden and not visible.

In fact, anybody can cause Task Manager to go into small footprint mode by simply double clicking on the empty space around the border and empty space in the border around the tabs of Task Manager. The area to double click to switch to tiny footprint mode is illustrated in the figure below in red color.

Full Mode Task Manager

To revert and restore Task Manager to default full mode and get the menu options, tabs, status bar and other buttons back, just double click on the empty area around the border of Task Manager window again. See illustration below with area in blue for the location to double the red-mark is present).

Small Footprint Task Manager

How to Fix Folder Options Missing in Windows Explorer  

Posted by Maddi in

Are your Folder Options not visible under Tool menu in Windows Explorer? It is quite common to see this problem and if you are one of the unfortunate one, don’t panic! You can restore it back by following a few simple steps.


There are 2 solutions provided as below, you can choose either one of them to get this problem resolved:

Solution 1: Edit registry

1. Go to Run, type regedit then press enter.
2. Navigate to [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer].
3. At right panel, look for a value called NoFolderOptions. Right click on it then choose Delete.
4. Navigate to [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer].
5. Repeat step 3 to delete NoFolderOptions entry.

Solution 2: Change setting in Group Policy

1. Go to Run, type gpedit.msc then press enter.
2. Navigate to User Configuration -> Administrative Templates -> Windows Components -> Windows Explorer.
3. At the right panel, look for “Removes the Folder Options menu item from the Tools menu”, right click on it then choose Properties.
4. Change the setting from Enabled to Not Configured or Disabled.

Hope this simple workaround will help you save some time for other value added tasks.

Tips on Buying a Bargain Laptop  

Posted by Maddi in

Purchasing a quality laptop with the required features can be a headache, especially when your budget is limited. There is absolutely no need for you to overspend on a gadget when you can get the same quality product at a much lower price. With this in mind, make your purchasing a light experience that won’t affect the balance of your wallet when you buy. But before you decide on anything, here are some tips on buying bargain laptops.

Firstly, when buying a laptop, people tend to think within the box, that is, they rush to their nearest store. Bargain laptops can be found almost anywhere, besides the store, for example, the neighbor or the colleague with the unwanted new or almost new laptop. More often than not, these laptops go at an absurdly low bargain yet with the same quality as one you would buy in store.

Secondly, when buying bargain laptops, you are looking to save money. Most bargain laptops come with a warranty, make use of this warranty!

Further for dead giveaway prices, check out laptop suppliers. Usually they would be preparing for new stock and give away their old stock at bargain prices.

Besides, laptop suppliers, there are other places you can seek out bargain laptops, for example companies, not necessarily those that deal with software. They usually have good quality laptops that you can buy at a bargain.

There are many advantages in buying bargain laptops. Some of these include saving money and of cause getting yourself equipped with a high-tech gadget without feeling the pinch of the purchase in your wallet.

However when seeking out bargains, people tend to overlook the dangers involved in buying laptops at bargain prices. Most of these risks depend on factors such as where you bought the bargain or who you bought it from. Noted, it is much safer to purchase your bargain laptops at the above mentioned companies or at laptops suppliers. These laptops usually come with a warranty and the buyers are usually issued with a receipt.

It is a good idea to avoid dealing with bargain dealers who don’t have their stories straight. Make sure that when you purchase the laptop, no matter how big the bargain is, you have seen the original receipt, and have a proof of residence of the seller in cases of informal trading. This is a good way of protecting yourself against unscrupulous dealers in case something goes wrong. With this in mind, purchasing a bargain laptop need not be a hassle as long as the right channels are followed with the necessary precautions taken.

It is a good idea to avoid dealing with bargain dealers who don’t have their stories straight. Make sure that when you purchase the laptop, no matter how big the bargain is, you have seen the original receipt, and have a proof of residence of the seller in cases of informal trading. This is a good way of protecting yourself against unscrupulous dealers in case something goes wrong. With this in mind, purchasing bargained cheap laptops need not be a hassle as long as the right channels are followed with the necessary precautions taken.

Steps To Increase Replacement Laptop Computer Battery Lifespan  

Posted by Maddi in

Many times you wonder why your replacement laptop computer battery dies so quickly and if there are any precautions you can take to avoid this problem. If you care for and maintain your batteries properly, you can easily extend the lives of your laptop computer replacement batteries. It can be frustrating when you purchase a replacement battery for your laptop and after a few months the battery life has significantly declined. This is not what you want to happen. Below are some simple steps that can be taken to ensure that your battery lasts for its maximum potential.

If you constantly remove your replacement battery from the laptop and store it away it can ultimately become soiled, and no longer functional at peak capabilities. To alleviate the problem of a soiled battery, take a cotton swab and Isopropyl alcohol to rub down the laptop battery. When cleaning the metal connectors be sure to always use a dry cloth. While cleaning the contacts you should use the Isopropyl alcohol. This will properly clean your replacement laptop battery. Having clean contacts helps maintain a good connection between your battery and notebook computer. The optimal place to store your laptop battery is in a cool, dry place that is away from excessive heat. Make it a point to keep the laptop battery away from any form of extreme heat. Heat is a batteries enemy, so avoiding heat is very advantageous to your batteries lifespan. Also make sure that the battery is not near any metallic objects that can disrupt the batteries charge. It is not uncommon for Lithium-Ion batteries to discharge after extended periods of being stored.

It is a good idea to exercise any replacement laptop batteries at least once every two to three weeks. Exercising a laptop computer battery means using the battery and not leaving it dormant for extended periods of time. If the laptop battery is not used for extended periods of time it is highly recommended to exercise it in-between down times. This will prevent significant battery capacity loss. By following this simple step your laptop battery will be able to store more of a charge than if otherwise left alone. If you do not use the laptop battery frequently then you should exercise it before attempting to use it regularly.

If you are using an AC Adapter to power your computer then it is advisable to remove the good battery from your notebook and replace it with an old, short run-time battery. This is a good practice as the battery in the laptop will continuously be charged and discharged rendering the battery life shorter than ever expected. Excessive charging and recharging of batteries drastically shortens battery life. Thus, it is a good idea to remove that brand new battery from your laptop when it is being powered through the AC Adapter.

Utilizing your laptops power management features prior to use can extend the life of your battery.

Defragmenting your laptop is beneficial to your computers performance along with its battery life. Having a clean, defragmented notebook ensures that the laptop will run in an efficient manner. Having a laptop computer run efficiently will increase the batteries life span, by not draining it trying to reach programs. All these simple tips can ensure that your replacement laptop computer battery will have an extended lifespan.

How To Make Firefox Browser More Faster  

Posted by Maddi in

ffbrowserIf you want to boost your browser speed, the following information may help you to make it faster with a simple ways. But the following method will working on Mozilla Firefox browser only, its about 20% – 30% faster than before. There are 3 steps:

  1. Open your Firefox’s browser and type “about:config” (without quotes) in the address bar, then press Enter. Scroll down your mouse and find the following text:
    As a default setting, the browser will make one request for each web page at once. When you are enabling the pipelining , it will make a couple web page at once. Then it will make the loading page will be faster than before.
  2. Change the pipelining setting as the following command:
    Network.http.pipelining become “true” (double click)
    Network.http.proxy.pipelining become “true” (double click)
    Network.http.pipelining.maxrequests set it to “30” which is mean will make 30 requests at once. (double click).
  3. The last step, right click and select New->Integer. Type “nglayout.initialpaint.delay” (without quotes) in the preference name form, then set it to “0” (null, without quotes).

Well done, you have boost up your Firefox. Good luck to try!

How To Control Laptop's Temperature  

Posted by Maddi in

How to keep your laptop’s temperature normal steady? The following information will help to keep your laptop’s temperature normal and steady.

You need a software which will monitor your laptop’s temperature any time without having to check it from BIOS which need to restart your laptop, so that you can decide what you have to do when the temperature is high. I used NHC 2.0 (Notebook Hardware Control) software to monitor my laptop, it is user friendly and free software, and you can control the hardware and system power management of your laptop. Otherwise you can customize your laptop ACPI control system, cool down the system and reduce power consumption, etc. If you have a Dell laptop or problems with the above version please use the other bug fix version.


Do not place your laptop on a place which the air circulation is not swift, like on a bed, sofa etc. Because the fan in your laptop gets the air supply from the bottom of laptop, therefore you have to place it on the hard flat surface place, like a table, floor, etc. Exception: you can place it on the bed or sofa or anything else if you only have an external laptop’s cooler which usually installed in the bottom of your laptop.

If you found your CPU’s temperature more than 60C and keep rising, check your cooler fan, if its rotation keep working, it’s mean you have to check the air disposal of it, make sure it’s not bold dusty, clean it using small vacuum cleaner or you can open the laptop’s?case if necessary. After finishing that step, you can turn on your laptop and check the temperature after 10 minutes. If the temperature is still rising to 70C or more then you have to replace your internal cooler fan.

How To Get Rid Of TEMP Files On Windows XP  

Posted by Maddi in

If you are reading this it means your computer is slow, you noticing your hard drive is getting smaller or you just plain want to get rid of temp files. Maybe it’s all of the above. Whatever the case may be, temp files are an annoying bunch of files that remain behind in your Pc or laptop even after you deleted the folder or program. Even disk clean up cannot get rid of them. Here it’s how to get rid of them once and for all.

The first thing you want to do is close ALL open programs, including any running in the background, like Messenger, your anti-virus program, or anything else.

Next we’re going to Click on the start button, then Search. Now in the dialog box, make sure where it says “what do you want to search for” pick files and folder option. Next window on the part where it says “look in” make sure it is looking at your C: drive (if you have other hard drives or partitions, be sure to select “All Local Drives”) Now make sure there is a check in the box next to where it says “include sub folders”. (This is in the “More Advanced Options” in XP. Also, in Windows XP you need to put checks in the boxes that say “Search hidden files and folders” and “Search system folders”.) Next were going to click your mouse pointer in the box that says “All or part of the file name and type the following, exactly as I have put it here.


That’s…….. asterisk period t m p comma asterisk period c h k comma tilde asterisk period asterisk …..Remember NO SPACES.

This is very important; The “tilde” which is the little squiggle above the Tab key on the left end of your keyboard…..DO NOT FORGET THE TILDE as ~*.* will find all files which begin with ~, but *.* but if you don’t add it XP would find all files on the drive and you DON’T want to do that!! To be sure you’ve got it right, just highlight and copy paste this —- *.tmp,*.chk,~*.* —-copy it and paste it in the search file name box.

It may take a while but once it finds all the files, there may be a long list depending on the last time you did this. At the bottom, it’s going to tell you how many TEMP files it found. In Windows XP, if it didn’t find any files, you need to go to My Computer, click on the Tools menu and choose Folder Options. Next you will click on the View tab and scroll thru that list to make sure the “Show hidden files and folders” is checked and that the “Hide protected operating system files” is NOT checked. Do this, and then try the search again.

Next you going to Hit ctrl+a to select them all, or select all from the edit button. Next hit your delete key. Chances are it won’t delete some of them, that’s because the files may be attached to a program running in the background. In that case you may have to delete them one at a time. You may have to select a few at a time until you are left with only the ones the current program is using. If one or two won’t delete, they may delete when you reboot. Remember Windows XP tends to hang onto temp files more than the earlier versions of windows, so you may run into a few that you can’t delete. At this point they may only be like 2 or 3 if that many. If you have more than that, then try doing it in SAFE MODE.

Typically most of all of these files and folders are safe to delete. Removing them can speed up your Pc or laptop and help you regain space. It may even get rid of a problems your Pc or laptop may be having. Of course some people will naturally be concerned about deleting these files. I was one of them when I did this to my Pc and laptop. If that is the case then you can simply leave the files you deleted in your recycle bin for a few days until you are sure everything is working properly. In the event you have a problem, you can always restore the files from the recycle bin… But I am sure in a few days you will be going into your recycle bin to permanently delete them all.

Remember, if you are unsure of the files; just leave them in the recycle bin for a few days. It’s what I always do. That way you can be safe. Hope this helps.

Multiple Login In Yahoo Messenger (Without Using Any Software)  

Posted by Maddi in

Here is a simple trick for multiple login for yahoo..

1. Goto START > RUN > type REGEDIT and press enter
2. Navigate to HKEY_CURRENT_USER > software > yahoo > pager > test
3. In right page, right click and choose 'new Dword value'
4. Rename it as 'Plural'
5. Double click it and assign it the value of 1
6. Close Registry, restart yahoo messenger
7. Done! enjoy multiple login in yahoo!