Category: Computer

  • About Windows HOSTS File and How To Make Use Of It

    There’s a Hosts file on every operating system. Yes, Windows, Mac OS, Linux and Unix, all of them has it. For Windows XP, the hosts file is located at WINDOWS\system32\drivers\etc and it’s called HOSTS without any extension. You can open the HOSTS file with notepad and you should see something like this.
    Windows HOSTS file
    The hosts file is a computer file used to store information on where to find a node on a computer network. This file maps hostnames to IP addresses. The hosts file is used as a supplement to (or instead of) the domain name system on networks of varying sizes. This file is (unlike DNS) under the control of the user who is using the computer.

    Your HOSTS file may now be empty and useless. I’ll show you how you can put it to work and protect your computer from danger.


    You can use HostsMan, the free hosts file manager and editor to manage your HOSTS file.
    Repair HOSTS file
    It has the ability to enable or disable your HOSTS file, edit your HOSTS file and update your host from 4 websites that maintain it. By updating your hosts file, you’re able to filter out advertisements. This can save network bandwidth, as well, by eliminating a request to the DNS server normally used for obtaining address information, as well as by not downloading the advertisements.

    Before doing anything to your HOSTS file using HostsMan, it is advisable to make a backup first in case you want to restore your original HOSTS file. To make your backup, press CTRL+B simultaneously or go to Hosts menu and select “Manage Backups…“. Click on the Create Backup button to backup your current HOSTS file.

    To update your HOSTS file, click on the middle button that says “Update Hosts” when you run HostsMan.
    Edit HOSTS file
    Check MVPS Hosts, hpHosts, Mike’s Ad Blocking Hosts, Peter Lowe’s AdServers List and click the Update button. It will then check for updates and prompt you if you want to continue to update hosts file. Click Yes to continue. Next, it will download all 4 hosts files, delete duplicates and update your HOSTS file. The next thing you’ll notice on HostsMan is the number of Hosts Names that has been increased to tens of thousands.
    Update HOSTS list

    Please take note that your hosts file can be “hijacked“, or used for malicious purposes. For example, adware, computer viruses, trojan horses, or other malware can edit the hosts file (particularly on Windows-based systems) to redirect traffic from a “safe” site (such as Google) to sites hosting content that may be offensive or intrusive to the user or the user’s computer system.

    If you’re afraid of your hosts file being hijacked, you can use limited accounts for normal everyday use. Not only it can protect your HOSTS file, but all system and program files as well.

    [ Download HostsMan v3.1.55 ]

  • What is dumprep.exe? Why is KernelFaultCheck dumprep 0 -k in MSCONFIG Startup?

    You might be a careful person who regularly scan computer for viruses, check for windows updates, clear temporary files, defrag hard drive and also making sure that your startup item is not loaded with programs. Suddenly, you noticed that there is a new startup item KernelFaultCheck with the command dumprep 0 -u or dumprep 0 -k in System Configuration Utility (MSCONFIG).

    How to disable or remove dumprep Kernelfaultcheck

    Is dumprep.exe a virus and how did it get into into my startup programs? Why even after removing dumprep.exe from startup, it comes back automatically? Continue reading to know what is dumprep.exe and how to permanently removing it from startup.


    The explanation below is taken from Microsoft’s website.

    The Dumprep.exe tool is a Windows XP fault logging program. If a serious error occurs, Dumprep.exe writes the error details to a text file. The Dumprep.exe tool then prompts you to send the error information to Microsoft. The Dumprep.exe tool is a non-essential system process that is installed for third-party use.

    There usually 2 switches. -k is a kernel fault check and -u is a user fault check. Since Microsoft mentioned that dumprep.exe is a non-essential system process, we can disable it. To disable dumprep.exe from startup, to Control Panel > System > Advanced tab > click Settings button for Startup and Recovery. At write debugging information, click the drop down menu, select (none) and click OK.

    Remove dumprep.exe

    Next, click the Error Reporting button, and select “Disable error reporting“. You can leave the option “But notify me when critical errors occur” checked. Click OK to close Error Reporting window.

    Remove KernelFaultCheck

    Go to Run and type msconfig. Check if dumprep.exe still exist in the list or not. If it is there, run regedit and navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. Select KernelFaultCheck name and hit delete. Restart your computer. If you don’t want to mess with registry, you can use HijackThis to remove it. Just do a system scan, check on %systemroot%\system32\dumprep.exe and click Fix checked.

    If dumprep.exe still automatically added into startup after disabling error reporting and writing debugging information, that means your computer has experienced blue screen and memory dump before. You need to Search for MEMORY.DMP file and delete it. Usually the MEMORY.DMP file is located at Windows folder. Once you delete the dump file from Windows, VOILA! dumprep.exe will no longer appear in MSCONFIG.

  • Bypass Validation to install Windows Defender Beta 2

    Windows Defender, previously known as Windows AntiSpyware, is a free program for Windows user to detect and remove known spyware from your computer. Windows Defender (Beta 2) helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software. It features Real-Time Protection, a monitoring system that recommends actions against spyware when it’s detected, and a new streamlined interface that minimizes interruptions and helps you stay productive. The software uses automatic definition updates provided by Microsoft analysts to help detect and remove new threats as the threats are identified.
    Bypass Windows Defender validation

    Improvements in Windows Defender (Beta 2)

      • Enhanced performance through a new scanning engine.
      • Streamlined, simplified user interface and alerts.
      • Improved control over programs on your computer using enhanced Software Explorer.
      • Multiple language support with globalization and localization features.
      • Protection technologies for all users, whether or not they have administrator rights on the computer.
      • Support for assistive technology for individuals who have physical or cognitive difficulties, impairments, and disabilities.
      • Support for Microsoft Windows XP Professional x64 Edition.
      • Automatic cleaning according to your settings during regularly scheduled scans.

    To download and install Windows Defender Beta 2, you will need to have an original legitimate Microsoft Windows. If you do not have it, there’s a way to bypass the validation that stops you from downloading and installing Windows Defender Beta 2.


    1. Download and install Orca.
    2. Download WindowsDefender.msi
    3. Run Orca and load WindowsDefender.msi
    4. In the left pane, select InstallExecuteSequence
    5. Select the Action CHECK_WGA. Right-click it and select Drop Row. Click OK to confirm.
    Orca Drop CHECK_WGA
    6. Save the MSI file and close Orca.
    7. You can now install Windows Defender (beta 2) – and updates

    Update 1-December-2006: Windows Defender Beta 2 is no longer available as it has become final version. To crack the final version of Windows Defender, follow the steps below.
    1. Download and install Orca.
    2. Download WindowsDefender.msi
    3. Run Orca and load WindowsDefender.msi
    4. In the left pane, select CustomAction
    5. Select the Action CHECK_WGA. Right-click it and select Drop Row. Click OK to confirm.
    6. Again in the left pane, select Dialog
    7. Look for the dialog CheckWGA, change the Attribute from 2 to 0
    6. Save the MSI file and close Orca.

    I am stunned to find this method to bypass the Windows Defender Beta 2 validation because you are actually using Orca, which is a part of the Microsoft’s Platform SDK Components, to edit MSI file and bypass the validation! Microsoft created the validation, and they have their own tool to bypass it. WEIRD!

  • WhatFont Tool Easily Inspects Fonts in Webpages with Bookmarklet

    Font that is used on any websites can be identified using Firebug or Web Inspector. However that can be too complicated for some users. I have posted two Firefox plugins that is able to help you identify the font on a webpage but that restricts you to use Firefox and installing plugins. Here is WhatFont bookmarklet tool, created by Chengyin Liu, an undergraduate Computer Science student at University of Illinois Urbana-Champaign which will probably offer the easiest and cleanest way to help you easily identify fonts on webpages. All you need to do is reveal or show the bookmarks toolbar on your Firefox web browser as it is hidden by default and drag the bookmarklet to the bookmark toolbar to install.


    When you are on any webpage and you want to know what font is being used on the text, simply click on the WhatFont bookmarklet that is on the Firefox bookmarks toolbar. After a few seconds, when you see a button showing “Exit WhatFont” at the top right of the browser, it means that you can now start inspecting the font by either moving your mouse cursor to the text which will only show the font being used, or left click on it to show more information such as font family, font size, line height, HTML color code and a sample of the font.

    WhatFont

    To disable WhatFont, simply click on the Exit WhatFont button which will also automatically close all the popups. WhatFont is free also works on Typekit and Google Font API. Do note that the bookmarklet is only for Firefox. If you want to use WhatFont on Chrome or Safari, it must be installed as extension.

    Install WhatFont

  • How to Run Multiple Yahoo Messenger Simultaneously

    The topic says it all! It’s not possible to run multiple Yahoo Messenger at a time right after installing the official version of Yahoo Messenger. You’ll need to apply a simple patch on Yahoo Messenger to enable this feature.


    Y!Multi Messenger developed by John Kirchner is the ultimate Yahoo Messenger Polygamy patch to run multiple instances of Yahoo Messenger! Perfect for those who use several Yahoo ID’s. With this you can login to as many Yahoo ID’s that you have. This will work with 8.x versions of YM.

    To patch your Yahoo Messenger with Y!Multi Messenger, just follow the simple steps below:
    1. Download both Y!Multi Messenger and RaveButtons.ocx at the end of this post.

    2. Extract both downloaded files and place YMulti Messenger.exe together with RaveButtons.ocx and run YMulti Messenger.exe

    3. Click Enable YMulti button.
    Multiple Yahoo Messenger

    4. Give it a few seconds for it to search for your Yahoo Messenger. Once found, it will auto patch. You will get a confirmation message once it’s done.
    Confirm Multi Instance Yahoo Messenger

    It’s that simple!

    [ Download Y!Multi Messenger ]

    P/S: You will need the RaveButtons.ocx file to use this program. [ DOWNLOAD RaveButtons.ocx ]

  • Removing Multiple Java Console in Firefox Extensions

    Firefox recently got updated to version 6.0.2 and as usual after updating, Firefox automatically checks for any outdated incompatible extensions or add-ons. I have the Add-on Compatibility Reporter plugin installed which forces Firefox to continue using any incompatible extensions, if not, the incompatible extensions will be automatically disabled. I normally ignore the Extensions tab since I never had any incompatible problems, then one day I noticed that there are 4 Java Console listed in the extensions. I guess Java doesn’t do a good job in removing old Java files after installing an update.

    Multiple Java Console in Firefox

    Java Console extension is actually quite useless for normal users as it is mostly used by developers. As long as your Firefox browser has Java listed in the “Plugins” tab, then you won’t have problem opening websites that requires Java. Theoretically less is better because logically running less stuff takes up less resources. If it doesn’t make much different, at least the Extensions tab looks neater. Weirdly there are no Remove button for you to easily remove the Java Console extension. Here is how to manually clean up the old Java Console from Firefox web browser.


    First you need to locate where Firefox is installed to and by default it should be in C:\Program Files\Mozilla Firefox\ or C:\Program Files (x86)\Mozilla Firefox\ for 64 bit Windows systems. If it’s not there, simply right click on the Mozilla Firefox shortcut icon and select Properties. Click on the Open File Location button to automatically open the Firefox location in Explorer. Access the Extensions folder and you should see a couple of long folders names with random letters and numbers.

    Firefox Extensions Folder

    There are two ways to determine if the folders belong to the Java Console:

    1. Edit either chrome.manifest or install.rdf with a text editor such as Notepad. If you see Java Console in there, then that folder belongs to Java Console.

    2. Access the inner folders until you find ffjcext folder or file. I believe ffjcext is short for Firefox Java Console Extension.

    Before removing or deleting the folders, make sure you exit Firefox first. Once you have removed the folders from the Extensions folder, run Firefox and you will no longer see Java Console listed in the Extensions tab.

  • Restore Missing Permanent Statusbar in Firefox 4

    I have to admit that I am a person that NEEDS the status bar to be there at all times even though it can be disabled. When it comes to Windows operating system, one of the first configuration that I’ll do is to enable the Status bar by pressing pressing Alt+V in Explorer and click on the Status Bar to activate it. The same goes to web browsers such as Internet Explorer and Firefox. If you haven’t noticed, recently the Status bar feature is considered to be obsolete because it is taking up unnecessary space even though it’s only 25 pixels. The Status bar is not enabled by default in Windows 7 and even on the latest Internet Explorer 9. As for Windows 7, since the Details pane is enabled by default, there is no reason to have the status bar anymore.

    In fact, you can’t even find a permanent status bar in Google Chrome and in the latest Firefox 4. The permanent status bar in Firefox 4 has been changed to show and hide when it is needed. For example when you move your mouse to a link, a temporary status bar shows the URL of the link that the mouse is hovered on, then hides away when you move your mouse away from the link. According to Firefox developers, the Status bar has been replaced with the Add-On bar which can be enabled from View > Toolbars > Add-On bar or press the hotkey Ctrl+/


    When the Add-on bar is enabled, it shows the small icons of add-ons that you have installed in Firefox. However when you move the mouse cursor to a link, the URL temporarily shows up on top of the add-on bar, not inside the add-on bar.

    I’ve received an email from Josh asking me if I know of a way to restore back the missing permanent status bar in Firefox 4. If you’re one of them like Josh, fortunately there is an easy way to do it without hacking the core of Firefox.

    All you need to do is install the Add-on called Status-4-Evar which will bring back some of the old status bar items, giving you more control over the built-in Firefox features, and provide new alternatives.

    1. In Firefox 4, simultaneously press Ctrl+Shift+A which will bring up the Add-ons Manager.
    2. Type Status-4-Evar at the Search all add-ons bar at the top right and hit enter.
    3. Click the Install button for Status-4-Evar and restart your Firefox 4 web browser.

    Firefox 4 Status bar

    Firefox 4 now shows the permanent status bar that you normally see in Firefox 3.

  • Kon Boot v1.1 with 32/64Bit and USB Support + 30 License Giveaway

    I have reviewed Kon Boot about a year ago and later on attempted to install it into USB flash drive using UNetbootin for convenience. During that time Kon Boot v1.0 was not made to support many types BIOS and also booting from USB which explains why it did not work for some of you.

    Download Kon Boot 1.1

    Kon Boot has been recently updated to version 1.1 and it contains a lot of improvements over the version 1.0. It has been recoded from scratch to support booting from USB using the custom Kon Boot USB Loader Install Utility. It can now support both 32 and 64bit of Windows and also fixed bugs to work on the latest Windows 7. Kon Boot 1.1 internally still supports Linux, but it is not commercially supported due to the fact that there is way too many distros. If you have not heard of Kon Boot, basically it is a software which you boot up the computer with and allows you to log in to any user without knowing the password. Kon Boot works by hooking the BIOS and make changes to the Windows kernel temporarily to allow a user bypass the step of Windows authentication.


    I personally don’t think that Kon Boot is an ultimate hacking tool that can be used to prank people or hack computers. Firstly, you have to be in-front of the computer and secondly, you must have access to BIOS to change the boot priority. There is no way to do it remotely. In my line of work, I had to deal with hundreds of computers everyday that are used by computer newbies. Many times I am faced with the annoyance of being asked to troubleshoot a computer but the user account is password protected. Kon Boot allows me to log in to the Windows computer and perform troubleshooting tasks without resetting or knowing the actual user account password.

    Kon Boot is also capable of performing privilege escalation. For example, you can boot up the computer with Kon Boot, log in as Guest, copy cmd.exe to a different name and run it. You now have System privileges. You can then make use of “net user” command to add a new user, reset administrator password and etc FROM A GUEST ACCOUNT!

    Konboot Privilege Escalation

    Unfortunately Kon Boot 1.1 is no longer free. The personal license cost $15.99 and it gives you free updates and support for a period of 6 months. You can still continue using Kon Boot 1.1 without restrictions even if you do not renew. As for Commercial license, it cost $75.99 for a year support and updates, allowing you to use on company or business environment. The commercial license can be transferred to any member in a registered business entity.

    Kryptos Logic is very generous to offer 2 promotions to Raymond.cc readers and they are:

    1: Everyone can get a 20% discount by using the following discount coupon:RAYCCREADER20

    2. 30 Kon Boot personal license for free. Leave a comment and make sure you are a subscriber to be in the draw. Winners will be chosen and announced tomorrow.

    I have been informed that a trial version of Kon Boot 1.1 will be made available in Kryptos Logic’s website. It will be a free 32bit version without Windows server support, essentially a much cleaner version of 1.0 but I couldn’t find the download link. I am not sure if Team Kryptos Logic has scrapped the idea of the trial version or there are some delays. Let’s wait for their response.

    [ Visit Kryptos Logic ]

    30 winners has been selected and will be receiving an email from me shortly on how to obtain the full Kon Boot v1.1.

    Kon Boot Giveaway Winners

  • Letting a Sleepless Laptop finally Sleep

    For laptop users, one of the major things I’ve noticed extremely convenient is it’s portability, and even more so when a netbook is being used. But they aren’t without their flaws. Fragile and easy to break are the reasons why I know for a fact I’d never be able to go around with a Netbook, and it’s not hard to see that those would also carry over to a laptop as well. If you’re careful, sure the laptop lasts longer, but in the end, most times, it will always work out cheaper to buy a new laptop then to face and fix that old one. However, if you don’t have the money, often times, you’re out of luck and will need to stick to what you’ve got. I was looking at a netbook to replace this present laptop and with the cheapest one being around $350 for even half decent specs, I’ve forced to keep what I’ve got, with all it’s bugs.

    And it’s actually one of these bugs that has annoyed me last night, the fact that I shut my computer lid and it didn’t go to sleep.
    Instead, it remained on all last night, so when I came back to my computer after sleeping, I found that the battery had completely drained and I had a battery that was now dead. Considering that I was going to take this laptop with me when I went out to get it registered with the Canadian government (so when I come back from my trip, I don’t get charged for it), I now couldn’t do that.

    So, instead, I looked for a way to restore sleep to my laptop if you close the laptop lid. The first thing I tried was resetting my power plans back to their defaults, but if you’ve had this problem before, you might have run into the same issue I did: it didn’t work. So I figured it was time to get inventive, and head into Device Manager.


    Our old friend, Device Manager

    At this point, I then proceeded to remove the Mobile Intel(R) 965 Express Chipset driver, and re-install it. Before rebooting, I also grabbed the BIOS update that was off Gateway’s official support site and ran it as well, before being forced to reboot once the update was completed. Once back into Windows 7, I was able to test and see if I was able to put it into sleep mode, with no problems whatsoever. So the quick and dry solution that I’ve worked out to work for this problem is as follows:

    1. Remove graphic card driver though Device Manager
    2. Reinstall the driver
    3. Flash to updated BIOS if you can
    4. Reboot

    It took me about ten minutes to go though all of this, so if you’re pressed for time, this won’t take long at all to complete and you’ll be ready to go around with your laptop once more. However, take care in flashing your computer’s BIOS. This might cause problems down the road which is why most BIOS flashing applications will back up your BIOS before hand, but just make sure to keep it in mind.

  • Directory Opus – Quite Possibility One Of The Best File Managers Out There!

    How many people here still use Windows Explorer around their computer? Chances are good, that unless you have a desire for more power, you’re not going to replace your file manager. After all, the default’s fine enough for most people: it allows for renaming, copying, pasting, etc, what we’re all used to. I suppose I’m guilty of it too, especially seeing as many times I’m not lucky enough to carry a copy of Nexus File Portable. And as I’ve also found out recently, Nexus File seems to have a few bugs under the 64bit edition of Windows, such as being unable to fully access the right click menu. This isn’t so much their fault as it is User Account Control’s fault: as anyone who’s used Windows Vista or 7, it’s on by default and makes you a limited user by default. And if you turn UAC off, then there’s less security. So I left it for Total Commander, a program often recommended as a grade ‘A’ alternative to Explorer. However, personally, I’ve found it’s shortcuts cumbersome, such as having to right click to add to the selection, rather then getting the right click menu makes me a bit hesitant to call it a worthwhile investment myself.

    So if Total Commander and Nexus File don’t work flawlessly under 64bit, or at least don’t work the way I want them to, there is really no other choice. Or is there?

    Enter Directory Opus, a file manager I found recently and have been learning to love to use. To say the least, it puts Total Commander, Nexus File, heck, every other file manager I’ve ever used to shame. It remains lightweight and easy to use, offering an improved take over Total Commander’s workings, and offering much more. Some of the major things that make it different from Windows Explorer file manager:

    • FTP Client, built in
    • Image viewer, built in
    • Built in audio clip viewer
    • Built in compressed file support (On top of ZIP, it also supports RAR)
    • Themes and tabbed browsing, on top of a interface that sorta mimics Total Commander
    • Advanced Renaming that supports wildcard support
    • Image converter
    • And much much more supported by plug-ins


    On first load, this is how it looks like. If you’ve used any file manager, you already feel at home with it.

    Overall, since I’ve been trying out it’s features, I’ve fallen more and more in love with how amazing it is, how fully featured it is. Heck, I’m surprised that more people haven’t tried it. On their site, they offer a free 30 day trial which can be extended to 60 days if you register your email address with them. The only possible downside I’ve personally found in Directory Opus is it’s price tag, at $80 Australian, which is rather steep until you consider how much it actually gets you, including a free license for a laptop as well.


    Testing out the FTP capabilities, it was able to connect fine to my local server.

    I also emailed the developers about this amazing software and they’ve agreed to offer a 25% off offer for Raymond.cc readers only! Simply use the code

    RAYMOND1110

    during the checkout and it will take it off for you automatically. Or if you’d like, you can click this link which will automatically add the discount to your order.


    Finally, the picture viewer is a beautiful addiction that rounds out the amazing software.

    Overall, if you’ve got the money, Directory Opus manages to make every other file manager look like a toy to me. I’ve not seen anything on the market that comes even remotely close to their amount of features and functionality, and with the added plug ins, make it one software I’ve enjoyed ever since I started using it.

  • Check If You’re Being Ignored in ICQ

    ICQ Ignore CheckerSo far I’ve only seen tools that is able to check if a person is invisible in ICQ. Today I found out that there’s a tool which you can check if your friend in your ICQ contact list has placed you in ignore list. ICQ has a feature where you can ignore specific types of messages, alerts or specific users. When a person is in ICQ ignore list, any communication these users send you will be blocked.

    Here’s a small and useful tool for you to check if you’re being ignored by your friends in your contact list. Other than that, you can also manually check an ICQ UIN by typing it yourself.


    ICQ Ignore Checker is developed by murb.com from Germany. To check if you’ve been ignored by a person from your contact list, just enter your ICQ UIN and password and click the Login button. Once you’re logged in, your ICQ contact list will be loaded. To check all your contact, simple click on the “Check all contacts” button.
    Check ICQ Ignore

    I’ve tested it and it works! Now I know who is ignoring me in ICQ! Since they don’t want me to bother them, I’ll just remove them from my contact list.

    [ Download ICQ Ignore Checker ]

  • Protect CD Contents by Encrypting with TrueCrypt

    If you ask anyone that knows about encryption, they would say that TrueCrypt is one the best out there. I have an old friend who used to be in the “scene” that was involved in warez and he uses TrueCrypt to protect the sensitive data on his computer in case one day the authorities decides to bust in to his house. If one follows the guide on using a complex passphrase, even FBI hackers fail to crack TrueCrypt using the dictionary attack.

    One good thing about TrueCrypt is the portability where I can use it to protect data by encrypting it and then save both the TrueCrypt Volume and the software to a CD or DVD. The data in the disc will be encrypted which can be easily decrypted to access the files any time by just running TrueCrypt and mounting the volume with the correct password. The decryption is done instantly (on the fly) so you can immediately access your files upon entering the correct password. There are some shareware such as CD-Lock and GiliSoft Secure Disc Creator that encrypts disc but I will show you how you can do that for free with TrueCrypt.


    1. Download the latest version of TrueCrypt. Currently the latest version is 7.0a.

    2. Run the TrueCrypt setup file (TrueCrypt Setup 7.0a.exe). Accept the license agreement and at the second wizard mode, select Extract.

    3. Run TrueCrypt.exe and click on Create Volume button.

    4. Select “Create an encrypted file container” and click Next.

    5. You are asked to either select “Standard” or “Hidden” TrueCrypt volume. This feature is very interesting and I hope I am able to explain in an easier way to understand.

    The Standard volume let’s you create just one encrypted space. Let’s say you’re being threatened to reveal the password or something bad is going to happen to you. Revealing the password will decrypt all the encrypted files and the person who threatened you get all the files.

    As for Hidden volume, it creates another encrypted volume on the existing encrypted space with another password. So if you gave the first password, the hidden volume will still stay hidden and not be revealed. Only if you mount the volume using the hidden volume password, then only the hidden volume will be mounted.

    As a simple test, we’ll select the “Standard TrueCrypt volume” and click Next.

    6. Now you’re asked to specify where should the TrueCrypt volume be saved to. Click the Select File button and set a name for example, dummy, and click Next.
    TrueCrypt Volume Location

    7. There are a bunch of encryption algorithms to choose. Let’s leave it as default and click Next.

    8. A normal CD have 650-700MB in space and DVD is 4.7GB. If you’re going to create an encrypted CD, let’s create the volume size as 600MB and click Next.
    TrueCrypt Volume Size

    9. Enter a password. Make sure you use a good password and remember it. If you lose the password, you are not going to get back the encrypted files.

    10. Click the Format button to format the volume and wait for a few seconds. Click Exit when the volume is created.

    11. Now you’re back at the TrueCrypt main interface. Click on any drive letter that is on the program, and click the Select File button. Select dummy file and then click the Mount button. Enter the password that you’ve specified in step 9.

    12. Go to My Computer and you will see a new drive letter. Alternatively you can also double click on the drive that is mounted at TrueCrypt to directly open the drive. That is the encrypted volume (space) which is now decrypted. Copy the files that you want to encrypt to the drive.

    13. Once you have finished copying the files to the mounted volume, to dismount, simply click on the drive at TrueCrypt to make sure that it’s highlight and then click the Dismount button. Click Exit to close TrueCrypt.

    14. To put it on a CD, just burn the 4 TrueCrypt files (TrueCrypt.exe, TrueCrypt Format.exe, truecrypt.sys, truecrypt-x64.sys) and dummy file to the disc.

    To access the encrypted files in future, insert the CD to your computer, run TrueCrypt.exe and follow step 11 to mount the TrueCrypt volume. The files will be read-only and cannot be modified since it is written on a disc.

    Here is how TrueCrypt works in summary:

    1. Create volume (make an encrypted space): Refer step 3 to 10
    2. Mount volume (map the encrypted space to a drive letter) Refer step 11
    3. Copy files to Volume (Move any files to the mapped drive that you want to encrypt) Refer step 12
    4. Dismount Volume (unmap encrypted drive). Refer step 13

  • The Importance of Backing Up EISA Hidden PQSERVICE Partition and MBR on a New Laptop

    I just bought a 12.1″ Acer TravelMate 6293 laptop to replace my big and bulky 15.4″ Acer TravelMate 4100. Initially I planned to buy Sony Vaio but it after comparing the price and specifications, Acer gives a better deal although I know that the quality of Acer is much lower than Sony Vaio. The quality and finishing doesn’t really matter so much to me because I am always using an external keyboard and mouse to avoid strain injury. I am only looking forward on the portability as it weighs less than 2KG and also it is using the latest Centrino2 processor with 2GB DDR3 ram which claims to draw less power and provide better performance.

    Acer eRecovery Management

    The salesman told me that Acer no longer provides Recovery Disc to restore the system back to factory default anymore. I had to create them myself from Acer eRecovery Management with 2 DVD discs. The funny part is the salesman told me that the recovery disc can only be created ONCE. I was frightened by what the salesman said and I started to do a lot of research on the laptop recovery system.


    I read a lot of forum posts and found that my Acer’s laptop hidden partition is totally different from what other people are getting. For example, many people has been successful to unhide the hidden EISA partition using Symantec’s PowerQuest Partiton Table Editor PARTEDIT32 tool. I’ve disabled D2D in BIOS and tried to set the hidden partiton type to 07 (Installable File System NTFS ,HPFS) but everytime after a reboot, the PQSERVICE partition will automatically be reverted back to the default type. I tried booting in to Safe Mode, the type shows 07 but I couldn’t see the hidden partition.

    download PTedit32

    Then, another different issue is regarding reverting the MBR back to the original Acer’s default MBR. Let’s say the Acer laptop is preinstalled with Windows Vista. You hate using Vista and formatted the hard drive to reinstall Windows XP. By doing that, you’re actually wiping off the MBR records and you can never use the Alt+F10 to launch the eRecovery Management to perform system recovery. Fortunately on older laptops, this can be easily fixed by extracting the rtmbr.bin and mbrwrdos.exe file from the hidden PQSERVICE partition to restore the MBR to the original state. Weirdly, my Acer TravelMate 6293 PQSERVICE hidden partition doesn’t contain mbrwrdos.exe and rtmbr.bin files 🙁

    To me, the current recovery method implemented by Acer and many other laptop manufacturers are just CRAPPY. No doubt that it is easy to restore the system back to factory state for basic computer users, but for a slightly more advance user (but not too geeky) who knows how to format a hard drive or mess around with partition, they could wrongly delete the PQSERVICE partition causing them unable to perform a system recovery. I guess many people also knows how to install Windows XP and by doing that, they’re wiping off the MBR and won’t be able to use the ALT+F10 hotkey during bootup to launch the Acer eRecovery Management. So if you screw up, you’ll have to fork out money to get the manufacturer to restore back the hidden PQSERVICE partition and the default MBR.

    After reading a lot on forums regarding the hidden partition and MBR, I think it is VERY important that these steps are taken IMMEDIATELY to prevent from spending unnecessary money in bringing back the laptop to manufacturer to have them restored.

    1. Create Recovery Discs
    – Usually laptops that doesn’t come with recovery discs has to be manually created. In Acer, it can be done from Acer eRecovery Management. Even if you’ve accidentally deleted the hidden partition, can you still restore the system back to default state using the recovery discs.

    2. Backup Master Boot Record
    – If you’ve removed Vista and installed another operating system such as XP, but would like to revert back to Vista, you can restore the original MBR and hit the Alt+F10 hotkey during startup to launch the recovery system from the hidden partition. Here are 5 free tools that you can used to backup and restore MBR (Master Boot Record)

    3. Backup EISA hidden partition PQSERVICE
    – I’d say that this step is the most important of all. Having the hidden partition is better than having the recovery discs. There are many third party partition tools that can handle hidden partition but I found that the free version Macrium Reflect is an excellent free tool that is able to easily detect, backup and restore the hidden PQSERVICE partition. It even automatically backs up the Master Boot Record whenever you create a backup.

    To backup PQSERVICE hidden partition. Run Macrium Reflect, right click on PQSERVICE partition and select Create Image of ’1 – PQSERVICE’.
    Create PQSERVICE image
    Select a backup destination, you can backup to your local hard disk, network shares or even CD/DVD discs. Should take less than 20 minutes to backup the 13GB hidden PQSERVICE partition. Next time when you want to restore the backed up PQSERVICE partiton, simply create a Macrium Reflect Rescue CD (preferably Linux), boot up the computer with the rescue cd and load the image.

    To view the contents of the PQSERVICE hidden partition, just double click on the backed up image file that you created with Macrium Reflect and check on the checkbox. It will amount the backup image on new drive letter.
    Mount PQSERVICE hidden partition

    You can now view the PQSERVICE contents from My Computer by accessing the mounted drive letter.
    access hidden PQSERVICE

    Once you have done all the 3 steps above and store the backups in the proper place (external drives, DVD discs and etc), you can pretty much do whatever you want on the laptop without having any problems in restoring the laptop’s system back to the original state.

  • Fix MMC Cannot Open the File C:WINDOWSsystem32dfrg.msc Problem

    One of my client’s computer encountered a problem which is unable to run Windows Disk Defragmenter. Windows Disk Defragmenter is a computer program included in Microsoft Windows designed to increase access speed (and sometimes increase the amount of usable space) by rearranging files stored on a disk to occupy contiguous storage locations, or defragmenting. The purpose is to optimize the time it takes to read and write files to/from the disk by minimizing head travel time and maximizing the transfer rate.

    The problem is whenever he tries to run the Disk Defragmenter shortcut from Start > Programs > Accessories > System Tools > Disk Defragmenter, only an error window “MMC cannot open the file C:\Windows\system32\dfrg.msc. This may be because the file does not exist, is not an MMC console, or was created by a later version of MMC. This may also be because you do not have sufficient access rights to the file.” appears.

    MMC cannot open the file C:\Windows\system32\dfrg.msc. This may be because the file does not exist, is not an MMC console, or was created by a later version of MMC. This may also be because you do not have sufficient access rights to the file

    Here are some suggestions on how to fix running disk defragmenter problem in Windows.


    One of the methods below should be able to help you restore Windows Disk Defragmenter. Try the first solution and then run Disk Defragmenter. If it didn’t fix the problem, continue with the second one and etc.

    Solution 1: Make sure you have rights to run Microsoft Management Console (MMC) and MSC file.

    Solution 2: Go to Start > Run, type regsvr32 msxml3.dll and click OK.
    MMC cannot open the file C:\Windows\system32\dfrg.msc. This may be because the file does not exist, is not an MMC console, or was created by a later version of MMC. This may also be because you do not have sufficient access rights to the file

    Solution 3: Go to Start > Run, type regsvr32 dfrgsnap.dll and click OK. Then again go to Run, type regsvr32 dfrgui.dll and click OK.

    Solution 4: Go to C:\Windows\Inf, right click at dfrg.inf file and select Install.
    Install DFRG.INF

    Solution 5: Go to Start > Run and type sfc /scannow. Make sure you have your Windows XP installation disc in the CD/DVD drive.

    Solution 6: Download and apply .MSC association fix.

    Solution 7: Download and apply Defrag SnapIn registry fix.

    Solution 8: Download and install latest MMC 3.0 from Microsoft.

    One of the methods above should be able to help you restore your disk defragmenter. But for my case, I’ve gone though all methods above and it still doesn’t restore Windows Disk Defragmenter. Every time I run defrag, I still get the error MMC Cannot Open the File C:\WINDOWS\system32\dfrg.msc. After days of trying, finally I just decided to rename the dfrg.msc file at C:\WINDOWS\system32\ to dfrg-renamed.msc. I ran dfrg-renamed.msc, and I was shocked to see that it was able to run! So I created a shortcut for dfrg-renamed.msc and place it at Start menu and desktop for my client.

    Until today I still couldn’t figure out what is causing this weird behavior but this workaround allows me to run Disk Defragmenter without getting the MMC Cannot Open the File C:\WINDOWS\system32\dfrg.msc error. I’d appreciate if you can share with me what might be the cause of this problem and how to really fix it.

  • Pro Wrestling Torrents in trouble!

    Pro Wrestling Torrents in trouble!
    Pro Wrestling Torrents site is currently and will be offline for a short time.
    This is due to WWE has asked their lawyers to warn Pro Wrestling Torrents to stop infringing WWE copyrights.
    At least this is a warning and not immediate action taken by their local authorities.
    The owner of Pro Wrestling Torrents received a warning email from WWE lawyer (see below)


    April 18, 2006
    By email ()

    Re: Unauthorized Use of World Wrestling Entertainment, Inc. Intellectual Property: WWE IMAGES/Footage

    Our File: WWE USA INF 442

    Dear Mr. Baily:

    As you know, World Wrestling Entertainment, Inc. is the exclusive owner of numerous trademarks, service marks, and copyrights, including numerous copyrights for the images of its talent, and show footage. As owner of numerous copyrights, we vigilantly protect our copyrighted works and will not tolerate any infringement of the same.

    WWE has recently acquired evidence that you are, AGAIN, infringing our copyrights, specifically, by posting WWE copyrighted images, and/or footage on your www.pwtorrents.net website. Your actions constitute actionable copyright infringement. Under U.S. Copyright law, we may be able to obtain actual damages plus any additional profits you made on the infringing products, or statutory damages of up to $150,000 per work infringed, counsel fees and costs (17 U.S.C. §504, 505). In addition, under U.S. Federal Criminal law, you may face criminal sanctions, including imprisonment and fines (18 U.S.C. §2319).

    In the interest of avoiding costly legal proceedings, we demand that you:

    1. immediately and permanently cease posting any WWE images and/or footage on your www.pwtorrents.net website, and agree not to post any WWE copyrighted works, now or in the future;

    2. immediately remove WWE copyrighted images and footage from your www.pwtorrents.net website;

    3. confirm in writing that you have complied with all of WWE ’s demands by signing and returning a copy of the Acknowledgement and Agreement included below.

    The demands made herein are not made to the exclusion of other remedies to which WWE is entitled and WWE specifically reserves the right to seek all remedies available to it under federal law and state law as a result of your infringing activities.

    If we do not hear from you by April 19, 2006, we WILL take further legal action.

    Sincerely,
    Stacy L. Papachristos
    Associate Counsel

    Feeling sad because you no longer can download Wrestling series?
    The good news is there is another torrent site dedicated to Wrestling 🙂
    Xtreme Wrestling Torrents
    Registration for Xtreme Wrestling Torrents has been opened today. So sign up as soon as you can before Xtreme Wrestling Torrents site stop accepting new signups. I hear that Xtreme Wrestling Torrents site will be next to be targeted by WWE lawyer but I don’t think they will take action so fast.
    In the meantime, enjoy your weekly WWE RAW and SMACKDOWN from Xtreme Wrestling Torrents!