Page 1 of 3 123 LastLast
Results 1 to 15 of 42

Thread: MirchiClub:::::A Complete PC Guide

  1. #1
    ▐║Mirchirific Moderator║▌ Brigadier General mirchi.foreever's Avatar
    Join Date
    Mar 2007
    Location
    ~~~missing~~~
    Posts
    25,153
    Rep Power
    81

    Default Tutorial:::::HOW TO DELETE STUBBORN FILES?

    First, a brief explanation on why this happens. This is usually because an active process has an open handle to the file which prevents it from being deleted. Normally if you close down all running programs you'll find that most files will then be free to delete, but that's not always the case, and in some cases it may even be a trojan that's preventing itself from being deleted.

    BASIC REGISTRY RULE: Any changes made to the registry file are crucial to the running of Windows and if damaged or misconfigured, could cause severe problems.
    Follow Microsfot's recommended instructions to "BackUP" all important data first. It's recommended to save the backup on a CD, DVD or seperate HD due to the size factor (large)
    Code:

    This option is not installed in Windows XP Home Edition. To install you will need the XP Home CDRom. Navigate to %CDROM%\VALUEADD\MSFT\NTBACKUP\. Look for Ntbackup.msi and double-click it to execute the install wizard.


    1. MoveFileEx - A Windows function that moves an existing file or directory

    WARNING: editing the registry can be dangerous if you don't know what you're doing, make sure to USE YOUR HEAD, if you removed something you didn't want to, don't worry, just use the back up in this program

    1. The MOVEFILE_DELAY_UNTIL_REBOOT option places an entry under the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Session Manager\PendingFileRenameOperations and the file is moved or deleted (if destination NULL) when the system next reboots. Unfortunately as this is not supported under Windows95/98 an application must use entries in WININIT.ini to achieve the same effect.
    2. BOOL MoveFileEx (LPCTSTR pExistingFilePath, LPCTSTR pNewFilePath, DWORD dwFlags)

    * TRUE if function succeeded

    pExistingFilePath.......Source path to an existing file
    pNewFilePath............New location for the file
    dwFlags....................Optoions controlling the move
    * Move or rename a file

    Move or rename a file to a new location.
    Only meaningfully implemented on NT. Windows95 returns
    ERROR_CALL_NOT_IMPLEMENTED, use MoveFile instead.
    The source and destination path should be on the same drive as the system can then just change folder entries without actually copying the file contents. If MOVEFILE_COPY_ALLOWED is supplied and the system needs to copy the file it will require the additional disk space for the temporary file, in this case the original file is deleted only after the copy is successful.

    3. The flags allow more control over the move, it can be zero or a combination of the following values :
    MOVEFILE_REPLACE_EXISTING.......The destination can be overwritten if it exists
    MOVEFILE_COPY_ALLOWED.............Allow a copy if destination on a different drive to the source
    MOVEFILE_DELAY_UNTIL_REBOOT...The move takes place on reboot (NT only)
    MOVEFILE_WRITE_THROUGH...........Do not return until changes flushed to disk (NT only)




    2. Using Windows InProcServer32 process


    WARNING: editing the registry can be dangerous if you don't know what you're doing, make sure to USE YOUR HEAD, if you removed something you didn't want to, don't worry, just use the back up in this program

    1. Open notepad, copy and paste the code below. Then save the file as "avifix.inf" without the quotes
    ; Windows XP explorer movie fix.
    ;
    ; WARNING - Use this file at your own risk.
    ;
    ; Executing this file will remove a registry key which makes explorer load shmedia.dll.
    ; Simply put, this removes the annoying "permission denied" errors when trying to
    ; move/copy/delete AVI files.
    ;
    ; To use this fix, right-click on the file and select install. Done.
    ;
    ; Information about the registry key from multiple sources.
    ; Inf-file compiled by Moo (2002-03-22).
    ; Idea by Duxus. Thanks to the kind people of "[BBB] Sweden #01", you know who you are!
    ;

    [version]
    signature="$Windows NT$"

    [DefaultInstall]
    DelReg = Reduce.Reg

    [Reduce.Reg]
    HKLM, "SOFTWARE\Classes\CLSID\{87D62D94-71B3-4b9a-9489-5FE6850DC73E}\InProcServer32"
    2. Right-click "avifix.inf" and select install
    Banega Bharat...badlega Bharat

  2. #2
    ▐║Mirchirific Moderator║▌ Brigadier General mirchi.foreever's Avatar
    Join Date
    Mar 2007
    Location
    ~~~missing~~~
    Posts
    25,153
    Rep Power
    81

    Default

    3. Delete the file association first


    WARNING: editing the registry can be dangerous if you don't know what you're doing, make sure to USE YOUR HEAD, if you removed something you didn't want to, don't worry, just use the back up in this program

    1. Start >Run >regedit {enter}
    2. Navigate to this key HKEY_CLASSES_ROOT\SystemFileAssociations\.avi\shel lex\PropertyHandler
    3. Delete the "Default" key
    4. Close regedit
    5. Follow the above test again, is a simple del doesn't work
    Banega Bharat...badlega Bharat

  3. #3
    ▐║Mirchirific Moderator║▌ Brigadier General mirchi.foreever's Avatar
    Join Date
    Mar 2007
    Location
    ~~~missing~~~
    Posts
    25,153
    Rep Power
    81

    Default

    4. Delete the file in DOS mode


    1. Start >Run >cmd {enter}
    2. Navigate to the folder the file is in, i.e. if its in c:\folder\anotherfolder\file, type "cd c:\folder\anotherfolder" {enter} The coomand prompt should change to let you know you are in the correct directory.
    3. Type "dir /x" {enter}
    4. The offending file will be listed like (filena~1.xxx)
    5. Type attrib -r -s -a -h filename.extension {enter}
    6. Take note of the name and type "del filena~1.xxx" {enter}
    Banega Bharat...badlega Bharat

  4. #4
    ▐║Mirchirific Moderator║▌ Brigadier General mirchi.foreever's Avatar
    Join Date
    Mar 2007
    Location
    ~~~missing~~~
    Posts
    25,153
    Rep Power
    81

    Default

    # Try to take ownership of the file


    1. Right click the file
    2. Select the security Tab
    3. Select properties
    4. Select Advanced
    5. Select Owner
    6. Find the User or group you wish to give ownership to and select it
    7. Click apply
    8. now try deleting it.

    OR
    # If the file is Media (MP3, MPG, AVI, etc...)



    1. Remember the filename (X) and location
    2. Run another file (Y) with the same extension
    3. now Delete the file (X)
    This occurs sometimes when windows thinks that the file (X) ur trying to delete is still open, eventhough u closed the app and the file.
    Banega Bharat...badlega Bharat

  5. #5
    •Cheeky• Colonel ..drEam..'s Avatar
    Join Date
    Aug 2008
    Location
    ♥I live in ur Eyes♥
    Posts
    12,791
    Rep Power
    56

    Default

    I also face dis problem!

    though u explained a lot but i couldnt understand anythin

  6. #6
    SB Spearhead Field Marshal Rocky-10's Avatar
    Join Date
    Oct 2006
    Location
    ¤(Ż`·._.» In Your Heart
    Posts
    77,048
    Rep Power
    99

    Default

    It's quite confusing for me.......



    Lucky is the man who is the first love of a woman,
    but luckier is the woman who is the last love of a man.

  7. #7
    Maverick Colonel Isotope A10's Avatar
    Join Date
    May 2007
    Location
    Where u want me to live !
    Posts
    18,485
    Rep Power
    65

    Default

    Thankz Mirchi..........well I just switch over to mah alternate OS Suse 9.5 and then whateva stubborn files are present in Windows XP.
    I am Freakin' Insecure Neurotically Emotional.


    I am FINE.

  8. #8
    ▐║Mirchirific Moderator║▌ Brigadier General mirchi.foreever's Avatar
    Join Date
    Mar 2007
    Location
    ~~~missing~~~
    Posts
    25,153
    Rep Power
    81

    Default MirchiClub:::::A Complete PC Guide

    HOW TO TROUBLESHOOT YOUR PC?

    The challenge with a problem is not so much the solution but figuring out what the actual problem is. For instance: if your internet connection is lost you might automatically assume it's a problem your ISP, yet the problem might actually be a cable connection problem, a corrupted software file, a conflict with another software program running at the same time, a virus or any number of other problems. By doing some basic troubleshooting you can effectively identify problems and get farther down the path to an actual solution. Also, if you need to call a manufacturers help-line, the call will be much more productive if you've done some troubleshooting before hand.



    Before you do anything:


    Check your mental state and don’t panic! My personal theory to computer problems is that there is a direct connection between the amount of stress a user is under and the number of times a computer will crash. Chances are that when you are in a rush to get a document out the door, you will forget to close open applications, or to save your work and you will send too many commands (like printing, spell-check, etc.) at once. If you're moving fast on the computer, it pays to take a moment, take a deep breath, close unnecessary programs and save your work. Also, if you're trying to solve a problem that your computer is having, you will need full mental capabilities. So if you're feeling frustrated and tired while trying to troubleshoot - take a break! You’ll find you’ll solve your problems much faster if you have a fresh mind and attitude. Don’t panic either. Sometimes computer problems can appear to be much more serious than they really are. Panicking can lead you to jump to a solution of a perceived problem before you’ve actually identified the real problem.


    1. Some initial steps:



    1. Check the component's documentation and/or the manufacturer's website: The appendix of most manuals will contain a troubleshooting guide that will identify the most common problems the component may have. Most software installations include placing a readme file in the programs directory that will list all known incompatibilities. Manufacturer websites can be extremely helpful as well, with support pages that will direct you to common problems and solutions that may include a software "patch" that can be downloaded directly from the site and then run on your hard drive
    2. Check for Viruses: Any strange behavior on a computer could be due to a virus. Use an anti-viral program to scan your system - and follow the instructions on the use of the anti-viral program closely
    3. Use diagnostic utilities: Software crashes can often be caused by corrupted files or registry conflicts. Using a program like Window's Scan Disk (found under System Tools in the Accessories folder on your program menu) can identify and fix corrupted files. Norton Utilities has a program called "System Check" that both checks the integrity of your files and looks for software conflicts and will repair problems


    2. If none of those steps work - it's time to use your brain!

    1. Ask yourself - when did the problem I’m experiencing first start? If you made any change, such as installing new software or adding hardware, to the computer and now you are having a problem, chances are the change is the cause. Also, while you're trying to identify problems and solutions remember to make only one change to your system at a time, so you can easily trace your steps.
    2. Determine if the problem is repeatable or if it is intermittent: A repeatable problem is one that occurs all the time, or always in response to a specific user action


    * For example, if the computer crashes everytime you print a document - that’s a repeatable problem

    An intermittent problem will appear to happen spontaneously or randomly. An intermittent problem is usually the result of a specific set of circumstances happening occasionally. With these problems it is important to try to establish a pattern involved in the problem. Keep a problem log at the computer and try to write down all the circumstances occurring when the crash occurred, including the most minute detail.

    3 Use the process of elimination: Start to remove components from your system one at a time. After you remove a component test to see if the problem still exists. This is a great way to figure out if the problem is caused by a conflict between software programs and/or hardware. Start by removing the most recently installed stuff first



    3.Some Final Tips:



    1. If you call the helpline -
    be patient and prepared: You will have to wait on hold awhile to get to get an actual person on the phone. Like death and taxes that's just a fact of life. If you can review all the troubleshooting steps you took to identify the problem, the technical assistance operator will be able to identify the solution more quickly and effectively

    * Remember: if you get a technical assistance operator on the line don't hang up until you're sure the problem has been solved

    2. If the equipment is new, send it back: Most equipment is under warranty and if there is anything severely wrong with it, you should send it back. This may not help your immediate goal, but it will save you plenty of time in the long run. If the equipment is under warranty, the vendor will deal with it

    The most important thing to remember while troubleshooting is to be patient and observant. By using these steps you should easily be able to resolve even the most inexplicable problems
    Banega Bharat...badlega Bharat

  9. #9
    ▐║Mirchirific Moderator║▌ Brigadier General mirchi.foreever's Avatar
    Join Date
    Mar 2007
    Location
    ~~~missing~~~
    Posts
    25,153
    Rep Power
    81

    Default

    HOW TO ELIMINATE BIG PROBLEMS WITH SMALL PROGRAMS?
    INTERNET RELATED


    1. AD-AWARE (1.7mb) - "Standard Edition is THE award winning, free, multicomponent detection and removal utility that consistently leads the industry in safety, user satisfaction, support and reliability"

    2. AOL HIDER (475kb) - "Excellent program that simply hides AOL into the task window in the bottom right corner. Makes it look like you have a real internet connection! Compatable with all versions"

    3. FPIPE - "FPipe is a source port forwarder/redirector. It can create a TCP or UDP stream with a source port of your choice. This is useful for getting past firewalls that allow traffic with source ports of say 23, to connect with internal servers"

    4. FPORT - "Reports all open TCP/IP and UDP ports and maps them to the owning application"

    5. MAGIC MAIL MONITOR (71kb) - Tiny POP3 compliant Mail Checker: the best choice for checking one or multiple account quickly, at periodic interval. Fully configurable, nice interface

    6. MAILINATOR - "Have you ever needed an email .. NOW? Have you ever gone to a website that asks for your email for no reason (other than they are going to sell your email address to the highest bidder so you get spammed forever)?"

    7. NET LIMITER [614KB) - "NetLimiter is an ultimate internet traffic control tool" *****

    8. NESSUS - "A security scanner which will audit remotely a given network and determine whether bad guys (aka 'crackers') may break into it, or misuse it in some way." For Linux ONLY

    9. NETSCAN PRO (925kb) - "NETSCAN PRO is the real advanced TCP/IP monitoring utility which allows you to monitor all network activity at your computer. NETSCAN PRO 3.3 has a graphical and text interface which makes the program unique in its kind! It's very easy to use! All you do is run the program and see all established connections and opened ports at your computer"

    10. NO ADS (215kb) - "Popup killing at its best! This nifty utility is great when surfing websites. If a popup appears, open the program that is in the task tray and double click it and its gone. It will then store it and kill it in the future too. It is the first one I've seen that supports AOL! Even works great with programs like KaZaA"

    11. Online JPEG compressor - "Can help you to make your pages load faster by reducing the size of your JPEG files. It will display multiple versions of a given image compressed at different levels for you to pick the smallest image at the best possible image quality you require"

    12. PCS NETWORK TOOLS (1150kb) - "The PCS Network Tools is a collection of essential network diagnostic tools. These tools include DNS resolution which provides the IP Address, Hostname, Hostname Alias, Mailhost, and Name Server Records for an entered host. In addition, the following tools are also included: IP Scanner, Traceroute, Ping, Whois, Finger, Time, Quote of the Day, and extensive Localhost information. Local information includes the hostname, alias, IP address, MAC address, username, Primary Domain Controller, NetBIOS, memory, windows version and build, and other vital information"

    13. PEER GUARDIAN - PeerGuardian 2 is Methlabs’ premier IP blocker for Windows. With features like support for multiple lists, a list editor, automatic updates, and blocking all of IPv4 (TCP, UDP, ICMP, etc), PeerGuardian 2 is the safest and easiest way to protect your privacy on P2P. Plus, by integrating with Blocklist.org, lists are built custom just for you. - Look for the Linux/OSX version on this site

    14. PING PLOTTER - "This exceptional GUI-based traceroute tool has features I’ve only seen in expensive industrial-strength tools, including dynamic tracking of changes in node response time — great for tracking a network outage across time. It’s also very fast!" - For NT/2K/XP ONLY

    15. PROXIRAMA (154kb) - "A tool for finding and testing proxy servers. it will test them for anonymity, speed, if it's a gateway proxy, https support (=chainability) and geographical location. furthermore, it can be used as a local proxy server that redirects your traffic through a arbitrarily long chain of anonymous proxies. it is small, fast, and easy to use"

    16. SPYBOT - SEARCH & DESTORY (3.5mb) - "This free program can detect and remove spyware of different kinds from your computer. Spyware is a relatively new kind of threat that common anti-virus applications do not yet cover"
    Banega Bharat...badlega Bharat

  10. #10
    ▐║Mirchirific Moderator║▌ Brigadier General mirchi.foreever's Avatar
    Join Date
    Mar 2007
    Location
    ~~~missing~~~
    Posts
    25,153
    Rep Power
    81

    Default

    2. OS RELATED

    1. FILE

    1. BCWIPE - "Is intended to give you a confidence that your deleted files cannot be recovered by an intruder" For Linux/FreeBSD/OpenBSD/Solaris/Digital UNIX/Irix/Windows

    2. BEST CRYPT - "A Data Encryption system provides the most comprehensive and easy-to-use secure data storage and access control facilities available" For Linux/FreeBSD/OpenBSD/Solaris/Digital UNIX/Irix/Windows

    3. CIA UNERASE - " Is the first product using the CIS technology to recover deleted files. Using CIS, CIA Unerase recovers almost any file you deleted even before you installed CIA Unerase and files where all other solutions on the market failed. CIA Unerase is the smallest, easiest and fastest Unerasing-tool we know"

    4. DARIK'S BOOT AND NUKE (1962kb) - "Darik's Boot and Nuke ("DBAN") is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for bulk or emergency data destruction." Available in floppy and CD version. This tool is very dangerous. After using the WinImage extractor to create the “nuke” boot floppy disk, you then reboot the target system with the disk in drive A. The main point of this program is to securely delete everything, so NEVER run it on a system that you intend to use again.

    5. ERASER (2745kb) - "Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is FREE software and its source code is released under GNU General Public License.

    The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove magnetic remnants from the hard drive.
    Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defence and overwriting with pseudorandom data. You can also define your own overwriting methods." The US Defence Security Service (DSS) is one of their clients.
    6. DELLATER (3kb) - "DelLater is the ideal program to use when you can't delete a file, no matter how hard you try"

    7. HIDE IT - Hide running applications

    8. KILL - "Shuts down one or more running Windows NT tasks or processes" - For 2K/XP

    9. KILL95 - Shuts down any processes running in memory

    10. TrueCrypt - "It can create a virtual encrypted disk within a file and mount it as a real disk. It can encrypt an entire hard disk partition or a device, such as USB memory stick, floppy disk, etc. Provides two levels of plausible deniability, in case an adversary forces you to reveal the password. Hidden volume (more information may be found here). No TrueCrypt volume can be identified (TrueCrypt volumes cannot be distinguished from random data). Encryption algorithms: AES-256, Blowfish (448-bit key), CAST5, Serpent (256-bit key), Triple DES, and Twofish (256-bit key). Supports cascading (e.g., AES-Twofish-Serpent). Based on Encryption for the Masses (E4M) 2.02a, which was conceived in 1997. *****

    2. CONTROL/MONITOR

    1. CIS - "A free security scanner written and maintained by Cerberus Information Security, Ltd and is designed to help administrators locate and fix security holes in their computer systems. This tool is a must!" To see the checks it does, go HERE - For NT/2K

    2. COOL BEANS SYSTEM INFO (820kb) - "A small but powerful program that monitors your computer's CPU, physical memory, and swap memory usage"

    3. DEPENDENCY WALKER (406KB) - "A free utility that scans any 32-bit or 64-bit Windows module (exe, dll, ocx, sys, etc.) and builds a hierarchical tree diagram of all dependent modules." Can be helpful to identify missing files/dll after installtion of programs

    4. HHD SRVADMIN - "A very useful as a replacement to the ordinary NT service and device control panel applets, because it repeats and extends the functionality provided by them. Plus, it allows administrators to perform tasks, which usually not available to them without installing Windows NT Resource Kit." For NT/2K

    5. NTFS Reader for DOS - This is an absolutely essential recovery tool if you use NTFS partitions. Add this 147 KB executable file to your Win9x-based boot floppy and it will let you read any NTFS partition and copy off files to any FAT partition. (Don’t be thrown when the page says “Demo software.” It’s outright freeware.) - For NT/2K/XP ONLY

    6. NTSubst - "Extended version of the NT subst command. NtSubst allows you to assign the drive letter not only to any valid path, but also any valid NT Object Manager path." For NT/2000

    7. POWER PROMPT - "will allow you to run programs as System"

    8. PROCESS EXPLORER (150kb) - "The unique capabilities of Process Explorer make it useful for tracking down DLL-version problems or handle leaks, and provide insight into the way Windows and applications work"

    9. REVELATION - Discloses passwords that are only displayed as asterisks. I suppose, ultimately, this is a cracker’s tool; but there are practical, legitimate uses for it, so I decided to post the link. - For 9x/2K/XP. Please use it in good faith.

    10. RUN AS USER v4.1 - The function of this software is to allow Administrators to deploy applications that require elevated user rights to users who have restricted rights without having to issue Administrator Credentials to the user. It does this by passing a Run As User type command to the Operating System for the duration of the task at hand. It will only give the elevated rights to that specific task, so you can be safe knowing that the user will not have access to any restricted resources while the application is running. Other uses of this software include running games that require the administrator account to run. - For XP. Please use it in good faith.

    11. SHUTDOWN - Small commandline utility that makes it a breeze to log off, shutdown, restart, hibernate, or put in stand-by mode your Win XP computer. It’s the only utility I know that shuts down Win XP and then reliably powers off the computer. For XP ONLY.

    12. STARTUP CPL - "A nifty control panel applet that allows you to easily configure which programs run when your computer starts."

    13. STARTUP MONITOR - "A small utility that runs transparently (it doesn't even use a tray icon) and notifies you when any program registers itself to run at system startup. It prevents those utterly useless tray applications from registering themselves behind your back, and it acts as a security tool against trojans like BackOrifice or Netbus."

    14. STORM WINDOW - A great and FREE utility for Windows desktop security

    3. INFORMATION

    1. ADVISOR - Displays all your PC info (hardware/software) on one page

    2. EVEREST - Freeware hardware diagnostics and memory benchmarking solution for home PC users, based on the award-winning EVEREST Technology. It offers the world's most accurate hardware information and diagnostics capabilities, including memory benchmarks, hardware monitoring, and low-level hardware information.

    3. SKRUB THE WEB - "Search Microsoft Knowledge Base, MSDN, Google and Google Groups in a single click"

    4. UTILITIES

    1. DOS HERE (197kb) - "An Explorer Shell Extension to provide easy and quick access to the DOS Prompt in the requested folder"

    5. TWEAKS

    1. ANSWERS THAT WORK - "Through our support service we often come across problems caused primarily by programs running in the background, programs which in most cases start at the same time as Windows. Sometimes these programs are useful and need to be there; quite often, however, they are not needed, and in too many cases they cause severe problems." This is not a program, however it would be a great small utility if packaged.

    2. ERUNT - "Finally, a tool to back up the Win XP Registry! (Microsoft didn’t include one with Win XP itself.)" - For NT/2K/XP ONLY

    * NTRegOpt is included in the above file - This optimizes the Win NT/2K/XP Registry much as SCANREG /OPT does for Win98/ME.

    3. HIJACK THIS - "HijackThis examines certain key areas of the Registry and Hard Drive and lists their contents. These are areas which are used by both legitimate programmers and hijackers." - USE WITH CAUTION AND AT YOUR RISK

    4. TWEAKUI - THE BEST OF ALL THE PowerToys! This should be standard on every (pre-XP) Windows computer whatsoever! Many new features added.

    RESULTS WILL VARY
    Banega Bharat...badlega Bharat

  11. #11
    Maverick Colonel Isotope A10's Avatar
    Join Date
    May 2007
    Location
    Where u want me to live !
    Posts
    18,485
    Rep Power
    65

    Default

    Very helpful thread.....already bookmarked !!
    I am Freakin' Insecure Neurotically Emotional.


    I am FINE.

  12. #12
    ▐║Mirchirific Moderator║▌ Brigadier General mirchi.foreever's Avatar
    Join Date
    Mar 2007
    Location
    ~~~missing~~~
    Posts
    25,153
    Rep Power
    81

    Default Configure Firefox to get much higher speeds

    Configure Firefox to get much higher speeds
    Found this on some site, thought it might some in handy Wink

    1.Type “about:config” into the address bar and hit return. Scroll down and look for the following entries:

    network.http.pipelining network.http.proxy.pipelining network.http.pipelining.maxrequests

    Normally the browser will make one request to a web page at a time. When you enable pipelining it will make several at once, which really speeds up page loading.

    2. Alter the entries as follows:

    Set “network.http.pipelining” to “true”

    Set “network.http.proxy.pipelining” to “true”

    Set “network.http.pipelining.maxrequests” to some number like 30. This means it will make 30 requests at once.

    3. Lastly right-click anywhere and select New-> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0”. This value is the amount of time the browser waits before it acts on information it receives.
    Banega Bharat...badlega Bharat

  13. #13
    SB Legend Major General hotspicyhot's Avatar
    Join Date
    Sep 2007
    Location
    MI6
    Posts
    33,296
    Rep Power
    100

    Default

    GREAT INFO......MIRCHI BHAI.......

    AND FOR DELTETING STUBBORN FILES A GREAT FREEWARE UNLOCKER IS THERE
    If you make yourself more than just a man, if you devote yourself to an ideal, then, you become something else entirely.
    Are you ready to begin?

  14. #14
    in the name of LOVE Lieutenant-Colonel pup's Avatar
    Join Date
    Dec 2007
    Location
    **oN StARs**
    Posts
    15,415
    Rep Power
    58

    Default

    GREAT INFO......MIRCHI BHAI.......
    ≈◘ Šţíđéµmâń ◘≈

  15. #15
    Banned Lieutenant General
    Join Date
    Jul 2006
    Location
    in ur soul, just close ur eyes to see me!
    Posts
    47,209
    Rep Power
    0

    Default

    nice thread . some good info here

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •